Improving Military Workflows - Structured Data for Military & Security Users

Preview:

DESCRIPTION

Five ways that military and security organizations can use structured open-source data to work faster and smarter.

Citation preview

Improving military and security workflowsFive ways that military and security organizations can use structured open-source data to work faster and smarter

Copyright © 2012 IHS Inc. 2

Why structured open-source data?

Structured data is Quick to searchEasy to query Easy to manipulate

Copyright © 2012 IHS Inc. 3

Why structured open-source data?

Open-source data is VerifiedIndependentUnclassified

Copyright © 2012 IHS Inc. 4

How can it improve workflows?

1. Threat analysis

Copyright © 2012 IHS Inc. 5

1. Threat analysis

Satellite images show enemy tanks gathering on an airfield near the border

The threat must be assessed

Copyright © 2012 IHS Inc. 6

1. Threat analysis

Measure length

9.5m

Copyright © 2012 IHS Inc. 7

1. Threat analysis

Measure length

9.5m

3.5m

Measure width

Copyright © 2012 IHS Inc. 8

1. Threat analysis

Obtain enemy land warfare platform inventory intelligence

Copyright © 2012 IHS Inc. 9

1. Threat analysis

Query structured open-source data by country, length and width

Copyright © 2012 IHS Inc. 10

1. Threat analysis

Query returns only platforms that meet search criteria

Copyright © 2012 IHS Inc. 11

1. Threat analysis

The threat is quantified

T-72

Detected platforms are identified quickly and easily

Copyright © 2012 IHS Inc. 12

How can it improve workflows?

1. Threat analysis

2. Capability analysis

Copyright © 2012 IHS Inc. 13

2. Capability analysis

Diplomacy is breaking down; conflict seems inevitable

Copyright © 2012 IHS Inc. 14

2. Capability analysis

Air superiority will be key to success

Enemy air capability must be assessed

Copyright © 2012 IHS Inc. 15

2. Capability analysis

Review intelligence of enemy air base locations

Copyright © 2012 IHS Inc. 16

2. Capability analysis

Cross-reference with equipment in service and order of battle

Copyright © 2012 IHS Inc. 17

2. Capability analysis

Use structured open-source data to search ranges of air platforms at each base

Copyright © 2012 IHS Inc. 18

2. Capability analysis

Quantify and visualize enemy air strike range

Copyright © 2012 IHS Inc. 19

How can it improve workflows?

1. Threat analysis

2. Capability analysis

3. Military planning

Copyright © 2012 IHS Inc. 20

3. Military planning

A multinational expeditionary force prepares to move into enemy terrain

Copyright © 2012 IHS Inc. 21

3. Military planning

Imagery of a strategic crossing point reveals that the bridge may be too narrow to cross

3.5m

Copyright © 2012 IHS Inc. 22

3. Military planning

Filter structured open-source data for platforms wider than the bridge crossing

Copyright © 2012 IHS Inc. 23

3. Military planning

Query returns land platforms too wide to cross

Copyright © 2012 IHS Inc. 24

3. Military planning

Need for alternative routes or methods identified

Copyright © 2012 IHS Inc. 25

4. How can it improve workflows?

1. Threat analysis

2. Capability analysis

3. Military planning

4. Logistical analysis

Copyright © 2012 IHS Inc. 26

4. Logistical analysis

Multinational land forces require air transport into theatre

Copyright © 2012 IHS Inc. 27

4. Logistical analysis

Air transport capacity is known

Dimensions of partner land platforms are not

Copyright © 2012 IHS Inc. 28

4. Logistical analysis

Query structured open-source land platform data by length, width and height

Copyright © 2012 IHS Inc. 29

4. Logistical analysis

Sort results to identify viable platforms and calculate transport loading levels

6.25m

1.85m

2.60m

Copyright © 2012 IHS Inc. 30

4. Logistical analysis

Air transport capacity for partner land platforms is derived

Transportation levels may be planned

Copyright © 2012 IHS Inc. 31

How can it improve workflows?

1. Threat analysis

2. Capability analysis

3. Military planning

4. Logistical analysis

5. Procurement requirements setting

Copyright © 2012 IHS Inc. 32

5. Procurement requirements setting

A major procurement program is initiated

Capability requirements must be developed

Copyright © 2012 IHS Inc. 33

5. Procurement requirements setting

Review structured open-source data for existing equipment and technology capabilities

Copyright © 2012 IHS Inc. 34

5. Procurement requirements setting

Data output provides capability baseline

Set program capability requirements accordingly

Endu

rance (h

)

0

50

200

100

150

0

10

20

30

40

Datalink range

Endurance

Payload weight

Max altitude

Max T-O Weight

Max speed

Loitering speed

Copyright © 2012 IHS Inc. 35

5. Procurement requirements setting

Commercial proposals are easily measured

Requirements are benchmarked against best in class

Copyright © 2012 IHS Inc. 36

Conclusion

Structured open-source data is not a replacement for proprietary sources

But it is a source of reliable supporting information

And, used correctly, it can help the military user to work faster and smarter

Copyright © 2012 IHS Inc. 37

www.ihs.com

Recommended