SlideShare ist ein Scribd-Unternehmen logo
1 von 141
Downloaden Sie, um offline zu lesen
The Challenges of Countering
     Terrorist Networks




Centre for Defence Enterprise
            (CDE)
The aim of CDE




© Crown Copyright MOD 2011
Prove the value of novel, high-risk,
             high-potential-benefit research




© Crown Copyright MOD 2011
To enable development of cost-
                       effective capability advantage




© Crown Copyright MOD 2011
Engaging a broad audience




                       6
Providing opportunity
Two routes to funding
Themed calls
CDE themed call programme
Smart and multifunctional materials                      Call closes 12 April 2013
and structures                                                        (at 1700 hrs)
The challenges of countering                                Call closes 1 May 2013
terrorist networks                                                     (at 1700 hrs)
Precision timing                                        Call launch 23 April 2013
Secure communications                                    Call launch 18 June 2013
Innovation in drug development                           Call launch 25 June 2013
processes
Enhancing military medical training                       Call launch 16 July 2013
and support for the medic
Register and further details at www.science.mod.uk under ‘Events and Calls’
                             Centre for Defence Enterprise                Dstl is part of the
                    www.science.mod.uk/enterprise cde@dstl.gov.uk         Ministry of Defence
                      UNCLASSIFIED / FOR PUBLIC RELEASE                   Crown Copyright (c) 2012
Defence Open Call
Seeking the exceptional
Challenging conventions
Novel fibres for CBR protection
‘Micro generators’
Sustaining participation
Minimising participation cost
Online bid submission
Compliance
Intellectual property
The future of CDE
Making an impact
4283
proposals received
16%
proposals funded
£37M
contracts awarded
CDE advantages

Accessible
Rapid assessment
Easy contracting
Quick payments
Benevolent IP arrangements
Effective proposals




© Crown Copyright MOD 2011
Agenda
10:30   Introduction to CDE
10:45   Counter Terrorism Science & Technology Centre overview
10:55   Military context
11:25   Challenge 1 – understanding networks
11:40   Challenge 2 – identifying individuals
11:55   Q&A
12:05   Networking with lunch
13:00   Challenge 3 – translating information
13:15   Call summary
13:20   Ethics
13:25   CDE – submitting a successful proposal
13:35   Q&A
13:45   Networking with refreshments
15:15   Event close
Network and question
Centre for Defence Enterprise
  Advanced Design and
        01235 438445
      Manufacturing
    cde@dstl.gov.uk
 www.science.mod.uk/enterprise




Centre for Defence Enterprise
    Wing Commander Jim Pennycook
Agenda
10:30   Introduction to CDE
10:45   Counter Terrorism Science & Technology Centre overview
10:55   Military context
11:25   Challenge 1 – understanding networks
11:40   Challenge 2 – identifying individuals
11:55   Q&A
12:05   Networking lunch
13:00   Challenge 3 – translating information
13:15   Call summary
13:20   Ethics
13:25   CDE – submitting a successful proposal
13:35   Q&A
13:45   Networking
15:15   Event close
20 March 2013

© Crown copyright 2013 Dstl
                              UNCLASSIFIED
The Challenges of Countering Terrorist
                                   Networks




     20 March 2013

     © Crown copyright 2013 Dstl
                                   UNCLASSIFIED
Countering terrorist networks

Harnessing and developing science
 and technology (S&T) to increase
 defence and security capability to
  pursue and disrupt threats to UK




   20 March 2013

   © Crown copyright 2013 Dstl
                                 UNCLASSIFIED
Today’s CDE call S&T challenges

                                                Challenge 2:
                                                 Identifying
                                                 Individuals




                                 Challenge 3:
                                  Translating
                                 Information


                                                          Challenge 1:
                                                        Understanding the
                                                            Network




   20 March 2013

   © Crown copyright 2013 Dstl
                                            UNCLASSIFIED
Agenda
10:30   Introduction to CDE
10:45   Counter Terrorism Science & Technology Centre overview
10:55   Military context
11:25   Challenge 1 – understanding networks
11:40   Challenge 2 – identifying individuals
11:55   Q&A
12:05   Networking lunch
13:00   Challenge 3 – translating information
13:15   Call summary
13:20   Ethics
13:25   CDE – submitting a successful proposal
13:35   Q&A
13:45   Networking
15:15   Event close
The Challenges of Countering Terrorist
Networks

Military Context


     19 March 2013

     © Crown copyright 2013 Dstl
                                   UNCLASSIFIED
19 March 2013

© Crown copyright 2013 Dstl
                              UNCLASSIFIED
References




    19 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
References




    19 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
Terminology
ISR = Intelligence, Surveillance and Reconnaissance

ISTAR = Intelligence, Surveillance, Target Acquisition and Reconnaissance

C4ISR = Command Control , Computers, Communications and ISR

E2E3 = End to End Enterprise

MPE = Materiel and Personnel Exploitation

FABINT = Forensic and Biometric Intelligence

DOCEX/DOMEX = Document Exploitation/Document and Media Exploitation
SIGINT = Signals Intelligence

OSINT = Open Source Intelligence

WTI = Weapons Technical Intelligence



             19 March 2013

             © Crown copyright 2013 Dstl
                                           UNCLASSIFIED
Future Character of Conflict: 5Cs
                         Contested




 Connected                                Constrained




       Cluttered                     Congested




       19 March 2013

       © Crown copyright 2013 Dstl
                                      UNCLASSIFIED
The Future Battlespace
   Contested
      Competition for resources. All geographies of operation are contested
      Sea, land, air & space, cyberspace and information
   Congested
      To influence people we have to operate in, over and close to where they
       live. People live in urban areas in the littoral
      There is no empty battlefield
   Cluttered
      Network Enabled Capability will not fully lift the fog of war
      We need to understand and to discriminate
   Connected
      Networks - source of strength for friend and foe
      Nodes are also a source of weakness
   Constrained
      Legal and social norms - essential to our legitimacy -
        will limit us but not our adversaries



                                                                      More
                                   UNCLASSIFIED
                                                                   Constrained
Future Character of Conflict
                         Contested

                                                        COMPLEX

 Connected                                Constrained   CONTINGENCY
                                                        COALITION
                                                        URBAN
       Cluttered                     Congested




       19 March 2013

       © Crown copyright 2013 Dstl
                                      UNCLASSIFIED
Understanding




    19 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
Understanding
    “Intelligence is knowing a tomato is a fruit.
Understanding is not putting it in a fruit salad.” JDP 04




      19 March 2013

      © Crown copyright 2013 Dstl
                                    UNCLASSIFIED
19 March 2013

© Crown copyright 2013 Dstl
                              UNCLASSIFIED
Afghanistan




    19 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
Afghanistan




    19 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
20 March 2013

© Crown copyright 2013 Dstl
CONTINGENCY




   19 March 2013

   © Crown copyright 2013 Dstl
                                 UNCLASSIFIED
Change in intelligence focus

