SlideShare a Scribd company logo
1 of 20
Michael Donaghey [email_address] www.cids.us 1-888-709-CIDS (2437)
“ Between 2001 and 2015 we will see a 70,000% increase in the areas under surveillance—all captured in motion video intelligence—yielding Yottabytes of video data.”  - The Economist, 27 Feb 2010 NGA is currently storing over 20 million minutes of motion imagery
The Need Cognika Provides “Automated” PED Now! "The Army's ability to collect information far outpaces its ability to use the information collected"  --‐  Lt Gen Richard P. Zahner "We don't have enough time to discover data anymore. Especially when we are putting wide-area surveillance into country rapidly right now. We have to increase discover ability. We have to allow that analyst sitting on the ground looking at this massive amount of data, he or she does not have time to sift through all this stuff." --‐ Gen. Koziol "Today an analyst sits there and stares at Death TV for hours on end trying to find the single target or see something move or see something do something that makes it a valid target. It is just a waste of manpower. It is inefficient."  --‐ Gen. Cartwright "Analysts spend 80% of their time researching, and only 20% of their time actually thinking about what that research means. Analysts need more time thinking and less time sifting"  --‐ Gen. Vincent Stewart "We're not going to manpower our way out of this, we desperately need more automated tools."  --‐ Maj Gen James Poss “ Not Enough Eyeballs, Not Enough Pipes, Not Enough Disks”
Projected Personnel Requirements ,[object Object],[object Object],[object Object],Cognika Provides “Automated” PED Now! Source: National Geo-spatial Intelligence Agency  “ NGA's Initiatives to Improve Motion Imagery Usage” [27-28]  17 November 2010 PED: Processing, Exploitation, Dissemination
Solution   Find, Analyze, and View All Data Sets audio video radar
Automated Approach  Searches, Analyzes and Utilizes ALL Types of Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Manage Information,  Not Drown in it
Cognika Solution ,[object Object],[object Object],[object Object],[object Object],[object Object]
Powerful Toolkit for Querying and Interpretation Object   Identification (White SUV) Activity (Men Digging) Metadata (Time, Location, Etc) Flexible Customizable System
[object Object],[object Object],[object Object],[object Object],Extracting and Analyzing Content For All Available Data Files
Automated Usage of Real Time IED Intel  IED/Bomb is detonated All intelligence is gathered, including images of the bomb and detonation device CIDS Software Tool is run on all images and known data Results reveal similarities among previously catalogued bomb intelligence Bomb makers at location and their  signature devices  are highlighted by CIDS Software – Including Spatio-Temporal Reasoning
Connect the Dots Before the Blast Search by Device Part Numbers (Link to similar known devices)  Search by Image Search by Attribute(s) Discovery at Cargo Screening Linked to Catalogued Bomb Making Devices Devices Linked to Known Bomb Maker
Real-Time Alerts Email/Text  Intercept Call Intercept HUMINT UAV Video Forensic Analysis Intelligence Assessments REAL TIME Alerts and Analysis Utilizing all INT
Man Walking Man Walking With Weapon Activity Detection   Within Real Time Video CIDS can discern between men walking and men walking with weapon. Robust system which limits rate of false positives
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Key System Features
The System Training:  Query for ‘Men Gathering’ ,[object Object],[object Object],[object Object],[object Object],Men Gathering AND Ramadi/Baquba
System Usage Men AND Truck Man AND Weapon Men Gathering Men Gathering AND Ramadi/Baquba Men Gathering Ramadi, Al-Anbar Province 08/22/11  22:04:13 – 22:05:09 Five unidentified men leaving building, walking down street. Note: Known Bomb Maker at Location    Man AND Weapon Ramadi, Al-Anbar Province 08/09/11  02:48:18 - 03:52:42 Unidentified man walking down street Note: Man Digging and Weapon   Men AND Truck Baquba, Diyala Province 07/28/11  23:38:04 - 23:39:19 Five unidentified men walking, enter vehicle Note: Vehicle of Interest   Tracked to Location Geo-location Intel Reports Imagery Video News
Activity Timeline  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Activity Timeline Screen Shot
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Summary of Capabilities
Attack the Network CIDS puts the power of the information in the hands of the ANALYST ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],cids@cognika.com  www.cids.us

More Related Content

Similar to Cognika Technology Briefing

ICU WORKBENCH - The Art of Where
ICU WORKBENCH - The Art of WhereICU WORKBENCH - The Art of Where
ICU WORKBENCH - The Art of WhereG2 Research Ltd.
 
