SlideShare a Scribd company logo
1 of 62
Intelligence
Analytics
E-BOOK
An inside look into how DHS & the DOD
are leveraging intelligence analytics to
protect the homeland
October 22-24, 2018
Washington, D.C.
Table of Contents
Intelligence Analytics in the News3.
Page
Intelligence Budget for FY 2018 Infographic6.
7.
12.
25.
48.
Sustaining Our Long-Term Competitive Advantage Through
Intelligence and Data Analytics, 
Leveraging Information and Joint Operations to Enhance the
Nation’s Defense
Battlespace Awareness and Information Operations Program
Office (PMW 120) for Intelligence Analytics 2018 Meeting
Intelligence Analytics at DHS: FY19 Budget Highlights
About the 2018 Homeland Security Week62.
I N T E L L I G E N T
A N A L Y T I C S
I N T H E N E W S
Y O U R C H E A T S H E E T F O R T H E L A T E S T O N
H O W G O V E R N M E N T A G E N C I E S A R E
L E V E R A G I N G I N T E L L I G E N C E A N A L Y T I C S
T O B E T T E R S E C U R E T H E H O M E L A N D .
CLICK ON THE PICS TO BE REDIRECTED
TO THE ARTICLE
www.homelandsecurityweek.com/
Accenture surveyed 6,381 executives and 18 industries in 25 countries to
find the technology trends that will have the greatest impact on
companies, federal government and public service agencies.
Intelligence Analytics Toolbox
Five Technology Trends shaping the Future of
Government
Another Defense Agency to Tap CIA's Commercial
Cloud
Documents indicate the Army’s National Ground Intelligence Center aims
to provision secret and top secret cloud services from the Amazon-developed
C2S Cloud.
What the U.S. Air Force wants out of artificial intelligence — and an
exclusive look into its next project to fuse everything.
‘Wouldn’t It Be Great If We Could Shoot Someone
in the Face at 200 Kilometers?’
Beyond delivering the latest in headlines, cute animal videos and
presidential firings, Twitter may play an important role in helping public
health officials predict emerging biothreats.
Winner of DHS’s Hidden Signals challenge uses
Twitter to Predict Biothreats
Palmer Luckey’s Border Control Tech has Already
Caught Dozens of People
DHS Spotlight
Oculus is touting a surveillance system called Lattice that would survey
the motion of potential border-crossers from up to two miles away.
www.homelandsecurityweek.com/
A B O U T   H O M E L A N D S E C U R I T Y W E E K
A G E N D A P R I C I N G S P O N S O R
DHS Wants to Take a Page from the Startup Community
The Homeland Security Department is constantly developing new technology to
keep pace with the latest national security threats, and it’s relying on strategies
from tech startups to do so, according to the agency’s research and development
leader.
S&T Directorate Developing Algorithms to ID Child
Exploitation Victims
DHS Funds Cyber Data Research
DHS S&T Analytics are Helping to Secure
American Skies (Multi-Video)
To gain an accurate assessment of current air surveillance capabilities and how
they operate together, DHS S&T is creating standards for air surveillance,
known as DHS (Interim) Strategic Air Surveillance Requirements (I)SASR.
S&T has initiated a project to design, develop, test, and integrate new face
detection and recognition algorithms for use in identifying victims of child
pornography circulating on the dark web.
Federal cyber defenders are taking a data-centric approach in their efforts to
boost cyber defense research, distributing more than $5.6 million in contracts
focused on new ways to collect data on hacking attempts that can eventually be
used to counter those threats.
www.homelandsecurityweek.com/
October 22-24, 2018 // Washington, D.C.
Everything You Need to Know About
the $5 Billion Increase in the U.S.
Intelligence Budget for FY 2018
The United States intelligence budget comprises all the funding for the agencies of the United States Intelligence
Trump administration requested $57.7 billion for the National Intelligence Program (NIP), an increase from a re-
quested $54.9 billion in FY 2017. The Administration additionally requested $20.7 billion for the Military Intelligence
Program (MIP), up from a requested $18.5 billion in FY 2017. No other MIP budget figures or program details will
be released, as they are classified for national security reasons.
Central Intelligence Agency
Estimated $13 Billion
The CIA is the most recognized intelligence
agency, known for spying on foreign
governments and conducting covert operations.
Its primary stated mission is to collect, evaluate
and disseminate foreign intelligence to assist
the president and senior United States
government policymakers in making
decisions about national security.
National
Intelligence Program
(NIP)
$57.7 Billion
Bureau of
Intelligence and
Research
$59 Million
Office of
Terrorism and
Financial Intelligence
$116.78 Million
Department of Treasury
$12.7 Billion
BOTH NIP AND MIP
National Security Agency
Estimated $10 Billion
The NSA focuses on signals
intelligence, monitoring, and
collecting and processing
communications and electronic
information. It protects U.S.
information systems from outside
penetration.
Defense Intelligence Agency
Estimated $4.4 Billion
The DIA is the primary entity
responsible for collecting and
analyzing intelligence on foreign
militaries, with support from the
intelligence offices of all the
military branches.
National Geospatial-
Intelligence Agency
Estimated $5 Billion
NGA is the provider of geospatial
intelligence – analysis and
information about Earth’s natural
and man-made features and
geo-tagged activities. “GEOINT”
is used for combat, humanitarian
and disaster relief, border and
transportation security and security
planning for special events.
Military Intelligence
Program (MIP)
$20.7 Billion
April 30-May 2 2018
Washington, D.C.
The Office of Naval Intelligence
The Office of Naval Intelligence
mission includes real-time reporting
on the developments and activities
of foreign navies, protecting
maritime resources and interests,
monitoring and countering
transnational maritime threats, and
providing technical, operational,
and tactical support to the U.S.
Navy.
United States
Special Operations Command
Its primary missions are to provide
Human Intelligence (HUMINT) and
Signal Intelligence (SIGINT) mainly
for Delta and DEVGRU’s (SEAL Team
Six) operations.
Marine Corps Intelligence
Activity
The Marine Corps’
intelligence officers create
military maps, intercept
and translate radio and
electronic signals, analyze
images collected from
sensors and carry out
counterintelligence.
Airforce ISR Agency
The Air Force ISR Agency
provides intelligence,
surveillance and
reconnaissance (ISR)
products, applications,
capabilities and resources,
to include cyber and
geospatial forces and
expertise.
U.S. Army Military Intelligence
The primary mission of military
intelligence in the United States
Army is to provide timely, relevant,
accurate, and synchronized
intelligence and electronic warfare
support to tactical, operational and
strategic-level commanders.
The Office of Intelligence and
Analysis sits within the Office of
Terrorism and Financial Intelligence,
which works to prevent sanctioned
countries, money launderers,
terrorists, drug kingpins and
purveyors of weapons of mass
destruction from moving money
through the U.S. financial system.
Defense Cryptologic Program
The Defense Cryptologic Program (DCP) takes on
defense-wide cryptologic activities outside of the
National Foreign Intelligence Program (NFIP).
Federal Bureau of Investigation
$8.77 Billion
The FBI’s focus is on stopping
terrorism, corruption, organized
crime, cyber crime and civil rights
violations, as well as investigating
serious crimes such as major
thefts or murders. The FBI protects
the United States from foreign
intelligence.
Department of State
$37.6 Billion
The Department of State collects
and analyzes intelligence on
global affairs and advises the
secretary of State and other
diplomats. It conducts foreign
opinion polls and tracks and
analyzes issues that may
undermine U.S. foreign policy
objectives, such as weapons
proliferation, human trafficking
and drug smuggling.
INTELLIGENCE
ANALYTICS AT
DHS
FY19BUDGET HIGHLIGHTS
Find out where
and why DHS
will be
investing in
intelligent
analytics in
2019
S C I E N C E A N D T E C H N O L O G Y
D I R E C T O R AT E
Apex Programs
$7.7MPROJECT FUNDING:
Apex Screening at Speed (SaS)
Apex SaS is developing technology that would enable
the scanning of walking passengers, acquiring data
through most garments and reliably detecting a wider
range of prohibited items regardless of concealment.
Future systems that record and analyze a wide array of
data from each bag would provide greater security while
limiting the number of invasive, time-consuming false
alarms, all without the need for today’s cumbersome
restrictions on removing electronic devices, liquids,
aerosols, and gels from the bag for scanning.  
A collection of S&T projects, Apex Programs represent one or more paths toward achieving an increased or
improved capability for the Homeland Security Enterprise(HSE). Resulting from a visionary goals, an S&T strategic
priority, or an external stakeholder’s operational need Apex Programs take the next steps towards implementing
solutions to improve the security and resilience of our nation.
Using representative data, demonstrate
algorithms to associate passengers and their
belongings using video analytics.
Passenger-baggage correlation is a required
technology for risk-based screening in a single
checkpoint lane.
Complete testing and accept a test and
evaluation report regarding a prototype capable
of scanning for aviation-size threats, suitable for
use if a passenger were in motion at a walking
pace
Transition a passenger screening algorithm to
TSA, capable of processing inputs and detecting
threats from any Digital Imaging and
Communication for Security (DICOS) compliant
passenger imaging system. 
FY 2018 Planned Key Milestone Events
FY 2019 Planned Key Milestone Events
Demonstrate the use of a third-party threat
algorithm on an S&T prototype AIT system
using open standards.
Demonstrate an AIT system capable of
screening passengers at a walking pace while
scanning for aviation-size threats. 
Apex Border Situational Awareness  (BSA)
$2.3M
CBP and partner law enforcement agencies (Federal,
state, local, tribal, and international) need improved
situational awareness to more effectively and efficiently
deploy their resources to the areas of highest risk. BSA
aims to improve border situational awareness by
establishing an enterprise capability to (1) access more
data sources, (2) make available decision support tools to
translate the data into actionable information and
intelligence, and (3) share that actionable information
and intelligence with partner law enforcement agencies.
FY 2018 Planned Key Milestone Events
FY 2017 Key Achievements 
Conducted pilot of Spiral 1 of the BSA project
focused on establishing enterprise information
sharing for CBP.
Performed Spiral 2 requirements analysis and
develop requirements focused on tactical
response for CBP
FY 2019 Planned Key Milestone Events
Perform integration and developmental testing of
selected Spiral 2 solutions. 
Conduct pilot of Spiral 2 of the BSA project
focused on improving tactical response for CBP.   
Initiate transition of selected Spiral 2 technologies
into existing CBP system baseline, focused on
improving tactical response.
Perform integration and developmental testing of
selected Spiral 3 solutions; focused on improving
strategic planning for CBP. 
NAME:
DESCRIPTION:
NAME:
PROJECT FUNDING:
DESCRIPTION:
S C I E N C E A N D T E C H N O L O G Y
D I R E C T O R AT E
$5.2MPROJECT FUNDING:
Data Analytics Engine (DA-E)
Apex SaS is developing technology that would enable the scanning of walking passengers, acquiring data through
most garments and reliably detecting a wider range of prohibited items regardless of concealment. Future systems
that record and analyze a wide array of data from each bag would provide greater security while limiting the number
of invasive, time-consuming false alarms, all without the need for today’s cumbersome restrictions on removing
electronic devices, liquids, aerosols, and gels from the bag for scanning.  
Conduct experiments and deliver reports and recommendations regarding the use of automated image, video, and
speech analytics to meet DHS mission needs for immigration and border security as well as other DHS missions. 
Deliver a framework for approaching Real Time Analytics for Multi-Latency Multi-Party Metro Scale Networks
(RAMMMNets) problem sets to improve the focus and impact of research efforts on homeland security mission
priorities including Smart Cities. 
Deliver an analysis of advanced analytic applications such as graph processing capabilities to U.S. Immigrations and
Customs Enforcement (ICE) that demonstrate significant mission impact for national security investigations and
that is also relevant to other DHS mission areas including nuclear threat detection and critical infrastructure
protection. 
FY 2018 Planned Key Milestone Events
FY 2019 Planned Key Milestone Events
Partner with industry and universities to document, analyze and assess the
performance of the latest advanced analytics and computational methods
to identify significant threats and opportunities for DHS, Components and
the HSE.  
NAME:
DESCRIPTION:
FY 2017 Key Milestone Events
Delivered Knowledge Product report on text analysis functions of three big data platforms to inform future DHS
investments based on the skill set of the end user, the type of problem that needs to be solved, and the product’s
financial resources. 
Completed evaluation of capabilities by subject matter experts to detect and characterize live streaming/video
analytical capabilities to improve DHS and law enforcement abilities to find relevant, actionable content. 
Provided a tailored solution to complete two operational tests of open source and social medial analytic tools with
DHS Components. 
Delivered report evaluating 275 open source and social media tools to support DHS screening and vetting missions
and inform future R&D needs. 
Develop an advanced concept prototype, experiments
and technical reports to help DHS discern data, analytics
and computational architecture requirements for next
generation mission and operations analytic systems.    
Deliver technical reports that are based upon
laboratory analysis and experimentation with
advanced analytics and computation
technologies that pose significant homeland
security threats and/or offer significant
mission opportunities to improve enterprise
knowledge and appropriately support
acquisition decision making for components
and HSE.
S C I E N C E A N D T E C H N O L O G Y
D I R E C T O R AT E
$5MPROJECT FUNDING:
Social Media Research
Leveraging open source and social media (OSSM) effectively has become increasingly important to DHS missions, as
an increasing amount of data becomes available online. OSSM tools that support DHS missions are in an immature,
early stage. There are major challenges including but not limited to the need to scale tools to the levels of DHS
operations; controlling the vast amount of data while respecting privacy and civil liberties; and automatically
processing non-text data such as video and images to efficiently cue information of interest for analysts, officers, and
agents.
Piloting commercial tools within the HSE enables DHS to fully explain OSSM challenges in operational contexts,
develop and improve OSSM methodologies, capture gaps in commercial tools and architectures, develop first
generation capabilities for non-text data, and work with industry to develop additional capabilities. 
Delivered report evaluating 275 open source and social media tools to support DHS screening and vetting missions
and inform future R&D needs. 
Provide a tailored solution to complete two operational tests of open source and social media analytic tools with
DHS Components. 
FY 2018 Planned Key Milestone Events
FY 2019 Planned Key Milestone Events
Deliver mission experiments, prototypes and pilots for automating video and speech analytics to improve open
source and social media analytics in order to improve screening, vetting, situation awareness, and investigative
missions of DHS Components including CBP, ICE, and USCIS. 
Partner with industry to improve government research and development relationships with regard to improving
public safety and security using open source and social media data sources. 
Conduct research and development in cooperation with industry, universities, and other Government agencies as
appropriate to improve and provide technical guidance to components and members of the HSE regarding open
source and social media screening, vetting, situation awareness, and investigations methodologies. 
NAME:
DESCRIPTION:
FY 2017 Key Milestone Events
Deliver report on DHS social media gaps and requirements that would inform future investments.
Develop and assess livestream prototypes and experiments. 
Furthermore, though cyber research was formerly housed primarily in the department’s Science and
Technology Directorate, that funding, which totals $41 million , will be redirected to the cyber and
infrastructure protection division - the National Protection and Programs Directorate or NPPD.
Overall, S&T's budget is significantly lower that it has been in the past. Since FY17:
S&T's total budget has been reduced by 25% from $781M to $583M
The R&D budget has been cut by a whopping 33% from $470M to $311M
What Was Cut?
U . S . C u s t o m s a n d B o r d e r
P r o t e c t i o n
National Targeting Center (NTC) Expansion 
Process larger volumes of data efficiently, resulting in streamlined information-sharing and better targeted
enforcement actions. The increased resources will enhance CBP’s ability to collect, disseminate, retain, analyze,
and more effectively utilize information provided by travelers or collected during encounters. 
Enable CBP to better identify and vet high risk passengers and cargo by producing fewer and better targets while
providing expanded information and analytics on possible matches. CBP will also be able to collect more data
during encounters, transforming it into useful information for intelligence analysis that inform targeting rules,
