Download here >> https://www.homelandsecurityweek.com/downloads/intelligence-analytics-ebook-how-dhs-the-dod-are-leveraging-intelligence-analytics-to-protect-the-homeland
How is the US Government, from the military to DHS to law enforcement agencies, leveraging intelligent analytics to strengthen national security? Find out in our comprehensive e-book that covers key intelligence analytics budget priorities for the year ahead as well as 3+ case studies on how streamlining analytics and integrating systems will optimize your ability to process, utilize and circulate intelligence.
2. Table of Contents
Intelligence Analytics in the News3.
Page
Intelligence Budget for FY 2018 Infographic6.
7.
12.
25.
48.
Sustaining Our Long-Term Competitive Advantage Through
Intelligence and Data Analytics,
Leveraging Information and Joint Operations to Enhance the
Nation’s Defense
Battlespace Awareness and Information Operations Program
Office (PMW 120) for Intelligence Analytics 2018 Meeting
Intelligence Analytics at DHS: FY19 Budget Highlights
About the 2018 Homeland Security Week62.
3. I N T E L L I G E N T
A N A L Y T I C S
I N T H E N E W S
Y O U R C H E A T S H E E T F O R T H E L A T E S T O N
H O W G O V E R N M E N T A G E N C I E S A R E
L E V E R A G I N G I N T E L L I G E N C E A N A L Y T I C S
T O B E T T E R S E C U R E T H E H O M E L A N D .
CLICK ON THE PICS TO BE REDIRECTED
TO THE ARTICLE
www.homelandsecurityweek.com/
4. Accenture surveyed 6,381 executives and 18 industries in 25 countries to
find the technology trends that will have the greatest impact on
companies, federal government and public service agencies.
Intelligence Analytics Toolbox
Five Technology Trends shaping the Future of
Government
Another Defense Agency to Tap CIA's Commercial
Cloud
Documents indicate the Army’s National Ground Intelligence Center aims
to provision secret and top secret cloud services from the Amazon-developed
C2S Cloud.
What the U.S. Air Force wants out of artificial intelligence — and an
exclusive look into its next project to fuse everything.
‘Wouldn’t It Be Great If We Could Shoot Someone
in the Face at 200 Kilometers?’
Beyond delivering the latest in headlines, cute animal videos and
presidential firings, Twitter may play an important role in helping public
health officials predict emerging biothreats.
Winner of DHS’s Hidden Signals challenge uses
Twitter to Predict Biothreats
Palmer Luckey’s Border Control Tech has Already
Caught Dozens of People
DHS Spotlight
Oculus is touting a surveillance system called Lattice that would survey
the motion of potential border-crossers from up to two miles away.
www.homelandsecurityweek.com/
5. A B O U T H O M E L A N D S E C U R I T Y W E E K
A G E N D A P R I C I N G S P O N S O R
DHS Wants to Take a Page from the Startup Community
The Homeland Security Department is constantly developing new technology to
keep pace with the latest national security threats, and it’s relying on strategies
from tech startups to do so, according to the agency’s research and development
leader.
S&T Directorate Developing Algorithms to ID Child
Exploitation Victims
DHS Funds Cyber Data Research
DHS S&T Analytics are Helping to Secure
American Skies (Multi-Video)
To gain an accurate assessment of current air surveillance capabilities and how
they operate together, DHS S&T is creating standards for air surveillance,
known as DHS (Interim) Strategic Air Surveillance Requirements (I)SASR.
S&T has initiated a project to design, develop, test, and integrate new face
detection and recognition algorithms for use in identifying victims of child
pornography circulating on the dark web.
Federal cyber defenders are taking a data-centric approach in their efforts to
boost cyber defense research, distributing more than $5.6 million in contracts
focused on new ways to collect data on hacking attempts that can eventually be
used to counter those threats.
www.homelandsecurityweek.com/
October 22-24, 2018 // Washington, D.C.
6. Everything You Need to Know About
the $5 Billion Increase in the U.S.
Intelligence Budget for FY 2018
The United States intelligence budget comprises all the funding for the agencies of the United States Intelligence
Trump administration requested $57.7 billion for the National Intelligence Program (NIP), an increase from a re-
quested $54.9 billion in FY 2017. The Administration additionally requested $20.7 billion for the Military Intelligence
Program (MIP), up from a requested $18.5 billion in FY 2017. No other MIP budget figures or program details will
be released, as they are classified for national security reasons.
Central Intelligence Agency
Estimated $13 Billion
The CIA is the most recognized intelligence
agency, known for spying on foreign
governments and conducting covert operations.
Its primary stated mission is to collect, evaluate
and disseminate foreign intelligence to assist
the president and senior United States
government policymakers in making
decisions about national security.
National
Intelligence Program
(NIP)
$57.7 Billion
Bureau of
Intelligence and
Research
$59 Million
Office of
Terrorism and
Financial Intelligence
$116.78 Million
Department of Treasury
$12.7 Billion
BOTH NIP AND MIP
National Security Agency
Estimated $10 Billion
The NSA focuses on signals
intelligence, monitoring, and
collecting and processing
communications and electronic
information. It protects U.S.
information systems from outside
penetration.
Defense Intelligence Agency
Estimated $4.4 Billion
The DIA is the primary entity
responsible for collecting and
analyzing intelligence on foreign
militaries, with support from the
intelligence offices of all the
military branches.
National Geospatial-
Intelligence Agency
Estimated $5 Billion
NGA is the provider of geospatial
intelligence – analysis and
information about Earth’s natural
and man-made features and
geo-tagged activities. “GEOINT”
is used for combat, humanitarian
and disaster relief, border and
transportation security and security
planning for special events.
Military Intelligence
Program (MIP)
$20.7 Billion
April 30-May 2 2018
Washington, D.C.
The Office of Naval Intelligence
The Office of Naval Intelligence
mission includes real-time reporting
on the developments and activities
of foreign navies, protecting
maritime resources and interests,
monitoring and countering
transnational maritime threats, and
providing technical, operational,
and tactical support to the U.S.
Navy.
United States
Special Operations Command
Its primary missions are to provide
Human Intelligence (HUMINT) and
Signal Intelligence (SIGINT) mainly
for Delta and DEVGRU’s (SEAL Team
Six) operations.
Marine Corps Intelligence
Activity
The Marine Corps’
intelligence officers create
military maps, intercept
and translate radio and
electronic signals, analyze
images collected from
sensors and carry out
counterintelligence.
