Five ways that military and security organizations can use structured open-source data to work faster and smarter.
1 of 37
Download to read offline
More Related Content
Improving Military Workflows - Structured Data for Military & Security Users
1. Improving military and
security workflows
Five ways that military and security
organizations can use structured
open-source data to work faster
and smarter
2. Why structured open-source data?
Structured data is
Quick to search
Easy to query
Easy to manipulate
Copyright 息 2012 IHS Inc. 2
3. Why structured open-source data?
Open-source data is
Verified
Independent
Unclassified
Copyright 息 2012 IHS Inc. 3
4. How can it improve workflows?
1. Threat analysis
Copyright 息 2012 IHS Inc. 4
5. 1. Threat analysis
Satellite images show
enemy tanks gathering
on an airfield near the
border
The threat must
be assessed
Copyright 息 2012 IHS Inc. 5
8. 1. Threat analysis
Obtain enemy land
warfare platform
inventory intelligence
Copyright 息 2012 IHS Inc. 8
9. 1. Threat analysis
Query structured
open-source data by
country, length and
width
Copyright 息 2012 IHS Inc. 9
10. 1. Threat analysis
Query returns only
platforms that meet
search criteria
Copyright 息 2012 IHS Inc. 10
11. 1. Threat analysis
Detected platforms are
identified quickly and T-72
easily
The threat is quantified
Copyright 息 2012 IHS Inc. 11
12. How can it improve workflows?
1. Threat analysis
2. Capability analysis
Copyright 息 2012 IHS Inc. 12
13. 2. Capability analysis
Diplomacy is breaking
down; conflict seems
inevitable
Copyright 息 2012 IHS Inc. 13
14. 2. Capability analysis
Air superiority will
be key to success
Enemy air capability
must be assessed
Copyright 息 2012 IHS Inc. 14
15. 2. Capability analysis
Review intelligence
of enemy air base
locations
Copyright 息 2012 IHS Inc. 15
16. 2. Capability analysis
Cross-reference with
equipment in service
and order of battle
Copyright 息 2012 IHS Inc. 16
17. 2. Capability analysis
Use structured open-
source data to search
ranges of air platforms
at each base
Copyright 息 2012 IHS Inc. 17
18. 2. Capability analysis
Quantify and
visualize enemy air
strike range
Copyright 息 2012 IHS Inc. 18
19. How can it improve workflows?
1. Threat analysis
2. Capability analysis
3. Military planning
Copyright 息 2012 IHS Inc. 19
20. 3. Military planning
A multinational
expeditionary force
prepares to move into
enemy terrain
Copyright 息 2012 IHS Inc. 20
21. 3. Military planning
3.5m
Imagery of a strategic
crossing point reveals
that the bridge may be
too narrow to cross
Copyright 息 2012 IHS Inc. 21
22. 3. Military planning
Filter structured open-
source data for
platforms wider than
the bridge crossing
Copyright 息 2012 IHS Inc. 22
23. 3. Military planning
Query returns
land platforms too
wide to cross
Copyright 息 2012 IHS Inc. 23
24. 3. Military planning
Need for alternative
routes or methods
identified
Copyright 息 2012 IHS Inc. 24
25. 4. How can it improve workflows?
1. Threat analysis
2. Capability analysis
3. Military planning
4. Logistical analysis
Copyright 息 2012 IHS Inc. 25
27. 4. Logistical analysis
Air transport capacity
is known
Dimensions of partner
land platforms are not
Copyright 息 2012 IHS Inc. 27
28. 4. Logistical analysis
Query structured open-
source land platform
data by length, width
and height
Copyright 息 2012 IHS Inc. 28
29. 4. Logistical analysis
Sort results to identify
viable platforms and
1.85m
calculate transport
loading levels
6.25m
2.60m
Copyright 息 2012 IHS Inc. 29
30. 4. Logistical analysis
Air transport capacity
for partner land
platforms is derived
Transportation levels
may be planned
Copyright 息 2012 IHS Inc. 30
31. How can it improve workflows?
1. Threat analysis
2. Capability analysis
3. Military planning
4. Logistical analysis
5. Procurement requirements setting
Copyright 息 2012 IHS Inc. 31
32. 5. Procurement requirements setting
A major procurement
program is initiated
Capability requirements
must be developed
Copyright 息 2012 IHS Inc. 32
33. 5. Procurement requirements setting
Review structured open-
source data for existing
equipment and technology
capabilities
Copyright 息 2012 IHS Inc. 33
34. 5. Procurement requirements setting
Data output provides 200 40
capability baseline 150 30
Endurance (h)
100 20
Max altitude
50 10
Max T-O Weight Payload weight
0 0
Set program capability
Endurance Max speed
requirements accordingly
Loitering speed Datalink range
Copyright 息 2012 IHS Inc. 34
35. 5. Procurement requirements setting
Requirements are
benchmarked against
best in class
Commercial proposals
are easily measured
Copyright 息 2012 IHS Inc. 35
36. Conclusion
Structured open-source
data is not a replacement
for proprietary sources
But it is a source of reliable
supporting information
And, used correctly, it can
help the military user to
work faster and smarter
Copyright 息 2012 IHS Inc. 36