secure communications - cde themed call launch 18 june 2013

120

Upload: centre-for-defence-enterprise

Post on 16-May-2015

839 views

Category:

Technology


2 download

DESCRIPTION

Presentation slides from CDE themed call launch event on 18 June - for full details of this call for research proposals see http://www.science.mod.uk/events/event_detail.aspx?eventid=259

TRANSCRIPT

Page 1: Secure communications - CDE themed call launch 18 June 2013
Page 2: Secure communications - CDE themed call launch 18 June 2013

Secure Communications

Centre for Defence Enterprise

Wing Commander Jim Pennycook

Page 3: Secure communications - CDE themed call launch 18 June 2013

Rapid technological change

Page 4: Secure communications - CDE themed call launch 18 June 2013

© Crown Copyright MOD 2011

The aim of CDE

Page 5: Secure communications - CDE themed call launch 18 June 2013

© Crown Copyright MOD 2011

Prove the value of novel, high-risk, high-potential-benefit research

Page 6: Secure communications - CDE themed call launch 18 June 2013

© Crown Copyright MOD 2011

To enable development of cost-effective military capability advantage

Page 7: Secure communications - CDE themed call launch 18 June 2013

19 June 2013

Five key operating principles underpin the CDE model

Page 8: Secure communications - CDE themed call launch 18 June 2013

Engaging innovators

Page 9: Secure communications - CDE themed call launch 18 June 2013

19 June 2013

Accessible opportunity

Page 10: Secure communications - CDE themed call launch 18 June 2013

Sustaining incentives

Page 11: Secure communications - CDE themed call launch 18 June 2013

Minimising participation costs

Page 12: Secure communications - CDE themed call launch 18 June 2013

Compliance

Page 13: Secure communications - CDE themed call launch 18 June 2013

Intellectual property

Page 14: Secure communications - CDE themed call launch 18 June 2013

Two routes to funding

Page 15: Secure communications - CDE themed call launch 18 June 2013

Online bid submission

Page 16: Secure communications - CDE themed call launch 18 June 2013

Themed calls

Page 17: Secure communications - CDE themed call launch 18 June 2013

Dstl is part of the

Ministry of Defence

Crown Copyright (c) 2012

Centre for Defence Enterprise

www.science.mod.uk/enterprise [email protected]

UNCLASSIFIED / FOR PUBLIC RELEASE

CDE themed call programme

Countering insider threat attacks Call closes 27 Jun 2013

Secure communications Call closes 22 Aug 2013

Innovation in drug development processes

Call launch 25 June 2013

Enhancing military medical training and support for the medic

Call launch 16 July 2013

Novel solutions for emulating ship signatures

Call launch 23 July 2013

Register and further details at www.science.mod.uk under ‘Events and Calls’

All call close at 17:00 hrs

Page 18: Secure communications - CDE themed call launch 18 June 2013

Defence Open Call

Page 19: Secure communications - CDE themed call launch 18 June 2013

Seeking the exceptional

Page 20: Secure communications - CDE themed call launch 18 June 2013

4438 proposals received

Page 21: Secure communications - CDE themed call launch 18 June 2013

17% proposals funded

Page 22: Secure communications - CDE themed call launch 18 June 2013

£39M contracts awarded

Page 23: Secure communications - CDE themed call launch 18 June 2013

Exemplar project

Page 24: Secure communications - CDE themed call launch 18 June 2013

Fuel efficiency

Page 25: Secure communications - CDE themed call launch 18 June 2013

‘Micro generators’

