improving military workflows - structured data for military & security users
DESCRIPTION
Five ways that military and security organizations can use structured open-source data to work faster and smarter.TRANSCRIPT
![Page 1: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/1.jpg)
Improving military and security workflowsFive ways that military and security organizations can use structured open-source data to work faster and smarter
![Page 2: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/2.jpg)
Copyright © 2012 IHS Inc. 2
Why structured open-source data?
Structured data is Quick to searchEasy to query Easy to manipulate
![Page 3: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/3.jpg)
Copyright © 2012 IHS Inc. 3
Why structured open-source data?
Open-source data is VerifiedIndependentUnclassified
![Page 4: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/4.jpg)
Copyright © 2012 IHS Inc. 4
How can it improve workflows?
1. Threat analysis
![Page 5: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/5.jpg)
Copyright © 2012 IHS Inc. 5
1. Threat analysis
Satellite images show enemy tanks gathering on an airfield near the border
The threat must be assessed
![Page 6: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/6.jpg)
Copyright © 2012 IHS Inc. 6
1. Threat analysis
Measure length
9.5m
![Page 7: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/7.jpg)
Copyright © 2012 IHS Inc. 7
1. Threat analysis
Measure length
9.5m
3.5m
Measure width
![Page 8: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/8.jpg)
Copyright © 2012 IHS Inc. 8
1. Threat analysis
Obtain enemy land warfare platform inventory intelligence
![Page 9: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/9.jpg)
Copyright © 2012 IHS Inc. 9
1. Threat analysis
Query structured open-source data by country, length and width
![Page 10: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/10.jpg)
Copyright © 2012 IHS Inc. 10
1. Threat analysis
Query returns only platforms that meet search criteria
![Page 11: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/11.jpg)
Copyright © 2012 IHS Inc. 11
1. Threat analysis
The threat is quantified
T-72
Detected platforms are identified quickly and easily
![Page 12: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/12.jpg)
Copyright © 2012 IHS Inc. 12
How can it improve workflows?
1. Threat analysis
2. Capability analysis
![Page 13: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/13.jpg)
Copyright © 2012 IHS Inc. 13
2. Capability analysis
Diplomacy is breaking down; conflict seems inevitable
![Page 14: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/14.jpg)
Copyright © 2012 IHS Inc. 14
2. Capability analysis
Air superiority will be key to success
Enemy air capability must be assessed
![Page 15: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/15.jpg)
Copyright © 2012 IHS Inc. 15
2. Capability analysis
Review intelligence of enemy air base locations
![Page 16: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/16.jpg)
Copyright © 2012 IHS Inc. 16
2. Capability analysis
Cross-reference with equipment in service and order of battle
![Page 17: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/17.jpg)
Copyright © 2012 IHS Inc. 17
2. Capability analysis
Use structured open-source data to search ranges of air platforms at each base
![Page 18: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/18.jpg)
Copyright © 2012 IHS Inc. 18
2. Capability analysis
Quantify and visualize enemy air strike range
![Page 19: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/19.jpg)
Copyright © 2012 IHS Inc. 19
How can it improve workflows?
1. Threat analysis
2. Capability analysis
3. Military planning
![Page 20: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/20.jpg)
Copyright © 2012 IHS Inc. 20
3. Military planning
A multinational expeditionary force prepares to move into enemy terrain
![Page 21: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/21.jpg)
Copyright © 2012 IHS Inc. 21
3. Military planning
Imagery of a strategic crossing point reveals that the bridge may be too narrow to cross
3.5m
![Page 22: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/22.jpg)
Copyright © 2012 IHS Inc. 22
3. Military planning
Filter structured open-source data for platforms wider than the bridge crossing
![Page 23: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/23.jpg)
Copyright © 2012 IHS Inc. 23
3. Military planning
Query returns land platforms too wide to cross
![Page 24: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/24.jpg)
Copyright © 2012 IHS Inc. 24
3. Military planning
Need for alternative routes or methods identified
![Page 25: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/25.jpg)
Copyright © 2012 IHS Inc. 25
4. How can it improve workflows?
1. Threat analysis
2. Capability analysis
3. Military planning
4. Logistical analysis
![Page 26: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/26.jpg)
Copyright © 2012 IHS Inc. 26
4. Logistical analysis
Multinational land forces require air transport into theatre
![Page 27: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/27.jpg)
Copyright © 2012 IHS Inc. 27
4. Logistical analysis
Air transport capacity is known
Dimensions of partner land platforms are not
![Page 28: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/28.jpg)
Copyright © 2012 IHS Inc. 28
4. Logistical analysis
Query structured open-source land platform data by length, width and height
![Page 29: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/29.jpg)
Copyright © 2012 IHS Inc. 29
4. Logistical analysis
Sort results to identify viable platforms and calculate transport loading levels
6.25m
1.85m
2.60m
![Page 30: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/30.jpg)
Copyright © 2012 IHS Inc. 30
4. Logistical analysis
Air transport capacity for partner land platforms is derived
Transportation levels may be planned
![Page 31: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/31.jpg)
Copyright © 2012 IHS Inc. 31
How can it improve workflows?
1. Threat analysis
2. Capability analysis
3. Military planning
4. Logistical analysis
5. Procurement requirements setting
![Page 32: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/32.jpg)
Copyright © 2012 IHS Inc. 32
5. Procurement requirements setting
A major procurement program is initiated
Capability requirements must be developed
![Page 33: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/33.jpg)
Copyright © 2012 IHS Inc. 33
5. Procurement requirements setting
Review structured open-source data for existing equipment and technology capabilities
![Page 34: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/34.jpg)
Copyright © 2012 IHS Inc. 34
5. Procurement requirements setting
Data output provides capability baseline
Set program capability requirements accordingly
Endu
rance (h
)
0
50
200
100
150
0
10
20
30
40
Datalink range
Endurance
Payload weight
Max altitude
Max T-O Weight
Max speed
Loitering speed
![Page 35: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/35.jpg)
Copyright © 2012 IHS Inc. 35
5. Procurement requirements setting
Commercial proposals are easily measured
Requirements are benchmarked against best in class
![Page 36: Improving Military Workflows - Structured Data for Military & Security Users](https://reader033.vdocuments.net/reader033/viewer/2022052822/554dad97b4c905fa7a8b4f26/html5/thumbnails/36.jpg)
Copyright © 2012 IHS Inc. 36
Conclusion
Structured open-source data is not a replacement for proprietary sources
But it is a source of reliable supporting information
And, used correctly, it can help the military user to work faster and smarter