border operations, and other border security mission sets. CBP and other components that leverage its capabilities
may share, disseminate, and analyze data collected across the Department for their respective missions. 
NAME:
DESCRIPTION:
The FY 2019 President’s Budget includes an increase in funding and personnel for the NTC. The NTC employs highly
skilled targeting specialists using state-of-the-art technologies to identify high-risk shipments and travelers that may
be connected to terrorism or other transnational crimes. In FY 2019, additional resources are provided to further
support data analytics and statistical modeling capabilities to identify high-risk people and cargo in the air, land, and
sea environments, both entering and leaving the United States.
Increased data analytics and statistical modeling capabilities will allow the NTC to: 
Mission Support
BUDGET BREAKDOWN:
$6.2M to support data analytics $4.0M towards statistical modeling 
C o u n t e r i n g We a p o n s o f M a s s
D e s t r u c t i o n
FY 2019 Planned Key Milestone Events
NAME: Analytical Techniques for Nuclear Detection (Analytics)
DESCRIPTION:
The Analytics sub-project of Exploratory Research has two thrust areas: Algorithms are developed to improve the
means and abilities to detect, locate, and identify threat materials. Modeling and simulation tools are developed to aid
in the analyses of R/N detection capabilities as they are, and as they could be, which could be used in identification of
capability gaps, risk analysis for system threat reviews, or cost- benefit analysis within CWMD’s solutions
development process. The project is an activity supporting the Cost Effective, Search, and Pathways grand challenges.
BUDGET: Part of the $18M allocated towards Exploratory Research (ER)
Complete Proof of Concept for Nuclear Inspection Node Event Simulator (NINESIM), a modeling tool designed to
aid cost-benefit analysis of different CONOPS and detection equipment with the potential to be deployed at
radiation detection checkpoints.
Sustaining Our Long-Term Competitive
Advantage Through Intelligence and Data
Analytics
Lieutenant General Jack Shanahan
OUSDI Director for Defense Intelligence (Warfighter Support)
23 May 2017
2
“Data are to this century what oil was to the last one: a
driver of growth and change. Flows of data have created
new infrastructure, new businesses, new monopolies, new
politics and—crucially—new economics. Digital information
is unlike any previous resource; it is extracted, refined,
valued, bought and sold in different ways. It changes the
rules for markets and it demands new approaches from
regulators. Many a battle will be fought over who should
own, and benefit from, data.”
- Economist, 6 May 2017
3
“DoD has yet to embrace the transformational capabilities of
artificial intelligence (AI) and machine learning (ML) across the
Department. Together, they have the power to impact every corner
of DoD, including force protection, training, logistics, recruiting,
healthcare, C4ISR, cyber operations, and more. The significance of
AI and ML is akin to the first and second offsets that took
advantage of nuclear weapons and precision munitions and stealth
technology, respectively. Underscoring the importance of
applications of AI and ML across the Department is critical to
create and sustain the asymmetric advantage required to outpace
our adversaries.”
- Defense Innovation Board, 2017
UNCLASSIFIED
UNCLASSIFIED
Some Principles of
Intelligence and Data
for the Future
Environment
UNCLASSIFIED
UNCLASSIFIED
Data is a strategic asset,
critical to developing the
information and knowledge
that analysts turn into
decision-quality intelligence
Principle 1
UNCLASSIFIED
UNCLASSIFIED
Principle 2
Publicly Available
Information (PAI) will
provide the first layer of the
foundation of our
intelligence knowledge
UNCLASSIFIED
UNCLASSIFIED
The biggest analytic
advantage derives from the
brains of empowered
analysts, not in rote
processing functions or
mundane assembly-line
piecework involved in
building intelligence
products
Principle 3
“Although we have taken tentative steps to explore the
potential of artificial intelligence, big data, and deep
learning, I remain convinced that we need to do much
more, and move much faster, across DoD to take
advantage of recent and future advances in these critical
areas.
Accordingly, I am establishing the Algorithmic Warfare
Cross-Functional Team (AWCFT) to accelerate DoD’s
integration of big data and machine learning. The
AWCFT’s objective is to turn the enormous volume of
data available to DoD into actionable intelligence and
insights at speed.”
- Deputy Secretary of Defense Robert Work, 26 Apr 2017
8
Algorithmic Warfare Cross-Functional Team
(Project Maven)
UNCLASSIFIED
UNCLASSIFIED
Start with the proposition
that every analyst needs all
data, from every possible
source, when tackling an
intelligence question
Principle 4
UNCLASSIFIED
UNCLASSIFIED
While it may be tempting to
call for an intelligence
“revolution”, at its very core
this is really more about a
transformation of the
intelligence community’s
culture, training, tools, and
tradecraft.
Principle 5
UNCLASSIFIED
UNCLASSIFIED
It is hubris to suggest that
our potential adversaries
are not as capable, or even
more capable, of far-
reaching and deeply-
embedded innovation within
their respective
organizations
Principle 6
UNCLASSIFIED
UNCLASSIFIED
“The creation of a triangular relationship among
government, industry, and academia was, in its
own way, one of the significant innovations that
helped produce the technological revolution of
the late twentieth century.”
- Walter Isaacson, The Innovators
12
Leveraging Information and
Joint Operations to Enhance
the Nation’s Defense
Mr. Gregory Radabaugh, SES
Director
Joint Information Operations Warfare Center
UNCLASSIFIED
UNCLASSIFIED
This Briefing is: UNCLASSIFIED
This information is furnished on condition that it will not be released to another nation without specific authorization of the Joint Staff, that it will be used for
military purposes only, that the individual or corporate rights originating in the information, whether patented or not, will be respected, that the recipient will
report promptly to the United States any known or suspected compromise, and that the information will be provided substantially the same degree of security
afforded it by the Department of Defense of the United States. Also, regardless of any other markings on the document, it will not be downgraded or declassified
without the written approval of the originating U.S. agency.
“The first
responsibility of any
commander is to
understand the
nature of the war he
is about to engage
in.”
~ Carl von Clausewitz
UNCLASSIFIED
UNCLASSIFIED
Famous Dead Guy Quote
UNCLASSIFIED
UNCLASSIFIED
The Chairman’s View
Basic nature of war has not changed, but the
character of war has evolved:
• Transregional – cutting across
multiple combatant commands
• Multi-domain – cutting across land,
sea, air, space, and cyberspace
• Multi-functional – involving
conventional, special operations,
ballistic missile strike, cyber, and
space capabilities
General Joseph F. Dunford, Jr.
Chairman, Joint Chiefs of Staff
Success will be obtained through the
blending of informational and physical
power.
The ‘Informationalized’ Force
• Some information advantages may be hard
to get/use
‒ Capacity/permissions
• Today’s force is the most agile and aware in
our history
– This “informationalized” force is also most
vulnerable to losing that advantage
UNCLASSIFIED
UNCLASSIFIED
• Much of the innovation in information-related
technologies of the last 300 years has been
driven by enduring military needs, such as:
– To see the terrain, the enemy, and our own forces
– To command and control forces over larger areas and
across rough terrain
– To counter the effects of darkness, weather, and physical
properties of land/air/water
The ‘Informationalized’ Environment
The information environment (IE) is the aggregate of individuals,
organizations, and systems that collect, process, disseminate or act on
information. (JP 3-13)
UNCLASSIFIED
UNCLASSIFIED
These two environments have converged and are now congruent
The operational environment (OE) is the composite of the conditions,
circumstances, and influences that affect the employment of capabilities
and bear on the decisions of the commander. (JP 1-02)
A Globally Contested Space
• Russia: Information Confrontation
(Informatsionnoye Protivoborstvo)
– State of permanent war
– Direct influence
– Special Forces and commercial irregular groups
– Contactless war
– Total war, including the enemy’s internal side and
base
– War in the human consciousness and in cyberspace
– Asymmetric: political, economic, information
technological, ecological campaigns
UNCLASSIFIED
UNCLASSIFIED
• China: The Three Warfares (San Zhan)
– Legal Warfare
– Public Opinion/Media Warfare
– Psychological Warfare
~Peter Mattsson “The Russian Armed Forces Adapted to New Operational Concepts in a Multipolar World? February 19, 2014
UNCLASSIFIED
UNCLASSIFIED
There is no such thing as peacetime in the Information
Environment:
– Information ‘rounds’ are constantly being fired—especially at you
– Without situational awareness in the IE, you will not know you are
being shot at and therefore can’t respond
– The cumulative effects could be like gamma radiation (i.e., you
don’t know it’s harming you until you’re dead)
“Steady state” and “gray area” operations often defined via information-based conflict
Affecting the IE Through IO
Information Operations is the integrating application
of capabilities to affect an adversary, or potential
adversary, to think/act as we desire…
- Lethal warfare affects the adversary via physically targeting
personnel/property, while…
- IO affects adversary information/decision making processes
Example: Iraqis, in Gulf War I,
surrender in response to
instructional leaflets and
offensive air power
UNCLASSIFIED
UNCLASSIFIED
The blending of informational power and physical power enhances each
others’ effectiveness
Culture/religion/societal norms/ideology/decision-making process underlies all target actions
UNCLASSIFIED
UNCLASSIFIED
Adversary
Decision-Maker(s)
Adversarial
Populations
Neutral
Populations
Allied/Friendly
Populations
MILDEC – Adversary believes
what you want them to believe
EW – Control EMS
Affecting Behavior Through Information
MISO – Establish/reinforce
foreign perceptions of
mil/pol/econ power/resolve
OPSEC – Protect/deny
your info
Cyber – Effects against
adversary info (i.e., decision-
making, C2) while protecting
your own; deliver information
PA – Setting narrative/agenda;
Telling your story; Countering
falsehood with truth
KLE – Influencing individuals
Military Information
Capabilities/Methods* ObjectivesLevel of Action
Target
Audiences
“To do or
not to do”
“Deny
support to
adversary”
“Support
friendly or not
interfere”
“Support
friendly”
StrategicOperationalTactical
Affecting strategic
level target
decision-making;
Influencing
behavior over
time
Affecting target
decision-making
over a series of
engagements
Affecting target
decision-making
for a specific
engagement
* Not all inclusive
UNCLASSIFIED
Purpose of IO is to affect (via integrated IRCs) decision-making (human & automated) - examples:
Deny (CO, OPSEC), Disrupt (EW), Deceive (MILDEC) vs. Understanding (Observe + Orient)
Influence (MISO), Inform (PA), Reinforce (MILDEC) vs. Will (Decide)
Destroy (CO, Kinetic), Degrade (SIO, EW) vs. Capability (Decide)
Mitigate effects (PA, CP, CO) / Exploit (due to MILDEC) vs. Act CP = Counter-Propaganda
* Adversary must have Understanding (Observe + Orient) and Capability and Will (Decide) to Act
Strategic
Operational
Tactical
*
UNCLASSIFIED
The Joint Force
applies information
power in all phases,
and especially
those phases short
of conflict...relating
to deterrence,
building the
network of Allies
and partners, and
long-term
competition
The entire force
contributes to
desired effects
through all of its
activities (e.g.,
readiness,
movement and
maneuver, training
and exercises, MIL-
to-MIL relationships,
Unified Action
activities, etc.)
Integrating Physical and Informational Power
• The IE is a complex environment comprised of
multiple systems and variables
₋ Generating effects on IE systems requires established
baselines (as a normal part of JIPOE) upon which to base
analysis
• Correctly characterizing the IE is crucial to
effectively executing IO
₋ Understanding the cognitive, physical and informational
dimensions has to be treated as foundational intelligence
₋ Associated systems, components and audiences (i.e.,
target systems analysis and target audience analysis)
• To standardize characterization of the IE for IO
planning/execution across the DIE and IC, JIOWC
has:
– Created templates based on PMESII/CTAF models to
enable IO intelligence integration
– Developed a learning continuum for the Defense
Intelligence Enterprise
The IE and Intelligence Analytics
UNCLASSIFIED
UNCLASSIFIED
Information Environment Baseline Development Framework
Analytic
Framework For
Information
Environment
Baseline
Development
Political
Describes the distribution
of responsibility and
power at all levels of
governance or
cooperation.
Military
Explore the military
capabilities of all relevant
actors in a given
operational
environment/battlespace
environment.
Economic
Encompasses individual
behaviors and aggregate
phenomena related to the
production, distribution,
and consumption of
resources.
Social
Describes the cultural,
religious, and ethnic
makeup within an
operational
environment/battlespace
environment
Information
Describes the nature,
scope, characteristics,
and effects of individuals,
organizations, and
systems that collect,
process, disseminate or
act on information.
Infrastructure
Is composed of the basic
facilities, services, and
installations needed for
the functioning of a
community or society.
Physical
Environment
Defines the physical
circumstances and
conditions that influence
the execution of
operations throughout the
domains of air, land, sea,
and space.
Time
Influences military
operations within an
operational
environment/battlespace
environment in terms of
the decision cycles,
tempo, and planning
horizons.
Physical
(Who/Where)
Consists of both key
individuals and human
networks and a technical
and physical
infrastructure that
supports the Information
flow to its intended
audience.
Informational
(How/What)
Consists of the content of
information and the way it
flows to and from a
decision maker to form a
message.
Cognitive
(Why)
Consists of the beliefs of
a person or persons
whose decisions can
impact the commander’s
end state and is the
hardest dimension to
assess.
IE Baseline Development Framework
UNCLASSIFIED
UNCLASSIFIED
Cyber Focused Information Environment Baseline Development Framework
Cyber Focused
Analytic
Framework For
Information
Environment
Baseline
Development
Political
Describes the distribution
of responsibility and
power at all levels of
governance or
cooperation.
Military
Explore the military
capabilities of all relevant
actors in a given
operational
environment/battlespace
environment.
Economic
Encompasses individual
behaviors and aggregate
phenomena related to the
production, distribution,
and consumption of
resources.
Social
Describes the cultural,
religious, and ethnic
makeup within an
operational
environment/battlespace
environment
Information
Describes the nature,
scope, characteristics,
and effects of individuals,
organizations, and
systems that collect,
process, disseminate or
act on information.
Infrastructure
Is composed of the basic
facilities, services, and
installations needed for
the functioning of a
community or society.
Physical
Environment
Defines the physical
circumstances and
conditions that influence
the execution of
operations throughout the
domains of air, land, sea,
and space.
Time
Influences military
operations within an
operational
environment/battlespace
environment in terms of
the decision cycles,
tempo, and planning
horizons.
Cyber Physical
(Physical)
-Physical Locations
-Nodes
-Wires
-Cables
-Routers
Cyber Logical
Network
(Information)
-Dynamic construct of
networks
-Ever changing
·NIPRNET
Cyber Persona
(Cognitive)
-People on the network
-Multiple individuals
can use on persona
-Difficult to attribute
and target
Cyber Focused IE Baseline
Development Framework
UNCLASSIFIED
UNCLASSIFIED
Counterterrorism Analytical Framework (CTAF)
Counterterrorism
Focused Analytic
Framework For
Information
Environment
Baseline
Development
Leadership
- Personal
qualities
- Structure,
organization,
role
- Sources of
authority
- Span/level of
control
- Visions/goals,
objectives
- Decision
making
process
- Key personnel
Safe Havens
- Physical location
- Virtual location
- Demographics,
cultural
conditions
- Political,
governance
- Access to
resources
- Terrain
- Key personnel
Finance
- Sponsorship
- Criminal activity
- Charitable activity
- Legal enterprises
- Financial
systems
- Key personnel
Communication
- Audience
- Function/intent
- Procedures,
tradecraft
- Medium/tools
- Key personnel
Movement
- Mode/method
- Facilitation
- Routes
- Purpose
- Key
personnel
Intelligence
- Plan/Direct
- Collect
- Process, analyze
- Production,
dissemination
- Security, CI
- Key personnel
Weapons
- Procurement
- R&D,
weaponization
- Production
- Distribution,
storage
- Employment
- Weapons
- Key personnel
Personnel
- Recruitment,
selection
- Training
- Use, assignment
- Sustainment
- Members,
supporters
- Key personnel
Ideology
- Unifying vision
- Indoctrination
- Legitimacy
- Propaganda
- Key personnel
Physical
(Who/Where)
Consists of both key
individuals and human
networks and a technical
and physical
infrastructure that
supports the Information
flow to its intended
audience.
Informational
(How/What)
Consists of the content of
information and the way
it flows to and from a
decision maker to form a
message.
Cognitive
(Why)
Consists of the beliefs of
a person or persons
whose decisions can
impact the commander’s
end state and is the
hardest dimension to
assess.
Counterterrorism Analytic Framework
UNCLASSIFIED
UNCLASSIFIED
What the Warfighter Needs From Intelligence
Analytics
• Finding our adversaries in the sea of
information and tracking them in real time
