Mandeep mann_raipur

1,292 views

Published on

Published in: Technology, Business
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,292
On SlideShare
0
From Embeds
0
Number of Embeds
28
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide
  • My Background Need for a better system. While in the Army we need better tech platform for whole lot of activities . Army has always remained manpower intensive, it needs to get smarter and look for intelligent solution based on scientific principles. Intelligence and Security Concerns
  • The figure, at face value, may look daunting but in real terms could be narrowed down to a few trouble spots or belts ; Nadia and Murshidabad and Birbhum ; Area under 20 more PS would be added to 28 already included and affected by Maoist Threats
  • A closer examination of the violence prone districts could possibly reduce the actual footprint by say another 20 to 30 per cent
  • the security grid so established should form the basis of protecting (or guarding) the populaceand logistic bases for kinetic operations of security forces as well as deny logistical support to insurgents
  • cover the entire area to obtain actionable Intelligence using HUMINT and technical resources (radio intercepts/UAV surveillance /WAAS sorties Coverage/satellite imagery. (BFSR/heat sensors /thermal mapping / UAV’s/satellite imagery/WAAS).
  • Inadequate development and non inclusive growth has led to inequalities has been breeding corruption making problem solving even more complex . It leads to fringe terror groups to exploit the situation using democratic tools – allows transparency and right to information. Challenges and the mediation strtaegy has to be that much more developed
  • Internal security is going to remain an issue of concern for a long time and we can not always depend on Army ( can 40 – 50 Km on foot and in case of Heptrs, can operate up to a distance of 200 KM from the bases)
  • Large extent of the area, difficult geography/terrain, cultural and language complexity and lack of infrastructure and communications. Intelligence collection, tactical response, comd & control, as well as governance and information campaigns have to be tackled simultaneously
  • “ cripple India’s economic growth, destroy national confidence in its political system, attack its open society and provoke destabilizing communal rivalries”, all of which are seen as a hindrance to establishing an Islamic Caliphate (Tellis 2008). At the centre of this phenomenon are two Islamist militant groups – the Lashkar-e-Taiba and the HUJI-B, both of which are part of the International Islamic Front (IIF) of which al Qaeda is a founding member, and are committed to the cause of establishing an Islamic Caliphate.
  • Int agencies are faced with multiferious issues besides the turf battle for information and jurisdiction part. Data is assymmetrical form, it is humongous and therefore needs parallel computing on HPC platforms
  • Need of the hour is to converge the existing resources of HUMINT as well as technology to enhance real time intelligence and be able to predict the un foreseen by understanding patterns - which is humanly not possible and not achievable
  • This will make Intelligence more transparent as well as reduce redundancies and element of error. Humongous data can be analyzed and therefore better chances of quality analysis and prevent corrupt and age old archaic practices
  • UCIMS is designed for Uncon conflicts; but its data points can be suitably modified for any other Security and business intelligence environment for eg bank wants to monitor the loans. Traffic police wants to monitor accidents as well as time and location specific sensitivities. It can give various outputs, which can allow decision makers to take appropriate decisions
  • Warfare and intelligence is becoming very complexed and just having HUMINT is not enough and therefore needs more network based approach which collates as well as demistifies the intelligence from unstructured data bases to structured analyses to derive the intelligence – Helpful in 9/11 and 26/11 kind of investigations as well as bring actual perpetrators to their final destination or Karma
  • What it does is that it shows linkages and locations – which otherwise remain uncollated and mere another file to be lost in a fire or organizational inefficiencies. Long time ago we were told that government records are being automated. Even today except for Hyderabad which has done reasonably well under the CM Mr Naidu, rest of the states still function on the basis of “chirkut” in the names of land records and therefore allows corruption and greed to creep in allowing land scams and missing files. As aware citizens we need to be responsible as well as ask necessary questions in the right forum. So that decision makers do not shy away from their responsibilities as well as are forced to take hard decisions
  • This is the question I will leave it for you all to ponder and debate. Look at what happened to railways. See the IT revolution and BPO industry. Countering Terrorism with Intelligence as well Operational capability of Security forces is what that will make or mar the way we do things. Please gentle man use your influences as well as wherewithal to make this country not only grow but maintain the inclusiveness in the growth as well as prevent it from being affected by incidents of terror which as all of the previous speakers have explained are going to be even more heinous and lethal.
