Altamira’s solution teams are comprised of industry experts in areas ranging from applied engineering to developing state-of-the-art comms technology out of our New Mexico R&D lab. We pride ourselves in developing innovative, mission-focused solutions that solve the most complicated issues facing customers.
Extracting, storing, and visualizing knowledge from data is challenging and costly, especially in the face of growing data volumes. We build tools that help analysts perform these core analytic functions more quickly and effectively. We implement analysis tools in big data environments on cloud architectures so they are more scalable, performant, reliable, and secure. We aggregate and fuse data of all types to help analysts follow threads, correlate information, and find patterns. We introduce elements of automation to simplify the analytic process, so analysts can spend more time synthesizing knowledge versus reading and tagging documents, for example. We implement user interfaces with next generation web-based visualization tools, so analysts can perform analysis from any modern browser with network access to implemented services, so customers are not locked to proprietary appliances or thick-client interfaces. We also build on and release analysis and visualization tools as open source software, to minimize costs and maximize flexibility for our customers.
Multi-format data analysis
We build tools that automate extraction of knowledge from multi-format data. For example our solution Lumify (http://lumify.io) automatically extracts entities (“things”) such as people, organizations, locations, dates, times, and other semantic information from structured and semi-structured databases and spreadsheets, unstructured and semi-structured documents, PDFs, images, video, audio, and other data types. We even identify faces and other objects from images and video. We index all extracted knowledge so it can be searched immediately, providing more precision and utility than keyword-based searches. Lumify is also an fully open source solution, so it can be adopted without license costs or restrictions.
Knowledge is embedded in data, whether in relational databases, streaming cyber data, or massive collections of files of all types. At a basic level of logic, this knowledge is in the form of resolved entities (“things”) that fall in semantic categories (“concepts”), typically defined in a knowledge domain (“ontology”). Entities may also have properties, and entities may be linked or related in some way to other entities (“predicates”). For example, “ISIL” could be derived as a resolved entity of category “Terrorist Organization” that is linked to entity “Palymra Demolition on 24 August 2015” of category “terrorist attack” by predicate “implemented.” In other words, knowledge may be captured and fused as a large geo-temporal graph, with nodes “resolved entities” and edges “relationships” with dates and locations as properties. In this graphical form, analysts can ask question like: “What terrorist attacks occurred in 2015? Are there patterns in the attacks? Time of day? Day of week? Trend in location? Who is involved in attacks? Who are they related to?” Etc. We support the extraction and storage of graphical knowledge and visualization on a massive scale with SecureGraph and Lumify. SecureGraph holds vast collections of graphical knowledge (entities, properties, relationships), and Lumify helps analysts populate and visualize the graph.
Knowledge in data often has geospatial and temporal components. Most entities trace paths, or are singular points, in space and time. To make sense of large volumes of data, it often makes sense to look at extracted knowledge in space and time – for example, plotted on a map. Our solutions, such as Lumify, support this function.
MISSION APPLICATION DEVELOPMENT
Altamira has a long legacy of building and deploying advanced software applications. Our clients in multiple agencies use products such as Blur and Lumifiy. Now, with our new Software Development Center we are building and hosting big data applications in our private cloud.
Big Data Analytics
We develop advanced analytic tools for use in business and government. We developed Blur, a big data search tool, and Lumify, an analytics platform that can be adapted to to any domain.
Mobile App Development
Our software team is experienced and developing and deploying mobile apps for government and commercial clients.
Cross Domain Solutions
We are experienced at designing, developing and deploying cross domain solutions for our government clients. These solutions allow big data to be shared among multiple agencies in a secure manner that manages data confidentiality, integrity and availability.
Trusted Computing (Enterprise and Mobile Platforms)
We provide trusted computing solutions for mobile platforms and enterprise environments through various concepts and security controls. We help our clients secure their information while fully taking advantage of the benefits that mobile technologies (laptops, tablets, smartphones, etc.) offer, but also implementing these concepts into enterprise environments. By addressing the security risks associated with the increase in mobile platform use we can be pro-active in developing cutting edge solutions. Altamira has extensive experience engineering solutions that provide secure mobility capability and secure enterprise solutions. Altamira has specific experience in the following areas; Authentication, Data at Rest Protection (encryption), Virtualized Platforms and Services, TPM/HSM, Wireless/Location Awareness, and Mobile Platforms.