through multiple information sources
– Target development/vetting/validation is key
• Providing the analytic foundation to conduct
cognitive combat
– Modeling & Simulation/Red team COAs/2nd/3rd/4th order
of effects on systems
• Characterizing the information environment to:
– Enable commander situational awareness
– Enable assessment of red/blue/green effects
• Enabling the sharing of information and analytic
results with whole of government and Allied
partners
– In many cases we are operating beyond Five-Eye
coalitions
UNCLASSIFIED
UNCLASSIFIED
Intelligence Analytics Challenges
• Find/synthesize what the adversary/
potential adversary is thinking/
deciding
– Where is the adversary cognitively?
– What decisions have been made/about to
be made of which we are unaware?
• Discovery of adversary/potential
adversary through big data
– Attribution of offensive cyber
– Identification of VEO groups
– Using online behavior to predict physical
behavior/decisions
• Understanding informational power
effects in the IE, especially with
regard to collateral damage
UNCLASSIFIED
UNCLASSIFIED
Intelligence Analytics Challenges
• Discovering/analyzing adversary AI
– Understanding how adversary AI’s think/make
decisions
– Implications of AI vs. AI
• Understanding adversary/potential
adversary attitudes/thinking from
strategic to tactical
– Providing real time assessment of audience
sentiment (vice waiting for polling data)
– Increasing speed of analytics to enable real time
response to adversary actions
• Synthesizing/visualizing what the
information environment looks like
– Portraying the IE in a manner that a senior leader
can comprehend and make decisions
– Integrating publicly available information with
classified analysis
UNCLASSIFIED
UNCLASSIFIED
DISTRIBUTION A. Approved for public release: distribution unlimited. UNCLASSIFIED
UNCLASSIFIED
18
C2IE: Building an Information Environment
Common Operating Picture (iCOP)
Combining Command and Control and Commercial Marketing Best Practices Provides Rapid Capability to DoD
Entity Extraction Relationship ID Event
Detection
Foreign Language
Processing
Correlate with
DoD/IC Data
Enhance
Geolocation
Topic / Meme
Detection
Community
Detection
Coordinated
Activity Detection
Sentiment
Detection
Integrate Existing Data
Acquisition, Analytics, and
Platform Capabilities
SocialMedia
Processing
EditedMedia
Processing
Analytic Test and Evaluation
Selected InQTel-investment entity extraction
technology performed at/above published state-
of-the-art performance (0.72 F-measure) for key
entity types prior to system tuning
Operational Test and Evaluation
Initial iCOP OT&E Demonstrating Near-Real-
Time iCOP in support of PACOM / MARFORPAC
/ III MEF for Balikatan ’16 towards integration
into DISA GCCS-J
Develop Analytic TTPs
Identifying proper pairing of operational
objectives to data analytics via support to
Balikatan ’15, Freedom of Navigation Ops, US
Shows of Force
DoD
Operations
USG
Reporting
IC/DoS Reporting Counter-Intelligence
ReportingDiscrete Activities Formal Plans
iCOP
Integrated
Information
Environment /
Influence picture.
With Unclassified +
Classified Data
The Future – Enabling the JF for Success
• DoD Strategy for Operating in the Information Environment (SOIE)
– SecDef signed in June 2016
– Defines an operational end-state, and associates it with the ways to accomplish the end-
state, and the means necessary to support the ways
– Four lines of effort with active DoD level working groups: People, Programs, Policy, Partners
• Capstone Concept for Joint Operations: “Integrate physical and
informational power”
– “The deliberate leveraging of the inherent information aspects of activities in order to direct
or influence the behavior of relevant actors and/or course of events.”
– One of 8 key foundational elements in concept—projected publication: Fall 2017
• Joint Concept for Operating in the Information Environment
– Draft concept as part of Chairman’s joint concepts for future warfighting
– Describes how the future Joint Force will integrate both physical power and information
power to effectively operate in and through a more pervasive and connected information
environment—projected publication: Fall 2017
• Information as a Joint Function
– Published as a change to Joint Pub 1-0 by JS/J7 on 16 May 2017
UNCLASSIFIED
UNCLASSIFIED
Information as a Joint Function
• “The information function encompasses the
management and application of information and its
deliberate integration with other joint functions to
influence relevant-actor perceptions, behavior,
action or inaction, and human and automated
decision making. The information function helps
commanders and staffs understand and leverage
the pervasive nature of information, its military
uses, and its application during all military
operations. This function provides JFCs the ability
to integrate the generation and preservation of
friendly information while leveraging the inherent
informational aspects of all military activities to
achieve the commander's objectives and attain the
end state.”
~ JS/J7 Draft Language out for formal GOFO coordination
UNCLASSIFIED
UNCLASSIFIED
Current Joint Functions:
• Command and Control
• Intelligence
• Fires
• Movement and Maneuver
• Protection
• Sustainment
Information-fueled, information-driven forces able to
maneuver like sharks in the tumultuous sea of information
The Successful Joint Force of the Future
UNCLASSIFIED
Summary
• The information and operational environments have converged
– There is no peacetime in the IE
• Commanders lead an “informationalized” force
– Expect the advantages offered by this to be attacked/denied by adversary
• Dominating the IE is Commander’s business
– The most successful commanders in Iraq and Afghanistan made IO a part of every facet
of a unit’s or staff’s daily battle rhythm
– Every military capability available has an informational aspect to its use
• Intelligence data analytic solutions are crucial to a commander’s success
in understanding and dominating in the IE
UNCLASSIFIED
UNCLASSIFIED
Military Capabilities and Information
23
Questions/Comments
War is a contest of wills.
Will is observed through behavior.
Changing behavior is about influence.
War is about influence
Integrated Information
Warfare for the
21st Century
PEOC4I.NAVY.MIL
Program Executive Office
Command, Control, Communications,
Computers and Intelligence (PEO C4I)
1 May 2018
Tim Anderson
DCGS-N Inc 2 APM (PMW 120)
(703) 692-1726
timothy.a.anderson2@navy.mil
Battlespace Awareness and Information
Operations Program Office (PMW 120) for
Intelligence Analytics 2018 Meeting
v1.0
DISTRIBUTION STATEMENT A: Approved for public release, distribution is unlimited ( 7 February 2018)
PEO Initiatives
• PEO Focus: Accelerated delivery of required capability that is
affordable, integrated, and interoperable
• Speed of technology exceeding speed of acquiring, testing, installing,
and fielding of C4I capability.
• Developing, testing, fielding, and training at the box level AND
capability level
• Multiple install configurations minimizing learning curve opportunities
2
VISION
| Information Operations
| Information, Surveillance, & Reconnaissance
| Meteorology & Oceanography
IO
ISR
METOC
Provide quality Information Warfare capabilities to the Warfighter for a decisive
operational advantage
Deliver assured intelligence, meteorology, oceanography, and information operations
data, products, and services that provide Information Warfare capabilities to the Fleet
MISSION
Battlespace Awareness
and Information Operations
3
Agile • Integrated • Vital
DCGS-N Inc 2 OV-1
5
DCGS-N Increment 2
Challenges
6
• Exponential increases in data form multi-service, IC, and
international partners (not to mention commercial)
• Continual reduction in expected timeline for sensor to
mission impact
• Balancing increased need for interoperability and agile
capability deliveries with operational and cyber risk
management
• The age-old challenge of "It's a computer, why doesn't it
all just work?"
7
DCGS-N Applications
C
R
O
S
S
D
O
M
A
I
N
D
A
T
A
S
T
R
A
T
E
G
Y
CommonAnalytics
APIs
Operating Environment
CANES SW 3
LOOSELY COUPLED
ACS3.0
CANES
NITES
Next
DCGS-N
Inc2
NCSA
MTC2
NOSS
CANES Hybrid
Hyper-Converged Infrastructure
CANES HW 1.2
Quellfire
METOC Data
Talon Thresher
S2A/Mongoose
Predictive Analytics
Collection Management
Historical Data
Vessel/Cargo/Fishery
Multi Domain PKI enabled
Program Description:
Next generation ISR&T solution for ingesting,
processing, exploiting, correlating and disseminating
data from Navy, joint and national sensors.
Limited Capability Available FY18
• Anticipates the sensor “tipping point” by leveraging IC
investment in C2S and Advanced Analytics
• Automated workflows, data fusion, and machine
learning
• Accelerated precision Orientation and Decision-
making
DCGS-N FOS Infrastructure
ICITE
Distributed
Operations
National
Theater
Data Analytic
Node
Edge
Nodes
DCGS Family of Systems
Intelligence Community
Shared Data
Leverages significant Intelligence
Community worldwide
connections, investments, and
capabilities by utilizing Amazon
Commercial Cloud Services and
ICGOVCLOUD to support the
tactical edge.
Synchronize tactical commander’s
data lakes and ponds with relevant
geographic and specific NTM data.
Data Exchange mechanism for
commanders to share tactical
intelligence with
Fleet Commanders, Services,
Coalition, and IC partners.
Compliant with current IC and
DI2E mandated data standards
DCGS-NDCGS-A
DCGS-AF DCGS-MCDIB
DCGS-IC DCGS-SOF
Data ocean for the Navy supporting fleet commanders by providing access to national
technical means (NTM), operational level (OPINTEL), and tactical (TACINTEL) intel
on a world wide scale.
9
10
Digital Warfare Platform
MTC2
NOBLE
DCGS-NInc2
GCCS-M
NCSA
NITESNEXT
Capability expressed as service-based workflows within and between PEO C4I
programs governed by the Navy Tactical Analytic Framework
DIB
DCGS
FOS
DDTS
Combat
Systems
Ingest Fusion Analytics Display Distribution
Agile Core Services (ACS)
ISR
Workflow
Planning
Workflow
Knowledge Base
RIGORS
ALERTING
AMICA
SAVA
Track History Overlays O-Plans Threat Data Readiness
CANES / STACC / NEDC / Cloud
Class/Unclass
Data Feeds
(Dozens)
OTP
NAVY
WAVE
OTM
PEO S&T Focus Areas and
Capability Gaps
• Battlespace Awareness (BA)
 BA will require enhanced and advanced means to rapidly sense, collect, process,
analyze, and evaluate information content to exploit the operating environment
 The understanding of the operating environment will serve as the basis from which nearly
all decisions will be made, enabling our forces to more effectively maneuver and
coordinate actions that engage and target enemy forces
• Tasking, Collection, Processing, Exploitation and Dissemination (TCPED) Network
Architecture requires automated data tagging of security information (at the fused
entity (Observed Entity and Maritime Object of Interest) level
• A Collection Management (CM) Tool to fully automate Intelligence Surveillance and
Reconnaissance (ISR) Planning would include integration of current and disparate
sensors (IMINT, SIGINT, MASINT) and associated ISR assets (national, theater
and tactical)
11
Visit us at www.peoc4i.navy.mil
We Deliver
Information Warfare
Capabilities to the
Fleet.
• Virtualized capability enables distributed multi-intelligence
operations for the Warfighter
• Provides the Navy with an integrated, distributed net-centric
grid framework
• Remote operations allow ashore support to rapidly provide
threat I&W
Material
Solution
Analysis
Technology
Maturation &
Risk Reduction
Engineering &
Manufacturing
Development
Production & Deployment Operations & Support
Pre-Systems Acquisition Systems Acquisition Sustainment
A B C
• Enhances SSEE Increment F capabilities to detect and track
radio signals
• Advanced antennas increase frequency
coverage to improve threat signal acquisition
Classic Reach
• Highly-sensitive electronic
support measure (ESM) system
that provides automated signal
acquisition, direction finding, and
target ID and geolocation
• Delivers threat indications and
warnings (I&W) for ship/strike
groups; feeds data to National
consumers
Ship’s Signal
Exploitation Equipment
(SSEE) Increment E
• Broadens signals intelligence
collection
• Standardized IO weapon system
across multiple maritime
platforms based upon a common
core capability: responds to
emerging threats, promotes
flexible asset tasking, supports
cross-training personnel
• Small footprint variant enables
mission-specific configuration
and rapid deployment
of new technology
Ship’s Signal Exploitation
Equipment (SSEE) Increment F
• Prosecutes SOI to deliver
real-time situational awareness of
key threats and geo-location on
high-priority targets
• Quick-reaction capability
addresses advancements in
foreign military comms and ISR
systems; provides non-permanent
capability to platforms not
equipped with permanent IO
warfare systems, or augments
permanent equipment
• Ingests and correlates off-board
and organic intelligence data;
disseminates multi-intelligence
products to provide valuable,
actionable intelligence
Cryptologic Carry On
Program (CCOP)
• Next generation Information
Warfare weapons system
enhances signals exploitation
capabilities
• Detects, classifies, and tracks
Signals of Interest (SOI) beyond
current requirements to improve
automation, operability, and
intuitiveness in TCPED process
• Scalable, mission-configurable,
modular (plug & play),
remotable; supports new
threats/ capabilities
• Enables cross-system data
sharing to support EMW/IF
Spectral
IO Capabilities
Sailors learn the
SSEE Inc E
ESM systemSailor provides routine
maintenance to the
AS-4623 IO Antenna
SSEE Mods Maintainer performs system check
13
Ship’s Signal Exploitation Equipment
(SSEE) Modifications
• Fuses environmental data to determine
the effect on a platform’s weapons
systems ability to conduct missions
• Tools and tactical decision aids that
on-site meteorologists use to develop
forecasts and predict impact to
electromagnetic-spectrum propagation
• Executes agile software development
to ensure flexibility
in meeting emergent
requirements and
addressing Fleet
user priorities
Naval Integrated Tactical
Environmental System-Next
Generation (NITES-Next)
Oceanographic
Information System
(OIS)
Primary Ocean
Prediction System
(POPS)
Hazardous Weather Detection and Display
Capability (HWDDC)
• HWMMV-mounted mobile weather
station helps Warfighters navigate d
dynamic battlefield conditions
• Collects, processes, and transmits
METOC data
• Sustains global
oceanographic and
hydrographic surveying
in support of undersea
warfare and navigation
safety
• Enables undersea dominance in
support of anti-submarine warfare,
mine countermeasures, special operations
• LBS-Glider senses ocean and thermal
light transmission properties critical to
weapon and sensor performance,
planning, execution
• LBS-Autonomous Undersea Vehicle
collects bathymetric & bottom imagery
to provide battlespace awareness of
the undersea environment
Material
Solution
Analysis
Technology
Maturation &
Risk Reduction
Engineering &
Manufacturing
Development
Production & Deployment Operations & Support
Pre-Systems Acquisition Systems Acquisition Sustainment
A B C
• Enhanced remote
sensing capability
discriminates
oceanographic
phenomenon from the
natural environment
• Automated tools
increase coverage
area, reduce timeline,
decrease analyst
workload
Remote Sensing
Capability
Development (RSCD)
METOC Capabilities
14
Littoral Battlespace Sensing–
Unmanned Undersea Vehicle (LBS-UUV)
• Supercomputer fuses
worldwide METOC
data to feed weather
prediction models
• IT infrastructure
provides
environmental
prediction across
multiple classification
enclaves for Navy
geophysical data
• Extracts and converts data from
surveillance radars to generate
weather situational awareness
& help the Fleet find the optimal
conditions to conduct missions
• Off-boards data to FMNOC to influence regional
weather prediction models & enhance real-time analysis
Marine Corps Meteorological Mobile Facility
(Replacement) Next Generation
(METMF(R) NEXGEN)
Operational Vision - Integrated Fires, part of
Electromagnetic Maneuver Warfare (EMW)
• Integrate kinetic and non-kinetic fires
• High Side Fusion (HSF)
• Combat Systems Integration (CSI)
• Battle Management Aids (BMA)
• Fully integrating National Technical Means (NTM),
organic sensors and weapon systems information
Enabled By Key Technologies:
• Integrate systems across PMW 120 portfolio
• Homogenize user interfaces – “Microsoft Ribbon”
• Data framework (analytic, ingest, data tagging)
• Robust Cross Domain Solution
Direct Benefit To Fleet/Sailors
• Allow analysts to focus on analysis
• Reduce training time through improved usability
• Provide ability to tailor systems to mission
• Present data to Sailor based on role
Electromagnetic Maneuver Warfare
Enabled By PMW 120
Focus on shortening the kill chain (kinetic and non-kinetic) 15
Kill Chain
TCPED
OODA
NIFC-CA
IPB/E FIND FIX TRACK TARGET ENGAGE ASSESS
Future Capability Development
EMW/IF Alignment
END STATE:
System of Systems interoperability that provides
• Accurate combat ID
• Complete Blue Force mission suitability assessments
• Optimal Force synchronization
• Target quality geolocation
• Automated asset allocation recommendations
• Coordinated C2 / C-ISR tools
• Single Integrated Picture (SIP)
• Complete spectrum awareness and control
• Full spectrum cyber operations
• Full spectrum NAVWAR
CURRENT STATE: Systems are NOT integrated and
interoperable to meet emerging threats
Meteorology &
Oceanography
(METOC)
Combat
Systems
(CS)
National
Technical Means
(NTM)
Logistics /
Readiness
Command
and Control
(C2)
Information
Operations
(IO) Intelligence,
Surveillance, &
Reconnaissance
(ISR)
• High Side Fusion
• Increased Automation
• Spectrum
Management
• Sensor Cross-Cueing
• Non-Kinetic Fires
• Optimized Maneuver
• Enhanced OTHT
• Counter-ISR&T
• HALO COP
• Int NTM & Tactical
Geolocation
• Comms in a DDIL
Environment
• NAVWAR
• Battle Management Aids
• Combat Systems
Integration
• Automated Assessment
and COAs
Phased delivery of new and continuously enhanced capability over time
Phase I Phase II Phase III
* 120 / 150 Aligned
16
October 22-24, 2018 // Washington, D.C.
www.homelandsecurityweek.com
view
agenda
purchase
pass
sponsor

