Capabilities – Systems & Systems Development
CACI performs full lifecycle software and system development to meet our customers' KM needs. We produce everything from light mobile applications to large, complex systems, combining our own deep expertise with our partners' capabilities and best-of-breed tools. We use an efficient, standards-based approach that is tailored to each project's individual priorities and goals. Learn more about our systems:
Theater Exploitation Database
The Theater Exploitation Database (TED) is a web-based application for Windows that leverages an Oracle database for data storage. TED utilizes our core HighVIEW product for the underlying structure, with a custom GOTS front designed and built from direct user feedback from theater users. The application is currently accredited for deployment on Non-Classified Internet Protocol Router (NIPR) and Secret Internet Protocol Router (SIPR) networks across multiple agencies, and is in process for accreditation for Joint Worldwide Intelligence Communications Systems (JWICS).
TED provides the following core capabilities:
- Basic search: Search the entire electronic repository with minimal effort
- Advanced search: Perform narrowly targeted searches using a wide range of filters
- Section download: Select and download specific sections of retrieved documents or media
- Named entity extract and search: Use filters to search entity names, geographical coordinates, attributes, and status
- Geospatial search: Search against geographical coordinates in batch metadata
- Audio/video search: Search based on media metadata such as audio or video bitrate
- Phonetic index search (PI): Search based on content spoken in audio and video files
- Device type search: Search for documents and media that originated on portable electronic devices such as cell phones and handheld computers
- Key Frame Extraction & Search (KFE): Search for key frames in video Files
- Custom workflow: Allows for custom manual and automated workflows to be built using Microsoft workflow designer to mirror business processes and data flows
- Import: Allows for data from various data sources and types such as documents, media (audio/video), and scanned images to be imported for processing via automated 3rd tools for data extraction and search
- Export: Allows for all metadata from the system to be exported into XML files, and other files to be exported as needed and transmitted to other recipients such as CIDNE, DCGS, etc.
Deployable Harmony DOCEX Suite
The Deployable Harmony DOCEX Suite (DHDS) assists document exploitation teams and organizations in every phase of document exploitation. DHDS uses advanced technology to improve the ability to input, organize, screen, translate, and analyze captured information in virtually all formats and many languages. This information can then be uploaded via secure closed networks to national repositories such as HARMONY, DCGS, DCGS-A, and CIDNE.
DHDS is an Oracle-supported application providing document management functions and document exploitation workflows, supported by a combination of COTS/GOTS products. Document management is provided by associating documents to individual database records and organizing them according to a user-defined "Project" and "Batch" structure. The system provides for document input through a scanner interface and an electronic document import function, and automated exploitation through multi-language Optical Character Recognition (OCR), full-text indexing, and machine translation tools. DHDS captures structured meta-data, associates automated exploitation outputs and derived products to the document record, and allows simple and complex searches against all content and structured meta-data for long-term analysis. DHDS creates a collaborative environment both within the host domain and with external users. DHDS also provides a web front end (Theatre Exploitation Database) that allows collaboration via search, edit, and import of documents across the network, eliminating the need for a client-side installation.
DHDS is a PL 2 application residing on the NGIC JWICS domain as a server-client system, which includes an application/Db server, a file storage array, and a text processor. DHDS is also employed by the U.S. Army's Intelligence and Security Command (INSCOM) and at other organizations around the world.
The GlobalView system assists counterintelligence (CI) and law enforcement (LE) elements in Document and Media Exploitation (DOMEX), leveraging our core HighVIEW product. All data within GlobalView is accessible via secure networks or integrated with other applications or databases. GlobalView leverages advanced technologies to improve the ability to ingest, organize, screen, translate, and analyze information. GlobalView's distinction is the ability to manage CI/LE projects and cases using access control lists. GlobalView is a MAC 2 application accredited by the Defense Intelligence Agency (DIA) and currently on the DIA SIPR network.
GlobalView's core capabilities include:
- Worldwide access to intelligence
- Detection and transformation of electronic input in multiple formats/encodings
- Ingestion of paper, electronic documents, and multimedia
- Index and search of meta-data and full-document text content
- Configuration of mission-specific document screening and prioritization
- Incorporation of new and emerging technologies
- Scaling from a single PC up to hundreds of users with terabytes of data
- Analysis, collaboration, and reporting
- Document management (check-in/out, versioning, and audit, etc.)
- Remote web access for translators, analysts, and others
- Uploading and transfer to other suites
- Access control lists for data
- Optical Character Recognition (OCR) and Machine Translation (MT) via auto translation and triage
- OCR (multiple engines): 190+ languages
- MT (multiple engines): 60+ languages
CACI's custom applications range from simple web services, to transport data between applications, to applications that crawl the web based on specific criteria and later populate a database for further analysis.
Operational Assessment and Intelligence System
Built on CACI's HighVIEW , our robust commercial off-the-shelf (COTS) content management system targeted to the unique requirements of the intelligence and DoD communi-ties, OAsIS combines non-invasive data collection, extraction, reduction, and analysis with a flexible workflow capability. Data sources are automatically identified, retrieved, extracted, and managed. The resulting information is then ingested into the HighVIEW repository, enabling powerful search and query functionality.
In defense environments, time constraints, lack of communication, and a wide variety of other circumstances require intelligence analysts to assimilate, refine, and exploit large volumes of data. CACI's OAsIS provides the capability to develop parsing rules based on pattern matching, extract selected data elements from semi-structured documents, and apply visualization tools to produce multiple views of extracted data.
