SlideShare a Scribd company logo
1 of 20
Michael Donaghey [email_address] www.cids.us 1-888-709-CIDS (2437)
“ Between 2001 and 2015 we will see a 70,000% increase in the areas under surveillance—all captured in motion video intelligence—yielding Yottabytes of video data.”  - The Economist, 27 Feb 2010 NGA is currently storing over 20 million minutes of motion imagery
The Need Cognika Provides “Automated” PED Now! "The Army's ability to collect information far outpaces its ability to use the information collected"  --‐  Lt Gen Richard P. Zahner "We don't have enough time to discover data anymore. Especially when we are putting wide-area surveillance into country rapidly right now. We have to increase discover ability. We have to allow that analyst sitting on the ground looking at this massive amount of data, he or she does not have time to sift through all this stuff." --‐ Gen. Koziol "Today an analyst sits there and stares at Death TV for hours on end trying to find the single target or see something move or see something do something that makes it a valid target. It is just a waste of manpower. It is inefficient."  --‐ Gen. Cartwright "Analysts spend 80% of their time researching, and only 20% of their time actually thinking about what that research means. Analysts need more time thinking and less time sifting"  --‐ Gen. Vincent Stewart "We're not going to manpower our way out of this, we desperately need more automated tools."  --‐ Maj Gen James Poss “ Not Enough Eyeballs, Not Enough Pipes, Not Enough Disks”
Projected Personnel Requirements ,[object Object],[object Object],[object Object],Cognika Provides “Automated” PED Now! Source: National Geo-spatial Intelligence Agency  “ NGA's Initiatives to Improve Motion Imagery Usage” [27-28]  17 November 2010 PED: Processing, Exploitation, Dissemination
Solution   Find, Analyze, and View All Data Sets audio video radar
Automated Approach  Searches, Analyzes and Utilizes ALL Types of Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Manage Information,  Not Drown in it
Cognika Solution ,[object Object],[object Object],[object Object],[object Object],[object Object]
Powerful Toolkit for Querying and Interpretation Object   Identification (White SUV) Activity (Men Digging) Metadata (Time, Location, Etc) Flexible Customizable System
[object Object],[object Object],[object Object],[object Object],Extracting and Analyzing Content For All Available Data Files
Automated Usage of Real Time IED Intel  IED/Bomb is detonated All intelligence is gathered, including images of the bomb and detonation device CIDS Software Tool is run on all images and known data Results reveal similarities among previously catalogued bomb intelligence Bomb makers at location and their  signature devices  are highlighted by CIDS Software – Including Spatio-Temporal Reasoning
Connect the Dots Before the Blast Search by Device Part Numbers (Link to similar known devices)  Search by Image Search by Attribute(s) Discovery at Cargo Screening Linked to Catalogued Bomb Making Devices Devices Linked to Known Bomb Maker
Real-Time Alerts Email/Text  Intercept Call Intercept HUMINT UAV Video Forensic Analysis Intelligence Assessments REAL TIME Alerts and Analysis Utilizing all INT
Man Walking Man Walking With Weapon Activity Detection   Within Real Time Video CIDS can discern between men walking and men walking with weapon. Robust system which limits rate of false positives
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Key System Features
The System Training:  Query for ‘Men Gathering’ ,[object Object],[object Object],[object Object],[object Object],Men Gathering AND Ramadi/Baquba
System Usage Men AND Truck Man AND Weapon Men Gathering Men Gathering AND Ramadi/Baquba Men Gathering Ramadi, Al-Anbar Province 08/22/11  22:04:13 – 22:05:09 Five unidentified men leaving building, walking down street. Note: Known Bomb Maker at Location    Man AND Weapon Ramadi, Al-Anbar Province 08/09/11  02:48:18 - 03:52:42 Unidentified man walking down street Note: Man Digging and Weapon   Men AND Truck Baquba, Diyala Province 07/28/11  23:38:04 - 23:39:19 Five unidentified men walking, enter vehicle Note: Vehicle of Interest   Tracked to Location Geo-location Intel Reports Imagery Video News
Activity Timeline  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Activity Timeline Screen Shot
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Summary of Capabilities
Attack the Network CIDS puts the power of the information in the hands of the ANALYST ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],cids@cognika.com  www.cids.us

More Related Content

Similar to Cognika Technology Briefing

ICU WORKBENCH - The Art of Where
ICU WORKBENCH - The Art of WhereICU WORKBENCH - The Art of Where
ICU WORKBENCH - The Art of WhereG2 Research Ltd.
 
