SlideShare ist ein Scribd-Unternehmen logo
1 von 120
Downloaden Sie, um offline zu lesen
Secure Communications
Centre for Defence Enterprise
Wing Commander Jim Pennycook
Rapid technological change
© Crown Copyright MOD 2011
The aim of CDE
© Crown Copyright MOD 2011
Prove the value of novel, high-risk,
high-potential-benefit research
© Crown Copyright MOD 2011
To enable development of cost-
effective military capability advantage
19 June 2013
Five key operating principles
underpin the CDE model
Engaging innovators
19 June 2013
Accessible opportunity
Sustaining incentives
Minimising participation costs
Compliance
Intellectual property
Two routes to funding
Online bid submission
Themed calls
Dstl is part of the
Ministry of Defence
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
CDE themed call programme
Countering insider threat attacks Call closes 27 Jun 2013
Secure communications Call closes 22 Aug 2013
Innovation in drug development
processes
Call launch 25 June 2013
Enhancing military medical training
and support for the medic
Call launch 16 July 2013
Novel solutions for emulating ship
signatures
Call launch 23 July 2013
Register and further details at www.science.mod.uk under ‘Events and Calls’
All call close at 17:00 hrs
Defence Open Call
Seeking the exceptional
4438
proposals received
17%
proposals funded
£39M
contracts awarded
Exemplar project
Fuel efficiency
‘Micro generators’
© Crown Copyright MOD 2011
Effective proposals
Challenge, pace & exploitation
The future of CDE
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch
(Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda
Secure Communications
Network and question
Centre for Defence Enterprise
01235 438445
cde@dstl.gov.uk
www.science.mod.uk/enterprise
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch
(Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda
Secure Communications
Military Context
Squadron Leader Mike Leaman
UNCLASSIFIED© Crown copyright 2013 Dstl
19 June 2013
© Crown copyright 2013 Dstl
19 June 2013
Military
communications
Usable
Reliable
Deployable
© Crown copyright 2013 Dstl
19 June 2013
Future operating
environment
Congested
Cluttered
Contested
Connected
Constrained
© Crown copyright 2013 Dstl
19 June 2013
Short-notice
overseas
deployments
© Crown copyright 2013 Dstl
19 June 2013
Coalition
multi-agency
operations
© Crown copyright 2013 Dstl
19 June 2013
Military „platforms‟
Networking makes the whole
more effective
but
• capacity is limited
• effective integration is
essential
© Crown copyright 2013 Dstl
19 June 2013
The user
Capacity is limited
Risk-based
approach
© Crown copyright 2013 Dstl
19 June 2013
The User
Capacity is limited
© Crown copyright 2013 Dstl
19 June 2013
Military
communications
Usable
Reliable
Deployable
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch
(Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda
Information Superiority
Joint Forces Command
Dr David Massey MEng MIET
C4ISR Domain Lead
Programme and Delivery Directorate
The Joint Forces Command
Information Superiority account
© Crown copyright 2013 Dstl
19 June 2013
Information Superiority includes:-
– Command, Control, Information &
Intelligence
– Integrated Sensing
– Assured Information Infrastructure
– Decision Support for C4ISR (Command,
Control, Communications, Computing, Intelligence,
Surveillance and Reconnaissance)
– Cyber
– Defence Intelligence
Benefits delivered by the account
• Command & Control (C2) concepts
• Improve Information & Intelligence
• Provide knowledge and tools in
cyberspace
• Provide enhanced and affordable
sensor technologies
© Crown copyright 2013 Dstl
19 June 2013
Upcoming requirements
• Increased emphasis on information analysis
and intelligence production
• Continued emphasis on communications &
networks
• Reduced emphasis on sensors per se with
focus shifted to common sensor modalities
• Experimentation and Decision Support
remain key
• Cyber remains a priority© Crown copyright 2013 Dstl
19 June 2013
Challenges for the future
Support the provision of an
expeditionary command
and inform capability that
is sufficiently sustainable,
scalable and interoperable
© Crown copyright 2013 Dstl
19 June 2013
Challenges for the future
Appropriate combination of
sensors/platforms,
infrastructure and exploitation
capabilities to generate timely
situation awareness
– Eg common architectures
based on wideband multi-
function radio frequency (RF)
systems for manned and
unmanned combat air
systems.
© Crown copyright 2013 Dstl
19 June 2013
Challenges for the future
Cyber situational awareness, defence and
operations including effects delivered
through computers, networks,
electromagnetic (EM) spectrum and
human influence.
© Crown copyright 2013 Dstl
19 June 2013
Key elements of the account
• Supports Joint Forces Command (JFC) Information Superiority
science and technology needs. Incorporates:
– C4ISR (Command, Control, Communications, Computing,
Intelligence, Surveillance and Reconnaissance)
– Cyber
• Directly supports JFC Defence Authorities for C4ISR and Cyber,
Defence Intelligence & other government departments
• As a cross-cutting account, supports the needs of all Front Line
Commands
© Crown copyright 2013 Dstl
19 June 2013
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch
(Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda
Secure Communications CDE Themed
Call
Introduction
Helen Carlton
© Crown copyright 2013 Dstl
19 June 2013
Assured Information Infrastructure
• Objective
– provide science and technology support to MOD to enable the
realisation of a continuously evolving single, logical,
reconfigurable, resilient information infrastructure across UK
and deployed, fixed and mobile elements
UNCLASSIFIED© Crown copyright 2013 Dstl
19 June 2013
Assured Information Infrastructure
• The right information, to the right person, in the right
form, at the right time, to support the best decision to
initiate effective action
© Crown copyright 2013 Dstl
19 June 2013
Military vs commercial
© Crown copyright 2013 Dstl
19 June 2013
Time
TechnologyProgress
UNCLASSIFIED
The challenge
• How can MOD harness civilian advances
– reduced size, weight, power
– open standards
– increased bandwidth, data rate
• In areas such as
– personal communications
– personal computing
– non radio frequency (RF) communications
– automotive communications
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
The challenge
• Against military constraints
– security
– assurance
– integration
– interoperability
UNCLASSIFIED© Crown copyright 2013 Dstl
19 June 2013
What we want
• Innovative exploitation of commercial-off-the-shelf
(COTS) technology
• Novel approaches to securing information
infrastructures
• Technology that is inherently small, lightweight and low
power
• Proposals that show how improvements will be
measured and demonstrated
• Practical demonstrations set in a military context
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
What we don‟t want
• Solutions that offer no significant defence and security
benefit
• Technology watch / horizon scanning
• Paper-based studies, roadmaps or technology
prediction
• Impractical solutions or ones requiring internal
changes to COTS
• New encryption algorithms
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Exploitation
• Planned route for exploitation next financial year is via
research programme
• Ideally an exploitation route to military equipment
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
C4ISR Secure Information
Infrastructure Services (CSIIS)
• Framework through which aII research is conducted
• Flexible and fluid consortium led by a Prime
• Duration three years
• Research areas
– Communications and Networks
– Information Assurance
– Knowledge and Information Management
• Start date November 2013
UNCLASSIFIED© Crown copyright 2013 Dstl
19 June 2013
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch
(Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda
Image is public sector information licensed under the Open Government Licence v1.0
© Crown copyright 2013 Dstl
19 June 2013
Challenge 1
Securing Commercial-off-the-shelf
(COTS) Technology
Trevor Benjamin
Scope
• Networks and Information Infrastructure
– wireless, wired, optical
– networking components
– user terminal devices
– server systems and
cloud technology
UNCLASSIFIED© Crown copyright 2013 Dstl
19 June 2013
Image is public sector information licensed under the Open Government Licence v1.0
Issues
• Major problem – SECURITY
