際際滷

際際滷Share a Scribd company logo
Improving military and
security workflows
Five ways that military and security
organizations can use structured
open-source data to work faster
and smarter
Why structured open-source data?




Structured data is
Quick to search
Easy to query
Easy to manipulate




 Copyright 息 2012 IHS Inc.          2
Why structured open-source data?




                              Open-source data is
                              Verified
                              Independent
                              Unclassified




Copyright 息 2012 IHS Inc.                     3
How can it improve workflows?



     1. Threat analysis




Copyright 息 2012 IHS Inc.       4
1. Threat analysis


                             Satellite images show
                             enemy tanks gathering
                             on an airfield near the
                             border



The threat must
be assessed

 Copyright 息 2012 IHS Inc.                       5
1. Threat analysis



                                   Measure length




                            9.5m




Copyright 息 2012 IHS Inc.                           6
1. Threat analysis



                                   Measure length

                                   Measure width
         3.5m
                            9.5m




Copyright 息 2012 IHS Inc.                           7
1. Threat analysis




                            Obtain enemy land
                            warfare platform
                            inventory intelligence

Copyright 息 2012 IHS Inc.                        8
1. Threat analysis




Query structured
open-source data by
country, length and
width



 Copyright 息 2012 IHS Inc.   9
1. Threat analysis




                            Query returns only
                            platforms that meet
                            search criteria


Copyright 息 2012 IHS Inc.                   10
1. Threat analysis




Detected platforms are
identified quickly and       T-72
easily

The threat is quantified
 Copyright 息 2012 IHS Inc.          11
How can it improve workflows?



     1. Threat analysis
     2. Capability analysis




Copyright 息 2012 IHS Inc.       12
2. Capability analysis


                            Diplomacy is breaking
                            down; conflict seems
                            inevitable




Copyright 息 2012 IHS Inc.                     13
2. Capability analysis


                             Air superiority will
                             be key to success




Enemy air capability
must be assessed

 Copyright 息 2012 IHS Inc.                   14
2. Capability analysis




                            Review intelligence
                            of enemy air base
                            locations

Copyright 息 2012 IHS Inc.                   15
2. Capability analysis



                            Cross-reference with
                            equipment in service
                            and order of battle




Copyright 息 2012 IHS Inc.                   16
2. Capability analysis




Use structured open-
source data to search
ranges of air platforms
at each base

 Copyright 息 2012 IHS Inc.   17
2. Capability analysis




                            Quantify and
                            visualize enemy air
                            strike range

Copyright 息 2012 IHS Inc.                   18
How can it improve workflows?



     1. Threat analysis
     2. Capability analysis
     3. Military planning




Copyright 息 2012 IHS Inc.       19
3. Military planning




A multinational
expeditionary force
prepares to move into
enemy terrain




 Copyright 息 2012 IHS Inc.   20
3. Military planning




                3.5m




                            Imagery of a strategic
                            crossing point reveals
                            that the bridge may be
                            too narrow to cross

Copyright 息 2012 IHS Inc.                      21
3. Military planning




Filter structured open-
source data for
platforms wider than
the bridge crossing



 Copyright 息 2012 IHS Inc.   22
3. Military planning




                            Query returns
                            land platforms too
                            wide to cross



Copyright 息 2012 IHS Inc.                  23
3. Military planning




                            Need for alternative
                            routes or methods
                            identified


Copyright 息 2012 IHS Inc.                   24
4. How can it improve workflows?



     1. Threat analysis
     2. Capability analysis
     3. Military planning
     4. Logistical analysis




Copyright 息 2012 IHS Inc.          25
4. Logistical analysis



Multinational land
forces require air
transport into theatre




 Copyright 息 2012 IHS Inc.   26
4. Logistical analysis



                             Air transport capacity
                             is known


                            Dimensions of partner
                            land platforms are not




Copyright 息 2012 IHS Inc.                      27
4. Logistical analysis




Query structured open-
source land platform
data by length, width
and height


 Copyright 息 2012 IHS Inc.   28
4. Logistical analysis



                                      Sort results to identify
                                      viable platforms and
                              1.85m
                                      calculate transport
                                      loading levels



                                             6.25m
                      2.60m

Copyright 息 2012 IHS Inc.                                 29
4. Logistical analysis


Air transport capacity
for partner land
platforms is derived



                             Transportation levels
                             may be planned



 Copyright 息 2012 IHS Inc.                    30
How can it improve workflows?



     1. Threat analysis
     2. Capability analysis
     3. Military planning
     4. Logistical analysis
     5. Procurement requirements setting


Copyright 息 2012 IHS Inc.                  31
5. Procurement requirements setting



A major procurement
program is initiated




                             Capability requirements
                             must be developed

 Copyright 息 2012 IHS Inc.                      32
5. Procurement requirements setting




Review structured open-
source data for existing
equipment and technology
capabilities


 Copyright 息 2012 IHS Inc.             33
5. Procurement requirements setting


 Data output provides                                                         200                                 40




 capability baseline                                                          150                                 30




                                                                                                                       Endurance (h)
                                                                              100                                 20

                                  Max altitude


                                                                              50                                  10
Max T-O Weight                                               Payload weight



                                                                                0                             0




                                                                                    Set program capability
Endurance                                                         Max speed




                                                                                    requirements accordingly
             Loitering speed                     Datalink range



      Copyright 息 2012 IHS Inc.                                                                          34
5. Procurement requirements setting


Requirements are
benchmarked against
best in class




                              Commercial proposals
                              are easily measured

 Copyright 息 2012 IHS Inc.                     35
Conclusion


Structured open-source
data is not a replacement
for proprietary sources

                              But it is a source of reliable
                              supporting information

