FEATURED | Big Data in Military Information & Intelligence

National Security. Volume of data has expanded exponentially with the internet, especially in areas affecting national security like counter-terrorism, network security, and counter-proliferation. Rapid influx of unstructured data relating to national security issues as cyber defense requires both real time and off line analysis.

By  Rear Admiral Dr. S. Kulshrestha (retd.), Indian Navy

"Data really powers everything that we do." - Jeff Weiner, Chief Executive at LinkedIn


FEATURED | Big Data in Military Information & Intelligence

In 1997 two scientists of NASA, Michael Cox and David Ellsworth used the term Big Data in their paper "Application-controlled demand paging for out-of-core visualization". While spelling out the problem they had with computer graphics they stated that "….provides an interesting challenge for computer systems: data sets are generally quite large, taxing the capacities of main memory, local disk, and even remote disk. We call this the problem of big data."

Big Data has been traditionally associated with issues of data analysis and data storage. Gartner report proposed a definition encompassing 3V’s: Volume, Velocity, and Variety. The report commented upon the increasing size of data, the increasing rate at which it is produced, and the increasing range of formats and representations employed. This definition has since been expanded to include a fourth V: Veracity.

Oracle in its definition states that big data is the derivation of value from traditional relational database driven business decision-making, augmented with new sources of unstructured data. By new sources, Oracle implies social media, blogs, image data, sensor networks, and data forms, which vary in size, structure, format etc. Thus, big data is the inclusion of additional data sources to augment existing operations. However, like Gartner, Oracle also does not quantify the term big data.

Intel has connected big data to organizations “generating a median of 300 tera-bytes (TB) of data weekly”. Intel has described big data by quantifying the experiences of its business partners. Intel contends that analytics commonly deal with business transactions. As per Microsoft: “Big data is the term increasingly used to describe the process of applying serious computing power - the latest in machine learning and artificial intelligence - to seriously massive and often highly complex sets of information”.

From the above definitions, it can be inferred that that big data is intrinsically related to data analytics and there are a number of related technologies like NoSQL and Apache Hadoop. In addition, it is clear that there are a number of organizations, specifically industrial organizations that are linked with big data. A contrary definition provided by The Method for an Integrated Knowledge Environment (MIKE2.0) project, suggests: "Big Data can be very small and not all large datasets are big". Thus, it is a high degree of permutations and interactions within a dataset, which defines big data. Ward and Barker have provided a comprehensive definition that- Big data is a term describing the storage and analysis of large and or complex data sets using a series of techniques including, but not limited to NoSQL, MapReduce and machine learning.

Big Data Environment

To give a feel of data generated every day it would suffice to state that in 2014, each day approximately 294 bn emails were sent, 6 bn Google Searches were carried out, 3.5 bn Facebook messages were posted and 40 mn Tweets were shared. With the likely advent of internet of things, data generation is set to grow exponentially when appliances, vehicles and wearable technologies start to communicate with each other. The variety and complexity of sources and formats of data continue to expand. Some of the sources are internet, social media, mobiles, mobile applications; national, state & local databases; GPS & commercial databases that collect individual data from commercial & personal transactions & public records; surveys; geo-spatial data; and scanned documents.

One thing is clear that big data pertains to large-scale collection of data due to reduction in costs of data collection and storage as well as surge in sources of data like cameras, sensors, and geo-spatial location technologies. The ‘internet of things’ (from web-enabled appliances, wearable technology, and advanced sensors to monitor everything from vital signs to energy use to a jogger’s running speed) will create exponential surge in data demand and its high performance processing at rates unseen so far. Both types of data collection viz in analog form (images from cameras, mobiles, video recorders, wearable devices, which can be converted to digital) and digital form (emails, internet browsing and capture, location devices) are currently available in various formats and require data fusion. The collection and processing is demanding speeds, which are near real time, thus pushing data analysis to its current limits. For example mapping services, medical care and car operations require near immediate responses for them to be safe and effective. Technologies for handling of big data as well as their management are witnessing an unprecedented demand. Commercial and customer interests have enabled a merger of information and industrial economies.