                                   Cold War
     Equipment                                    Hierarchies


                                  Contingency
          People                          Activities/Relationships



    19 March 2013

    © Crown copyright 2013 Dstl
                                   UNCLASSIFIED
Change in intelligence focus




    19 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
20 March 2013

© Crown copyright 2013 Dstl
Size, Weight and Power = SWaP




    19 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
Communications




   19 March 2013

   © Crown copyright 2013 Dstl
                                 UNCLASSIFIED
Constraint and oversight


              Legal                          Ethical

           Moral                           Political

    19 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
SCENARIOS

                   Maritime Boarding Operation


                   Insurgent Compound Assault

                   Non-combatant Evacuation
                   Operation (NEO)


   19 March 2013

   © Crown copyright 2013 Dstl
                                 UNCLASSIFIED
Maritime boarding operation




    19 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
Maritime boarding operation




    19 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
Compound assault
Compound Assault




               20 March 2013

UNCLASSIFIED copyright 2013 Dstl
          © Crown
Compound assault
19 March 2013

© Crown copyright 2013 Dstl
                              UNCLASSIFIED
Compound assault
19 March 2013

© Crown copyright 2013 Dstl
                               UNCLASSIFIED
Compound assault




    19 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
Compound assault




    19 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
Compound assault




   19 March 2013

   © Crown copyright 2013 Dstl
                                 UNCLASSIFIED
Non-combatant Evacuation Operation (NEO)




               20 March 2013

UNCLASSIFIED copyright 2013 Dstl
          © Crown
NEO




      19 March 2013

      © Crown copyright 2013 Dstl
                                    UNCLASSIFIED
NEO




      19 March 2013

      © Crown copyright 2013 Dstl
                                    UNCLASSIFIED
Summary
Future Character of Conflict: 5Cs

ISR focus: People and activities

Understanding: Requires lots of information

Legal, ethical, moral, political constraints

Military are open to novel, smart alternatives



       19 March 2013

       © Crown copyright 2013 Dstl
                                     UNCLASSIFIED
Agenda
10:30   Introduction to CDE
10:45   Counter Terrorism Science & Technology Centre overview
10:55   Military context
11:25   Challenge 1 – understanding networks
11:40   Challenge 2 – identifying individuals
11:55   Q&A
12:05   Networking lunch
13:00   Challenge 3 – translating information
13:15   Call summary
13:20   Ethics
13:25   CDE – submitting a successful proposal
13:35   Q&A
13:45   Networking
15:15   Event close
Challenge 1: Understanding
Networks




    20 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
Not just people: organisations, locations, events, vehicles,
                  phones, computers…….

          20 March 2013

          © Crown copyright 2013 Dstl
                                        UNCLASSIFIED
Background
•   MOD may have a need to support multiple operations at any one time, including
    working with coalition partners and local security forces.

•   There is a requirement to build up an understanding of the networks of people
    and supporting infrastructure.

•   There is a need to mine all the available information to identify individuals and
    groups who are interested in countering defence and security activity.

•   Operations may be data rich or data sparse, with information being fed from a
    number of sources, with varying degrees of confidence.

•   Requirement to fuse sources to build up network picture.


            20 March 2013

            © Crown copyright 2013 Dstl
                                          UNCLASSIFIED
S&T challenges
 Sources: Open source; MOD; OGDs; Local military/security; Coalition partners


 Formats: Audio, Video, Text, Tabular, Imagery, STRUCTURED & UNSTRUCTURED


        Data quality                               Automated data diagnosis
       Data complexity                               Complexity estimation
           Volume                               Extraction of structured content
         Uncertainty                                   Metadata tagging
         Timeliness                              Conversion to common format


              FLEXIBLE EXTRACT, TRANSFORMATION, AND LOADING




        20 March 2013

        © Crown copyright 2013 Dstl
                                      UNCLASSIFIED
S&T challenges
    INFORMATION                          Common Interface          ANALYTICS/PROCESSING
    REPOSITORIES


                                                             Automation of common tasks
   Flexible and scalable data                               Machine-led pattern finding (eg
             storage                                             anomaly detection)
Integration with traditional data                             Automated prediction and
           structures                                               validation
                                                                Enhanced collaborative
                                                                    mechanisms

               AUGMENTATION OF ANALYTICAL WORKFLOW




           20 March 2013

           © Crown copyright 2013 Dstl
                                         UNCLASSIFIED
What we want
     Fix one part of the challenge well, rather than several parts poorly

                                     Open architectures

                        Use of open-source software is encouraged

  State what data types and functions your proposal will consider (be clear)

         Scalability of algorithms/solutions – will it handle “big data”

             Simple interfaces encouraged to reduce training burden




       20 March 2013

       © Crown copyright 2013 Dstl
                                     UNCLASSIFIED
What we don’t want

         Reliance on existing proprietary solutions or closed APIs

                                  Enterprise-level solutions

                          Avoid reliance on third-party services

                Avoid focussing on simple aspects of challenges:
                                  •Entity extraction
                   •Extraction of common file formats (eg HTML)




    20 March 2013

    © Crown copyright 2013 Dstl
                                      UNCLASSIFIED
Summary
 Effective methods to explore the potentially large volume of data
 available from a variety of sources, across a range of data formats to
 help identify the key activities and individuals that form any network.


 • Information fusion                     • Scalable


 • Open architectures                     • Handling uncertainty


 • Ease of use




      20 March 2013

      © Crown copyright 2013 Dstl
                                    UNCLASSIFIED
Agenda
10:30   Introduction to CDE
10:45   Counter Terrorism Science & Technology Centre overview
10:55   Military context
11:25   Challenge 1 – understanding networks
11:40   Challenge 2 – identifying individuals
11:55   Q&A
12:05   Networking lunch
13:00   Challenge 3 – translating information
13:15   Call summary
13:20   Ethics
13:25   CDE – submitting a successful proposal
13:35   Q&A
13:45   Networking
15:15   Event close
Challenge 2: Identifying
Individuals




    20 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
Background

• People are a key part of networks and network
  activities.
• This challenge is focused on identifying the individuals
  and exploiting available information to establish
  linkages.
• Wide range of scenarios across defence and security
  where potential for S&T in this area can have impact
  on future UK capability.



        20 March 2013

        © Crown copyright 2013 Dstl
                                      UNCLASSIFIED
Approaches to identifying an individual



?




