Modernizing Intelligence Operations in Africa
Enhancing the Intelligence Process Through Data Science
By Colonel Chris Tomlinson; Chief Warrant Officer 3 Felix Rodriguez Faica; Chief Warrant Officer
2 Ryan Harvey, and Mr. Keith Hickman
Article published on: July 1, 2025 in the Military Intelligence January–June 2025 Semiannual
Collection
Read Time:< 16 mins
Introduction
The U.S. Army Intelligence and Security Enterprise and other members of the greater intelligence community
are not immune from the often-repeated paradigm of rapidly increasing data and emerging technologies
producing more information than can be accurately processed and understood. The Department of Defense Data
Strategy recognizes the need for a systemic approach to attain analytic maturity to gain information
superiority, highlighting the need for “data at speed and scale for operational advantage and increased
efficiency.”1 The Army Africa
Data Science Center’s (ADSC’s) application of data science methodologies and technologies has modernized the
U.S. Army Southern European Task Force, Africa (SETAF-AF) G-2’s ability to analyze and process vast amounts
of data. By taking a deliberate, proactive approach to integrating artificial intelligence (AI) and machine
learning (ML) and by incorporating data science and engineering (DS&E) to target this information explosion,
ADSC provides a problem-solving approach focused on capturing efficiencies in the intelligence process.
Using ADSC as a case study, this article illuminates the increasingly pivotal role DS&E plays in enhancing
the intelligence warfighting function throughout the U.S. Africa Command (USAFRICOM) area of responsibility
(AOR).
ADSC’s mission is to provide customized AI and ML capabilities that enable intelligence analysts to answer
SETAF-AF and USAFRICOM priority intelligence requirements (PIRs) more efficiently and effectively.2 This is especially vital in a
resource-constrained theater. ADSC accomplishes this in four ways:
- Focusing on improving data literacy across the force, which supports Army Data Plan 2022 and highlights
the urgent need for a data-literate workforce.
- Leveraging the geographic expertise of theater-embedded engineers.
- Co-locating DS&E teams directly with intelligence analysts.
- Building modern analytical products and automation on government-furnished cloud technology.3
Through a combination of analysis and vignettes, this article highlights what four years of experiential
learning have shown: that integrated DS&E teams can have a transformative impact on intelligence operations
in the African theater and, by extension, other theaters. These efforts enable intelligence analysts to
produce more comprehensive and timely intelligence products, ultimately increasing the commander’s decision
advantage.
A Foundation of Data Literacy
According to the U.S. Bureau of Labor Statistics, future demand for data-literate workers will increase in
every sector of the economy, led by increasing adoption of complex data solutions and infrastructure in
fields such as healthcare, finance, transportation, and utilities.4 These civilian sectors seek to exploit the
transformative potential of advanced analytic techniques to achieve better results, including improved
patient outcomes, fraud detection, and traffic and safety optimization, while maximizing security to address
growing cyber threats.5 Ensuring
a data-literate workforce is essential to achieving these benefits because these industries will continue to
evolve and become more overtly data-centric. Developing this skilled workforce requires an effort from the
whole organization. Senior leaders must understand and leverage organizational data capabilities and
requirements, analysts must ask more complex questions, and data teams must build solutions that support
this model.
These same considerations apply equally in a military context. With the exponential growth of information
accessible across all classification levels, military intelligence professionals find it increasingly
difficult to triage vast amounts of data to respond promptly to PIRs. Concepts such as pattern recognition,
anomaly detection, and predictive modeling are all viable approaches to solving these problems, and they all
require a data-literate organization.6 Nevertheless, there are many pitfalls along the path to organizational
analytical maturity. According to the Army Data Plan of 2022:
The Army is increasing data literacy across Soldiers and civilians. . . . However, to increase change at
scale, the Army needs to increase the basic data skills for generalists that benefit from greater
accessibility to quality data to improve daily decisions, that is, citizen analysts benefiting
from our data democracy.7
Data literacy can be acquired in several ways, all entailing individual intellectual curiosity and
perseverance. This can be encouraged across the Service through a combination of institutional, operational,
and self-development opportunities following the Army training domain framework.8 ADSC’s efforts to improve data literacy within
the SETAF-AF intelligence enterprise will fundamentally reshape how intelligence analysts think about the
ways data supports the intelligence process. This evolution will improve the quality of intelligence
products the intelligence warfighting function provides commanders and staffs to enhance situational
awareness and maximize decision space for military operations.
