Loughborough University
Leicestershire, UK
LE11 3TU
+44 (0)1509 263171

Advanced VR Research Centre

Big Data - Protecting High Value Assets Travelling in Hostile Territory


Transportation of highly senstive and high value assets is routnely carried by security firms throught the world in armoured vehicles. Depending on teh value of teh assets being transported there is a need to provide protection against interceptions by 'bandits' or hostile criminal agents. Many solutions employ radio links between vehicles or direct satelite connection to provide a remote monitoring station with details of vehicle location and status. In the case of a large city or large urban region there may be many tens (if not hundreds) of such vehicles moving in safe and unsafe territories.

Intelligence has shown that criminals have access to very sophisticated mobile jammers that reneres the remote minitoing systems ineffective. Consequenty, this places teh vehicles at risk since they are not able to report the position. For a large security provider who manages a very large number of vehicles thsi presents a serious technical challenge. Research has been undertaken that enables the huge data stream from teh satelite to processed in a manner that the location of the mobile jammers can be triangulated and the data passed on appropriate law enforcing agents.

Aims and Objectives

The goal has been to create the tools and analytcal techniques that can handle the enourmous flood of real-time data in a way that supports real-time interactive exploration to determine both the patterns of vehicular movements and process the 'signature' of the vehicle(s) that are being compromised. Instead of working on stored data the requirement is for analytics solutions that can work on live streamed data. In addition, there is a requirement to process the noise in teh data and where possible use multiple sources of data to improve accuracy and confidence in the data.


There are many strands to this research and involves development of highly efficient data extraction algorithms and multi-sensor fusion techniques. The exact methods that hav ebeen develoeped are unsurprisngluy classified. It is very encouraging that the influence of teh mobile jamming device can be derived from teh data in a manner that allows the law enforcing agencies to pinpoint the location of the jammer.

The reseach outcomes were very informative and will hopefully lead to a more secure transportation of high value assets.

Unfortunately, due to security and commercial reasons it is not possible to disclose the company nor location of the country where the data originated.

Want to Know More?

Professor Roy S. Kalawsky, r.s.kalawsky@lboro.ac.uk, +44 (0)1509 63 5678