SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
A Briefing               Data Surge and Automated Analysis:
    from GBC:
    Industry Insights
                             The Latest ISR Challenge
    January 2012             Over the past decade, the United States government has spent hundreds of
                             billions of dollars to improve its ability to collect intelligence. The sheer amount
                             and ever-increasing sophistication of information have overwhelmed analysis
                             systems and processes.
                             Data from sources as varied as unmanned aerial vehicles, surveillance video and online
                             chat result in a flood of information so vast that only a fraction of it can be analyzed. The
                             Intelligence, Surveillance and Reconnaissance (ISR) community must develop capabilities to
                             analyze intelligence at an unprecedented speed and capacity.
                             Thousands of unmanned aerial vehicles now collect intelligence, up from fewer than 50
                             a decade ago. Airborne sensors now track dozens of targets simultaneously. UAVs feed
                             full-motion video directly to front-line troops. Automated systems suction emails, chats and
                             Twitter feeds continuously from the ether, forming constellations of sensors and sensor
                             networks.



“
We simply haven’t had
the scalable storage
capacity or the Big Data
                             U.S. technology has conquered the problem of collection, but has created massive problems
                             related to storing and analyzing data, and to disseminating useful intelligence, according to
                             MG(R) John M. Custer, former commander of the Army Intelligence Center, current director
                             of federal strategic missions and programs at EMC Corporation.

analytic tools to fuse       “How do you harvest chat, or Twitter, or Facebook, or full motion video?” Custer asked in an
                             interview. Though Google and the age of the search engine solved the problem of navigating
pedabytes of data into
                             the infinite universe of the text Internet, there still remains to be a similar mechanism for
actionable intelligence,     rich media—audio, video and images. How can such vast data troves be stored, transmitted
in real-time.                and analyzed?
- MG(R) John M. Custer       “We don’t have the analytic tools or the storage capability” needed to turn the all of the data
CENTCOM J2 2003-08           into actionable intelligence”, warns Custer. Fixing that—in a cost-efficient manner—is the



                         ”
                             next step in the intelligence, surveillance and reconnaissance revolution.


                             A Big Data Dilemma
                             The enormous volume of data flooding into intelligence databases has a name: Big Data.
                             “The real problem is Big Data,” Custer said. It’s easy to collect, but traditional storage
                             and database management cannot handle the flow. “Storage has to scale to infinity,”
                             Custer said. And to yield useful intelligence, data must be ingested by databases and
                             examined by algorithms in real time, he said. Anything less results in stale data, which
                             defeats the purpose.
                             Pulling crucial bits of intelligence from the data deluge has produced a new analogy: “It’s
                             no longer about looking for a needle in a haystack, now it’s looking for the silver needle
in a stack of silver needles, says Custer.” The value of a single event—a video clip or a chat
                          keyword—has increased. In response, the intelligence community must collect more data of
                          increased quantity and sophistication.


                          Sophisticated Sensors in Air, Space and Undersea
                          Collecting terabytes of data has become routine for military and civilian intelligence services,
                          propelled by recent wars and technological advances.
                          The wars in Iraq and Afghanistan made unmanned aerial vehicles the kings of ISR collection.



“
                          UAVs have flown more than 1 million combat hours since 2001. Spending on UAVs exploded
                          from less than $300 million in 2002 to more than $4 billion in 2011, and the military plans to
Collecting terabytes      keep buying, according to a long-range aircraft procurement plan the Pentagon published in
of data has               March 2011. Meanwhile, military technologies are advancing.

become routine for        UAV maker AeroVironment demonstrated its Nano Hummingbird In February 2011, which flies
                          by flapping 3.25-inch wings, and spies with a miniature video camera. The whole thing weighs
military and civilian
                          two-thirds of an ounce – battery and camera included. The Air Force Research Lab is working
intelligence, propelled   on an even smaller dragonfly-size UAV.
by recent wards
                          A 302-foot-long, unmanned Long Endurance Multi-intelligence Vehicle–LEMV–is scheduled
and technological         for delivery to the Army in Afghanistan in 2012. It is designed to loiter at 10,000 feet for 21
advances.                 days at a time, keeping watch with 2,750 pounds of radars, full-motion video and signals



