
Critical Infrastructure:
Water Treatment
AI doesn’t just analyze evidence—it decides how to analyze it. RemiFetch adapts forensic methodology in real time based on detected patterns, automatically applying the right techniques—correlation, artifact extraction, behavioral analysis, and timeline reconstruction—to match the investigation.
By linking signals across systems and evolving its approach as new evidence emerges, AI reveals relationships and attack paths that static workflows cannot. This enables deeper insight, faster investigations, and defensible, evidence-driven conclusions.
Supported ICS Platforms
Remi analyzes event log data from a wide range of industrial control system platforms and operational technologies commonly deployed across critical infrastructure environments. The system supports logs and data generated by leading ICS, SCADA, PLC, and automation vendors used in plant operations, grid control, and utility infrastructure. By normalizing and correlating activity across these systems, Remi enables investigators to reconstruct operational events, identify suspicious engineering changes, and detect adversarial behaviors across complex OT environments regardless of the vendor platform involved.
- Siemens – PLCs, SCADA systems, and water utility automation platforms
- Schneider Electric – SCADA systems, PLCs, and water infrastructure automation
- Rockwell Automation (Allen-Bradley) – PLCs and industrial control systems used in treatment plants
- Emerson – plant automation and distributed control systems
- ABB – process automation and water infrastructure control systems
- Xylem / YSI – water monitoring systems and treatment process controls
- Honeywell – industrial control systems and plant monitoring platforms
- Mitsubishi Electric – PLCs and automation systems used in water facilities
- Yokogawa – distributed control systems and process automation platforms
- Endress+Hauser – instrumentation and process control systems for water treatment

Remi analyzes offline water treatment OT/SCADA event logs to surface insider behavior, disruption tradecraft, and coordinated activity.
Water treatment is critical infrastructure—when it’s disrupted, the impact is immediate: public health, continuity of operations, and community stability. Remi analyzes offline water treatment OT/SCADA event logs to surface insider threat signals, coordinated disruption behaviors, and concealment patterns, then organizes them into a defensible timeline and evidence-backed findings for rapid response and escalation. All processing is local-first and offline, supporting sensitive investigations without sending operational data to the cloud.
Critical Infrastructure: Water Treatment — Detection Catalog
Scrollable list (click a detection to expand)
Access & Authentication
Unauthorized HMI/EWS Login Access
Privileged Account Change Identity
Unapproved Remote Access Session Remote
Process & Command Integrity
Unauthorized Pump Start/Stop Control
Valve Actuation Outside Operating Window Change
Chemical Dosing Setpoint Change Setpoint
Rapid Command Oscillation (“Chatter”) Anomaly
Safety & Operations Monitoring
Tank Level / Flow Anomaly Spike Telemetry
Pressure/Backwash Cycle Anomaly Operations
Alarm Flooding / Alarm Silence Pattern Alarms
Asset & Configuration Changes
PLC/RTU Configuration Change Config
Firmware/Logic Change Detected Baseline
New OT Asset Discovered Inventory
Network & Segmentation
OT Zone Boundary Violation Network
New East–West Communication Path Network
Historian/Data Gateway Anomaly Telemetry
Data Integrity & Readiness
Time Sync Drift / Jump Time
Telemetry Gap / Dropout Integrity
Case Evidence Completeness Readiness

Near-Instant AI Generated Reporting
Remi analyzes offline water treatment OT/SCADA event logs to expose disruption tradecraft and insider-risk behavior—linking suspicious access, pump/valve actions, chemical dosing setpoint changes, alarm manipulation, and concealment signals into a single, defensible timeline. The report set turns fragmented operational data into evidence-backed findings and correlated investigative threads for rapid response, escalation, and regulatory review—local-first and offline.
Executive_Summary.txt
What it does: High-level overview for leadership and rapid triage—top findings, operational risk posture, and what requires immediate review.
Operational_Narrative.txt
What it does: Investigator narrative that explains suspicious water-treatment activity as a sequence of behaviors, linking access, actions taken, operational context, and concealment indicators.
System_State_Timeline.txt
What it does: Time-ordered timeline of significant system and process-state events to reconstruct “what happened when.”
Device_Activity_Report.txt
What it does: Device-centric activity summary (HMI/EWS, PLC/RTU, gateways) highlighting unusual behavior, new/changed assets, and deviations from baseline operations.
Control_Action_Summary.txt
What it does: Roll-up of control actions—pump/valve operations, chemical dosing setpoints, and other commands—grouped for review of intent, origin consistency, and potential impact.
Anomaly_Report.txt
What it does: Prioritized anomalies across telemetry and operations—unexpected timing, unusual sequences, spikes/gaps, and patterns that warrant investigation.
Artifact_Inventory.txt
What it does: Inventory of collected/produced artifacts and outputs to support defensible review, completeness checks, and export packaging.
Artifact_Origin_Report.txt
What it does: Provenance and traceability—maps artifacts back to sources and acquisition context for auditability and evidence review.
Evidence_Excerpts.txt
What it does: Curated excerpts of key evidence—short, relevant slices with enough context to support investigation, reporting, and stakeholder briefings.
Thread_Index.txt
What it does: Index of correlated investigative threads—links related events across users/hosts/assets/time windows to follow multi-step behavior rather than isolated alerts.