Page 26: Secure communications - CDE themed call launch 18 June 2013

© Crown Copyright MOD 2011

Effective proposals

Page 27: Secure communications - CDE themed call launch 18 June 2013

Challenge, pace & exploitation

Page 28: Secure communications - CDE themed call launch 18 June 2013

The future of CDE

Page 29: Secure communications - CDE themed call launch 18 June 2013

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda

Page 30: Secure communications - CDE themed call launch 18 June 2013

Secure Communications

Page 31: Secure communications - CDE themed call launch 18 June 2013

Network and question

Page 32: Secure communications - CDE themed call launch 18 June 2013

Centre for Defence Enterprise

01235 438445

[email protected] www.science.mod.uk/enterprise

Page 33: Secure communications - CDE themed call launch 18 June 2013

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda

Page 34: Secure communications - CDE themed call launch 18 June 2013

Secure Communications

Military Context

Squadron Leader Mike Leaman

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Page 35: Secure communications - CDE themed call launch 18 June 2013

© Crown copyright 2013 Dstl

19 June 2013

Military

communications

Usable

Reliable

Deployable

Page 36: Secure communications - CDE themed call launch 18 June 2013

© Crown copyright 2013 Dstl

19 June 2013

Future operating

environment

Congested

Cluttered

Contested

Connected

Constrained

Page 37: Secure communications - CDE themed call launch 18 June 2013

© Crown copyright 2013 Dstl

19 June 2013

Short-notice overseas deployments

Page 38: Secure communications - CDE themed call launch 18 June 2013

© Crown copyright 2013 Dstl

19 June 2013

Coalition multi-agency

operations

Page 39: Secure communications - CDE themed call launch 18 June 2013

© Crown copyright 2013 Dstl

19 June 2013

Military „platforms‟

Networking makes the whole

more effective

but

• capacity is limited

• effective integration is

essential

Page 40: Secure communications - CDE themed call launch 18 June 2013

© Crown copyright 2013 Dstl

19 June 2013

The user

Capacity is limited

Risk-based

approach

Page 41: Secure communications - CDE themed call launch 18 June 2013

© Crown copyright 2013 Dstl

19 June 2013

The User

Capacity is limited

Page 42: Secure communications - CDE themed call launch 18 June 2013

© Crown copyright 2013 Dstl

19 June 2013

Military

communications

Usable

Reliable

Deployable

Page 43: Secure communications - CDE themed call launch 18 June 2013

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda

Page 44: Secure communications - CDE themed call launch 18 June 2013

Information Superiority

Joint Forces Command

Dr David Massey MEng MIET

C4ISR Domain Lead

Programme and Delivery Directorate

Page 45: Secure communications - CDE themed call launch 18 June 2013

The Joint Forces Command

Information Superiority account

© Crown copyright 2013 Dstl

19 June 2013

Information Superiority includes:-

– Command, Control, Information &

Intelligence

– Integrated Sensing

– Assured Information Infrastructure

– Decision Support for C4ISR (Command,

Control, Communications, Computing, Intelligence,

Surveillance and Reconnaissance)

– Cyber

– Defence Intelligence

Page 46: Secure communications - CDE themed call launch 18 June 2013

Benefits delivered by the account

• Command & Control (C2) concepts

• Improve Information & Intelligence

• Provide knowledge and tools in

cyberspace

• Provide enhanced and affordable

sensor technologies

© Crown copyright 2013 Dstl

19 June 2013

Page 47: Secure communications - CDE themed call launch 18 June 2013

Upcoming requirements

• Increased emphasis on information analysis

and intelligence production

• Continued emphasis on communications &

networks

• Reduced emphasis on sensors per se with

focus shifted to common sensor modalities

• Experimentation and Decision Support

remain key

• Cyber remains a priority © Crown copyright 2013 Dstl

19 June 2013

Page 48: Secure communications - CDE themed call launch 18 June 2013

Challenges for the future

Support the provision of an

expeditionary command

and inform capability that

is sufficiently sustainable,

scalable and interoperable

© Crown copyright 2013 Dstl

19 June 2013

Page 49: Secure communications - CDE themed call launch 18 June 2013

Challenges for the future Appropriate combination of

sensors/platforms,

infrastructure and exploitation

capabilities to generate timely

situation awareness

– Eg common architectures

based on wideband multi-

function radio frequency (RF)

systems for manned and

unmanned combat air

systems.