     20 March 2013

     © Crown copyright 2013 Dstl
                                   UNCLASSIFIED
The overarching challenge

• Techniques exist to enable identification of
  individuals and to exploit finds.
• S&T to:
   – provide a significant step change in current approaches
   – provide a novel approach
• This challenge is split into two key areas:
   – A. Person is present
   – B. Person is not present




         20 March 2013

         © Crown copyright 2013 Dstl
                                       UNCLASSIFIED
A. The person is present

• Range of scenarios
  – Voluntary enrolment of a person in the field
  – Entry into a base
  – On approach to military forces
  – Through activity




        20 March 2013

        © Crown copyright 2013 Dstl
                                      UNCLASSIFIED
A. The person is present

• Range of scenarios
• As the person is present
   – Uncontaminated samples
   – Rapid processing
   – Range of environments
   – Ideally portable with low power (SWaP)
   – Although present person maybe at distance




        20 March 2013

        © Crown copyright 2013 Dstl
                                      UNCLASSIFIED
B. The person is not present
• Opportunities to exploit from traces or items left behind
  at a scene



    ?                                 Scene of
                                      interest




        20 March 2013

        © Crown copyright 2013 Dstl
                                      UNCLASSIFIED
B. The person is not present

• Biometrics
  •   Range of surfaces – time
  •   Contamination
  •   Environmental conditions
• Other opportunities from the scene
  •   Imagery, voice recordings, others?
• Robust and adaptable to maximise opportunities
• Add value to identify the individual(s) and/or
  establish linkages across the network


         20 March 2013

         © Crown copyright 2013 Dstl
                                       UNCLASSIFIED
What are we looking for? General

•   New methods and approaches
•   Efficient collection of information
•   Wider information sources
•   Open architecture for software solutions
•   Sampling
•   Processing rates
•   Defence Lines of Development (DLODs)
•   Interoperability and use of international standards



         20 March 2013

         © Crown copyright 2013 Dstl
                                       UNCLASSIFIED
What are we looking for? In the field

• Remote use of equipment
  – Degrees of man portability
  – Lower power requirements
• Ability to use in a range of environments
• Approaches to consider lower bandwidth data links
• Fast or very fast processing to support decision
  making
• Efficient and effective sampling and storage



        20 March 2013

        © Crown copyright 2013 Dstl
                                      UNCLASSIFIED
What are we looking for? Static location


• External power supply
• Access to on-site servers




       20 March 2013

       © Crown copyright 2013 Dstl
                                     UNCLASSIFIED
What we don’t want

• Standard law enforcement techniques or
  commercially available techniques for:
  • Detection of fingerprints
  • Face recognition
  • Iris recognition
  • DNA or its analysis
  • Speaker recognition




      20 March 2013

      © Crown copyright 2013 Dstl
                                    UNCLASSIFIED
Summary
  We need to be able to confirm the identity of individuals
  reliably with a step change in current capability or using
  novel approaches


• Range of use scenarios                    • SWaP


• Timeliness of sampling and                • Interoperability
  processing




         20 March 2013

         © Crown copyright 2013 Dstl
                                       UNCLASSIFIED
Agenda
10:30   Introduction to CDE
10:45   Counter Terrorism Science & Technology Centre overview
10:55   Military context
11:25   Challenge 1 – understanding networks
11:40   Challenge 2 – identifying individuals
11:55   Q&A
12:05   Networking lunch
13:00   Challenge 3 – translating information
13:15   Call summary
13:20   Ethics
13:25   CDE – submitting a successful proposal
13:35   Q&A
13:45   Networking
15:15   Event close
Challenge 3: Translating
Information




    20 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
Background
•   MOD is active in a number of military operations globally, often in a CT role.


•   Majority of UK troops not fluent in local written or spoken language for area of
    operation.


•   Too much information to manually process.


•   Human translators support high accuracy but low volume translations.


•   Requirement for capability to better enable MOD’s understanding of local
    environment and population (feeds Challenge 1).




            20 March 2013

            © Crown copyright 2013 Dstl
                                          UNCLASSIFIED
S&T challenges

                                                         Video          Audio
  Hard copy          Digital

                                                                                  Speaker attribution
                                                                                  (eg dialect, emotion)
                                        Keyword extraction

                                                                 Speech to text

Optical Character
  Recognition
                                                                                   Speaker ID
                        Machine translation                  Challenge 1
                           (to English)


               20 March 2013

               © Crown copyright 2013 Dstl
                                                UNCLASSIFIED
What we want
    Optical Character Recognition                            Speech to text
 Portable/small solutions (tablet sized)          Multiple languages (including non-
           Rapid processing                                     western)
        Non-Latin text support                    Preference for untrained solutions
           Handwritten text                         Resilience to background noise
        Use of open standards                      Scalable to large volumes of data


Machine translation/Keyword extraction                   Speaker ID/Attribution
  Open software interfaces to enable                       Resilience to noise
    addition of classified keywords                           High accuracy
       High volume processing                           Minimal training (seconds)
   Rule-based machine translation                       Near real-time processing




           20 March 2013

           © Crown copyright 2013 Dstl
                                         UNCLASSIFIED
What we don’t want
                                                             Speech to text
     Optical Character Recognition
                                                       English language solutions
          Latin alphabet OCR
                                                 Closed interfaces/proprietary solutions
 Office-based solutions (non-portable)
                                                     Reliance on third-party services
   Closed APIs which are difficult to
                                                      Low volume/higher accuracy
               integrate

                                                         Speaker ID/Attribution
Machine translation/Keyword extraction
                                                  Reliance on third-party services (eg
     Reliance on third-party services
                                                 existing proprietary language models)
 Bilingual text corpora built from news
                                                     Proposals requiring significant
      feeds or open sources (BBCM)
                                                  Government Furnished Extras (GFX)
           Western languages




           20 March 2013

           © Crown copyright 2013 Dstl
                                         UNCLASSIFIED
Summary
    We need to be able to rapidly prioritise sources of information (audio,
    paper and electronic) to enable human interpreters to focus only on key
    information sources for full translation.



•   Modular solutions                          •   Non-western language focus


•   High volume and real-time                  •   Open architectures
    focus




            20 March 2013

            © Crown copyright 2013 Dstl
                                          UNCLASSIFIED
Agenda
10:30   Introduction to CDE
10:45   Counter Terrorism Science & Technology Centre overview
10:55   Military context
11:25   Challenge 1 – understanding networks
11:40   Challenge 2 – identifying individuals
11:55   Q&A
12:05   Networking lunch
13:00   Challenge 3 – translating information
13:15   Call summary
13:20   Ethics
13:25   CDE – submitting a successful proposal
13:35   Q&A
13:45   Networking
15:15   Event close
CDE Call Summary




    20 March 2013

    © Crown copyright 2013 Dstl
                                  UNCLASSIFIED
Aim of this CDE call
• Identify innovative research that will provide a change in our ability
  to counter terrorist networks

• Broad scope

                                                Proof of
                        Initial                                 Concept
                                              concept for a
                    investigation                             development
                                               novel idea

                                                          More
                                        Prototype
                                                        advanced
                                       development
                                                        research


         20 March 2013

         © Crown copyright 2013 Dstl
                                           UNCLASSIFIED
For non-technology solutions the delta should be articulated
           Technology readiness levels
           programme
Research