• Mismatch - civil and military security risks and requirements
• Issues
– implementation standards and quality
– strength of security functionality
– assurance levels
– accreditation
UNCLASSIFIED© Crown copyright 2013 Dstl
19 June 2013
Constraints
• Commercial off the shelf (COTS)
• Enhanced and strengthened security
• Unmodified COTS
• Capable of evaluation and accreditation
• Solutions might include:
– separate and novel security devices
– add-on security enhancements
– wrap-around security barriers
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Example 1 – Bring your own device
• Benefits of BYOD for MOD
• Work with MOD infrastructure
• Strategic, deployed
and coalition systems
• BYOD that:
– hinder malicious attack
– protect information from compromise
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Image is public sector information licensed under the Open Government Licence v1.0
Example 2 – Novel cryptography
• Greater MOD use of civil & plain-text communications
• Cryptography close to edge
• Seeking cryptography solutions
– at user device
– embedded in applications
• Device and system issues
– key management
– identity management
– how to do cyber defence
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Do not propose new encryption algorithms
solutions should use standards-based or government-defined algorithms
Example 3 – Mobile wireless systems
• Wireless is a key enabler for military operations
– currently bespoke radio devices
• COTS could provide:
– ease of use
– smaller size, weight and power
– cheaper solutions
– training savings
– simpler logistics
• Need to enhance security, robustness, ruggedness
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Image is public sector information licensed under the Open Government Licence v1.0
Example 4 – Host-based protection
• Paradigm shift
– move security away from supporting infrastructure
– host based and information based security
• Infrastructure more generic
• Users more responsible for security
• Need novel concepts:
– to enable this change based on COTS
– in security functionality and placement
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Image is public sector information licensed under the Open Government Licence v1.0
Human factors
• The biggest security threat is people!
– work-around security functionality
– undermine original purpose
• Consider the people issues
• Need novel approaches to
– human factors of security solutions
– people, culture and information security
– improved socio-technical systems
– human-computer interactions for system security components
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Image is public sector information licensed under the Open Government Licence v1.0
Summary
• Securing COTS
– in MOD communications and information infrastructures
– match protection mechanisms to military risks
• Novel approaches to military security
– using COTS without internal modification
– capable of high assurance and being part of accredited systems
• Examples might include:
– “Bring your own device” security
– edge cryptographic protection
– secure mobile wireless systems
– host and information based protection
• Consider human factors
– relationship between people and information security
– improved socio-technical security systems
– better human-security interfacing
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch
(Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda
Challenge 2
Mission-Configurable Systems
Simon Baker
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED© Crown copyright 2013 Dstl
19 June 2013
Introduction
• Military C4ISR (Command, Control,
Communications, Computing, Intelligence,
Surveillance and Reconnaissance) systems
– tend to be stove-piped
– making changes is complicated, time consuming
and expensive
© Crown copyright 2013 Dstl
19 June 2013
Revised needs
Courtesy of ISAF Media
UNCLASSIFIED© Crown copyright 2013 Dstl
19 June 2013
• Rapidly support changing operational
requirements
• Work effectively within the Combined, Joint,
Intergovernmental, Inter-agency, Multi-national
(CJIIM) context
• Front Line Commands have some flexibility to
establish their “fight tonight” initial capabilities
UNCLASSIFIED© Crown copyright 2013 Dstl
19 June 2013
The challenge
• Innovative solutions to help MOD address the adoption
of a flexible and open systems approach across the
C4ISR Domain
• Demonstrate potential impact of different approaches to
the delivery of mission-configurable C4ISR capability,
including the applications and information services
Example 1 – Cloud computing
• Cloud computing, open information services,
virtualisation
• Demonstrate how new systems could manage
– the loss of information services/communications bearers
• provision of a useful level of local services to the affected
users
– reconfiguration of services for new tasks and network
changes
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Example 2 – Access management
• Management and monitoring of access to information
services at different levels of trust
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Example 3 – Operating pictures
• Users want to define their operating pictures, but
mission-critical information must not be masked or
omitted
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
UNCLASSIFIED© Crown copyright 2013 Dstl
19 June 2013
Information sharing
• Information needs to be shared across
organisational boundaries
• Need to share information services with
partners at different levels of trust
UNCLASSIFIED© Crown copyright 2013 Dstl
19 June 2013
Summary
• adaptable solutions
• management of applications and services
• federate with other MOD systems and with external
organisations' systems
• achieve improved resilience, security and
interoperability
• exhibit graceful degradation
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch
(Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
Centre for Defence Enterprise
Submitting a Successful Proposal
Jono Byrne
Centre for Defence Enterprise (CDE)
Maximising your chances
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
Know what is available
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
Know what is available
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
Know what is available
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
Read available
information
Start with –
Quick Start Guide
plus other CDE manuals –
Account Manual, User
Manual, Technology
Application Manual
Know what is available
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
Know what is available
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
Developing a CDE proposal
Dstl is part of the
Ministry of Defence
Value from technology
Innovative
concept
Future
capability
Proof of
concept Incremental development
The essentials
Description
mins
Assessment
Not an exam
MOD Performance Assessment Framework
Five criteria:
Operational relevance
Likelihood of exploitation
Builds critical S&T capability to meet UK
needs
Scientific quality/innovation
Science, innovation and technology risk
Commercial tab
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
Government-furnished X
Health and safety
Ethics
Unclassified
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
Proposal health check
Claim of future benefit
Contribution to future benefit
Logical programme of work
Generation of evidence
Demonstration of progress
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
Based on a claim of future benefit
Contribution to realisation of future benefit
Logical programme of work
Evidential outcomes
Demonstration of progress towards goal
Health check
Early birds
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
This call closes:
Thursday 22 August 2013
At
17:00 hrs
Deadline
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
Centre for Defence Enterprise
cde@dstl.gov.uk
www.science.mod.uk/enterprise
Call process queries
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
dstlsecurecommscde@dstl.gov.uk
Call technical queries
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
www.science.mod.uk
Events and Calls > Current calls for proposals
> Secure communications
Webinar: 20 June 12:30-13:30
Register online
Further information
Network and question
15-minute slots
Encourage those who have not worked
with us before
Book at registration desk over lunch
Name, organisation, which challenge
Surgery sessions
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch
(Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda

Weitere ähnliche Inhalte

Andere mochten auch

Secure communications reality 2014-05-21
Secure communications reality  2014-05-21Secure communications reality  2014-05-21
Secure communications reality 2014-05-21mobilemark7
 
Secure communications over wireless broadcast networks
Secure communications over wireless broadcast networksSecure communications over wireless broadcast networks
Secure communications over wireless broadcast networkspraveen369
 
Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015Marco Pozzato
 
Secure Communications
Secure CommunicationsSecure Communications
Secure Communicationschriscavallo
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networkinganita maharjan
 
“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2Naveena N
 
Library mangement system project srs documentation.doc
Library mangement system project srs documentation.docLibrary mangement system project srs documentation.doc
Library mangement system project srs documentation.docjimmykhan
 

Andere mochten auch (9)

Secure communications reality 2014-05-21
Secure communications reality  2014-05-21Secure communications reality  2014-05-21
Secure communications reality 2014-05-21
 
Secure communications over wireless broadcast networks
Secure communications over wireless broadcast networksSecure communications over wireless broadcast networks
Secure communications over wireless broadcast networks
 
Secure communication over fiber optic networks
Secure communication over fiber optic networksSecure communication over fiber optic networks
Secure communication over fiber optic networks
 
Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015
 
Secure Communications
Secure CommunicationsSecure Communications
Secure Communications
 
Kamailio - Secure Communication
Kamailio - Secure CommunicationKamailio - Secure Communication
Kamailio - Secure Communication
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networking
 
“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2
 
Library mangement system project srs documentation.doc
Library mangement system project srs documentation.docLibrary mangement system project srs documentation.doc
Library mangement system project srs documentation.doc
 

Ähnlich wie Secure communications - CDE themed call launch 18 June 2013.