A complete perspective in to big data requires pinning down of a few important characteristics peculiar to big data. Since big data originates from a tangible source, a large part of it may be of no value. Further data in its raw form may not be amenable to analysis. An information retrieving mechanism is required to extract relevant information and convert it into a structured form before it can be analyzed. This is a demanding technology as thoroughness and accuracy is required to be ensured at this stage. Data analysis is not simply identification, location, or citing of data, it is an interdisciplinary endeavor involving pure mathematics, statistics, computer science etc. For data to be of value to a decision maker it has to be made understandable and interactive in near real time. The software needs designing in a manner that it is user friendly since the user may not be having an in depth understanding of big data systems and algorithms. Predictive analytics is an important area of big data mining that deals with extracting information from data and using it to predict trends and behavior patterns. Fundamentally, predictive analytics depends upon capturing relationships between explanatory variables & the predicted variables from past occurrences, and exploiting them to predict the unknown. Predictive analytics tools have become sophisticated to dissect data problems and present findings using simple charts, graphs, and numbers that indicate the likelihood of possible outcomes. The accuracy and usability of results however, depends on the level of data analysis and the quality of assumptions.

Major technological advances include Cluster Computer Systems, which comprise large numbers of computers connected by high speed LANs for data storage, data organization, analysis, and query response. The software design of clusters enables use of COTS hardware for enhanced efficiency, reliability, and scalability. The software algorithms build statistical models from huge data sets by utilizing interdisciplinary approach, which makes it possible to draw inferences for further decision making. Some note worthy software includes Apache S4, which processes continuous data streams. S4 applications are designed combining streams and processing elements in real time. Twitter’s Storm also uses a similar approach. Hadoop Map Reduce is a programming model and software framework for writing applications. It enables quick processing of big data on large clusters of computer nodes in parallel. The input dataset is divided into independent subsets that are processed in parallel by map tasks. The final result is obtained by reduce tasks which use the output of the map tasks.

Military Information and Intelligence

In National Security domain, the volume of data has expanded exponentially with the internet, especially in areas affecting national security like counter-terrorism, network security, and counter-proliferation. Rapid influx of unstructured data relating to national security issues as cyber defense requires both real time and off line analysis. The handling of this data needs quick advances from system architecture to innovations in statistics. Large scale and in depth querying of big data, visualization of big data in various forms like maps, graphs & time lines, and near real time analyses of streaming data are some of the essential requirements for national security issues.

The importance of information and intelligence for the military is brought out from the fact that it is fundamental to planning of any military operation in peace or war. Reconnaissance and surveillance tasks have been carried out by militaries since time immemorial prior to mounting any assault on the enemy. The success of the mission depends upon the correct analysis of the available information during the planning stage. The collection of information, its analysis, and further dissemination is of prime importance for any military. Today the methods of collecting information have changed due to quick availability of combat information of high quality and reliability from a varied array of sensors and sources. A definition of Intelligence, Surveillance and Reconnaissance (ISR) components taken from US Army manuals lists Intelligence as firstly, the product resulting from the collection, processing, integration, analysis, evaluation, and interpretation of available information concerning foreign countries or areas; and secondly, as information and knowledge about an adversary obtained through observation, investigation, analysis, or understanding. Surveillance is defined as the systematic observation of aerospace, surface, or subsurface areas, places, persons, or things, by visual, aural, electronic, photographic, or other means. Reconnaissance is a mission undertaken to obtain by visual observation or other detection methods, information about the activities and resources of an enemy or potential enemy, or to secure data concerning the meteorological, hydro-graphic, or geographic characteristics of a particular area. An optimal ISR plan is formulated by integrating the ISR missions based upon capabilities of various assets available. The information is thereafter collated and analyzed for feeding in to the planning of operations.

The basic information that is required by any commander in today’s networked warfare is accurate position of his own units, location of the enemy and his reserves, location of supporting units and placing of other miscellaneous assets. With this knowledge, a commander today can effectively carry out his mission by optimally utilizing the available firepower and resources. Thus crucial to any mission is ‘situational awareness’, which comprises tasking, collection, processing, exploitation, and dissemination. Embedded in the ISR is Communication without which no mission can be accomplished. Digital communication systems, internet, and mobile devices have revolutionized the amount of data generation. The term Big Data refers to a whole gamut of information available from sensors, video imagery, mobile phone, signals intelligence, and electronic warfare interceptions to satellite images. Data is collected at unprecedented levels.