                  ”
                          interception gear.
                          The Air Force plans an even larger airship. Its 450-foot-long Integrated Sensor Is Structure
                          craft–ISIS–is to have one giant radar for tracking vehicles and dismounted troops, and a second
                          radar for spotting cruise missiles and other airborne threats. Helium-filled and solar-powered,
                          ISIS is intended to fly at 65,000 feet and remain aloft for a year or more at a time.
                          At $1 billion or more apiece, satellites remain the most costly of U.S. ISR platforms, the
                          Congressional Research Service reports. So work continues on a class of simpler, cheaper,
                          “Operationally Responsive Space,” satellites that can be warehoused and kept ready for launch
                          on short notice.
                          The first ORS satellite, launched June 29 and declared operational Sept. 28, 2011, uses a
                          multispectral SYERS-2 reconnaissance sensor to provide “battlespace awareness” to the U.S.
                          Central Command, according to sensor manufacturer Goodrich Corp.
                          As UAVs multiply in the skies, UUVs–unmanned undersea vehicles–take on ISR missions
                          underwater. The Navy’s ISR roadmap calls for building a fleet of UUVs by the end of the decade.
                          They could be used to monitor the movements of drug smugglers in the Caribbean and track
                          adversary warships around the world. Three were deployed in the Gulf of Mexico in 2010 and
                          transmitted back volumes of data on the plume of oil gushing from BP’s blown-out well.
                          The military intelligence community has devised sophisticated methods for data collection,
                          while technologies available to civilian users has expanded, also.


                          Civilian and Social Sensors
                          The proliferation of social media has opened another vast realm in which the intelligence
                          community must focus attention. Chats, blogs, Twitter, YouTube and social networking sites
                          often are sprinkled with important intelligence. The problem is finding actionable points in the
                          tsunami of data.
In July 2011, DARPA launched its Social Media in Strategic Communication program, offering
                       $42 million for “automated and semi-automated operator support tools and techniques for the
                       systematic and methodical use of social media” to detect and track the spread of ideological
                       movements, misinformation and persuasion campaigns to identify participants, and to launch
                       counter operations.
                       A DARPA-issued broad area announcement described these social media tools as “heavily
                       dependent on chance”, and urged the ISR community to no longer rely on “a combination of
                       luck and unsophisticated manual methods.”
                       The Intelligence Advanced Research Project Agency (IARPA) has a similar effort underway. In
                       August 2011, IARPA announced its Open Source Indicators program to develop technology
                       that will continuously and automatically analyze “publicly available data, such as web search
                       queries, blogs, micro-blogs, internet traffic, financial markets, traffic webcams, Wikipedia edits,
                       and many others.” With automated analysis, IARPA hopes to detect developing political and
                       humanitarian crises, riots, mass migrations, disease outbreaks and economic instability.
                       A similar push for automation is underway for the closed-circuit television systems (CCTV)
                       used increasingly for homeland security. CCTV is being fused with biometrics and human
                       behavioral signature recognition technology to create automated systems for spotting threats,
                       the Homeland Security Research Corporation reported earlier this year. In the United Kingdom,
                       already 1.85 million CCTV cameras monitor civilian movements—or one for every 32 UK
                       citizens.


“
We are swimming in
sensors and drowning
in data.
                       The Homeland Security Research Corp. predicts a $3.2 billion global market for smart CCTV
                       systems by 2016. But CCTV systems without automated analysis cannot provide reliable real-
                       time warnings, the research and consulting firm said.
                       The massive increase in military intelligence collection is mirrored in federal civilian agencies.
- Regina Dugan         The Department of Homeland Security (DHS), the FBI and state and local agencies have
Director, DARPA        established 72 fusion centers that receive, analyze and share intelligence. And like the military,



                  ”
                       the civilian sector is awash in data that pours in from law enforcement, public safety and
                       emergency response agencies, plus the private sector.