Precision Timing and Navigation - CDE themed call launch 23 April 2013
Precision Timing and Navigation - CDE themed call launch 23 April 2013Precision Timing and Navigation - CDE themed call launch 23 April 2013
Precision Timing and Navigation - CDE themed call launch 23 April 2013Defence and Security Accelerator
 
UK Spectrum Policy Forum – Dr Anil Shukla, QinetiQ - Introduction to the Defe...
UK Spectrum Policy Forum – Dr Anil Shukla, QinetiQ - Introduction to the Defe...UK Spectrum Policy Forum – Dr Anil Shukla, QinetiQ - Introduction to the Defe...
UK Spectrum Policy Forum – Dr Anil Shukla, QinetiQ - Introduction to the Defe...techUK
 
Countering insider threat attacks - CDE themed call launch 14 May 2013
Countering insider threat attacks - CDE themed call launch 14 May 2013Countering insider threat attacks - CDE themed call launch 14 May 2013
Countering insider threat attacks - CDE themed call launch 14 May 2013Defence and Security Accelerator
 
The Challenges of Countering Terrorist Networks - CDE themed call launch 19 M...
The Challenges of Countering Terrorist Networks - CDE themed call launch 19 M...The Challenges of Countering Terrorist Networks - CDE themed call launch 19 M...
The Challenges of Countering Terrorist Networks - CDE themed call launch 19 M...Defence and Security Accelerator
 
Smart and multifunctional micro- and nano-scale materials for defence and sec...
Smart and multifunctional micro- and nano-scale materials for defence and sec...Smart and multifunctional micro- and nano-scale materials for defence and sec...
Smart and multifunctional micro- and nano-scale materials for defence and sec...Defence and Security Accelerator
 
SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 Dale Butler
 
9 September 2014: automating cyber defence responses CDE themed competition
9 September 2014: automating cyber defence responses CDE themed competition9 September 2014: automating cyber defence responses CDE themed competition
9 September 2014: automating cyber defence responses CDE themed competitionDefence and Security Accelerator
 
ISCF Subsea Autonomous Systems: Next Generation Technologies - Competition Br...
ISCF Subsea Autonomous Systems: Next Generation Technologies - Competition Br...ISCF Subsea Autonomous Systems: Next Generation Technologies - Competition Br...
ISCF Subsea Autonomous Systems: Next Generation Technologies - Competition Br...KTN
 
Strengthening the Security of Maritime Operations - CDE themed call launch pr...
Strengthening the Security of Maritime Operations - CDE themed call launch pr...Strengthening the Security of Maritime Operations - CDE themed call launch pr...
Strengthening the Security of Maritime Operations - CDE themed call launch pr...Defence and Security Accelerator
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014Bessie Wang
 
Eye on Defence January 2014
Eye on Defence January 2014Eye on Defence January 2014
Eye on Defence January 2014Ankur Gupta
 
Business impact restrictions on cross border data
Business impact restrictions on cross border dataBusiness impact restrictions on cross border data
Business impact restrictions on cross border dataRene Summer
 
Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...
Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...
Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...Defence and Security Accelerator
 
Presentation to SA National Treasury on National Broadband Funding
Presentation to SA National Treasury on National Broadband FundingPresentation to SA National Treasury on National Broadband Funding
Presentation to SA National Treasury on National Broadband FundingBrian Pinnock
 

Ähnlich wie Secure communications - CDE themed call launch 18 June 2013. (20)

27 Nov 2013 CDE enduring challenge competition briefings
27 Nov 2013 CDE enduring challenge competition briefings27 Nov 2013 CDE enduring challenge competition briefings
27 Nov 2013 CDE enduring challenge competition briefings
 
Precision Timing and Navigation - CDE themed call launch 23 April 2013
Precision Timing and Navigation - CDE themed call launch 23 April 2013Precision Timing and Navigation - CDE themed call launch 23 April 2013
Precision Timing and Navigation - CDE themed call launch 23 April 2013
 
25 Feb 2014 CDE enduring challenge competition briefings
25 Feb 2014 CDE enduring challenge competition briefings 25 Feb 2014 CDE enduring challenge competition briefings
25 Feb 2014 CDE enduring challenge competition briefings
 
AM Briefing: Autonomy and big data for defence
AM Briefing: Autonomy and big data for defenceAM Briefing: Autonomy and big data for defence
AM Briefing: Autonomy and big data for defence
 
UK Spectrum Policy Forum – Dr Anil Shukla, QinetiQ - Introduction to the Defe...
UK Spectrum Policy Forum – Dr Anil Shukla, QinetiQ - Introduction to the Defe...UK Spectrum Policy Forum – Dr Anil Shukla, QinetiQ - Introduction to the Defe...
UK Spectrum Policy Forum – Dr Anil Shukla, QinetiQ - Introduction to the Defe...
 