ADSC leads and develops in-person courses and regularly works with analysts and leaders on complex data
projects to rapidly improve unit, team, and individual data literacy. Incorporating the recommendations in
this article will enable units to field data-centric teams at the appropriate echelon to meet their force
data literacy goals.
Data Science and Engineering Structural Best Practices
Incorporating DS&E capabilities into an intelligence organization can increase the efficiency of processes
that identify threats, assess risks, and inform decisions in real time while parsing quantities of
information that would otherwise be insurmountable. However, achieving these lofty ambitions requires the
adoption of specific principles to maximize efficiency and effectiveness, including co-locating developers
with analysts and developing regional expertise. Experiential learning with ADSC has identified a
“hub-and-spoke” model as the preferred structure to achieve these goals.
Co-location is vital to effective collaboration. A major advantage of the ADSC structure
lies in the physical co-location of engineers with analysts. In the private sector, companies allocate
billions of dollars annually toward market research to build a deeper understanding of consumer preferences
and requirements, thereby maximizing their profit potential by accurately addressing their customers’ needs.
In software development, this often entails identifying a precise problem (i.e., the consumer requirement)
and providing an effective solution that saves time or resources and improves workflow efficiency.
Similarly, eliminating the divide between the intelligence analyst (i.e., the consumer) and the data
scientist improves the ability to identify, refine, and prioritize requirements while shortening the time
needed to develop and implement technical solutions. The Department of Defense and the intelligence
community are uniquely situated to position DS&E teams alongside users.
Augmenting the nuanced depth of knowledge provided by intelligence professionals with a niche technical
capability allows for quick prototyping of effective and efficient analytic solutions to meet a commander’s
evolving requirements while eliminating communication barriers. For this reason, DS&E teams need to be
managed and staffed at the most tactical echelon possible, with support from and reachback to higher
echelons.
Regional expertise generates effective analytic solutions. In addition to the efficiency
benefits realized by co-locating DS&E teams with analysts and leaders, regional expertise is critical for
effective data solutions. Every command faces a unique challenge presented by its distinctive geography and
mission focus that requires time to develop domain understanding and expertise. For instance, some
simplified examples of this complex problem include: USAFRICOM units often monitor instability ahead of
potential crisis support operations, U.S. European Command and U.S. Indo-Pacific Command units narrowly
focus on strategic competition, while U.S. Southern Command units tackle issues like human and drug
trafficking. The datasets needed to answer questions based on these discrete missions are often very
different, as are the applications built on those datasets. For instance, consider an analytical tool that
gives insight into how a commander’s PIRs are being answered. Nearly everything in this tool will be
different from one command to the next, including the PIR, workflow, information presentation, etc.
Additionally, intelligence enterprise datasets are tightly controlled, while operational domain information,
such as human resources or logistics, may have different rules and applications.
ADSC acts as an intelligence multiplier by applying data engineering and automation techniques to quickly
aggregate and identify valuable information,9 in a meaningful way for SETAF-AF G-2 personnel. This capability is
extremely valuable in a resource-limited and restricted collection environment.
Figure 1. Possible Data Science and Engineering Team structures (figure by author adapted
by MIPB staff)
Identified benefits support a hub-and-spoke model. Organizations scaling their data
capabilities need technical reachback. Technical support provided at higher echelons substantially reduces
the time spent on tasks common to all DS&E teams, including setting up infrastructure, finding development
resources, streamlining collaborative projects, and implementing project management practices. This
structure is often referred to as a hub-and-spoke model.10 One hub may serve several embedded teams or “spokes.” For instance,
a central hub at a joint combatant command might support DS&E teams embedded in several service component
commands. A hub might consist of a core group of data engineers and software developers, while a spoke
refers to a supported theater-embedded data team such as the ADSC. A hub’s primary concern is enabling
embedded data teams by providing technical infrastructure and reachback, whereas a spoke directly answers
RFIs from units. Compare this model with other configurations (see Figure 1). Centralized DS&E models might
hold all data resources in a single space removed from users and, therefore, suffer from a lack of regional
expertise. Further, the value proposition of a centralized DS&E team vanishes when considering the need to
train, familiarize, and integrate with new commands instead of having organic teams in place. A
decentralized model might be efficient but suffers from stovepiping and a lack of central support. ADSC has
informally implemented a hub-and-spoke model by building relationships with other command DS&Es, U.S. Army
Intelligence and Security Command, and various technical teams across the intelligence community.