© Crown copyright 2013 Dstl

19 June 2013

Page 50: Secure communications - CDE themed call launch 18 June 2013

Challenges for the future

Cyber situational awareness, defence and

operations including effects delivered

through computers, networks,

electromagnetic (EM) spectrum and

human influence.

© Crown copyright 2013 Dstl

19 June 2013

Page 51: Secure communications - CDE themed call launch 18 June 2013

Key elements of the account

• Supports Joint Forces Command (JFC) Information Superiority

science and technology needs. Incorporates:

– C4ISR (Command, Control, Communications, Computing,

Intelligence, Surveillance and Reconnaissance)

– Cyber

• Directly supports JFC Defence Authorities for C4ISR and Cyber,

Defence Intelligence & other government departments

• As a cross-cutting account, supports the needs of all Front Line

Commands

© Crown copyright 2013 Dstl

19 June 2013

Page 52: Secure communications - CDE themed call launch 18 June 2013

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda

Page 53: Secure communications - CDE themed call launch 18 June 2013

Secure Communications CDE Themed

Call

Introduction

Helen Carlton

© Crown copyright 2013 Dstl

19 June 2013

Page 54: Secure communications - CDE themed call launch 18 June 2013

Assured Information Infrastructure

• Objective

– provide science and technology support to MOD to enable the

realisation of a continuously evolving single, logical,

reconfigurable, resilient information infrastructure across UK

and deployed, fixed and mobile elements

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Page 55: Secure communications - CDE themed call launch 18 June 2013

Assured Information Infrastructure

• The right information, to the right person, in the right

form, at the right time, to support the best decision to

initiate effective action

© Crown copyright 2013 Dstl

19 June 2013

Page 56: Secure communications - CDE themed call launch 18 June 2013

Military vs commercial

© Crown copyright 2013 Dstl

19 June 2013

Time

Technolo

gy P

rogre

ss

UNCLASSIFIED

Page 57: Secure communications - CDE themed call launch 18 June 2013

The challenge

• How can MOD harness civilian advances

– reduced size, weight, power

– open standards

– increased bandwidth, data rate

• In areas such as

– personal communications

– personal computing

– non radio frequency (RF) communications

– automotive communications

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Page 58: Secure communications - CDE themed call launch 18 June 2013

The challenge

• Against military constraints

– security

– assurance

– integration

– interoperability

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Page 59: Secure communications - CDE themed call launch 18 June 2013

What we want

• Innovative exploitation of commercial-off-the-shelf

(COTS) technology

• Novel approaches to securing information

infrastructures

• Technology that is inherently small, lightweight and low

power

• Proposals that show how improvements will be

measured and demonstrated

• Practical demonstrations set in a military context

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Page 60: Secure communications - CDE themed call launch 18 June 2013

What we don‟t want

• Solutions that offer no significant defence and security

benefit

• Technology watch / horizon scanning

• Paper-based studies, roadmaps or technology

prediction

• Impractical solutions or ones requiring internal

changes to COTS

• New encryption algorithms

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Page 61: Secure communications - CDE themed call launch 18 June 2013

Exploitation

• Planned route for exploitation next financial year is via

research programme

• Ideally an exploitation route to military equipment

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Page 62: Secure communications - CDE themed call launch 18 June 2013

C4ISR Secure Information

Infrastructure Services (CSIIS)

• Framework through which aII research is conducted

• Flexible and fluid consortium led by a Prime

• Duration three years

• Research areas

– Communications and Networks

– Information Assurance

– Knowledge and Information Management

• Start date November 2013

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Page 63: Secure communications - CDE themed call launch 18 June 2013

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda

Page 64: Secure communications - CDE themed call launch 18 June 2013

Image is public sector information licensed under the Open Government Licence v1.0

