Michael Donaghey [email_address] www.cids.us 1-888-709-CIDS (2437)
“ Between 2001 and 2015 we will see a 70,000% increase in the areas under surveillance—all captured in motion video intell...
The Need Cognika Provides “Automated” PED Now! "The Army's ability to collect information far outpaces its ability to...
Projected Personnel Requirements <ul><ul><li>Current “imagery-centric” models and methodologies or traditional imagery ana...
Solution   Find, Analyze, and View All Data Sets audio video radar
Automated Approach  Searches, Analyzes and Utilizes ALL Types of Data <ul><ul><li>Multiple Media </li></ul></ul><ul><ul><u...
Cognika Solution <ul><ul><li>Reduces Analysts time Spent  Searching   for Relevant Data </li></ul></ul><ul><ul><li>Assists...
Powerful Toolkit for Querying and Interpretation Object   Identification (White SUV) Activity (Men Digging) Metadata (Time...
<ul><ul><li>Machine Learning </li></ul></ul><ul><ul><li>Latent Semantics </li></ul></ul><ul><ul><li>Reduce False Positives...
Automated Usage of Real Time IED Intel  IED/Bomb is detonated All intelligence is gathered, including images of the bomb a...
Connect the Dots Before the Blast Search by Device Part Numbers (Link to similar known devices)  Search by Image Search by...
Real-Time Alerts Email/Text  Intercept Call Intercept HUMINT UAV Video Forensic Analysis Intelligence Assessments REAL TIM...
Man Walking Man Walking With Weapon Activity Detection   Within Real Time Video CIDS can discern between men walking and m...
<ul><ul><li>Brings Real Time Intel to the Tactical Edge </li></ul></ul><ul><ul><ul><li>Near Real Time Indexing of ANY Data...
The System Training:  Query for ‘Men Gathering’ <ul><ul><li>Streamlined, Google-like interface </li></ul></ul><ul><ul><li>...
System Usage Men AND Truck Man AND Weapon Men Gathering Men Gathering AND Ramadi/Baquba Men Gathering Ramadi, Al-Anbar Pro...
Activity Timeline  <ul><li>Presents Significant Features of the OMNIX System </li></ul><ul><ul><li>Timeline Chart  that ca...
Activity Timeline Screen Shot
<ul><ul><li>Real Time Cross-Media Search, Discovery and Analysis </li></ul></ul><ul><ul><ul><li>Searches and Extracts Data...
Attack the Network CIDS puts the power of the information in the hands of the ANALYST <ul><ul><li>Real-Time FMV Search </l...
Upcoming SlideShare
Loading in …5
×

Cognika Technology Briefing

204 views
177 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
204
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • We are here today to introduce you to a powerful new software application that uses a mature technology to assist the Analyst with PED.
  • There are massive quantities of information acquired and stored from a myriad of sensors. It is nearly impossible for the Analyst to review it all. Quantity of data is expected to increase exponentially in the next few years. The Mission Requires an Automated Tool.
  • Based on data given by NGA it is impossible for the Analyst to keep up with the data available. Additionally it will be cost prohibitive to the Government to hire every Analyst required to conduct the PED of all the information that is now and becoming available.
  • Our systems finds, analyzes and presents real-time disparate data. CIDS real time output provides intel to the tactical edge.
  • CIDS allows user to see key differentiators. I.E. Weapon.
  • Using the CIDS software the Analyst can conduct PED against all of the available information allowing forces to be brought against the Network.