Airforce ISR Agency
The Air Force ISR Agency
provides intelligence,
surveillance and
reconnaissance (ISR)
products, applications,
capabilities and resources,
to include cyber and
geospatial forces and
expertise.
U.S. Army Military Intelligence
The primary mission of military
intelligence in the United States
Army is to provide timely, relevant,
accurate, and synchronized
intelligence and electronic warfare
support to tactical, operational and
strategic-level commanders.
The Office of Intelligence and
Analysis sits within the Office of
Terrorism and Financial Intelligence,
which works to prevent sanctioned
countries, money launderers,
terrorists, drug kingpins and
purveyors of weapons of mass
destruction from moving money
through the U.S. financial system.
Defense Cryptologic Program
The Defense Cryptologic Program (DCP) takes on
defense-wide cryptologic activities outside of the
National Foreign Intelligence Program (NFIP).
Federal Bureau of Investigation
$8.77 Billion
The FBI’s focus is on stopping
terrorism, corruption, organized
crime, cyber crime and civil rights
violations, as well as investigating
serious crimes such as major
thefts or murders. The FBI protects
the United States from foreign
intelligence.
Department of State
$37.6 Billion
The Department of State collects
and analyzes intelligence on
global affairs and advises the
secretary of State and other
diplomats. It conducts foreign
opinion polls and tracks and
analyzes issues that may
undermine U.S. foreign policy
objectives, such as weapons
proliferation, human trafficking
and drug smuggling.
8. S C I E N C E A N D T E C H N O L O G Y
D I R E C T O R AT E
Apex Programs
$7.7MPROJECT FUNDING:
Apex Screening at Speed (SaS)
Apex SaS is developing technology that would enable
the scanning of walking passengers, acquiring data
through most garments and reliably detecting a wider
range of prohibited items regardless of concealment.
Future systems that record and analyze a wide array of
data from each bag would provide greater security while
limiting the number of invasive, time-consuming false
alarms, all without the need for today’s cumbersome
restrictions on removing electronic devices, liquids,
aerosols, and gels from the bag for scanning.
A collection of S&T projects, Apex Programs represent one or more paths toward achieving an increased or
improved capability for the Homeland Security Enterprise(HSE). Resulting from a visionary goals, an S&T strategic
priority, or an external stakeholder’s operational need Apex Programs take the next steps towards implementing
solutions to improve the security and resilience of our nation.
Using representative data, demonstrate
algorithms to associate passengers and their
belongings using video analytics.
Passenger-baggage correlation is a required
technology for risk-based screening in a single
checkpoint lane.
Complete testing and accept a test and
evaluation report regarding a prototype capable
of scanning for aviation-size threats, suitable for
use if a passenger were in motion at a walking
pace
Transition a passenger screening algorithm to
TSA, capable of processing inputs and detecting
threats from any Digital Imaging and
Communication for Security (DICOS) compliant
passenger imaging system.
FY 2018 Planned Key Milestone Events
FY 2019 Planned Key Milestone Events
Demonstrate the use of a third-party threat
algorithm on an S&T prototype AIT system
using open standards.
Demonstrate an AIT system capable of
screening passengers at a walking pace while
scanning for aviation-size threats.
Apex Border Situational Awareness (BSA)
$2.3M
CBP and partner law enforcement agencies (Federal,
state, local, tribal, and international) need improved
situational awareness to more effectively and efficiently
deploy their resources to the areas of highest risk. BSA
aims to improve border situational awareness by
establishing an enterprise capability to (1) access more
data sources, (2) make available decision support tools to
translate the data into actionable information and
intelligence, and (3) share that actionable information
and intelligence with partner law enforcement agencies.
FY 2018 Planned Key Milestone Events
FY 2017 Key Achievements
Conducted pilot of Spiral 1 of the BSA project
focused on establishing enterprise information
sharing for CBP.
Performed Spiral 2 requirements analysis and
develop requirements focused on tactical
response for CBP
FY 2019 Planned Key Milestone Events
Perform integration and developmental testing of
selected Spiral 2 solutions.
Conduct pilot of Spiral 2 of the BSA project
focused on improving tactical response for CBP.
Initiate transition of selected Spiral 2 technologies
into existing CBP system baseline, focused on
improving tactical response.
Perform integration and developmental testing of
selected Spiral 3 solutions; focused on improving
strategic planning for CBP.
NAME:
DESCRIPTION:
NAME:
PROJECT FUNDING:
DESCRIPTION:
9. S C I E N C E A N D T E C H N O L O G Y
D I R E C T O R AT E
$5.2MPROJECT FUNDING:
Data Analytics Engine (DA-E)
Apex SaS is developing technology that would enable the scanning of walking passengers, acquiring data through
most garments and reliably detecting a wider range of prohibited items regardless of concealment. Future systems
that record and analyze a wide array of data from each bag would provide greater security while limiting the number
of invasive, time-consuming false alarms, all without the need for today’s cumbersome restrictions on removing
electronic devices, liquids, aerosols, and gels from the bag for scanning.
Conduct experiments and deliver reports and recommendations regarding the use of automated image, video, and
speech analytics to meet DHS mission needs for immigration and border security as well as other DHS missions.
Deliver a framework for approaching Real Time Analytics for Multi-Latency Multi-Party Metro Scale Networks
(RAMMMNets) problem sets to improve the focus and impact of research efforts on homeland security mission
priorities including Smart Cities.
Deliver an analysis of advanced analytic applications such as graph processing capabilities to U.S. Immigrations and
Customs Enforcement (ICE) that demonstrate significant mission impact for national security investigations and
that is also relevant to other DHS mission areas including nuclear threat detection and critical infrastructure
protection.
FY 2018 Planned Key Milestone Events
FY 2019 Planned Key Milestone Events
Partner with industry and universities to document, analyze and assess the
performance of the latest advanced analytics and computational methods
to identify significant threats and opportunities for DHS, Components and
the HSE.
NAME:
DESCRIPTION:
FY 2017 Key Milestone Events
Delivered Knowledge Product report on text analysis functions of three big data platforms to inform future DHS
investments based on the skill set of the end user, the type of problem that needs to be solved, and the product’s
financial resources.
Completed evaluation of capabilities by subject matter experts to detect and characterize live streaming/video
analytical capabilities to improve DHS and law enforcement abilities to find relevant, actionable content.
