Data Fusion and Exploitation

Intelligence, Surveillance & Reconnaissance

Technologies have led to explosive growth in the potential applications for information management and exploitation in the intelligence, surveillance and reconnaissance space. We are a world leader in developing these applications.

We service the defence, other government departments (OGDs) and civil markets, both in the UK and overseas, working with our customers to provide:

  • Technical services and support that rely on proven, trusted and independent know-how. We allow our customers to make informed and cost-effective decisions in the ISR and Enterprise Architecture domains.
  • Services that deliver business transformation and the exploitation of unstructured data in Information & Intelligence. We allow our customers to make the maximum use of their data, information and knowledge to deliver the understanding that underpins effective decision making.

We draw upon a large number of customer focused experts who provide independent technical know-how and support to customers for the procurement of intelligence collection, intelligence processing and information management capabilities. These multi-disciplinary teams include ISR civil and military domain experts, technical experts and system analysts who are highly experienced in a range of requirements capture and architecture methods. These teams are supported by customer focused project managers who work closely with the customer as their programme evolves. We provide end-to-end programme support: from idea through systems design to final acceptance and long term support if needed. Our customers include the UK military, other government departments and overseas defence customers.

We offer solutions and services that deliver real improvements to our customers' existing and planned systems, enabling them to get the most out of their investments. This may be in fusing sensor data, delivering improved data handling efficiencies in supporting such aims as the insurance industry’s need to improve risk assessment analysis. Specifically we can provide:

  • Secure intelligence and information (I2) support services
  • Surveillance system integration and optimisation
  • Geospatial and environmental information services
  • Data and information management and processing
  • Cognitive systems engineering
  • Image and video analysis
  • Airborne SIGINT (ASX)
  • Land Electronic Warfare Systems (MEWS)
  • Bespoke Radar Systems (ALARM)

 

Intelligence

From often ground-breaking research and development and practical experience gained from our work conducted for MOD over the past 40 years, we have acquired highly specialised knowledge.

This expertise has enabled us to develop techniques to exploit information from disparate open and closed data sources and provide high quality intelligence to MOD and OGDs which enables improved decision making.

Our capabilities in information processing include extracting and analysing knowledge from continuous streams of data in real-time. We have developed systems for mining, collecting, processing and analysing information. We have undertaken research into tracking since the 1960s. To support Big Data, we’ve scaled up the ability of our middleware to support complex event processing, allowing continuous analysis of petabytes of data streams per day. Our analytics expertise includes machine learning, sentiment analysis, cognitive systems engineering, fusion of multi-media intelligence sources, image and video analysis and Bayesian inference.

 

Cyber & Data Science

Our Data Science research capability is centred on the four skill sets of data analysis, data acquisition, data mining and data structures.

In practical terms, this involves extracting and analysing knowledge from continuous streams of data in real-time, based on systems we have developed in the past for mining, collecting, processing and analysing non-real time information. We have undertaken research into tracking since the 1960s. To support Big Data Science, we’ve scaled up the ability of our middleware to support complex event processing, allowing continuous analysis of petabytes of data streams per day.

Our in-house analytics expertise extends to machine learning, sentiment analysis, cognitive systems engineering, fusion of multi-media intelligence sources, image and video analysis and Bayesian inference.

This gives us the ability to practically implement, and apply, statistical techniques and methods to a wide variety of unstructured and structured datasets.

The end result is that we enable organisations to make maximum use of their knowledge. For the most part, we operate in the UK Defence and Security sector because of our embedded domain knowledge. However, this work puts us in an enviable position to translate algorithmic techniques to new applications and domains. We interact with clients to understand their business questions that need answering and translate this need into technical solutions to answer the question.

Integrated with our Data Science team is our Cyber Protective Monitoring service, combining network security technology with a team of analysts to track external threats and network events in real time. Powerful system architecture data analytics and security events management enables us to identify potential attacks by detecting suspicious activity. In direct support of this service our Cyber Researchers and Data Scientists are constantly developing tools and techniques for detecting advanced cyber attack, using data analytics and correlation across multiple data types. These have been combined into a toolset for our analysts, a modular system to which new modules and analytics can be added, which uses a Hadoop Big Data engine to implement the analytics.