Countering insider threat attacks - CDE themed call launch 14 May 2013
Countering insider threat attacks - CDE themed call launch 14 May 2013Countering insider threat attacks - CDE themed call launch 14 May 2013
Countering insider threat attacks - CDE themed call launch 14 May 2013
 
Mr John Taylor - The ICT Transformation Challenge for a Transformed MOD
Mr John Taylor - The ICT Transformation Challenge for a Transformed MODMr John Taylor - The ICT Transformation Challenge for a Transformed MOD
Mr John Taylor - The ICT Transformation Challenge for a Transformed MOD
 
The Challenges of Countering Terrorist Networks - CDE themed call launch 19 M...
The Challenges of Countering Terrorist Networks - CDE themed call launch 19 M...The Challenges of Countering Terrorist Networks - CDE themed call launch 19 M...
The Challenges of Countering Terrorist Networks - CDE themed call launch 19 M...
 
CDE Enduring challenge competition briefing
CDE Enduring challenge competition briefing CDE Enduring challenge competition briefing
CDE Enduring challenge competition briefing
 
Smart and multifunctional micro- and nano-scale materials for defence and sec...
Smart and multifunctional micro- and nano-scale materials for defence and sec...Smart and multifunctional micro- and nano-scale materials for defence and sec...
Smart and multifunctional micro- and nano-scale materials for defence and sec...
 
SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020
 
9 September 2014: automating cyber defence responses CDE themed competition
9 September 2014: automating cyber defence responses CDE themed competition9 September 2014: automating cyber defence responses CDE themed competition
9 September 2014: automating cyber defence responses CDE themed competition
 
ISCF Subsea Autonomous Systems: Next Generation Technologies - Competition Br...
ISCF Subsea Autonomous Systems: Next Generation Technologies - Competition Br...ISCF Subsea Autonomous Systems: Next Generation Technologies - Competition Br...
ISCF Subsea Autonomous Systems: Next Generation Technologies - Competition Br...
 
Strengthening the Security of Maritime Operations - CDE themed call launch pr...
Strengthening the Security of Maritime Operations - CDE themed call launch pr...Strengthening the Security of Maritime Operations - CDE themed call launch pr...
Strengthening the Security of Maritime Operations - CDE themed call launch pr...
 
9 July 2015: CDE enduring challenge competition
9 July 2015: CDE enduring challenge competition9 July 2015: CDE enduring challenge competition
9 July 2015: CDE enduring challenge competition
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
Eye on Defence January 2014
Eye on Defence January 2014Eye on Defence January 2014
Eye on Defence January 2014
 
Business impact restrictions on cross border data
Business impact restrictions on cross border dataBusiness impact restrictions on cross border data
Business impact restrictions on cross border data
 
Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...
Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...
Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...
 
Presentation to SA National Treasury on National Broadband Funding
Presentation to SA National Treasury on National Broadband FundingPresentation to SA National Treasury on National Broadband Funding
Presentation to SA National Treasury on National Broadband Funding
 

Mehr von Defence and Security Accelerator

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDefence and Security Accelerator
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDefence and Security Accelerator
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Defence and Security Accelerator
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017Defence and Security Accelerator
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposalDefence and Security Accelerator
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator Defence and Security Accelerator
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...Defence and Security Accelerator
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Defence and Security Accelerator
 

Mehr von Defence and Security Accelerator (20)

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade Presentation
 
DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office Presentation
 
DASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA PresentationDASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA Presentation
 
DASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England PresentationDASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England Presentation
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator
 
Improving crowd resilience themed competition slides
Improving crowd resilience themed competition slidesImproving crowd resilience themed competition slides
Improving crowd resilience themed competition slides
 
Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1
 
CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2
 
CDE themed comp - synbio part 1
CDE themed comp  - synbio part 1CDE themed comp  - synbio part 1
CDE themed comp - synbio part 1
 
Beyond battery power: future autonomy
Beyond battery power: future autonomy Beyond battery power: future autonomy
Beyond battery power: future autonomy
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...
 
Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2
 
Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1
 
Beyond battery power - how the competition will work
Beyond battery power - how the competition will workBeyond battery power - how the competition will work
Beyond battery power - how the competition will work
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
 
CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Secure communications - CDE themed call launch 18 June 2013.

