This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com
//FOUO ARSTAF Day at the Pre Command Course Army G 8 LTG James O. Barclay III Mr. Vince McCarron, Army G2 Big Data for Defense and Intelligence Symposium 03 December 2013 9 October 2015
Current Investments 1 DCGS-A 2 RITE Ubiquitous Access to Data Relevant Intelligence to Army s Access to IC, Joint ISR the Edge Integrated Foundry 3 Enhanced Force Sensors/Collectors 4 Intel Readiness 5 Structure Aerial, Terrestrial, Cyber Fully Leverage the Force No Cold Starts Data Transport Sensors Readiness No Cold Starts t No MI Soldier at Rest Force Structure DCGS A Hunte (Incr 1) Global Deployment Decision Build Out Army Global ISR Foundational Layer for RAF, AOC, COE DCGS A (Incr 2) RFP ICITE COE Command Post Computing Environment Harden & Resource Army s Expanding JWICs Network Info Assurance Accreditation User Monitoring Network Defense SCI Network Convergence RITE Rqts Into WIN T Ensure Access, Processing Power to Edge AISR Fleet Modernization GE Extended Range ARL, EMARSS, GEX Army Global PED Center CONOP, Mission Command Advance Improved Multi Functional Team Ground Platform Transition to Advanced SIGINT Sensors OSINT Across Force Expand Global HUMINT COE Sensor CE Compliance Foundry 2.0 In Base; Updating Program for RAF Increasing Live Ops at ECB RAF ISR Tng For Army GOs DCGS A on Networks Training Gray Eagle ISR CERTEX OSINT Certification of Force MICO/BCT S2 CERTEX Support to Targeting Intel Support to CEMA, Cyber Advanced SIGINT Upskilling Insider Threat Training 35 T Maint Tech Upskilling Data Scientists. Grow Out Now 2 More Theater Bdes 1 Aerial ISR Bde GE ER 3 Companies NGIC as Army ACE CI/HU Command 7x EMIBs 780 th MI Bde (Cyber) FOC Looking Forward Codify DPED Structure Codify GISA Structure Build OSINT Oversight Integrated with Mission Command //FOUO 3
Data Strategy Data Task: Track progress of design to requirements for intended mission environments and operational needs focusing on goals that support timely discovery, access, and use and concurrently support protection efforts to prevent compromise and mitigate t insider threat. id t Goals: 1. Support Multi-INT Integration 2. Improve Information Quality 3. Protect Information 4. Manage Access 5. Enable Leader Decisions //FOUO 4
Support Multi INT Integration Army Sensors & Data SIGINT HUMINT/CI GEOINT/FMV/UGS Biometric* GMTI CIED* STG* Prophet PRD 13 GRCS ARL MARSS* Green Dart* Wolfhound* DARBE* HIDRAH* Blackfin* LLVI Reporting Prophet CI Reporting IIR DIIR Civil Mil Ops* Patrol Debriefs* Key y Ldr Engagements* Village Rpt ing* Atmospherics* Constant Hawk* Highlighter* Desert Owl* Night Eagle* Saturn Arch* ARL MARSS* TACOP* Warrior Alpha* PGSS* Falcon Watch* Scorpion* OS II* WSS* UTAMS* PTDS* Copperhead* Puma* Raven Shadow Hunter Gray Eagle* LIDAR* Buckeye* CIB EO IR SAR GMTI VADAR* BAT* HIIDE* SEEK* NGIC Reporting* Watch List* BAT Dossier* COIC Reports CEXC Reports WIT Reports CIDNE Reports Exploit* CellEx Kits MEDEX Harmony TACDOMEX Data *Additions since CY2005 Others* Human Terrain Teams Provincial Reconstruction Teams Unit Reporting Transition Reports Reconstruction Culture Reports TTL Reporting Counter Intel Detainee Info National, Joint & Coalition Sensors & Data SIGINT HUMINT/CI IMINT/FMV/UGS Biometric* CIED* Exploit* NSA Products TACREPs KLs RTRG Alerts* DEA Information* Allied Information CIA Reports USMC Reports USAF Reports DIA Reports SOF Reports Coalition Reports* NATO Reports NGA CASi* USAF Unicorn* Predator Reaper U2 Global Hawk JSTARS LIDAR* EO IR SAR FMV DGS Reports SOF Reporting FBI ABIS USAF EYELID FBI TEDAC Coalition Reports JIEDDO/COIC JDEC Reporting NMED Reporting Navy Reporting Others* Law Enforcement Detainee Ops Threat Finance Tag, Track, Locate Continuously Changing to Satisfy Meet New Requirements and New Sensors/Data Sources by Leveraging Government, Industry, Allied and Academic Subject Matter Experts that Together, Create the Whole Intelligence Ecosystem //FOUO 5
Data Quality Data Visualization Data Warehousing Data Archiving Data Miningi Data Reuse Data Portability Data Repurposing Data Integrity Data Pedigree Data Elasticity Data Mobility Data Distribution Data Fusion Data Access Data Sharing Data Protection Data Dissemination Data Storage Data Variety Data Volume Data Velocity Data Veracity Data Exchange Data Breach Data Broker Data Dictionaryi Data Entry Data Governance Data Modeling Data Normalization Data Obfuscation Data Recovery Metadata Data De duplication Data Vl Value SmartData Data Discovery Data Tagging Structured Data Data Synchronization Data Integration Unstructured Data Data Consumption Data Ontology Semi Structured Data Data Modularity Data Exploitation ti Big Data I WANT YOU TO Data Extraction Data Transformation Data Correlation Data Taxonomy Data Collection Data Interoperability Data Spill Data Provenance Threat Data Unified Data Location Data Co MinglingData ENABLE ALL MISSION DATA NEEDS //FOUO 6
Data Protection OPERATIONAL IMPERATIVE Insider Threat WIKILEAKS Others Compromise OPM Breach Others Cost: $$$/Sources/Methods/Sharing Risk to the Army, Nation & Allies Assure our collectors, stewards and partners Risk management approach to data Threat counter measures & Mitigations Lifecycle management practices //FOUO 7
Enable Leadership Decisions Florence Nightingale, British Civilian Showed Disease versus Battle Charles Minard, French Civilian Showed Napoleon March to/from Moscow Multi INT Correlated Spatial Temporal Situational Force Effects Based Awareness Protection Targeting //FOUO 8
AMERICA S ARMY: Task Force Smith JULY 5,1950 162 KIA, WIA, POW JULY 6, 1950 540 Men 378 Men 24 Hours 24 Hours When Americas Army Is Not Ready //FOUO 9
Questions / Globally Engaged Regionally Aligned Enabling Decisive Operations //FOUO 10