A military team maximizes intelligence collection and analysis capabilities

IBM i2 software helps uncover hidden patterns for a more complete intelligence picture

Published on 27-Dec-2013

"With the use of IBM i2 Analyst’s Notebook, the way our team approaches our intelligence role has been changed for the better." - A major in a military force

Customer:
A military team maximizes intelligence collection and analysis capabilities

Industry:
Government

Deployment country:
Afghanistan

Overview

This specialized military team, stationed in Helmand Province, Afghanistan, is tasked with collecting, analyzing and disseminating large volumes of data used to develop human terrain intelligence in the battle against insurgents.

Business need:
This military team needed to quickly assimilate a vast amount of data, including the full spectrum of human-, communication- and imagery-related intelligence to identify patterns and relationships.

Solution:
The team implemented IBM® i2® Analyst’s Notebook® software to help it better exploit large volumes of complex intelligence data.

Benefits:
A comprehensive intelligence picture lets the team better navigate the complex world of counterinsurgency and keep ahead of the varied human components and geographical obstacles.

Case Study

This specialized military team, stationed in Helmand Province, Afghanistan, is tasked with collecting, analyzing and disseminating large volumes of data used to develop human terrain intelligence in the battle against insurgents.

Challenge
Military intelligence has a tendency to be viewed at a tactical level and based purely on collection and upward passage of information. In the realm of counterinsurgency, expertise lies, more often than not, with the team closest to the ground. Analysis of data starts with the team that does the gathering to avoid misinterpretation as the data flows up the intelligence chain. Establishing standardized procedures with wider data compatibility is imperative to forming the backbone of powerful information exploitation.

The military team comprises five companies with subunits occupying their own areas of operation. The large geographical area involved encompasses a wide and varied population amongst whom the insurgents can operate. To better understand these areas, each subunit passes data up the intelligence chain for fusion with other data and further exploitation. Previous methods of channeled data did not facilitate the rapid fusion of intelligence needed to drive intelligence-led operations. Subunits would produce written, multipage summaries each day, and detail would be quickly lost, causing decision makers to lose sight of relationships and connections in terms of time, space and corroboration. The team needed a solution that would ingest large volumes of complex data for analysis, minimize duplicate efforts and maximize corroboration.

Solution
The military team implemented IBM i2 Analyst’s Notebook software in its quest to best take advantage of gathered intelligence in its counterinsurgency efforts. Each subunit enters its gathered intelligence, contributing to the hundreds of rows of data that the overall team inputs daily for deeper analysis and exploitation. The i2 Analyst’s Notebook software helps the team fuse this data, from multiple sources in varied formats, for fast analysis and exploitation. The i2 Analyst’s Notebook software helps the team convert the disparate data into a cohesive intelligence picture, reducing duplicate efforts and facilitating information corroboration and sharing.

The implementation of the i2 Analyst’s Notebook software has helped the team identify patterns that may have otherwise gone unnoticed, allowing them to recognize and deliberately disrupt insurgent activity. The ability to integrate and visualize complex data also lets the team gain a greater understanding of the surrounding human component so that it can better anticipate the cause and effect of actions, opening opportunities for subsequent exploitation of the insurgency and related activities.

Benefits
· Facilitates intelligence exploitation by integrating and simplifying disparate data from multiple sources
· Provides an integrated intelligence picture, helping to reduce duplication and support collaboration through integration
· Helps identify previously unnoticed patterns and connections through advanced analytical capabilities

For more information
To learn more about IBM i2 software, please contact your IBM marketing representative or IBM Business Partner, or visit the following website: ibm.com/software/industry/i2software.

Products and services used

IBM products and services that were used in this case study.

Software:
i2 Analyst's Notebook

Legal Information

© Copyright IBM Corporation 2013 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America November 2013 IBM, the IBM logo, ibm.com, Analyst’s Notebook and i2 are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml. This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. The performance data and client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided.