big data and analytics for national security...

30
Big Data and Analytics for National Security Sean Fahey, JHU/APL [email protected]

Upload: others

Post on 26-Jun-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Big Data and Analytics for National Security

Sean Fahey, JHU/APL [email protected]

Page 2: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Ques%ons  for  the  Talk  

•  What  big  data  challenges  are  being  faced  in  the  na%onal  security  environment?  

•  How  are  federal  government  agencies  using  big  data  approaches  for  na%onal  security  challenges?  

•  What  is  unique/different  about  big  data  in  the  na%onal  security  seAng?  

•  What  solu%ons  are  currently  being  sought  by  the  government  to  address  na%onal  security  challenges  with  big  data?  

Page 3: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

US  Na%onal  Security  Strategy  •  Our  Interests  

–  Security  –  Prosperity  –  Values  –  Interna%onal  Order  

•  Our  Approach  –  Defense  –  Diplomacy  –  Economic  –  Development  –  Homeland  Security  –  Intelligence  –  Communica%ons  –  People  

Page 4: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Major  Na%onal  Security  Missions  

•  Conven%onal  Military  Defense  •  Counter  Nuclear  Prolifera%on  •  Counter  Chemical/Biological  WMD  •  Counter  Terrorism  •  Cybersecurity  •  Counter  Intelligence  •  Counter  Narco%cs    

Page 5: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

(Some)Na%onal  Security  Organiza%ons  

Homeland    Security  Intelligence  

Defense  

Department  of  Defense  

NORTHCOM  

Department  of  Homeland  Security  

Defense  Intelligence  Agency  

Director  of  Na%onal  

Intelligence  

Federal  Bureau  of  Inves%ga%on  

Page 6: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Defense  Posi%ons  and  Tasks  

Intelligence  (J-­‐2)   Planning  (J-­‐5)   Opera5ons  (J-­‐3)  

•  Requirements  •  Planning  •  Collec%on  •  Processing  •  Exploita%on  •  Dissemina%on  •  Archiving  and  retrieval  

•  Mission  Analysis  •  Course  of  Ac%on  (COA)

Development  •  COA  Analysis  and  

Wargaming  •  COA  Comparison  •  COA  Approval  •  Plan  Development  

 

•  Shape  •  Deter  •  Seize  Ini%a%ve  •  Dominate  •  Stabilize  •  Enable  Civil  Authority  

Page 7: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Intelligence  Cycle  •  The  process  of  developing  unrefined  data  into  polished  intelligence  for  the  

use  of  policymakers.  The  intelligence  cycle  consists  of  six  steps,  described  below.  

Page 8: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Source:  DoD  JP  2-­‐0  

Page 9: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Intelligence  Disciplines  

SIGINT    Signals  intelligence  

IMINT  Image  Intelligence  

MASINT  Measurement  and  

Signature  Intelligence  

OSINT  Open  Source  Intelligence  

HUMINT  Human  Intelligence  

GEOINT  Geospa%al  Intelligence    

Source:  h`p://www.dni.gov  

Page 10: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Aerial  Reconnaissance:  WWII  

Collec%on  Processing  

and  Exploita%on  

Analysis  and  Produc%on   Dissemina%on  

Page 11: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Aerial  Reconnaissance:  ~2012  

Collec%on  Processing  

and  Exploita%on  

Analysis  and  Produc%on   Dissemina%on  

 The  full  mo%on  video  from  each  of  the  imaging  sensors  can  be  viewed  as  separate  video  streams  or  fused  together.  

•  infrared  sensor  •  color/monochrome  

daylight  TV  camera,  •  image-­‐intensified  

TV  camera,  •  laser  designator  •  laser  illuminator  

Aerial  reconnaissance  teams  are  in  direct  communica%on  with  supported  units  

Page 12: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Aerial  Reconnaissance:  ~2015  

Collec%on  Processing  

and  Exploita%on  

Analysis  and  Produc%on   Dissemina%on  

Page 13: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu
Page 14: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Na%onal  Security  Big  Data  Challenges  

•  Mari%me  Security  •  Cyber  Security  •  Money  Laundering  •  Mul%-­‐INT  Analysis  •  Space  Situa%onal  Awareness  

Page 15: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

CIA  CTO  Perspec%ve  on  Big  Data  

Source:    h`p://www.slideshare.net/brianahier/perspec%ves-­‐on-­‐big-­‐data-­‐mission-­‐and-­‐needs-­‐gus-­‐hunt-­‐cia-­‐cto  

Page 16: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

US  Government  Big  Data  Strategy  

•  White  House  has  acknowledged  the  importance  of  Big  Data  for  mul%ple  disciplines  

Page 17: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Big  Data  Ini5a5ve  for  Research  and  Development  

•  Ini%a%ve  Goals  – Advance  state-­‐of-­‐the-­‐art  core  technologies  needed  to  collect,  store,  preserve,  manage,  analyze,  and  share  huge  quan%%es  of  data.    

– Harness  these  technologies  to  accelerate  the  pace  of  discovery  in  science  and  engineering,  strengthen  our  na%onal  security,  and  transform  teaching  and  learning;  and  

– Expand  the  workforce  needed  to  develop  and  use  Big  Data  technologies.  

Page 18: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

•  Data  to  Decisions  Ini5a5ve  – Challenge  –  The  prolifera%on  of  sensors  and  large  data  sets  are  overwhelming  analysts,  as  they  lack  the  tools  to  efficiently  process,  store,  analyze,  and  retrieve  vast  amounts  of  data.    

– Goal  -­‐  Develop  an  open-­‐source  architecture  system  that  enables  rapid  integra%on  of  exis%ng  and  future  data  exploita%on  tools  to  achieve  a  new  paradigm  in  the  management  and  analysis  of  data.    

Source:  h`p://www.acq.osd.mil/chiehechnologist/areas/dtd.html  

Page 19: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu
Page 20: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu
Page 21: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu
Page 22: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu
Page 23: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Challenges  for  Na%onal  Security  Big  Data  

•  Government  Budget  Process  •  Government  Acquisi%on  Process  •  Siloed  and  Proprietary  Systems  •  Data  Balkaniza%on  and  Compartmentaliza%on  

•  Government  Privacy  Obliga%ons  and  Data  Mining  Restric%ons  

•  Personnel  System  Lag  •  Austere  Deployment  Environments  

Page 24: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Government  Budget  Process  

FY2012  

Agency  develops  investment  plans  

Agency  sends  budget  request  to  OMB  

OMB  revises  budget  with  agency  

President  submits  budget  to  Congress  

Congress  debates  budget  and  passes  appropria%ons  bills  

President  signs  budget  

Agencies  have  funds  available  to  spend  

FY2013   FY2014  

Oct              Jan              Apr              Jul   Oct              Jan              Apr              Jul   Oct              Jan              Apr              Jul  

Federal  Government  agencies  have  to  commit  to  specific  spending  programs  roughly  18  months  before  they  begin  spending  

Page 25: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

4

A

Integrated System Design

System Capability & Manufacturing Process Demonstration Low-Rate Initial Production

DefenseAcquisition

System(event-driven)

Planning,Programming,

Budgeting& Execution

Process

MilitaryDepartments andDefense Agencies

FinancialManagement

Integrated Defense Acquisition, Technology, and Logistics Life Cycle Management System

Full-Rate Production/Deployment

Engineering & Manufacturing Development Phase Operations & Support Phase

DoD DecisionSupport SystemsEffective Interaction

is Essential

Life Cycle Sustainment

Decisions

Actual CostsEngineering

Cost EstimationMethods

ParametricAnalogy

Technology Development PhaseMateriel Solution Analysis Phase

WhiteHouse

Office of theSecretary of Defense

and Joint Staff

PMO Budget Estimate

PMO POM Input

Oversight&

Review

ExitCriteria

ExitCriteria

ADMExit

CriteriaMet Exit

Criteria

ADMExit

Criteria

ADM

MBI Apportionment

Contracting

Production & Deployment Phase

B C

Purpose of LRIP: •Complete manufacturing development•Establish initial production base•Ramp to production rate•Produce systems for IOT&E

Low-Rate Initial Production

Systems

FCA

Prototypes

Version 5.4 15 June 2010

StudyContracts

Complete Analysis of Alternatives to assess potential materiel solutions to capability need, identify key technologies and estimate life cycle costs.

Consider commercial-off-the-shelf and solutions from both large andsmall business. Identify materiel solution to capability need.

Complete Technology Development Strategy.

Reduce technology risk, determine and mature appropriate set of technologies to integrate into full system, demonstrate critical technology elements on prototypes, and complete preliminary design. Identify an

affordable program or increment of militarily useful capability, demonstrate technology in relevant environment, and identify and assess manufacturing risks. Provide for two or more competing teams

producing prototypes of system and/or key system elements prior to or through Milestone B.