More Related Content

What's hot

Model Execution and System Simulation
Model Execution and System SimulationModel Execution and System Simulation
Model Execution and System SimulationObeo
 
IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1Mohamed Zakarya Abdelgawad
 
Coherent or direct detect for the data center interconnect?
Coherent or direct detect for the data center interconnect?Coherent or direct detect for the data center interconnect?
Coherent or direct detect for the data center interconnect?ADVA
 
Sydney Water Target Operating Model Design
Sydney Water Target Operating Model DesignSydney Water Target Operating Model Design
Sydney Water Target Operating Model DesignSheng Zhong (Steven)
 
Anaplan Insurance Connected Breakfast
Anaplan Insurance Connected Breakfast Anaplan Insurance Connected Breakfast
Anaplan Insurance Connected Breakfast Anaplan
 
Network Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionNetwork Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionD.A. Mohan
 
Managed Services Model For IT Services
Managed Services Model For IT Services Managed Services Model For IT Services
Managed Services Model For IT Services Ajay Rathi
 
Application Portfolio Management
Application Portfolio ManagementApplication Portfolio Management
Application Portfolio ManagementAlain Charpentier
 
Secret History of Silicon Valley - Master Slide Deck
Secret History of Silicon Valley - Master Slide DeckSecret History of Silicon Valley - Master Slide Deck
Secret History of Silicon Valley - Master Slide DeckStanford University
 
Journey to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - AccentureJourney to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - AccentureAmazon Web Services
 
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...Precisely
 
Adaptive analog beamforming
Adaptive analog beamformingAdaptive analog beamforming
Adaptive analog beamformingKhalid Hussain
 
Radar 2009 a 19 electronic counter measures
Radar 2009 a 19 electronic counter measuresRadar 2009 a 19 electronic counter measures
Radar 2009 a 19 electronic counter measuresForward2025
 
IT Strategic Capabilities - Mary Stacey
IT Strategic Capabilities - Mary StaceyIT Strategic Capabilities - Mary Stacey
IT Strategic Capabilities - Mary StaceyMary Stacey
 
Radar 2009 a 7 radar cross section 1
Radar 2009 a 7 radar cross section 1Radar 2009 a 7 radar cross section 1
Radar 2009 a 7 radar cross section 1Forward2025
 
International Target Operating Model Design
International Target Operating Model DesignInternational Target Operating Model Design
International Target Operating Model DesignChris Oddy
 
ELINT Interception and Analysis course sampler
ELINT Interception and Analysis course samplerELINT Interception and Analysis course sampler
ELINT Interception and Analysis course samplerJim Jenkins
 
Manage services presentation
Manage services presentationManage services presentation
Manage services presentationLen Moncrieffe
 

What's hot (20)

Model Execution and System Simulation
Model Execution and System SimulationModel Execution and System Simulation
Model Execution and System Simulation
 
IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1
 
Coherent or direct detect for the data center interconnect?
Coherent or direct detect for the data center interconnect?Coherent or direct detect for the data center interconnect?
Coherent or direct detect for the data center interconnect?
 
