secure communications - cde themed call launch 18 june 2013

Post on 16-May-2015

839 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

Presentation slides from CDE themed call launch event on 18 June - for full details of this call for research proposals see http://www.science.mod.uk/events/event_detail.aspx?eventid=259

TRANSCRIPT

Secure Communications

Centre for Defence Enterprise

Wing Commander Jim Pennycook

Rapid technological change

© Crown Copyright MOD 2011

The aim of CDE

© Crown Copyright MOD 2011

Prove the value of novel, high-risk, high-potential-benefit research

© Crown Copyright MOD 2011

To enable development of cost-effective military capability advantage

19 June 2013

Five key operating principles underpin the CDE model

Engaging innovators

19 June 2013

Accessible opportunity

Sustaining incentives

Minimising participation costs

Compliance

Intellectual property

Two routes to funding

Online bid submission

Themed calls

Dstl is part of the

Ministry of Defence

Crown Copyright (c) 2012

Centre for Defence Enterprise

www.science.mod.uk/enterprise cde@dstl.gov.uk

UNCLASSIFIED / FOR PUBLIC RELEASE

CDE themed call programme

Countering insider threat attacks Call closes 27 Jun 2013

Secure communications Call closes 22 Aug 2013

Innovation in drug development processes

Call launch 25 June 2013

Enhancing military medical training and support for the medic

Call launch 16 July 2013

Novel solutions for emulating ship signatures

Call launch 23 July 2013

Register and further details at www.science.mod.uk under ‘Events and Calls’

All call close at 17:00 hrs

Defence Open Call

Seeking the exceptional

4438 proposals received

17% proposals funded

£39M contracts awarded

Exemplar project

Fuel efficiency

‘Micro generators’

© Crown Copyright MOD 2011

Effective proposals

Challenge, pace & exploitation

The future of CDE

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda

Secure Communications

Network and question

Centre for Defence Enterprise

01235 438445

cde@dstl.gov.uk www.science.mod.uk/enterprise

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda

Secure Communications

Military Context

Squadron Leader Mike Leaman

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

© Crown copyright 2013 Dstl

19 June 2013

Military

communications

Usable

Reliable

Deployable

© Crown copyright 2013 Dstl

19 June 2013

Future operating

environment

Congested

Cluttered

Contested

Connected

Constrained

© Crown copyright 2013 Dstl

19 June 2013

Short-notice overseas deployments

© Crown copyright 2013 Dstl

19 June 2013

Coalition multi-agency

operations

© Crown copyright 2013 Dstl

19 June 2013

Military „platforms‟

Networking makes the whole

more effective

but

• capacity is limited

• effective integration is

essential

© Crown copyright 2013 Dstl

19 June 2013

The user

Capacity is limited

Risk-based

approach

© Crown copyright 2013 Dstl

19 June 2013

The User

Capacity is limited

© Crown copyright 2013 Dstl

19 June 2013

Military

communications

Usable

Reliable

Deployable

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda

Information Superiority

Joint Forces Command

Dr David Massey MEng MIET

C4ISR Domain Lead

Programme and Delivery Directorate

The Joint Forces Command

Information Superiority account

© Crown copyright 2013 Dstl

19 June 2013

Information Superiority includes:-

– Command, Control, Information &

Intelligence

– Integrated Sensing

– Assured Information Infrastructure

– Decision Support for C4ISR (Command,

Control, Communications, Computing, Intelligence,

Surveillance and Reconnaissance)

– Cyber

– Defence Intelligence

Benefits delivered by the account

• Command & Control (C2) concepts

• Improve Information & Intelligence

• Provide knowledge and tools in

cyberspace

• Provide enhanced and affordable

sensor technologies

© Crown copyright 2013 Dstl

19 June 2013

Upcoming requirements

• Increased emphasis on information analysis

and intelligence production

• Continued emphasis on communications &

networks

• Reduced emphasis on sensors per se with

focus shifted to common sensor modalities

• Experimentation and Decision Support

remain key

• Cyber remains a priority © Crown copyright 2013 Dstl

19 June 2013

Challenges for the future

Support the provision of an

expeditionary command

and inform capability that

is sufficiently sustainable,

scalable and interoperable

© Crown copyright 2013 Dstl

19 June 2013

Challenges for the future Appropriate combination of

sensors/platforms,

infrastructure and exploitation

capabilities to generate timely

situation awareness

– Eg common architectures

based on wideband multi-

function radio frequency (RF)

systems for manned and

unmanned combat air

systems.

© Crown copyright 2013 Dstl

19 June 2013

Challenges for the future

Cyber situational awareness, defence and

operations including effects delivered

through computers, networks,

electromagnetic (EM) spectrum and

human influence.