Realtime Big Data Analytics for Event Detection in Highways
Realtime Big Data Analytics for Event Detection in HighwaysRealtime Big Data Analytics for Event Detection in Highways
Realtime Big Data Analytics for Event Detection in HighwaysYork University
 
Comparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction ToolsComparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction Toolsijtsrd
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleSai Janakiram Penumuru
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonCisco DevNet
 
MCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformMCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformSean Ben
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligenceabhisheksinghcs
 
A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniquesijtsrd
 
Next Century Project Overview
Next Century Project OverviewNext Century Project Overview
Next Century Project Overviewjennhunter
 
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimThree mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimDaeyoung Kim
 
Big data - What is It?
Big data - What is It?Big data - What is It?
Big data - What is It?Nicole Aidney
 
Csec 650 individual assignment i
Csec 650 individual assignment iCsec 650 individual assignment i
Csec 650 individual assignment iDominique Briscoe
 
Why Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringWhy Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringDevOps.com
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and ChallengesAhmed Banafa
 
Mimos indoor location platform 2 feb2017
Mimos indoor location platform 2 feb2017Mimos indoor location platform 2 feb2017
Mimos indoor location platform 2 feb2017David Chieng
 
MBA-TU-Thailand:BigData for business startup.
MBA-TU-Thailand:BigData for business startup.MBA-TU-Thailand:BigData for business startup.
MBA-TU-Thailand:BigData for business startup.stelligence
 

Similar to Cognika Technology Briefing (20)

ICU WORKBENCH - The Art of Where
ICU WORKBENCH - The Art of WhereICU WORKBENCH - The Art of Where
ICU WORKBENCH - The Art of Where
 
icuWorkbench - Use cases
icuWorkbench - Use casesicuWorkbench - Use cases
icuWorkbench - Use cases
 
Realtime Big Data Analytics for Event Detection in Highways
Realtime Big Data Analytics for Event Detection in HighwaysRealtime Big Data Analytics for Event Detection in Highways
Realtime Big Data Analytics for Event Detection in Highways
 
Guru_poster
Guru_posterGuru_poster
Guru_poster
 
Comparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction ToolsComparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction Tools
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with Oracle
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
 
IOT Forensics
IOT ForensicsIOT Forensics
IOT Forensics
 
MCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformMCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence Platform
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligence
 
A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniques
 
Big data
Big dataBig data
Big data
 
Next Century Project Overview
Next Century Project OverviewNext Century Project Overview
Next Century Project Overview
 
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimThree mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
 
Big data - What is It?
Big data - What is It?Big data - What is It?
Big data - What is It?
 
Csec 650 individual assignment i
Csec 650 individual assignment iCsec 650 individual assignment i
Csec 650 individual assignment i
 
Why Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringWhy Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network Monitoring
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and Challenges
 
Mimos indoor location platform 2 feb2017
Mimos indoor location platform 2 feb2017Mimos indoor location platform 2 feb2017
Mimos indoor location platform 2 feb2017
 
MBA-TU-Thailand:BigData for business startup.
MBA-TU-Thailand:BigData for business startup.MBA-TU-Thailand:BigData for business startup.
MBA-TU-Thailand:BigData for business startup.
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Cognika Technology Briefing