Sydney Water Target Operating Model Design
Sydney Water Target Operating Model DesignSydney Water Target Operating Model Design
Sydney Water Target Operating Model Design
 
Anaplan Insurance Connected Breakfast
Anaplan Insurance Connected Breakfast Anaplan Insurance Connected Breakfast
Anaplan Insurance Connected Breakfast
 
Network Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionNetwork Centric Warfare - An Introduction
Network Centric Warfare - An Introduction
 
Managed Services Model For IT Services
Managed Services Model For IT Services Managed Services Model For IT Services
Managed Services Model For IT Services
 
Application Portfolio Management
Application Portfolio ManagementApplication Portfolio Management
Application Portfolio Management
 
Strategic Operating Model
Strategic Operating Model Strategic Operating Model
Strategic Operating Model
 
Secret History of Silicon Valley - Master Slide Deck
Secret History of Silicon Valley - Master Slide DeckSecret History of Silicon Valley - Master Slide Deck
Secret History of Silicon Valley - Master Slide Deck
 
Journey to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - AccentureJourney to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - Accenture
 
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
 
Adaptive analog beamforming
Adaptive analog beamformingAdaptive analog beamforming
Adaptive analog beamforming
 
Radar 2009 a 19 electronic counter measures
Radar 2009 a 19 electronic counter measuresRadar 2009 a 19 electronic counter measures
Radar 2009 a 19 electronic counter measures
 
IT Strategic Capabilities - Mary Stacey
IT Strategic Capabilities - Mary StaceyIT Strategic Capabilities - Mary Stacey
IT Strategic Capabilities - Mary Stacey
 
Btm2
Btm2Btm2
Btm2
 
Radar 2009 a 7 radar cross section 1
Radar 2009 a 7 radar cross section 1Radar 2009 a 7 radar cross section 1
Radar 2009 a 7 radar cross section 1
 
International Target Operating Model Design
International Target Operating Model DesignInternational Target Operating Model Design
International Target Operating Model Design
 
ELINT Interception and Analysis course sampler
ELINT Interception and Analysis course samplerELINT Interception and Analysis course sampler
ELINT Interception and Analysis course sampler
 
Manage services presentation
Manage services presentationManage services presentation
Manage services presentation
 

Similar to DHS Intelligence Analytics E-Book

ITACG_Guide_for_First_Responders_2011
ITACG_Guide_for_First_Responders_2011ITACG_Guide_for_First_Responders_2011
ITACG_Guide_for_First_Responders_2011Robert J. Breitenbach
 
The big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-raceThe big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-raceHop Trieu Sung
 
Big Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms RaceBig Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms RaceDotmappers1
 
GAOUnited States General Accounting OfficeReport to the Ra.docx
GAOUnited States General Accounting OfficeReport to the Ra.docxGAOUnited States General Accounting OfficeReport to the Ra.docx
GAOUnited States General Accounting OfficeReport to the Ra.docxbudbarber38650
 
1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalyticsDaniel John
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy Mohit Kumar
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaLizbethQuinonez813
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]Lucy Kitchin
 
Alchemy of Big Data
Alchemy of Big DataAlchemy of Big Data
Alchemy of Big DataChuck Brooks
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxronak56
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
What is data-driven government for public safety?
What is data-driven government for public safety?What is data-driven government for public safety?
What is data-driven government for public safety?IBM Analytics
 
Alliance Group Research (AGR) Corporate Presentation
Alliance Group Research (AGR) Corporate PresentationAlliance Group Research (AGR) Corporate Presentation
Alliance Group Research (AGR) Corporate PresentationRichard Cole
 
Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligencehfrancob
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Maurice Dawson
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 

Similar to DHS Intelligence Analytics E-Book (20)

ITACG_Guide_for_First_Responders_2011
ITACG_Guide_for_First_Responders_2011ITACG_Guide_for_First_Responders_2011
ITACG_Guide_for_First_Responders_2011
 
The big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-raceThe big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-race
 
Big Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms RaceBig Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms Race
 
The Power of Identity
The Power of IdentityThe Power of Identity
The Power of Identity
 
GAOUnited States General Accounting OfficeReport to the Ra.docx
GAOUnited States General Accounting OfficeReport to the Ra.docxGAOUnited States General Accounting OfficeReport to the Ra.docx
GAOUnited States General Accounting OfficeReport to the Ra.docx
 
1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expa
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
 
Alchemy of Big Data
Alchemy of Big DataAlchemy of Big Data
Alchemy of Big Data
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
What is data-driven government for public safety?
What is data-driven government for public safety?What is data-driven government for public safety?
What is data-driven government for public safety?
 
Grey Logic
Grey LogicGrey Logic
Grey Logic
 
Alliance Group Research (AGR) Corporate Presentation
Alliance Group Research (AGR) Corporate PresentationAlliance Group Research (AGR) Corporate Presentation
Alliance Group Research (AGR) Corporate Presentation
 
Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligence
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 

Recently uploaded

Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.Christina Parmionova
 
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…nishakur201
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTaccounts329278
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27JSchaus & Associates
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28JSchaus & Associates
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up NumberMs Riya
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)ahcitycouncil
 
Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Christina Parmionova
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...Suhani Kapoor
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxPeter Miles
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxaaryamanorathofficia
 

Recently uploaded (20)

Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.
 
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
 
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CT
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28
 
How to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the ThreatHow to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the Threat
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)
 
Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptx
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
The Federal Budget and Health Care Policy
The Federal Budget and Health Care PolicyThe Federal Budget and Health Care Policy
The Federal Budget and Health Care Policy
 