                       The Automation Ambition
                       “We are swimming in sensors and drowning in data,” said Regina Dugan, director of the
                       Defense Advanced Research Projects Agency. For many intelligence experts, better automated
                       analysis technology is the top ISR priority. According to a report by the Defense Science Board
                       earlier this year, algorithms that can discover useful intelligence in the surfeit of collected data
                       would allow analysts “to perform real analysis rather than exhausting themselves culling raw
                       data.” Science and technology created the problem and now must solve it.
                       DARPA director Regina Dugan spelled out the case for automated analysis this way to Congress
                       during a March hearing: To detect dismounted fighters in Afghanistan requires collecting and
                       processing about 100,000 times more data than it takes to detect a strategic bomber.
                       “One of two things must happen,” she said. “Either we must give up the target set [of
                       dismounted fighters], or we must deal with the data volume. Obviously, we do not want to
                       give up the target set. The only choice before us, therefore, is to develop capabilities that
                       dramatically improve our ability to manage and use the data.”
In part, it’s a problem that’s solving itself, she said. “Empirical results suggest that better
                                 sensors give us better data. More and better data leads to better automation. Better
                                 automation enables better analysis.” The millions of hours of video and the endless stream of
                                 tweets and email are unstructured data that must be quickly analyzed and transformed into
                                 usable intelligence.




“
Collaboration across state,
local, and federal partners to
                                 Piecemeal in Approach
                                 Project by project, the ISR community is working to develop automated techniques.
                                 The Army is tackling a facet of the problem with a Federated Universal Synchronization
                                 Engine – FUSE. The system pulls together intelligence from multiple sources – video, synthetic
‘connect the dots’ to prevent
                                 aperture radar and a moving target indicator, for example – and presents it together on one
and deter threats remains a
                                 viewing screen.
challenge.
                                 FUSE is intended to quickly integrate perishable intelligence such as the locations of moving
- Dept. of Homeland Security
                                 targets, the Army said during tests last spring. It was developed after the Army discovered that



                          ”
                                 UAV operators did not have the technology needed to fuse intelligence from multiple sources
                                 into a single operational picture. The system is expected to be ready for deployment in 2012.
                                 The Navy Research Lab has already demonstrated how automation can tackle one part of the
                                 information overload problem. An airborne, wide-area surveillance sensor and a high-resolution
                                 narrow field-of-view sensor, worked together in 2010 without human intervention, to spot, track
                                 and identify vehicle-size and some human-size targets on the ground in real-time.
                                 DARPA has launched an ambitious program, Insight, to build an ISR “exploitation and resource
                                 management system” that integrates human reasoning and machine analysis of intelligence.
                                 The system must be able to sort through all types of ISR data in real-time, according to DARPA–
                                 video shot by drones, signals collected by ground-based sensors, information reported by
                                 soldiers, even intercepted text messages.
                                 Insight would use automated techniques such as behavior modeling, threat network analysis
                                 and anomaly detection to comb through raw data and discover useful intelligence.


                                 “Little ‘True Fusion’”
                                 The proliferation of military and civilian sensors creates complex, structured and unstructured
                                 data, all of which the ISR community must store, transport and analyze to turn data into
                                 intelligence.
                                 Years after the September 11, 2001 terrorist attacks, “little ‘true fusion,’ or analysis of disparate
                                 data sources, identification of intelligence gaps and pro-active collection of intelligence” is
                                 occurring, the Congressional Research Service reported. The fusion centers are swamped, and
                                 DHS is aware of the problem.
                                 “Collaboration across state, local, and federal partners to ‘connect the dots’ to prevent and
                                 deter threats remains a challenge,” the DHS inspector general wrote last year. The fusion
                                 centers need more effective information sharing IT systems, he said.


                                 Enterprise Solutions for Cost-Savings
                                 “You have to be smarter about how you manage your infrastructure,” said Dawn Meyerriecks,
                                 Deputy Director of National Intelligence Acquisition and Technology in an interview with the
                                 Geospatial Intelligence Forum.
“  Technologies can address
   conundrums like Big Data,
   storage and analytics,
                                       In the Defense Department, combining ISR data is the job of the Defense Intelligence Information
                                       Enterprise, or DI2E, and other virtualization efforts. Envisioned as a common military-wide framework,
                                       DI2E would rely heavily on cloud computing to provide intelligence analysts with access to hundreds
                                       of scattered databases and exploitation tools to make storing, finding, retrieving, analyzing and
   but as you decrease                 disseminating ISR data faster and easier.
   boots on the ground                 Parts of DI2E already exist, said Custer, the former Army Intelligence Center commander. The Army
   and the intelligence that           “already has a cloud – they’re using it today in Afghanistan,” he said. “DI2E will bring the Air Force and
   connotes, you need more             Navy” and military intelligence entities such as the National Geospatial-Intelligence Agency into the
   systems that provide                same cloud, he said. The military and intelligence community can “save huge money” by moving to the
                                       cloud, as DI2E proposes, relying more on virtualization and data center consolidation.
   indications and warning.
                                       For the Office of the Director of National Intelligence, “cloud computing and all the technologies that
   -MG(R) John M. Custer
                                       come with that are big players,” said Meyerriecks. “Network and content staging innovations, peer to


                             ”
                                       peer, and proxy caching are among the things that are happening.”