Rapid technological advances in sensor based, smart, and networked combat systems is pushing the military to adopt commercially available emerging technologies and adapt them for its use. This has led to a synergistic relationship with digital industry where in military may no longer develops its own hardware and software DeNovo, but harness and modify the "Commercial of the  Shelf" (COTS) items. The advent of big data is driving the armed forces to shift the integrated decision making support systems to architecture and analytics of big data. The financial crunch faced by militaries in leading countries implies even more dependence upon technology by the reduced manpower. This in turn has led other nations to adopt a wait and watch strategy by which they would go in for the best available solution adopted by leading armies. To understand and react to real time tactical situations commanders have to manage and control big data environment comprising of, historical or point-in-time data, transactional data, optimized data for inquiry, unpredictable pattern of data, and ad-hoc use of the system. The military has been collecting data at humongous levels since the induction of unmanned vehicles with sensors. The data heaps cannot be analyzed in traditional manner. They require dedicated data scientists and development of different software tools to exploit extracted information for mission planning. It is understood that in Afghanistan, the Defense Advanced Research Projects Agency (DARPA) had sent in data scientists and visualizers under a program called Nexus 7. They operated directly with military units and assisted commanders in solving specific operational challenges. In some cases surveillance and satellite data was fused to visualize traffic flow through road networks to detect and destroy improvised explosive devices.

Major issues faced by the military today involve availability of ever increasing volumes of sensor data from integral sources like Unmanned Aerial Vehicles (UAVs) and other national assets. A simple full day UAV mission can provide upwards of 10 tera-bytes of data of which only about 5% is analyzed and the rest stored. Analysts are restricted by the download speeds of data depending upon their locations. Untagged data leads to downloading of similar data from other sources by the analyst to firm up their conclusions. Many times the communication lines are shared or may not be continuously available thereby increasing delays in analysis. Providing a comprehensive situational awareness is dependent upon the accuracy and integration of data received from multiple types of sensors as well as intelligence sources. The screens and software tools do not have interoperability as of now. Due to security considerations, ISR data from different sources is stored in different locations with varying access levels, this leads to incomplete analysis. Single network domain providing access to data at multiple levels of security classification is not yet available. Analysts currently spend only 20 percent of their time looking at correct data, whereas 80 percent of the time is spent looking for the correct data.

Some of the companies working in this field with the US military which provide a common operating picture or COP are given in succeeding examples.

Modus Operandi takes big data, infuses it with expert knowledge, and creates a common framework for easy identification of patterns. The data is embedded in to an underlying graphic structure and is amenable to complex queries. It can detect patterns and output different types of visualizations, like maps and time lines etc.




Image Attribute: Modus Operandi’s Wave-EF semantically enriches multi-source intelligence data through direct feeds or from net-centric services for fusion, mediation, metadata tagging, alerting and dissemination within applications and services. 

Source: Semantic Enrichment and Fusion Of Multi-Intelligence Data by Dr. Richard D. Hull, Don Jenkins, Alan McCutchen, Modus Operandi, Inc. (Download)

Palantir Technologies, is known for its software Palantir Gotham that is used by counter-terrorism analysts at offices in the United States Intelligence Community and United States Department of Defense, fraud investigators at the Recovery Accountability and Transparency Board, and cyber analysts at Information Warfare Monitor (responsible for the Ghost Net and the Shadow Network investigation).



Video Attribute: Railgun: Leveraging Palantir Gotham as a Command and Control Platform / Source: Palantir Technologies Official Youtube Channel

SAP’s HANA platform, provides a real-time analytics and applications platform for real-time big data that offers varying layers of security. It offers predictive, forecasting and calculation solutions and stitches together maintenance failure codes and document notes.


 Image Attribute: The combination of LuciadLightspeed and SAP HANA provides a visual analysis of violent events in Africa over the last 20 years.

Image Attribute: The combination of LuciadLightspeed and SAP HANA provides a visual analysis of violent events in Africa over the last 20 years.

To tackle the problem and analyze data in real time, Oracle has created a new-engineered system to handle big data operations. The company brought together its hardware with Cloudera’s Hadoop, enabling patching of multiple layers of the big data architecture.


Image Attribute: Cloudera’s Hadoop integration with Oracle Advanced Analytics


Image Attribute: Cloudera’s Hadoop integration with Oracle Advanced Analytics

Unified Data Architecture of Teradata is a comprehensive big data solution, which aims to bring data needed for analytics across the entire organization into one place to create a single version of enterprise data. For example, capturing minute-by-minute maintenance data in the field including potential new sources of big data.