DHS Intelligence Analytics E-Book

  • 1. Intelligence Analytics E-BOOK An inside look into how DHS & the DOD are leveraging intelligence analytics to protect the homeland October 22-24, 2018 Washington, D.C.
  • 2. Table of Contents Intelligence Analytics in the News3. Page Intelligence Budget for FY 2018 Infographic6. 7. 12. 25. 48. Sustaining Our Long-Term Competitive Advantage Through Intelligence and Data Analytics,  Leveraging Information and Joint Operations to Enhance the Nation’s Defense Battlespace Awareness and Information Operations Program Office (PMW 120) for Intelligence Analytics 2018 Meeting Intelligence Analytics at DHS: FY19 Budget Highlights About the 2018 Homeland Security Week62.
  • 3. I N T E L L I G E N T A N A L Y T I C S I N T H E N E W S Y O U R C H E A T S H E E T F O R T H E L A T E S T O N H O W G O V E R N M E N T A G E N C I E S A R E L E V E R A G I N G I N T E L L I G E N C E A N A L Y T I C S T O B E T T E R S E C U R E T H E H O M E L A N D . CLICK ON THE PICS TO BE REDIRECTED TO THE ARTICLE www.homelandsecurityweek.com/
  • 4. Accenture surveyed 6,381 executives and 18 industries in 25 countries to find the technology trends that will have the greatest impact on companies, federal government and public service agencies. Intelligence Analytics Toolbox Five Technology Trends shaping the Future of Government Another Defense Agency to Tap CIA's Commercial Cloud Documents indicate the Army’s National Ground Intelligence Center aims to provision secret and top secret cloud services from the Amazon-developed C2S Cloud. What the U.S. Air Force wants out of artificial intelligence — and an exclusive look into its next project to fuse everything. ‘Wouldn’t It Be Great If We Could Shoot Someone in the Face at 200 Kilometers?’ Beyond delivering the latest in headlines, cute animal videos and presidential firings, Twitter may play an important role in helping public health officials predict emerging biothreats. Winner of DHS’s Hidden Signals challenge uses Twitter to Predict Biothreats Palmer Luckey’s Border Control Tech has Already Caught Dozens of People DHS Spotlight Oculus is touting a surveillance system called Lattice that would survey the motion of potential border-crossers from up to two miles away. www.homelandsecurityweek.com/
  • 5. A B O U T   H O M E L A N D S E C U R I T Y W E E K A G E N D A P R I C I N G S P O N S O R DHS Wants to Take a Page from the Startup Community The Homeland Security Department is constantly developing new technology to keep pace with the latest national security threats, and it’s relying on strategies from tech startups to do so, according to the agency’s research and development leader. S&T Directorate Developing Algorithms to ID Child Exploitation Victims DHS Funds Cyber Data Research DHS S&T Analytics are Helping to Secure American Skies (Multi-Video) To gain an accurate assessment of current air surveillance capabilities and how they operate together, DHS S&T is creating standards for air surveillance, known as DHS (Interim) Strategic Air Surveillance Requirements (I)SASR. S&T has initiated a project to design, develop, test, and integrate new face detection and recognition algorithms for use in identifying victims of child pornography circulating on the dark web. Federal cyber defenders are taking a data-centric approach in their efforts to boost cyber defense research, distributing more than $5.6 million in contracts focused on new ways to collect data on hacking attempts that can eventually be used to counter those threats. www.homelandsecurityweek.com/ October 22-24, 2018 // Washington, D.C.
  • 6. Everything You Need to Know About the $5 Billion Increase in the U.S. Intelligence Budget for FY 2018 The United States intelligence budget comprises all the funding for the agencies of the United States Intelligence Trump administration requested $57.7 billion for the National Intelligence Program (NIP), an increase from a re- quested $54.9 billion in FY 2017. The Administration additionally requested $20.7 billion for the Military Intelligence Program (MIP), up from a requested $18.5 billion in FY 2017. No other MIP budget figures or program details will be released, as they are classified for national security reasons. Central Intelligence Agency Estimated $13 Billion The CIA is the most recognized intelligence agency, known for spying on foreign governments and conducting covert operations. Its primary stated mission is to collect, evaluate and disseminate foreign intelligence to assist the president and senior United States government policymakers in making decisions about national security. National Intelligence Program (NIP) $57.7 Billion Bureau of Intelligence and Research $59 Million Office of Terrorism and Financial Intelligence $116.78 Million Department of Treasury $12.7 Billion BOTH NIP AND MIP National Security Agency Estimated $10 Billion The NSA focuses on signals intelligence, monitoring, and collecting and processing communications and electronic information. It protects U.S. information systems from outside penetration. Defense Intelligence Agency Estimated $4.4 Billion The DIA is the primary entity responsible for collecting and analyzing intelligence on foreign militaries, with support from the intelligence offices of all the military branches. National Geospatial- Intelligence Agency Estimated $5 Billion NGA is the provider of geospatial intelligence – analysis and information about Earth’s natural and man-made features and geo-tagged activities. “GEOINT” is used for combat, humanitarian and disaster relief, border and transportation security and security planning for special events. Military Intelligence Program (MIP) $20.7 Billion April 30-May 2 2018 Washington, D.C. The Office of Naval Intelligence The Office of Naval Intelligence mission includes real-time reporting on the developments and activities of foreign navies, protecting maritime resources and interests, monitoring and countering transnational maritime threats, and providing technical, operational, and tactical support to the U.S. Navy. United States Special Operations Command Its primary missions are to provide Human Intelligence (HUMINT) and Signal Intelligence (SIGINT) mainly for Delta and DEVGRU’s (SEAL Team Six) operations. Marine Corps Intelligence Activity The Marine Corps’ intelligence officers create military maps, intercept and translate radio and electronic signals, analyze images collected from sensors and carry out counterintelligence. Airforce ISR Agency The Air Force ISR Agency provides intelligence, surveillance and reconnaissance (ISR) products, applications, capabilities and resources, to include cyber and geospatial forces and expertise. U.S. Army Military Intelligence The primary mission of military intelligence in the United States Army is to provide timely, relevant, accurate, and synchronized intelligence and electronic warfare support to tactical, operational and strategic-level commanders. The Office of Intelligence and Analysis sits within the Office of Terrorism and Financial Intelligence, which works to prevent sanctioned countries, money launderers, terrorists, drug kingpins and purveyors of weapons of mass destruction from moving money through the U.S. financial system. Defense Cryptologic Program The Defense Cryptologic Program (DCP) takes on defense-wide cryptologic activities outside of the National Foreign Intelligence Program (NFIP). Federal Bureau of Investigation $8.77 Billion The FBI’s focus is on stopping terrorism, corruption, organized crime, cyber crime and civil rights violations, as well as investigating serious crimes such as major thefts or murders. The FBI protects the United States from foreign intelligence. Department of State $37.6 Billion The Department of State collects and analyzes intelligence on global affairs and advises the secretary of State and other diplomats. It conducts foreign opinion polls and tracks and analyzes issues that may undermine U.S. foreign policy objectives, such as weapons proliferation, human trafficking and drug smuggling.
  • 7. INTELLIGENCE ANALYTICS AT DHS FY19BUDGET HIGHLIGHTS Find out where and why DHS will be investing in intelligent analytics in 2019
  • 8. S C I E N C E A N D T E C H N O L O G Y D I R E C T O R AT E Apex Programs $7.7MPROJECT FUNDING: Apex Screening at Speed (SaS) Apex SaS is developing technology that would enable the scanning of walking passengers, acquiring data through most garments and reliably detecting a wider range of prohibited items regardless of concealment. Future systems that record and analyze a wide array of data from each bag would provide greater security while limiting the number of invasive, time-consuming false alarms, all without the need for today’s cumbersome restrictions on removing electronic devices, liquids, aerosols, and gels from the bag for scanning.   A collection of S&T projects, Apex Programs represent one or more paths toward achieving an increased or improved capability for the Homeland Security Enterprise(HSE). Resulting from a visionary goals, an S&T strategic priority, or an external stakeholder’s operational need Apex Programs take the next steps towards implementing solutions to improve the security and resilience of our nation. Using representative data, demonstrate algorithms to associate passengers and their belongings using video analytics. Passenger-baggage correlation is a required technology for risk-based screening in a single checkpoint lane. Complete testing and accept a test and evaluation report regarding a prototype capable of scanning for aviation-size threats, suitable for use if a passenger were in motion at a walking pace Transition a passenger screening algorithm to TSA, capable of processing inputs and detecting threats from any Digital Imaging and Communication for Security (DICOS) compliant passenger imaging system.  FY 2018 Planned Key Milestone Events FY 2019 Planned Key Milestone Events Demonstrate the use of a third-party threat algorithm on an S&T prototype AIT system using open standards. Demonstrate an AIT system capable of screening passengers at a walking pace while scanning for aviation-size threats.  Apex Border Situational Awareness  (BSA) $2.3M CBP and partner law enforcement agencies (Federal, state, local, tribal, and international) need improved situational awareness to more effectively and efficiently deploy their resources to the areas of highest risk. BSA aims to improve border situational awareness by establishing an enterprise capability to (1) access more data sources, (2) make available decision support tools to translate the data into actionable information and intelligence, and (3) share that actionable information and intelligence with partner law enforcement agencies. FY 2018 Planned Key Milestone Events FY 2017 Key Achievements  Conducted pilot of Spiral 1 of the BSA project focused on establishing enterprise information sharing for CBP. Performed Spiral 2 requirements analysis and develop requirements focused on tactical response for CBP FY 2019 Planned Key Milestone Events Perform integration and developmental testing of selected Spiral 2 solutions.  Conduct pilot of Spiral 2 of the BSA project focused on improving tactical response for CBP.    Initiate transition of selected Spiral 2 technologies into existing CBP system baseline, focused on improving tactical response. Perform integration and developmental testing of selected Spiral 3 solutions; focused on improving strategic planning for CBP.  NAME: DESCRIPTION: NAME: PROJECT FUNDING: DESCRIPTION:
  • 9. S C I E N C E A N D T E C H N O L O G Y D I R E C T O R AT E $5.2MPROJECT FUNDING: Data Analytics Engine (DA-E) Apex SaS is developing technology that would enable the scanning of walking passengers, acquiring data through most garments and reliably detecting a wider range of prohibited items regardless of concealment. Future systems that record and analyze a wide array of data from each bag would provide greater security while limiting the number of invasive, time-consuming false alarms, all without the need for today’s cumbersome restrictions on removing electronic devices, liquids, aerosols, and gels from the bag for scanning.   Conduct experiments and deliver reports and recommendations regarding the use of automated image, video, and speech analytics to meet DHS mission needs for immigration and border security as well as other DHS missions.  Deliver a framework for approaching Real Time Analytics for Multi-Latency Multi-Party Metro Scale Networks (RAMMMNets) problem sets to improve the focus and impact of research efforts on homeland security mission priorities including Smart Cities.  Deliver an analysis of advanced analytic applications such as graph processing capabilities to U.S. Immigrations and Customs Enforcement (ICE) that demonstrate significant mission impact for national security investigations and that is also relevant to other DHS mission areas including nuclear threat detection and critical infrastructure protection.  FY 2018 Planned Key Milestone Events FY 2019 Planned Key Milestone Events Partner with industry and universities to document, analyze and assess the performance of the latest advanced analytics and computational methods to identify significant threats and opportunities for DHS, Components and the HSE.   NAME: DESCRIPTION: FY 2017 Key Milestone Events Delivered Knowledge Product report on text analysis functions of three big data platforms to inform future DHS investments based on the skill set of the end user, the type of problem that needs to be solved, and the product’s financial resources.  Completed evaluation of capabilities by subject matter experts to detect and characterize live streaming/video analytical capabilities to improve DHS and law enforcement abilities to find relevant, actionable content.  Provided a tailored solution to complete two operational tests of open source and social medial analytic tools with DHS Components.  Delivered report evaluating 275 open source and social media tools to support DHS screening and vetting missions and inform future R&D needs.  Develop an advanced concept prototype, experiments and technical reports to help DHS discern data, analytics and computational architecture requirements for next generation mission and operations analytic systems.     Deliver technical reports that are based upon laboratory analysis and experimentation with advanced analytics and computation technologies that pose significant homeland security threats and/or offer significant mission opportunities to improve enterprise knowledge and appropriately support acquisition decision making for components and HSE.
  • 10. S C I E N C E A N D T E C H N O L O G Y D I R E C T O R AT E $5MPROJECT FUNDING: Social Media Research Leveraging open source and social media (OSSM) effectively has become increasingly important to DHS missions, as an increasing amount of data becomes available online. OSSM tools that support DHS missions are in an immature, early stage. There are major challenges including but not limited to the need to scale tools to the levels of DHS operations; controlling the vast amount of data while respecting privacy and civil liberties; and automatically processing non-text data such as video and images to efficiently cue information of interest for analysts, officers, and agents. Piloting commercial tools within the HSE enables DHS to fully explain OSSM challenges in operational contexts, develop and improve OSSM methodologies, capture gaps in commercial tools and architectures, develop first generation capabilities for non-text data, and work with industry to develop additional capabilities.  Delivered report evaluating 275 open source and social media tools to support DHS screening and vetting missions and inform future R&D needs.  Provide a tailored solution to complete two operational tests of open source and social media analytic tools with DHS Components.  FY 2018 Planned Key Milestone Events FY 2019 Planned Key Milestone Events Deliver mission experiments, prototypes and pilots for automating video and speech analytics to improve open source and social media analytics in order to improve screening, vetting, situation awareness, and investigative missions of DHS Components including CBP, ICE, and USCIS.  Partner with industry to improve government research and development relationships with regard to improving public safety and security using open source and social media data sources.  Conduct research and development in cooperation with industry, universities, and other Government agencies as appropriate to improve and provide technical guidance to components and members of the HSE regarding open source and social media screening, vetting, situation awareness, and investigations methodologies.  NAME: DESCRIPTION: FY 2017 Key Milestone Events Deliver report on DHS social media gaps and requirements that would inform future investments. Develop and assess livestream prototypes and experiments.  Furthermore, though cyber research was formerly housed primarily in the department’s Science and Technology Directorate, that funding, which totals $41 million , will be redirected to the cyber and infrastructure protection division - the National Protection and Programs Directorate or NPPD. Overall, S&T's budget is significantly lower that it has been in the past. Since FY17: S&T's total budget has been reduced by 25% from $781M to $583M The R&D budget has been cut by a whopping 33% from $470M to $311M What Was Cut?
