“We’ve had a lot of success supporting national security missions through the integration of AI/ML and advanced data science techniques such as probabilistic and predictive modeling and automation of data pipelines,” says Saurin. Our work increases the pace of analytics to machine speed while streamlining analytic processes. He likens the experience to SIRI. “You still take notes, right? But making that to-do list is a lot easier.”
AI/ML enables collection and exploitation, drawing connections at lightning speed that advanced AI can analyze to predict outcomes and recommend action. Target activities can then be correlated to create fast decisions where every second counts.
Another major development area, data engineering and automating data pipelines, saves analysts time and resources. “Our work facilitates not only the ingestion, but also the conditioning and enrichment of that data for analytic value. That gives data scientists and analysts so much time back,” he says.
Escalating Multi-INT Advantages
As intelligence organizations modernize, we create more sophisticated cross-domain pipelines. “A lot of new sensors are coming out there. Fusing those new classified streams with commercially available and open-source data at scale requires new, layered levels of data engineering and analysis,” he says.
The data needs to be indexed, fused, and analyzed at appropriate security levels for multiple stakeholders, from the intelligence community to military, government, and international partners. Then those recommendations need to be distilled to send to leaders at their level of access, at the moment needed.
Such large-scale, diverse fusion requiresopen architecturesthat move operations to the cloud for bandwidth and scale. To work within allotted budgets, many intelligence clients need to approach thatlarge-scale modernizationin terms of iterative changes that build toward a larger vision.
Open-Source Solutions Simplify Modernization
We solve the clients’ dilemma with a modular open-architecture approach, which simplifies transformation while allowing clients to proceed according to their funding resources. “We’re agnostic to the solution, so we’ll choose the best technology for that organization,” he says.
Often the answer lies in tools and frameworks we’ve already created from commercial off-the-shelf or open-source software—tools that are already cleared through the accreditation process, have intelligence-level cybersecurity built in, and are proven in operation.
“The right technologies and solutions accelerate decision making while simultaneously providing capacity,” he says. “The beauty is that it all works together.”