The value of data science and engineering with applications and use case. Many companies
seek the transformative power of advanced analytic techniques to optimize profits, service levels, and
physical or digital products. Even cursory research finds myriad examples of DS&E applications and use cases
across every industry sector. Use cases refer to specific data science techniques such as pattern
recognition, anomaly detection, and predictive modeling.11 Example applications include anomaly detection to improve cancer
detection methods in healthcare, pattern recognition to detect fraud in finance, and traffic and safety
optimization systems for government entities.12 In addition to increasing efficiency and productivity, these
initiatives must also maximize security to address growing cyber threats while incorporating ethical
decision-making practices.13
These and many other applications and use cases apply equally across the intelligence warfighting function.
DS&E teams such as ADSC are experts in developing and deploying advanced applications.
Case Study One: Forecasting Violent Extremist Organization Activity in West Africa
One of the main concerns for the SETAF-AF G-2 analysis and control element (ACE) is providing indications and
warnings of threats to U.S. forces and equities in Africa. Among the most persistent of these threats are
violent extremist organizations (VEOs)—a significant issue across the USAFRICOM AOR, especially in West
Africa. Until 2023, the prevailing methodology for conducting indications and warnings assessments was a
manual, PowerPoint-based workflow, relying on analysts to interpret large clusters of dots on a map
subjectively over long time horizons (see Figure 2 on the next page). Moreover, the inability to achieve the
necessary granularity with the available data requires assessing areas prone to VEO presence or expansion at
the country or regional level.
Due to the lack of objectivity and granularity within this antiquated methodology, the utility of these
assessments was limited. For instance, the efficacy of security cooperation initiatives would noticeably
increase if the supporting analysis were to more narrowly identify areas of greatest need, down to specific
towns or checkpoints. Likewise, force protection measures can be tailored to a small area if clear trends
and reliable forecasts exist for threats in that area.
Approach. In February 2023, senior analysts in the SETAF-AF ACE decided to implement a
data-driven analysis of the VEO problem in West Africa. Relying on the unclassified armed conflict location
and event data dataset as a suitable proxy for VEO events, ADSC and ACE analysts quantified VEO-related
events to develop narrowly defined geographic forecasts by replicating scientific methods based on AI and ML
techniques. Applying the strategies discussed by Andre Python et al. in their 2021 Science Advances
article, ADSC developed a technique to forecast VEO weekly operational activity by location up to 16 weeks
in the future.14 The
underlying location layers are represented by 50-kilometer by 50-kilometer squares published by the Peace
Research Institute of Oslo, designed to capture demographic, environmental, and economic information about
the squares.15
Result. SETAF-AF ACE analysts and ADSC produced a graphical product that forecasts VEO
activity at a granular spatiotemporal level to an extent previously impossible with qualitative and
subjective methods (see Figure 3). In addition to providing planning and operational support, this product
is designed to support a commander’s decision-making process for short- and long-term force protection and
security cooperation activities. Notably, the product does not replace human-level judgment and only
bolsters the qualitative understanding of a given threat assessment.
Figure 2. Armed conflict location and event data representation of violent extremist
organization activity in West Africa (figure by author)
Lesson learned:
- Product integration is important. Data analytics or AI and ML products must be intentionally
integrated with existing processes and products, or they will have limited utility and reach. This is
vital for new products, such as forecasts.
- The analyst drives the process. While the technical product is undoubtedly central to the
effort, it can only reflect the analyst’s understanding, input, and articulated requirements. Therefore,
interaction between the DS&E team and the analyst must happen early and often, which is only possible
through co-location, integration, and shared understanding of workflows. If products are intended to
support multiple organizations or echelons, stakeholders from all parties should be involved early
during requirements generation to maximize applicability.
Case Study Two: Multiple Intelligence Discipline Crisis Support Dashboard
During a recent crisis response operation, SETAF-AF geospatial intelligence analysts monitored hundreds of
kilometers of road networks for potential evacuation disruption events, including checkpoints, mobility
limitations, and VEO threats.