Provided a tailored solution to complete two operational tests of open source and social medial analytic tools with
DHS Components.
Delivered report evaluating 275 open source and social media tools to support DHS screening and vetting missions
and inform future R&D needs.
Develop an advanced concept prototype, experiments
and technical reports to help DHS discern data, analytics
and computational architecture requirements for next
generation mission and operations analytic systems.
Deliver technical reports that are based upon
laboratory analysis and experimentation with
advanced analytics and computation
technologies that pose significant homeland
security threats and/or offer significant
mission opportunities to improve enterprise
knowledge and appropriately support
acquisition decision making for components
and HSE.
10. S C I E N C E A N D T E C H N O L O G Y
D I R E C T O R AT E
$5MPROJECT FUNDING:
Social Media Research
Leveraging open source and social media (OSSM) effectively has become increasingly important to DHS missions, as
an increasing amount of data becomes available online. OSSM tools that support DHS missions are in an immature,
early stage. There are major challenges including but not limited to the need to scale tools to the levels of DHS
operations; controlling the vast amount of data while respecting privacy and civil liberties; and automatically
processing non-text data such as video and images to efficiently cue information of interest for analysts, officers, and
agents.
Piloting commercial tools within the HSE enables DHS to fully explain OSSM challenges in operational contexts,
develop and improve OSSM methodologies, capture gaps in commercial tools and architectures, develop first
generation capabilities for non-text data, and work with industry to develop additional capabilities.
Delivered report evaluating 275 open source and social media tools to support DHS screening and vetting missions
and inform future R&D needs.
Provide a tailored solution to complete two operational tests of open source and social media analytic tools with
DHS Components.
FY 2018 Planned Key Milestone Events
FY 2019 Planned Key Milestone Events
Deliver mission experiments, prototypes and pilots for automating video and speech analytics to improve open
source and social media analytics in order to improve screening, vetting, situation awareness, and investigative
missions of DHS Components including CBP, ICE, and USCIS.
Partner with industry to improve government research and development relationships with regard to improving
public safety and security using open source and social media data sources.
Conduct research and development in cooperation with industry, universities, and other Government agencies as
appropriate to improve and provide technical guidance to components and members of the HSE regarding open
source and social media screening, vetting, situation awareness, and investigations methodologies.
NAME:
DESCRIPTION:
FY 2017 Key Milestone Events
Deliver report on DHS social media gaps and requirements that would inform future investments.
Develop and assess livestream prototypes and experiments.
Furthermore, though cyber research was formerly housed primarily in the department’s Science and
Technology Directorate, that funding, which totals $41 million , will be redirected to the cyber and
infrastructure protection division - the National Protection and Programs Directorate or NPPD.
Overall, S&T's budget is significantly lower that it has been in the past. Since FY17:
S&T's total budget has been reduced by 25% from $781M to $583M
The R&D budget has been cut by a whopping 33% from $470M to $311M
What Was Cut?
11. U . S . C u s t o m s a n d B o r d e r
P r o t e c t i o n
National Targeting Center (NTC) Expansion
Process larger volumes of data efficiently, resulting in streamlined information-sharing and better targeted
enforcement actions. The increased resources will enhance CBP’s ability to collect, disseminate, retain, analyze,
and more effectively utilize information provided by travelers or collected during encounters.
Enable CBP to better identify and vet high risk passengers and cargo by producing fewer and better targets while
providing expanded information and analytics on possible matches. CBP will also be able to collect more data
during encounters, transforming it into useful information for intelligence analysis that inform targeting rules,
border operations, and other border security mission sets. CBP and other components that leverage its capabilities
may share, disseminate, and analyze data collected across the Department for their respective missions.
NAME:
DESCRIPTION:
The FY 2019 President’s Budget includes an increase in funding and personnel for the NTC. The NTC employs highly
skilled targeting specialists using state-of-the-art technologies to identify high-risk shipments and travelers that may
be connected to terrorism or other transnational crimes. In FY 2019, additional resources are provided to further
support data analytics and statistical modeling capabilities to identify high-risk people and cargo in the air, land, and
sea environments, both entering and leaving the United States.
Increased data analytics and statistical modeling capabilities will allow the NTC to:
Mission Support
BUDGET BREAKDOWN:
$6.2M to support data analytics $4.0M towards statistical modeling
C o u n t e r i n g We a p o n s o f M a s s
D e s t r u c t i o n
FY 2019 Planned Key Milestone Events
NAME: Analytical Techniques for Nuclear Detection (Analytics)
DESCRIPTION:
The Analytics sub-project of Exploratory Research has two thrust areas: Algorithms are developed to improve the
means and abilities to detect, locate, and identify threat materials. Modeling and simulation tools are developed to aid
in the analyses of R/N detection capabilities as they are, and as they could be, which could be used in identification of
capability gaps, risk analysis for system threat reviews, or cost- benefit analysis within CWMD’s solutions
development process. The project is an activity supporting the Cost Effective, Search, and Pathways grand challenges.
BUDGET: Part of the $18M allocated towards Exploratory Research (ER)
Complete Proof of Concept for Nuclear Inspection Node Event Simulator (NINESIM), a modeling tool designed to
aid cost-benefit analysis of different CONOPS and detection equipment with the potential to be deployed at
radiation detection checkpoints.
12. Sustaining Our Long-Term Competitive
Advantage Through Intelligence and Data
Analytics
Lieutenant General Jack Shanahan
OUSDI Director for Defense Intelligence (Warfighter Support)
23 May 2017
13. 2
“Data are to this century what oil was to the last one: a
driver of growth and change. Flows of data have created
new infrastructure, new businesses, new monopolies, new
politics and—crucially—new economics. Digital information
is unlike any previous resource; it is extracted, refined,
valued, bought and sold in different ways. It changes the
rules for markets and it demands new approaches from
regulators. Many a battle will be fought over who should
own, and benefit from, data.”
- Economist, 6 May 2017
14. 3
“DoD has yet to embrace the transformational capabilities of
artificial intelligence (AI) and machine learning (ML) across the
Department. Together, they have the power to impact every corner
of DoD, including force protection, training, logistics, recruiting,
healthcare, C4ISR, cyber operations, and more. The significance of
AI and ML is akin to the first and second offsets that took
advantage of nuclear weapons and precision munitions and stealth
technology, respectively. Underscoring the importance of
applications of AI and ML across the Department is critical to
create and sustain the asymmetric advantage required to outpace
our adversaries.”
