improving military workflows - structured data for military & security users
DESCRIPTION
Five ways that military and security organizations can use structured open-source data to work faster and smarter.TRANSCRIPT
Improving military and security workflowsFive ways that military and security organizations can use structured open-source data to work faster and smarter
Copyright © 2012 IHS Inc. 2
Why structured open-source data?
Structured data is Quick to searchEasy to query Easy to manipulate
Copyright © 2012 IHS Inc. 3
Why structured open-source data?
Open-source data is VerifiedIndependentUnclassified
Copyright © 2012 IHS Inc. 4
How can it improve workflows?
1. Threat analysis
Copyright © 2012 IHS Inc. 5
1. Threat analysis
Satellite images show enemy tanks gathering on an airfield near the border
The threat must be assessed
Copyright © 2012 IHS Inc. 6
1. Threat analysis
Measure length
9.5m
Copyright © 2012 IHS Inc. 7
1. Threat analysis
Measure length
9.5m
3.5m
Measure width
Copyright © 2012 IHS Inc. 8
1. Threat analysis
Obtain enemy land warfare platform inventory intelligence
Copyright © 2012 IHS Inc. 9
1. Threat analysis
Query structured open-source data by country, length and width
Copyright © 2012 IHS Inc. 10
1. Threat analysis
Query returns only platforms that meet search criteria
Copyright © 2012 IHS Inc. 11
1. Threat analysis
The threat is quantified
T-72
Detected platforms are identified quickly and easily
Copyright © 2012 IHS Inc. 12
How can it improve workflows?
1. Threat analysis
2. Capability analysis
Copyright © 2012 IHS Inc. 13
2. Capability analysis
Diplomacy is breaking down; conflict seems inevitable
Copyright © 2012 IHS Inc. 14
2. Capability analysis
Air superiority will be key to success
Enemy air capability must be assessed
Copyright © 2012 IHS Inc. 15
2. Capability analysis
Review intelligence of enemy air base locations
Copyright © 2012 IHS Inc. 16
2. Capability analysis
Cross-reference with equipment in service and order of battle
Copyright © 2012 IHS Inc. 17
2. Capability analysis
Use structured open-source data to search ranges of air platforms at each base
Copyright © 2012 IHS Inc. 18
2. Capability analysis
Quantify and visualize enemy air strike range
Copyright © 2012 IHS Inc. 19
How can it improve workflows?
1. Threat analysis
2. Capability analysis
3. Military planning
Copyright © 2012 IHS Inc. 20
3. Military planning
A multinational expeditionary force prepares to move into enemy terrain
Copyright © 2012 IHS Inc. 21
3. Military planning
Imagery of a strategic crossing point reveals that the bridge may be too narrow to cross
3.5m
Copyright © 2012 IHS Inc. 22
3. Military planning
Filter structured open-source data for platforms wider than the bridge crossing
Copyright © 2012 IHS Inc. 23
3. Military planning
Query returns land platforms too wide to cross
Copyright © 2012 IHS Inc. 24
3. Military planning
Need for alternative routes or methods identified
Copyright © 2012 IHS Inc. 25
4. How can it improve workflows?
1. Threat analysis
2. Capability analysis
3. Military planning
4. Logistical analysis
Copyright © 2012 IHS Inc. 26
4. Logistical analysis
Multinational land forces require air transport into theatre
Copyright © 2012 IHS Inc. 27
4. Logistical analysis
Air transport capacity is known
Dimensions of partner land platforms are not
Copyright © 2012 IHS Inc. 28
4. Logistical analysis
Query structured open-source land platform data by length, width and height
Copyright © 2012 IHS Inc. 29
4. Logistical analysis
Sort results to identify viable platforms and calculate transport loading levels
6.25m
1.85m
2.60m
Copyright © 2012 IHS Inc. 30
4. Logistical analysis
Air transport capacity for partner land platforms is derived
Transportation levels may be planned
Copyright © 2012 IHS Inc. 31
How can it improve workflows?
1. Threat analysis
2. Capability analysis
3. Military planning
4. Logistical analysis
5. Procurement requirements setting
Copyright © 2012 IHS Inc. 32
5. Procurement requirements setting
A major procurement program is initiated
Capability requirements must be developed
Copyright © 2012 IHS Inc. 33
5. Procurement requirements setting
Review structured open-source data for existing equipment and technology capabilities
Copyright © 2012 IHS Inc. 34
5. Procurement requirements setting
Data output provides capability baseline
Set program capability requirements accordingly
Endu
rance (h
)
0
50
200
100
150
0
10
20
30
40
Datalink range
Endurance
Payload weight
Max altitude
Max T-O Weight
Max speed
Loitering speed
Copyright © 2012 IHS Inc. 35
5. Procurement requirements setting
Commercial proposals are easily measured
Requirements are benchmarked against best in class
Copyright © 2012 IHS Inc. 36
Conclusion
Structured open-source data is not a replacement for proprietary sources
But it is a source of reliable supporting information
And, used correctly, it can help the military user to work faster and smarter