Full-spectrum intelligence analysis for a wide range of military use cases
Deriving intelligence across multiple information feeds can be challenging. This is often compounded with the need to synchronise headquarter operations to those working on operations.
i2 delivers a scalable environment to collate information from SIGINT, HUMINT, OSINT, SOCINT, GEOINT, and sensor data with the capabilities to perform all-source multi-dimensional analysis and reporting. With a modular and interoperable approach, i2 provides the agility and self-service requirements to combat today’s complex and changing landscape.
Prevent, mitigate, and respond to terrorist threats
Defeating irregular forces such has guerrillas and revolutionaries
Respond to espionage and intelligence activities by foreign entities
Safeguarding military personnel, equipment, facilities, and operations
Proactive search and mitigation of potential cyberattacks and vulnerabilities
Conventional Order-of-Battle Analytics
Assessment of a military forces' capabilities in conventional operations
Military Law Enforcement
Enforcing military laws and regulations
Supply Chain Analysis
Assessment of the logistics and distribution network
i2 is a key component of military intelligence
i2 Analyst’s Notebook’s rich functionality has been successfully deployed in numerous military use cases. From detailed of pattern-of-life to precise temporal analysis it has enabled both the protection of allied forces and the identification of hostile actors.
More advanced solutions such as Analysis Hub and Analysis Studio have enhanced the stand-alone capability into a fully integrated solution with a shared data repository, connectors to numerous data streams, as well as tight integration with ESRI Arc-GIS, and other partner platforms, making i2 a powerhouse for data analysis.
And with i2 TextChart we are vastly reducing the analyst’s workload. It is pioneering the automation of extracting entities, links and properties from unstructured text from OSINT as well as traditional intelligence reports.
As the military shifts from mainly counter-insurgency and counter-terrorism to confront more conventional near-peer adversary threats, we have made the requisite changes to our use case model to enable customers to fuse data from disparate sources, locate and visualize enemy troop movements, and help predict outcomes. No longer merely a law-enforcement style tool for link analysis but an open-architecture, customizable solution for full-spectrum intelligence analysis.
Analysis Hub for National Security
Do you have large and overwhelming data sets to analyze? With its scalable, extensible design, Analysis Hub helps organizations overcome information overload and perform intelligence analysis and analytics — at scale and at speed.