Secure communications - CDE themed call launch 18 June 2013.

1,045 views

Published on

Presentation slides from CDE themed call launch event on 18 June - for full details of this call for research proposals see http://www.science.mod.uk/events/event_detail.aspx?eventid=259

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,045
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
55
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Secure communications - CDE themed call launch 18 June 2013.

  1. 1. Secure CommunicationsCentre for Defence EnterpriseWing Commander Jim Pennycook
  2. 2. Rapid technological change
  3. 3. © Crown Copyright MOD 2011The aim of CDE
  4. 4. © Crown Copyright MOD 2011Prove the value of novel, high-risk,high-potential-benefit research
  5. 5. © Crown Copyright MOD 2011To enable development of cost-effective military capability advantage
  6. 6. 19 June 2013Five key operating principlesunderpin the CDE model
  7. 7. Engaging innovators
  8. 8. 19 June 2013Accessible opportunity
  9. 9. Sustaining incentives
  10. 10. Minimising participation costs
  11. 11. Compliance
  12. 12. Intellectual property
  13. 13. Two routes to funding
  14. 14. Online bid submission
  15. 15. Themed calls
  16. 16. Dstl is part of theMinistry of DefenceCrown Copyright (c) 2012Centre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukUNCLASSIFIED / FOR PUBLIC RELEASECDE themed call programmeCountering insider threat attacks Call closes 27 Jun 2013Secure communications Call closes 22 Aug 2013Innovation in drug developmentprocessesCall launch 25 June 2013Enhancing military medical trainingand support for the medicCall launch 16 July 2013Novel solutions for emulating shipsignaturesCall launch 23 July 2013Register and further details at www.science.mod.uk under ‘Events and Calls’All call close at 17:00 hrs
  17. 17. Defence Open Call
  18. 18. Seeking the exceptional
  19. 19. 4438proposals received
  20. 20. 17%proposals funded
  21. 21. £39Mcontracts awarded
  22. 22. Exemplar project
  23. 23. Fuel efficiency
  24. 24. ‘Micro generators’
  25. 25. © Crown Copyright MOD 2011Effective proposals
  26. 26. Challenge, pace & exploitation
  27. 27. The future of CDE
  28. 28. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda
  29. 29. Secure Communications
  30. 30. Network and question
  31. 31. Centre for Defence Enterprise01235 438445cde@dstl.gov.ukwww.science.mod.uk/enterprise
  32. 32. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda
  33. 33. Secure CommunicationsMilitary ContextSquadron Leader Mike LeamanUNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013
  34. 34. © Crown copyright 2013 Dstl19 June 2013MilitarycommunicationsUsableReliableDeployable
  35. 35. © Crown copyright 2013 Dstl19 June 2013Future operatingenvironmentCongestedClutteredContestedConnectedConstrained
  36. 36. © Crown copyright 2013 Dstl19 June 2013Short-noticeoverseasdeployments
  37. 37. © Crown copyright 2013 Dstl19 June 2013Coalitionmulti-agencyoperations
  38. 38. © Crown copyright 2013 Dstl19 June 2013Military „platforms‟Networking makes the wholemore effectivebut• capacity is limited• effective integration isessential
  39. 39. © Crown copyright 2013 Dstl19 June 2013The userCapacity is limitedRisk-basedapproach
  40. 40. © Crown copyright 2013 Dstl19 June 2013The UserCapacity is limited
  41. 41. © Crown copyright 2013 Dstl19 June 2013MilitarycommunicationsUsableReliableDeployable
  42. 42. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda
  43. 43. Information SuperiorityJoint Forces CommandDr David Massey MEng MIETC4ISR Domain LeadProgramme and Delivery Directorate
  44. 44. The Joint Forces CommandInformation Superiority account© Crown copyright 2013 Dstl19 June 2013Information Superiority includes:-– Command, Control, Information &Intelligence– Integrated Sensing– Assured Information Infrastructure– Decision Support for C4ISR (Command,Control, Communications, Computing, Intelligence,Surveillance and Reconnaissance)– Cyber– Defence Intelligence
  45. 45. Benefits delivered by the account• Command & Control (C2) concepts• Improve Information & Intelligence• Provide knowledge and tools incyberspace• Provide enhanced and affordablesensor technologies© Crown copyright 2013 Dstl19 June 2013
  46. 46. Upcoming requirements• Increased emphasis on information analysisand intelligence production• Continued emphasis on communications &networks• Reduced emphasis on sensors per se withfocus shifted to common sensor modalities• Experimentation and Decision Supportremain key• Cyber remains a priority© Crown copyright 2013 Dstl19 June 2013
  47. 47. Challenges for the futureSupport the provision of anexpeditionary commandand inform capability thatis sufficiently sustainable,scalable and interoperable© Crown copyright 2013 Dstl19 June 2013
  48. 48. Challenges for the futureAppropriate combination ofsensors/platforms,infrastructure and exploitationcapabilities to generate timelysituation awareness– Eg common architecturesbased on wideband multi-function radio frequency (RF)systems for manned andunmanned combat airsystems.© Crown copyright 2013 Dstl19 June 2013
  49. 49. Challenges for the futureCyber situational awareness, defence andoperations including effects deliveredthrough computers, networks,electromagnetic (EM) spectrum andhuman influence.© Crown copyright 2013 Dstl19 June 2013
  50. 50. Key elements of the account• Supports Joint Forces Command (JFC) Information Superiorityscience and technology needs. Incorporates:– C4ISR (Command, Control, Communications, Computing,Intelligence, Surveillance and Reconnaissance)– Cyber• Directly supports JFC Defence Authorities for C4ISR and Cyber,Defence Intelligence & other government departments• As a cross-cutting account, supports the needs of all Front LineCommands© Crown copyright 2013 Dstl19 June 2013
