About LRDC

Who We Are

Cybersecurity events are in the news weekly, with recent examples including data breaches of Equifax, UBER, and by cybercriminals and nation-state actors like North Korea. Of major concern is detecting, defending, and countering these malicious attacks or errors in our critical infrastructure, which are inserted through (a) tampering, (b) design modifications and (c) spoofed software or hardware. If the attack or event involves digital data, our patented method [1] provides a resilient improvement in dependability and security. Initially, our method was investigated as a replacement/improvement to only a special case of error detection and correction, namely, the ubiquitous Cyclic Redundancy Check (CRC) code. However, further examination revealed a new approach to resolving other problems with digital information, whether the data is dynamic or static; and whether our method is used for dependability or security. A recent collision between a UAS and a helicopter demonstrate the need for legally traceable identifiers being incorporated into unmanned vehicles in the National Airspace System (NAS)[2]. Our patented method describes an identifier technique that utilizes small changes to existing standards and procedures to accomplish the configuration management, ID establishment and ID registration archiving.

Other Potential Applications:

Sensor data and streaming data;

Cellular communications;

Unmanned Aerial System (UAS) command and control links;

Biometric records

“Safety First” has been the default policy in critical system design for some time, and should be. We believe systems now should have the capability to provide a Secure Priority or Privacy Priority, when needed, without a major hit to performance. Our patent describes how to set this cornerstone in digital systems and data. Our PARADx system of systems, covers the eco-system and life-cycle. Since our patented method ensures secure delivery of data, the end-to-end integrity of sensor data pipelines can be assured, eliminating (or dramatically reducing) the probability of man-in-the-middle attacks, spoofing and data transmission errors. [1] U.S. Patent US8769373B2 [2] https://www.ntsb.gov/investigations/Pages/2017-DCA17IA202AB.aspx

Where We Started

We started work in late 2009 to update error detection and correction standards for specifying systems developed in the global marketplace. Our main goal was to address potential emerging systemic threats.


Dr. Dale R. Thompson of the University of Arkansas was recruited to review this patent-pending technique and to research its information assurance aspects.


Executive Biographies

GTL pic

Glen Logan

Managing Director

M.S. Electrical Engineering - Air Force Institute of Technology
B.S. Electrical Engineering - University of Louisiana at Lafayette
Associate Fellow - American Institute of Aeronautics and Astronautics
Co-founder and Chair of The Open Group's Real-time and Embedded Systems Forum

Glen has extensive experience in Department of Defense (DoD) defense systems acquisition (DoD 5000), open systems and systems engineering. Prior to entering active duty in the U.S. Air Force, Glen worked briefly in Southwestern Louisiana in the areas of oilfield instrumentation and offshore geophysical surveys.

During his 28-year U.S. Air Force career, Glen held numerous positions in space launch vehicle avionics, underground nuclear test ban treaty monitoring, integrated logistics support, modular avionics, DoD acquisition policy development, systems engineering, program assessments, open systems architecture and standards development.

Subsequent to retirement from the Air Force, Glen has provided systems engineering subject matter expert support to the Office of the Under Secretary of Defense for Acquisition, Technology and Logistics - OUSD(AT&L), Naval Air Systems Command (NAVAIR), the U.S. Army's Project Manager DoD Biometrics, the Homeland Defense and Security Information Analysis Center (HDIAC) and the Naval Sea Systems Command (NAVSEA).


CLR pic

Cleon Rogers

Managing Director

Master's in Mathematics - University of Kansas
BS Computer Science - University of Arkansas - Little Rock
IEEE CSDP in 2001, IEEE Computer Society SEM in 2015

Cleon has over 30 years in Information Technology, starting in Field Service with Memorex, with major accounts in Dallas & Little Rock. While in high school and college Cleon worked as a manager of a retail clothing store and then later provided engineering support for fast food management systems in College Station, Texas supplied to Roy Rogers Restaurants, Church’s Chicken, and McDonalds. After studies at Texas A&M University, in the Large Systems Storage Group at the Santa Clara, California Memorex Headquarters, he participated in their Speed Matching Buffer and Cache R&D of embedded microcode/firmware. This included on-site support of beta installations at the Securities Exchange Commission in D. C. and disk subsystem support at the Department of Justice in D.C. Worldwide engineering support of global installations of major customers was a routine part of the job. With former Memorex colleagues, at SF2 – now EMC, he led the diagnostics and utilities application group in the early resilient R&D of RAID storage. Cleon led the navigation aids DO-178 software certification project management for software assurance for Air Traffic Management, including the Mark 10/20/20A Instrument Landing Systems (ILS). His embedded software engineering design support included the Portable ILS Receiver (PIR), GPS Landing Systems (DGLS), Remote Control & Status (RCSU), and the Maintenance Processor Subsystem (MPS) in National Airspace System (NAS) emergency shutdown system for Wilcox Electric/AirsysATM. He has, also, supported C130J flight simulators for CAE and Lockheed; Flight Management Systems (FMS), international technology transfer, and is a holder of several certifications in cyber security. He authored two papers on Cyclic Redundancies for digital data dependability and assurance. He participated in the IEEE Experts in Technology and Policy (ETAP) event, End To End And Security Workshop for the Internet Of Things (IoT), in 2016 as an invited expert at the Marvin Center of George Washington University.