Raven Eye: A Mobile Computing Solution for Site Exploitation

Main Article Content

Sergio R Jimenez
Ben Kline
Diana A Tsang
Steven J Henderson


Site exploitation (SE) remains a critical mission for operators on the battlefield.  Since SE is a fairly new operation in the military, soldiers face specific challenges that hinder them from conducting a successful SE operation.  This paper details the design of a system, Raven Eye, which endeavors to improve the efficiency and effectiveness of SE.  Raven Eye is an Android based system that collects, stores, and sends SE data.  Raven Eye allows operators to collect exploited site data by capturing photos, videos, and biometrics.  Operators can annotate and tag recorded items.  Lastly, the operators transform data stored and collected via Raven Eye to a standardized report that accelerates follow-on analysis by intelligence personnel.  

Article Details

How to Cite
Jimenez, S. R., Kline, B., Tsang, D. A., & Henderson, S. J. (2015). Raven Eye: A Mobile Computing Solution for Site Exploitation. Industrial and Systems Engineering Review, 3(2), 117-123. https://doi.org/10.37266/ISER.2015v3i2.pp117-123


Dennard, L..Wickham, L., & Green, S. Weapons Technical Intelligence Handbook. Joint IED Defeat Organization.

Depue, R. L. (1986). An American Response to an Era of Violence, FBI Law Enforcement Bulletin. Quantico, VA: Federal Bureau of Investigation

Federal Bureau of Investigation (2012), Counterterrorism Analytical Lexicon. U.S. Department of Justice.

FM 3-90.15. (2010) Site Exploitation Operations. Headquarters, Department of the Army

Gillen, M., Loyall, J., Usbeck, K., Hanlon, K., Scally, A., Sterling, J., ... & Kohler, R. (2012). Beyond line-of-sight information dissemination for force protection. Raytheon BBN Technologies, Cambridge, MA.

James, Michael (2014). Scrum Methodology. Retrieved from www.scrummethodology.com.

Lofty, P. Major (2002). Managing Sensitive Site Exploitation – Notes from Operation Iraqi Freedom. Fort Hood, TX: U.S. Department of the Army

National Forensic Science Technology Center®. (2015). National Forensic Technology Center. Retrieved from http://www.nfstc.org/

Parnell, G. S., Driscoll, P. J., & Henderson, D. L. (Eds.). (2011). Decision making in systems engineering and management (Vol. 81). John Wiley & Sons

Rosen, J. L., & Walsh, J. W. (2011). The Nett Warrior system: a case study for the acquisition of soldier systems (No. NPS- AM-11-187). NAVAL POSTGRADUATE SCHOOL MONTEREY CA GRADUATE SCHOOL OF BUSINESS AND PUBLIC POLICY.

Stewart, K. (2013, March 6). Naval Postgraduate School Public Affairs. Naval Postgraduate School Enlisted SOF Student Creates Smartphone App. Retrieved from http://www.navy.mil/.

Stewart, K. (2013, July 17). Naval Postgraduate School Public Affairs. NPS Student’s Intel App Takes Center Stage in Global Interdiction Experiment. Retrieved from: http://www.nps.edu/About/News/ .

Task Force Team SOF-SE Report. (2007). SOF-SE Report. Special Forces Command, Department of the Army

Trello. www.trello.com. 2015.

United States Operation Command. (2015, March 11). Technical Exploitation Course. Retrieved from http://www.soc.mil.

Wiggins, Virginia (2008, February 28). DoD Biometrics Architecture Briefing to Industry. Retrieved from the Biometrics Task Force Technical Integration Division.