Image Attribute: TERADATA Unified Data Architecture Concept

Image Attribute: TERADATA Unified Data Architecture Concept

DigitalEdge by Leidos is a scalable, pre-integrated, flexible, and pluggable data management platform that allows rapid creation and management of near real-time big data applications. Leidos’s Scale2Insight (S2i) is a solution that supports large complex data environments with multiple disparate sensors collecting information on different parts of the data ecosystem.


Image Attribute: The modular architecture of DigitalEdge preserves investments made in analytic, visualization and work flow solutions. Its design provides the necessary functions to build a powerful, real-time big data analytic environment. / Source: DigitalEdge White-paper by Leidos (Download)

SYNTASA delivers analytical applications focused on the behavior of visitors to internal government web sites. The analytics, which are built on an open source big data platform, determine the behavioral trends of visitors in order to improve the use of information by government analysts.




Image Attribute: SYNTASA Analytics Services for Government / Source: website screen shot (link)

Indian Context

“Knowledge of the mechanics and details of big data analytics are not only important to exploit it but also to collapse the distances between policy, planning, and operations.”

- Lt Gen Anil Bhalla, DGDIA, and DCIDS (Int), 2015

The applicability of big data analytics in context of Indian defense forces is very much in line with the developed forces in the world. This has been borne during the deliberations of a national seminar organized by CLAWS in Feb 2015 titled Big Data–Applicability in the Defense Forces. The outcome of the seminar resulted in highlighting the requirement of big data analytics in the fields of intelligence, operations, logistics, mobilization, medical, human resources, cyber security and counter insurgency/ counter terrorism for the Indian armed forces. It was highlighted that in the arena of intelligence examples of inputs likely to be received and analyzed during peace are related to terrorism, proxy war, left wing extremism, conduct of training by opponents, deployment of forces, and sponsoring of non-state actors. The seminar brought out the need for development of algorithms to analyze millions of open-source documents generated and compare them with the gathered human intelligence. There is a requirement to acquire predictive capability to anticipate specific incidents and suggest measures by analyzing historical events.

However, fact remains that due to nascent nature of big data analytics its awareness is limited to a small number of involved agencies. The benefits of big data in operational scenario decision making while safe guarding accuracy and reliability have not yet been internalized. Big data projects even at pilot scales may not be available currently. In the present situation, decision makers are not clear about capability of big data, costs, benefits, applicability or the perils if any of not adopting big data.

Conclusion:

It is apparent that the era of Big Data is already here and its impact is being felt on all aspects of modern day life. The challenges at all stages of the analysis include scaling, heterogeneity, lack of structure, privacy, error handling, timeliness, origins, and visualization. Big data holds enormous potential to make the operations of armed forces more efficient across the entire spectrum of their activity. The research and development necessary for the analysis of big data is not restricted to a single discipline, and requires an interdisciplinary approach. Computer scientists need to tackle issues pertaining to inferences, statisticians have to deal with algorithms, scalability and near real time decision making. Involvement of mathematicians, visualizers, social scientists, psychologists, domain experts and most important of all the final users is paramount for optimal utilization of big data analytics. The involvement and active participation of national agencies, private sector, public sector, and armed forces would ensure full exploitation of the potential of big data for the country.


The need today is to start feasibility studies and research programs in select fields in order of desired priorities, followed by pilot studies and thereafter adapting COTS hardware and available big data analytic software suites. 

“Without big data, you are blind and deaf and in the middle of a freeway.” 
- Geoffrey Moore, author and consultant. 

About The Author:

The author RADM Dr. S. Kulshrestha (Retd.), INDIAN NAVY, holds expertise in quality assurance of naval armament and ammunition. He is an alumnus of the National Defence College and a PhD from Jawaharlal Nehru University. He superannuated from the post of Director General Naval Armament Inspection in 2011. He is unaffiliated and writes in defence journals on issues related to Armament technology and indigenisation.