                                       Risks in Reductions
About EMC     TM
                                       U.S. annual spending on intelligence now tops $80 billion a year, more than double the amount spent
EMC Corporation is a global leader     in 2001, according to the Pentagon. But budgets cuts are expected.
in enabling the Federal Government
to transform its operations and        “We’ve had ten years of steady increases. Now we’re going to have to tighten our belts,” U.S. Army
deliver IT as a service. Fundamental
to this transformation is cloud
                                       General (R) David Petraeus told a joint hearing of the House and Senate intelligence committees Sept.
computing. Through innovative          13, 2011. As the senior commander in the Iraq and Afghanistan wars, Petraeus was the beneficiary of
products and services, delivered       extraordinary ISR improvements. Now, as the director of the Central Intelligence Agency, Mr. Petraeus
in partnership with leading
Government Contractors and             may have to decide which ISR technologies he can do without.
Federal Systems Integrators, EMC
                                       Coming budget cuts are likely to impose discipline of their own. Not all ISR programs that exist
accelerates the journey to cloud
computing, helping Federal IT          today will survive the spending downturn, Director of National Intelligence James Clapper told the
departments to store, manage,          Intelligence Committees. Nor should they. “I think we have to be rather cold-hearted and objective
protect, and analyze their most
valuable asset–information–in
                                       about the real contribution the various systems make,” he said. But at the same time, “we must try to
a more agile, trusted, and             sustain healthy R&D for the future.”
cost-efficient way. Additional
information about EMC can be           Even as the government decides which programs and force structures to cut, agencies must be
found at www.emc.com/federal           judicious with ISR capabilities, Custer cautioned. Indications and warnings that offer situational
                                       awareness are essential, particularly as cost-reduction efforts reduce the volume of ground troops.
                                       According to Custer, “technologies can address conundrums like Big Data, storage and analytics, but
About the Government                   as you decrease boots on the ground and the intelligence that connotes, you need more systems that
Business Council: Industry             that provide indications and warning.”
Insights
GBC: INDUSTRY INSIGHTS,
a division of the Government           William Matthews is the author of this report, with Erin Dian Dumbacher, editor.
Business Council and Government
Executive Media Group, is
dedicated to advancing the
business of government through
analysis and insight. GBC:
INDUSTRY INSIGHTS partners
with industry to share best
practices with top government
decision-makers, understanding
the deep value inherent in
industry’s experience engaging
and supporting federal agencies.
Contact Bryan Klopack, Director,
at bklopack@govexec.com.

Weitere ähnliche Inhalte

Andere mochten auch

Las comunidades de aprendizaje
Las comunidades de aprendizajeLas comunidades de aprendizaje
Las comunidades de aprendizaje
Ezequiel-Tarazona
 
Pizza Point Of Sale System - SpeedLine Overview
Pizza Point Of Sale System - SpeedLine OverviewPizza Point Of Sale System - SpeedLine Overview
Pizza Point Of Sale System - SpeedLine Overview
carmensadie
 
Ley de-marcas-y-otros-signos-distintivos
Ley de-marcas-y-otros-signos-distintivosLey de-marcas-y-otros-signos-distintivos
Ley de-marcas-y-otros-signos-distintivos
Save Solutions
 

Andere mochten auch (16)

EL MALPARIDO -NOVELA EN VERSIÓN DIGITAL GRATUITA-
EL MALPARIDO -NOVELA EN VERSIÓN DIGITAL GRATUITA-EL MALPARIDO -NOVELA EN VERSIÓN DIGITAL GRATUITA-
EL MALPARIDO -NOVELA EN VERSIÓN DIGITAL GRATUITA-
 
Las comunidades de aprendizaje
Las comunidades de aprendizajeLas comunidades de aprendizaje
Las comunidades de aprendizaje
 
“Feria del Conocimiento América Latina y el Caribe: Casos destacados en agric...
“Feria del Conocimiento América Latina y el Caribe: Casos destacados en agric...“Feria del Conocimiento América Latina y el Caribe: Casos destacados en agric...
“Feria del Conocimiento América Latina y el Caribe: Casos destacados en agric...
 