  51. 51. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda
  52. 52. Secure Communications CDE ThemedCallIntroductionHelen Carlton© Crown copyright 2013 Dstl19 June 2013
  53. 53. Assured Information Infrastructure• Objective– provide science and technology support to MOD to enable therealisation of a continuously evolving single, logical,reconfigurable, resilient information infrastructure across UKand deployed, fixed and mobile elementsUNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013
  54. 54. Assured Information Infrastructure• The right information, to the right person, in the rightform, at the right time, to support the best decision toinitiate effective action© Crown copyright 2013 Dstl19 June 2013
  55. 55. Military vs commercial© Crown copyright 2013 Dstl19 June 2013TimeTechnologyProgressUNCLASSIFIED
  56. 56. The challenge• How can MOD harness civilian advances– reduced size, weight, power– open standards– increased bandwidth, data rate• In areas such as– personal communications– personal computing– non radio frequency (RF) communications– automotive communications© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  57. 57. The challenge• Against military constraints– security– assurance– integration– interoperabilityUNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013
  58. 58. What we want• Innovative exploitation of commercial-off-the-shelf(COTS) technology• Novel approaches to securing informationinfrastructures• Technology that is inherently small, lightweight and lowpower• Proposals that show how improvements will bemeasured and demonstrated• Practical demonstrations set in a military context© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  59. 59. What we don‟t want• Solutions that offer no significant defence and securitybenefit• Technology watch / horizon scanning• Paper-based studies, roadmaps or technologyprediction• Impractical solutions or ones requiring internalchanges to COTS• New encryption algorithms© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  60. 60. Exploitation• Planned route for exploitation next financial year is viaresearch programme• Ideally an exploitation route to military equipment© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  61. 61. C4ISR Secure InformationInfrastructure Services (CSIIS)• Framework through which aII research is conducted• Flexible and fluid consortium led by a Prime• Duration three years• Research areas– Communications and Networks– Information Assurance– Knowledge and Information Management• Start date November 2013UNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013
  62. 62. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda
  63. 63. Image is public sector information licensed under the Open Government Licence v1.0© Crown copyright 2013 Dstl19 June 2013Challenge 1Securing Commercial-off-the-shelf(COTS) TechnologyTrevor Benjamin
  64. 64. Scope• Networks and Information Infrastructure– wireless, wired, optical– networking components– user terminal devices– server systems andcloud technologyUNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013Image is public sector information licensed under the Open Government Licence v1.0
  65. 65. Issues• Major problem – SECURITY• Mismatch - civil and military security risks and requirements• Issues– implementation standards and quality– strength of security functionality– assurance levels– accreditationUNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013
  66. 66. Constraints• Commercial off the shelf (COTS)• Enhanced and strengthened security• Unmodified COTS• Capable of evaluation and accreditation• Solutions might include:– separate and novel security devices– add-on security enhancements– wrap-around security barriers© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  67. 67. Example 1 – Bring your own device• Benefits of BYOD for MOD• Work with MOD infrastructure• Strategic, deployedand coalition systems• BYOD that:– hinder malicious attack– protect information from compromise© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIEDImage is public sector information licensed under the Open Government Licence v1.0
  68. 68. Example 2 – Novel cryptography• Greater MOD use of civil & plain-text communications• Cryptography close to edge• Seeking cryptography solutions– at user device– embedded in applications• Device and system issues– key management– identity management– how to do cyber defence© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIEDDo not propose new encryption algorithmssolutions should use standards-based or government-defined algorithms
  69. 69. Example 3 – Mobile wireless systems• Wireless is a key enabler for military operations– currently bespoke radio devices• COTS could provide:– ease of use– smaller size, weight and power– cheaper solutions– training savings– simpler logistics• Need to enhance security, robustness, ruggedness© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIEDImage is public sector information licensed under the Open Government Licence v1.0
  70. 70. Example 4 – Host-based protection• Paradigm shift– move security away from supporting infrastructure– host based and information based security• Infrastructure more generic• Users more responsible for security• Need novel concepts:– to enable this change based on COTS– in security functionality and placement© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIEDImage is public sector information licensed under the Open Government Licence v1.0
  71. 71. Human factors• The biggest security threat is people!– work-around security functionality– undermine original purpose• Consider the people issues• Need novel approaches to– human factors of security solutions– people, culture and information security– improved socio-technical systems– human-computer interactions for system security components© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIEDImage is public sector information licensed under the Open Government Licence v1.0