  • 1.
  • 2. Secure Communications Centre for Defence Enterprise Wing Commander Jim Pennycook
  • 4. © Crown Copyright MOD 2011 The aim of CDE
  • 5. © Crown Copyright MOD 2011 Prove the value of novel, high-risk, high-potential-benefit research
  • 6. © Crown Copyright MOD 2011 To enable development of cost- effective military capability advantage
  • 7. 19 June 2013 Five key operating principles underpin the CDE model
  • 14. Two routes to funding
  • 17. Dstl is part of the Ministry of Defence Crown Copyright (c) 2012 Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE CDE themed call programme Countering insider threat attacks Call closes 27 Jun 2013 Secure communications Call closes 22 Aug 2013 Innovation in drug development processes Call launch 25 June 2013 Enhancing military medical training and support for the medic Call launch 16 July 2013 Novel solutions for emulating ship signatures Call launch 23 July 2013 Register and further details at www.science.mod.uk under ‘Events and Calls’ All call close at 17:00 hrs
  • 26. © Crown Copyright MOD 2011 Effective proposals
  • 27. Challenge, pace & exploitation
  • 29. Introduction to CDE 1030 Military context 1050 Programme overview 1105 Call overview 1110 Technical challenges 1120 Submitting a CDE proposal 1200 Q&A 1210 Networking lunch (Book surgery appointments) 1230 Surgery sessions 1400 Event close 1600 Agenda
  • 32. Centre for Defence Enterprise 01235 438445 cde@dstl.gov.uk www.science.mod.uk/enterprise
  • 33. Introduction to CDE 1030 Military context 1050 Programme overview 1105 Call overview 1110 Technical challenges 1120 Submitting a CDE proposal 1200 Q&A 1210 Networking lunch (Book surgery appointments) 1230 Surgery sessions 1400 Event close 1600 Agenda
  • 34. Secure Communications Military Context Squadron Leader Mike Leaman UNCLASSIFIED© Crown copyright 2013 Dstl 19 June 2013
  • 35. © Crown copyright 2013 Dstl 19 June 2013 Military communications Usable Reliable Deployable
  • 36. © Crown copyright 2013 Dstl 19 June 2013 Future operating environment Congested Cluttered Contested Connected Constrained
  • 37. © Crown copyright 2013 Dstl 19 June 2013 Short-notice overseas deployments
  • 38. © Crown copyright 2013 Dstl 19 June 2013 Coalition multi-agency operations
  • 39. © Crown copyright 2013 Dstl 19 June 2013 Military „platforms‟ Networking makes the whole more effective but • capacity is limited • effective integration is essential
  • 40. © Crown copyright 2013 Dstl 19 June 2013 The user Capacity is limited Risk-based approach
  • 41. © Crown copyright 2013 Dstl 19 June 2013 The User Capacity is limited
  • 42. © Crown copyright 2013 Dstl 19 June 2013 Military communications Usable Reliable Deployable
  • 43. Introduction to CDE 1030 Military context 1050 Programme overview 1105 Call overview 1110 Technical challenges 1120 Submitting a CDE proposal 1200 Q&A 1210 Networking lunch (Book surgery appointments) 1230 Surgery sessions 1400 Event close 1600 Agenda
  • 44. Information Superiority Joint Forces Command Dr David Massey MEng MIET C4ISR Domain Lead Programme and Delivery Directorate
  • 45. The Joint Forces Command Information Superiority account © Crown copyright 2013 Dstl 19 June 2013 Information Superiority includes:- – Command, Control, Information & Intelligence – Integrated Sensing – Assured Information Infrastructure – Decision Support for C4ISR (Command, Control, Communications, Computing, Intelligence, Surveillance and Reconnaissance) – Cyber – Defence Intelligence
  • 46. Benefits delivered by the account • Command & Control (C2) concepts • Improve Information & Intelligence • Provide knowledge and tools in cyberspace • Provide enhanced and affordable sensor technologies © Crown copyright 2013 Dstl 19 June 2013
  • 47. Upcoming requirements • Increased emphasis on information analysis and intelligence production • Continued emphasis on communications & networks • Reduced emphasis on sensors per se with focus shifted to common sensor modalities • Experimentation and Decision Support remain key • Cyber remains a priority© Crown copyright 2013 Dstl 19 June 2013
  • 48. Challenges for the future Support the provision of an expeditionary command and inform capability that is sufficiently sustainable, scalable and interoperable © Crown copyright 2013 Dstl 19 June 2013
  • 49. Challenges for the future Appropriate combination of sensors/platforms, infrastructure and exploitation capabilities to generate timely situation awareness – Eg common architectures based on wideband multi- function radio frequency (RF) systems for manned and unmanned combat air systems. © Crown copyright 2013 Dstl 19 June 2013
  • 50. Challenges for the future Cyber situational awareness, defence and operations including effects delivered through computers, networks, electromagnetic (EM) spectrum and human influence. © Crown copyright 2013 Dstl 19 June 2013
  • 51. Key elements of the account • Supports Joint Forces Command (JFC) Information Superiority science and technology needs. Incorporates: – C4ISR (Command, Control, Communications, Computing, Intelligence, Surveillance and Reconnaissance) – Cyber • Directly supports JFC Defence Authorities for C4ISR and Cyber, Defence Intelligence & other government departments • As a cross-cutting account, supports the needs of all Front Line Commands © Crown copyright 2013 Dstl 19 June 2013
  • 52. Introduction to CDE 1030 Military context 1050 Programme overview 1105 Call overview 1110 Technical challenges 1120 Submitting a CDE proposal 1200 Q&A 1210 Networking lunch (Book surgery appointments) 1230 Surgery sessions 1400 Event close 1600 Agenda
  • 53. Secure Communications CDE Themed Call Introduction Helen Carlton © Crown copyright 2013 Dstl 19 June 2013
  • 54. Assured Information Infrastructure • Objective – provide science and technology support to MOD to enable the realisation of a continuously evolving single, logical, reconfigurable, resilient information infrastructure across UK and deployed, fixed and mobile elements UNCLASSIFIED© Crown copyright 2013 Dstl 19 June 2013