© Crown copyright 2013 Dstl

19 June 2013

Key elements of the account

• Supports Joint Forces Command (JFC) Information Superiority

science and technology needs. Incorporates:

– C4ISR (Command, Control, Communications, Computing,

Intelligence, Surveillance and Reconnaissance)

– Cyber

• Directly supports JFC Defence Authorities for C4ISR and Cyber,

Defence Intelligence & other government departments

• As a cross-cutting account, supports the needs of all Front Line

Commands

© Crown copyright 2013 Dstl

19 June 2013

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda

Secure Communications CDE Themed

Call

Introduction

Helen Carlton

© Crown copyright 2013 Dstl

19 June 2013

Assured Information Infrastructure

• Objective

– provide science and technology support to MOD to enable the

realisation of a continuously evolving single, logical,

reconfigurable, resilient information infrastructure across UK

and deployed, fixed and mobile elements

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Assured Information Infrastructure

• The right information, to the right person, in the right

form, at the right time, to support the best decision to

initiate effective action

© Crown copyright 2013 Dstl

19 June 2013

Military vs commercial

© Crown copyright 2013 Dstl

19 June 2013

Time

Technolo

gy P

rogre

ss

UNCLASSIFIED

The challenge

• How can MOD harness civilian advances

– reduced size, weight, power

– open standards

– increased bandwidth, data rate

• In areas such as

– personal communications

– personal computing

– non radio frequency (RF) communications

– automotive communications

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

The challenge

• Against military constraints

– security

– assurance

– integration

– interoperability

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

What we want

• Innovative exploitation of commercial-off-the-shelf

(COTS) technology

• Novel approaches to securing information

infrastructures

• Technology that is inherently small, lightweight and low

power

• Proposals that show how improvements will be

measured and demonstrated

• Practical demonstrations set in a military context

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

What we don‟t want

• Solutions that offer no significant defence and security

benefit

• Technology watch / horizon scanning

• Paper-based studies, roadmaps or technology

prediction

• Impractical solutions or ones requiring internal

changes to COTS

• New encryption algorithms

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Exploitation

• Planned route for exploitation next financial year is via

research programme

• Ideally an exploitation route to military equipment

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

C4ISR Secure Information

Infrastructure Services (CSIIS)

• Framework through which aII research is conducted

• Flexible and fluid consortium led by a Prime

• Duration three years

• Research areas

– Communications and Networks

– Information Assurance

– Knowledge and Information Management

• Start date November 2013

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda

Image is public sector information licensed under the Open Government Licence v1.0

© Crown copyright 2013 Dstl

19 June 2013

Challenge 1

Securing Commercial-off-the-shelf

(COTS) Technology

Trevor Benjamin

Scope

• Networks and Information Infrastructure

– wireless, wired, optical

– networking components

– user terminal devices

– server systems and

cloud technology

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Image is public sector information licensed under the Open Government Licence v1.0

Issues • Major problem – SECURITY

• Mismatch - civil and military security risks and requirements

• Issues

– implementation standards and quality

– strength of security functionality

– assurance levels

– accreditation

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Constraints

• Commercial off the shelf (COTS)

• Enhanced and strengthened security

• Unmodified COTS

• Capable of evaluation and accreditation

• Solutions might include:

– separate and novel security devices

– add-on security enhancements

– wrap-around security barriers

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Example 1 – Bring your own device

• Benefits of BYOD for MOD

• Work with MOD infrastructure

• Strategic, deployed

and coalition systems

• BYOD that:

– hinder malicious attack

– protect information from compromise

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Image is public sector information licensed under the Open Government Licence v1.0

Example 2 – Novel cryptography • Greater MOD use of civil & plain-text communications

• Cryptography close to edge

• Seeking cryptography solutions – at user device

– embedded in applications

• Device and system issues – key management

– identity management

– how to do cyber defence

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Do not propose new encryption algorithms solutions should use standards-based or government-defined algorithms

Example 3 – Mobile wireless systems

• Wireless is a key enabler for military operations

– currently bespoke radio devices

• COTS could provide:

– ease of use

– smaller size, weight and power

– cheaper solutions

– training savings

– simpler logistics

• Need to enhance security, robustness, ruggedness

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Image is public sector information licensed under the Open Government Licence v1.0

Example 4 – Host-based protection

• Paradigm shift

– move security away from supporting infrastructure

– host based and information based security

• Infrastructure more generic

• Users more responsible for security

• Need novel concepts:

– to enable this change based on COTS

– in security functionality and placement

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Image is public sector information licensed under the Open Government Licence v1.0

Human factors

• The biggest security threat is people!

