Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cognika Technology Briefing


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

Cognika Technology Briefing

  1. 1. Michael Donaghey [email_address] 1-888-709-CIDS (2437)
  2. 2. “ Between 2001 and 2015 we will see a 70,000% increase in the areas under surveillance—all captured in motion video intelligence—yielding Yottabytes of video data.” - The Economist, 27 Feb 2010 NGA is currently storing over 20 million minutes of motion imagery
  3. 3. The Need Cognika Provides “Automated” PED Now! "The Army's ability to collect information far outpaces its ability to use the information collected" --‐ Lt Gen Richard P. Zahner "We don't have enough time to discover data anymore. Especially when we are putting wide-area surveillance into country rapidly right now. We have to increase discover ability. We have to allow that analyst sitting on the ground looking at this massive amount of data, he or she does not have time to sift through all this stuff." --‐ Gen. Koziol "Today an analyst sits there and stares at Death TV for hours on end trying to find the single target or see something move or see something do something that makes it a valid target. It is just a waste of manpower. It is inefficient." --‐ Gen. Cartwright "Analysts spend 80% of their time researching, and only 20% of their time actually thinking about what that research means. Analysts need more time thinking and less time sifting" --‐ Gen. Vincent Stewart "We're not going to manpower our way out of this, we desperately need more automated tools." --‐ Maj Gen James Poss “ Not Enough Eyeballs, Not Enough Pipes, Not Enough Disks”
  4. 4. Projected Personnel Requirements <ul><ul><li>Current “imagery-centric” models and methodologies or traditional imagery analysis and storage do not scale to handle volume and velocity of FMV and other “INT” data currently being captured and stored world-wide </li></ul></ul><ul><ul><li>Number of analysts required to exploit imagery using traditional methods would be infeasible </li></ul></ul><ul><ul><li>Existing data storage constructs and bandwidth limitations do not support war fighters’ needs nor analysts ability to keep up with required information </li></ul></ul>Cognika Provides “Automated” PED Now! Source: National Geo-spatial Intelligence Agency “ NGA's Initiatives to Improve Motion Imagery Usage” [27-28] 17 November 2010 PED: Processing, Exploitation, Dissemination
  5. 5. Solution Find, Analyze, and View All Data Sets audio video radar
  6. 6. Automated Approach Searches, Analyzes and Utilizes ALL Types of Data <ul><ul><li>Multiple Media </li></ul></ul><ul><ul><ul><li>FMV </li></ul></ul></ul><ul><ul><ul><ul><li>Searches INSIDE Video for Data </li></ul></ul></ul></ul><ul><ul><ul><li>Documents </li></ul></ul></ul><ul><ul><ul><ul><li>PDF, HTML, MS Office, etc. </li></ul></ul></ul></ul><ul><ul><ul><li>Text </li></ul></ul></ul><ul><ul><ul><ul><li>Metadata </li></ul></ul></ul></ul><ul><ul><ul><li>HUMINT/SIGINT </li></ul></ul></ul><ul><ul><ul><li>Images </li></ul></ul></ul><ul><ul><li>Google-like Queries </li></ul></ul><ul><ul><ul><li>“ White Van AND Man” </li></ul></ul></ul><ul><ul><ul><li>Activity: Digging </li></ul></ul></ul><ul><ul><li>Scalable </li></ul></ul>Manage Information, Not Drown in it
  7. 7. Cognika Solution <ul><ul><li>Reduces Analysts time Spent Searching for Relevant Data </li></ul></ul><ul><ul><li>Assists Analysts in Finding Relevant Patterns inside Multiple Data Formats </li></ul></ul><ul><ul><li>Creates an Automated Data Management Tool </li></ul></ul><ul><ul><li>Simple and Accurate Output Leads to Time Sensitive Ability to Pursue Actionable Results </li></ul></ul><ul><ul><li>Accessible from laptops, mobile devices, PCs etc. </li></ul></ul>
  8. 8. Powerful Toolkit for Querying and Interpretation Object Identification (White SUV) Activity (Men Digging) Metadata (Time, Location, Etc) Flexible Customizable System
  9. 9. <ul><ul><li>Machine Learning </li></ul></ul><ul><ul><li>Latent Semantics </li></ul></ul><ul><ul><li>Reduce False Positives </li></ul></ul><ul><ul><li>Incremental Heuristic Search </li></ul></ul>Extracting and Analyzing Content For All Available Data Files
  10. 10. Automated Usage of Real Time IED Intel IED/Bomb is detonated All intelligence is gathered, including images of the bomb and detonation device CIDS Software Tool is run on all images and known data Results reveal similarities among previously catalogued bomb intelligence Bomb makers at location and their signature devices are highlighted by CIDS Software – Including Spatio-Temporal Reasoning
  11. 11. Connect the Dots Before the Blast Search by Device Part Numbers (Link to similar known devices) Search by Image Search by Attribute(s) Discovery at Cargo Screening Linked to Catalogued Bomb Making Devices Devices Linked to Known Bomb Maker
  12. 12. Real-Time Alerts Email/Text Intercept Call Intercept HUMINT UAV Video Forensic Analysis Intelligence Assessments REAL TIME Alerts and Analysis Utilizing all INT
  13. 13. Man Walking Man Walking With Weapon Activity Detection Within Real Time Video CIDS can discern between men walking and men walking with weapon. Robust system which limits rate of false positives
  14. 14. <ul><ul><li>Brings Real Time Intel to the Tactical Edge </li></ul></ul><ul><ul><ul><li>Near Real Time Indexing of ANY Data that s/w Accesses </li></ul></ul></ul><ul><ul><ul><ul><li>Alleviates the need for Large Centralized Storage </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Makes Data Input Instantly Available to All Users </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Index As-is, Where-Is </li></ul></ul></ul></ul><ul><ul><li>Works on Inexpensive Commodity Hardware </li></ul></ul><ul><ul><li>CIDS OMNIX Searches Large Scale Data Sets </li></ul></ul><ul><ul><ul><li>Architecture Based on Proven Commercial Scaling Methods </li></ul></ul></ul><ul><ul><ul><ul><li>Map-Reduce, as successfully utilized by AOL, Netflix etc. </li></ul></ul></ul></ul><ul><ul><li>Light Bandwidth Requirement </li></ul></ul><ul><ul><ul><li>Move Data As-Needed, When-Needed </li></ul></ul></ul><ul><ul><ul><li>XML, XSLT, JSON, PHP etc. Output formats </li></ul></ul></ul><ul><ul><ul><li>Caching Avoids Redundant Data Transfers </li></ul></ul></ul><ul><ul><ul><ul><li>Saves Bandwidth & Speeds Access </li></ul></ul></ul></ul>Key System Features
  15. 15. The System Training: Query for ‘Men Gathering’ <ul><ul><li>Streamlined, Google-like interface </li></ul></ul><ul><ul><li>Active monitoring chart </li></ul></ul><ul><ul><li>Database of “machine learned” activities, etc. </li></ul></ul><ul><ul><li>Simple point and click training for analysts </li></ul></ul>Men Gathering AND Ramadi/Baquba
  16. 16. System Usage Men AND Truck Man AND Weapon Men Gathering Men Gathering AND Ramadi/Baquba Men Gathering Ramadi, Al-Anbar Province 08/22/11 22:04:13 – 22:05:09 Five unidentified men leaving building, walking down street. Note: Known Bomb Maker at Location   Man AND Weapon Ramadi, Al-Anbar Province 08/09/11 02:48:18 - 03:52:42 Unidentified man walking down street Note: Man Digging and Weapon   Men AND Truck Baquba, Diyala Province 07/28/11 23:38:04 - 23:39:19 Five unidentified men walking, enter vehicle Note: Vehicle of Interest Tracked to Location Geo-location Intel Reports Imagery Video News
  17. 17. Activity Timeline <ul><li>Presents Significant Features of the OMNIX System </li></ul><ul><ul><li>Timeline Chart that captures all Activities, OOI’s etc and Presents them in a Simple User Interface </li></ul></ul><ul><ul><li>Allows user to choose what to Monitor and with a simple click, brings user to that Exact Section of the Video </li></ul></ul><ul><li>Date/Time Stamp for ease of reference </li></ul><ul><li>Confidence Level to eliminate false positive review </li></ul><ul><li>Color coding per object and activity for ease of reference </li></ul><ul><li>Descriptors visually pictured on screen </li></ul><ul><li>Video is played directly from each timeline ‘stamp’ with 1 click </li></ul>
  18. 18. Activity Timeline Screen Shot
  19. 19. <ul><ul><li>Real Time Cross-Media Search, Discovery and Analysis </li></ul></ul><ul><ul><ul><li>Searches and Extracts Data from Inside FMV, HUMINT/SIGINT/Text/PDF etc </li></ul></ul></ul><ul><ul><ul><li>Automated Real Time Indexing of ALL Data </li></ul></ul></ul><ul><ul><li>Simple Training + Interface – No Intel Expertise Required </li></ul></ul><ul><ul><li>Web-based, Desktop , Mobile Access Methods </li></ul></ul><ul><ul><li>Open, Simple API </li></ul></ul><ul><ul><ul><li>(REST or SOAP) </li></ul></ul></ul><ul><ul><li>Petascale Capabilities </li></ul></ul>Summary of Capabilities
  20. 20. Attack the Network CIDS puts the power of the information in the hands of the ANALYST <ul><ul><li>Real-Time FMV Search </li></ul></ul><ul><ul><li>Forensic Search </li></ul></ul><ul><ul><li>Change Detection </li></ul></ul><ul><ul><li>Multi INT Capabilities </li></ul></ul><ul><ul><li>Persistent Surveillance </li></ul></ul><ul><ul><li>Internet Exploitation </li></ul></ul><ul><ul><li>Information Operations </li></ul></ul><ul><ul><li>Incremental Heuristic Search </li></ul></ul><ul><ul><li>Intelligent Detection </li></ul></ul><ul><ul><ul><li>Activity </li></ul></ul></ul><ul><ul><ul><li>Object </li></ul></ul></ul>