  • Mandeep mann_raipur

    1. 1. <ul><li>Strategic and Operational Imperatives to Tackle Naxalism & Urgent Need of Technology Augmentation </li></ul>Mandeep Mann Orkash Services Pvt Ltd
    2. 2. About Orkash <ul><li>Orkash is an India headquartered, international management-consulting and high-technology R&D company operating in the following areas: </li></ul><ul><ul><li>Investment & Transaction Advisory Support </li></ul></ul><ul><ul><li>Operational Risk and Security Risk Management </li></ul></ul><ul><ul><li>Strategic Business & Market Intelligence </li></ul></ul><ul><ul><li>Battlefield Management, Intelligence, Decision Support & Homeland Security Platforms </li></ul></ul><ul><li>On the technology side, ORKASH is focused on creating new technology applications (and the highly-scalable back-end infrastructure) to plug the gap between information access (search engines, etc.) and information analysis (human-intelligence). These are designed to support decision makers in the business, the government and the security agencies. The company has cutting edge technology and R&D expertise across: </li></ul><ul><ul><li>AI systems, NLP and Expert Engines </li></ul></ul><ul><ul><li>Massively large and parallel data-mining systems </li></ul></ul><ul><ul><li>Automated Intelligence Analysis, Business Intelligence & Decision Support Analytics </li></ul></ul><ul><ul><li>Geographical Information Systems </li></ul></ul><ul><ul><li>Parallel computing, clusters & cloud computing </li></ul></ul>© 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    3. 3. SCOPE <ul><li>Perspective – Areas under the influence of Naxalism </li></ul><ul><li>Counter Insurgency Strategy </li></ul><ul><li>Left Wing Extremism </li></ul><ul><li>Cost Benefit Analysis </li></ul><ul><li>Operational Imperatives </li></ul><ul><li>Intelligence Challenges </li></ul><ul><li>Technology Augmentation </li></ul><ul><li>Q & A </li></ul>© 2010 - Orkash Services Pvt. Ltd . … ensuring Assurance in complexity and uncertainty
    4. 4. What would Guerilla do © 2010 - Orkash Services Pvt. Ltd . … ensuring Assurance in complexity and uncertainty “ There is nothing in the purely military pages of Mao, Nguyen Giap, Che Guevara or other manuals of guerrilla warfare which a traditional guerrilla or band leader would do other than simple common sense.” “ Failure to prepare is preparing to fail “
    5. 5. Characteristics of Naxalism Affected Areas <ul><li>Spans in nine states and includes some thirty-five districts (highly impacted </li></ul><ul><li>districts) </li></ul><ul><li>In terms of acreage, the Naxal belt translates into approximately 209,787 square </li></ul><ul><li>kilometres. </li></ul><ul><li>Dantewada, Bastar, Bijapur, Kanker and Narayanpur in Chattisgarh (32,189 sq.kms) </li></ul><ul><li>Malkinigiri and Rayagada in Orissa (12,814 sq. kms), </li></ul><ul><li>West and East Singhbhum in Jharkhand (8,884 sq. kms), </li></ul><ul><li>Gadchiroli in Maharashtra (9,275 sq. kms), </li></ul><ul><li>West Midnapore in West Bengal (9,296 sq. kms); Bankura and Purulia not included </li></ul><ul><li>Mainly rural areas alongwith large contiguous forested areas with low-habitat </li></ul><ul><li>Complex demographic profile - tribal communities </li></ul><ul><li>Limited communications and connectivity infrastructure </li></ul>
    6. 6. Area Characteristics - Implications <ul><li>Affected area is too large for military oriented classical anti-insurgency operations - will consume too many troops (in millions) </li></ul><ul><li>Demographic complexity and strong political ideological factors further limit pursuit of a classical anti-insurgency approach </li></ul><ul><li>Isolation of Naxals from population centers and habitation clusters an imperative. Large contiguous forest areas to some extent are an advantage for achieving such isolation </li></ul><ul><li>Command & Control and operational logistics difficult for the anti-insurgent </li></ul><ul><li>Reliance on electronic communications by Naxals can be exploited, as also their (semi-permanent) bases in jungles leave signatures that can be detected and monitored by surveillance platforms </li></ul>
    7. 7. <ul><li>Vulnerable area identified within this - Not more than 70,000 sq km. </li></ul><ul><li>An operational coy can dominate 5X 5 Sq Km </li></ul><ul><li>At present deployment is 348 coy’s. Each Coy thus may be covering on an average of 150 - 200 Sq km i.e 6 times thinner than required. </li></ul><ul><li>Each police post in Chhattisgarh covers 450 Sq Km. Communication infrastructure does not exist, lacks resources to tackle any threat </li></ul><ul><li>We need to prioritise, if tactical weight of operations has to succeed </li></ul>Centre of Gravity of Naxalism Identified