© Crown copyright 2013 Dstl

19 June 2013

Challenge 1

Securing Commercial-off-the-shelf

(COTS) Technology

Trevor Benjamin

Page 65: Secure communications - CDE themed call launch 18 June 2013

Scope

• Networks and Information Infrastructure

– wireless, wired, optical

– networking components

– user terminal devices

– server systems and

cloud technology

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Image is public sector information licensed under the Open Government Licence v1.0

Page 66: Secure communications - CDE themed call launch 18 June 2013

Issues • Major problem – SECURITY

• Mismatch - civil and military security risks and requirements

• Issues

– implementation standards and quality

– strength of security functionality

– assurance levels

– accreditation

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Page 67: Secure communications - CDE themed call launch 18 June 2013

Constraints

• Commercial off the shelf (COTS)

• Enhanced and strengthened security

• Unmodified COTS

• Capable of evaluation and accreditation

• Solutions might include:

– separate and novel security devices

– add-on security enhancements

– wrap-around security barriers

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Page 68: Secure communications - CDE themed call launch 18 June 2013

Example 1 – Bring your own device

• Benefits of BYOD for MOD

• Work with MOD infrastructure

• Strategic, deployed

and coalition systems

• BYOD that:

– hinder malicious attack

– protect information from compromise

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Image is public sector information licensed under the Open Government Licence v1.0

Page 69: Secure communications - CDE themed call launch 18 June 2013

Example 2 – Novel cryptography • Greater MOD use of civil & plain-text communications

• Cryptography close to edge

• Seeking cryptography solutions – at user device

– embedded in applications

• Device and system issues – key management

– identity management

– how to do cyber defence

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Do not propose new encryption algorithms solutions should use standards-based or government-defined algorithms

Page 70: Secure communications - CDE themed call launch 18 June 2013

Example 3 – Mobile wireless systems

• Wireless is a key enabler for military operations

– currently bespoke radio devices

• COTS could provide:

– ease of use

– smaller size, weight and power

– cheaper solutions

– training savings

– simpler logistics

• Need to enhance security, robustness, ruggedness

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Image is public sector information licensed under the Open Government Licence v1.0

Page 71: Secure communications - CDE themed call launch 18 June 2013

Example 4 – Host-based protection

• Paradigm shift

– move security away from supporting infrastructure

– host based and information based security

• Infrastructure more generic

• Users more responsible for security

• Need novel concepts:

– to enable this change based on COTS

– in security functionality and placement

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Image is public sector information licensed under the Open Government Licence v1.0

Page 72: Secure communications - CDE themed call launch 18 June 2013

Human factors

• The biggest security threat is people!

– work-around security functionality

– undermine original purpose

• Consider the people issues

• Need novel approaches to

– human factors of security solutions

– people, culture and information security

– improved socio-technical systems

– human-computer interactions for system security components

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Image is public sector information licensed under the Open Government Licence v1.0

Page 73: Secure communications - CDE themed call launch 18 June 2013

Summary • Securing COTS

– in MOD communications and information infrastructures

– match protection mechanisms to military risks

• Novel approaches to military security – using COTS without internal modification

– capable of high assurance and being part of accredited systems

• Examples might include: – “Bring your own device” security

– edge cryptographic protection

– secure mobile wireless systems

– host and information based protection

• Consider human factors – relationship between people and information security

– improved socio-technical security systems

– better human-security interfacing

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Page 74: Secure communications - CDE themed call launch 18 June 2013