- Defense Innovation Board, 2017
16. UNCLASSIFIED
UNCLASSIFIED
Data is a strategic asset,
critical to developing the
information and knowledge
that analysts turn into
decision-quality intelligence
Principle 1
18. UNCLASSIFIED
UNCLASSIFIED
The biggest analytic
advantage derives from the
brains of empowered
analysts, not in rote
processing functions or
mundane assembly-line
piecework involved in
building intelligence
products
Principle 3
19. “Although we have taken tentative steps to explore the
potential of artificial intelligence, big data, and deep
learning, I remain convinced that we need to do much
more, and move much faster, across DoD to take
advantage of recent and future advances in these critical
areas.
Accordingly, I am establishing the Algorithmic Warfare
Cross-Functional Team (AWCFT) to accelerate DoD’s
integration of big data and machine learning. The
AWCFT’s objective is to turn the enormous volume of
data available to DoD into actionable intelligence and
insights at speed.”
- Deputy Secretary of Defense Robert Work, 26 Apr 2017
8
Algorithmic Warfare Cross-Functional Team
(Project Maven)
20. UNCLASSIFIED
UNCLASSIFIED
Start with the proposition
that every analyst needs all
data, from every possible
source, when tackling an
intelligence question
Principle 4
21. UNCLASSIFIED
UNCLASSIFIED
While it may be tempting to
call for an intelligence
“revolution”, at its very core
this is really more about a
transformation of the
intelligence community’s
culture, training, tools, and
tradecraft.
Principle 5
22. UNCLASSIFIED
UNCLASSIFIED
It is hubris to suggest that
our potential adversaries
are not as capable, or even
more capable, of far-
reaching and deeply-
embedded innovation within
their respective
organizations
Principle 6
23. UNCLASSIFIED
UNCLASSIFIED
“The creation of a triangular relationship among
government, industry, and academia was, in its
own way, one of the significant innovations that
helped produce the technological revolution of
the late twentieth century.”
- Walter Isaacson, The Innovators
12
24.
25. Leveraging Information and
Joint Operations to Enhance
the Nation’s Defense
Mr. Gregory Radabaugh, SES
Director
Joint Information Operations Warfare Center
UNCLASSIFIED
UNCLASSIFIED
This Briefing is: UNCLASSIFIED
This information is furnished on condition that it will not be released to another nation without specific authorization of the Joint Staff, that it will be used for
military purposes only, that the individual or corporate rights originating in the information, whether patented or not, will be respected, that the recipient will
report promptly to the United States any known or suspected compromise, and that the information will be provided substantially the same degree of security
afforded it by the Department of Defense of the United States. Also, regardless of any other markings on the document, it will not be downgraded or declassified
without the written approval of the originating U.S. agency.
26. “The first
responsibility of any
commander is to
understand the
nature of the war he
is about to engage
in.”
~ Carl von Clausewitz
UNCLASSIFIED
UNCLASSIFIED
Famous Dead Guy Quote
27. UNCLASSIFIED
UNCLASSIFIED
The Chairman’s View
Basic nature of war has not changed, but the
character of war has evolved:
• Transregional – cutting across
multiple combatant commands
• Multi-domain – cutting across land,
sea, air, space, and cyberspace
• Multi-functional – involving
conventional, special operations,
ballistic missile strike, cyber, and
space capabilities
General Joseph F. Dunford, Jr.
Chairman, Joint Chiefs of Staff
Success will be obtained through the
blending of informational and physical
power.
28. The ‘Informationalized’ Force
• Some information advantages may be hard
to get/use
‒ Capacity/permissions
• Today’s force is the most agile and aware in
our history
– This “informationalized” force is also most
vulnerable to losing that advantage
UNCLASSIFIED
UNCLASSIFIED
• Much of the innovation in information-related
technologies of the last 300 years has been
driven by enduring military needs, such as:
– To see the terrain, the enemy, and our own forces
– To command and control forces over larger areas and
across rough terrain
– To counter the effects of darkness, weather, and physical
properties of land/air/water
29. The ‘Informationalized’ Environment
The information environment (IE) is the aggregate of individuals,
organizations, and systems that collect, process, disseminate or act on
information. (JP 3-13)
UNCLASSIFIED
UNCLASSIFIED
These two environments have converged and are now congruent
The operational environment (OE) is the composite of the conditions,
circumstances, and influences that affect the employment of capabilities
and bear on the decisions of the commander. (JP 1-02)
30. A Globally Contested Space
• Russia: Information Confrontation
(Informatsionnoye Protivoborstvo)
– State of permanent war
– Direct influence
– Special Forces and commercial irregular groups
– Contactless war
– Total war, including the enemy’s internal side and
base
– War in the human consciousness and in cyberspace
– Asymmetric: political, economic, information
technological, ecological campaigns
UNCLASSIFIED
UNCLASSIFIED
• China: The Three Warfares (San Zhan)
– Legal Warfare
– Public Opinion/Media Warfare
– Psychological Warfare
~Peter Mattsson “The Russian Armed Forces Adapted to New Operational Concepts in a Multipolar World? February 19, 2014
31. UNCLASSIFIED
UNCLASSIFIED
There is no such thing as peacetime in the Information
Environment:
– Information ‘rounds’ are constantly being fired—especially at you
– Without situational awareness in the IE, you will not know you are
being shot at and therefore can’t respond
– The cumulative effects could be like gamma radiation (i.e., you
don’t know it’s harming you until you’re dead)
“Steady state” and “gray area” operations often defined via information-based conflict
32. Affecting the IE Through IO
Information Operations is the integrating application
of capabilities to affect an adversary, or potential
adversary, to think/act as we desire…
- Lethal warfare affects the adversary via physically targeting
personnel/property, while…
- IO affects adversary information/decision making processes
Example: Iraqis, in Gulf War I,
surrender in response to
instructional leaflets and
offensive air power
UNCLASSIFIED
UNCLASSIFIED
The blending of informational power and physical power enhances each
others’ effectiveness
33. Culture/religion/societal norms/ideology/decision-making process underlies all target actions
UNCLASSIFIED
UNCLASSIFIED
Adversary
Decision-Maker(s)
Adversarial
Populations
Neutral
Populations
Allied/Friendly
Populations
MILDEC – Adversary believes
what you want them to believe
EW – Control EMS
Affecting Behavior Through Information
MISO – Establish/reinforce
foreign perceptions of
mil/pol/econ power/resolve
OPSEC – Protect/deny
your info
Cyber – Effects against
adversary info (i.e., decision-
making, C2) while protecting
your own; deliver information
PA – Setting narrative/agenda;
Telling your story; Countering
falsehood with truth
KLE – Influencing individuals
Military Information
Capabilities/Methods* ObjectivesLevel of Action
Target
Audiences
“To do or
not to do”
“Deny
support to
adversary”
“Support
friendly or not
interfere”
“Support
friendly”
StrategicOperationalTactical
Affecting strategic
level target
decision-making;
Influencing
behavior over
time
Affecting target
decision-making
over a series of
engagements
Affecting target
decision-making
for a specific
engagement
* Not all inclusive
34. UNCLASSIFIED
Purpose of IO is to affect (via integrated IRCs) decision-making (human & automated) - examples:
Deny (CO, OPSEC), Disrupt (EW), Deceive (MILDEC) vs. Understanding (Observe + Orient)
Influence (MISO), Inform (PA), Reinforce (MILDEC) vs. Will (Decide)
Destroy (CO, Kinetic), Degrade (SIO, EW) vs. Capability (Decide)
Mitigate effects (PA, CP, CO) / Exploit (due to MILDEC) vs. Act CP = Counter-Propaganda
* Adversary must have Understanding (Observe + Orient) and Capability and Will (Decide) to Act
Strategic
Operational
Tactical
*
UNCLASSIFIED
The Joint Force
applies information
power in all phases,
and especially
those phases short
of conflict...relating
to deterrence,
building the
network of Allies
and partners, and
long-term
competition
The entire force
contributes to
desired effects
through all of its
activities (e.g.,
readiness,
movement and
maneuver, training
and exercises, MIL-
to-MIL relationships,
Unified Action
activities, etc.)