– work-around security functionality

– undermine original purpose

• Consider the people issues

• Need novel approaches to

– human factors of security solutions

– people, culture and information security

– improved socio-technical systems

– human-computer interactions for system security components

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Image is public sector information licensed under the Open Government Licence v1.0

Summary • Securing COTS

– in MOD communications and information infrastructures

– match protection mechanisms to military risks

• Novel approaches to military security – using COTS without internal modification

– capable of high assurance and being part of accredited systems

• Examples might include: – “Bring your own device” security

– edge cryptographic protection

– secure mobile wireless systems

– host and information based protection

• Consider human factors – relationship between people and information security

– improved socio-technical security systems

– better human-security interfacing

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda

Challenge 2

Mission-Configurable Systems

Simon Baker

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Introduction

• Military C4ISR (Command, Control,

Communications, Computing, Intelligence,

Surveillance and Reconnaissance) systems

– tend to be stove-piped

– making changes is complicated, time consuming

and expensive

© Crown copyright 2013 Dstl

19 June 2013

Revised needs

Courtesy of ISAF Media

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

• Rapidly support changing operational

requirements

• Work effectively within the Combined, Joint,

Intergovernmental, Inter-agency, Multi-national

(CJIIM) context

• Front Line Commands have some flexibility to

establish their “fight tonight” initial capabilities

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

The challenge

• Innovative solutions to help MOD address the adoption

of a flexible and open systems approach across the

C4ISR Domain

• Demonstrate potential impact of different approaches to

the delivery of mission-configurable C4ISR capability,

including the applications and information services

Example 1 – Cloud computing

• Cloud computing, open information services,

virtualisation

• Demonstrate how new systems could manage

– the loss of information services/communications bearers

• provision of a useful level of local services to the affected

users

– reconfiguration of services for new tasks and network

changes

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Example 2 – Access management

• Management and monitoring of access to information

services at different levels of trust

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Example 3 – Operating pictures

• Users want to define their operating pictures, but

mission-critical information must not be masked or

omitted

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Information sharing

• Information needs to be shared across

organisational boundaries

• Need to share information services with

partners at different levels of trust

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Summary

• adaptable solutions

• management of applications and services

• federate with other MOD systems and with external

organisations' systems

• achieve improved resilience, security and

interoperability

• exhibit graceful degradation

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda

Crown Copyright (c) 2012

Centre for Defence Enterprise

www.science.mod.uk/enterprise cde@dstl.gov.uk

UNCLASSIFIED / FOR PUBLIC RELEASE

Centre for Defence Enterprise Submitting a Successful Proposal

Jono Byrne Centre for Defence Enterprise (CDE)

Maximising your chances

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise cde@dstl.gov.uk

Crown Copyright Dstl 2012

Know what is available

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise cde@dstl.gov.uk

Crown Copyright Dstl 2012

Know what is available

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise cde@dstl.gov.uk

Crown Copyright Dstl 2012

Know what is available

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise cde@dstl.gov.uk

Crown Copyright Dstl 2012

Read available

information

Start with –

Quick Start Guide

plus other CDE manuals –

Account Manual, User

Manual, Technology

Application Manual

Know what is available

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise cde@dstl.gov.uk

Crown Copyright Dstl 2012

Know what is available

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise cde@dstl.gov.uk

Crown Copyright Dstl 2012

Developing a CDE proposal

Dstl is part of the

Ministry of Defence

Value from technology

Innovative concept

Future capability

Proof of

concept Incremental development

The essentials

Description

mins

Assessment

Not an exam

MOD Performance Assessment Framework

Five criteria:

Operational relevance

Likelihood of exploitation

Builds critical S&T capability to meet UK needs

Scientific quality/innovation

Science, innovation and technology risk

Commercial tab

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise cde@dstl.gov.uk

Crown Copyright Dstl 2012

Government-furnished X

Health and safety

Ethics

Unclassified

Crown Copyright (c) 2012

Centre for Defence Enterprise

www.science.mod.uk/enterprise cde@dstl.gov.uk

UNCLASSIFIED / FOR PUBLIC RELEASE

Proposal health check

Claim of future benefit

Contribution to future benefit

Logical programme of work

Generation of evidence

Demonstration of progress

Crown Copyright (c) 2012

Centre for Defence Enterprise

www.science.mod.uk/enterprise cde@dstl.gov.uk

UNCLASSIFIED / FOR PUBLIC RELEASE

Based on a claim of future benefit

Contribution to realisation of future benefit

Logical programme of work

Evidential outcomes

Demonstration of progress towards goal

Health check

Early birds

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise cde@dstl.gov.uk

Crown Copyright Dstl 2012

This call closes:

Thursday 22 August 2013

At

17:00 hrs

Deadline

Crown Copyright (c) 2012

Centre for Defence Enterprise

www.science.mod.uk/enterprise cde@dstl.gov.uk

UNCLASSIFIED / FOR PUBLIC RELEASE

Centre for Defence Enterprise

cde@dstl.gov.uk

www.science.mod.uk/enterprise

Call process queries

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise cde@dstl.gov.uk

Crown Copyright Dstl 2012

dstlsecurecommscde@dstl.gov.uk

Call technical queries

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise cde@dstl.gov.uk

Crown Copyright Dstl 2012

www.science.mod.uk

Events and Calls > Current calls for proposals > Secure communications

Webinar: 20 June 12:30-13:30

Register online

Further information

Network and question

15-minute slots

Encourage those who have not worked with us before

Book at registration desk over lunch

Name, organisation, which challenge

Surgery sessions

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda

top related