                       20 March 2013

                       © Crown copyright 2013 Dstl
                                                     UNCLASSIFIED
TRL for proposals

       TRL 1-6                        • Only interested in proposals that have an end point from TRL 1- 6




                                      • Proof-of-principle research feeding into the longer-term research
A portfolio of projects               • TRL 4-5 work that could make a difference in the near term


                                      • Show a defined rise in TRL within the 6-month proposal
     TRL change                       • Further increases in TRL outside the 6-month timescale could be
                                        an option within the proposal


                                      • Please clearly articulate the technical aspects of the proposal and
  Technical aspects                     show how you expect the research to raise the TRL




        20 March 2013

        © Crown copyright 2013 Dstl
                                         UNCLASSIFIED
Proposal timings

CDE launch                                                               Decision point
event                Call
                     closes:
                                           Successful
                     17.00
                                           candidates informed


                                                              Proposal                  Potential
                                                                                    further research
                                Assessment
                                                        Up to 6 months              x months



 19 Mar               1 May                  Before 31 May


             20 March 2013

             © Crown copyright 2013 Dstl
                                                UNCLASSIFIED
Proposals
•   We are looking for proposals of up to 6 months in duration.
     – This timing will inform programme formulation for the following financial year.
     – This may provide the opportunity for follow-on work after the initial 6 months phase.
        Therefore after a clearly defined decision point at 6 months please state possible
        continuation work (subject to funding and possible alternate contracting routes).



•   There is no fixed value for any proposal but we would prefer to fund a larger
    number of smaller value proposals. We have allocated up to £700K for this call.


•   If GFX (government-furnished equipment/information/personnel) is unavoidable,
    please clearly state any assumptions in the proposal.



            20 March 2013

            © Crown copyright 2013 Dstl
                                          UNCLASSIFIED
What are we looking for?
       Duration less than 6 months               • Longer proposals will not be funded


                                                 •In the view of experienced assessors (achievable
     Value for money and achievable              within the proposed time frames and budgets)

        A step change in capability              • Not “off the shelf”


                                                 • Rather than funding development of existing
            Open architectures                     proprietary technology/software

                                                 • Rather than duplication of already existing
                  Novel ideas                      technology/ideas

 Clear articulation of technical details and     • Expected outcome and the methods to achieve
                   output                          this

  Explain how the proposal answers the           • Please state clearly how this answers part/parts of
                challenge                          the challenges



           20 March 2013

           © Crown copyright 2013 Dstl
                                         UNCLASSIFIED
•   For further questions on the proposal requirements or technical details
    please contact us via:


                                     ctcenquiries@dstl.gov.uk




           20 March 2013

           © Crown copyright 2013 Dstl
                                          UNCLASSIFIED
Agenda
10:30   Introduction to CDE
10:45   Counter Terrorism Science & Technology Centre overview
10:55   Military context
11:25   Challenge 1 – understanding networks
11:40   Challenge 2 – identifying individuals
11:55   Q&A
12:05   Networking lunch
13:00   Challenge 3 – translating information
13:15   Call summary
13:20   Ethics
13:25   CDE – submitting a successful proposal
13:35   Q&A
13:45   Networking
15:15   Event close
Ethics
•     Some of the proposals may require Ethics Approval
       – Any research involving human participants in MOD research, both clinical and non-
           clinical requires ethics committee approval

    Clinical

        • Conduct research upon the human participant, including (but not limited to) administering
        substances, taking blood or urine samples, removing biological tissue, radiological investigations,
        or obtaining responses to an imposed stress or experimental situation.




    Non-Clinical

        • Conduct research to collect data on an identifiable individual’s behaviour, either directly or
          indirectly (such as by questionnaire or observation).



                20 March 2013

                © Crown copyright 2013 Dstl
                                               UNCLASSIFIED
Ethics
•   All proposals should declare if there are potential ethical hurdles to address
•   A proposal must, in the first instance, be scientifically robust in order for it to be,
    prima facie, ethical
•   If the proposal may require ethics approval, please make a three part proposal:
     – Milestone 1: Produce research protocols
     – Milestone 2: Obtaining ethics approval for the project
     – Milestone 3: Proposed research (subject to ethics approval)

•   More information
     – http://www.science.mod.uk/engagement/modrec/modrec.aspx




            20 March 2013

            © Crown copyright 2013 Dstl
                                          UNCLASSIFIED
Agenda
10:30   Introduction to CDE
10:45   Counter Terrorism Science & Technology Centre overview
10:55   Military context
11:25   Challenge 1 – understanding networks
11:40   Challenge 2 – identifying individuals
11:55   Q&A
12:05   Networking lunch
13:00   Challenge 3 – translating information
13:15   Call summary
13:20   Ethics
13:25   CDE – submitting a successful proposal
13:35   Q&A
13:45   Networking
15:15   Event close
Centre for Defence Enterprise
Submitting a Successful Proposal




                 Centre for Defence Enterprise
        www.science.mod.uk/enterprise cde@dstl.gov.uk
          UNCLASSIFIED / FOR PUBLIC RELEASE
                                                        Crown Copyright (c) 2012
Maximising your chances
Know what is available




           Centre for Defence Enterprise
  www.science.mod.uk/enterprise cde@dstl.gov.uk   Dstl is part of the
                                                  Ministry of Defence
    UNCLASSIFIED / For Public Release
                                                  Crown Copyright Dstl 2012
Know what is available




         Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk   Dstl is part of the
                                                Ministry of Defence
  UNCLASSIFIED / For Public Release
                                                Crown Copyright Dstl 2012
Know what is available
Read available
information


Including CDE
manuals


Especially Quick Start
Guide


                              Centre for Defence Enterprise
                     www.science.mod.uk/enterprise cde@dstl.gov.uk   Dstl is part of the
                                                                     Ministry of Defence
                         UNCLASSIFIED / For Public Release
                                                                     Crown Copyright Dstl 2012
Developing a CDE proposal




            Centre for Defence Enterprise
   www.science.mod.uk/enterprise cde@dstl.gov.uk   Dstl is part of the
                                                   Ministry of Defence
     UNCLASSIFIED / For Public Release
                                                   Crown Copyright Dstl 2012
Value from technology


Innovative                                    Future
concept                                       capability


         Proof of
         concept    Incremental development




                                                 Dstl is part of the
                                                 Ministry of Defence
The essentials
Abstract
Assessment




mins
MOD Performance Assessment Framework

Five criteria:
Operational relevance
Likelihood of exploitation
Builds critical S&T capability to meet UK
needs
Scientific quality/innovation
Science, innovation and technology risk
Proposal health check




         Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
  UNCLASSIFIED / FOR PUBLIC RELEASE
                                                Crown Copyright (c) 2012
Claim of future benefit
Contribution to future benefit
Logical programme of work
Generation of evidence
Demonstration of progress
Health check
Based on a claim of future benefit
Contribution to realisation of future benefit
Logical programme of work
Evidential outcomes
Demonstration of progress towards goal
                    Centre for Defence Enterprise
           www.science.mod.uk/enterprise cde@dstl.gov.uk
             UNCLASSIFIED / FOR PUBLIC RELEASE
                                                           Crown Copyright (c) 2012
Government-furnished X




          Centre for Defence Enterprise
 www.science.mod.uk/enterprise cde@dstl.gov.uk   Dstl is part of the
                                                 Ministry of Defence
   UNCLASSIFIED / For Public Release
                                                 Crown Copyright Dstl 2012
Ethics
Health and safety
Unclassified
Early birds
Deadline
      This call closes:
       17:00 hrs on
Wednesday 1 May 2013


             Centre for Defence Enterprise
    www.science.mod.uk/enterprise cde@dstl.gov.uk     Dstl is part of the
                                                      Ministry of Defence
      UNCLASSIFIED / For Public Release
                                                      Crown Copyright Dstl 2012
Call process queries
 Centre for Defence Enterprise
         01235 438445
       cde@dstl.gov.uk
www.science.mod.uk/enterprise


                 Centre for Defence Enterprise
        www.science.mod.uk/enterprise cde@dstl.gov.uk
          UNCLASSIFIED / FOR PUBLIC RELEASE
                                                        Crown Copyright (c) 2012
Call technical queries


ctcenquiries@dstl.gov.uk




               Centre for Defence Enterprise
      www.science.mod.uk/enterprise cde@dstl.gov.uk   Dstl is part of the
                                                      Ministry of Defence
        UNCLASSIFIED / For Public Release
                                                      Crown Copyright Dstl 2012
Further information
              www.science.mod.uk
Events and Calls > Current calls for proposals > The
   Challenges of Countering Terrorist Networks


 Webinar – Tuesday 26 March 2013 12:30-13:30
           Details on the call webpage
      Email craig.cook@aadktn.co.uk to join
                         Centre for Defence Enterprise
                www.science.mod.uk/enterprise cde@dstl.gov.uk   Dstl is part of the
                                                                Ministry of Defence
                  UNCLASSIFIED / For Public Release
                                                                Crown Copyright Dstl 2012
Network and question

Weitere ähnliche Inhalte

Ähnlich wie The Challenges of Countering Terrorist Networks - CDE themed call launch 19 Mar 2013

Strengthening the Security of Maritime Operations - CDE themed call launch pr...
Strengthening the Security of Maritime Operations - CDE themed call launch pr...Strengthening the Security of Maritime Operations - CDE themed call launch pr...
Strengthening the Security of Maritime Operations - CDE themed call launch pr...Defence and Security Accelerator
 
Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...
Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...
Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...Defence and Security Accelerator
 
Innovations™ Magazine July - September 2013
Innovations™ Magazine July - September 2013Innovations™ Magazine July - September 2013
Innovations™ Magazine July - September 2013T.D. Williamson
 
CrowdCasts Monthly: You Have an Adversary Problem
CrowdCasts Monthly: You Have an Adversary ProblemCrowdCasts Monthly: You Have an Adversary Problem
CrowdCasts Monthly: You Have an Adversary ProblemCrowdStrike
 
Countering insider threat attacks - CDE themed call launch 14 May 2013
Countering insider threat attacks - CDE themed call launch 14 May 2013Countering insider threat attacks - CDE themed call launch 14 May 2013
Countering insider threat attacks - CDE themed call launch 14 May 2013Defence and Security Accelerator
 

Ähnlich wie The Challenges of Countering Terrorist Networks - CDE themed call launch 19 Mar 2013 (10)

Strengthening the Security of Maritime Operations - CDE themed call launch pr...
Strengthening the Security of Maritime Operations - CDE themed call launch pr...Strengthening the Security of Maritime Operations - CDE themed call launch pr...
Strengthening the Security of Maritime Operations - CDE themed call launch pr...
 
18 Dec 2013 - CDE enduring challenge competition webinar
18 Dec 2013 - CDE enduring challenge competition webinar18 Dec 2013 - CDE enduring challenge competition webinar
18 Dec 2013 - CDE enduring challenge competition webinar
 
18 November 2014: Enduring challenge briefings
18 November 2014: Enduring challenge briefings18 November 2014: Enduring challenge briefings
18 November 2014: Enduring challenge briefings
 
Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...
Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...
Generic Enablers for Low-SWAPC ISTAR - Centre for Defence Enterprise Themed C...
 
Innovations™ Magazine July - September 2013
Innovations™ Magazine July - September 2013Innovations™ Magazine July - September 2013
Innovations™ Magazine July - September 2013
 
27 Nov 2013 CDE enduring challenge competition briefings
27 Nov 2013 CDE enduring challenge competition briefings27 Nov 2013 CDE enduring challenge competition briefings
27 Nov 2013 CDE enduring challenge competition briefings
 
TNO cyber security perspectives 2013
TNO cyber security perspectives 2013TNO cyber security perspectives 2013
TNO cyber security perspectives 2013
 
CrowdCasts Monthly: You Have an Adversary Problem
CrowdCasts Monthly: You Have an Adversary ProblemCrowdCasts Monthly: You Have an Adversary Problem
CrowdCasts Monthly: You Have an Adversary Problem
 
Countering insider threat attacks - CDE themed call launch 14 May 2013
Countering insider threat attacks - CDE themed call launch 14 May 2013Countering insider threat attacks - CDE themed call launch 14 May 2013
Countering insider threat attacks - CDE themed call launch 14 May 2013
 
9 September 2014: Enduring challenge briefings
9 September 2014: Enduring challenge briefings 9 September 2014: Enduring challenge briefings
9 September 2014: Enduring challenge briefings
 

Mehr von Defence and Security Accelerator

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDefence and Security Accelerator
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDefence and Security Accelerator
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Defence and Security Accelerator
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017Defence and Security Accelerator
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposalDefence and Security Accelerator
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator Defence and Security Accelerator
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...Defence and Security Accelerator
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Defence and Security Accelerator
 
Tips on how to submit a great proposal to the Centre for Defence Enterprise
Tips on how to submit a great proposal to the Centre for Defence EnterpriseTips on how to submit a great proposal to the Centre for Defence Enterprise
Tips on how to submit a great proposal to the Centre for Defence EnterpriseDefence and Security Accelerator
 
An introduction to CDE, as delivered at the Innovation Networking Event
An introduction to CDE, as delivered at the Innovation Networking EventAn introduction to CDE, as delivered at the Innovation Networking Event
An introduction to CDE, as delivered at the Innovation Networking EventDefence and Security Accelerator
 

Mehr von Defence and Security Accelerator (20)

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade Presentation
 
DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office Presentation
 
DASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA PresentationDASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA Presentation
 
DASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England PresentationDASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England Presentation
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator
 
Improving crowd resilience themed competition slides
Improving crowd resilience themed competition slidesImproving crowd resilience themed competition slides
Improving crowd resilience themed competition slides
 
Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...
 
Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2
 
Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1
 
Beyond battery power - how the competition will work
Beyond battery power - how the competition will workBeyond battery power - how the competition will work
Beyond battery power - how the competition will work
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
 
CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1
 
CDE competition briefing - FASS technology challenge 2
CDE competition briefing - FASS technology challenge 2CDE competition briefing - FASS technology challenge 2
CDE competition briefing - FASS technology challenge 2
 
Tips on how to submit a great proposal to the Centre for Defence Enterprise
Tips on how to submit a great proposal to the Centre for Defence EnterpriseTips on how to submit a great proposal to the Centre for Defence Enterprise
Tips on how to submit a great proposal to the Centre for Defence Enterprise
 
An introduction to CDE, as delivered at the Innovation Networking Event
An introduction to CDE, as delivered at the Innovation Networking EventAn introduction to CDE, as delivered at the Innovation Networking Event
An introduction to CDE, as delivered at the Innovation Networking Event
 

The Challenges of Countering Terrorist Networks - CDE themed call launch 19 Mar 2013

  • 1.
  • 2. The Challenges of Countering Terrorist Networks Centre for Defence Enterprise (CDE)
  • 3. The aim of CDE © Crown Copyright MOD 2011
  • 4. Prove the value of novel, high-risk, high-potential-benefit research © Crown Copyright MOD 2011
  • 5. To enable development of cost- effective capability advantage © Crown Copyright MOD 2011
  • 6. Engaging a broad audience 6
  • 8. Two routes to funding
  • 10. CDE themed call programme Smart and multifunctional materials Call closes 12 April 2013 and structures (at 1700 hrs) The challenges of countering Call closes 1 May 2013 terrorist networks (at 1700 hrs) Precision timing Call launch 23 April 2013 Secure communications Call launch 18 June 2013 Innovation in drug development Call launch 25 June 2013 processes Enhancing military medical training Call launch 16 July 2013 and support for the medic Register and further details at www.science.mod.uk under ‘Events and Calls’ Centre for Defence Enterprise Dstl is part of the www.science.mod.uk/enterprise cde@dstl.gov.uk Ministry of Defence UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
  • 14. Novel fibres for CBR protection
  • 26. CDE advantages Accessible Rapid assessment Easy contracting Quick payments Benevolent IP arrangements
  • 27. Effective proposals © Crown Copyright MOD 2011
  • 28. Agenda 10:30 Introduction to CDE 10:45 Counter Terrorism Science & Technology Centre overview 10:55 Military context 11:25 Challenge 1 – understanding networks 11:40 Challenge 2 – identifying individuals 11:55 Q&A 12:05 Networking with lunch 13:00 Challenge 3 – translating information 13:15 Call summary 13:20 Ethics 13:25 CDE – submitting a successful proposal 13:35 Q&A 13:45 Networking with refreshments 15:15 Event close
  • 30. Centre for Defence Enterprise Advanced Design and 01235 438445 Manufacturing cde@dstl.gov.uk www.science.mod.uk/enterprise Centre for Defence Enterprise Wing Commander Jim Pennycook
  • 31. Agenda 10:30 Introduction to CDE 10:45 Counter Terrorism Science & Technology Centre overview 10:55 Military context 11:25 Challenge 1 – understanding networks 11:40 Challenge 2 – identifying individuals 11:55 Q&A 12:05 Networking lunch 13:00 Challenge 3 – translating information 13:15 Call summary 13:20 Ethics 13:25 CDE – submitting a successful proposal 13:35 Q&A 13:45 Networking 15:15 Event close
  • 32. 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 33. The Challenges of Countering Terrorist Networks 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 34. Countering terrorist networks Harnessing and developing science and technology (S&T) to increase defence and security capability to pursue and disrupt threats to UK 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 35. Today’s CDE call S&T challenges Challenge 2: Identifying Individuals Challenge 3: Translating Information Challenge 1: Understanding the Network 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 36. Agenda 10:30 Introduction to CDE 10:45 Counter Terrorism Science & Technology Centre overview 10:55 Military context 11:25 Challenge 1 – understanding networks 11:40 Challenge 2 – identifying individuals 11:55 Q&A 12:05 Networking lunch 13:00 Challenge 3 – translating information 13:15 Call summary 13:20 Ethics 13:25 CDE – submitting a successful proposal 13:35 Q&A 13:45 Networking 15:15 Event close
  • 37. The Challenges of Countering Terrorist Networks Military Context 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 38. 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 39. References 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 40. References 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 41. Terminology ISR = Intelligence, Surveillance and Reconnaissance ISTAR = Intelligence, Surveillance, Target Acquisition and Reconnaissance C4ISR = Command Control , Computers, Communications and ISR E2E3 = End to End Enterprise MPE = Materiel and Personnel Exploitation FABINT = Forensic and Biometric Intelligence DOCEX/DOMEX = Document Exploitation/Document and Media Exploitation SIGINT = Signals Intelligence OSINT = Open Source Intelligence WTI = Weapons Technical Intelligence 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 42. Future Character of Conflict: 5Cs Contested Connected Constrained Cluttered Congested 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 43. The Future Battlespace  Contested  Competition for resources. All geographies of operation are contested  Sea, land, air & space, cyberspace and information  Congested  To influence people we have to operate in, over and close to where they live. People live in urban areas in the littoral  There is no empty battlefield  Cluttered  Network Enabled Capability will not fully lift the fog of war  We need to understand and to discriminate  Connected  Networks - source of strength for friend and foe  Nodes are also a source of weakness  Constrained  Legal and social norms - essential to our legitimacy - will limit us but not our adversaries More UNCLASSIFIED Constrained
  • 44. Future Character of Conflict Contested COMPLEX Connected Constrained CONTINGENCY COALITION URBAN Cluttered Congested 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 45. Understanding 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 46. Understanding “Intelligence is knowing a tomato is a fruit. Understanding is not putting it in a fruit salad.” JDP 04 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 47. 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 48. Afghanistan 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 49. Afghanistan 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 50. 20 March 2013 © Crown copyright 2013 Dstl
  • 51. CONTINGENCY 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 52. Change in intelligence focus Cold War Equipment Hierarchies Contingency People Activities/Relationships 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 53. Change in intelligence focus 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 54. 20 March 2013 © Crown copyright 2013 Dstl
  • 55. Size, Weight and Power = SWaP 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 56. Communications 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 57. Constraint and oversight Legal Ethical Moral Political 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 58. SCENARIOS Maritime Boarding Operation Insurgent Compound Assault Non-combatant Evacuation Operation (NEO) 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 59. Maritime boarding operation 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 60. Maritime boarding operation 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 61. Compound assault Compound Assault 20 March 2013 UNCLASSIFIED copyright 2013 Dstl © Crown
  • 62. Compound assault 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 63. Compound assault 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 64. Compound assault 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 65. Compound assault 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 66. Compound assault 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 67. Non-combatant Evacuation Operation (NEO) 20 March 2013 UNCLASSIFIED copyright 2013 Dstl © Crown
