secure communications - cde themed call launch 18 june 2013
DESCRIPTION
Presentation slides from CDE themed call launch event on 18 June - for full details of this call for research proposals see http://www.science.mod.uk/events/event_detail.aspx?eventid=259TRANSCRIPT
Secure Communications
Centre for Defence Enterprise
Wing Commander Jim Pennycook
Rapid technological change
© Crown Copyright MOD 2011
The aim of CDE
© Crown Copyright MOD 2011
Prove the value of novel, high-risk, high-potential-benefit research
© Crown Copyright MOD 2011
To enable development of cost-effective military capability advantage
19 June 2013
Five key operating principles underpin the CDE model
Engaging innovators
19 June 2013
Accessible opportunity
Sustaining incentives
Minimising participation costs
Compliance
Intellectual property
Two routes to funding
Online bid submission
Themed calls
Dstl is part of the
Ministry of Defence
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
UNCLASSIFIED / FOR PUBLIC RELEASE
CDE themed call programme
Countering insider threat attacks Call closes 27 Jun 2013
Secure communications Call closes 22 Aug 2013
Innovation in drug development processes
Call launch 25 June 2013
Enhancing military medical training and support for the medic
Call launch 16 July 2013
Novel solutions for emulating ship signatures
Call launch 23 July 2013
Register and further details at www.science.mod.uk under ‘Events and Calls’
All call close at 17:00 hrs
Defence Open Call
Seeking the exceptional
4438 proposals received
17% proposals funded
£39M contracts awarded
Exemplar project
Fuel efficiency
‘Micro generators’
© Crown Copyright MOD 2011
Effective proposals
Challenge, pace & exploitation
The future of CDE
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch (Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda
Secure Communications
Network and question
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch (Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda
Secure Communications
Military Context
Squadron Leader Mike Leaman
UNCLASSIFIED © Crown copyright 2013 Dstl
19 June 2013
© Crown copyright 2013 Dstl
19 June 2013
Military
communications
Usable
Reliable
Deployable
© Crown copyright 2013 Dstl
19 June 2013
Future operating
environment
Congested
Cluttered
Contested
Connected
Constrained
© Crown copyright 2013 Dstl
19 June 2013
Short-notice overseas deployments
© Crown copyright 2013 Dstl
19 June 2013
Coalition multi-agency
operations
© Crown copyright 2013 Dstl
19 June 2013
Military „platforms‟
Networking makes the whole
more effective
but
• capacity is limited
• effective integration is
essential
© Crown copyright 2013 Dstl
19 June 2013
The user
Capacity is limited
Risk-based
approach
© Crown copyright 2013 Dstl
19 June 2013
The User
Capacity is limited
© Crown copyright 2013 Dstl
19 June 2013
Military
communications
Usable
Reliable
Deployable
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch (Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda
Information Superiority
Joint Forces Command
Dr David Massey MEng MIET
C4ISR Domain Lead
Programme and Delivery Directorate
The Joint Forces Command
Information Superiority account
© Crown copyright 2013 Dstl
19 June 2013
Information Superiority includes:-
– Command, Control, Information &
Intelligence
– Integrated Sensing
– Assured Information Infrastructure
– Decision Support for C4ISR (Command,
Control, Communications, Computing, Intelligence,
Surveillance and Reconnaissance)
– Cyber
– Defence Intelligence
Benefits delivered by the account
• Command & Control (C2) concepts
• Improve Information & Intelligence
• Provide knowledge and tools in
cyberspace
• Provide enhanced and affordable
sensor technologies
© Crown copyright 2013 Dstl
19 June 2013
Upcoming requirements
• Increased emphasis on information analysis
and intelligence production
• Continued emphasis on communications &
networks
• Reduced emphasis on sensors per se with
focus shifted to common sensor modalities
• Experimentation and Decision Support
remain key
• Cyber remains a priority © Crown copyright 2013 Dstl
19 June 2013
Challenges for the future
Support the provision of an
expeditionary command
and inform capability that
is sufficiently sustainable,
scalable and interoperable
© Crown copyright 2013 Dstl
19 June 2013
Challenges for the future Appropriate combination of
sensors/platforms,
infrastructure and exploitation
capabilities to generate timely
situation awareness
– Eg common architectures
based on wideband multi-
function radio frequency (RF)
systems for manned and
unmanned combat air
systems.
© Crown copyright 2013 Dstl
19 June 2013
Challenges for the future
Cyber situational awareness, defence and
operations including effects delivered
through computers, networks,
electromagnetic (EM) spectrum and
human influence.