Approach. After observing several existing workflows, ADSC data scientists embedded with the
SETAF-AF analysts identified potential automation projects. ADSC developed Python scripts that emulated
keyword and geospatial queries across several intelligence data sources and automatically displayed relevant
data in a dashboard. Analysts further requested that the tool provide customized email alerts for all
pertinent activity observations. ADSC programmatically overlaid the road networks with a grid system
filtering mechanism that displayed activity occurring within five kilometers of areas of interest and
provided significant time savings compared to manual monitoring.
Figure 3. 16-week forecasted violent extremist organization activity on a Peace Research
Institute of Oslo grid square (figure by author)
Results. This project ultimately achieved three results: cognitive burden shift, error
reduction, and information gain. The product shifts the cognitive burden of rote and repetitive data tasks
from analysts to computers. The ADSC can write programs that process very large datasets quickly in a
meaningful way for ACE analysts, thereby allowing them to focus on critical analysis. Automated scripts like
these have the built-in benefit of error reduction because machines process data precisely according to
their instructions. Finally, the information gained from seeing many disparate datasets displayed together,
such as merging data from multiple sensors or data from multiple intelligence disciplines, is invaluable,
though difficult to measure.
Challenges to Adoption
While ADSC continues to demonstrate its value as a force multiplier for the SETAF-AF intelligence enterprise,
several constraints have slowed the broader adoption of its technology-based approach and stymied some
projects that ADSC has spearheaded.
The greatest challenge comes in educating members of any organization, including analysts and leadership, on
the true capabilities that DS&E teams offer and how to use them most effectively. Without education to
overcome this challenge, requirements will be either too simple, thus wasting their unique skillset, or too
difficult to accomplish, resulting in hours wasted on projects that the team knew would likely never bear
fruit. Ultimately, this is not a question of revolutionizing processes. Instead, it is a matter of
developing systematic efficiencies that generate results within already adopted practices. Although there
has been some resistance to adopting this approach, ADSC offers cutting-edge solutions that can help
overcome generational data- and computer-literacy deficits. Within SETAF-AF, increased exposure to ADSC’s
capabilities across the staff, complemented by a thorough requirements management process, has already
started alleviating some of the problems posed by this challenge. Participation in capabilities briefs and
support to projects outside the G-2 are good starting points, though support and investment across the
command will ultimately be necessary.
Another challenge DS&E entities operating within a Department of Defense construct face is the difficulty of
integrating traditional data science tools and platforms into programs of record. These are often
specialized commercial off-the-shelf programs with outdated custom modifications and scripting, including
security parameters preventing linkages to many external repositories. While acknowledging the legitimate
security concerns that inform many of these roadblocks, a commitment to adaptability and modernization
through the iterative implementation of DS&E best practices is essential to ensuring the Army retains an
advantage over strategic competitors.
Finally, the limited period of analysts’ assignment creates an inherent inability to train large numbers of
Service members to execute data science tasks proficiently at the unit level. We must therefore rely on
contract mechanisms with high costs and uncertain long-term program funding. While this has been a challenge
to expanding the ADSC, some benefits will emerge as data scientists continue to deepen their understanding
of the problems unique to the USAFRICOM AOR and leverage their depth of knowledge and established
automations to present a degree of continuity.
Conclusion
In recent years, incorporating DS&E teams has fundamentally transformed Army intelligence. DS&E encompasses
diverse methodologies and technologies to extract valuable insights from vast and varied datasets. Data
science has revolutionized how we collect, analyze, and process information by harnessing techniques such as
ML, predictive analytics, and geospatial intelligence analysis.
Overall, DS&E teams play a vital role in enhancing intelligence analysis for U.S. Army Soldiers by leveraging
advanced analytics, predictive modeling, visualization tools, and automation. By integrating these
capabilities into intelligence operations, Soldiers can gain a deeper understanding of the operational
environment to produce timely intelligence products that better inform decision makers to achieve mission
success.
As the U.S. Army navigates the constantly evolving security landscape of the USAFRICOM AOR, it is imperative
to capitalize on the opportunities presented by integrating data science into our established intelligence
procedures to stay ahead of emerging threats and challenges. This approach enhances operational
effectiveness and increases the efficiency of intelligence procedures. Robust intelligence capabilities
remain vitally important in the dynamic and complex operating environment of the USAFRICOM AOR. From
countering terrorism and insurgency to addressing regional conflicts and strategic competitors, effective
intelligence is paramount for mission success in the USAFRICOM AOR.