And, used correctly, it can
help the military user to
work faster and smarter
 Copyright 息 2012 IHS Inc.                             36
www.ihs.com




Copyright 息 2012 IHS Inc.                 37

More Related Content

Improving Military Workflows - Structured Data for Military & Security Users

  • 1. Improving military and security workflows Five ways that military and security organizations can use structured open-source data to work faster and smarter
  • 2. Why structured open-source data? Structured data is Quick to search Easy to query Easy to manipulate Copyright 息 2012 IHS Inc. 2
  • 3. Why structured open-source data? Open-source data is Verified Independent Unclassified Copyright 息 2012 IHS Inc. 3
  • 4. How can it improve workflows? 1. Threat analysis Copyright 息 2012 IHS Inc. 4
  • 5. 1. Threat analysis Satellite images show enemy tanks gathering on an airfield near the border The threat must be assessed Copyright 息 2012 IHS Inc. 5
  • 6. 1. Threat analysis Measure length 9.5m Copyright 息 2012 IHS Inc. 6
  • 7. 1. Threat analysis Measure length Measure width 3.5m 9.5m Copyright 息 2012 IHS Inc. 7
  • 8. 1. Threat analysis Obtain enemy land warfare platform inventory intelligence Copyright 息 2012 IHS Inc. 8
  • 9. 1. Threat analysis Query structured open-source data by country, length and width Copyright 息 2012 IHS Inc. 9
  • 10. 1. Threat analysis Query returns only platforms that meet search criteria Copyright 息 2012 IHS Inc. 10
  • 11. 1. Threat analysis Detected platforms are identified quickly and T-72 easily The threat is quantified Copyright 息 2012 IHS Inc. 11
  • 12. How can it improve workflows? 1. Threat analysis 2. Capability analysis Copyright 息 2012 IHS Inc. 12
  • 13. 2. Capability analysis Diplomacy is breaking down; conflict seems inevitable Copyright 息 2012 IHS Inc. 13
  • 14. 2. Capability analysis Air superiority will be key to success Enemy air capability must be assessed Copyright 息 2012 IHS Inc. 14
  • 15. 2. Capability analysis Review intelligence of enemy air base locations Copyright 息 2012 IHS Inc. 15
  • 16. 2. Capability analysis Cross-reference with equipment in service and order of battle Copyright 息 2012 IHS Inc. 16
  • 17. 2. Capability analysis Use structured open- source data to search ranges of air platforms at each base Copyright 息 2012 IHS Inc. 17
  • 18. 2. Capability analysis Quantify and visualize enemy air strike range Copyright 息 2012 IHS Inc. 18
  • 19. How can it improve workflows? 1. Threat analysis 2. Capability analysis 3. Military planning Copyright 息 2012 IHS Inc. 19
  • 20. 3. Military planning A multinational expeditionary force prepares to move into enemy terrain Copyright 息 2012 IHS Inc. 20
  • 21. 3. Military planning 3.5m Imagery of a strategic crossing point reveals that the bridge may be too narrow to cross Copyright 息 2012 IHS Inc. 21
  • 22. 3. Military planning Filter structured open- source data for platforms wider than the bridge crossing Copyright 息 2012 IHS Inc. 22
  • 23. 3. Military planning Query returns land platforms too wide to cross Copyright 息 2012 IHS Inc. 23
  • 24. 3. Military planning Need for alternative routes or methods identified Copyright 息 2012 IHS Inc. 24
  • 25. 4. How can it improve workflows? 1. Threat analysis 2. Capability analysis 3. Military planning 4. Logistical analysis Copyright 息 2012 IHS Inc. 25
  • 26. 4. Logistical analysis Multinational land forces require air transport into theatre Copyright 息 2012 IHS Inc. 26
  • 27. 4. Logistical analysis Air transport capacity is known Dimensions of partner land platforms are not Copyright 息 2012 IHS Inc. 27
  • 28. 4. Logistical analysis Query structured open- source land platform data by length, width and height Copyright 息 2012 IHS Inc. 28
  • 29. 4. Logistical analysis Sort results to identify viable platforms and 1.85m calculate transport loading levels 6.25m 2.60m Copyright 息 2012 IHS Inc. 29
  • 30. 4. Logistical analysis Air transport capacity for partner land platforms is derived Transportation levels may be planned Copyright 息 2012 IHS Inc. 30
  • 31. How can it improve workflows? 1. Threat analysis 2. Capability analysis 3. Military planning 4. Logistical analysis 5. Procurement requirements setting Copyright 息 2012 IHS Inc. 31
  • 32. 5. Procurement requirements setting A major procurement program is initiated Capability requirements must be developed Copyright 息 2012 IHS Inc. 32
  • 33. 5. Procurement requirements setting Review structured open- source data for existing equipment and technology capabilities Copyright 息 2012 IHS Inc. 33
  • 34. 5. Procurement requirements setting Data output provides 200 40 capability baseline 150 30 Endurance (h) 100 20 Max altitude 50 10 Max T-O Weight Payload weight 0 0 Set program capability Endurance Max speed requirements accordingly Loitering speed Datalink range Copyright 息 2012 IHS Inc. 34
  • 35. 5. Procurement requirements setting Requirements are benchmarked against best in class Commercial proposals are easily measured Copyright 息 2012 IHS Inc. 35
  • 36. Conclusion Structured open-source data is not a replacement for proprietary sources But it is a source of reliable supporting information And, used correctly, it can help the military user to work faster and smarter Copyright 息 2012 IHS Inc. 36