Develop a system or increment of capability; complete full system integration, develop affordable and executable manufacturing process; ensure operational supportability; reduce logistics footprint; implement human systems integration; design for producibility; ensure

affordability; protect critical program information; and demonstrate system integration, interoperability, safety, and utility.

Achieve operational capability that satisfies mission needs. Low-rate initial production (limited deployment for software intensive systems with no development hardware) and full-rate production (full deployment for software intensive systems). Deliver

fully funded quantity of systems and supporting material and services for program or increment to users.

Execute support program that meets materiel readiness and operational support performance requirements and

sustains system in most cost-effective manner. Overlaps Production and Deployment Phase.

July

August - November November December

January February (1st Monday)

Disposal

SystemPerformance

Spec

ProductionRepresentative

Articles

CARD – Cost Analysis Requirements DescriptionCCE – Component Cost EstimateCCP – Component Cost PositionICE – Independent Cost EstimateMDAP – Major Defense Acquisition ProgramMAIS – Major Automated Information SystemPMO – Program Management OfficeRDT&E – Research, Development, Test & Evaluation

Cost Acronyms

FYDP – Future Years Defense ProgramMBI – Major Budget IssuesOMB – Office of Management and Budget

PMO – Program Management OfficePOM – Program Objectives Memorandum

Planning, Programming, Budgeting, and Execution Acronyms

Joint Capabilities Integration & Development

System(need-driven)

AoAupdated as necessary

Full-RateProduction

Systems

MajorProducts

Operations andMaintenance

Types ofFunds RDT&E – Management & Support RDT&E – Management & SupportRDT&E – Management & Support

RDT&E – Advanced Component Development and Prototypes RDT&E – Systems Development & Demonstration

FinalProductBaseline

RDT&E – Advanced Technology Development

FOT&E

TechnicalSystems EngineeringTest and EvaluationSupportability

Analyze/Assess Concepts Versus

Defined User Needs &Environmental Constraints

Decompose Concept Functional Definition into Component Concepts &Assessment Objectives

Develop Component Concepts, i.e., Enabling/Critical

Technologies, Constraints, & Cost/Risk Drivers

Design/Develop System Concepts,i.e., Enabling/Critical Technologies,

Update Constraints, & Cost/Risk Drivers

•ICD•AoA Study Plan•Exit Criteria•Alternative Maintenance & Sustainment Concepts

OUTPUTS

Trades Trades

Implement andField

• Process Change - Operations/Maintenance Support

• Materiel Change- Hardware/Product Support Package

INPUTS•Service Use Data•User Feedback •Failure Reports•Discrepancy Reports•SEP•System Safety Analysis•Product Support Element

Requirements

OUTPUTSIntegrated DT&E/OT&E/LFT&E

Demonstrate System toSpecified User Needs andEnvironmental Constraints

•ICD & Draft CDD•Approved Materiel Solution•Exit Criteria •Support & Maintenance Concepts& Technologies•Systems Engineering Plan•AoA Report •T&E Strategy•Technology Development Strategy•System Safety Analysis

Analyze DeficienciesTo Determine Corrective

Actions

OUTPUTS

Modify Configuration(Hardware/Software/Specs)

To Correct Deficiencies

LeastAcceptable

MostAcceptable

Recycle/Reuse

Reprocessing

DisposalLandfill

Disposal

Logistics/Sustainment

•Test Results •Exit Criteria•APB •CPD •SEP •TEMP•Product Support Element

Requirements•PESHE•System Safety Analysis

INPUTS

Evaluate ProductSupport Capabilities

Performance-Based Agreements

Product Support Integrator/Product Support Provider

LFTEReport to Congress

BLRIPReport to Congress

Post-CDR AFRPDRB

Demonstrate Product Support Capability•Footprint Reduction •Supply Chain Management•Product Support Elements•Finalize Product Support BCA

Verify and ValidateProduction

Configuration

•Preliminary System Spec•Systems Engineering Plan•T&E Strategy•System Safety Analysis•Support & Maintenance Concepts& Technologies

•Inputs to:-draft CDD -AoA -TDS -IBR-Cost/Manpower Est.-Product Support Strategy

ASR

•System Allocated Baseline•PDR Report •Test Reports•SEP •TEMP •PESHE •PPP •TRA•NEPA Compliance Schedule•Risk Assessment •LCSP•Validated Systems Support & MaintObjectives & Requirements•System Safety Analysis•Inputs to: -CDD -ISP -STA -IBR

-Acq Strategy-Affordability Assessment-Cost/Manpower Est.

