SlideShare a Scribd company logo
1 of 20
Michael Donaghey [email_address] www.cids.us 1-888-709-CIDS (2437)
“ Between 2001 and 2015 we will see a 70,000% increase in the areas under surveillance—all captured in motion video intelligence—yielding Yottabytes of video data.”  - The Economist, 27 Feb 2010 NGA is currently storing over 20 million minutes of motion imagery
The Need Cognika Provides “Automated” PED Now! "The Army's ability to collect information far outpaces its ability to use the information collected"  --‐  Lt Gen Richard P. Zahner "We don't have enough time to discover data anymore. Especially when we are putting wide-area surveillance into country rapidly right now. We have to increase discover ability. We have to allow that analyst sitting on the ground looking at this massive amount of data, he or she does not have time to sift through all this stuff." --‐ Gen. Koziol "Today an analyst sits there and stares at Death TV for hours on end trying to find the single target or see something move or see something do something that makes it a valid target. It is just a waste of manpower. It is inefficient."  --‐ Gen. Cartwright "Analysts spend 80% of their time researching, and only 20% of their time actually thinking about what that research means. Analysts need more time thinking and less time sifting"  --‐ Gen. Vincent Stewart "We're not going to manpower our way out of this, we desperately need more automated tools."  --‐ Maj Gen James Poss “ Not Enough Eyeballs, Not Enough Pipes, Not Enough Disks”
Projected Personnel Requirements ,[object Object],[object Object],[object Object],Cognika Provides “Automated” PED Now! Source: National Geo-spatial Intelligence Agency  “ NGA's Initiatives to Improve Motion Imagery Usage” [27-28]  17 November 2010 PED: Processing, Exploitation, Dissemination
Solution   Find, Analyze, and View All Data Sets audio video radar
Automated Approach  Searches, Analyzes and Utilizes ALL Types of Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Manage Information,  Not Drown in it
Cognika Solution ,[object Object],[object Object],[object Object],[object Object],[object Object]
Powerful Toolkit for Querying and Interpretation Object   Identification (White SUV) Activity (Men Digging) Metadata (Time, Location, Etc) Flexible Customizable System
[object Object],[object Object],[object Object],[object Object],Extracting and Analyzing Content For All Available Data Files
Automated Usage of Real Time IED Intel  IED/Bomb is detonated All intelligence is gathered, including images of the bomb and detonation device CIDS Software Tool is run on all images and known data Results reveal similarities among previously catalogued bomb intelligence Bomb makers at location and their  signature devices  are highlighted by CIDS Software – Including Spatio-Temporal Reasoning
Connect the Dots Before the Blast Search by Device Part Numbers (Link to similar known devices)  Search by Image Search by Attribute(s) Discovery at Cargo Screening Linked to Catalogued Bomb Making Devices Devices Linked to Known Bomb Maker
Real-Time Alerts Email/Text  Intercept Call Intercept HUMINT UAV Video Forensic Analysis Intelligence Assessments REAL TIME Alerts and Analysis Utilizing all INT
Man Walking Man Walking With Weapon Activity Detection   Within Real Time Video CIDS can discern between men walking and men walking with weapon. Robust system which limits rate of false positives
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Key System Features
The System Training:  Query for ‘Men Gathering’ ,[object Object],[object Object],[object Object],[object Object],Men Gathering AND Ramadi/Baquba
System Usage Men AND Truck Man AND Weapon Men Gathering Men Gathering AND Ramadi/Baquba Men Gathering Ramadi, Al-Anbar Province 08/22/11  22:04:13 – 22:05:09 Five unidentified men leaving building, walking down street. Note: Known Bomb Maker at Location    Man AND Weapon Ramadi, Al-Anbar Province 08/09/11  02:48:18 - 03:52:42 Unidentified man walking down street Note: Man Digging and Weapon   Men AND Truck Baquba, Diyala Province 07/28/11  23:38:04 - 23:39:19 Five unidentified men walking, enter vehicle Note: Vehicle of Interest   Tracked to Location Geo-location Intel Reports Imagery Video News
Activity Timeline  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Activity Timeline Screen Shot
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Summary of Capabilities
Attack the Network CIDS puts the power of the information in the hands of the ANALYST ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],cids@cognika.com  www.cids.us

More Related Content

Similar to Cognika Technology Briefing

Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with Oracle
Sai Janakiram Penumuru
 
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimThree mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Daeyoung Kim
 

Similar to Cognika Technology Briefing (20)

ICU WORKBENCH - The Art of Where
ICU WORKBENCH - The Art of WhereICU WORKBENCH - The Art of Where
ICU WORKBENCH - The Art of Where
 
icuWorkbench - Use cases
icuWorkbench - Use casesicuWorkbench - Use cases
icuWorkbench - Use cases
 
Realtime Big Data Analytics for Event Detection in Highways
Realtime Big Data Analytics for Event Detection in HighwaysRealtime Big Data Analytics for Event Detection in Highways
Realtime Big Data Analytics for Event Detection in Highways
 
Guru_poster
Guru_posterGuru_poster
Guru_poster
 
Comparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction ToolsComparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction Tools
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with Oracle
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
 
IOT Forensics
IOT ForensicsIOT Forensics
IOT Forensics
 
MCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformMCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence Platform
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligence
 
A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniques
 
Big data
Big dataBig data
Big data
 
Next Century Project Overview
Next Century Project OverviewNext Century Project Overview
Next Century Project Overview
 
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kimThree mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
Three mustkeers-iot-bigdata-cloud-kaist-daeyoung kim
 
Big data - What is It?
Big data - What is It?Big data - What is It?
Big data - What is It?
 
