Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Yossi cohen preso

547 views

Published on

The $100K Combating Terrorism Technology Startup Challenge, january 21st 2015

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Yossi cohen preso

  1. 1. © 2014 by Elbit Systems | Elbit Systems Proprietary Counter Terror Management System 1 Solution Overview
  2. 2. The Solution Goal The goal: Provide the complete solution for Management of National Security Service (NSS) operational lifecycle The goal: Provide the complete solution for Management of National Security Service (NSS) operational lifecycle 1. Mission Planning1. Mission Planning1. Mission Planning 5. Mission Debriefing 5. Mission Debriefing 5. Mission Debriefing © 2014 by Elbit Systems | Elbit Systems Proprietary Increased intelligent capabilities, operational efficiency, threats mitigation and, finally, country security and stability. Increased intelligent capabilities, operational efficiency, threats mitigation and, finally, country security and stability. 2. Intelligence Gathering 2. Intelligence Gathering 2. Intelligence Gathering 3. Intelligence Analysis & Research 3. Intelligence Analysis & Research 3. Intelligence Analysis & Research 4. Mission Execution and Control 4. Mission Execution and Control 4. Mission Execution and Control 2
  3. 3. WebPolice Intel CommintSigint Police SWATArmy Concept of Operations (CONOPS) © 2014 by Elbit Systems | Elbit Systems Proprietary Command & Control Command & Control ExploitationExploitation ProcessingProcessing AssessmentAssessment 3
  4. 4. Web Commint Military SystemsMilitary Systems Operational UnitsOperational Units Borders and PortsBorders and Ports Civil and policeCivil and police Crisis and rescueCrisis and rescue Comm AnalysisComm Analysis WebWeb Civil Information Sources © 2014 by Elbit Systems | Elbit Systems Proprietary Rescue Operation Center Police Intel Sigint 4
  5. 5. 10/08/2011 12:35 – internet discussion is intercepted and processed – discussing possible weapons smuggling occurring in the next 2 weeks 10/08/2011 12:55 – text is analyzed, compared with intelligence databases and as a result a general alert is issued and distributed to all air and sea ports 12/08/2011 22:25 – A Person related to the weapons smuggling group has entered the country via local airport the person was identified as the group leader via link analysis 12/08/2011 22:45 – The suspected person is visually identified and compared to known suspects data base 12/08/2011 22:35 – The suspect is driving to an address down town and constantly monitored and tracked using mobile and visual tracking Operational Scenario © 2014 by Elbit Systems | Elbit Systems Proprietary5
  6. 6. 12/08/2011 22:45 – The forces seal the area and takes over the house – the operation center coordinates the operation. Operational Scenario 12/08/2011 22:40 – The suspected vehicle rich the destination12/08/2011 22:45 – The mission is completed - all the involved persons arrested © 2014 by Elbit Systems | Elbit Systems Proprietary6
  7. 7. Solution Scope Regional Operation Center Intelligence Security Agencies Governmental Agencies National Operation Center Operation Centers Counter-Terror Field Units Communication & Logistics Vehicle © 2014 by Elbit Systems | Elbit Systems Proprietary Command Post Deployed Kit Airborne Platform CTU Group 2CTU Group 3 CTU Group 1 Observation Group Logistics Vehicle 7
  8. 8. Stationary Operation Center Stationary Command Operation Center provides a variety of data, voice and video services within the overall C4I solution Stationary Operation Center © 2014 by Elbit Systems | Elbit Systems Proprietary Data Center Communication Center 8
  9. 9. Mobile Command Center Storage Server Tetra /HF Radios Switch Workstation Database Recording System Advanced command Post which incorporates Communication, Software and Hardware systems in support of the Command Operation Center operational workflow ROIP © 2014 by Elbit Systems | Elbit Systems Proprietary Key Features: Command Post, including: Commanders and Staff Advanced workspaces. Integrated C4I Command Post Facilities, including: Workstations, Projector, Public Address system and various telecommunication and computerized hardware equipments. 10 Working Places equipped with state-of-the-art Multimedia equipment (Remote Radio, Telephony, etc). Self-Supported Energy & Climate control Self-Contained, and truck transportable. Hardware Components Software Components Communication Components Public-Address IP Telephone Application ROIP 9
  10. 10. Integrated Radio Communication Integrated Radio Communications enables interconnectivity and interoperability of various types of telecommunication networks media, including: Cellular , TETRA/P.25, Radio (HF, VHF, UHF) networks, Satellite, LAN, WAN and Telephony © 2014 by Elbit Systems | Elbit Systems Proprietary HF VHF UHF 10
  11. 11. Mobile units 10:53 (+2:50) 125M Recon 1: Target is located © 2014 by Elbit Systems | Elbit Systems Proprietary Integrated C2 11
  12. 12. Intelligence Capabilities • Unified Data Modeling • Text Analytics • Entity Extraction • Search and Indexing Tools • Link Discovery Data Exploitation & Processing Intelligence Procurement & Acquisition • PIR(Prioritized Information Request) Management • Mission (e.g. Intelligence) Control • Sensor Management © 2014 by Elbit Systems | Elbit Systems Proprietary • Report Generation • Data & Video Archiving • Integrated GIS • Link Analysis • Pattern Matching • Data Mining Tools • Application Modeling Tools • Integrated Business Intelligence (BI) Unified Intelligence Analysis & Research Management, Display and Production Tools • Link Discovery 12
  13. 13. • Operation Management • Resources(e.g. Task teams, Command Posts) Management • Joint Tasks Allocation Mission Planning • Common Operational Picture • Own Forces & Enemy Forces Mission Control & Execution Command and Control Capabilities © 2014 by Elbit Systems | Elbit Systems Proprietary • Own Forces & Enemy Forces • Event Management including online monitoring • Video integration in the C2 application • After action review • Record and Replay Tools • Reports Generation • Training & Simulation Mission Debrief 13

×