SVR PRR

•Initial Product Baseline•Test Reports•SEP •TRA •PESHE •TEMP•NEPA Compliance Schedule•Elements of Product Support •Risk Assessment•Life Cycle Sustainment Plan•System Safety Analysis•Inputs to: -CPD -STA -ISP

-IBR -Cost/Manpower Est.

•Data for In-Service Review•Input to CDD for next increment•Modifications/upgrades to fielded

systems•SEP •Test Reports•System Safety Analysis•Product Support Package

•Product Baseline•Test Reports•SEP •PESHE •TEMP •System Safety Analysis •Inputs to: -IBR

- Cost/Manpower Est.- Product Support Package

JITC Joint Interoperability Test Certification

PCA

Develop Initial Product Support StrategyInitiate Product Support BCA

(Define Ground Rules & Assumptions)

Performance-Based Logistics (PBL) Strategy (Preferred Product Support Approach)

Refine Supportability

Objectives/Constraints

Pre-IOC and Post IOC Supportability Assessments

Post-DeploymentReview

In-ServiceReview

Fabricate, Assemble,Code to “Build-to”

Documentation

TLCSMTLCSM TLCSMTotal Life

Cycle SystemsManagement

For a single copy of this chart, send a request to [email protected] Send recommendations to improve the content of this chart to [email protected]

INPUTSINPUTSINPUTS OUTPUTS OUTPUTS

(annual-calendar-driven)

Congressional Budget Process

AppropriationCommittees

AuthorizationCommittees

Authorization/AppropriationActs Passed

Joint Operations ConceptsConcept of Operations

Operations Plans

Strategic Guidance

Initiate Evolutionary Acquisition Strategy Evolutionary Acquisition Strategy

MDA

DoD Testimony DoD Appeals

C

DAB/ITAB MDA

ExitCriteria

ADM

OMB

Joint Operations ConceptsConcept of Operations

Technology Development StrategyAoA Report

DoD Enterprise Architecture &Solution Architecture

Technical Standards Profile

Threshold/objective tradeoffs –Revised Performance Attributes

Appropriated Funds To Support Contracts

Business CaseAnalysis

Component/JROCValidation &

ApprovalKPPs

CDDDraftCDD

KPPs

CPD

ExitCriteria

MS BCert

Cost-TypeContract

Determination(if applicable)

ADM

FRP

B C

FRP

ExitCriteria

MetAPBPSR

Monitor & CollectService Use & Supply

Chain Performance Data

Analyze Data to:Validate Failures &

Determine Root Causes

DetermineSystem Risk/

Hazard Severity

DevelopCorrective

Action

Integrate and TestCorrective Action

Assess Risk of Improved System

Interpret User Needs,Analyze Operational

Capabilities &Environmental Constraints

VerificationLinkage

ValidationLinkage

VerificationLinkage

VerificationLinkage

VerificationLinkage

ValidationLinkage

VerificationLinkage

VerificationLinkage

VerificationLinkage

Verification/ValidationLinkage

VerificationLinkage

VerificationLinkage

ITR

Verification/ValidationLinkage

MS ACert

ADM

AoA

Fiscal Guidance

InitialProductBaseline

(verified)

Non-materiel solutions

JROC/Component

Validation andApproval

DCR

AoA Study Guidance

AoA Study Plan

Define Supportability

Objectives

ExitCriteria

MetAPB

MTA

FMECAFTA

LORA

RCM

MSB

Threshold/objective tradeoffs –Revised Performance Attributes

MSC

MSA

Joint Capabilities Integration& Development System

VCJCS OversightCJCSI 3170.01 series

DefenseAcquisition

SystemUSD(AT&L) Oversight

DoDD 5000.01

Planning,Programming,

Budgeting & ExecutionProcess

DEPSECDEF OversightDoD 7000.14-R

Threshold/objective tradeoffs –Revised Performance Attributes

Prototypes

Product Support Plan•Statutory/Regulatory•Source of Support•Legacy Considerations•Conduct Product Support BCA