Applus IAT BUMP
Applus IAT BUMPApplus IAT BUMP
Applus IAT BUMP
 
Introduction to terrastore
Introduction to terrastoreIntroduction to terrastore
Introduction to terrastore
 
Tutorial / Manual / how-to-set-up: ’Remember the Milk’ as your task managemen...
Tutorial / Manual / how-to-set-up: ’Remember the Milk’ as your task managemen...Tutorial / Manual / how-to-set-up: ’Remember the Milk’ as your task managemen...
Tutorial / Manual / how-to-set-up: ’Remember the Milk’ as your task managemen...
 
Análisis de vibraciones de un tren de maquinaria
Análisis de vibraciones de un tren de maquinariaAnálisis de vibraciones de un tren de maquinaria
Análisis de vibraciones de un tren de maquinaria
 
Presentacion Malaga CF Pedro Jimenez
Presentacion Malaga CF Pedro JimenezPresentacion Malaga CF Pedro Jimenez
Presentacion Malaga CF Pedro Jimenez
 
OpenStack at EBSCO
OpenStack at EBSCOOpenStack at EBSCO
OpenStack at EBSCO
 
Historias y cuentos online
Historias y cuentos onlineHistorias y cuentos online
Historias y cuentos online
 
El tren de Arganda: trayecto ferroviario entre la estación del Niño Jesús y l...
El tren de Arganda: trayecto ferroviario entre la estación del Niño Jesús y l...El tren de Arganda: trayecto ferroviario entre la estación del Niño Jesús y l...
El tren de Arganda: trayecto ferroviario entre la estación del Niño Jesús y l...
 
Pizza Point Of Sale System - SpeedLine Overview
Pizza Point Of Sale System - SpeedLine OverviewPizza Point Of Sale System - SpeedLine Overview
Pizza Point Of Sale System - SpeedLine Overview
 
Web Hooks and the Programmable World of Tomorrow
Web Hooks and the Programmable World of TomorrowWeb Hooks and the Programmable World of Tomorrow
Web Hooks and the Programmable World of Tomorrow
 
Ley de-marcas-y-otros-signos-distintivos
Ley de-marcas-y-otros-signos-distintivosLey de-marcas-y-otros-signos-distintivos
Ley de-marcas-y-otros-signos-distintivos
 
01 monday factors of production
01 monday factors of production01 monday factors of production
01 monday factors of production
 
Finance
FinanceFinance
Finance
 

Mehr von EMC

Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
EMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
EMC
 

Mehr von EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Government Business Council Report: Data Surge and Automated Analysis - The Latest ISR Challenge

