7. Data is collected from diverse nodes COLLECT FUSE ANALYZE DISSEMINATE Broad spectrum sensors collect multiple data feeds including raw data and tracks – manual and/or automated control Raw data and sensor tracks are fused to provide composite tracks with higher confidence Analyzed information is disseminated to multiple, remote users via a web accessible common operating picture Fused tracks are analyzed to determine anomalies and potential threats based on operational rules, exclusion zones, etc. RULES
8. Data is collected from a ‘Full Spectrum’ of diverse nodes Underwater sonar to track swimmers, divers, and small surface craft COMINT system with location of radios ELINT system with direct finding for radar signals Day/ Night camera Automatic Identification System for cooperative location and ID Surface search radar for tracking surface targets Electric Waves Radio Waves HF VHF/UHF SHF EHF Visible Light Infrared Ext. Far Mid. Near Ultraviolet Ext. Far Mid. Near
9. MDA Center of Excellence (ArgonST, Camden New Jersey) Node 2 Node 4 Node 1 Node 5 Node 3 MDA Decision Support Centre
10. The CATE TM System is composed of a set of integrated C4ISR software components (modules) that is currently in use for the express purpose of facilitating maritime domain awareness. These modules include: Universal Computer Assisted Threat Evaluation (U-CATE™) Computer Assisted Sense Making (CASM™) Computer Assisted Situational Awareness (CASA™) Computer Assisted Knowledge Management (CAKM™) The CATE TM System is designed as an extensible framework with user driven customization in mind. Reference Projects Indian Navy, Western Naval Command – CATE System NCNC Trials US Department of Defence – Joint Unified Maritime Protection System US Navy – Trident Warrior 2007 US Department of Justice – Project SeaHawk Republic of Singapore Navy – DSTA Tuas Australian Border Protection Command – Project AMIS Lockheed Martin – Project MIDAS Northrop Grumman – Project WebTAS General Dynamics – Project Cardinal Point CATE™ Technology Summary
11.
12.
13.
14.
15.
16. CATE™ Component Detail The U- CATE™ module is responsible for accessing and returning fully constructed entities (vessels, arrivals) based on their definition generated in the Data Integration Tool. The U- CATE™ module is also responsible for the running of the Threat Evaluation Rules Engine. The U- CATE™ GUI presents the entity in an organized intuitive manner with all data source data that contributed to the entity available for view.
17.
18. CATE™ Component Detail Included in the GUI are specialized views for the ownership hierarchy of a vessel and the history or names associated with a vessel. U- CATE™ also has a facility for constructing and testing ad-hoc searches based on any combination of defined attributes of an entity. The search criteria can be combined with logical operators like AND, OR, XOR, NAND. There are many functional operators like “within the last 2 years”, “most recent prior arrival”, that make these searches very useful.
19. CATE™ Component Detail The U- CATE™ module is also responsible for all processing involved in generating a threat evaluation for certain entities (vessel, arrival). The threat evaluation is produced by the U- CATE™ Rules Engine. All rules are developed through the U- CATE™ rule creation facility, based on the search facility. The threat evaluation is based on the collection of rules that the entity violates. This evaluation is organized by one or more threat views designed by the system administrator. Threat views can be customized to address the mission and responsibilities of a class of users. A threat view can be designed to incorporate all rules that are associated with an aspect of the total threat (i.e. safety, security, anomalies). Each threat view has its associated graduated threat levels that describe the severity of an entities threat view.
20.
21. Conclusion Low risk … leverages existing system architecture, software applications, and infrastructure like the data center Responsive to change … sensors can be moved and reconfigured as dictated by mission requirements without impacting system performance Supports incremental deployment … number and types of sensors can change over time minimizing expense at start up Allows for virtual access and control … web application allows multiple remote users to access the system eliminating the need for dedicated command and control center Contributes to data sharing … data can be viewed, analyzed and archived by multiple users via access to central repository at the Arctic data center Complements multiple missions … C4ISR missions, critical infrastructure protection, long term surveillance, enhanced situational awareness, threat identification, precision geo-location Supports local sensitivity … ‘Freedom of the Seas’ commercial activities for access to resources will lead to regional and local conflicts, timely dissemination of relevant ‘Arctic MDA Data’ benefits dispute resolution