  • Cognika Technology Briefing

    1. 1. Michael Donaghey [email_address] www.cids.us 1-888-709-CIDS (2437)
    2. 2. “ Between 2001 and 2015 we will see a 70,000% increase in the areas under surveillance—all captured in motion video intelligence—yielding Yottabytes of video data.” - The Economist, 27 Feb 2010 NGA is currently storing over 20 million minutes of motion imagery
    3. 3. The Need Cognika Provides “Automated” PED Now! &quot;The Army's ability to collect information far outpaces its ability to use the information collected&quot; --‐ Lt Gen Richard P. Zahner &quot;We don't have enough time to discover data anymore. Especially when we are putting wide-area surveillance into country rapidly right now. We have to increase discover ability. We have to allow that analyst sitting on the ground looking at this massive amount of data, he or she does not have time to sift through all this stuff.&quot; --‐ Gen. Koziol &quot;Today an analyst sits there and stares at Death TV for hours on end trying to find the single target or see something move or see something do something that makes it a valid target. It is just a waste of manpower. It is inefficient.&quot; --‐ Gen. Cartwright &quot;Analysts spend 80% of their time researching, and only 20% of their time actually thinking about what that research means. Analysts need more time thinking and less time sifting&quot; --‐ Gen. Vincent Stewart &quot;We're not going to manpower our way out of this, we desperately need more automated tools.&quot; --‐ Maj Gen James Poss “ Not Enough Eyeballs, Not Enough Pipes, Not Enough Disks”
    4. 4. Projected Personnel Requirements <ul><ul><li>Current “imagery-centric” models and methodologies or traditional imagery analysis and storage do not scale to handle volume and velocity of FMV and other “INT” data currently being captured and stored world-wide </li></ul></ul><ul><ul><li>Number of analysts required to exploit imagery using traditional methods would be infeasible </li></ul></ul><ul><ul><li>Existing data storage constructs and bandwidth limitations do not support war fighters’ needs nor analysts ability to keep up with required information </li></ul></ul>Cognika Provides “Automated” PED Now! Source: National Geo-spatial Intelligence Agency “ NGA's Initiatives to Improve Motion Imagery Usage” [27-28] 17 November 2010 PED: Processing, Exploitation, Dissemination
    5. 5. Solution Find, Analyze, and View All Data Sets audio video radar
    6. 6. Automated Approach Searches, Analyzes and Utilizes ALL Types of Data <ul><ul><li>Multiple Media </li></ul></ul><ul><ul><ul><li>FMV </li></ul></ul></ul><ul><ul><ul><ul><li>Searches INSIDE Video for Data </li></ul></ul></ul></ul><ul><ul><ul><li>Documents </li></ul></ul></ul><ul><ul><ul><ul><li>PDF, HTML, MS Office, etc. </li></ul></ul></ul></ul><ul><ul><ul><li>Text </li></ul></ul></ul><ul><ul><ul><ul><li>Metadata </li></ul></ul></ul></ul><ul><ul><ul><li>HUMINT/SIGINT </li></ul></ul></ul><ul><ul><ul><li>Images </li></ul></ul></ul><ul><ul><li>Google-like Queries </li></ul></ul><ul><ul><ul><li>“ White Van AND Man” </li></ul></ul></ul><ul><ul><ul><li>Activity: Digging </li></ul></ul></ul><ul><ul><li>Scalable </li></ul></ul>Manage Information, Not Drown in it
    7. 7. Cognika Solution <ul><ul><li>Reduces Analysts time Spent Searching for Relevant Data </li></ul></ul><ul><ul><li>Assists Analysts in Finding Relevant Patterns inside Multiple Data Formats </li></ul></ul><ul><ul><li>Creates an Automated Data Management Tool </li></ul></ul><ul><ul><li>Simple and Accurate Output Leads to Time Sensitive Ability to Pursue Actionable Results </li></ul></ul><ul><ul><li>Accessible from laptops, mobile devices, PCs etc. </li></ul></ul>
    8. 8. Powerful Toolkit for Querying and Interpretation Object Identification (White SUV) Activity (Men Digging) Metadata (Time, Location, Etc) Flexible Customizable System
    9. 9. <ul><ul><li>Machine Learning </li></ul></ul><ul><ul><li>Latent Semantics </li></ul></ul><ul><ul><li>Reduce False Positives </li></ul></ul><ul><ul><li>Incremental Heuristic Search </li></ul></ul>Extracting and Analyzing Content For All Available Data Files
    10. 10. Automated Usage of Real Time IED Intel IED/Bomb is detonated All intelligence is gathered, including images of the bomb and detonation device CIDS Software Tool is run on all images and known data Results reveal similarities among previously catalogued bomb intelligence Bomb makers at location and their signature devices are highlighted by CIDS Software – Including Spatio-Temporal Reasoning
