+ All Categories
Home > Technology > Yossi cohen preso

Yossi cohen preso

Date post: 15-Jul-2015
Category:
Upload: mit-forum-of-israel
View: 64 times
Download: 4 times
Share this document with a friend
Popular Tags:
13
© 2014 by Elbit Systems | Elbit Systems Proprietary Counter Terror Management System 1 Solution Overview
Transcript

© 2014 by Elbit Systems | Elbit Systems Proprietary

Counter Terror Management System

1

Solution Overview

The Solution Goal

The goal: Provide the complete solution for Management of National Security

Service (NSS) operational lifecycle

The goal: Provide the complete solution for Management of National Security

Service (NSS) operational lifecycle

1. Mission Planning1. Mission Planning1. Mission Planning

5. Mission

Debriefing

5. Mission

Debriefing

5. Mission

Debriefing

© 2014 by Elbit Systems | Elbit Systems Proprietary

Increased intelligent capabilities, operational efficiency, threats mitigation

and, finally, country security and stability.

Increased intelligent capabilities, operational efficiency, threats mitigation

and, finally, country security and stability.

2. Intelligence

Gathering

2. Intelligence

Gathering

2. Intelligence

Gathering

3. Intelligence

Analysis & Research

3. Intelligence

Analysis & Research

3. Intelligence

Analysis & Research

4. Mission Execution

and Control

4. Mission Execution

and Control

4. Mission Execution

and Control

2

WebPolice Intel CommintSigint Police SWATArmy

Concept of Operations (CONOPS)

© 2014 by Elbit Systems | Elbit Systems Proprietary

Command &

Control

Command &

Control

ExploitationExploitation

Processing Processing

Assessment Assessment

3

Web

Commint

Military Systems

Military Systems

Operational Units

Operational Units

Borders and Ports

Borders and Ports

Civil and police

Civil and police

Crisis and rescue

Crisis and rescue

Comm Analysis

Comm Analysis

Web

Web

Civil Information Sources

© 2014 by Elbit Systems | Elbit Systems Proprietary

Rescue

Operation

CenterPolice Intel Sigint

4

10/08/2011 12:35 – internet discussion is intercepted and processed –

discussing possible weapons smuggling occurring in the next 2 weeks

10/08/2011 12:55 – text is analyzed, compared with intelligence

databases and as a result a general alert is issued and distributed to all air and

sea ports

12/08/2011 22:25 – A Person related to the weapons smuggling group

has entered the country via local airport the person was identified as the group

leader via link analysis

12/08/2011 22:45 – The suspected person is visually identified and

compared to known suspects data base

12/08/2011 22:35 – The suspect is driving to an address down town and

constantly monitored and tracked using mobile and visual tracking

Operational Scenario

© 2014 by Elbit Systems | Elbit Systems Proprietary5

12/08/2011 22:45 – The forces seal the area and takes over the house –

the operation center coordinates the operation.

Operational Scenario

12/08/2011 22:40 – The suspected vehicle rich the destination12/08/2011 22:45 – The mission is completed - all the involved persons

arrested

© 2014 by Elbit Systems | Elbit Systems Proprietary6

Solution Scope

Regional

Operation Center

Intelligence Security

Agencies

Governmental

Agencies

National

Operation Center

Operation Centers

Counter-Terror

Field Units

Communication &

Logistics Vehicle

© 2014 by Elbit Systems | Elbit Systems Proprietary

Command Post

Deployed Kit

Airborne

Platform

CTU Group 2CTU Group 3 CTU Group 1 Observation Group

Logistics Vehicle

7

Stationary Operation Center

Stationary Command Operation Center provides a variety of data, voice and video services within the overall C4I

solution

Stationary Operation Center

© 2014 by Elbit Systems | Elbit Systems Proprietary

Data CenterCommunication

Center

8

Mobile Command Center

Storage Server

Tetra /HF Radios

Switch

Workstation

Database

Recording System

Advanced command Post which incorporates Communication, Software and Hardware systems in

support of the Command Operation Center operational workflow

ROIP

© 2014 by Elbit Systems | Elbit Systems Proprietary

Key Features:

� Command Post, including: Commanders and Staff Advanced workspaces.

� Integrated C4I Command Post Facilities, including: Workstations, Projector, Public Address system and various telecommunication and computerized hardware equipments.

� 10 Working Places equipped with state-of-the-art Multimedia equipment (Remote Radio, Telephony, etc).

� Self-Supported Energy & Climate control

� Self-Contained, and truck transportable.

Hardware

Components

Software

ComponentsCommunication

Components

Public-Address

IP TelephoneApplication

ROIP

9

Integrated Radio Communication

Integrated Radio Communications enables interconnectivity and interoperability of various types of

telecommunication networks media, including: Cellular , TETRA/P.25, Radio (HF, VHF, UHF) networks, Satellite, LAN,

WAN and Telephony

© 2014 by Elbit Systems | Elbit Systems Proprietary

HF

VHF

UHF

10

Mobile units

10:53

(+2:50)

125M

Recon 1:

Target is

located

© 2014 by Elbit Systems | Elbit Systems Proprietary

Integrated C2

11

Intelligence Capabilities

• Unified Data Modeling• Text Analytics • Entity Extraction • Search and Indexing Tools• Link Discovery

Data Exploitation & Processing

Intelligence Procurement & Acquisition

• PIR(Prioritized Information Request)Management

• Mission (e.g. Intelligence) Control• Sensor Management

© 2014 by Elbit Systems | Elbit Systems Proprietary

• Report Generation• Data & Video Archiving • Integrated GIS

• Link Analysis• Pattern Matching• Data Mining Tools• Application Modeling Tools• Integrated Business Intelligence (BI)

Unified Intelligence Analysis & Research

Management, Display and Production Tools

• Link Discovery

12

• Operation Management • Resources(e.g. Task teams, Command

Posts) Management • Joint Tasks Allocation

Mission Planning

• Common Operational Picture• Own Forces & Enemy Forces

Mission Control & Execution

Command and Control Capabilities

© 2014 by Elbit Systems | Elbit Systems Proprietary

• Own Forces & Enemy Forces• Event Management including online

monitoring• Video integration in the C2 application

• After action review• Record and Replay Tools• Reports Generation• Training & Simulation

Mission Debrief

13


Recommended