Integrating Physical and Informational Power
35. • The IE is a complex environment comprised of
multiple systems and variables
₋ Generating effects on IE systems requires established
baselines (as a normal part of JIPOE) upon which to base
analysis
• Correctly characterizing the IE is crucial to
effectively executing IO
₋ Understanding the cognitive, physical and informational
dimensions has to be treated as foundational intelligence
₋ Associated systems, components and audiences (i.e.,
target systems analysis and target audience analysis)
• To standardize characterization of the IE for IO
planning/execution across the DIE and IC, JIOWC
has:
– Created templates based on PMESII/CTAF models to
enable IO intelligence integration
– Developed a learning continuum for the Defense
Intelligence Enterprise
The IE and Intelligence Analytics
UNCLASSIFIED
UNCLASSIFIED
36. Information Environment Baseline Development Framework
Analytic
Framework For
Information
Environment
Baseline
Development
Political
Describes the distribution
of responsibility and
power at all levels of
governance or
cooperation.
Military
Explore the military
capabilities of all relevant
actors in a given
operational
environment/battlespace
environment.
Economic
Encompasses individual
behaviors and aggregate
phenomena related to the
production, distribution,
and consumption of
resources.
Social
Describes the cultural,
religious, and ethnic
makeup within an
operational
environment/battlespace
environment
Information
Describes the nature,
scope, characteristics,
and effects of individuals,
organizations, and
systems that collect,
process, disseminate or
act on information.
Infrastructure
Is composed of the basic
facilities, services, and
installations needed for
the functioning of a
community or society.
Physical
Environment
Defines the physical
circumstances and
conditions that influence
the execution of
operations throughout the
domains of air, land, sea,
and space.
Time
Influences military
operations within an
operational
environment/battlespace
environment in terms of
the decision cycles,
tempo, and planning
horizons.
Physical
(Who/Where)
Consists of both key
individuals and human
networks and a technical
and physical
infrastructure that
supports the Information
flow to its intended
audience.
Informational
(How/What)
Consists of the content of
information and the way it
flows to and from a
decision maker to form a
message.
Cognitive
(Why)
Consists of the beliefs of
a person or persons
whose decisions can
impact the commander’s
end state and is the
hardest dimension to
assess.
IE Baseline Development Framework
UNCLASSIFIED
UNCLASSIFIED
37. Cyber Focused Information Environment Baseline Development Framework
Cyber Focused
Analytic
Framework For
Information
Environment
Baseline
Development
Political
Describes the distribution
of responsibility and
power at all levels of
governance or
cooperation.
Military
Explore the military
capabilities of all relevant
actors in a given
operational
environment/battlespace
environment.
Economic
Encompasses individual
behaviors and aggregate
phenomena related to the
production, distribution,
and consumption of
resources.
Social
Describes the cultural,
religious, and ethnic
makeup within an
operational
environment/battlespace
environment
Information
Describes the nature,
scope, characteristics,
and effects of individuals,
organizations, and
systems that collect,
process, disseminate or
act on information.
Infrastructure
Is composed of the basic
facilities, services, and
installations needed for
the functioning of a
community or society.
Physical
Environment
Defines the physical
circumstances and
conditions that influence
the execution of
operations throughout the
domains of air, land, sea,
and space.
Time
Influences military
operations within an
operational
environment/battlespace
environment in terms of
the decision cycles,
tempo, and planning
horizons.
Cyber Physical
(Physical)
-Physical Locations
-Nodes
-Wires
-Cables
-Routers
Cyber Logical
Network
(Information)
-Dynamic construct of
networks
-Ever changing
·NIPRNET
Cyber Persona
(Cognitive)
-People on the network
-Multiple individuals
can use on persona
-Difficult to attribute
and target
Cyber Focused IE Baseline
Development Framework
UNCLASSIFIED
UNCLASSIFIED
38. Counterterrorism Analytical Framework (CTAF)
Counterterrorism
Focused Analytic
Framework For
Information
Environment
Baseline
Development
Leadership
- Personal
qualities
- Structure,
organization,
role
- Sources of
authority
- Span/level of
control
- Visions/goals,
objectives
- Decision
making
process
- Key personnel
Safe Havens
- Physical location
- Virtual location
- Demographics,
cultural
conditions
- Political,
governance
- Access to
resources
- Terrain
- Key personnel
Finance
- Sponsorship
- Criminal activity
- Charitable activity
- Legal enterprises
- Financial
systems
- Key personnel
Communication
- Audience
- Function/intent
- Procedures,
tradecraft
- Medium/tools
- Key personnel
Movement
- Mode/method
- Facilitation
- Routes
- Purpose
- Key
personnel
Intelligence
- Plan/Direct
- Collect
- Process, analyze
- Production,
dissemination
- Security, CI
- Key personnel
Weapons
- Procurement
- R&D,
weaponization
- Production
- Distribution,
storage
- Employment
- Weapons
- Key personnel
Personnel
- Recruitment,
selection
- Training
- Use, assignment
- Sustainment
- Members,
supporters
- Key personnel
Ideology
- Unifying vision
- Indoctrination
- Legitimacy
- Propaganda
- Key personnel
Physical
(Who/Where)
Consists of both key
individuals and human
networks and a technical
and physical
infrastructure that
supports the Information
flow to its intended
audience.