    11. 11. Connect the Dots Before the Blast Search by Device Part Numbers (Link to similar known devices) Search by Image Search by Attribute(s) Discovery at Cargo Screening Linked to Catalogued Bomb Making Devices Devices Linked to Known Bomb Maker
    12. 12. Real-Time Alerts Email/Text Intercept Call Intercept HUMINT UAV Video Forensic Analysis Intelligence Assessments REAL TIME Alerts and Analysis Utilizing all INT
    13. 13. Man Walking Man Walking With Weapon Activity Detection Within Real Time Video CIDS can discern between men walking and men walking with weapon. Robust system which limits rate of false positives
    14. 14. <ul><ul><li>Brings Real Time Intel to the Tactical Edge </li></ul></ul><ul><ul><ul><li>Near Real Time Indexing of ANY Data that s/w Accesses </li></ul></ul></ul><ul><ul><ul><ul><li>Alleviates the need for Large Centralized Storage </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Makes Data Input Instantly Available to All Users </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Index As-is, Where-Is </li></ul></ul></ul></ul><ul><ul><li>Works on Inexpensive Commodity Hardware </li></ul></ul><ul><ul><li>CIDS OMNIX Searches Large Scale Data Sets </li></ul></ul><ul><ul><ul><li>Architecture Based on Proven Commercial Scaling Methods </li></ul></ul></ul><ul><ul><ul><ul><li>Map-Reduce, as successfully utilized by AOL, Netflix etc. </li></ul></ul></ul></ul><ul><ul><li>Light Bandwidth Requirement </li></ul></ul><ul><ul><ul><li>Move Data As-Needed, When-Needed </li></ul></ul></ul><ul><ul><ul><li>XML, XSLT, JSON, PHP etc. Output formats </li></ul></ul></ul><ul><ul><ul><li>Caching Avoids Redundant Data Transfers </li></ul></ul></ul><ul><ul><ul><ul><li>Saves Bandwidth & Speeds Access </li></ul></ul></ul></ul>Key System Features
    15. 15. The System Training: Query for ‘Men Gathering’ <ul><ul><li>Streamlined, Google-like interface </li></ul></ul><ul><ul><li>Active monitoring chart </li></ul></ul><ul><ul><li>Database of “machine learned” activities, etc. </li></ul></ul><ul><ul><li>Simple point and click training for analysts </li></ul></ul>Men Gathering AND Ramadi/Baquba
    16. 16. System Usage Men AND Truck Man AND Weapon Men Gathering Men Gathering AND Ramadi/Baquba Men Gathering Ramadi, Al-Anbar Province 08/22/11 22:04:13 – 22:05:09 Five unidentified men leaving building, walking down street. Note: Known Bomb Maker at Location   Man AND Weapon Ramadi, Al-Anbar Province 08/09/11 02:48:18 - 03:52:42 Unidentified man walking down street Note: Man Digging and Weapon   Men AND Truck Baquba, Diyala Province 07/28/11 23:38:04 - 23:39:19 Five unidentified men walking, enter vehicle Note: Vehicle of Interest Tracked to Location Geo-location Intel Reports Imagery Video News
    17. 17. Activity Timeline <ul><li>Presents Significant Features of the OMNIX System </li></ul><ul><ul><li>Timeline Chart that captures all Activities, OOI’s etc and Presents them in a Simple User Interface </li></ul></ul><ul><ul><li>Allows user to choose what to Monitor and with a simple click, brings user to that Exact Section of the Video </li></ul></ul><ul><li>Date/Time Stamp for ease of reference </li></ul><ul><li>Confidence Level to eliminate false positive review </li></ul><ul><li>Color coding per object and activity for ease of reference </li></ul><ul><li>Descriptors visually pictured on screen </li></ul><ul><li>Video is played directly from each timeline ‘stamp’ with 1 click </li></ul>
    18. 18. Activity Timeline Screen Shot
    19. 19. <ul><ul><li>Real Time Cross-Media Search, Discovery and Analysis </li></ul></ul><ul><ul><ul><li>Searches and Extracts Data from Inside FMV, HUMINT/SIGINT/Text/PDF etc </li></ul></ul></ul><ul><ul><ul><li>Automated Real Time Indexing of ALL Data </li></ul></ul></ul><ul><ul><li>Simple Training + Interface – No Intel Expertise Required </li></ul></ul><ul><ul><li>Web-based, Desktop , Mobile Access Methods </li></ul></ul><ul><ul><li>Open, Simple API </li></ul></ul><ul><ul><ul><li>(REST or SOAP) </li></ul></ul></ul><ul><ul><li>Petascale Capabilities </li></ul></ul>Summary of Capabilities
    20. 20. Attack the Network CIDS puts the power of the information in the hands of the ANALYST <ul><ul><li>Real-Time FMV Search </li></ul></ul><ul><ul><li>Forensic Search </li></ul></ul><ul><ul><li>Change Detection </li></ul></ul><ul><ul><li>Multi INT Capabilities </li></ul></ul><ul><ul><li>Persistent Surveillance </li></ul></ul><ul><ul><li>Internet Exploitation </li></ul></ul><ul><ul><li>Information Operations </li></ul></ul><ul><ul><li>Incremental Heuristic Search </li></ul></ul><ul><ul><li>Intelligent Detection </li></ul></ul><ul><ul><ul><li>Activity </li></ul></ul></ul><ul><ul><ul><li>Object </li></ul></ul></ul>cids@cognika.com www.cids.us

    ×