Você está na página 1de 8

An interoperability exercise

Exploiting multi-int for C-IED Operations

Meeting the challenge of IEDs

The use of Improvised Explosive Devices (IEDs) has accounted for the highest percentage of coalition and civilian casualties in current operations. Despite best efforts, the use of IEDs is growing both in volume and sophistication.

In response, an increasingly diverse range of data is being captured, to inform the environmental picture and aid decision making. The challenge now faced is how best to effectively bring together and exploit the mass of data being collected. Whatever the source, the common thread is that all such information has a time and place.

In this unique exercise you will see how the prosecution of counter-IED (C-IED) operations can be aided by the use of a commercialoff-the-shelf (COTS) Geospatial Information System (GIS) acting as a central hub for all multi-int data. The C-IED exercise then draws on the capabilities of multiple COTS capability providers, each connected to the GIS and able to combine, visualise, analyse and share their outputs with the others. Between them,

those engaged in this exercise will support the spectrum of operations, covering: Orientation and observation - current situational awareness and visualisation Analysis and understanding - deriving insight and meaning from multi-int sources Planning and action - for force protection and offensive activity Review - post operational learning and next steps

Orientation and Observation


ArcGIS explorer Systematic cGIS explore Syste plore

Analysis and Understanding


ITT ITT T Cob Cobh Cobham b bham

Planning and Action


ArcGIS explorer Systematic cGIS explor S xplor Syst Syste

Review
ITT ITT T Cobh Cob Cob a Cobham Cobham b

A Map ArcMa ArcMap Browser I2 BA BAE GX BAE GXP AE Browser I2

A Map ArcMap ArcMap BAE BA GX BAE GXP A

Browser

Browser

Maps imagery and overlay g y

Analysis results

g y Maps imagery and overlay

Analysis

Model

Web Services

Sigln

Battlespace Model space Mode


y er

Application Server

Imlnt

ArcGIS Server
Im ag

lnt

Ma

This diagram illustrates the data flows between the GIS hub and consumers during these stages.

Hum

i pp

ng

Tra

d an

ck

Ma

sln

Stage 1: Orientation Capability providers: Esri (UK), IHS Janes and Systematic This stage shows how a GIS can ensure that all forces operating have access to the same maps, imagery and terrain database of the operational area, which can then be overlaid with a wide range of location and time-stamped data, including: 1. IED incident locations Esri (UK) ArcGIS Server precisely maps and displays locations where IED incidents occurred and also consumes open source intel, such as Janes Joint Terrorism and Insurgency Centre (JTIC) service; this information can reveal patterns of areas of high occurrences of IEDs and help focus efforts in specific Areas of Interest (AOI). 2. Patrol route traces ArcGIS Server consumes GPS patrol trace data, enabling Commanders to visualise patrol routes in relation to IED activity and accurately plan routes for best effect.

3. Contact reports from patrols GPS also allows the accurate georeferencing of intel captured enroute, such as suspected insurgent sightings, tip-offs, suspicious vehicles and other information, supplemented with digital images, notes or audio recordings. All such information can be mapped and shared between all war fighters. 4. Human terrain mapping/tribal mapping In Afghanistan IED makers leverage the networks of tribes and factions. In this exercise, open source intelligence services, such as Janes Terrorism and Security Monitor (JTSM) provides detailed understanding of the loyalties and complex relations between tribes that can help identify IED makers. 5. Identity and disposition of forces The orientation includes unit locations, boundaries, asset tracking fields and tactical graphics, collected from disparate command and control systems and may be accessed by authorized commands connected to the network at the Deployed Tactical and

Operational HQ levels, as well as Coalition strategic level commands through standard Web browsers from Systematics Sitaware software. The above information is saved as a project to Esri (UK)s ArcGIS Server, enabling all partners to share and input to the same picture.

Creating a common operational picture from multi-int (Esri UK).

Stage 2: Analysis Capability providers: Esri (UK), BAE, Cobham, i2, ITT and Systematic This stage shows how spatial, imagery, network and signals analysis capabilities are leveraged in order to ensure that a proactive approach can be taken in the C-IED campaign. The analysis has two, complementary areas of focus: 1. Force protection highlighting areas and times of greatest risk Visualising hot spots areas most prone to IEDs Time based or temporal patterns in the IED incidents Classification of routes according to degree of potential threat 2. Proactive activity - focused on interrupting the early planning stages and disrupting the wider networks Supply routes both for insurgents and the IED components Likely areas for IED Factories

Insurgent command and supply structure Trends and patterns in insurgent behaviour. Partner contributions Esri (UK) ArcMap and Specialist extensions are used for IED data processing, filtering and analysis. ArcView Tracking Analyst in combination with ArcView Spatial Analyst provides cross country mobility assessment, overlaid with real-time updates from equipment in the field. Esri (UK)s CrimeAnalyst software

uses hotspot and temporal analysis, to identify key areas of focus based on frequency and increase in the number of IED incidents. From this a specific area of interest (AOI) is chosen for further analysis by partners. i2 use HUMINT and patrol reports to identify potential suspects that could compose an IED cell. i2 Network Analyst software is used to illustrate the cells relationships and interactions, which are then geographically mapped within the AOI.

Analysing and mapping network relationships (i2).