Realtime Big Data Analytics for Event Detection in Highways
Realtime Big Data Analytics for Event Detection in HighwaysRealtime Big Data Analytics for Event Detection in Highways
Realtime Big Data Analytics for Event Detection in HighwaysYork University
 
Comparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction ToolsComparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction Toolsijtsrd
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleSai Janakiram Penumuru
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonCisco DevNet
 
MCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformMCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformSean Ben
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligenceabhisheksinghcs
 
A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniquesijtsrd
 
Next Century Project Overview
Next Century Project OverviewNext Century Project Overview
Next Century Project Overviewjennhunter
 
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimThree mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimDaeyoung Kim
 
Big data - What is It?
Big data - What is It?Big data - What is It?
Big data - What is It?Nicole Aidney
 
Csec 650 individual assignment i
Csec 650 individual assignment iCsec 650 individual assignment i
Csec 650 individual assignment iDominique Briscoe
 
Why Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringWhy Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringDevOps.com
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and ChallengesAhmed Banafa
 
Mimos indoor location platform 2 feb2017
Mimos indoor location platform 2 feb2017Mimos indoor location platform 2 feb2017
Mimos indoor location platform 2 feb2017David Chieng
 
MBA-TU-Thailand:BigData for business startup.
MBA-TU-Thailand:BigData for business startup.MBA-TU-Thailand:BigData for business startup.
MBA-TU-Thailand:BigData for business startup.stelligence
 

Similar to Cognika Technology Briefing (20)

ICU WORKBENCH - The Art of Where
ICU WORKBENCH - The Art of WhereICU WORKBENCH - The Art of Where
ICU WORKBENCH - The Art of Where
 
icuWorkbench - Use cases
icuWorkbench - Use casesicuWorkbench - Use cases
icuWorkbench - Use cases
 
Realtime Big Data Analytics for Event Detection in Highways
Realtime Big Data Analytics for Event Detection in HighwaysRealtime Big Data Analytics for Event Detection in Highways
Realtime Big Data Analytics for Event Detection in Highways
 
Guru_poster
Guru_posterGuru_poster
Guru_poster
 
Comparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction ToolsComparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction Tools
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with Oracle
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
 
IOT Forensics
IOT ForensicsIOT Forensics
IOT Forensics
 
MCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformMCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence Platform
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligence
 
A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniques
 
Big data
Big dataBig data
Big data
 
Next Century Project Overview
Next Century Project OverviewNext Century Project Overview
Next Century Project Overview
 
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimThree mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
 
Big data - What is It?
Big data - What is It?Big data - What is It?
Big data - What is It?
 
Csec 650 individual assignment i
Csec 650 individual assignment iCsec 650 individual assignment i
Csec 650 individual assignment i
 
Why Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringWhy Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network Monitoring
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and Challenges
 
Mimos indoor location platform 2 feb2017
Mimos indoor location platform 2 feb2017Mimos indoor location platform 2 feb2017
Mimos indoor location platform 2 feb2017
 
MBA-TU-Thailand:BigData for business startup.
MBA-TU-Thailand:BigData for business startup.MBA-TU-Thailand:BigData for business startup.
MBA-TU-Thailand:BigData for business startup.
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Cognika Technology Briefing