  • 55. Assured Information Infrastructure • The right information, to the right person, in the right form, at the right time, to support the best decision to initiate effective action © Crown copyright 2013 Dstl 19 June 2013
  • 56. Military vs commercial © Crown copyright 2013 Dstl 19 June 2013 Time TechnologyProgress UNCLASSIFIED
  • 57. The challenge • How can MOD harness civilian advances – reduced size, weight, power – open standards – increased bandwidth, data rate • In areas such as – personal communications – personal computing – non radio frequency (RF) communications – automotive communications © Crown copyright 2013 Dstl 19 June 2013 UNCLASSIFIED
  • 58. The challenge • Against military constraints – security – assurance – integration – interoperability UNCLASSIFIED© Crown copyright 2013 Dstl 19 June 2013
  • 59. What we want • Innovative exploitation of commercial-off-the-shelf (COTS) technology • Novel approaches to securing information infrastructures • Technology that is inherently small, lightweight and low power • Proposals that show how improvements will be measured and demonstrated • Practical demonstrations set in a military context © Crown copyright 2013 Dstl 19 June 2013 UNCLASSIFIED
  • 60. What we don‟t want • Solutions that offer no significant defence and security benefit • Technology watch / horizon scanning • Paper-based studies, roadmaps or technology prediction • Impractical solutions or ones requiring internal changes to COTS • New encryption algorithms © Crown copyright 2013 Dstl 19 June 2013 UNCLASSIFIED
  • 61. Exploitation • Planned route for exploitation next financial year is via research programme • Ideally an exploitation route to military equipment © Crown copyright 2013 Dstl 19 June 2013 UNCLASSIFIED
  • 62. C4ISR Secure Information Infrastructure Services (CSIIS) • Framework through which aII research is conducted • Flexible and fluid consortium led by a Prime • Duration three years • Research areas – Communications and Networks – Information Assurance – Knowledge and Information Management • Start date November 2013 UNCLASSIFIED© Crown copyright 2013 Dstl 19 June 2013
  • 63. Introduction to CDE 1030 Military context 1050 Programme overview 1105 Call overview 1110 Technical challenges 1120 Submitting a CDE proposal 1200 Q&A 1210 Networking lunch (Book surgery appointments) 1230 Surgery sessions 1400 Event close 1600 Agenda
  • 64. Image is public sector information licensed under the Open Government Licence v1.0 © Crown copyright 2013 Dstl 19 June 2013 Challenge 1 Securing Commercial-off-the-shelf (COTS) Technology Trevor Benjamin
  • 65. Scope • Networks and Information Infrastructure – wireless, wired, optical – networking components – user terminal devices – server systems and cloud technology UNCLASSIFIED© Crown copyright 2013 Dstl 19 June 2013 Image is public sector information licensed under the Open Government Licence v1.0
  • 66. Issues • Major problem – SECURITY • Mismatch - civil and military security risks and requirements • Issues – implementation standards and quality – strength of security functionality – assurance levels – accreditation UNCLASSIFIED© Crown copyright 2013 Dstl 19 June 2013
  • 67. Constraints • Commercial off the shelf (COTS) • Enhanced and strengthened security • Unmodified COTS • Capable of evaluation and accreditation • Solutions might include: – separate and novel security devices – add-on security enhancements – wrap-around security barriers © Crown copyright 2013 Dstl 19 June 2013 UNCLASSIFIED
  • 68. Example 1 – Bring your own device • Benefits of BYOD for MOD • Work with MOD infrastructure • Strategic, deployed and coalition systems • BYOD that: – hinder malicious attack – protect information from compromise © Crown copyright 2013 Dstl 19 June 2013 UNCLASSIFIED Image is public sector information licensed under the Open Government Licence v1.0
  • 69. Example 2 – Novel cryptography • Greater MOD use of civil & plain-text communications • Cryptography close to edge • Seeking cryptography solutions – at user device – embedded in applications • Device and system issues – key management – identity management – how to do cyber defence © Crown copyright 2013 Dstl 19 June 2013 UNCLASSIFIED Do not propose new encryption algorithms solutions should use standards-based or government-defined algorithms
  • 70. Example 3 – Mobile wireless systems • Wireless is a key enabler for military operations – currently bespoke radio devices • COTS could provide: – ease of use – smaller size, weight and power – cheaper solutions – training savings – simpler logistics • Need to enhance security, robustness, ruggedness © Crown copyright 2013 Dstl 19 June 2013 UNCLASSIFIED Image is public sector information licensed under the Open Government Licence v1.0
  • 71. Example 4 – Host-based protection • Paradigm shift – move security away from supporting infrastructure – host based and information based security • Infrastructure more generic • Users more responsible for security • Need novel concepts: – to enable this change based on COTS – in security functionality and placement © Crown copyright 2013 Dstl 19 June 2013 UNCLASSIFIED Image is public sector information licensed under the Open Government Licence v1.0
  • 72. Human factors • The biggest security threat is people! – work-around security functionality – undermine original purpose • Consider the people issues • Need novel approaches to – human factors of security solutions – people, culture and information security – improved socio-technical systems – human-computer interactions for system security components © Crown copyright 2013 Dstl 19 June 2013 UNCLASSIFIED Image is public sector information licensed under the Open Government Licence v1.0
  • 73. Summary • Securing COTS – in MOD communications and information infrastructures – match protection mechanisms to military risks • Novel approaches to military security – using COTS without internal modification – capable of high assurance and being part of accredited systems • Examples might include: – “Bring your own device” security – edge cryptographic protection – secure mobile wireless systems – host and information based protection • Consider human factors – relationship between people and information security – improved socio-technical security systems – better human-security interfacing © Crown copyright 2013 Dstl 19 June 2013 UNCLASSIFIED