Csec 650 individual assignment i
Csec 650 individual assignment iCsec 650 individual assignment i
Csec 650 individual assignment i
 
Why Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringWhy Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network Monitoring
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and Challenges
 
Mimos indoor location platform 2 feb2017
Mimos indoor location platform 2 feb2017Mimos indoor location platform 2 feb2017
Mimos indoor location platform 2 feb2017
 
MBA-TU-Thailand:BigData for business startup.
MBA-TU-Thailand:BigData for business startup.MBA-TU-Thailand:BigData for business startup.
MBA-TU-Thailand:BigData for business startup.
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Cognika Technology Briefing

  • 1. Michael Donaghey [email_address] www.cids.us 1-888-709-CIDS (2437)
  • 2. “ Between 2001 and 2015 we will see a 70,000% increase in the areas under surveillance—all captured in motion video intelligence—yielding Yottabytes of video data.” - The Economist, 27 Feb 2010 NGA is currently storing over 20 million minutes of motion imagery
  • 3. The Need Cognika Provides “Automated” PED Now! "The Army's ability to collect information far outpaces its ability to use the information collected" --‐ Lt Gen Richard P. Zahner "We don't have enough time to discover data anymore. Especially when we are putting wide-area surveillance into country rapidly right now. We have to increase discover ability. We have to allow that analyst sitting on the ground looking at this massive amount of data, he or she does not have time to sift through all this stuff." --‐ Gen. Koziol "Today an analyst sits there and stares at Death TV for hours on end trying to find the single target or see something move or see something do something that makes it a valid target. It is just a waste of manpower. It is inefficient." --‐ Gen. Cartwright "Analysts spend 80% of their time researching, and only 20% of their time actually thinking about what that research means. Analysts need more time thinking and less time sifting" --‐ Gen. Vincent Stewart "We're not going to manpower our way out of this, we desperately need more automated tools." --‐ Maj Gen James Poss “ Not Enough Eyeballs, Not Enough Pipes, Not Enough Disks”
  • 4.
  • 5. Solution Find, Analyze, and View All Data Sets audio video radar
  • 6.
  • 7.
  • 8. Powerful Toolkit for Querying and Interpretation Object Identification (White SUV) Activity (Men Digging) Metadata (Time, Location, Etc) Flexible Customizable System
  • 9.
  • 10. Automated Usage of Real Time IED Intel IED/Bomb is detonated All intelligence is gathered, including images of the bomb and detonation device CIDS Software Tool is run on all images and known data Results reveal similarities among previously catalogued bomb intelligence Bomb makers at location and their signature devices are highlighted by CIDS Software – Including Spatio-Temporal Reasoning
  • 11. Connect the Dots Before the Blast Search by Device Part Numbers (Link to similar known devices) Search by Image Search by Attribute(s) Discovery at Cargo Screening Linked to Catalogued Bomb Making Devices Devices Linked to Known Bomb Maker
  • 12. Real-Time Alerts Email/Text Intercept Call Intercept HUMINT UAV Video Forensic Analysis Intelligence Assessments REAL TIME Alerts and Analysis Utilizing all INT
  • 13. Man Walking Man Walking With Weapon Activity Detection Within Real Time Video CIDS can discern between men walking and men walking with weapon. Robust system which limits rate of false positives
  • 14.
  • 15.
  • 16. System Usage Men AND Truck Man AND Weapon Men Gathering Men Gathering AND Ramadi/Baquba Men Gathering Ramadi, Al-Anbar Province 08/22/11 22:04:13 – 22:05:09 Five unidentified men leaving building, walking down street. Note: Known Bomb Maker at Location   Man AND Weapon Ramadi, Al-Anbar Province 08/09/11 02:48:18 - 03:52:42 Unidentified man walking down street Note: Man Digging and Weapon   Men AND Truck Baquba, Diyala Province 07/28/11 23:38:04 - 23:39:19 Five unidentified men walking, enter vehicle Note: Vehicle of Interest Tracked to Location Geo-location Intel Reports Imagery Video News
  • 17.
  • 19.
  • 20.

Editor's Notes

  1. We are here today to introduce you to a powerful new software application that uses a mature technology to assist the Analyst with PED.
  2. There are massive quantities of information acquired and stored from a myriad of sensors. It is nearly impossible for the Analyst to review it all. Quantity of data is expected to increase exponentially in the next few years. The Mission Requires an Automated Tool.
  3. Based on data given by NGA it is impossible for the Analyst to keep up with the data available. Additionally it will be cost prohibitive to the Government to hire every Analyst required to conduct the PED of all the information that is now and becoming available.
  4. Our systems finds, analyzes and presents real-time disparate data. CIDS real time output provides intel to the tactical edge.
  5. CIDS allows user to see key differentiators. I.E. Weapon.
  6. Using the CIDS software the Analyst can conduct PED against all of the available information allowing forces to be brought against the Network.