Data At Rest
Data At Rest is a large problem for Mobile devices. While desktops and laptops can achieve multiple layers of encryption, this has been found to be far more difficult on a mobile device. A device which receives the Mobile Device Functional (MDF) Protection Profile certification will have one layer of full disk encryption. However, in order to protect data on the device, two layers of DAR protection is required. The second layer of DAR can be a second full disk encryption or a file encryption layer. The operational concept of the device allows for the specific capabilities to be active during operations, so any additional layer of DAR will need to allow these capabilities to remain active. Altamira provides custom solutions It should not be a customized solution to address Data At rest across multiple platforms and devices.
Protecting Data-in-transit (DIT) requires multiple layers of protection. VPN technology is used as the outer tunnel, and an application is expected to provide a tunnel for the second layer. Altamira uses open-source and commercial products to add additional layers of encryption for DIT protections via virtualization technologies. The virtualization technologies allow Altamira to add encryption which adds a second layer of protection.
We support our customers with next generation technologies across leading cloud architectures, from the hardware layer to web-based user interfaces. We engineer private (customer hosted) and public (typically Amazon Web Services) cloud compute clusters and services for Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). We build on leading open source tools such as CentOS, OpenStack, Mesos, and Docker to ensure our customers maintain a high level of performance, scalability, high availability, and affordability.
On top of private and public cloud-based architectures, we implement solutions that help make sense of big data – high volume, high velocity, and high variety data (the Three Vs). We are experts in open source tools such as Storm, Spark, and Hadoop that enable streams, in-memory, and batch-based distributed processing of high volume data on large compute clusters. We are experts in open source tools such as Accumulo and HBase that support indexing and analysis of massive volumes of data. We implement algorithms to extract information from structured data, unstructured text, imagery, video, and audio in big data environments using tools such as OpenNLP, OpenCV, Mahout, Sphinx, Tesseract, and R. We also contribute to the open source big data community. For example we created the big data relational search tool Blur (https://incubator.apache.org/blur), graph database SecureGraph (http://securegraph.org), and data analysis and visualization tool Lumify
Altamira is an industy leader partnering with our customers to develop state of the art analysis tools and techniques for all of the Air Force ISR and NTM sensors. Our teams have been leading the community in developing Activity Based Intelligence and content dominant analysis.
PIR and Thermal
Altamira provides expertise in phenomenology, algorithm development, and data analysis techniques for PIR and thermal imaging, and non-imaging modalities. We contribute to the development of the PIR ground architecture through advances in integration and interoperability. These developments enhance the ground operations more efficient, effective, and interoperable.
Our scientists and engineers developed new scientific techniques and methods to produce innovative new applications and product lines from NASIC’s data streams. Subject matter experts provided mentoring and ad hoc training on complex problems and advanced analysis techniques.
The Persistent Infrared (PIR) mission area is supports the Department of Defense (DOD) and intelligence community (IC) to ensure that missile threats are detected and reported to decision makers in a timely and relevant manner.
Altamira provides exploitation of hyperspectral and multispectral imagery that are in widespread use in the remote sensing community.
We provided instructions on the techniques and tools used in the processing, exploitation, and dissemination (PED) process including a certification program, training sessions, and a qualification program.
High quality image exploitation by our analysts provides extensive target detection, discrimination and tracking capabilities, reducing decision timelines for warfighters.
SAR, OTHR, and GMTI
Scientists and analysts processed, exploited, and disseminated Over the Horizon (OTH) radar data analysis and supported ionospheric modeling, analyzed and exploited Ground Moving Target Indicator (GMTI) data and performed GMTI analysis that was integrated with GEOINT sensor data. In addition, we provide Synthetic Aperture Radar imagery analysis and exploitation to provide valuable intelligence to warfighters.
Forensic analysts contributed to the preparation of analytical and technical reports and publications, preparation of graphics and maintenance databases, summary data and spreadsheets and other formats as required.
Altamira’s Applied Engineering approaches problems with fundamental science and mathematical techniques to develop new innovative and often disruptive technologies in RF electronics, Antenna technology and signal processing. The Applied Engineering group is centered in Las Cruces, NM and provides design, simulation, modeling, prototyping, measurement and validation services both internally to Altamira and for DoD, IC and commercial customers. Altamira’s AE group has expertise, industry standard tools and recent past performance in Electronic Warfare, Electronic Protection, Sensors, Phased Arrays, Antenna, RF/Digital/Mixed Signal, Compressive Sensing, Machine Learning, and Machine Classification.
Direct Spatial Antenna Modulation (DSAM) – Spatial Information Control (SIC)
Altamira has developed and patented novel technologies and approaches to antenna use and signal control called Direct Spatial Antenna Modulation (DSAM) and Spatial Information Control (SIC), these techniques unlock order of magnitude enhancements vs the state of the art operation in the modern Congested, Contested and Anti-Access/Area Denial (A2/AD) spectrum environments.
Altamira’s Applied Engineering group provides engineering design expertise in antenna/array/beamforming, communications, RF/digital/mixed electronics, software defined radio and digital signal processing domains. With in-house tools, expertise and experience rapidly implementing, and iterating engineering solutions from board level to platform level, and ranging from initial proof of concept to limited production. Altamira has the capabilities to prototype, measure and validate designs in-house, removing cost and expense from a solution lifecycle.
Cyberattacks continue to advance in rate and impact, with more organizations experiencing jarring compromises each year. The prevalence of modern ransomware puts your enterprise’s critical data at risk. Our cybersecurity solutions offer a complete approach to protecting your corporate information by securing your systems and fortifying your defense plan.
System Vulnerability Analysis
Reduce Your Attack Surface
We provide an in-depth assessment of your security posture by investigating the behavior of your systems. By closely examining source code and responses to brute force and fuzzing efforts, we can pinpoint the vulnerabilities within your network and offer a detailed view of your attack surface that drives focused efforts to strengthen your security mechanisms.
- Recognition, inspection and assessment techniques
- Software & Protocol Fuzzing
- Embedded & Proprietary Systems Security Analysis
- Source Code Review
Defensive Vulnerability Analysis (Defense Response Analysis)
Equip Your Network Defenses
Our penetration testing and Red Teaming approach puts your cyber operations to the test. We locate and trigger vulnerabilities in your computer network to engage and evaluate your defensive systems. Our efforts support the development of customized network defense tools while sharpening your cybersecurity teams’ ability to effectively identify and respond to advanced attacks.
- Adversary characterization through Red and Blue teaming
- Conduct research and analysis
- Continual activity monitoring
- Develop computer network defense tools
Computer Network Operations (CNO) Software Development
Advancing Our Approach for Your Security
Our detailed systems and malware analysis enables us to outpace modern cyber threats. For our penetration testing, we form exploits that effectively assess your cybersecurity systems by emulating real attacks. By staying ahead of real-world threat actors, we provide the expertise you need to defend against threats to your enterprise before they strike.
- Embedded Systems Development
- Mobile platforms
- Linux/Unix Application & Kernel Development
- Windows API, Network, and Kernel Driver Development
- Code packing, Obfuscation, and Rootkit techniques
- C, C++, Assembly (multiple processor families), Java, Python
Anticipating Active Threats
We help you avoid threats to your network by facing them ourselves. Finding and investigating active malware in the wild fuels our understanding of modern threat actors, allowing us to recommend the best security solutions to counter the cyberattacks of today and tomorrow.
- Analysis of Zero-Day Vulnerabilities
- Expertise with debuggers, disassemblers, and sniffers for malware triage
- Post-mortem memory forensics
- Analysis of protection mechanisms used by malware
- Analysis of malicious software and documents
Mission System Support
Maintain Your Operations
Your mission requires 24/7 operations. Success depends on the uninterrupted movement of data across vast networks. All systems must function across a complex enterprise to ensure that your analysts get the critical information they need.
The constant release of new tools and infrastructure threatens the consistency of your vital day-to-day operations, pausing necessary functions and stalling actionable intelligence.
We offer mission system solutions that enhance the functionality of your infrastructure without jeopardizing time and action. We recognize the complex demands of your mission, and are able to integrate thousands of disparate data sources into a complex enterprise that spans networks of varying classifications. To protect the continuity of your operations, we evaluate systems through ongoing quality control testing that confirms proper integration, functionality, and dataflow. Our efforts safeguard your vital mission information and ensure that analysts receive data in a useable format, empowering them to complete the mission critical tasks your success requires.
- Systems Engineering
- System Integration and Administration
- End-to-End dataflow
- CNO testing