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda

Page 75: Secure communications - CDE themed call launch 18 June 2013

Challenge 2

Mission-Configurable Systems

Simon Baker

© Crown copyright 2013 Dstl

19 June 2013

Page 76: Secure communications - CDE themed call launch 18 June 2013

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Introduction

• Military C4ISR (Command, Control,

Communications, Computing, Intelligence,

Surveillance and Reconnaissance) systems

– tend to be stove-piped

– making changes is complicated, time consuming

and expensive

Page 77: Secure communications - CDE themed call launch 18 June 2013

© Crown copyright 2013 Dstl

19 June 2013

Revised needs

Courtesy of ISAF Media

Page 78: Secure communications - CDE themed call launch 18 June 2013

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

• Rapidly support changing operational

requirements

• Work effectively within the Combined, Joint,

Intergovernmental, Inter-agency, Multi-national

(CJIIM) context

• Front Line Commands have some flexibility to

establish their “fight tonight” initial capabilities

Page 79: Secure communications - CDE themed call launch 18 June 2013

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

The challenge

• Innovative solutions to help MOD address the adoption

of a flexible and open systems approach across the

C4ISR Domain

• Demonstrate potential impact of different approaches to

the delivery of mission-configurable C4ISR capability,

including the applications and information services

Page 80: Secure communications - CDE themed call launch 18 June 2013

Example 1 – Cloud computing

• Cloud computing, open information services,

virtualisation

• Demonstrate how new systems could manage

– the loss of information services/communications bearers

• provision of a useful level of local services to the affected

users

– reconfiguration of services for new tasks and network

changes

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Page 81: Secure communications - CDE themed call launch 18 June 2013

Example 2 – Access management

• Management and monitoring of access to information

services at different levels of trust

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Page 82: Secure communications - CDE themed call launch 18 June 2013

Example 3 – Operating pictures

• Users want to define their operating pictures, but

mission-critical information must not be masked or

omitted

© Crown copyright 2013 Dstl

19 June 2013

UNCLASSIFIED

Page 83: Secure communications - CDE themed call launch 18 June 2013

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Information sharing

• Information needs to be shared across

organisational boundaries

• Need to share information services with

partners at different levels of trust

Page 84: Secure communications - CDE themed call launch 18 June 2013

UNCLASSIFIED © Crown copyright 2013 Dstl

19 June 2013

Summary

• adaptable solutions

• management of applications and services

• federate with other MOD systems and with external

organisations' systems

• achieve improved resilience, security and

interoperability

• exhibit graceful degradation

Page 85: Secure communications - CDE themed call launch 18 June 2013

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda

Page 86: Secure communications - CDE themed call launch 18 June 2013

Crown Copyright (c) 2012

Centre for Defence Enterprise

www.science.mod.uk/enterprise [email protected]

UNCLASSIFIED / FOR PUBLIC RELEASE

Centre for Defence Enterprise Submitting a Successful Proposal

Jono Byrne Centre for Defence Enterprise (CDE)

Page 87: Secure communications - CDE themed call launch 18 June 2013

Maximising your chances

Page 88: Secure communications - CDE themed call launch 18 June 2013

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise [email protected]

Crown Copyright Dstl 2012

Know what is available

Page 89: Secure communications - CDE themed call launch 18 June 2013
Page 90: Secure communications - CDE themed call launch 18 June 2013

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise [email protected]

Crown Copyright Dstl 2012

Know what is available

Page 91: Secure communications - CDE themed call launch 18 June 2013

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise [email protected]

Crown Copyright Dstl 2012

Know what is available

Page 92: Secure communications - CDE themed call launch 18 June 2013

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise [email protected]

Crown Copyright Dstl 2012

Read available

information

Start with –

Quick Start Guide

plus other CDE manuals –

Account Manual, User

Manual, Technology

Application Manual

Know what is available

Page 93: Secure communications - CDE themed call launch 18 June 2013

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise [email protected]

Crown Copyright Dstl 2012

Know what is available

Page 94: Secure communications - CDE themed call launch 18 June 2013

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise [email protected]

Crown Copyright Dstl 2012

Developing a CDE proposal

Page 95: Secure communications - CDE themed call launch 18 June 2013

Dstl is part of the

Ministry of Defence

Value from technology

Innovative concept

Future capability

Proof of

concept Incremental development

Page 96: Secure communications - CDE themed call launch 18 June 2013

The essentials

Page 97: Secure communications - CDE themed call launch 18 June 2013

Description

Page 98: Secure communications - CDE themed call launch 18 June 2013

mins

Assessment

Page 99: Secure communications - CDE themed call launch 18 June 2013

Not an exam

Page 100: Secure communications - CDE themed call launch 18 June 2013

MOD Performance Assessment Framework

Five criteria:

