improving military workflows - structured data for military & security users

37
Improving military and security workflows Five ways that military and security organizations can use structured open-source data to work faster and smarter

Upload: ihs-inc

Post on 09-May-2015

1.487 views

Category:

News & Politics


0 download

DESCRIPTION

Five ways that military and security organizations can use structured open-source data to work faster and smarter.

TRANSCRIPT

Page 1: Improving Military Workflows - Structured Data for Military & Security Users

Improving military and security workflowsFive ways that military and security organizations can use structured open-source data to work faster and smarter

Page 2: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 2

Why structured open-source data?

Structured data is Quick to searchEasy to query Easy to manipulate

Page 3: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 3

Why structured open-source data?

Open-source data is VerifiedIndependentUnclassified

Page 4: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 4

How can it improve workflows?

1. Threat analysis

Page 5: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 5

1. Threat analysis

Satellite images show enemy tanks gathering on an airfield near the border

The threat must be assessed

Page 6: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 6

1. Threat analysis

Measure length

9.5m

Page 7: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 7

1. Threat analysis

Measure length

9.5m

3.5m

Measure width

Page 8: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 8

1. Threat analysis

Obtain enemy land warfare platform inventory intelligence

Page 9: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 9

1. Threat analysis

Query structured open-source data by country, length and width

Page 10: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 10

1. Threat analysis

Query returns only platforms that meet search criteria

Page 11: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 11

1. Threat analysis

The threat is quantified

T-72

Detected platforms are identified quickly and easily

Page 12: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 12

How can it improve workflows?

1. Threat analysis

2. Capability analysis

Page 13: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 13

2. Capability analysis

Diplomacy is breaking down; conflict seems inevitable

Page 14: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 14

2. Capability analysis

Air superiority will be key to success

Enemy air capability must be assessed

Page 15: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 15

2. Capability analysis

Review intelligence of enemy air base locations

Page 16: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 16

2. Capability analysis

Cross-reference with equipment in service and order of battle

Page 17: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 17

2. Capability analysis

Use structured open-source data to search ranges of air platforms at each base

Page 18: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 18

2. Capability analysis

Quantify and visualize enemy air strike range

Page 19: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 19

How can it improve workflows?

1. Threat analysis

2. Capability analysis

3. Military planning

Page 20: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 20

3. Military planning

A multinational expeditionary force prepares to move into enemy terrain

Page 21: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 21

3. Military planning

Imagery of a strategic crossing point reveals that the bridge may be too narrow to cross

3.5m

Page 22: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 22

3. Military planning

Filter structured open-source data for platforms wider than the bridge crossing

Page 23: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 23

3. Military planning

Query returns land platforms too wide to cross

Page 24: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 24

3. Military planning

Need for alternative routes or methods identified

Page 25: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 25

4. How can it improve workflows?

1. Threat analysis

2. Capability analysis

3. Military planning

4. Logistical analysis

Page 26: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 26

4. Logistical analysis

Multinational land forces require air transport into theatre

Page 27: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 27

4. Logistical analysis

Air transport capacity is known

Dimensions of partner land platforms are not

Page 28: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 28

4. Logistical analysis

Query structured open-source land platform data by length, width and height

Page 29: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 29

4. Logistical analysis

Sort results to identify viable platforms and calculate transport loading levels

6.25m

1.85m

2.60m

Page 30: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 30

4. Logistical analysis

Air transport capacity for partner land platforms is derived

Transportation levels may be planned

Page 31: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 31

How can it improve workflows?

1. Threat analysis

2. Capability analysis

3. Military planning

4. Logistical analysis

5. Procurement requirements setting

Page 32: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 32

5. Procurement requirements setting

A major procurement program is initiated

Capability requirements must be developed

Page 33: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 33

5. Procurement requirements setting

Review structured open-source data for existing equipment and technology capabilities

Page 34: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 34

5. Procurement requirements setting

Data output provides capability baseline

Set program capability requirements accordingly

Endu

rance (h

)

0

50

200

100

150

0

10

20

30

40

Datalink range

Endurance

Payload weight

Max altitude

Max T-O Weight

Max speed

Loitering speed

Page 35: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 35

5. Procurement requirements setting

Commercial proposals are easily measured

Requirements are benchmarked against best in class

Page 36: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 36

Conclusion

Structured open-source data is not a replacement for proprietary sources

But it is a source of reliable supporting information

And, used correctly, it can help the military user to work faster and smarter

Page 37: Improving Military Workflows - Structured Data for Military & Security Users

Copyright © 2012 IHS Inc. 37

www.ihs.com