Skip Navigation Links
Bending the Cost Curve: PlugFest PLUS
Hanscom milCloud
PlugFest Plus Interviews
Vendor Participation Information
Organizations Attending
Agile In Government
ODG Workshop: Operational Efficiency
CYBERWEST: the Southwest Cybersecurity Summit
Battlespace Awareness
Agile and EVM in DoD
DI2E Plugfest 2015
Cyber Innovation Challenge
AFEI Supported Events
Past Events

 ISR Use Case 


Use Case for Rapid Evolutionary Open ISR System Acquisition

The BTCC PFP will demonstrate Commercial Off the Shelf (COTS) Information Technology best practices for open system evolution in ways that creatively comply with the laws and policies that govern government acquisition. 

The 20 January 2015 PFP event will align with a comprehensive Intelligence, Surveillance, and Reconnaissance (ISR) use case that pits a notional “Blue Force” coalition against a notional State Sponsored Terror Organization (SSTO.) The Blue Force ISR Strategy is to apply the concepts of Find, Fix, and Engage to interdict adversaries' workflow.

In the scenario, a USAF ISR unit is working within a US Joint and Middle Eastern Host Nation “Blue Force” task force.  Mission is to find, fix, and engage High Value Individuals (HVI), i.e. senior leaders of Non State Terror Organization (NSTO).   National sensors, sensor payloads-as-services aboard tactical UAVs, and ground sensors are in play.  Blue Force elements operate as nodes on various networks at differing security and privacy levels. USAF unit operates tactical UAV sensor payloads and performs Processing, Exploitation, and Dissemination (PED) tasks such as forensic analysis, predictive analysis, and cross sensor cueing. 

Geospatial tools are critical, as are biometric tools and data.  Task requires collecting information, and disseminating appropriately sanitized reports and alert messages, perhaps as tracks on User Defined Operating Pictures UDOP, across security and privacy domains, as well as across Intelligence, Command and Control (C2) and Combat System (CS) boundaries.