Using OAsIS, analysts with intelligence, operations, or programmatic responsibilities can control and optimize all possible information resources. The advantages of OAsIS include:
- Non-intrusive collection of live, distributed data sources in near-real time
- Capture of information from documents that were not created to support automated processing
- Data extraction can use regular expressions to exploit patterns in data
- Interpret graphics (e.g. PowerPoint slides)
- Correlation of same events, not sharing common identifiers, occurring in different documents
- Design data model to relate all documents
- Adaptable and configurable collection easily handles changing locations of files on multiple portals and varying document content and formats
- Automated collection can be scheduled to address bandwidth constraints
- Allows analysts to tie the day-to-day operations to the long-term intellectual process – i.e. correlate tasking, collection, processing, exploitation, and dissemination data with the High Value Individual targeting cycle
CACI has end-to-end experience when it comes to third-party tools. Our R&D staff works with universities and commercial and government agencies to identify which tools or combinations of tools are essential to supporting our customers, often based on user requests or the needs identified in supporting the mission. We have produced various whitepapers and have spoken at several conferences about these findings. Our experience includes but is not limited to the following areas: Optical Character Recognition (OCR), Machine Translation (MT), handwriting analysis tools, Phonetic Indexing (PI) tools, Named Entity Extraction (NEE), geospatial mapping, multimedia conversion, Video Key Frame Extraction (KFE), text extraction, and facial recognition.
The vendors we have integrated include:
- NEE – BASIS,ThingFinder
- OCR – Abbyy, Sakhr, Novo, Scansoft
- MT – Apptek, Cybertrans, Gister, Language Weaver
- PI – Nexidia
- MMC – Various open-source tools
- Text Extract – Stellant, Tika, Open Office, PDF Box
- Geospatial – Google Maps
- KFE – White Oak Technologies
CACI relies on the Capability Maturity Model Integration (CMMI®) to address management, development, and services risk by improving performance and our ability to meet business objectives and deliver excellent support to our customers. Superior performance is accomplished, at least in part, by continuously improving our processes. We use the CMMI, a highly regarded global model, as a tool to improve our processes in the areas of project management, process management, infrastructure, engineering, project and program support, and professional services. Given our group's software engineering and professional services focus, CMMI helps to continually improve upon our processes, resulting in improved professional expertise in our capabilities.
The Software Engineering Institute (SEI) at Carnegie Mellon University has been the steward of the CMMI since its inception. In addition to the model itself, the CMMI framework includes training and appraisal support. CACI's National Solutions Group (NSG) benefits from SEI-certified instructors and a lead appraiser on staff at CACI, in addition to a talented cadre of process improvement professionals. Formal appraisals allow us to gauge our CMMI implementation against the Model and compare our expertise to other organizations across the globe.
In the overall IT product lifecycle, 70 to 80 percent of the overall time and cost occurs in the operations phase, and the rest is spent on product development or procurement. Therefore, effective and efficient IT service management processes are essential to CACI's success. The Information Technology Infrastructure Library (ITIL) enables CACI to provide reliable, consistent, high-quality, and cost-effective services.
ITIL was born out of the observation that organizations have become more and more dependent on IT to fulfill their corporate objectives. The result is a growing need for quality IT services that correspond to business objectives and meet the customer's requirements and expectations. Over time, the emphasis has shifted from the development of IT applications to IT service management. An IT application is only successful if the system is available to users and, in the event of an incident or necessary changes, is supported by maintenance and operational management.
CACI's IT Service Management capabilities address the provision and support of IT services tailored to the customers' needs. ITIL was developed to provide proven IT service management best practices in a systematic and cohesive manner. CACI has taken this approach based on service quality by developing effective and efficient processes according to ITIL best practices.
Benefits of ITIL to CACI customers:
- IT services become more focused on the customer and the relationship between CACI and its customers is improved through agreements about the quality of service
- Service quality, availability, reliability, and cost are better managed
Benefits of ITIL to CACI:
- CACI has developed a clearer structure and has become more efficient and focused on corporate objectives
- CACI is more in control of infrastructure and services, and changes have become easier to manage
- Following the ITIL best practices has encouraged a cultural change towards providing service, and supports the introduction of quality management systems
- ITIL provides a coherent frame of reference for internal communication and communication with suppliers, and for the standardization and identification of procedures
CACI's Advanced Knowledge Solutions team has a long history of using the Rapid Application Development (RAD) methodology to quickly get solutions into the hands of soldiers. The ability to quickly evolve from prototype to production deployment is especially critical when customers are faced with time-sensitive requirements that exist within military operations. CACI has successful experience as the primary integrator of a number of foreign language processing technologies through the Deployable Harmony DOMEX Suite (DHDS) and GlobalView projects. Key to our success in RAD environments is our ability to assess, integrate, and evaluate emerging technologies and move those technologies out to the user community for an immediate assessment.
The Agile Development Methodology has many RAD characteristics because Agile methods get developed solutions in front of stakeholders quickly to obtain and incorporate feedback. CACI has successfully used Agile on projects of varying size and complexity. Sprint cycles range from one week three months. In all cases, ensuring active participation with the product owner (customer) has been critical. CACI's technical management and development personnel recognize the importance of effective communication, accountability, and transparency.