  • 11. U . S . C u s t o m s a n d B o r d e r P r o t e c t i o n National Targeting Center (NTC) Expansion  Process larger volumes of data efficiently, resulting in streamlined information-sharing and better targeted enforcement actions. The increased resources will enhance CBP’s ability to collect, disseminate, retain, analyze, and more effectively utilize information provided by travelers or collected during encounters.  Enable CBP to better identify and vet high risk passengers and cargo by producing fewer and better targets while providing expanded information and analytics on possible matches. CBP will also be able to collect more data during encounters, transforming it into useful information for intelligence analysis that inform targeting rules, border operations, and other border security mission sets. CBP and other components that leverage its capabilities may share, disseminate, and analyze data collected across the Department for their respective missions.  NAME: DESCRIPTION: The FY 2019 President’s Budget includes an increase in funding and personnel for the NTC. The NTC employs highly skilled targeting specialists using state-of-the-art technologies to identify high-risk shipments and travelers that may be connected to terrorism or other transnational crimes. In FY 2019, additional resources are provided to further support data analytics and statistical modeling capabilities to identify high-risk people and cargo in the air, land, and sea environments, both entering and leaving the United States. Increased data analytics and statistical modeling capabilities will allow the NTC to:  Mission Support BUDGET BREAKDOWN: $6.2M to support data analytics $4.0M towards statistical modeling  C o u n t e r i n g We a p o n s o f M a s s D e s t r u c t i o n FY 2019 Planned Key Milestone Events NAME: Analytical Techniques for Nuclear Detection (Analytics) DESCRIPTION: The Analytics sub-project of Exploratory Research has two thrust areas: Algorithms are developed to improve the means and abilities to detect, locate, and identify threat materials. Modeling and simulation tools are developed to aid in the analyses of R/N detection capabilities as they are, and as they could be, which could be used in identification of capability gaps, risk analysis for system threat reviews, or cost- benefit analysis within CWMD’s solutions development process. The project is an activity supporting the Cost Effective, Search, and Pathways grand challenges. BUDGET: Part of the $18M allocated towards Exploratory Research (ER) Complete Proof of Concept for Nuclear Inspection Node Event Simulator (NINESIM), a modeling tool designed to aid cost-benefit analysis of different CONOPS and detection equipment with the potential to be deployed at radiation detection checkpoints.
  • 12. Sustaining Our Long-Term Competitive Advantage Through Intelligence and Data Analytics Lieutenant General Jack Shanahan OUSDI Director for Defense Intelligence (Warfighter Support) 23 May 2017
  • 13. 2 “Data are to this century what oil was to the last one: a driver of growth and change. Flows of data have created new infrastructure, new businesses, new monopolies, new politics and—crucially—new economics. Digital information is unlike any previous resource; it is extracted, refined, valued, bought and sold in different ways. It changes the rules for markets and it demands new approaches from regulators. Many a battle will be fought over who should own, and benefit from, data.” - Economist, 6 May 2017
  • 14. 3 “DoD has yet to embrace the transformational capabilities of artificial intelligence (AI) and machine learning (ML) across the Department. Together, they have the power to impact every corner of DoD, including force protection, training, logistics, recruiting, healthcare, C4ISR, cyber operations, and more. The significance of AI and ML is akin to the first and second offsets that took advantage of nuclear weapons and precision munitions and stealth technology, respectively. Underscoring the importance of applications of AI and ML across the Department is critical to create and sustain the asymmetric advantage required to outpace our adversaries.” - Defense Innovation Board, 2017
  • 15. UNCLASSIFIED UNCLASSIFIED Some Principles of Intelligence and Data for the Future Environment
  • 16. UNCLASSIFIED UNCLASSIFIED Data is a strategic asset, critical to developing the information and knowledge that analysts turn into decision-quality intelligence Principle 1
  • 17. UNCLASSIFIED UNCLASSIFIED Principle 2 Publicly Available Information (PAI) will provide the first layer of the foundation of our intelligence knowledge
  • 18. UNCLASSIFIED UNCLASSIFIED The biggest analytic advantage derives from the brains of empowered analysts, not in rote processing functions or mundane assembly-line piecework involved in building intelligence products Principle 3
  • 19. “Although we have taken tentative steps to explore the potential of artificial intelligence, big data, and deep learning, I remain convinced that we need to do much more, and move much faster, across DoD to take advantage of recent and future advances in these critical areas. Accordingly, I am establishing the Algorithmic Warfare Cross-Functional Team (AWCFT) to accelerate DoD’s integration of big data and machine learning. The AWCFT’s objective is to turn the enormous volume of data available to DoD into actionable intelligence and insights at speed.” - Deputy Secretary of Defense Robert Work, 26 Apr 2017 8 Algorithmic Warfare Cross-Functional Team (Project Maven)
  • 20. UNCLASSIFIED UNCLASSIFIED Start with the proposition that every analyst needs all data, from every possible source, when tackling an intelligence question Principle 4
  • 21. UNCLASSIFIED UNCLASSIFIED While it may be tempting to call for an intelligence “revolution”, at its very core this is really more about a transformation of the intelligence community’s culture, training, tools, and tradecraft. Principle 5
  • 22. UNCLASSIFIED UNCLASSIFIED It is hubris to suggest that our potential adversaries are not as capable, or even more capable, of far- reaching and deeply- embedded innovation within their respective organizations Principle 6
  • 23. UNCLASSIFIED UNCLASSIFIED “The creation of a triangular relationship among government, industry, and academia was, in its own way, one of the significant innovations that helped produce the technological revolution of the late twentieth century.” - Walter Isaacson, The Innovators 12
  • 24.
  • 25. Leveraging Information and Joint Operations to Enhance the Nation’s Defense Mr. Gregory Radabaugh, SES Director Joint Information Operations Warfare Center UNCLASSIFIED UNCLASSIFIED This Briefing is: UNCLASSIFIED This information is furnished on condition that it will not be released to another nation without specific authorization of the Joint Staff, that it will be used for military purposes only, that the individual or corporate rights originating in the information, whether patented or not, will be respected, that the recipient will report promptly to the United States any known or suspected compromise, and that the information will be provided substantially the same degree of security afforded it by the Department of Defense of the United States. Also, regardless of any other markings on the document, it will not be downgraded or declassified without the written approval of the originating U.S. agency.
  • 26. “The first responsibility of any commander is to understand the nature of the war he is about to engage in.” ~ Carl von Clausewitz UNCLASSIFIED UNCLASSIFIED Famous Dead Guy Quote
  • 27. UNCLASSIFIED UNCLASSIFIED The Chairman’s View Basic nature of war has not changed, but the character of war has evolved: • Transregional – cutting across multiple combatant commands • Multi-domain – cutting across land, sea, air, space, and cyberspace • Multi-functional – involving conventional, special operations, ballistic missile strike, cyber, and space capabilities General Joseph F. Dunford, Jr. Chairman, Joint Chiefs of Staff Success will be obtained through the blending of informational and physical power.
  • 28. The ‘Informationalized’ Force • Some information advantages may be hard to get/use ‒ Capacity/permissions • Today’s force is the most agile and aware in our history – This “informationalized” force is also most vulnerable to losing that advantage UNCLASSIFIED UNCLASSIFIED • Much of the innovation in information-related technologies of the last 300 years has been driven by enduring military needs, such as: – To see the terrain, the enemy, and our own forces – To command and control forces over larger areas and across rough terrain – To counter the effects of darkness, weather, and physical properties of land/air/water
  • 29. The ‘Informationalized’ Environment The information environment (IE) is the aggregate of individuals, organizations, and systems that collect, process, disseminate or act on information. (JP 3-13) UNCLASSIFIED UNCLASSIFIED These two environments have converged and are now congruent The operational environment (OE) is the composite of the conditions, circumstances, and influences that affect the employment of capabilities and bear on the decisions of the commander. (JP 1-02)
  • 30. A Globally Contested Space • Russia: Information Confrontation (Informatsionnoye Protivoborstvo) – State of permanent war – Direct influence – Special Forces and commercial irregular groups – Contactless war – Total war, including the enemy’s internal side and base – War in the human consciousness and in cyberspace – Asymmetric: political, economic, information technological, ecological campaigns UNCLASSIFIED UNCLASSIFIED • China: The Three Warfares (San Zhan) – Legal Warfare – Public Opinion/Media Warfare – Psychological Warfare ~Peter Mattsson “The Russian Armed Forces Adapted to New Operational Concepts in a Multipolar World? February 19, 2014
  • 31. UNCLASSIFIED UNCLASSIFIED There is no such thing as peacetime in the Information Environment: – Information ‘rounds’ are constantly being fired—especially at you – Without situational awareness in the IE, you will not know you are being shot at and therefore can’t respond – The cumulative effects could be like gamma radiation (i.e., you don’t know it’s harming you until you’re dead) “Steady state” and “gray area” operations often defined via information-based conflict
  • 32. Affecting the IE Through IO Information Operations is the integrating application of capabilities to affect an adversary, or potential adversary, to think/act as we desire… - Lethal warfare affects the adversary via physically targeting personnel/property, while… - IO affects adversary information/decision making processes Example: Iraqis, in Gulf War I, surrender in response to instructional leaflets and offensive air power UNCLASSIFIED UNCLASSIFIED The blending of informational power and physical power enhances each others’ effectiveness
  • 33. Culture/religion/societal norms/ideology/decision-making process underlies all target actions UNCLASSIFIED UNCLASSIFIED Adversary Decision-Maker(s) Adversarial Populations Neutral Populations Allied/Friendly Populations MILDEC – Adversary believes what you want them to believe EW – Control EMS Affecting Behavior Through Information MISO – Establish/reinforce foreign perceptions of mil/pol/econ power/resolve OPSEC – Protect/deny your info Cyber – Effects against adversary info (i.e., decision- making, C2) while protecting your own; deliver information PA – Setting narrative/agenda; Telling your story; Countering falsehood with truth KLE – Influencing individuals Military Information Capabilities/Methods* ObjectivesLevel of Action Target Audiences “To do or not to do” “Deny support to adversary” “Support friendly or not interfere” “Support friendly” StrategicOperationalTactical Affecting strategic level target decision-making; Influencing behavior over time Affecting target decision-making over a series of engagements Affecting target decision-making for a specific engagement * Not all inclusive
  • 34. UNCLASSIFIED Purpose of IO is to affect (via integrated IRCs) decision-making (human & automated) - examples: Deny (CO, OPSEC), Disrupt (EW), Deceive (MILDEC) vs. Understanding (Observe + Orient) Influence (MISO), Inform (PA), Reinforce (MILDEC) vs. Will (Decide) Destroy (CO, Kinetic), Degrade (SIO, EW) vs. Capability (Decide) Mitigate effects (PA, CP, CO) / Exploit (due to MILDEC) vs. Act CP = Counter-Propaganda * Adversary must have Understanding (Observe + Orient) and Capability and Will (Decide) to Act Strategic Operational Tactical * UNCLASSIFIED The Joint Force applies information power in all phases, and especially those phases short of conflict...relating to deterrence, building the network of Allies and partners, and long-term competition The entire force contributes to desired effects through all of its activities (e.g., readiness, movement and maneuver, training and exercises, MIL- to-MIL relationships, Unified Action activities, etc.) Integrating Physical and Informational Power
  • 35. • The IE is a complex environment comprised of multiple systems and variables ₋ Generating effects on IE systems requires established baselines (as a normal part of JIPOE) upon which to base analysis • Correctly characterizing the IE is crucial to effectively executing IO ₋ Understanding the cognitive, physical and informational dimensions has to be treated as foundational intelligence ₋ Associated systems, components and audiences (i.e., target systems analysis and target audience analysis) • To standardize characterization of the IE for IO planning/execution across the DIE and IC, JIOWC has: – Created templates based on PMESII/CTAF models to enable IO intelligence integration – Developed a learning continuum for the Defense Intelligence Enterprise The IE and Intelligence Analytics UNCLASSIFIED UNCLASSIFIED
  • 36. Information Environment Baseline Development Framework Analytic Framework For Information Environment Baseline Development Political Describes the distribution of responsibility and power at all levels of governance or cooperation. Military Explore the military capabilities of all relevant actors in a given operational environment/battlespace environment. Economic Encompasses individual behaviors and aggregate phenomena related to the production, distribution, and consumption of resources. Social Describes the cultural, religious, and ethnic makeup within an operational environment/battlespace environment Information Describes the nature, scope, characteristics, and effects of individuals, organizations, and systems that collect, process, disseminate or act on information. Infrastructure Is composed of the basic facilities, services, and installations needed for the functioning of a community or society. Physical Environment Defines the physical circumstances and conditions that influence the execution of operations throughout the domains of air, land, sea, and space. Time Influences military operations within an operational environment/battlespace environment in terms of the decision cycles, tempo, and planning horizons. Physical (Who/Where) Consists of both key individuals and human networks and a technical and physical infrastructure that supports the Information flow to its intended audience. Informational (How/What) Consists of the content of information and the way it flows to and from a decision maker to form a message. Cognitive (Why) Consists of the beliefs of a person or persons whose decisions can impact the commander’s end state and is the hardest dimension to assess. IE Baseline Development Framework UNCLASSIFIED UNCLASSIFIED
  • 37. Cyber Focused Information Environment Baseline Development Framework Cyber Focused Analytic Framework For Information Environment Baseline Development Political Describes the distribution of responsibility and power at all levels of governance or cooperation. Military Explore the military capabilities of all relevant actors in a given operational environment/battlespace environment. Economic Encompasses individual behaviors and aggregate phenomena related to the production, distribution, and consumption of resources. Social Describes the cultural, religious, and ethnic makeup within an operational environment/battlespace environment Information Describes the nature, scope, characteristics, and effects of individuals, organizations, and systems that collect, process, disseminate or act on information. Infrastructure Is composed of the basic facilities, services, and installations needed for the functioning of a community or society. Physical Environment Defines the physical circumstances and conditions that influence the execution of operations throughout the domains of air, land, sea, and space. Time Influences military operations within an operational environment/battlespace environment in terms of the decision cycles, tempo, and planning horizons. Cyber Physical (Physical) -Physical Locations -Nodes -Wires -Cables -Routers Cyber Logical Network (Information) -Dynamic construct of networks -Ever changing ·NIPRNET Cyber Persona (Cognitive) -People on the network -Multiple individuals can use on persona -Difficult to attribute and target Cyber Focused IE Baseline Development Framework UNCLASSIFIED UNCLASSIFIED
  • 38. Counterterrorism Analytical Framework (CTAF) Counterterrorism Focused Analytic Framework For Information Environment Baseline Development Leadership - Personal qualities - Structure, organization, role - Sources of authority - Span/level of control - Visions/goals, objectives - Decision making process - Key personnel Safe Havens - Physical location - Virtual location - Demographics, cultural conditions - Political, governance - Access to resources - Terrain - Key personnel Finance - Sponsorship - Criminal activity - Charitable activity - Legal enterprises - Financial systems - Key personnel Communication - Audience - Function/intent - Procedures, tradecraft - Medium/tools - Key personnel Movement - Mode/method - Facilitation - Routes - Purpose - Key personnel Intelligence - Plan/Direct - Collect - Process, analyze - Production, dissemination - Security, CI - Key personnel Weapons - Procurement - R&D, weaponization - Production - Distribution, storage - Employment - Weapons - Key personnel Personnel - Recruitment, selection - Training - Use, assignment - Sustainment - Members, supporters - Key personnel Ideology - Unifying vision - Indoctrination - Legitimacy - Propaganda - Key personnel Physical (Who/Where) Consists of both key individuals and human networks and a technical and physical infrastructure that supports the Information flow to its intended audience. Informational (How/What) Consists of the content of information and the way it flows to and from a decision maker to form a message. Cognitive (Why) Consists of the beliefs of a person or persons whose decisions can impact the commander’s end state and is the hardest dimension to assess. Counterterrorism Analytic Framework UNCLASSIFIED UNCLASSIFIED