Informational
(How/What)
Consists of the content of
information and the way
it flows to and from a
decision maker to form a
message.
Cognitive
(Why)
Consists of the beliefs of
a person or persons
whose decisions can
impact the commander’s
end state and is the
hardest dimension to
assess.
Counterterrorism Analytic Framework
UNCLASSIFIED
UNCLASSIFIED
39. What the Warfighter Needs From Intelligence
Analytics
• Finding our adversaries in the sea of
information and tracking them in real time
through multiple information sources
– Target development/vetting/validation is key
• Providing the analytic foundation to conduct
cognitive combat
– Modeling & Simulation/Red team COAs/2nd/3rd/4th order
of effects on systems
• Characterizing the information environment to:
– Enable commander situational awareness
– Enable assessment of red/blue/green effects
• Enabling the sharing of information and analytic
results with whole of government and Allied
partners
– In many cases we are operating beyond Five-Eye
coalitions
UNCLASSIFIED
UNCLASSIFIED
40. Intelligence Analytics Challenges
• Find/synthesize what the adversary/
potential adversary is thinking/
deciding
– Where is the adversary cognitively?
– What decisions have been made/about to
be made of which we are unaware?
• Discovery of adversary/potential
adversary through big data
– Attribution of offensive cyber
– Identification of VEO groups
– Using online behavior to predict physical
behavior/decisions
• Understanding informational power
effects in the IE, especially with
regard to collateral damage
UNCLASSIFIED
UNCLASSIFIED
41. Intelligence Analytics Challenges
• Discovering/analyzing adversary AI
– Understanding how adversary AI’s think/make
decisions
– Implications of AI vs. AI
• Understanding adversary/potential
adversary attitudes/thinking from
strategic to tactical
– Providing real time assessment of audience
sentiment (vice waiting for polling data)
– Increasing speed of analytics to enable real time
response to adversary actions
• Synthesizing/visualizing what the
information environment looks like
– Portraying the IE in a manner that a senior leader
can comprehend and make decisions
– Integrating publicly available information with
classified analysis
UNCLASSIFIED
UNCLASSIFIED
42. DISTRIBUTION A. Approved for public release: distribution unlimited. UNCLASSIFIED
UNCLASSIFIED
18
C2IE: Building an Information Environment
Common Operating Picture (iCOP)
Combining Command and Control and Commercial Marketing Best Practices Provides Rapid Capability to DoD
Entity Extraction Relationship ID Event
Detection
Foreign Language
Processing
Correlate with
DoD/IC Data
Enhance
Geolocation
Topic / Meme
Detection
Community
Detection
Coordinated
Activity Detection
Sentiment
Detection
Integrate Existing Data
Acquisition, Analytics, and
Platform Capabilities
SocialMedia
Processing
EditedMedia
Processing
Analytic Test and Evaluation
Selected InQTel-investment entity extraction
technology performed at/above published state-
of-the-art performance (0.72 F-measure) for key
entity types prior to system tuning
Operational Test and Evaluation
Initial iCOP OT&E Demonstrating Near-Real-
Time iCOP in support of PACOM / MARFORPAC
/ III MEF for Balikatan ’16 towards integration
into DISA GCCS-J
Develop Analytic TTPs
Identifying proper pairing of operational
objectives to data analytics via support to
Balikatan ’15, Freedom of Navigation Ops, US
Shows of Force
DoD
Operations
USG
Reporting
IC/DoS Reporting Counter-Intelligence
ReportingDiscrete Activities Formal Plans
iCOP
Integrated
Information
Environment /
Influence picture.
With Unclassified +
Classified Data
43. The Future – Enabling the JF for Success
• DoD Strategy for Operating in the Information Environment (SOIE)
– SecDef signed in June 2016
– Defines an operational end-state, and associates it with the ways to accomplish the end-
state, and the means necessary to support the ways
– Four lines of effort with active DoD level working groups: People, Programs, Policy, Partners
• Capstone Concept for Joint Operations: “Integrate physical and
informational power”
– “The deliberate leveraging of the inherent information aspects of activities in order to direct
or influence the behavior of relevant actors and/or course of events.”
– One of 8 key foundational elements in concept—projected publication: Fall 2017
• Joint Concept for Operating in the Information Environment
– Draft concept as part of Chairman’s joint concepts for future warfighting
– Describes how the future Joint Force will integrate both physical power and information
power to effectively operate in and through a more pervasive and connected information
environment—projected publication: Fall 2017
• Information as a Joint Function
– Published as a change to Joint Pub 1-0 by JS/J7 on 16 May 2017
UNCLASSIFIED
UNCLASSIFIED
44. Information as a Joint Function
• “The information function encompasses the
management and application of information and its
deliberate integration with other joint functions to
influence relevant-actor perceptions, behavior,
action or inaction, and human and automated
decision making. The information function helps
commanders and staffs understand and leverage
the pervasive nature of information, its military
uses, and its application during all military
operations. This function provides JFCs the ability
to integrate the generation and preservation of
friendly information while leveraging the inherent
informational aspects of all military activities to
achieve the commander's objectives and attain the
end state.”
~ JS/J7 Draft Language out for formal GOFO coordination
UNCLASSIFIED
UNCLASSIFIED
Current Joint Functions:
• Command and Control
• Intelligence
• Fires
• Movement and Maneuver
• Protection
• Sustainment
46. Summary
• The information and operational environments have converged
– There is no peacetime in the IE
• Commanders lead an “informationalized” force
– Expect the advantages offered by this to be attacked/denied by adversary
• Dominating the IE is Commander’s business
– The most successful commanders in Iraq and Afghanistan made IO a part of every facet
of a unit’s or staff’s daily battle rhythm
– Every military capability available has an informational aspect to its use
• Intelligence data analytic solutions are crucial to a commander’s success
in understanding and dominating in the IE
UNCLASSIFIED
UNCLASSIFIED
47. Military Capabilities and Information
23
Questions/Comments
War is a contest of wills.