Cobham uses i2s network analysis to target the suspects within the AOI. Cell phone identification, tracking and voice traffic monitoring capability is used to validate and gain SIGINT from the targets, informing subsequent stages. ITT informs the force protection activity, by conducting imagery analysis on the AOI and surrounding area, identifying areas of highest risk on patrol routes and road networks using change detection analysis. ITT also conducts intervisibility analysis around a FOB within the AOI, informing potential risk from planting (and sniper fire) to a radius of operations. This is followed by imagery analysis of the suspected bomb factory, its makeup and characteristics to inform mission planning for recce and operations. BAE conducts detailed target analysis, generating GEO PDFs for ease of intelligence sharing. Analysts can view crisp, clear delineation of roads leading to the suspect site, boundary walls and structure, and other features like ingress and egress routes. BAEs Route Search

product gives insight into the terrain profile by identifying culverts, ambush points and LOS/Dead Ground. This enables commanders to plan a safe and effective route for the attack. Terrain analysis also reveals land slope and helps identification of suitable HLS.

Systematic provides situational awareness of IED locations and safe areas to all units. Data is exchanged between front-line units, EOD squadrons, operational headquarters and national security agencies.

Geo-referenced PDFs inform mission planning (BAE).

Stage 3: Planning Capability providers: Esri (UK), ITT, BAE, Cobham, Systematic This stage focuses on two areas of the planning activity: Force Protection shows how intelligence combined with the underpinning geospatial information can be used to produce accurate and detailed briefing products to ensure force protection. Proactive Activity - shows how simple GIS tools can be used by units on the ground to plan and conduct a C-IED offensive without the need to resort to specialist geospatial staff. This demo will cover how a commander: views the geospatial information available of an area and his objectives views threat and incident data plans the operation, routes and approach generates an operational overlay which is used to brief his troops and can also b e shared with all other forces in the area

Partner contributions Force Protection: Esri (UK) ArcGIS Server generates patrol route mapping with IED risk classifications based on incident analysis and ITTs ground analysis. This enables commanders to plan safe and unpredictable patrol routes to avoid ambushes and launch surprise attacks on IED planters. ITT store image outputs in NITF (even JP2K compatible NITF) for compatibility with US databases/tools. The extension allows analysts to capture numerous images, textual and graphical annotations, all within a single file that is easy to work with and communicate to colleagues in the battlefield. Cobham provides monitoring of cell phone traffic between suspects and indicates potential IED threats on the supply route through AOI. Tapping calls between suspects can yield vital information about the IED material delivery, factory location and planned IED plantings. Systematic develops the Patrol Plan marking safe zones through IED hotspots, creating a geo-fenced area with movement out of area sensor based on patrol GPS tracking and dialog response capability.

Proactive Activity: Esri (UK) ArcGIS server enables production of briefing products. The decision support overlay enables Course of Action Sketching, Course of Action Comparison and identification of NAIs and TAIs. This contains key decision points, timelines associated with the movement of forces and the flow of the operation, and other key information required to execute an offensive. BAE provides support for point mensuration for precise targeting and mission rehearsal, including helicopter approach and landing zones analysis and 3D modelling of approach by foot and air. Cobham contributes to monitoring surveillance during the planning period and can advise on meetings to take place or suspected delivery to the bomb factory on a given date. Systematic develops the plan for the recce activity and assault on the suspected bomb factory. Receiving updated intelligence, SitaWare enables warfighters to share information. Systematics IRIS messaging allows all units involved in the operation to remain updated and aware of changes to the plan as they occur. SitaWare enables the Common Operational Picture to include both land and air assets in near real time.

Stage 4: Act and Review Capability providers: Esri (UK), BAE, Cobham, and Systematic This stage shows how real time location and information provided by forces operating in an area can be used to conduct and track the progress of an operation, allowing commanders to react quickly to events, drawing up new plans and enabling them to redeploy forces and assets in a coordinated manner. Partner contributions Esri (UK) ArcGIS server acts as hub for all geo-referenced data collected. It consolidates and produces a detailed high resolution web service of target area. It enables mapping of target, route in, waypoints and safe zone for return. Cobham monitor cell phones traffic prior to, during and post operation, to determine level of disruption. Intercepting enemy conversations during the operations can help update the operations strategy in real time.

Systematic Sitaware enables warfighters to clearly identify combatants, through sharing of insurgents photographs. IEDs can be geo-referenced and messages sent through the system for MEDIVAC of wounded personnel.

BAE help in establishing optimum LZs. Excessive dust and dirt thrown up by heli landings can seriously jeopardise operations. BAE provides pilots with intuitive, eyes-out landing guidance and allow pilots to land safely.

Enabling ad hoc replanning of operations at the tactical level (Systematic).

The material within this exercise was developed in collaboration with the following specialists:

systematic.com

ihsjanes.com

i2group.com

cobham.com/mmi

ittvis.com

baesystems.com

Satellite imagery in this exercise supplied courtesy of:

digitalglobe.com

For further information on this exercise and any of the capabilities demonstrated, please contact: Daran Scarlett Esri (UK) Defence, National Security and Public Safety team mobile: 07841 321118 email: dscarlett@esriuk.com

Esri (UK) Ltd Millennium House 65 Walton Street Aylesbury Buckinghamshire HP21 7QG T 01296 745500 F 01296 745544 E info@esriuk.com www.esriuk.com

Copyright Esri (UK) 2007. All rights reserved. The Esri globe and Esri products, services and trademarks mentioned are trademarks of Environmental Systems Research Institute, Inc. Other companies and products mentioned herein are the property of their respective trademark owners.

Você também pode gostar