  • 1. A Briefing Data Surge and Automated Analysis: from GBC: Industry Insights The Latest ISR Challenge January 2012 Over the past decade, the United States government has spent hundreds of billions of dollars to improve its ability to collect intelligence. The sheer amount and ever-increasing sophistication of information have overwhelmed analysis systems and processes. Data from sources as varied as unmanned aerial vehicles, surveillance video and online chat result in a flood of information so vast that only a fraction of it can be analyzed. The Intelligence, Surveillance and Reconnaissance (ISR) community must develop capabilities to analyze intelligence at an unprecedented speed and capacity. Thousands of unmanned aerial vehicles now collect intelligence, up from fewer than 50 a decade ago. Airborne sensors now track dozens of targets simultaneously. UAVs feed full-motion video directly to front-line troops. Automated systems suction emails, chats and Twitter feeds continuously from the ether, forming constellations of sensors and sensor networks. “ We simply haven’t had the scalable storage capacity or the Big Data U.S. technology has conquered the problem of collection, but has created massive problems related to storing and analyzing data, and to disseminating useful intelligence, according to MG(R) John M. Custer, former commander of the Army Intelligence Center, current director of federal strategic missions and programs at EMC Corporation. analytic tools to fuse “How do you harvest chat, or Twitter, or Facebook, or full motion video?” Custer asked in an interview. Though Google and the age of the search engine solved the problem of navigating pedabytes of data into the infinite universe of the text Internet, there still remains to be a similar mechanism for actionable intelligence, rich media—audio, video and images. How can such vast data troves be stored, transmitted in real-time. and analyzed? - MG(R) John M. Custer “We don’t have the analytic tools or the storage capability” needed to turn the all of the data CENTCOM J2 2003-08 into actionable intelligence”, warns Custer. Fixing that—in a cost-efficient manner—is the ” next step in the intelligence, surveillance and reconnaissance revolution. A Big Data Dilemma The enormous volume of data flooding into intelligence databases has a name: Big Data. “The real problem is Big Data,” Custer said. It’s easy to collect, but traditional storage and database management cannot handle the flow. “Storage has to scale to infinity,” Custer said. And to yield useful intelligence, data must be ingested by databases and examined by algorithms in real time, he said. Anything less results in stale data, which defeats the purpose. Pulling crucial bits of intelligence from the data deluge has produced a new analogy: “It’s no longer about looking for a needle in a haystack, now it’s looking for the silver needle
  • 2. in a stack of silver needles, says Custer.” The value of a single event—a video clip or a chat keyword—has increased. In response, the intelligence community must collect more data of increased quantity and sophistication. Sophisticated Sensors in Air, Space and Undersea Collecting terabytes of data has become routine for military and civilian intelligence services, propelled by recent wars and technological advances. The wars in Iraq and Afghanistan made unmanned aerial vehicles the kings of ISR collection. “ UAVs have flown more than 1 million combat hours since 2001. Spending on UAVs exploded from less than $300 million in 2002 to more than $4 billion in 2011, and the military plans to Collecting terabytes keep buying, according to a long-range aircraft procurement plan the Pentagon published in of data has March 2011. Meanwhile, military technologies are advancing. become routine for UAV maker AeroVironment demonstrated its Nano Hummingbird In February 2011, which flies by flapping 3.25-inch wings, and spies with a miniature video camera. The whole thing weighs military and civilian two-thirds of an ounce – battery and camera included. The Air Force Research Lab is working intelligence, propelled on an even smaller dragonfly-size UAV. by recent wards A 302-foot-long, unmanned Long Endurance Multi-intelligence Vehicle–LEMV–is scheduled and technological for delivery to the Army in Afghanistan in 2012. It is designed to loiter at 10,000 feet for 21 advances. days at a time, keeping watch with 2,750 pounds of radars, full-motion video and signals ” interception gear. The Air Force plans an even larger airship. Its 450-foot-long Integrated Sensor Is Structure craft–ISIS–is to have one giant radar for tracking vehicles and dismounted troops, and a second radar for spotting cruise missiles and other airborne threats. Helium-filled and solar-powered, ISIS is intended to fly at 65,000 feet and remain aloft for a year or more at a time. At $1 billion or more apiece, satellites remain the most costly of U.S. ISR platforms, the Congressional Research Service reports. So work continues on a class of simpler, cheaper, “Operationally Responsive Space,” satellites that can be warehoused and kept ready for launch on short notice. The first ORS satellite, launched June 29 and declared operational Sept. 28, 2011, uses a multispectral SYERS-2 reconnaissance sensor to provide “battlespace awareness” to the U.S. Central Command, according to sensor manufacturer Goodrich Corp. As UAVs multiply in the skies, UUVs–unmanned undersea vehicles–take on ISR missions underwater. The Navy’s ISR roadmap calls for building a fleet of UUVs by the end of the decade. They could be used to monitor the movements of drug smugglers in the Caribbean and track adversary warships around the world. Three were deployed in the Gulf of Mexico in 2010 and transmitted back volumes of data on the plume of oil gushing from BP’s blown-out well. The military intelligence community has devised sophisticated methods for data collection, while technologies available to civilian users has expanded, also. Civilian and Social Sensors The proliferation of social media has opened another vast realm in which the intelligence community must focus attention. Chats, blogs, Twitter, YouTube and social networking sites often are sprinkled with important intelligence. The problem is finding actionable points in the tsunami of data.