-Supply Support -Training-Maintenance -Support Data

-Manpower & personnel

•Product Support ElementsSet Product Support

Strategy

Technical & Logistics AcronymsASR – Alternative Systems ReviewAOTR – Assessment of Operational Test ReadinessBCA – Business Case AnalysisBLRIP – Beyond Low Rate Initial ProductionCDR – Critical Design ReviewCI – Configuration ItemDT&E – Developmental Test & EvaluationEOA – Early Operational AssessmentESOH – Environment, Safety & Occupational HealthFCA – Functional Configuration AuditFMECA – Failure Mode Effects & Criticality AnalysisFOT&E – Follow-On Test & EvaluationFTA – Failure Tree AnalysisIOT&E – Initial Operational Test & EvaluationISR – In-Service ReviewISP – Information Support PlanITR – Initial Technical ReviewJITC – Joint Interoperability Test CommandLFT&E – Live Fire Test & EvaluationLORA – Level of Repair AnalysisMTA – Maintenance Task AnalysisNEPA – National Environmental Policy Act

OA – Operational AssessmentOTRR – Operational Test Readiness ReviewPBA – Performance-Based AgreementPESHE – Programmatic Environment,

Safety & Occupational Health EvaluationPDR – Preliminary Design ReviewPCA – Physical Configuration AuditPRR – Production Readiness ReviewPPP – Program Protection PlanPSI – Product Support IntegratorPSP – Product Support ProviderRCM – Reliability Centered MaintenanceRMS – Reliability, Maintainability & SupportabilitySEP – Systems Engineering PlanSFR – System Functional ReviewSRR – System Requirements ReviewSTA – System Threat AssessmentSVR – System Verification ReviewTEMP – Test & Evaluation Master PlanTDS – Technology Development StrategyTRA – Technology Readiness AssessmentTRR – Test Readiness Review

LFT&EWaiver

(if appropriate)

Final RFP cannot be released until TDS is approved

(with alternate LFT&E Plan)

Post-CDR Report

A

P-CDRA Increment 3

Increment 2P-CDRA

Procurement

Capabilities-BasedAssessment

Final RFP cannot be released until Acq Strategy is approved

Final RFP cannot be released until Acq Strategy is approved

Final RFP cannot be released until Acq Strategy is approved

AoAupdated asnecessary AoAMAIS

only

Following the Materiel Development Decision, the Milestone Decision Authority may authorize entry into the acquisition process at any point, consistent with phase-specific entrance criteria and statutory requirements

Joint Capabilities Integration and Development System - AcronymsCDD – Capability Development DocumentCPD – Capability Production DocumentDCR – DOTMLPF Change RecommendationDOTMLPF – Doctrine, Organization, Training, Materiel,

Leadership and Education, Personnel, & FacilitiesFOC – Full Operational CapabilityICD – Initial Capabilities Document

IOC – Initial Operational CapabilityIT – Information TechnologyJP 3-0 – Joint Publication 3-0, “Joint Operations”JROC – Joint Requirements Oversight CouncilMUA – Military Utility AssessmentKPP – Key Performance ParameterKSA – Key System Attribute

Decompose FunctionalDefinitions into CriticalComponent Definition &

Technologies Verification PlanCDR

•Sys Performance Spec•Acquisition Strategy•Exit Criteria•APB •CDD •STA •ISP •SEP •TEMP •PESHE •PPP •NEPA Compliance Schedule•Risk Assessment•Validated Sys Support & MaintObjectives & Requirements

•Product Support Strategy•System Safety Analysis

Validated and approved CDD & CPD for each increment of

evolutionary acquisition

AMDD

ADM – Acquisition Decision MemorandumAoA – Analysis of AlternativesAPB – Acquisition Program BaselineCDR – Critical Design ReviewCBRN – Chemical, Biological, Radiological & NuclearDAB – Defense Acquisition BoardECP – Engineering Change ProposalESOH – Environment, Safety, and Occupational HealthEVM – Earned Value ManagementFRPDR – Full Rate Production Decision ReviewFDDR – Full Deployment Decision ReviewIBR – Integrated Baseline ReviewITAB – Information Technology Acquisition BoardLRIP – Low Rate Initial Production

MAIS – Major Automated Information SystemMDA – Milestone Decision AuthorityMDD – Materiel Development DecisionNSS – National Security SystemsPDR – Preliminary Design ReviewP-CDRA – Post Critical Design Review AssessmentP-PDRA – Post PDR AssessmentPSR – Program Support ReviewRAM-C – Reliability, Availability, Maintainability & Cost

Rationale ReportRFP – Request for ProposalsRFI – Request for InformationTRA – Technology Readiness AssessmentTLCSM – Total Life Cycle Systems Management

Oversight & Review and Contracting Acronyms

Selectively AppliedSystemTraining

KPP

EnergyEfficiency

KPPJoint Staff Review

J-1 – Joint manpower. J-2 – Intelligence/threat. J-3 – Operational suitability, sufficiency, &

supportability. J-4 – Facilities, sustainment, & energy efficiency. J-5 – Alignment with strategy & priorities.