  • 68. NEO 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 69. NEO 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 70. Summary Future Character of Conflict: 5Cs ISR focus: People and activities Understanding: Requires lots of information Legal, ethical, moral, political constraints Military are open to novel, smart alternatives 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 71. Agenda 10:30 Introduction to CDE 10:45 Counter Terrorism Science & Technology Centre overview 10:55 Military context 11:25 Challenge 1 – understanding networks 11:40 Challenge 2 – identifying individuals 11:55 Q&A 12:05 Networking lunch 13:00 Challenge 3 – translating information 13:15 Call summary 13:20 Ethics 13:25 CDE – submitting a successful proposal 13:35 Q&A 13:45 Networking 15:15 Event close
  • 72. Challenge 1: Understanding Networks 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 73. Not just people: organisations, locations, events, vehicles, phones, computers……. 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 74. Background • MOD may have a need to support multiple operations at any one time, including working with coalition partners and local security forces. • There is a requirement to build up an understanding of the networks of people and supporting infrastructure. • There is a need to mine all the available information to identify individuals and groups who are interested in countering defence and security activity. • Operations may be data rich or data sparse, with information being fed from a number of sources, with varying degrees of confidence. • Requirement to fuse sources to build up network picture. 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 75. S&T challenges Sources: Open source; MOD; OGDs; Local military/security; Coalition partners Formats: Audio, Video, Text, Tabular, Imagery, STRUCTURED & UNSTRUCTURED Data quality Automated data diagnosis Data complexity Complexity estimation Volume Extraction of structured content Uncertainty Metadata tagging Timeliness Conversion to common format FLEXIBLE EXTRACT, TRANSFORMATION, AND LOADING 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 76. S&T challenges INFORMATION Common Interface ANALYTICS/PROCESSING REPOSITORIES Automation of common tasks Flexible and scalable data Machine-led pattern finding (eg storage anomaly detection) Integration with traditional data Automated prediction and structures validation Enhanced collaborative mechanisms AUGMENTATION OF ANALYTICAL WORKFLOW 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 77. What we want Fix one part of the challenge well, rather than several parts poorly Open architectures Use of open-source software is encouraged State what data types and functions your proposal will consider (be clear) Scalability of algorithms/solutions – will it handle “big data” Simple interfaces encouraged to reduce training burden 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 78. What we don’t want Reliance on existing proprietary solutions or closed APIs Enterprise-level solutions Avoid reliance on third-party services Avoid focussing on simple aspects of challenges: •Entity extraction •Extraction of common file formats (eg HTML) 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 79. Summary Effective methods to explore the potentially large volume of data available from a variety of sources, across a range of data formats to help identify the key activities and individuals that form any network. • Information fusion • Scalable • Open architectures • Handling uncertainty • Ease of use 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 80. Agenda 10:30 Introduction to CDE 10:45 Counter Terrorism Science & Technology Centre overview 10:55 Military context 11:25 Challenge 1 – understanding networks 11:40 Challenge 2 – identifying individuals 11:55 Q&A 12:05 Networking lunch 13:00 Challenge 3 – translating information 13:15 Call summary 13:20 Ethics 13:25 CDE – submitting a successful proposal 13:35 Q&A 13:45 Networking 15:15 Event close
  • 81. Challenge 2: Identifying Individuals 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 82. Background • People are a key part of networks and network activities. • This challenge is focused on identifying the individuals and exploiting available information to establish linkages. • Wide range of scenarios across defence and security where potential for S&T in this area can have impact on future UK capability. 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 83. Approaches to identifying an individual ? 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 84. The overarching challenge • Techniques exist to enable identification of individuals and to exploit finds. • S&T to: – provide a significant step change in current approaches – provide a novel approach • This challenge is split into two key areas: – A. Person is present – B. Person is not present 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 85. A. The person is present • Range of scenarios – Voluntary enrolment of a person in the field – Entry into a base – On approach to military forces – Through activity 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 86. A. The person is present • Range of scenarios • As the person is present – Uncontaminated samples – Rapid processing – Range of environments – Ideally portable with low power (SWaP) – Although present person maybe at distance 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 87. B. The person is not present • Opportunities to exploit from traces or items left behind at a scene ? Scene of interest 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 88. B. The person is not present • Biometrics • Range of surfaces – time • Contamination • Environmental conditions • Other opportunities from the scene • Imagery, voice recordings, others? • Robust and adaptable to maximise opportunities • Add value to identify the individual(s) and/or establish linkages across the network 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 89. What are we looking for? General • New methods and approaches • Efficient collection of information • Wider information sources • Open architecture for software solutions • Sampling • Processing rates • Defence Lines of Development (DLODs) • Interoperability and use of international standards 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 90. What are we looking for? In the field • Remote use of equipment – Degrees of man portability – Lower power requirements • Ability to use in a range of environments • Approaches to consider lower bandwidth data links • Fast or very fast processing to support decision making • Efficient and effective sampling and storage 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 91. What are we looking for? Static location • External power supply • Access to on-site servers 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 92. What we don’t want • Standard law enforcement techniques or commercially available techniques for: • Detection of fingerprints • Face recognition • Iris recognition • DNA or its analysis • Speaker recognition 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 93. Summary We need to be able to confirm the identity of individuals reliably with a step change in current capability or using novel approaches • Range of use scenarios • SWaP • Timeliness of sampling and • Interoperability processing 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 94. Agenda 10:30 Introduction to CDE 10:45 Counter Terrorism Science & Technology Centre overview 10:55 Military context 11:25 Challenge 1 – understanding networks 11:40 Challenge 2 – identifying individuals 11:55 Q&A 12:05 Networking lunch 13:00 Challenge 3 – translating information 13:15 Call summary 13:20 Ethics 13:25 CDE – submitting a successful proposal 13:35 Q&A 13:45 Networking 15:15 Event close