    8. 8. Success Ingredients of the Operational Strategy : Punjab <ul><li>Three Pronged strategy </li></ul><ul><li>The Quality of Local Intelligence (police driven; with focus on grass root ‘Thana’ level operational int, collated together at State level for strategic picture) </li></ul><ul><li>A Capacity for Synchronized Operations (police led) - Stress was on Kinetic operations </li></ul><ul><li>Transformation of the Punjab Police, and the Degree of Political Resolve </li></ul><ul><li>Objective of strategy </li></ul><ul><li>Objective of operations was to break the collective mental paralysis of police through mass-psychological transformation and operational successes </li></ul><ul><li>Army was used as an &quot; Anvil” and police was used as “Hammer” </li></ul><ul><li>Empowering of Police Stations; Proper Documentation of all crimes; Generated Information which was collated meticulously </li></ul><ul><li>Exceptional police leadership at the SPs level </li></ul>
    9. 9. Multi Pronged Strategy <ul><li>Local Community Oriented Developmental ( Education, Jobs, NERGA, PDS Distribution, children mid-day meal scheme) and Governance Initiatives needed in support of ant-insurgency efforts </li></ul><ul><li>Specialized Information and Psychological campaigns to neutralize Naxal’s ideological campaign and influence </li></ul><ul><li>Capacity Building of Security Forces with emphasis on jungle craft training and intelligence gathering </li></ul><ul><li>Operational and Tactical aspects for existing forces need to be stressed, and augmented through technological resources </li></ul>Political Will is most Important
    10. 10. Advantages : CI Grid Strategy <ul><li>Create a dynamic CI Grid based on sustainability of operation through prioritization of AOR based on Naxalite threats and Terrain/Demography Configuration (jungle, sparse habitation, rural, urban, etc.) </li></ul><ul><li>Maintain unified command, control and communication along interstate boundaries for better sharing of information </li></ul><ul><li>Habitat areas both rural and urban clusters dominated and isolated (from insurgents) by local police in conjunction with paramilitary forces with local administration infrastructure co located </li></ul><ul><li>Large dense jungle areas sparsely populated need to be left unoccupied but kept under surveillance using aerial, ground surveillance, radio interception and HUNINT resources (deployed tactically on the fringes of jungles) </li></ul><ul><li>Developing actionable intelligence and surgical strike capabilities (police Cdo units) in jungles as well as in other areas </li></ul>
    11. 11. Available Options <ul><li>Option - I Tight CI Grid (CRPF & IRB units) Raise more CRPF & IRB Units to have effective CI Grid in Naxal affected areas and employ them to target insurgents in liberated zones. Less sensitive areas can be denied by Wide Area Surveillance Sorties(WAAS) and population control measures ( controlling supplies) </li></ul><ul><li>Implications </li></ul><ul><ul><li>It will be a costly option, as it will entail raising 300 new CRPF Bns </li></ul></ul><ul><ul><li>Manpower Intensive, yet not effective to target liberated areas </li></ul></ul><ul><ul><li>Lesser chances of surprise and deception </li></ul></ul><ul><li>Option – II Police and commando’s used for surgical strikes CRPF used in existing CI Grid and police commando’s used to target ” liberated Zones” to psychologically break the will of insurgents. CRPF and IRB units act as anvil and consolidate near population centers. Intelligence capability can be augmented through additional resources as well as aerial surveillance </li></ul><ul><li>Implications </li></ul><ul><li>Needs capacity building for creating strike capability in Police commando’s </li></ul><ul><li>In absence of effective grid it will be a wasted strategy </li></ul><ul><li>Though a cheaper option, but may alienate population in case of human right </li></ul><ul><li>violation by police </li></ul><ul><li>Option – III Additional CRPF , IRB/SAP and Police commando’s raised and augmented with Intelligence Raise more CRPF/IRB units with 25 % local youth to create an operational & Intelligence Grid in critical areas to force Naxalites into jungles . Use Special Forces /police commando’s for surgical strikes in jungles. Create effective population control measures as well as surveillance measures using intelligence units augmented with technical equipment to cover difficult terrain </li></ul><ul><li>Implications </li></ul><ul><ul><li>It is most cost effective as it augments operational dynamics </li></ul></ul><ul><ul><li>It will cater to developmental needs without creating large security force. The intelligence units created can be from locals thus good incentive for sharing information to synergize operations as well as to control population </li></ul></ul><ul><ul><li>Deny insurgents free space using augmented technical intelligence based on </li></ul></ul><ul><ul><li>communication and intelligence Grid </li></ul></ul>