  • 39. What the Warfighter Needs From Intelligence Analytics • Finding our adversaries in the sea of information and tracking them in real time through multiple information sources – Target development/vetting/validation is key • Providing the analytic foundation to conduct cognitive combat – Modeling & Simulation/Red team COAs/2nd/3rd/4th order of effects on systems • Characterizing the information environment to: – Enable commander situational awareness – Enable assessment of red/blue/green effects • Enabling the sharing of information and analytic results with whole of government and Allied partners – In many cases we are operating beyond Five-Eye coalitions UNCLASSIFIED UNCLASSIFIED
  • 40. Intelligence Analytics Challenges • Find/synthesize what the adversary/ potential adversary is thinking/ deciding – Where is the adversary cognitively? – What decisions have been made/about to be made of which we are unaware? • Discovery of adversary/potential adversary through big data – Attribution of offensive cyber – Identification of VEO groups – Using online behavior to predict physical behavior/decisions • Understanding informational power effects in the IE, especially with regard to collateral damage UNCLASSIFIED UNCLASSIFIED
  • 41. Intelligence Analytics Challenges • Discovering/analyzing adversary AI – Understanding how adversary AI’s think/make decisions – Implications of AI vs. AI • Understanding adversary/potential adversary attitudes/thinking from strategic to tactical – Providing real time assessment of audience sentiment (vice waiting for polling data) – Increasing speed of analytics to enable real time response to adversary actions • Synthesizing/visualizing what the information environment looks like – Portraying the IE in a manner that a senior leader can comprehend and make decisions – Integrating publicly available information with classified analysis UNCLASSIFIED UNCLASSIFIED
  • 42. DISTRIBUTION A. Approved for public release: distribution unlimited. UNCLASSIFIED UNCLASSIFIED 18 C2IE: Building an Information Environment Common Operating Picture (iCOP) Combining Command and Control and Commercial Marketing Best Practices Provides Rapid Capability to DoD Entity Extraction Relationship ID Event Detection Foreign Language Processing Correlate with DoD/IC Data Enhance Geolocation Topic / Meme Detection Community Detection Coordinated Activity Detection Sentiment Detection Integrate Existing Data Acquisition, Analytics, and Platform Capabilities SocialMedia Processing EditedMedia Processing Analytic Test and Evaluation Selected InQTel-investment entity extraction technology performed at/above published state- of-the-art performance (0.72 F-measure) for key entity types prior to system tuning Operational Test and Evaluation Initial iCOP OT&E Demonstrating Near-Real- Time iCOP in support of PACOM / MARFORPAC / III MEF for Balikatan ’16 towards integration into DISA GCCS-J Develop Analytic TTPs Identifying proper pairing of operational objectives to data analytics via support to Balikatan ’15, Freedom of Navigation Ops, US Shows of Force DoD Operations USG Reporting IC/DoS Reporting Counter-Intelligence ReportingDiscrete Activities Formal Plans iCOP Integrated Information Environment / Influence picture. With Unclassified + Classified Data
  • 43. The Future – Enabling the JF for Success • DoD Strategy for Operating in the Information Environment (SOIE) – SecDef signed in June 2016 – Defines an operational end-state, and associates it with the ways to accomplish the end- state, and the means necessary to support the ways – Four lines of effort with active DoD level working groups: People, Programs, Policy, Partners • Capstone Concept for Joint Operations: “Integrate physical and informational power” – “The deliberate leveraging of the inherent information aspects of activities in order to direct or influence the behavior of relevant actors and/or course of events.” – One of 8 key foundational elements in concept—projected publication: Fall 2017 • Joint Concept for Operating in the Information Environment – Draft concept as part of Chairman’s joint concepts for future warfighting – Describes how the future Joint Force will integrate both physical power and information power to effectively operate in and through a more pervasive and connected information environment—projected publication: Fall 2017 • Information as a Joint Function – Published as a change to Joint Pub 1-0 by JS/J7 on 16 May 2017 UNCLASSIFIED UNCLASSIFIED
  • 44. Information as a Joint Function • “The information function encompasses the management and application of information and its deliberate integration with other joint functions to influence relevant-actor perceptions, behavior, action or inaction, and human and automated decision making. The information function helps commanders and staffs understand and leverage the pervasive nature of information, its military uses, and its application during all military operations. This function provides JFCs the ability to integrate the generation and preservation of friendly information while leveraging the inherent informational aspects of all military activities to achieve the commander's objectives and attain the end state.” ~ JS/J7 Draft Language out for formal GOFO coordination UNCLASSIFIED UNCLASSIFIED Current Joint Functions: • Command and Control • Intelligence • Fires • Movement and Maneuver • Protection • Sustainment
  • 45. Information-fueled, information-driven forces able to maneuver like sharks in the tumultuous sea of information The Successful Joint Force of the Future UNCLASSIFIED
  • 46. Summary • The information and operational environments have converged – There is no peacetime in the IE • Commanders lead an “informationalized” force – Expect the advantages offered by this to be attacked/denied by adversary • Dominating the IE is Commander’s business – The most successful commanders in Iraq and Afghanistan made IO a part of every facet of a unit’s or staff’s daily battle rhythm – Every military capability available has an informational aspect to its use • Intelligence data analytic solutions are crucial to a commander’s success in understanding and dominating in the IE UNCLASSIFIED UNCLASSIFIED
  • 47. Military Capabilities and Information 23 Questions/Comments War is a contest of wills. Will is observed through behavior. Changing behavior is about influence. War is about influence
  • 48. Integrated Information Warfare for the 21st Century PEOC4I.NAVY.MIL Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) 1 May 2018 Tim Anderson DCGS-N Inc 2 APM (PMW 120) (703) 692-1726 timothy.a.anderson2@navy.mil Battlespace Awareness and Information Operations Program Office (PMW 120) for Intelligence Analytics 2018 Meeting v1.0 DISTRIBUTION STATEMENT A: Approved for public release, distribution is unlimited ( 7 February 2018)
  • 49. PEO Initiatives • PEO Focus: Accelerated delivery of required capability that is affordable, integrated, and interoperable • Speed of technology exceeding speed of acquiring, testing, installing, and fielding of C4I capability. • Developing, testing, fielding, and training at the box level AND capability level • Multiple install configurations minimizing learning curve opportunities 2
  • 50. VISION | Information Operations | Information, Surveillance, & Reconnaissance | Meteorology & Oceanography IO ISR METOC Provide quality Information Warfare capabilities to the Warfighter for a decisive operational advantage Deliver assured intelligence, meteorology, oceanography, and information operations data, products, and services that provide Information Warfare capabilities to the Fleet MISSION Battlespace Awareness and Information Operations 3 Agile • Integrated • Vital
  • 51. DCGS-N Inc 2 OV-1 5
  • 52. DCGS-N Increment 2 Challenges 6 • Exponential increases in data form multi-service, IC, and international partners (not to mention commercial) • Continual reduction in expected timeline for sensor to mission impact • Balancing increased need for interoperability and agile capability deliveries with operational and cyber risk management • The age-old challenge of "It's a computer, why doesn't it all just work?"
  • 53. 7 DCGS-N Applications C R O S S D O M A I N D A T A S T R A T E G Y CommonAnalytics APIs Operating Environment CANES SW 3 LOOSELY COUPLED ACS3.0 CANES NITES Next DCGS-N Inc2 NCSA MTC2 NOSS CANES Hybrid Hyper-Converged Infrastructure CANES HW 1.2 Quellfire METOC Data Talon Thresher S2A/Mongoose Predictive Analytics Collection Management Historical Data Vessel/Cargo/Fishery Multi Domain PKI enabled Program Description: Next generation ISR&T solution for ingesting, processing, exploiting, correlating and disseminating data from Navy, joint and national sensors. Limited Capability Available FY18 • Anticipates the sensor “tipping point” by leveraging IC investment in C2S and Advanced Analytics • Automated workflows, data fusion, and machine learning • Accelerated precision Orientation and Decision- making
  • 54. DCGS-N FOS Infrastructure ICITE Distributed Operations National Theater Data Analytic Node Edge Nodes DCGS Family of Systems Intelligence Community Shared Data Leverages significant Intelligence Community worldwide connections, investments, and capabilities by utilizing Amazon Commercial Cloud Services and ICGOVCLOUD to support the tactical edge. Synchronize tactical commander’s data lakes and ponds with relevant geographic and specific NTM data. Data Exchange mechanism for commanders to share tactical intelligence with Fleet Commanders, Services, Coalition, and IC partners. Compliant with current IC and DI2E mandated data standards DCGS-NDCGS-A DCGS-AF DCGS-MCDIB DCGS-IC DCGS-SOF Data ocean for the Navy supporting fleet commanders by providing access to national technical means (NTM), operational level (OPINTEL), and tactical (TACINTEL) intel on a world wide scale. 9
  • 55. 10 Digital Warfare Platform MTC2 NOBLE DCGS-NInc2 GCCS-M NCSA NITESNEXT Capability expressed as service-based workflows within and between PEO C4I programs governed by the Navy Tactical Analytic Framework DIB DCGS FOS DDTS Combat Systems Ingest Fusion Analytics Display Distribution Agile Core Services (ACS) ISR Workflow Planning Workflow Knowledge Base RIGORS ALERTING AMICA SAVA Track History Overlays O-Plans Threat Data Readiness CANES / STACC / NEDC / Cloud Class/Unclass Data Feeds (Dozens) OTP NAVY WAVE OTM
  • 56. PEO S&T Focus Areas and Capability Gaps • Battlespace Awareness (BA)  BA will require enhanced and advanced means to rapidly sense, collect, process, analyze, and evaluate information content to exploit the operating environment  The understanding of the operating environment will serve as the basis from which nearly all decisions will be made, enabling our forces to more effectively maneuver and coordinate actions that engage and target enemy forces • Tasking, Collection, Processing, Exploitation and Dissemination (TCPED) Network Architecture requires automated data tagging of security information (at the fused entity (Observed Entity and Maritime Object of Interest) level • A Collection Management (CM) Tool to fully automate Intelligence Surveillance and Reconnaissance (ISR) Planning would include integration of current and disparate sensors (IMINT, SIGINT, MASINT) and associated ISR assets (national, theater and tactical) 11
  • 57. Visit us at www.peoc4i.navy.mil We Deliver Information Warfare Capabilities to the Fleet.
  • 58. • Virtualized capability enables distributed multi-intelligence operations for the Warfighter • Provides the Navy with an integrated, distributed net-centric grid framework • Remote operations allow ashore support to rapidly provide threat I&W Material Solution Analysis Technology Maturation & Risk Reduction Engineering & Manufacturing Development Production & Deployment Operations & Support Pre-Systems Acquisition Systems Acquisition Sustainment A B C • Enhances SSEE Increment F capabilities to detect and track radio signals • Advanced antennas increase frequency coverage to improve threat signal acquisition Classic Reach • Highly-sensitive electronic support measure (ESM) system that provides automated signal acquisition, direction finding, and target ID and geolocation • Delivers threat indications and warnings (I&W) for ship/strike groups; feeds data to National consumers Ship’s Signal Exploitation Equipment (SSEE) Increment E • Broadens signals intelligence collection • Standardized IO weapon system across multiple maritime platforms based upon a common core capability: responds to emerging threats, promotes flexible asset tasking, supports cross-training personnel • Small footprint variant enables mission-specific configuration and rapid deployment of new technology Ship’s Signal Exploitation Equipment (SSEE) Increment F • Prosecutes SOI to deliver real-time situational awareness of key threats and geo-location on high-priority targets • Quick-reaction capability addresses advancements in foreign military comms and ISR systems; provides non-permanent capability to platforms not equipped with permanent IO warfare systems, or augments permanent equipment • Ingests and correlates off-board and organic intelligence data; disseminates multi-intelligence products to provide valuable, actionable intelligence Cryptologic Carry On Program (CCOP) • Next generation Information Warfare weapons system enhances signals exploitation capabilities • Detects, classifies, and tracks Signals of Interest (SOI) beyond current requirements to improve automation, operability, and intuitiveness in TCPED process • Scalable, mission-configurable, modular (plug & play), remotable; supports new threats/ capabilities • Enables cross-system data sharing to support EMW/IF Spectral IO Capabilities Sailors learn the SSEE Inc E ESM systemSailor provides routine maintenance to the AS-4623 IO Antenna SSEE Mods Maintainer performs system check 13 Ship’s Signal Exploitation Equipment (SSEE) Modifications
  • 59. • Fuses environmental data to determine the effect on a platform’s weapons systems ability to conduct missions • Tools and tactical decision aids that on-site meteorologists use to develop forecasts and predict impact to electromagnetic-spectrum propagation • Executes agile software development to ensure flexibility in meeting emergent requirements and addressing Fleet user priorities Naval Integrated Tactical Environmental System-Next Generation (NITES-Next) Oceanographic Information System (OIS) Primary Ocean Prediction System (POPS) Hazardous Weather Detection and Display Capability (HWDDC) • HWMMV-mounted mobile weather station helps Warfighters navigate d dynamic battlefield conditions • Collects, processes, and transmits METOC data • Sustains global oceanographic and hydrographic surveying in support of undersea warfare and navigation safety • Enables undersea dominance in support of anti-submarine warfare, mine countermeasures, special operations • LBS-Glider senses ocean and thermal light transmission properties critical to weapon and sensor performance, planning, execution • LBS-Autonomous Undersea Vehicle collects bathymetric & bottom imagery to provide battlespace awareness of the undersea environment Material Solution Analysis Technology Maturation & Risk Reduction Engineering & Manufacturing Development Production & Deployment Operations & Support Pre-Systems Acquisition Systems Acquisition Sustainment A B C • Enhanced remote sensing capability discriminates oceanographic phenomenon from the natural environment • Automated tools increase coverage area, reduce timeline, decrease analyst workload Remote Sensing Capability Development (RSCD) METOC Capabilities 14 Littoral Battlespace Sensing– Unmanned Undersea Vehicle (LBS-UUV) • Supercomputer fuses worldwide METOC data to feed weather prediction models • IT infrastructure provides environmental prediction across multiple classification enclaves for Navy geophysical data • Extracts and converts data from surveillance radars to generate weather situational awareness & help the Fleet find the optimal conditions to conduct missions • Off-boards data to FMNOC to influence regional weather prediction models & enhance real-time analysis Marine Corps Meteorological Mobile Facility (Replacement) Next Generation (METMF(R) NEXGEN)
  • 60. Operational Vision - Integrated Fires, part of Electromagnetic Maneuver Warfare (EMW) • Integrate kinetic and non-kinetic fires • High Side Fusion (HSF) • Combat Systems Integration (CSI) • Battle Management Aids (BMA) • Fully integrating National Technical Means (NTM), organic sensors and weapon systems information Enabled By Key Technologies: • Integrate systems across PMW 120 portfolio • Homogenize user interfaces – “Microsoft Ribbon” • Data framework (analytic, ingest, data tagging) • Robust Cross Domain Solution Direct Benefit To Fleet/Sailors • Allow analysts to focus on analysis • Reduce training time through improved usability • Provide ability to tailor systems to mission • Present data to Sailor based on role Electromagnetic Maneuver Warfare Enabled By PMW 120 Focus on shortening the kill chain (kinetic and non-kinetic) 15 Kill Chain TCPED OODA NIFC-CA IPB/E FIND FIX TRACK TARGET ENGAGE ASSESS
  • 61. Future Capability Development EMW/IF Alignment END STATE: System of Systems interoperability that provides • Accurate combat ID • Complete Blue Force mission suitability assessments • Optimal Force synchronization • Target quality geolocation • Automated asset allocation recommendations • Coordinated C2 / C-ISR tools • Single Integrated Picture (SIP) • Complete spectrum awareness and control • Full spectrum cyber operations • Full spectrum NAVWAR CURRENT STATE: Systems are NOT integrated and interoperable to meet emerging threats Meteorology & Oceanography (METOC) Combat Systems (CS) National Technical Means (NTM) Logistics / Readiness Command and Control (C2) Information Operations (IO) Intelligence, Surveillance, & Reconnaissance (ISR) • High Side Fusion • Increased Automation • Spectrum Management • Sensor Cross-Cueing • Non-Kinetic Fires • Optimized Maneuver • Enhanced OTHT • Counter-ISR&T • HALO COP • Int NTM & Tactical Geolocation • Comms in a DDIL Environment • NAVWAR • Battle Management Aids • Combat Systems Integration • Automated Assessment and COAs Phased delivery of new and continuously enhanced capability over time Phase I Phase II Phase III * 120 / 150 Aligned 16
  • 62. October 22-24, 2018 // Washington, D.C. www.homelandsecurityweek.com view agenda purchase pass sponsor