J-6 – IT/NSS interoperability & supportability.J-7 – Systems training. J-8 – Weapons safety.

System Threat AssessmentForce

ProtectionKPP

SurvivabilityKPP

Selectively AppliedSystemTraining

KPP

EnergyEfficiency

KPPJoint Staff Review

J-1 – Joint manpower. J-2 – Intelligence/threat. J-3 – Operational suitability, sufficiency, &

supportability. J-4 – Facilities, sustainment, & energy efficiency. J-5 – Alignment with strategy & priorities.

J-6 – IT/NSS interoperability & supportability.J-7 – Systems training. J-8 – Weapons safety.

Joint Staff ReviewJ-1 – Joint manpower. J-2 – Intelligence/threat.

J-3 – Operational suitability, sufficiency, & supportability. J-4 – Facilities, sustainment, & energy efficiency. J-5 – Alignment with strategy & priorities.

J-6 – IT/NSS interoperability & supportability.J-7 – Systems training. J-8 – Weapons safety.

KPPsTraceable To ICD &

JP 3-0

System Threat AssessmentForce

ProtectionKPP

SurvivabilityKPP

System Threat AssessmentForce

ProtectionKPP

SurvivabilityKPP

Selectively AppliedSystemTraining

KPP

EnergyEfficiency

KPP

ADMPost-

PDR A

Required if PDR is after Milestone B

ExitCriteria

MetPSR

Demo & Validate System& Tech Maturity Versus Defined User Needs &

Environmental Constraints

(If program initiation, or if equiv to FDDR)

Clinger-Cohen Act (IT incl NSS)- Compliance- CIO Confirmation of Compliance

Post-CDR ADecision Points/Milestones MDD FRP

DR IOC FOC

SRR

This chart is a classroom aid for Defense Acquisition University students. It provides a notional illustration of interfaces among three major decision support systems used to develop, produce and field a weapon system for national defense. Defense acquisition is a complex process with many more activities than shown here and many concurrent activities that cannot be displayed on a two-dimensional chart. Supporting information is on back of this chart. For more information, see the Defense Acquisition Portal (http://dap.dau.mil).

PSRTRA Exit

CriteriaMet

APBPSR

TRA

PDR Report

Clinger-Cohen Act (IT incl NSS)- Compliance- CIO Confirmation of Compliance

Clinger-Cohen Act (IT incl NSS)- Compliance- CIO Confirmation of Compliance

Clinger-Cohen Act (IT incl NSS)- Compliance- CIO Confirmation of Compliance

Component/JROCValidation &

Approval

Component/JROCValidation &

Approval

FDDRFor software intensive systems

DAB/ITAB MDA DAB/

ITAB MDA DAB/ITAB MDA DAB/

ITAB MDA

Compliant Solution

Architectures

SupportabilityRequirements

InformationAssurance

Net Centric Data & Services

Strategy

TechnicalStandards & interfacesNet-Ready

KPP

Compliant Solution

Architectures

SupportabilityRequirements

InformationAssurance

Net Centric Data & Services

Strategy

TechnicalStandards & interfacesNet-Ready

KPP

Compliant Solution

Architectures

SupportabilityRequirements

InformationAssurance

Net Centric Data & Services

Strategy

TechnicalStandards & interfacesNet-Ready

KPP

AlternativeMateriel

Solutions

InitialProductBaseline

InformationSupport

Plan

MUA/Final Demo Report for

Joint Capability Technology Demonstrations & other

prototype projects

InformationSupport

Plan

MUA/Final Demo Report for

Joint Capability Technology Demonstrations & other

prototype projects

InformationSupport

Plan

MUA/Final Demo Report for

Joint Capability Technology Demonstrations & other

prototype projects

KPPsTraceable To ICD &

JP 3-0

KPPsTraceable To ICD &

JP 3-0

Materiel Availability &Operational Availability

ReliabilityKSA

OwnershipCostKSA

AvailabilityKPP

Materiel Availability &Operational Availability

ReliabilityKSA

OwnershipCostKSA

AvailabilityKPP

Materiel Availability &Operational Availability

ReliabilityKSA

OwnershipCostKSA

AvailabilityKPP

ICD

Joint Operations ConceptsConcept of Operations

System Threat AssessmentAoA (if updated)