Will is observed through behavior.
Changing behavior is about influence.
War is about influence
48. Integrated Information
Warfare for the
21st Century
PEOC4I.NAVY.MIL
Program Executive Office
Command, Control, Communications,
Computers and Intelligence (PEO C4I)
1 May 2018
Tim Anderson
DCGS-N Inc 2 APM (PMW 120)
(703) 692-1726
timothy.a.anderson2@navy.mil
Battlespace Awareness and Information
Operations Program Office (PMW 120) for
Intelligence Analytics 2018 Meeting
v1.0
DISTRIBUTION STATEMENT A: Approved for public release, distribution is unlimited ( 7 February 2018)
49. PEO Initiatives
• PEO Focus: Accelerated delivery of required capability that is
affordable, integrated, and interoperable
• Speed of technology exceeding speed of acquiring, testing, installing,
and fielding of C4I capability.
• Developing, testing, fielding, and training at the box level AND
capability level
• Multiple install configurations minimizing learning curve opportunities
2
50. VISION
| Information Operations
| Information, Surveillance, & Reconnaissance
| Meteorology & Oceanography
IO
ISR
METOC
Provide quality Information Warfare capabilities to the Warfighter for a decisive
operational advantage
Deliver assured intelligence, meteorology, oceanography, and information operations
data, products, and services that provide Information Warfare capabilities to the Fleet
MISSION
Battlespace Awareness
and Information Operations
3
Agile • Integrated • Vital
52. DCGS-N Increment 2
Challenges
6
• Exponential increases in data form multi-service, IC, and
international partners (not to mention commercial)
• Continual reduction in expected timeline for sensor to
mission impact
• Balancing increased need for interoperability and agile
capability deliveries with operational and cyber risk
management
• The age-old challenge of "It's a computer, why doesn't it
all just work?"
53. 7
DCGS-N Applications
C
R
O
S
S
D
O
M
A
I
N
D
A
T
A
S
T
R
A
T
E
G
Y
CommonAnalytics
APIs
Operating Environment
CANES SW 3
LOOSELY COUPLED
ACS3.0
CANES
NITES
Next
DCGS-N
Inc2
NCSA
MTC2
NOSS
CANES Hybrid
Hyper-Converged Infrastructure
CANES HW 1.2
Quellfire
METOC Data
Talon Thresher
S2A/Mongoose
Predictive Analytics
Collection Management
Historical Data
Vessel/Cargo/Fishery
Multi Domain PKI enabled
Program Description:
Next generation ISR&T solution for ingesting,
processing, exploiting, correlating and disseminating
data from Navy, joint and national sensors.
Limited Capability Available FY18
• Anticipates the sensor “tipping point” by leveraging IC
investment in C2S and Advanced Analytics
• Automated workflows, data fusion, and machine
learning
• Accelerated precision Orientation and Decision-
making
54. DCGS-N FOS Infrastructure
ICITE
Distributed
Operations
National
Theater
Data Analytic
Node
Edge
Nodes
DCGS Family of Systems
Intelligence Community
Shared Data
Leverages significant Intelligence
Community worldwide
connections, investments, and
capabilities by utilizing Amazon
Commercial Cloud Services and
ICGOVCLOUD to support the
tactical edge.
Synchronize tactical commander’s
data lakes and ponds with relevant
geographic and specific NTM data.
Data Exchange mechanism for
commanders to share tactical
intelligence with
Fleet Commanders, Services,
Coalition, and IC partners.
Compliant with current IC and
DI2E mandated data standards
DCGS-NDCGS-A
DCGS-AF DCGS-MCDIB
DCGS-IC DCGS-SOF
Data ocean for the Navy supporting fleet commanders by providing access to national
technical means (NTM), operational level (OPINTEL), and tactical (TACINTEL) intel
on a world wide scale.
9
55. 10
Digital Warfare Platform
MTC2
NOBLE
DCGS-NInc2
GCCS-M
NCSA
NITESNEXT
Capability expressed as service-based workflows within and between PEO C4I
programs governed by the Navy Tactical Analytic Framework
DIB
DCGS
FOS
DDTS
Combat
Systems
Ingest Fusion Analytics Display Distribution
Agile Core Services (ACS)
ISR
Workflow
Planning
Workflow
Knowledge Base
RIGORS
ALERTING
AMICA
SAVA
Track History Overlays O-Plans Threat Data Readiness
CANES / STACC / NEDC / Cloud
Class/Unclass
Data Feeds
(Dozens)
OTP
NAVY
WAVE
OTM
56. PEO S&T Focus Areas and
Capability Gaps
• Battlespace Awareness (BA)
BA will require enhanced and advanced means to rapidly sense, collect, process,
analyze, and evaluate information content to exploit the operating environment
The understanding of the operating environment will serve as the basis from which nearly
all decisions will be made, enabling our forces to more effectively maneuver and
coordinate actions that engage and target enemy forces
• Tasking, Collection, Processing, Exploitation and Dissemination (TCPED) Network
Architecture requires automated data tagging of security information (at the fused
entity (Observed Entity and Maritime Object of Interest) level
• A Collection Management (CM) Tool to fully automate Intelligence Surveillance and
Reconnaissance (ISR) Planning would include integration of current and disparate
sensors (IMINT, SIGINT, MASINT) and associated ISR assets (national, theater
and tactical)
11
57. Visit us at www.peoc4i.navy.mil
We Deliver
Information Warfare
Capabilities to the
Fleet.
