JIEDDO: The Joint Improvised Explosive Device Defeat Organization
• Providing a web-based analytical tool to support the DoD and Intel Community in their mission to defeat the IED threat.
• Web 2.0 Ruby on Rails application development
• Data Analytics
• Geo location mapping
• Service Oriented Enterprise Architecture
JIEDDO leads DoD actions to rapidly provide Counter Improvised Explosive Device capabilities in support of the Combatant Commanders and to enable the defeat of the IED as a weapon of strategic influence. In characterizing and prioritizing the RCIED threat, JIEDDO has integrated input from NSA, CIA, NGIC, I2WD, JHUAPL, and JIEDDO test ranges in direct meetings, email communications, and quarterly Threat Working Groups. However, the codification of an accurate threat list for OIF and OEF, with buy-in from the various contributing parties, has often proved to be a laborious and largely manual task. The challenges posed by a lack of robust data collection on worldwide technology targets of interest, to include emitter mapping and signal surveys, must be filled by additional national and tactical ISR assets. However, it is nearly impossible to reliably identify collection gaps if the data that the community does have is not centralized in a readily accessible location. TechTracker brings the power of Web 2.0 to address these challenges, with software tools, and a supporting analytic framework, that present strategically valuable information in an intuitive manner to CREW planners and tactical operators alike.
Onyx applies proven, industry-best-practice methodologies to provide extensive analysis across the entire application life cycle for the JIEDDO TASS project. The JIEDDO mission is to predict new improvised explosive device (IED) threats before they emerge on battlefields around the world. As a result, Tech Tracker’s ability to merge and communicate data from multiple disparate systems in a consolidated way to the end-user community is the cornerstone of our development strategy. The scope of the project includes identification of current and future threats around the world involving communication protocols, software and hardware. This task involves substantial data analysis and management. Because Onyx’s TASS solution must keep up with changes in technology, Onyx professionals diligently execute at both the analysis and the design code level. This capability is absolutely essential to predicting new technology threats before they emerge.