Cite This Article:

Kulshrestha, Sanatan. "FEATURED | Big Data in Military Information & Intelligence" IndraStra Global 02, no. 01 (2016): 0067. 
http://www.indrastra.com/2016/01/FEATURED-Big-Data-in-Military-Info-and-Intel-002-01-2016-0067.html  | ISSN 2381-3652 | https://dx.doi.org/10.6084/m9.figshare.2066640
AIDN0020120160067
Name

-51,1,3D Technology,2,5G,10,Abkhazia,2,Abortion Laws,1,Academics,11,Accidents,22,Activism,1,Adani Group,6,ADB,13,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,35,Aerospace,5,Afghanistan,88,Africa,113,Agile Methodology,2,Agriculture,20,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,7,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,5,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,3,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,3,Arctic,6,Argentina,7,Armenia,30,Army,3,Art,3,Artificial Intelligence,83,Artillery,2,Arunachal Pradesh,2,ASEAN,12,Asia,71,Asia Pacific,23,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,8,Australia,57,Austria,1,Automation,13,Automotive,131,Autonomous Flight,2,Autonomous Vehicle,3,Aviation,63,AWACS,2,Awards,17,Azerbaijan,16,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,28,Banking,53,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,19,BIMSTEC,1,Biography,1,Biotechnology,4,Birth,1,BISA,1,Bitcoin,9,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,32,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,6,Bomb,3,Bond Market,2,Book,11,Book Review,24,Border Conflicts,11,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,105,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,4,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1222,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,56,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,10,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,82,Central Asian,3,Central Eastern Europe,48,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Chemistry,1,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,585,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,5,Climate,67,Climate Change,26,Climate Finance,2,Clinical Research,3,Clinton,1,Cloud Computing,45,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,13,Cold War,5,Colombia,15,Commodities,4,Communication,11,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,1,Conflict,109,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,2,Construction,5,Consumer Behavior,4,Consumer Price Index,5,COP26,4,COP28,1,COP29,1,Copper,2,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,4,Credit,2,Credit Rating,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,17,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,8,Customer Exeperience,1,Customer Relationship Management,1,Cyber Attack,7,Cyber Crime,2,Cyber Security & Warfare,116,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,3,DACA,1,DARPA,3,Data,9,Data Analytics,36,Data Center,3,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,13,Decision Support System,5,Defense,12,Defense Deals,8,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,2,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,2,Digital Economy,11,Digital Marketing,7,Digital Transformation,11,Diplomacy,14,Diplomatic Row,4,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,48,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,4,Earth Science,1,Earthquake,8,East Africa,2,East China Sea,9,eBook,1,Ebrahim Raisi,1,ECB,1,eCommerce,11,Econometrics,2,Economic Justice,1,Economics,43,Economy,111,ECOWAS,2,Ecuador,4,Edge Computing,2,Editor's Opinion,55,Education,67,EFTA,1,Egypt,27,Election Disinformation,1,Elections,46,Electric Vehicle,15,Electricity,7,Electronics,9,Emerging Markets,1,Employment,19,Energy,316,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,47,ePayments,13,Epidemic,6,ESA,1,Ethiopia,3,Eulogy,4,Eurasia,3,Euro,6,Europe,15,European Union,234,EuroZone,5,Exchange-traded Funds,1,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1387,Federal Reserve,2,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,18,Financial Markets,60,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,14,Fiscal Policy,14,Fishery,3,Five Eyes,1,Floods,2,Food Security,27,Forces,1,Forecasting,3,Foreign Policy,13,Forex,4,France,34,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,23,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gaming,1,Garissa Attack,1,Gas Price,23,GATT,1,Gaza,13,GCC,11,GDP,14,GDPR,1,Gender Studies,3,Geneal Management,1,General Management,1,Generative AI,8,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,10,Georgia,12,Georgian,1,geospatial,9,Geothermal,2,Germany,71,Ghana,3,Gibratar,1,Gig economy,1,Glaciology,1,Global Perception,1,Global Trade,97,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,2,Google,20,Gorkhaland,1,Government,128,Government Analytics,1,Government Bond,1,GPS,1,Greater Asia,178,Greece,14,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,2,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,4,Haiti,2,Hamas,10,Hasan,1,Health,8,Healthcare,72,Heatwave,2,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,16,Houthi,12,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,7,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,5,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,76,Immigration,19,Impeachment,1,Imran Khan,1,Independent Media,72,India,670,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,28,Indian Ocean,24,Indices,1,Indigenous rights,1,Indo-Pacific,7,Indonesia,20,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,35,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,33,Investor Relations,1,IPEF,1,iPhone,1,IPO,4,Iran,207,Iraq,54,IRGC,1,Iron & Steel,4,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,145,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,92,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Justice System,3,Kanchin,1,Kashmir,8,Kaspersky,1,Kazakhstan,26,Kenya,5,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,83,Law,6,Leadership,3,Lebanon,10,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,1,Light Battle Tank,1,Linkedin,1,Lithuania,1,Littoral Warfare,2,Livelihood,3,Loans,9,Lockdown,1,Lone