Security Operations

The Field Information Support Tool (FIST) automatically synchronizes and fuses data from multiple sources, providing executable intelligence in real-time.

Security Operations

Security operations have an acute need for data synchronization, fusion, mining, indexing, and dissemination of data collected, as well as the need for secure, controlled sharing with international and interagency partners.

The Field Information Support Tool (FIST) system seamlessly fuses data from dispersed mobile devices, remote sensors, databases, data feeds, and many other data sources. The fused data is automatically synchronized, providing executable intelligence in real-time for enterprise-wide dissemination.

 

Law Enforcement

Data management has been a complex challenge for law enforcement agencies; simply storing information does not translate into real-time processing of all available data.

Criminal investigators and analysts need quicker and more accurate querying across multiple data sources. Kestrel Technology Group'Field Information Support Tool (FIST) provides immediate access to multi-source data across internal and external databases and feeds with a data management capability that supports collaborative efforts through controlled sharing of sensitive information.

Effective law enforcement requires combining information in a meaningful way to gain insight, establish links, and reach conclusions. FIST empowers investigative and intelligence activities through a wide array of analytic tools to visualize information geospatially and temporally as well as find links and associations across available data.

FIST

FIST data management supports and enhances mission preparedness and response. The system creates a rich repository of real-time and historical data that can be viewed, updated, monitored, analyzed, and assessed at any point during a mission. Situational awareness is increased through the system’s mining of all available data, which is then presented in a logical and concise manner. The available pre-populated data is automatically fused with real-time data and presented in a sharable geospatial view, promoting more comprehensive analysis and informed decision-making. FIST accelerates response at all levels by sharing information across the spectrum of operators, regardless of connectivity and location. The system is engineered to work with minimal bandwidth typical to many remote locations, in mobile cellular clouds in severely damaged environments, and with seamless migration to SATCOM and municipal infrastructure as it becomes available.

FIST allows geospatial tracking of all field users in real-time, viewable by command centers and other field assets. Field users can communicate their current situation status via the FIST mobile application. The system also accepts data from nontraditional sources, such as crowd-sourced data and social media. The real-time data fusion provides the ability to detect, monitor, and analyze passive and active threats and hazards while performing a remote risk assessment. Command’s ability to assess and identify hazards to mission execution is further enhanced by FIST’s sensor integration capability. The resulting unified, geographic visualization promotes the rapid allocation of interagency response resources to the area of greatest need.

FIST presents data from all these sources as dynamic network maps for high-level compare/contrast analysis. This capability utilizes algorithms that identify patterns, network and communication variations, and excursion from trend patterns over time and location. FIST gathers, aggregates, organizes, and fuses viable and validated data to provide stakeholders with an over-arching situational operating picture to fill information gaps.

Analysts can employ tools that visualize dark network structures, associated networks, weaknesses, and the peripheral network audience. Social network analysis allows analysts, policy makers, and strategists to quickly understand complex relationships that form networks and illuminate how relationships and networks are formed, how they evolve, and the actions needed to disrupt them.