DoD Enterprise Architecture &Solution Architecture

Information Support PlanTechnical Standards Profile

Joint Operations ConceptsConcept of Operations

System Threat AssessmentAoA (if updated)

DoD Enterprise Architecture &Solution Architecture

Information Support PlanTechnical Standards Profile

CCE CCPMDAP

CARDMDAP/MAIS

ICEMDAP

CCEMDAP

CCP AffordabilityAssessment CARD

MDAP/MAIS

ICEMDAP

CCE CCPCARDMDAP/MAIS

CARDMDAP/MAIS

ICEMDAP

CCE CCP AffordabilityAssessment

Economic Analysis (MAIS)Manpower Estimate (MDAP) Manpower Estimate (MDAP)

Lighter blocks reflect technical efforts required if PDR is

required after Milestone B.

TD PhaseFully Funded

Full FundingIn FYDP Full Funding

In FYDPFull FundingIn FYDP

Acquisition Strategy• Acquisition Approach• Source & Related Documents• Capability Needs• Top-Level Integrated Schedule• Program Interdependency &

Interoperability Summary• International Cooperation• Risk & Risk Management• Technology Maturation• Industrial Capability &

Manufacturing Readiness• Business Strategy

• Resource Management• Program Security Considerations• Test & Evaluation• Data Management • Life-Cycle Sustainment Planning• Life-Cycle Signature Support Plan• CBRN Survivability• Human Systems Integration• ESOH• Military Equipment Valuation &

Accountability• Corrosion Prevention & Control

March

Fiscal GuidanceApril

POM/Budget Formulation

SECDEF Option

Assess/AnalyzeConcept & Verify System Concept’s

Performance

Develop Concept Performance (& Constraints)

Definition & VerificationObjectives

Decompose ConceptPerformance into

Functional Definition &Verification Objectives

Assess/AnalyzeSystem Concept

Versus FunctionalCapabilities

Assess/AnalyzeEnabling/Critical

Components VersusCapabilities

Interpret User Needs.Analyze Operational

Capabilities & Environmental Constraints

Develop System Performance(& Constraints) Spec &

Enabling/Critical Tech &Prototypes Verification Plan

Demo System & PrototypeFunctionalityVersus Plan

Develop FunctionalDefinitions for Enabling/

Critical Tech/Prototypes &Associated Verification Plan

Demo Enabling/Critical Technology Components

Versus Plan

Demo/ModelIntegrated System Versus

Performance Spec

Interpret User Needs, Refine System

Performance Specs &Environmental Constraints

Interpret User Needs, Refine System

Performance Specs &Environmental Constraints

Evolve FunctionalPerformance Specs into

System Allocated Baseline

PDR

Develop System Functional Specs & Verification Plan toEvolve System Functional

Baseline

Evolve FunctionalPerformance Specs into

System Allocated Baseline

SFR

PDR

System DT&E, OT&E, LFT&E& OAs Verify System

Functionality & ConstraintsCompliance to Specs

Integrated DT&E, LFT&E & EOAs Verify Performance

Compliance to Specs

Individual CIVerification

DT&E

TRR

SFR

Develop System Functional Specs & Verification Plan toEvolve System Functional

Baseline

Contract Management ECPs/ChangesContractCloseout

Acq Plan

Draft RFP

RFP &Proposals

Source Selection

Plan

SourceSelection

Draft RFP

RFP &Proposals

Source Selection

Plan

SourceSelection

• Acquisition Approach• Source & Related Documents• Capability Needs• Top-Level Integrated Schedule• Program Interdependency &

Interoperability Summary• International Cooperation• Risk & Risk Management• Technology Maturation &

Competitive Prototyping• Industrial Capability &

Manufacturing Capabilities

• Business Strategy• Resource Management• Program Security

Considerations• Test Planning• Data Management &

Technical Data Rights• Life-Cycle Sustainment

Planning• Life-Cycle Signature

Support Plan• CBRN Survivability

Technology Development Strategy (TDS) Acquisition Strategy• Acquisition Approach• Source & Related Documents• Capability Needs• Top-Level Integrated Schedule• Program Interdependency &

