clients / case studies / dod
U.S. Army Intelligence Battle Lab (IBL)
To create data management and visualization tools to further enable Military Intelligence analysis of massive data sets
The creation of spatial and temporal three-dimensional models supporting analysis of potential military, terrorist or insurgent threats. The solution has flexible Threat Model development, sophisticated data query tools, virtual workspaces, data-driven recommendations, and collaboration tools.
IntroductionTo improve their predictive analysis ability of volatile situations in the battlefield using state of the art technology, the US Army teamed up with Ephibian and the University of Arizona to determine what could be done.
Our solution included flexible mechanisms for modeling threat patterns coupled with automated mechanisms to detect those threat models in massive amounts of data. While leveraging cutting edge research from the University of Arizona, Ephibian provided the Battle Lab with a visualization tool to collate and present data for fast and accurate predicative analysis.
What did we do?
- Application is capable of analyzing enormous amounts of data from varying sources for key intelligence and security information
- Delivered a flexible mechanism for analysts to define threat models
- Developed a virtual workspace within which analysts perform their analysis work, which includes querying data sets for conditions that meet their threat models
- Built mechanisms to quickly ingest new data into the database
- Developed three-dimensional and time-based data visualization tools, so that analysts can more quickly digest, identify and display trends within the data
- Helps “score” courses of action seen within the data --- thus helping analysts focus their subsequent analyses
- Suggests derivative courses of action that might be occurring, based on available data
- The solution supports developing and populating dossiers on personnel, organizations and locations
- Incorporated collaboration tools that facilitate data and analyses sharing among team members
How did we do it?
- We created a tool that allows intelligence analysts to construct spatial and time-based three-dimensional models allowing for predication model overlays to review potential threat models being executed
- With these visualization tools, the analysts can more readily see when and where events are occurring that match threat patterns
- Analysts can control the flow of time within their analyses: they can freeze, fast-forward, and rewind time. They can collapse and expand the time scale.
- Application included:
- data ingestion tools
- flexible entity and link creation
- collaboration and modeling tools for enemy patterns
What was the result?
- Faster, more accurate and more capable predictions of enemy combatant threats
- Helps focus subsequent analyses
- In a dangerous area, with limited human data-gathering resources, it helps drive the priority for subsequent data gathering to help determine enemy courses of action