SlideShare una empresa de Scribd logo
1 de 8
Mil-INTEL

Integrated Intelligence System
Integrated Intelligence Concept
   Typical Intelligence Information Types
Integrated Intelligence System

Intelligence Cycle                                Direct resources to
                                                  collect information




Make information available to
users in timely manner




                                                                    Collect combat & target
                                                                    information from
                                                                    resources


                  Prepare & validate
                  collected information for use
Integrated Intelligence System – Tactical Level

        Typical Military Intelligence Cycle (at tactical level)




              Operational Users                     Operations Center

                                                           Plan




                                  Collect


         Process / Produce
Integrated Intelligence System – Strategic Level




                              Intelligence Data Input


   OSINT                         IMINT




SIGINT




                                    HUMINT

         Organic & External Resources
Mil-INTEL - Integrated Intelligence System
                      Mil-INTEL supports all phases of intelligence cycle
                                         (Direction, Collection, Processing, Dissemination).
                      Major functions of Mil-INTEL are:
                        Management of intelligence resources
                        Planning intelligence collection
                        Task management and monitoring
                        Target management (incl Fusing)
                        Management of intelligence information
                           • Tactical Level Intelligence
                           • Strategic Level Intelligence
                           • Armed Forces Intelligence
                           • Counter Intelligence
                           • Intelligence against terrorism
                        Common Intelligence Picture and Situational Awareness
                        Management of environmental information (geo, meteo etc.)
                        Formatted Messages and Integrated Infrastructure
                        Integration with
                           • tactical data links
                           • tactical command & control systems
                           • imagery exploitation systems (UAV, satellite etc.)
Mil-INTEL               CIMIC capabilities (Integration with civilian intelligence systems, homeland
Integrated
Intelligence System     security systems, civilian defense systems, integrated border management
                        systems & airport systems) as required
Integrated Intelligence System – Summary

Mil-INTEL Solution;
• All Level Joint Intelligence System (from Tactical up to Strategic
  Level)
• Provides seamless integration between the levels
• Supports all phases of Intelligence Cycle
• Comprehensive analysis capability
• Designed to enable network centricity
• Independent of organizational structure (easily adaptable to
  organizational changes)
• Integrates and allows for collaboration and interoperability between
  civilian and military systems, if required
• Supports and enables interoperability with future and legacy C2
  systems
• Built on existing latest technology aspects (web based solution
  aspects, HTML 5 supported GIS, sophisticated IT solutions)
Thank you for your kind attention

Más contenido relacionado

Similar a Mil intel generic-short-eng

Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence WorkshopPriyanka Aash
 
MH Summary(Final)
MH Summary(Final)MH Summary(Final)
MH Summary(Final)mhicks10
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...Cristian Garcia G.
 
Creating apt targeted threat feeds for your industry
Creating apt targeted threat feeds for your industryCreating apt targeted threat feeds for your industry
Creating apt targeted threat feeds for your industryKeith Chapman
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security IssuesPhearin Sok
 
Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1Heather-Fiona Egan
 
Core security utcpresentation962012
Core security utcpresentation962012Core security utcpresentation962012
Core security utcpresentation962012Seema Sheth-Voss
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meetingfcleary
 
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0Fabrizio Cilli
 
2012 july mil soft_ie_capabilities__iic_solutions-general-eng
2012 july mil soft_ie_capabilities__iic_solutions-general-eng2012 july mil soft_ie_capabilities__iic_solutions-general-eng
2012 july mil soft_ie_capabilities__iic_solutions-general-engmilsoftSDC
 
Critical infrastructure Protection and Cyber Attack Modeling
Critical infrastructure Protection and Cyber Attack ModelingCritical infrastructure Protection and Cyber Attack Modeling
Critical infrastructure Protection and Cyber Attack ModelingBlaz Ivanc
 
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docxFM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docxvoversbyobersby
 
Continuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk ScoringContinuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk ScoringQ1 Labs
 
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...IBM Security
 
Imageri Acquisition Planning in Military Emergency
Imageri Acquisition Planning in Military EmergencyImageri Acquisition Planning in Military Emergency
Imageri Acquisition Planning in Military EmergencyEsri
 
Pt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptxPt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptxaisharasyidila
 

Similar a Mil intel generic-short-eng (20)

Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
MH Summary(Final)
MH Summary(Final)MH Summary(Final)
MH Summary(Final)
 
Ids 001 ids vs ips
Ids 001 ids vs ipsIds 001 ids vs ips
Ids 001 ids vs ips
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
 
Creating apt targeted threat feeds for your industry
Creating apt targeted threat feeds for your industryCreating apt targeted threat feeds for your industry
Creating apt targeted threat feeds for your industry
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1
 
Core security utcpresentation962012
Core security utcpresentation962012Core security utcpresentation962012
Core security utcpresentation962012
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meeting
 
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
 
2012 july mil soft_ie_capabilities__iic_solutions-general-eng
2012 july mil soft_ie_capabilities__iic_solutions-general-eng2012 july mil soft_ie_capabilities__iic_solutions-general-eng
2012 july mil soft_ie_capabilities__iic_solutions-general-eng
 
Critical infrastructure Protection and Cyber Attack Modeling
Critical infrastructure Protection and Cyber Attack ModelingCritical infrastructure Protection and Cyber Attack Modeling
Critical infrastructure Protection and Cyber Attack Modeling
 
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docxFM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
FM 34-60 Counterintelligence Chapter 5 - Counterintelligence Ana.docx
 
Continuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk ScoringContinuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk Scoring
 
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Imageri Acquisition Planning in Military Emergency
Imageri Acquisition Planning in Military EmergencyImageri Acquisition Planning in Military Emergency
Imageri Acquisition Planning in Military Emergency
 
Pt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptxPt. 4 - Intelligence.pptx
Pt. 4 - Intelligence.pptx
 

Más de milsoftSDC

Mil soft sunum 2013
Mil soft sunum 2013Mil soft sunum 2013
Mil soft sunum 2013milsoftSDC
 
Mil imadis generic-short-eng
Mil imadis generic-short-engMil imadis generic-short-eng
Mil imadis generic-short-engmilsoftSDC
 
Usmos mil soft_dds_makale
Usmos mil soft_dds_makaleUsmos mil soft_dds_makale
Usmos mil soft_dds_makalemilsoftSDC
 
Dds presentation omg
Dds presentation omgDds presentation omg
Dds presentation omgmilsoftSDC
 
Mil soft company overview 2012 v2
Mil soft company overview 2012 v2Mil soft company overview 2012 v2
Mil soft company overview 2012 v2milsoftSDC
 
Mil soft jets jetsim
Mil soft jets jetsimMil soft jets jetsim
Mil soft jets jetsimmilsoftSDC
 
Gemkomsis 2012
Gemkomsis 2012Gemkomsis 2012
Gemkomsis 2012milsoftSDC
 

Más de milsoftSDC (8)

Mil soft sunum 2013
Mil soft sunum 2013Mil soft sunum 2013
Mil soft sunum 2013
 
Mil imadis generic-short-eng
Mil imadis generic-short-engMil imadis generic-short-eng
Mil imadis generic-short-eng
 
Usmos mil soft_dds_makale
Usmos mil soft_dds_makaleUsmos mil soft_dds_makale
Usmos mil soft_dds_makale
 
Dds presentation omg
Dds presentation omgDds presentation omg
Dds presentation omg
 
Mil soft company overview 2012 v2
Mil soft company overview 2012 v2Mil soft company overview 2012 v2
Mil soft company overview 2012 v2
 
Mil soft jets jetsim
Mil soft jets jetsimMil soft jets jetsim
Mil soft jets jetsim
 
