Cognika Briefing

Uploaded on

Cognika Intelligence & Defense Solutions

Cognika Intelligence & Defense Solutions

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. Michael DonagheyMdonaghey@cognika.comwww.cids.us1-888-709-CIDS (2437)
  • 2. NGA is currently storing over 20 million minutes of motion imagery“Between 2001 and 2015 we will see a 70,000% increase in the areas undersurveillance—all captured in motionvideo intelligence—yielding Yottabytes of video data.” - The Economist, 27 Feb 2010
  • 3. The Need "The Armys ability to collect information far outpaces its ability to use the information collected" --‐ Lt Gen Richard P. Zahner "We dont have enough time to discover data anymore. Especially when we are putting wide-area surveillance into country rapidly right now. We have to increase discover ability. We have to allow that analyst sitting on the ground looking at this massive amount of data, he or she does not have time to sift through all this stuff." --‐ Gen. Koziol "Today an analyst sits there and stares at Death TV for hours on end trying to find the single target or see something move or see something do something that makes it a valid target. It is just a waste of manpower. It is inefficient." --‐ Gen. Cartwright "Analysts spend 80% of their time researching, and only 20% of their time actually thinking about what that research means. Analysts need more time thinking and less time sifting" --‐ Gen. Vincent Stewart "Were not going to manpower our way out of this, we desperately need more automated tools." --‐ Maj Gen James Poss Cognika Provides “Automated” PED Now!“Not Enough Eyeballs, Not Enough Pipes, Not Enough Disks”
  • 4. Projected Personnel Requirements● Current “imagery-centric” models and methodologies or traditional imagery analysis and storage do not scale to handle volume and velocity of FMV and other “INT” data currently being captured and stored world-wide● Number of analysts required to exploit imagery using traditional methods would be infeasible● Existing data storage constructs and bandwidth limitations do not support war fighters’ needs nor analysts ability to keep PED: Processing, Exploitation, Dissemination Source: National Geo-spatial Intelligence Agency up with required information “NGAs Initiatives to Improve Motion Imagery Usage” [27-28] 17 November 2010 Cognika Provides “Automated” PED Now!
  • 5. SolutionFind, Analyze, and View All Data Sets audio video radar
  • 6. Automated Approach Searches, Analyzes and Utilizes ALL Types of Data● Multiple Media ○ FMV ■ Searches INSIDE Video for Data ○ Documents ■ PDF, HTML, MS Office, etc. ○ Text ■ Metadata ○ HUMINT/SIGINT Manage Information, ○ Images Not Drown in it● Google-like Queries ○ “White Van AND Man” ○ Activity: Digging● Scalable
  • 7. Cognika Solution● Reduces Analysts time Spent Searching for Relevant Data● Assists Analysts in Finding Relevant Patterns inside Multiple Data Formats● Creates an Automated Data Management Tool● Simple and Accurate Output Leads to Time Sensitive Ability to Pursue Actionable Results● Accessible from laptops, mobile devices, PCs etc.
  • 8. Flexible Customizable System Object Identification (White SUV) Activity (Men Digging)Powerful Toolkit for Metadata Querying and (Time, Location, Etc) Interpretation
  • 9. Activity Detection Within Real Time Video Man Walking Man Walking With WeaponCIDS can discern between men walking and men walking with weapon. Robust system which limits rate of false positives
  • 10. REAL TIME Alerts and Analysis Utilizing all INT Email/Text Real-Time Alerts Intercept Call Intercept Intelligence Assessments HUMINT Forensic Analysis UAV Video
  • 11. Extracting and Analyzing Content For All Available Data Files● Machine Learning● Latent Semantics● Reduce False Positives● Incremental Heuristic Search
  • 12. Key System Features● Brings Real Time Intel to the Tactical Edge ○ Near Real Time Indexing of ANY Data that s/w Accesses ■ Alleviates the need for Large Centralized Storage ■ Makes Data Input Instantly Available to All Users ■ Index As-is, Where-Is● Works on Inexpensive Commodity Hardware● CIDS OMNIX Searches Large Scale Data Sets ○ Architecture Based on Proven Commercial Scaling Methods ■ Map-Reduce, as successfully utilized by AOL, Netflix etc.● Light Bandwidth Requirement ○ Move Data As-Needed, When-Needed ○ XML, XSLT, JSON, PHP etc. Output formats ○ Caching Avoids Redundant Data Transfers ■ Saves Bandwidth & Speeds Access
  • 13. The System Men Gathering AND Ramadi/BaqubaTraining:Query for ‘Men Gathering’ ● Streamlined, Google-like interface ● Active monitoring chart ● Database of “machine learned” activities, etc. ● Simple point and click training for analysts
  • 14. System Usage Men Gathering AND Ramadi/BaqubaGeo- Men Gatheringlocation Ramadi, Al-Anbar ProvinceIntel 08/22/11 22:04:13 – 22:05:09Reports Five unidentified men leaving building, Men GatheringImagery walking down street. Note: Known Bomb Maker atVideo LocationNews Man AND Weapon Ramadi, Al-Anbar Province 08/09/11 02:48:18 - 03:52:42 Unidentified man walking down street Man AND Weapon Note: Man Digging and Weapon Men AND Truck Baquba, Diyala Province 07/28/11 23:38:04 - 23:39:19 Five unidentified men walking, enter vehicle Note: Vehicle of Interest Tracked to Location Men AND Truck
  • 15. Summary of Capabilities● Real Time Cross-Media Search, Discovery and Analysis ○ Searches and Extracts Data from Inside FMV, HUMINT/SIGINT/Text/PDF etc ○ Automated Real Time Indexing of ALL Data● Simple Training + Interface – No Intel Expertise Required● Web-based, Desktop , Mobile Access Methods● Open, Simple API ○ (REST or SOAP)● Petascale Capabilities
  • 16. Attack the NetworkCIDS puts the power of the information in the hands of the ANALYST ● Real-Time FMV Search ● Forensic Search ● Change Detection ● Multi INT Capabilities ● Persistent Surveillance ● Internet Exploitation ● Information Operations ● Incremental Heuristic Search ● Intelligent Detection ○ Activity ○ Object