  • 95. Challenge 3: Translating Information 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 96. Background • MOD is active in a number of military operations globally, often in a CT role. • Majority of UK troops not fluent in local written or spoken language for area of operation. • Too much information to manually process. • Human translators support high accuracy but low volume translations. • Requirement for capability to better enable MOD’s understanding of local environment and population (feeds Challenge 1). 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 97. S&T challenges Video Audio Hard copy Digital Speaker attribution (eg dialect, emotion) Keyword extraction Speech to text Optical Character Recognition Speaker ID Machine translation Challenge 1 (to English) 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 98. What we want Optical Character Recognition Speech to text Portable/small solutions (tablet sized) Multiple languages (including non- Rapid processing western) Non-Latin text support Preference for untrained solutions Handwritten text Resilience to background noise Use of open standards Scalable to large volumes of data Machine translation/Keyword extraction Speaker ID/Attribution Open software interfaces to enable Resilience to noise addition of classified keywords High accuracy High volume processing Minimal training (seconds) Rule-based machine translation Near real-time processing 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 99. What we don’t want Speech to text Optical Character Recognition English language solutions Latin alphabet OCR Closed interfaces/proprietary solutions Office-based solutions (non-portable) Reliance on third-party services Closed APIs which are difficult to Low volume/higher accuracy integrate Speaker ID/Attribution Machine translation/Keyword extraction Reliance on third-party services (eg Reliance on third-party services existing proprietary language models) Bilingual text corpora built from news Proposals requiring significant feeds or open sources (BBCM) Government Furnished Extras (GFX) Western languages 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 100. Summary We need to be able to rapidly prioritise sources of information (audio, paper and electronic) to enable human interpreters to focus only on key information sources for full translation. • Modular solutions • Non-western language focus • High volume and real-time • Open architectures focus 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 101. Agenda 10:30 Introduction to CDE 10:45 Counter Terrorism Science & Technology Centre overview 10:55 Military context 11:25 Challenge 1 – understanding networks 11:40 Challenge 2 – identifying individuals 11:55 Q&A 12:05 Networking lunch 13:00 Challenge 3 – translating information 13:15 Call summary 13:20 Ethics 13:25 CDE – submitting a successful proposal 13:35 Q&A 13:45 Networking 15:15 Event close
  • 102. CDE Call Summary 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 103. Aim of this CDE call • Identify innovative research that will provide a change in our ability to counter terrorist networks • Broad scope Proof of Initial Concept concept for a investigation development novel idea More Prototype advanced development research 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 104. For non-technology solutions the delta should be articulated Technology readiness levels programme Research 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 105. TRL for proposals TRL 1-6 • Only interested in proposals that have an end point from TRL 1- 6 • Proof-of-principle research feeding into the longer-term research A portfolio of projects • TRL 4-5 work that could make a difference in the near term • Show a defined rise in TRL within the 6-month proposal TRL change • Further increases in TRL outside the 6-month timescale could be an option within the proposal • Please clearly articulate the technical aspects of the proposal and Technical aspects show how you expect the research to raise the TRL 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 106. Proposal timings CDE launch Decision point event Call closes: Successful 17.00 candidates informed Proposal Potential further research Assessment Up to 6 months x months 19 Mar 1 May Before 31 May 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 107. Proposals • We are looking for proposals of up to 6 months in duration. – This timing will inform programme formulation for the following financial year. – This may provide the opportunity for follow-on work after the initial 6 months phase. Therefore after a clearly defined decision point at 6 months please state possible continuation work (subject to funding and possible alternate contracting routes). • There is no fixed value for any proposal but we would prefer to fund a larger number of smaller value proposals. We have allocated up to £700K for this call. • If GFX (government-furnished equipment/information/personnel) is unavoidable, please clearly state any assumptions in the proposal. 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 108. What are we looking for? Duration less than 6 months • Longer proposals will not be funded •In the view of experienced assessors (achievable Value for money and achievable within the proposed time frames and budgets) A step change in capability • Not “off the shelf” • Rather than funding development of existing Open architectures proprietary technology/software • Rather than duplication of already existing Novel ideas technology/ideas Clear articulation of technical details and • Expected outcome and the methods to achieve output this Explain how the proposal answers the • Please state clearly how this answers part/parts of challenge the challenges 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 109. For further questions on the proposal requirements or technical details please contact us via: ctcenquiries@dstl.gov.uk 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 110. Agenda 10:30 Introduction to CDE 10:45 Counter Terrorism Science & Technology Centre overview 10:55 Military context 11:25 Challenge 1 – understanding networks 11:40 Challenge 2 – identifying individuals 11:55 Q&A 12:05 Networking lunch 13:00 Challenge 3 – translating information 13:15 Call summary 13:20 Ethics 13:25 CDE – submitting a successful proposal 13:35 Q&A 13:45 Networking 15:15 Event close
  • 111. Ethics • Some of the proposals may require Ethics Approval – Any research involving human participants in MOD research, both clinical and non- clinical requires ethics committee approval Clinical • Conduct research upon the human participant, including (but not limited to) administering substances, taking blood or urine samples, removing biological tissue, radiological investigations, or obtaining responses to an imposed stress or experimental situation. Non-Clinical • Conduct research to collect data on an identifiable individual’s behaviour, either directly or indirectly (such as by questionnaire or observation). 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 112. Ethics • All proposals should declare if there are potential ethical hurdles to address • A proposal must, in the first instance, be scientifically robust in order for it to be, prima facie, ethical • If the proposal may require ethics approval, please make a three part proposal: – Milestone 1: Produce research protocols – Milestone 2: Obtaining ethics approval for the project – Milestone 3: Proposed research (subject to ethics approval) • More information – http://www.science.mod.uk/engagement/modrec/modrec.aspx 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 113. Agenda 10:30 Introduction to CDE 10:45 Counter Terrorism Science & Technology Centre overview 10:55 Military context 11:25 Challenge 1 – understanding networks 11:40 Challenge 2 – identifying individuals 11:55 Q&A 12:05 Networking lunch 13:00 Challenge 3 – translating information 13:15 Call summary 13:20 Ethics 13:25 CDE – submitting a successful proposal 13:35 Q&A 13:45 Networking 15:15 Event close
  • 114. Centre for Defence Enterprise Submitting a Successful Proposal Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
  • 116. Know what is available Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  • 117. Know what is available Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  • 118. Know what is available Read available information Including CDE manuals Especially Quick Start Guide Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  • 119. Developing a CDE proposal Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  • 120. Value from technology Innovative Future concept capability Proof of concept Incremental development Dstl is part of the Ministry of Defence
  • 124. MOD Performance Assessment Framework Five criteria: Operational relevance Likelihood of exploitation Builds critical S&T capability to meet UK needs Scientific quality/innovation Science, innovation and technology risk
  • 125. Proposal health check Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
  • 126. Claim of future benefit
  • 131. Health check Based on a claim of future benefit Contribution to realisation of future benefit Logical programme of work Evidential outcomes Demonstration of progress towards goal Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
  • 132. Government-furnished X Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  • 133. Ethics
  • 137. Deadline This call closes: 17:00 hrs on Wednesday 1 May 2013 Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  • 138. Call process queries Centre for Defence Enterprise 01235 438445 cde@dstl.gov.uk www.science.mod.uk/enterprise Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
  • 139. Call technical queries ctcenquiries@dstl.gov.uk Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  • 140. Further information www.science.mod.uk Events and Calls > Current calls for proposals > The Challenges of Countering Terrorist Networks Webinar – Tuesday 26 March 2013 12:30-13:30 Details on the call webpage Email craig.cook@aadktn.co.uk to join Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012