  • 74. Introduction to CDE 1030 Military context 1050 Programme overview 1105 Call overview 1110 Technical challenges 1120 Submitting a CDE proposal 1200 Q&A 1210 Networking lunch (Book surgery appointments) 1230 Surgery sessions 1400 Event close 1600 Agenda
  • 75. Challenge 2 Mission-Configurable Systems Simon Baker © Crown copyright 2013 Dstl 19 June 2013
  • 76. UNCLASSIFIED© Crown copyright 2013 Dstl 19 June 2013 Introduction • Military C4ISR (Command, Control, Communications, Computing, Intelligence, Surveillance and Reconnaissance) systems – tend to be stove-piped – making changes is complicated, time consuming and expensive
  • 77. © Crown copyright 2013 Dstl 19 June 2013 Revised needs Courtesy of ISAF Media
  • 78. UNCLASSIFIED© Crown copyright 2013 Dstl 19 June 2013 • Rapidly support changing operational requirements • Work effectively within the Combined, Joint, Intergovernmental, Inter-agency, Multi-national (CJIIM) context • Front Line Commands have some flexibility to establish their “fight tonight” initial capabilities
  • 79. UNCLASSIFIED© Crown copyright 2013 Dstl 19 June 2013 The challenge • Innovative solutions to help MOD address the adoption of a flexible and open systems approach across the C4ISR Domain • Demonstrate potential impact of different approaches to the delivery of mission-configurable C4ISR capability, including the applications and information services
  • 80. Example 1 – Cloud computing • Cloud computing, open information services, virtualisation • Demonstrate how new systems could manage – the loss of information services/communications bearers • provision of a useful level of local services to the affected users – reconfiguration of services for new tasks and network changes © Crown copyright 2013 Dstl 19 June 2013 UNCLASSIFIED
  • 81. Example 2 – Access management • Management and monitoring of access to information services at different levels of trust © Crown copyright 2013 Dstl 19 June 2013 UNCLASSIFIED
  • 82. Example 3 – Operating pictures • Users want to define their operating pictures, but mission-critical information must not be masked or omitted © Crown copyright 2013 Dstl 19 June 2013 UNCLASSIFIED
  • 83. UNCLASSIFIED© Crown copyright 2013 Dstl 19 June 2013 Information sharing • Information needs to be shared across organisational boundaries • Need to share information services with partners at different levels of trust
  • 84. UNCLASSIFIED© Crown copyright 2013 Dstl 19 June 2013 Summary • adaptable solutions • management of applications and services • federate with other MOD systems and with external organisations' systems • achieve improved resilience, security and interoperability • exhibit graceful degradation
  • 85. Introduction to CDE 1030 Military context 1050 Programme overview 1105 Call overview 1110 Technical challenges 1120 Submitting a CDE proposal 1200 Q&A 1210 Networking lunch (Book surgery appointments) 1230 Surgery sessions 1400 Event close 1600 Agenda
  • 86. Crown Copyright (c) 2012 Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Centre for Defence Enterprise Submitting a Successful Proposal Jono Byrne Centre for Defence Enterprise (CDE)
  • 88. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 Know what is available
  • 89.
  • 90. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 Know what is available
  • 91. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 Know what is available
  • 92. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 Read available information Start with – Quick Start Guide plus other CDE manuals – Account Manual, User Manual, Technology Application Manual Know what is available
  • 93. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 Know what is available
  • 94. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 Developing a CDE proposal
  • 95. Dstl is part of the Ministry of Defence Value from technology Innovative concept Future capability Proof of concept Incremental development
  • 100. MOD Performance Assessment Framework Five criteria: Operational relevance Likelihood of exploitation Builds critical S&T capability to meet UK needs Scientific quality/innovation Science, innovation and technology risk
  • 102. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 Government-furnished X
  • 104. Ethics
  • 106. Crown Copyright (c) 2012 Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Proposal health check
  • 107. Claim of future benefit
  • 112. Crown Copyright (c) 2012 Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Based on a claim of future benefit Contribution to realisation of future benefit Logical programme of work Evidential outcomes Demonstration of progress towards goal Health check
  • 114. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 This call closes: Thursday 22 August 2013 At 17:00 hrs Deadline
  • 115. Crown Copyright (c) 2012 Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Centre for Defence Enterprise cde@dstl.gov.uk www.science.mod.uk/enterprise Call process queries
  • 116. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 dstlsecurecommscde@dstl.gov.uk Call technical queries
  • 117. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 www.science.mod.uk Events and Calls > Current calls for proposals > Secure communications Webinar: 20 June 12:30-13:30 Register online Further information
  • 119. 15-minute slots Encourage those who have not worked with us before Book at registration desk over lunch Name, organisation, which challenge Surgery sessions
  • 120. Introduction to CDE 1030 Military context 1050 Programme overview 1105 Call overview 1110 Technical challenges 1120 Submitting a CDE proposal 1200 Q&A 1210 Networking lunch (Book surgery appointments) 1230 Surgery sessions 1400 Event close 1600 Agenda