    12. 12. Police Capacity Building - Cost <ul><li>Existing Police and Paramilitary personnel need to be trained in Jungle warfare - Police and Paramilitary personnel recruited from this region and trained for insurgency; courses can be tailor made for them </li></ul><ul><li>Create Intermediate Leadership - Short tactical courses to train DSP’s & SP’s on operational tactics and jungle craft </li></ul><ul><li>Additional Indian Reserve Battalions( IRB) created : IRB concepts in Manipur and Nagaland quite successful; Each will cost approx 30 - 33Cr </li></ul><ul><li>Raise Special Intelligence Units : Raised for each affected state (will cost 20 Cr each) . Each unit can cover an area of 25X35 Km </li></ul><ul><li>CTJW schools raised for continuation training – One per affected state on the lines of CTJW Kanker (cost will be 6 - 8 Cr each) </li></ul><ul><li>Create one Special Force/Police commando battalion per state - Fully trained and equipped by the latest weaponry and communication systems as per Army Special forces concept ( for Jungle warfare); each will cost 44 Cr. Army can be used to train them operationally. </li></ul>© 2010 - Orkash Services Pvt. Ltd . … ensuring Assurance in complexity and uncertainty
    13. 13. Deployment Voids: CRPF/SAP Area under Maoists Critical Area state wise Vulnerable Area Existing Units Additional Battalion needed ( 5 Years) Rest of the Area covered by surveillance and denied using surgical strikes along with Information campaigns In Sq Km Total Units   Deployment Ratio State Sq Km Bns Needed 58 Thin in No of Times ( X ) Chhattisgarh 32189 215 148 40 51 Total Area 208787 1392 24 Orissa 12814 85 59 30 19 Critical Area 72458 483 8 Jharkhand 8884 59 41 25 16 Priority Area 58000 387 7 Maharashtra 9275 56 43 23 20 Vulnerable Area 50000 334 6 West Bengal 9296 56 43 26 17 We are 6- 8 Times Thinner in critical areas - Major Challenge for security forces      483 334 144 123 67
    14. 14. Units to be Raised and Cost ( next 5 Years) Units Area to be covered in sq Km No of Units Needed Existing Units Deployed New Units needed Cost Per Unit Cost (in Crores) Total Area Covered 72458 483 58 425 33 14025 Para Military (CRPF/IRB) 18750 123 40 83 33 2739 State Police (SAP) 7950 37 18 19 33 627 Intelligence Units 15000 25 0 30 20 600 Commando Bn NA 5 0 8 44 352 CTJW School NA 10 NA 10 8 80 41700       4398 Crores
    15. 15. Cost to Benefit Analysis CRPF/IRB Battalion Cost Commando Battalion Cost Intelligence Unit CTJW School Cost for Cost of 120 Units     Cost of 8 Units   Cost of 30 Units   Cost of 10 units   In Crores In Crores In Crores In Crores Training 1 3 2 1 Leadership 1 2 1 1 Admin 12 10 1 1 Transport 1 2 1 1 Equipment 5 10 4 2 Intelligence Fund 1 2 5 0 Salary 12 15 6 2   Cost Per Unit 33 44 20 8 Total Cost 2739 352 600 80     Total 4398 Crores     Cost to benefit 4398/$100Billion 4398/466200     $ 1 ~ Rs 46.62 Cost to benefit Ratio 0.94 % of the Benefit
    16. 16. Special Forces augmented with Intelligence <ul><li>Special Forces ( Strike commando Battalions) </li></ul><ul><li>They are force multiplier to break the psychological superiority of insurgents as well as provide surgical strike capability </li></ul><ul><li>They can operate well away from bases and can target liberated zones </li></ul><ul><li>They can synergize operations with real time intelligence obtained in operations </li></ul><ul><li>They can target the top leadership with minimum collateral damage </li></ul><ul><li>Intelligence Units </li></ul><ul><li>To augment the field intelligence effort as well as use specialized intelligence equipment </li></ul><ul><li>These units will be equipment intensive and not manpower intensive </li></ul><ul><li>They will have advanced communication , surveillance and monitoring equipment </li></ul><ul><li>They can double up as surveillance and communication units on eradication of insurgency </li></ul>
    17. 17. Intelligence Challenges and augmentation through technology © 2010 - Orkash Services Pvt. Ltd . … ensuring Assurance in complexity and uncertainty