Endnotes
1. Department of Defense, DoD Data Strategy,
October 8, 2020, 2,
https://media.defense.gov/2020/Oct/08/2002514180/-1/-1/0/DOD-DATA-STRATEGY.PDF.
2. Efficiency refers to how quickly a task can be
achieved. Effectiveness refers to impact—how much information was gained, how many people were affected,
etc.
3. Department of the Army, Office of the Chief
Information Officer, Army Data Plan, October 11, 2022,
https://www.army.mil/e2/downloads/rv7/about/2022_army_data_plan.pdf.
4. “Occupational Outlook Handbook–Data Scientists,” U.S.
Bureau of Labor Statistics, April 17, 2024, https://www.bls.gov/ooh/math/data-scientists.htm;
and Aleksandra Yosifova, “The Best Industries for Data Science Specialists in 2024,”Career Advice,
365 Data Science (blog), 11 April 2024, https://365datascience.com/career-advice/the-best-industries-for-data-science-specialists/.
5. Zaid Obermeyer and Ezekiel J. Emanual, “Predicting
the Future–Big Data, Machine Learning, and Clinical Medicine,” The New England Journal of
Medicine 375, no. 13 (September 29, 2016): 1216-1219, https://www.nejm.org/doi/full/10.1056/NEJMp1606181;
and Xinhu Zheng et al., “Big Data for Social Transportation,” IEEE Transactions on Intelligence
Transportation Systems 17, no. 3 (March 2016):620-630, https://doi.org/10.1109/TITS.2015.2480157.
6. Hsinchun Chen et al., “Crime Data Mining: A General
Framework and Some Examples,” Computer 37, no. 4 (April 2004):50-56, https://doi.org/10.1109/MC.2004.1297301.
7. Department of the Army, Office of the Chief
Information Officer, Army Data Plan, 3.
8. Department of the Army, Army Regulation 350-1,
Army Training and Leader Development (Washington, DC: U.S. Government Publishing Office, 1 June
2025), 5.
9. Automation can refer to everything from basic
scripting to machine learning applications.
10. Norman Krueger, Tim Gabriel, and Cezar Adam, “The
Hub-and-Spoke IT Operating Model: Increasing Innovation and Continuous Improvement,” ISG (Information
Services Group), n.d., https://isg-one.com/articles/the-hub-and-spoke-it-operating-model.
11. Chen et al., “Crime Data Mining.”
12. Obermeyer and Emanual, “Predicting the Future.”
13. Zheng et al., “Big Data for Social
Transportation.”
14. Andre Python et al., “Predicting Non-State
Terrorism Worldwide,” Science Advances 7, no. 31 (July 2021),
https://www.science.org/doi/10.1126/sciadv.abg4778.
15. The Peace Research Institute Oslo, https://www.prio.org/.
Authors
COL Chris Tomlinson is the Director of Intelligence, G-2, for the Southern European Task Force, Africa
(SETAF-AF) and is operational director of the Africa Data Science Center (ADSC) for SETAF-AF. His prior
intelligence assignments include Director of Intelligence, J-2, for the Special Operations Joint Task
Force–Operation Inherent Resolve, Deputy Director of Intelligence, J-2, and theater analysis and control
element chief U.S. Army Europe. He holds a master’s degree in strategic studies from the Marine Corps
War College and a bachelor of arts in political science at Texas Tech University.
CW3 Felix Rodriguez Faica is an intelligence planner and common intelligence picture/Army Intelligence
Data Platform lead integrator in the intelligence operations division of the SETAF-AF G-2. His previous
assignments were at various unit echelons including brigade combat team and military intelligence
brigade-theater. He received a bachelor of arts in intelligence studies from American Military
University and completed the Digital Intelligence Systems Master Gunner Course.
CW2 Ryan Harvey is an all-source intelligence technician serving as an intelligence planner and
performance manager for the ADSC in the intelligence operations division of the SETAF-AF G-2. His
previous assignments were at various unit echelons, including brigade combat team and military
intelligence brigade-theater. He holds a master’s degree in intelligence management from Henley-Putnam
University and a bachelor of arts in political science from the University of California, Santa Barbara.
Mr. Keith Hickman is a senior data scientist for the ADSC of the SETAFAF G-2. He previously served as an
Army intelligence officer at a brigade combat team. He holds a juris doctor from Pennsylvania State
University and a master’s degree in computer science from Indiana University.