  • 1. Michael Donaghey [email_address] www.cids.us 1-888-709-CIDS (2437)
  • 2. “ Between 2001 and 2015 we will see a 70,000% increase in the areas under surveillance—all captured in motion video intelligence—yielding Yottabytes of video data.” - The Economist, 27 Feb 2010 NGA is currently storing over 20 million minutes of motion imagery
  • 3. The Need Cognika Provides “Automated” PED Now! "The Army's ability to collect information far outpaces its ability to use the information collected" --‐ Lt Gen Richard P. Zahner "We don't have enough time to discover data anymore. Especially when we are putting wide-area surveillance into country rapidly right now. We have to increase discover ability. We have to allow that analyst sitting on the ground looking at this massive amount of data, he or she does not have time to sift through all this stuff." --‐ Gen. Koziol "Today an analyst sits there and stares at Death TV for hours on end trying to find the single target or see something move or see something do something that makes it a valid target. It is just a waste of manpower. It is inefficient." --‐ Gen. Cartwright "Analysts spend 80% of their time researching, and only 20% of their time actually thinking about what that research means. Analysts need more time thinking and less time sifting" --‐ Gen. Vincent Stewart "We're not going to manpower our way out of this, we desperately need more automated tools." --‐ Maj Gen James Poss “ Not Enough Eyeballs, Not Enough Pipes, Not Enough Disks”
  • 4.
  • 5. Solution Find, Analyze, and View All Data Sets audio video radar
  • 6.
  • 7.
  • 8. Powerful Toolkit for Querying and Interpretation Object Identification (White SUV) Activity (Men Digging) Metadata (Time, Location, Etc) Flexible Customizable System
  • 9.
  • 10. Automated Usage of Real Time IED Intel IED/Bomb is detonated All intelligence is gathered, including images of the bomb and detonation device CIDS Software Tool is run on all images and known data Results reveal similarities among previously catalogued bomb intelligence Bomb makers at location and their signature devices are highlighted by CIDS Software – Including Spatio-Temporal Reasoning
  • 11. Connect the Dots Before the Blast Search by Device Part Numbers (Link to similar known devices) Search by Image Search by Attribute(s) Discovery at Cargo Screening Linked to Catalogued Bomb Making Devices Devices Linked to Known Bomb Maker
  • 12. Real-Time Alerts Email/Text Intercept Call Intercept HUMINT UAV Video Forensic Analysis Intelligence Assessments REAL TIME Alerts and Analysis Utilizing all INT
  • 13. Man Walking Man Walking With Weapon Activity Detection Within Real Time Video CIDS can discern between men walking and men walking with weapon. Robust system which limits rate of false positives
  • 14.
  • 15.
  • 16. System Usage Men AND Truck Man AND Weapon Men Gathering Men Gathering AND Ramadi/Baquba Men Gathering Ramadi, Al-Anbar Province 08/22/11 22:04:13 – 22:05:09 Five unidentified men leaving building, walking down street. Note: Known Bomb Maker at Location   Man AND Weapon Ramadi, Al-Anbar Province 08/09/11 02:48:18 - 03:52:42 Unidentified man walking down street Note: Man Digging and Weapon   Men AND Truck Baquba, Diyala Province 07/28/11 23:38:04 - 23:39:19 Five unidentified men walking, enter vehicle Note: Vehicle of Interest Tracked to Location Geo-location Intel Reports Imagery Video News
  • 17.
  • 19.
  • 20.

Editor's Notes

  1. We are here today to introduce you to a powerful new software application that uses a mature technology to assist the Analyst with PED.
  2. There are massive quantities of information acquired and stored from a myriad of sensors. It is nearly impossible for the Analyst to review it all. Quantity of data is expected to increase exponentially in the next few years. The Mission Requires an Automated Tool.
  3. Based on data given by NGA it is impossible for the Analyst to keep up with the data available. Additionally it will be cost prohibitive to the Government to hire every Analyst required to conduct the PED of all the information that is now and becoming available.
  4. Our systems finds, analyzes and presents real-time disparate data. CIDS real time output provides intel to the tactical edge.
  5. CIDS allows user to see key differentiators. I.E. Weapon.
  6. Using the CIDS software the Analyst can conduct PED against all of the available information allowing forces to be brought against the Network.