    18. 18. Intelligence and Operational Challenges to Connect Dots.. <ul><li>Intelligence is generated at multiple levels and </li></ul><ul><li>consumed at operational level </li></ul><ul><li>Manual analysis of large data is difficult - with automation it can </li></ul><ul><li>be quickly sorted and interpreted through link analysis </li></ul><ul><li>Linkages of historical data essential for better interpretation </li></ul><ul><li>GIS and 3 D imagery linked to database systems are powerful </li></ul><ul><li>tools to interpret in real time </li></ul><ul><li>Pull Model of Intelligence is not efficient, it needs to be pushed down </li></ul><ul><li>as a consumable commodity </li></ul>
    19. 19. Intelligence Grid over Command and Control grid : Features <ul><li>Databases managed and updated in real time – generated at grass root level as intelligence collection, and integration of data through database systems and data-mining </li></ul><ul><li>Data, Images and records available online across different levels of operational assets, facilitating analysis and authentication </li></ul><ul><li>Video Image sharing through - powerful tool for planning operations </li></ul><ul><li>Mapping of population ( ID Management) linking it with developmental activities and demographical survey’s; it will also facilitate better governance and informational campaigns at grass root level </li></ul><ul><li>Finger printing and verifying suspects using palm top devices from the data bases is a powerful use of technology </li></ul>
    20. 20. Intelligence Equipment <ul><li>Surveillance devices for day and night surveillance video/thermal image employing UAV, RPV’s and Aerial surveillance – It can give you virtual results </li></ul><ul><li>GIS Platform for collation of intelligence and terrain mapping – online accessibility </li></ul><ul><li>Aerial surveillance technologies for interpreting images for Insurgent Camps, logistic movements, as well as forest </li></ul><ul><li>Management and tracking of suspects in the population by rolling out biometric ID management system (UID?) </li></ul>
    21. 21. Technology - Strategic Level <ul><li>Satellite, Air Imagery and RPV based monitoring of forested areas </li></ul><ul><li>Radio Interception through automated Software </li></ul><ul><li>Image interpretation Team can take resources of Armed Forces as also ISRO to initially get the training as well as utilize its expertise </li></ul><ul><li>Safeguard strategic assets as well as provide real time information </li></ul><ul><li>Data mining and link analysis for intelligence analysis and data visualization for decision support </li></ul><ul><li>GIS platforms for integrating tactical planning with intelligence inputs </li></ul><ul><li>IED jammers, explosive detectors and other tactical gear for troops </li></ul>
    22. 22. Network Analysis and Data visualization Structured analysis approach4 Graphic based approach Manual approach (1) Manually creation of association matrix by identifying the relations through raw data (2) Helpful in investigation, becomes ineffective where datasets are very large (1) Graphically representation of insurgent networks using tools such as Link Analysis (2) Helpful in visualization of large amount of relationship data but without analytical functionality. (1)Advanced analytical capabilities to assist investigation (2) It can help in identifying networks to mining of large volumes of data to discover useful knowledge and create intelligence about the structure and organization of criminal networks - Data Mining - Social Network Analysis - Pattern Tracing and interactions
    23. 23. Future Technological challenges © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty <ul><li>Technological advancement impacting the world as well as how we think . </li></ul><ul><li>Internet revolution, social networking sites as well as world is becoming increasingly networked and flat </li></ul><ul><li>Innovative ideas and Time to market (T2M) and to masses decreasing and is changing in geometric proportions – at a much faster pace. Interdicting an idea with better technology or exploiting it with using different tools makes or mars survival of a company </li></ul><ul><li>Flat world and connected world poses different challenges in the domain of security and Intelligence systems </li></ul><ul><li>Intelligence is no longer just physical source based , but it combines technology – as a backbone. Intelligence process has become tech innovative and savvy both in corporate as well as for security environment ; uses social networks and Twitter and facebooks have potential to break marriages as well as nations security infrastructure – Negative opinions or forcing decisions </li></ul><ul><li>It is faster, smarter and automated. Uses multiple tools and analytics from visual to thermal. </li></ul><ul><li>This has posed even different challenges in the field of data mining and computation. No longer people are talking of CPU based computation - GPU and Cuda softwares are being talked to overcome the barrier of reducing the chip size to computation speed. How many of us are familiar with these three names </li></ul><ul><li>Moore’s law – Computation gets doubled in 18 months </li></ul><ul><li>Pranav Mistri’s – Presentation on using Sixth sense </li></ul><ul><li>Sabeer Bhatia’s - Revolution in Mail service </li></ul>