Gvls 2012
Gvls 2012Gvls 2012
Gvls 2012
 
Gemkomsis 2012
Gemkomsis 2012Gemkomsis 2012
Gemkomsis 2012
 

Mil intel generic-short-eng

  • 2. Integrated Intelligence Concept Typical Intelligence Information Types
  • 3. Integrated Intelligence System Intelligence Cycle Direct resources to collect information Make information available to users in timely manner Collect combat & target information from resources Prepare & validate collected information for use
  • 4. Integrated Intelligence System – Tactical Level Typical Military Intelligence Cycle (at tactical level) Operational Users Operations Center Plan Collect Process / Produce
  • 5. Integrated Intelligence System – Strategic Level Intelligence Data Input OSINT IMINT SIGINT HUMINT Organic & External Resources
  • 6. Mil-INTEL - Integrated Intelligence System Mil-INTEL supports all phases of intelligence cycle (Direction, Collection, Processing, Dissemination). Major functions of Mil-INTEL are: Management of intelligence resources Planning intelligence collection Task management and monitoring Target management (incl Fusing) Management of intelligence information • Tactical Level Intelligence • Strategic Level Intelligence • Armed Forces Intelligence • Counter Intelligence • Intelligence against terrorism Common Intelligence Picture and Situational Awareness Management of environmental information (geo, meteo etc.) Formatted Messages and Integrated Infrastructure Integration with • tactical data links • tactical command & control systems • imagery exploitation systems (UAV, satellite etc.) Mil-INTEL CIMIC capabilities (Integration with civilian intelligence systems, homeland Integrated Intelligence System security systems, civilian defense systems, integrated border management systems & airport systems) as required
  • 7. Integrated Intelligence System – Summary Mil-INTEL Solution; • All Level Joint Intelligence System (from Tactical up to Strategic Level) • Provides seamless integration between the levels • Supports all phases of Intelligence Cycle • Comprehensive analysis capability • Designed to enable network centricity • Independent of organizational structure (easily adaptable to organizational changes) • Integrates and allows for collaboration and interoperability between civilian and military systems, if required • Supports and enables interoperability with future and legacy C2 systems • Built on existing latest technology aspects (web based solution aspects, HTML 5 supported GIS, sophisticated IT solutions)
  • 8. Thank you for your kind attention

Notas del editor

  1. Intelligence involves collection, processing and assessment of abundant information on very diverse areas. These areas range from very high and strategic levels to very low and technical levels, covering both military and civilian aspects.
  2. Generic Intelligence Cycle consists of four consecutive cycles * The first cycle begins with directing resources for collecting the required information * In the second cycle, intelligence information is collected from resources * The third cycle processes and fuses the collected data and produces intelligence information * In the last cycle, intelligence information is distributed to users As users need further intelligence information, this cycle repeats itself.
  3. Typical military intelligence cycle at tactical level is started by the operaitonal users through identifying intelligence information needs and requesting that intelligence information from an intelligence unit. An intelligence unit can be a cell in an operations center, or an intelligence center . Upon receiving this request, the intelligence unit plans how to collect the required information, by taking into account available resources. The collection resources can be directly under the command of intelligence unit or can be other resources that belong to external organizations. The collected information is processed and validated before being distributed to operational users. Operations are re-planned and executed in the light of received intelligence information. As the operations go on, the new intelligence information needs arise and intelligence cycle is repeated.
  4. As I mentioned a couple of slides earlier, intelligence is not limited to military and covers a broader area. This slide show how the intelligence process starts and flows. The aim of intelligence is to provide the required information in line with the intention of high level political or military authorities. The inteligence information guides decision-makers to determine the best Courses Of Actions and therefore contributes to the success of an operation. This operation might be a military or humanitarian aid operation, or a political action. High level authorities convey their information needs to intelligence organizations. Tactical intelligence needs can also be forwarded by operational people in the field. These information needs are directed to intelligence staff, and then converted into intelligence requests. These requests are forwarded to and met by collection resources which may be our own entities or external resources. Collection resources may belong to different intelligence disciplines, such as OSINT, SIGINT, IMINT and HUMINT etc. Collecting information from different resources and disciplines helps increase the reliability of intelligence. The collected information are analyzed, processed and fused, as appropriate, before dissemination to users. Approval by the release authority is required before dissemination, so that only validated intelligence information is shared with users. Part of dissemination is “Common Intelligence Picture” where all processed intelligence information are brought together to provide an overall situational awareness.
  5. As the bottom-line; Mil-INTEL solution provides a strategic level, joint intelligence system. Due to its Turkuaz architecture, Mil-INTEL enables network centricity which increases situational awareness through textual, graphical and other formats. Mil-INTEL is independent of organizational structure, therefore it can be easily implemented in any organization and be adapted to organizational changes. Mil-INTEL provides interoperability by integrating different systems, and on a wider scope by bringing civilian and military systems together. On technological side, it provides interoperability between legacy systems, that use comparably old technologies, and future systems that shall be based on evolving technologies. Mil-INTEL has been built on Turkuaz capability and developed through Spiral Life Cycle Development model.