58. • Virtualized capability enables distributed multi-intelligence
operations for the Warfighter
• Provides the Navy with an integrated, distributed net-centric
grid framework
• Remote operations allow ashore support to rapidly provide
threat I&W
Material
Solution
Analysis
Technology
Maturation &
Risk Reduction
Engineering &
Manufacturing
Development
Production & Deployment Operations & Support
Pre-Systems Acquisition Systems Acquisition Sustainment
A B C
• Enhances SSEE Increment F capabilities to detect and track
radio signals
• Advanced antennas increase frequency
coverage to improve threat signal acquisition
Classic Reach
• Highly-sensitive electronic
support measure (ESM) system
that provides automated signal
acquisition, direction finding, and
target ID and geolocation
• Delivers threat indications and
warnings (I&W) for ship/strike
groups; feeds data to National
consumers
Ship’s Signal
Exploitation Equipment
(SSEE) Increment E
• Broadens signals intelligence
collection
• Standardized IO weapon system
across multiple maritime
platforms based upon a common
core capability: responds to
emerging threats, promotes
flexible asset tasking, supports
cross-training personnel
• Small footprint variant enables
mission-specific configuration
and rapid deployment
of new technology
Ship’s Signal Exploitation
Equipment (SSEE) Increment F
• Prosecutes SOI to deliver
real-time situational awareness of
key threats and geo-location on
high-priority targets
• Quick-reaction capability
addresses advancements in
foreign military comms and ISR
systems; provides non-permanent
capability to platforms not
equipped with permanent IO
warfare systems, or augments
permanent equipment
• Ingests and correlates off-board
and organic intelligence data;
disseminates multi-intelligence
products to provide valuable,
actionable intelligence
Cryptologic Carry On
Program (CCOP)
• Next generation Information
Warfare weapons system
enhances signals exploitation
capabilities
• Detects, classifies, and tracks
Signals of Interest (SOI) beyond
current requirements to improve
automation, operability, and
intuitiveness in TCPED process
• Scalable, mission-configurable,
modular (plug & play),
remotable; supports new
threats/ capabilities
• Enables cross-system data
sharing to support EMW/IF
Spectral
IO Capabilities
Sailors learn the
SSEE Inc E
ESM systemSailor provides routine
maintenance to the
AS-4623 IO Antenna
SSEE Mods Maintainer performs system check
13
Ship’s Signal Exploitation Equipment
(SSEE) Modifications
59. • Fuses environmental data to determine
the effect on a platform’s weapons
systems ability to conduct missions
• Tools and tactical decision aids that
on-site meteorologists use to develop
forecasts and predict impact to
electromagnetic-spectrum propagation
• Executes agile software development
to ensure flexibility
in meeting emergent
requirements and
addressing Fleet
user priorities
Naval Integrated Tactical
Environmental System-Next
Generation (NITES-Next)
Oceanographic
Information System
(OIS)
Primary Ocean
Prediction System
(POPS)
Hazardous Weather Detection and Display
Capability (HWDDC)
• HWMMV-mounted mobile weather
station helps Warfighters navigate d
dynamic battlefield conditions
• Collects, processes, and transmits
METOC data
• Sustains global
oceanographic and
hydrographic surveying
in support of undersea
warfare and navigation
safety
• Enables undersea dominance in
support of anti-submarine warfare,
mine countermeasures, special operations
• LBS-Glider senses ocean and thermal
light transmission properties critical to
weapon and sensor performance,
planning, execution
• LBS-Autonomous Undersea Vehicle
collects bathymetric & bottom imagery
to provide battlespace awareness of
the undersea environment
Material
Solution
Analysis
Technology
Maturation &
Risk Reduction
Engineering &
Manufacturing
Development
Production & Deployment Operations & Support
Pre-Systems Acquisition Systems Acquisition Sustainment
A B C
• Enhanced remote
sensing capability
discriminates
oceanographic
phenomenon from the
natural environment
• Automated tools
increase coverage
area, reduce timeline,
decrease analyst
workload
Remote Sensing
Capability
Development (RSCD)
METOC Capabilities
14
Littoral Battlespace Sensing–
Unmanned Undersea Vehicle (LBS-UUV)
• Supercomputer fuses
worldwide METOC
data to feed weather
prediction models
• IT infrastructure
provides
environmental
prediction across
multiple classification
enclaves for Navy
geophysical data
• Extracts and converts data from
surveillance radars to generate
weather situational awareness
& help the Fleet find the optimal
conditions to conduct missions
• Off-boards data to FMNOC to influence regional
weather prediction models & enhance real-time analysis
Marine Corps Meteorological Mobile Facility
(Replacement) Next Generation
(METMF(R) NEXGEN)
60. Operational Vision - Integrated Fires, part of
Electromagnetic Maneuver Warfare (EMW)
• Integrate kinetic and non-kinetic fires
• High Side Fusion (HSF)
• Combat Systems Integration (CSI)
• Battle Management Aids (BMA)
• Fully integrating National Technical Means (NTM),
organic sensors and weapon systems information
Enabled By Key Technologies:
• Integrate systems across PMW 120 portfolio
• Homogenize user interfaces – “Microsoft Ribbon”
• Data framework (analytic, ingest, data tagging)
• Robust Cross Domain Solution
Direct Benefit To Fleet/Sailors
• Allow analysts to focus on analysis
• Reduce training time through improved usability
• Provide ability to tailor systems to mission
• Present data to Sailor based on role
Electromagnetic Maneuver Warfare
Enabled By PMW 120
Focus on shortening the kill chain (kinetic and non-kinetic) 15
Kill Chain
TCPED
OODA
NIFC-CA
IPB/E FIND FIX TRACK TARGET ENGAGE ASSESS
61. Future Capability Development
EMW/IF Alignment
END STATE:
System of Systems interoperability that provides
• Accurate combat ID
• Complete Blue Force mission suitability assessments
• Optimal Force synchronization
• Target quality geolocation
• Automated asset allocation recommendations
• Coordinated C2 / C-ISR tools
• Single Integrated Picture (SIP)
• Complete spectrum awareness and control
• Full spectrum cyber operations
• Full spectrum NAVWAR
CURRENT STATE: Systems are NOT integrated and
interoperable to meet emerging threats
Meteorology &
Oceanography
(METOC)
Combat
Systems
(CS)
National
Technical Means
(NTM)
Logistics /
Readiness
Command
and Control
(C2)
Information
Operations
(IO) Intelligence,
Surveillance, &
Reconnaissance
(ISR)
• High Side Fusion
• Increased Automation
• Spectrum
Management
• Sensor Cross-Cueing
• Non-Kinetic Fires
• Optimized Maneuver
• Enhanced OTHT
• Counter-ISR&T
• HALO COP
• Int NTM & Tactical
Geolocation
• Comms in a DDIL
Environment
• NAVWAR
• Battle Management Aids
• Combat Systems
Integration
• Automated Assessment
and COAs
Phased delivery of new and continuously enhanced capability over time
Phase I Phase II Phase III
* 120 / 150 Aligned
16