    24. 24. Transition of terrorism in India (post 26/11) © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty Transition of terrorism in India (post 26/11) Organised Crime Linkages (local & international) Meticulous operational and strategic planning Recruitment is becoming local focusing on computer literate youth in big cities Emergence of India as a target of transnational terrorism Expanding logistical home base Mass scale Attack - Media Attention Impacted by neighborhood Geo-strategic forces
    25. 25. Information Asymmetry - Mining for real time intelligence <ul><li>Requirement for massive high-performance parallel-processing clusters/cloud computing - consisting of hundreds of servers </li></ul><ul><li>Network centric data mining platforms </li></ul><ul><li>Massive databases - very specialized database architecture </li></ul>© 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty Historical data analysis would train expert engines to raise triggers and red flags. Real time data mining will generate trends and patterns in the usage Multiple Sims Multiple Handsets Internet account Account: Hazi Al Password: Hazi_123 Location [email_address] [email_address] [email_address] IP address MAC address Metadata Email tracing Telephone Banking and Card Usage
    26. 26. Convergence – Human Int and Tech Int Intelligence Agencies - Databases Administrative - Databases Tech Intelligence Datamining Processing Raw Data into Usable form Better Information Collection Internet based information collection and investigation (Track Back) Enhanced Prevent-Prepare-Respond-Recover Structure Identifying Triggers & Patterns Automated analysis of structured & unstructured data Human Intelligence © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    27. 27. What needs to be done - Intelligence © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty <ul><li>Automation of Intelligence from Tactical level upwards </li></ul><ul><li>Integration of HUMINT and various sources of TECHINT </li></ul><ul><li>Create Push Model for Flow of Information </li></ul><ul><li>Display information sources and intelligence on one platform </li></ul><ul><li>Create intelligence maps based on GIS platform </li></ul>
    28. 28. © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty Unconventional Conflict & Intelligence Management System (UCIMS)
    29. 29. © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty <ul><li>Advanced intelligence analysis and intelligence management system </li></ul><ul><li>Integrated and networked information system - identifies patterns and trends in intelligence, socio-political events etc </li></ul><ul><li>Integrates ground and air surveillance systems </li></ul><ul><li>Tactical operations planning modules - 3-D terrain on GIS </li></ul><ul><li>Customizable network-centric command and control system </li></ul><ul><li>
 </li></ul>ORKASH UCIMS FEATURES <ul><li>Capable of automated visualization of operational and situational updates
 on maps and satellite imagery </li></ul><ul><li>Enables collaborative exchange of operational information amongst multiple teams operating from different locations
 </li></ul><ul><li>Seamless - Pattern analysis, Data-mining, OLAP, network-graphs and link-analysis </li></ul>
    30. 30. Network Centric Command and Control System <ul><li>Translates information advantage to competitive advantage through robust networking of well-informed geographically dispersed forces through a centralized Command and Control System </li></ul>© 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty Network diverse entities Allow information Sharing Enhance Situational Awareness Enable - C4I Increase mission effectiveness
    31. 31. Intelligence Challenges and Connecting the Dots.. <ul><li>Intelligence is generated at multiple levels and consumed at operational level </li></ul><ul><li>Manual analysis of large data is difficult - with automation it can be quickly sorted and interpreted through link analysis </li></ul><ul><li>Linkages of historical data essential for better interpretation </li></ul><ul><li>GIS and 3 D imagery linked to database systems are powerful tools to interpret in real time </li></ul><ul><li>Pull Model of Intelligence is not efficient, it needs to be pushed down as a consumable commodity </li></ul>© 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    32. 32. Intelligence collaboration process © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty Intelligence sources Socio political events Demographics Sat images, maps Technical inputs Data repository - Raw data - Analysis of data - Intelligence creation - Intelligence distribution Actionable intelligence Tactical decision making Intelligence collaboration process
    33. 33. Semantic Enrichment <ul><li>Semantic enrichmen t is the process of creating or associating semantic tags in unstructured data or text, usually involving concepts, entities, relationships, events and properties described in an ontology or rule based </li></ul><ul><li>Benefits : </li></ul><ul><ul><li>Adding semantic metadata tags to the original unstructured data enables advanced correlation and data fusion capabilities. </li></ul></ul><ul><ul><li>Enables concept , event and relationship extraction and automated metadata tagging. </li></ul></ul>© 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty (XML) D1 D2 D3 . . Dn Document Classification Classification Results Commonsense Engine Concepts Engine Concepts Tagged Documents + Entities Semantic Enrichment Semantically Enriched Documents Documents
    34. 34. © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    35. 35. © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    36. 36. Combining Data Mining and Link Analysis © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    37. 37. OLAP analysis © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    38. 38. Network Analysis and Data visualization (1) Manually creation of association matrix by identifying the relations through raw data (2) Helpful in investigation, becomes ineffective where datasets are very large (1) Graphically representation of insurgent networks using tools such as Link Analysis (2) Helpful in visualization of large amount of relationship data but without analytical functionality. (1)Advanced analytical capabilities to assist investigation (2) It can help in identifying networks to mining of large volumes of data to discover useful knowledge and create intelligence about the structure and organization of criminal networks - Data Mining - Social Network Analysis - Pattern Tracing and interactions © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty Manual Graphics-based Manual Structured
    39. 39. Past historical factual information © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    40. 40. ORKASH-UCIMS on a geospatial platform © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    41. 41. © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    42. 42. Intelligence & Operations Management © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    43. 43. Connecting the Dots.. © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    44. 44. Location Intelligence © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    45. 45. Tracking events news with location based search © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    46. 46. Advanced Search Techniques for Location Intelligence © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    47. 47. © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    48. 48. Monitoring Movement of Tactical Assets © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    49. 49. Air Surveillance © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    50. 50. Points to Ponder © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty <ul><li>Technology is here to stay – We can not hide behind our ignorance </li></ul><ul><li>Nor deny the users, through inept practices </li></ul><ul><li>Need automation of data bases and records - reduce inefficiencies to make this process more accountable </li></ul><ul><li>Homeland security to achieve inclusive growth as well as prevent another Kargil, Dantewada or 26/11 is essential </li></ul>What are we then waiting for ?
    51. 51. Take Away for the Industry <ul><li>Companies and Industry need to assess its risks against Terror attacks – de - risk its business </li></ul><ul><li>Prepare, harden and upgrade its Infrastructure </li></ul><ul><li>Ensure Training on regular basis ( Basic, Reorientation and Advanced) </li></ul><ul><li>Make Security resources more accountable using Technology </li></ul><ul><li>Bring in visible change, which is measurable </li></ul><ul><li>Guide them through motivation and leadership – More than that create next levels in security </li></ul>© 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
    52. 52. © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty THANK YOU Orkash Services Pvt Ltd 75 C, Sector 18 Gurgaon 122 015 Haryana, India Phone: +91 124 4033773 +91 9833298292 [email_address] www.orkash.com

    ×