  • 3. In July 2011, DARPA launched its Social Media in Strategic Communication program, offering $42 million for “automated and semi-automated operator support tools and techniques for the systematic and methodical use of social media” to detect and track the spread of ideological movements, misinformation and persuasion campaigns to identify participants, and to launch counter operations. A DARPA-issued broad area announcement described these social media tools as “heavily dependent on chance”, and urged the ISR community to no longer rely on “a combination of luck and unsophisticated manual methods.” The Intelligence Advanced Research Project Agency (IARPA) has a similar effort underway. In August 2011, IARPA announced its Open Source Indicators program to develop technology that will continuously and automatically analyze “publicly available data, such as web search queries, blogs, micro-blogs, internet traffic, financial markets, traffic webcams, Wikipedia edits, and many others.” With automated analysis, IARPA hopes to detect developing political and humanitarian crises, riots, mass migrations, disease outbreaks and economic instability. A similar push for automation is underway for the closed-circuit television systems (CCTV) used increasingly for homeland security. CCTV is being fused with biometrics and human behavioral signature recognition technology to create automated systems for spotting threats, the Homeland Security Research Corporation reported earlier this year. In the United Kingdom, already 1.85 million CCTV cameras monitor civilian movements—or one for every 32 UK citizens. “ We are swimming in sensors and drowning in data. The Homeland Security Research Corp. predicts a $3.2 billion global market for smart CCTV systems by 2016. But CCTV systems without automated analysis cannot provide reliable real- time warnings, the research and consulting firm said. The massive increase in military intelligence collection is mirrored in federal civilian agencies. - Regina Dugan The Department of Homeland Security (DHS), the FBI and state and local agencies have Director, DARPA established 72 fusion centers that receive, analyze and share intelligence. And like the military, ” the civilian sector is awash in data that pours in from law enforcement, public safety and emergency response agencies, plus the private sector. The Automation Ambition “We are swimming in sensors and drowning in data,” said Regina Dugan, director of the Defense Advanced Research Projects Agency. For many intelligence experts, better automated analysis technology is the top ISR priority. According to a report by the Defense Science Board earlier this year, algorithms that can discover useful intelligence in the surfeit of collected data would allow analysts “to perform real analysis rather than exhausting themselves culling raw data.” Science and technology created the problem and now must solve it. DARPA director Regina Dugan spelled out the case for automated analysis this way to Congress during a March hearing: To detect dismounted fighters in Afghanistan requires collecting and processing about 100,000 times more data than it takes to detect a strategic bomber. “One of two things must happen,” she said. “Either we must give up the target set [of dismounted fighters], or we must deal with the data volume. Obviously, we do not want to give up the target set. The only choice before us, therefore, is to develop capabilities that dramatically improve our ability to manage and use the data.”
  • 4. In part, it’s a problem that’s solving itself, she said. “Empirical results suggest that better sensors give us better data. More and better data leads to better automation. Better automation enables better analysis.” The millions of hours of video and the endless stream of tweets and email are unstructured data that must be quickly analyzed and transformed into usable intelligence. “ Collaboration across state, local, and federal partners to Piecemeal in Approach Project by project, the ISR community is working to develop automated techniques. The Army is tackling a facet of the problem with a Federated Universal Synchronization Engine – FUSE. The system pulls together intelligence from multiple sources – video, synthetic ‘connect the dots’ to prevent aperture radar and a moving target indicator, for example – and presents it together on one and deter threats remains a viewing screen. challenge. FUSE is intended to quickly integrate perishable intelligence such as the locations of moving - Dept. of Homeland Security targets, the Army said during tests last spring. It was developed after the Army discovered that ” UAV operators did not have the technology needed to fuse intelligence from multiple sources into a single operational picture. The system is expected to be ready for deployment in 2012. The Navy Research Lab has already demonstrated how automation can tackle one part of the information overload problem. An airborne, wide-area surveillance sensor and a high-resolution narrow field-of-view sensor, worked together in 2010 without human intervention, to spot, track and identify vehicle-size and some human-size targets on the ground in real-time. DARPA has launched an ambitious program, Insight, to build an ISR “exploitation and resource management system” that integrates human reasoning and machine analysis of intelligence. The system must be able to sort through all types of ISR data in real-time, according to DARPA– video shot by drones, signals collected by ground-based sensors, information reported by soldiers, even intercepted text messages. Insight would use automated techniques such as behavior modeling, threat network analysis and anomaly detection to comb through raw data and discover useful intelligence. “Little ‘True Fusion’” The proliferation of military and civilian sensors creates complex, structured and unstructured data, all of which the ISR community must store, transport and analyze to turn data into intelligence. Years after the September 11, 2001 terrorist attacks, “little ‘true fusion,’ or analysis of disparate data sources, identification of intelligence gaps and pro-active collection of intelligence” is occurring, the Congressional Research Service reported. The fusion centers are swamped, and DHS is aware of the problem. “Collaboration across state, local, and federal partners to ‘connect the dots’ to prevent and deter threats remains a challenge,” the DHS inspector general wrote last year. The fusion centers need more effective information sharing IT systems, he said. Enterprise Solutions for Cost-Savings “You have to be smarter about how you manage your infrastructure,” said Dawn Meyerriecks, Deputy Director of National Intelligence Acquisition and Technology in an interview with the Geospatial Intelligence Forum.
  • 5. “ Technologies can address conundrums like Big Data, storage and analytics, In the Defense Department, combining ISR data is the job of the Defense Intelligence Information Enterprise, or DI2E, and other virtualization efforts. Envisioned as a common military-wide framework, DI2E would rely heavily on cloud computing to provide intelligence analysts with access to hundreds of scattered databases and exploitation tools to make storing, finding, retrieving, analyzing and but as you decrease disseminating ISR data faster and easier. boots on the ground Parts of DI2E already exist, said Custer, the former Army Intelligence Center commander. The Army and the intelligence that “already has a cloud – they’re using it today in Afghanistan,” he said. “DI2E will bring the Air Force and connotes, you need more Navy” and military intelligence entities such as the National Geospatial-Intelligence Agency into the systems that provide same cloud, he said. The military and intelligence community can “save huge money” by moving to the cloud, as DI2E proposes, relying more on virtualization and data center consolidation. indications and warning. For the Office of the Director of National Intelligence, “cloud computing and all the technologies that -MG(R) John M. Custer come with that are big players,” said Meyerriecks. “Network and content staging innovations, peer to ” peer, and proxy caching are among the things that are happening.” Risks in Reductions About EMC TM U.S. annual spending on intelligence now tops $80 billion a year, more than double the amount spent EMC Corporation is a global leader in 2001, according to the Pentagon. But budgets cuts are expected. in enabling the Federal Government to transform its operations and “We’ve had ten years of steady increases. Now we’re going to have to tighten our belts,” U.S. Army deliver IT as a service. Fundamental to this transformation is cloud General (R) David Petraeus told a joint hearing of the House and Senate intelligence committees Sept. computing. Through innovative 13, 2011. As the senior commander in the Iraq and Afghanistan wars, Petraeus was the beneficiary of products and services, delivered extraordinary ISR improvements. Now, as the director of the Central Intelligence Agency, Mr. Petraeus in partnership with leading Government Contractors and may have to decide which ISR technologies he can do without. Federal Systems Integrators, EMC Coming budget cuts are likely to impose discipline of their own. Not all ISR programs that exist accelerates the journey to cloud computing, helping Federal IT today will survive the spending downturn, Director of National Intelligence James Clapper told the departments to store, manage, Intelligence Committees. Nor should they. “I think we have to be rather cold-hearted and objective protect, and analyze their most valuable asset–information–in about the real contribution the various systems make,” he said. But at the same time, “we must try to a more agile, trusted, and sustain healthy R&D for the future.” cost-efficient way. Additional information about EMC can be Even as the government decides which programs and force structures to cut, agencies must be found at www.emc.com/federal judicious with ISR capabilities, Custer cautioned. Indications and warnings that offer situational awareness are essential, particularly as cost-reduction efforts reduce the volume of ground troops. According to Custer, “technologies can address conundrums like Big Data, storage and analytics, but About the Government as you decrease boots on the ground and the intelligence that connotes, you need more systems that Business Council: Industry that provide indications and warning.” Insights GBC: INDUSTRY INSIGHTS, a division of the Government William Matthews is the author of this report, with Erin Dian Dumbacher, editor. Business Council and Government Executive Media Group, is dedicated to advancing the business of government through analysis and insight. GBC: INDUSTRY INSIGHTS partners with industry to share best practices with top government decision-makers, understanding the deep value inherent in industry’s experience engaging and supporting federal agencies. Contact Bryan Klopack, Director, at bklopack@govexec.com.