  • 1. Michael Donaghey [email_address] www.cids.us 1-888-709-CIDS (2437)
  • 2. “ Between 2001 and 2015 we will see a 70,000% increase in the areas under surveillance—all captured in motion video intelligence—yielding Yottabytes of video data.” - The Economist, 27 Feb 2010 NGA is currently storing over 20 million minutes of motion imagery
  • 3. The Need Cognika Provides “Automated” PED Now! "The Army's ability to collect information far outpaces its ability to use the information collected" --‐ Lt Gen Richard P. Zahner "We don't have enough time to discover data anymore. Especially when we are putting wide-area surveillance into country rapidly right now. We have to increase discover ability. We have to allow that analyst sitting on the ground looking at this massive amount of data, he or she does not have time to sift through all this stuff." --‐ Gen. Koziol "Today an analyst sits there and stares at Death TV for hours on end trying to find the single target or see something move or see something do something that makes it a valid target. It is just a waste of manpower. It is inefficient." --‐ Gen. Cartwright "Analysts spend 80% of their time researching, and only 20% of their time actually thinking about what that research means. Analysts need more time thinking and less time sifting" --‐ Gen. Vincent Stewart "We're not going to manpower our way out of this, we desperately need more automated tools." --‐ Maj Gen James Poss “ Not Enough Eyeballs, Not Enough Pipes, Not Enough Disks”
  • 4.
  • 5. Solution Find, Analyze, and View All Data Sets audio video radar
  • 6.
  • 7.
  • 8. Powerful Toolkit for Querying and Interpretation Object Identification (White SUV) Activity (Men Digging) Metadata (Time, Location, Etc) Flexible Customizable System
  • 9.
  • 10. Automated Usage of Real Time IED Intel IED/Bomb is detonated All intelligence is gathered, including images of the bomb and detonation device CIDS Software Tool is run on all images and known data Results reveal similarities among previously catalogued bomb intelligence Bomb makers at location and their signature devices are highlighted by CIDS Software – Including Spatio-Temporal Reasoning
  • 11. Connect the Dots Before the Blast Search by Device Part Numbers (Link to similar known devices) Search by Image Search by Attribute(s) Discovery at Cargo Screening Linked to Catalogued Bomb Making Devices Devices Linked to Known Bomb Maker
  • 12. Real-Time Alerts Email/Text Intercept Call Intercept HUMINT UAV Video Forensic Analysis Intelligence Assessments REAL TIME Alerts and Analysis Utilizing all INT
  • 13. Man Walking Man Walking With Weapon Activity Detection Within Real Time Video CIDS can discern between men walking and men walking with weapon. Robust system which limits rate of false positives
  • 14.
  • 15.
  • 16. System Usage Men AND Truck Man AND Weapon Men Gathering Men Gathering AND Ramadi/Baquba Men Gathering Ramadi, Al-Anbar Province 08/22/11 22:04:13 – 22:05:09 Five unidentified men leaving building, walking down street. Note: Known Bomb Maker at Location   Man AND Weapon Ramadi, Al-Anbar Province 08/09/11 02:48:18 - 03:52:42 Unidentified man walking down street Note: Man Digging and Weapon   Men AND Truck Baquba, Diyala Province 07/28/11 23:38:04 - 23:39:19 Five unidentified men walking, enter vehicle Note: Vehicle of Interest Tracked to Location Geo-location Intel Reports Imagery Video News
  • 17.
  • 19.
  • 20.

Editor's Notes

  1. We are here today to introduce you to a powerful new software application that uses a mature technology to assist the Analyst with PED.
  2. There are massive quantities of information acquired and stored from a myriad of sensors. It is nearly impossible for the Analyst to review it all. Quantity of data is expected to increase exponentially in the next few years. The Mission Requires an Automated Tool.
  3. Based on data given by NGA it is impossible for the Analyst to keep up with the data available. Additionally it will be cost prohibitive to the Government to hire every Analyst required to conduct the PED of all the information that is now and becoming available.
  4. Our systems finds, analyzes and presents real-time disparate data. CIDS real time output provides intel to the tactical edge.
  5. CIDS allows user to see key differentiators. I.E. Weapon.
  6. Using the CIDS software the Analyst can conduct PED against all of the available information allowing forces to be brought against the Network.