© Crown copyright 2013 Dstl
19 June 2013
Key elements of the account
• Supports Joint Forces Command (JFC) Information Superiority
science and technology needs. Incorporates:
– C4ISR (Command, Control, Communications, Computing,
Intelligence, Surveillance and Reconnaissance)
– Cyber
• Directly supports JFC Defence Authorities for C4ISR and Cyber,
Defence Intelligence & other government departments
• As a cross-cutting account, supports the needs of all Front Line
Commands
© Crown copyright 2013 Dstl
19 June 2013
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch (Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda
Secure Communications CDE Themed
Call
Introduction
Helen Carlton
© Crown copyright 2013 Dstl
19 June 2013
Assured Information Infrastructure
• Objective
– provide science and technology support to MOD to enable the
realisation of a continuously evolving single, logical,
reconfigurable, resilient information infrastructure across UK
and deployed, fixed and mobile elements
UNCLASSIFIED © Crown copyright 2013 Dstl
19 June 2013
Assured Information Infrastructure
• The right information, to the right person, in the right
form, at the right time, to support the best decision to
initiate effective action
© Crown copyright 2013 Dstl
19 June 2013
Military vs commercial
© Crown copyright 2013 Dstl
19 June 2013
Time
Technolo
gy P
rogre
ss
UNCLASSIFIED
The challenge
• How can MOD harness civilian advances
– reduced size, weight, power
– open standards
– increased bandwidth, data rate
• In areas such as
– personal communications
– personal computing
– non radio frequency (RF) communications
– automotive communications
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
The challenge
• Against military constraints
– security
– assurance
– integration
– interoperability
UNCLASSIFIED © Crown copyright 2013 Dstl
19 June 2013
What we want
• Innovative exploitation of commercial-off-the-shelf
(COTS) technology
• Novel approaches to securing information
infrastructures
• Technology that is inherently small, lightweight and low
power
• Proposals that show how improvements will be
measured and demonstrated
• Practical demonstrations set in a military context
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
What we don‟t want
• Solutions that offer no significant defence and security
benefit
• Technology watch / horizon scanning
• Paper-based studies, roadmaps or technology
prediction
• Impractical solutions or ones requiring internal
changes to COTS
• New encryption algorithms
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Exploitation
• Planned route for exploitation next financial year is via
research programme
• Ideally an exploitation route to military equipment
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
C4ISR Secure Information
Infrastructure Services (CSIIS)
• Framework through which aII research is conducted
• Flexible and fluid consortium led by a Prime
• Duration three years
• Research areas
– Communications and Networks
– Information Assurance
– Knowledge and Information Management
• Start date November 2013
UNCLASSIFIED © Crown copyright 2013 Dstl
19 June 2013
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch (Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda
Image is public sector information licensed under the Open Government Licence v1.0
© Crown copyright 2013 Dstl
19 June 2013
Challenge 1
Securing Commercial-off-the-shelf
(COTS) Technology
Trevor Benjamin
Scope
• Networks and Information Infrastructure
– wireless, wired, optical
– networking components
– user terminal devices
– server systems and
cloud technology
UNCLASSIFIED © Crown copyright 2013 Dstl
19 June 2013
Image is public sector information licensed under the Open Government Licence v1.0
Issues • Major problem – SECURITY
• Mismatch - civil and military security risks and requirements
• Issues
– implementation standards and quality
– strength of security functionality
– assurance levels
– accreditation
UNCLASSIFIED © Crown copyright 2013 Dstl
19 June 2013
Constraints
• Commercial off the shelf (COTS)
• Enhanced and strengthened security
• Unmodified COTS
• Capable of evaluation and accreditation
• Solutions might include:
– separate and novel security devices
– add-on security enhancements
– wrap-around security barriers
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Example 1 – Bring your own device
• Benefits of BYOD for MOD
• Work with MOD infrastructure
• Strategic, deployed
and coalition systems
• BYOD that:
– hinder malicious attack
– protect information from compromise
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Image is public sector information licensed under the Open Government Licence v1.0
Example 2 – Novel cryptography • Greater MOD use of civil & plain-text communications
• Cryptography close to edge
• Seeking cryptography solutions – at user device
– embedded in applications
• Device and system issues – key management
– identity management
– how to do cyber defence
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Do not propose new encryption algorithms solutions should use standards-based or government-defined algorithms
Example 3 – Mobile wireless systems
• Wireless is a key enabler for military operations
– currently bespoke radio devices
• COTS could provide:
– ease of use
– smaller size, weight and power
– cheaper solutions
– training savings
– simpler logistics
• Need to enhance security, robustness, ruggedness
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Image is public sector information licensed under the Open Government Licence v1.0
Example 4 – Host-based protection
• Paradigm shift
– move security away from supporting infrastructure
– host based and information based security
• Infrastructure more generic
• Users more responsible for security
• Need novel concepts:
– to enable this change based on COTS
– in security functionality and placement
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Image is public sector information licensed under the Open Government Licence v1.0
Human factors
• The biggest security threat is people!