Interoperability Summary• International Cooperation• Risk & Risk Management• Technology Maturation• Industrial Capability &

Manufacturing Readiness• Business Strategy

• Resource Management• Program Security Considerations• Test & Evaluation• Data Management • Life-Cycle Sustainment Planning• Life-Cycle Signature Support Plan• CBRN Survivability• Human Systems Integration• ESOH• Military Equipment Valuation &

Accountability• Corrosion Prevention & Control

Acquisition Strategy• Acquisition Approach• Source & Related Documents• Capability Needs• Top-Level Integrated Schedule• Program Interdependency &

Interoperability Summary• International Cooperation• Risk & Risk Management• Technology Maturation• Industrial Capability &

Manufacturing Readiness• Business Strategy

• Resource Management• Program Security

Considerations• Test & Evaluation• Data Management • Life-Cycle Sustainment Planning• Life-Cycle Signature Support

Plan• CBRN Survivability• Human Systems Integration• ESOH• Corrosion Prevention & Control

EVMSurveillance

TechnologyDevelopment

ContractIBR

Draft RFP

RFP &Proposals

Source Selection

Plan

SourceSelection

MaterielSolution

PDR Report

POM/Budget Submit

Draft RFPAcq Plan

RFP &Proposals

Source Selection

Plan

SourceSelection

ContractManagement ECPs/ChangesContractCloseout

EVMSurveillance

Engineering & Manufacturing

Development ContractIBR

Acq Plan

Acq Plan

ContractManagement ECPs/ChangesContractCloseout

EVMSurveillance

LRIPContract

IBR

ContractManagement ECPs/ChangesContractCloseout

EVMSurveillance

ProductionContract

IBR

Production Qualification Testing

Joint Interoperability Certification Testing

Full-Up System Level LFT&E

IOT&E

AOTR OTRR

Post-Production Software Support Contracts

ICEMDAP MDAP

Economic Analysis (MAIS)Manpower Estimate (MDAP)

MSA PhaseFully Funded

as required

MDAP

Economic Analysis (MAIS)

Evolve CI FunctionalSpecs into Product

(Build to) Documentation& Verification Plan

Initial RAM-CReport

Sustainment Contracts

Product Support Package/PBL Implementation•Product Support Elements •Support and Cost Baseline•Contract for Sustainment (organic & Commercial)

•Supply Chain Management•Revalidate BCA•Refine Life Cycle Sustainment Plan

•Continuous Tech Refreshment•Obsolescence Management•Configuration Control•Data Management•Monitor Performance & Adjust Product Support

Product Support/PBL Management•Public-Private Partnering•Supply Chain Management•PBA Modifications•Assessment of PSI/PSPs•Revalidate PBA/BCA

Operations and Sustainment•Peacetime•Training•Revalidate BCA

•Joint Operations •Crises•Refine LCSP

DoD BudgetIntegrated Program/Budget Review

President’s Budget toCongress

Allocation

FYDPupdated

FYDPupdated

February – September

BudgetCommittees

Defense Planning & Programming Guidance

Issue Nominations/Disposition

National Strategy Documents (updated as necessary)

National Security Strategy

National Defense Strategy

National Military Strategy

Government  Acquisi%on  Process  

Page 26: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Siloed  and  Proprietary  Systems  

•  Government  IT  systems  have  historically  been  procured,  developed,  accredited  and  maintained  as  stand  alone  systems  

Video   LIDAR   Image   Biometric   Text   Audio  

Page 27: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Data  Balkaniza%on  and  Compartmentaliza%on  

Coali%on  

US  Persons  

Unclassified  

Secret  

Top  Secret  

SCI  

Page 28: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Government  Privacy  Obliga%ons  and  Data  Mining  Restric%ons  

•  US  Cons%tu%on  Protec%ons  •  Privacy  Act  of  1974  •  Privacy  Impact  Assessments  •  US  Persons  Protec%ons    

Page 29: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Personnel  System  Lag  Recrui5ng  and  training  systems  

were  designed  for   …not    

Page 30: Big Data and Analytics for National Security 20120711mmds-data.org/presentations/2012/s-fahey.pdf · Big Data and Analytics for National Security Sean Fahey, JHU/APL sean.fahey@jhuapl.edu

Austere  Deployment  Environments  

•  Limited  Power,  Space  and  Cooling  

•  Limited  or  intermi`ent  bandwidth  to  end  users