Wolf Attacks,2,Lugansk,2,Macedonia,1,Machine Learning,8,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,16,Marijuana,1,Marine Biology,1,Marine Engineering,3,Maritime,50,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,29,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,2,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medical,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,18,Meta,2,Metadata,2,Metals,3,Mexico,14,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,112,Military Exercise,11,Military Service,2,Military-Industrial Complex,3,Mining,16,Missile Launching Facilities,6,Missile Systems,57,Mobile Apps,3,Mobile Communications,12,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,1,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,3,NASA,13,National Identification Card,1,National Security,5,Nationalism,2,NATO,34,Natural Disasters,16,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Aviation,1,Naval Base,5,Naval Engineering,24,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,12,Netflix,1,Neurosciences,7,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1281,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Noble Prize,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,54,North Korea,59,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,5,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,1,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,384,Oil Gas,7,Oil Price,74,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,130,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,697,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,181,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,24,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,14,Philippines,19,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,53,Polynesia,3,Pope,1,Population,6,Portugal,1,Poverty,8,Power Transmission,6,Preprint,1,President APJ Abdul Kalam,2,Presidential Election,30,Press Release,158,Prison System,1,Privacy,18,Private Equity,2,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,13,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,8,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,4,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,7,Recall,4,Recession,2,Red Sea,5,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion & Spirituality,9,Renewable,18,Report,4,Reports,50,Repository,1,Republicans,3,Rescue Operation,2,Research,5,Research and Development,25,Restructuring,1,Retail,36,Revenue Management,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,318,Russian Navy,5,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,6,SAR,1,SAT,1,Satellite,14,Saudi Arabia,130,Scandinavia,6,Science & Technology,400,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,3,Securities,2,Security,6,Semiconductor,21,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,2,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,17,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Smartphones,1,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,16,Somalia,5,South Africa,20,South America,48,South Asia,478,South China Sea,36,South East Asia,77,South Korea,63,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,46,Space Station,2,Spain,9,Special Education,1,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,24,Stablecoin,1,Stamps,1,Startups,43,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,23,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,4,Submarine,16,Sudan,5,Sunni,6,Super computing,1,Supply Chain Management,48,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,34,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,4,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,77,Testing,2,Texas,3,Thailand,11,The Middle East,656,Think Tank,317,Tibet,3,TikTok,2,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,3,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,20,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,15,Tsar,1,Tunisia,7,Turkey,74,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,140,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,113,Ukraine War,26,Ummah,1,UNCLOS,7,Unemployment,2,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,84,United Nations,28,United States,767,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,22,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,19,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,25,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,17,Water Politics,7,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,Whales,1,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,1,Wikipedia,3,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,14,Workers Union,1,Workshop,1,World Bank,38,World Economy,33,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,28,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
ltr
item
IndraStra Global: FEATURED | Big Data in Military Information & Intelligence
FEATURED | Big Data in Military Information & Intelligence
National Security. Volume of data has expanded exponentially with the internet, especially in areas affecting national security like counter-terrorism, network security, and counter-proliferation. Rapid influx of unstructured data relating to national security issues as cyber defense requires both real time and off line analysis.
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit3NGobiG7G1CEpzBnrOyxjQTa1yTdhTD8_rd_3LfbU39drpUUaY7XgfK9W6CrzXKiw2CJm4B8PypgVkQqfM9EUSaVgdjZnvXKjqknb0IT-WNNuC22QPPCP6qFIcw-I8HVf7ml0toYN2CR/s640/shutterstock_319414127.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit3NGobiG7G1CEpzBnrOyxjQTa1yTdhTD8_rd_3LfbU39drpUUaY7XgfK9W6CrzXKiw2CJm4B8PypgVkQqfM9EUSaVgdjZnvXKjqknb0IT-WNNuC22QPPCP6qFIcw-I8HVf7ml0toYN2CR/s72-c/shutterstock_319414127.jpg
IndraStra Global
https://www.indrastra.com/2016/01/FEATURED-Big-Data-in-Military-Info-and-Intel-002-01-2016-0067.html
https://www.indrastra.com/
https://www.indrastra.com/
https://www.indrastra.com/2016/01/FEATURED-Big-Data-in-Military-Info-and-Intel-002-01-2016-0067.html
true
1461303524738926686
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content