Operational relevance

Likelihood of exploitation

Builds critical S&T capability to meet UK needs

Scientific quality/innovation

Science, innovation and technology risk

Page 101: Secure communications - CDE themed call launch 18 June 2013

Commercial tab

Page 102: Secure communications - CDE themed call launch 18 June 2013

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise [email protected]

Crown Copyright Dstl 2012

Government-furnished X

Page 103: Secure communications - CDE themed call launch 18 June 2013

Health and safety

Page 104: Secure communications - CDE themed call launch 18 June 2013

Ethics

Page 105: Secure communications - CDE themed call launch 18 June 2013

Unclassified

Page 106: Secure communications - CDE themed call launch 18 June 2013

Crown Copyright (c) 2012

Centre for Defence Enterprise

www.science.mod.uk/enterprise [email protected]

UNCLASSIFIED / FOR PUBLIC RELEASE

Proposal health check

Page 107: Secure communications - CDE themed call launch 18 June 2013

Claim of future benefit

Page 108: Secure communications - CDE themed call launch 18 June 2013

Contribution to future benefit

Page 109: Secure communications - CDE themed call launch 18 June 2013

Logical programme of work

Page 110: Secure communications - CDE themed call launch 18 June 2013

Generation of evidence

Page 111: Secure communications - CDE themed call launch 18 June 2013

Demonstration of progress

Page 112: Secure communications - CDE themed call launch 18 June 2013

Crown Copyright (c) 2012

Centre for Defence Enterprise

www.science.mod.uk/enterprise [email protected]

UNCLASSIFIED / FOR PUBLIC RELEASE

Based on a claim of future benefit

Contribution to realisation of future benefit

Logical programme of work

Evidential outcomes

Demonstration of progress towards goal

Health check

Page 113: Secure communications - CDE themed call launch 18 June 2013

Early birds

Page 114: Secure communications - CDE themed call launch 18 June 2013

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise [email protected]

Crown Copyright Dstl 2012

This call closes:

Thursday 22 August 2013

At

17:00 hrs

Deadline

Page 115: Secure communications - CDE themed call launch 18 June 2013

Crown Copyright (c) 2012

Centre for Defence Enterprise

www.science.mod.uk/enterprise [email protected]

UNCLASSIFIED / FOR PUBLIC RELEASE

Centre for Defence Enterprise

[email protected]

www.science.mod.uk/enterprise

Call process queries

Page 116: Secure communications - CDE themed call launch 18 June 2013

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise [email protected]

Crown Copyright Dstl 2012

[email protected]

Call technical queries

Page 117: Secure communications - CDE themed call launch 18 June 2013

Dstl is part of the

Ministry of Defence

UNCLASSIFIED / For Public Release

Centre for Defence Enterprise

www.science.mod.uk/enterprise [email protected]

Crown Copyright Dstl 2012

www.science.mod.uk

Events and Calls > Current calls for proposals > Secure communications

Webinar: 20 June 12:30-13:30

Register online

Further information

Page 118: Secure communications - CDE themed call launch 18 June 2013

Network and question

Page 119: Secure communications - CDE themed call launch 18 June 2013

15-minute slots

Encourage those who have not worked with us before

Book at registration desk over lunch

Name, organisation, which challenge

Surgery sessions

Page 120: Secure communications - CDE themed call launch 18 June 2013

Introduction to CDE 1030

Military context 1050

Programme overview 1105

Call overview 1110

Technical challenges 1120

Submitting a CDE proposal 1200

Q&A 1210

Networking lunch (Book surgery appointments)

1230

Surgery sessions 1400

Event close 1600

Agenda