– work-around security functionality
– undermine original purpose
• Consider the people issues
• Need novel approaches to
– human factors of security solutions
– people, culture and information security
– improved socio-technical systems
– human-computer interactions for system security components
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Image is public sector information licensed under the Open Government Licence v1.0
Summary • Securing COTS
– in MOD communications and information infrastructures
– match protection mechanisms to military risks
• Novel approaches to military security – using COTS without internal modification
– capable of high assurance and being part of accredited systems
• Examples might include: – “Bring your own device” security
– edge cryptographic protection
– secure mobile wireless systems
– host and information based protection
• Consider human factors – relationship between people and information security
– improved socio-technical security systems
– better human-security interfacing
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch (Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda
Challenge 2
Mission-Configurable Systems
Simon Baker
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED © Crown copyright 2013 Dstl
19 June 2013
Introduction
• Military C4ISR (Command, Control,
Communications, Computing, Intelligence,
Surveillance and Reconnaissance) systems
– tend to be stove-piped
– making changes is complicated, time consuming
and expensive
© Crown copyright 2013 Dstl
19 June 2013
Revised needs
Courtesy of ISAF Media
UNCLASSIFIED © Crown copyright 2013 Dstl
19 June 2013
• Rapidly support changing operational
requirements
• Work effectively within the Combined, Joint,
Intergovernmental, Inter-agency, Multi-national
(CJIIM) context
• Front Line Commands have some flexibility to
establish their “fight tonight” initial capabilities
UNCLASSIFIED © Crown copyright 2013 Dstl
19 June 2013
The challenge
• Innovative solutions to help MOD address the adoption
of a flexible and open systems approach across the
C4ISR Domain
• Demonstrate potential impact of different approaches to
the delivery of mission-configurable C4ISR capability,
including the applications and information services
Example 1 – Cloud computing
• Cloud computing, open information services,
virtualisation
• Demonstrate how new systems could manage
– the loss of information services/communications bearers
• provision of a useful level of local services to the affected
users
– reconfiguration of services for new tasks and network
changes
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Example 2 – Access management
• Management and monitoring of access to information
services at different levels of trust
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
Example 3 – Operating pictures
• Users want to define their operating pictures, but
mission-critical information must not be masked or
omitted
© Crown copyright 2013 Dstl
19 June 2013
UNCLASSIFIED
UNCLASSIFIED © Crown copyright 2013 Dstl
19 June 2013
Information sharing
• Information needs to be shared across
organisational boundaries
• Need to share information services with
partners at different levels of trust
UNCLASSIFIED © Crown copyright 2013 Dstl
19 June 2013
Summary
• adaptable solutions
• management of applications and services
• federate with other MOD systems and with external
organisations' systems
• achieve improved resilience, security and
interoperability
• exhibit graceful degradation
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch (Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
UNCLASSIFIED / FOR PUBLIC RELEASE
Centre for Defence Enterprise Submitting a Successful Proposal
Jono Byrne Centre for Defence Enterprise (CDE)
Maximising your chances
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
Know what is available
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
Know what is available
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
Know what is available
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
Read available
information
Start with –
Quick Start Guide
plus other CDE manuals –
Account Manual, User
Manual, Technology
Application Manual
Know what is available
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
Know what is available
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
Developing a CDE proposal
Dstl is part of the
Ministry of Defence
Value from technology
Innovative concept
Future capability
Proof of
concept Incremental development
The essentials
Description
mins
Assessment
Not an exam
MOD Performance Assessment Framework
Five criteria:
Operational relevance
Likelihood of exploitation
Builds critical S&T capability to meet UK needs
Scientific quality/innovation
Science, innovation and technology risk
Commercial tab
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
Government-furnished X
Health and safety
Ethics
Unclassified
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
UNCLASSIFIED / FOR PUBLIC RELEASE
Proposal health check
Claim of future benefit
Contribution to future benefit
Logical programme of work
Generation of evidence
Demonstration of progress
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
UNCLASSIFIED / FOR PUBLIC RELEASE
Based on a claim of future benefit
Contribution to realisation of future benefit
Logical programme of work
Evidential outcomes
Demonstration of progress towards goal
Health check
Early birds
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
This call closes:
Thursday 22 August 2013
At
17:00 hrs
Deadline
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
UNCLASSIFIED / FOR PUBLIC RELEASE
Centre for Defence Enterprise
www.science.mod.uk/enterprise
Call process queries
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
Call technical queries
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
www.science.mod.uk
Events and Calls > Current calls for proposals > Secure communications
Webinar: 20 June 12:30-13:30
Register online
Further information
Network and question
15-minute slots
Encourage those who have not worked with us before
Book at registration desk over lunch
Name, organisation, which challenge
Surgery sessions
Introduction to CDE 1030
Military context 1050
Programme overview 1105
Call overview 1110
Technical challenges 1120
Submitting a CDE proposal 1200
Q&A 1210
Networking lunch (Book surgery appointments)
1230
Surgery sessions 1400
Event close 1600
Agenda