  72. 72. Summary• Securing COTS– in MOD communications and information infrastructures– match protection mechanisms to military risks• Novel approaches to military security– using COTS without internal modification– capable of high assurance and being part of accredited systems• Examples might include:– “Bring your own device” security– edge cryptographic protection– secure mobile wireless systems– host and information based protection• Consider human factors– relationship between people and information security– improved socio-technical security systems– better human-security interfacing© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  73. 73. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda
  74. 74. Challenge 2Mission-Configurable SystemsSimon Baker© Crown copyright 2013 Dstl19 June 2013
  75. 75. UNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013Introduction• Military C4ISR (Command, Control,Communications, Computing, Intelligence,Surveillance and Reconnaissance) systems– tend to be stove-piped– making changes is complicated, time consumingand expensive
  76. 76. © Crown copyright 2013 Dstl19 June 2013Revised needsCourtesy of ISAF Media
  77. 77. UNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013• Rapidly support changing operationalrequirements• Work effectively within the Combined, Joint,Intergovernmental, Inter-agency, Multi-national(CJIIM) context• Front Line Commands have some flexibility toestablish their “fight tonight” initial capabilities
  78. 78. UNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013The challenge• Innovative solutions to help MOD address the adoptionof a flexible and open systems approach across theC4ISR Domain• Demonstrate potential impact of different approaches tothe delivery of mission-configurable C4ISR capability,including the applications and information services
  79. 79. Example 1 – Cloud computing• Cloud computing, open information services,virtualisation• Demonstrate how new systems could manage– the loss of information services/communications bearers• provision of a useful level of local services to the affectedusers– reconfiguration of services for new tasks and networkchanges© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  80. 80. Example 2 – Access management• Management and monitoring of access to informationservices at different levels of trust© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  81. 81. Example 3 – Operating pictures• Users want to define their operating pictures, butmission-critical information must not be masked oromitted© Crown copyright 2013 Dstl19 June 2013UNCLASSIFIED
  82. 82. UNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013Information sharing• Information needs to be shared acrossorganisational boundaries• Need to share information services withpartners at different levels of trust
  83. 83. UNCLASSIFIED© Crown copyright 2013 Dstl19 June 2013Summary• adaptable solutions• management of applications and services• federate with other MOD systems and with externalorganisations systems• achieve improved resilience, security andinteroperability• exhibit graceful degradation
  84. 84. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda
  85. 85. Crown Copyright (c) 2012Centre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukUNCLASSIFIED / FOR PUBLIC RELEASECentre for Defence EnterpriseSubmitting a Successful ProposalJono ByrneCentre for Defence Enterprise (CDE)
  86. 86. Maximising your chances
  87. 87. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012Know what is available
  88. 88. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012Know what is available
  89. 89. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012Know what is available
  90. 90. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012Read availableinformationStart with –Quick Start Guideplus other CDE manuals –Account Manual, UserManual, TechnologyApplication ManualKnow what is available
  91. 91. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012Know what is available
  92. 92. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012Developing a CDE proposal
  93. 93. Dstl is part of theMinistry of DefenceValue from technologyInnovativeconceptFuturecapabilityProof ofconcept Incremental development
  94. 94. The essentials
  95. 95. Description
  96. 96. minsAssessment
  97. 97. Not an exam
  98. 98. MOD Performance Assessment FrameworkFive criteria:Operational relevanceLikelihood of exploitationBuilds critical S&T capability to meet UKneedsScientific quality/innovationScience, innovation and technology risk
  99. 99. Commercial tab
  100. 100. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012Government-furnished X
  101. 101. Health and safety
  102. 102. Ethics
  103. 103. Unclassified
  104. 104. Crown Copyright (c) 2012Centre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukUNCLASSIFIED / FOR PUBLIC RELEASEProposal health check
  105. 105. Claim of future benefit
  106. 106. Contribution to future benefit
  107. 107. Logical programme of work
  108. 108. Generation of evidence
  109. 109. Demonstration of progress
  110. 110. Crown Copyright (c) 2012Centre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukUNCLASSIFIED / FOR PUBLIC RELEASEBased on a claim of future benefitContribution to realisation of future benefitLogical programme of workEvidential outcomesDemonstration of progress towards goalHealth check
  111. 111. Early birds
  112. 112. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012This call closes:Thursday 22 August 2013At17:00 hrsDeadline
  113. 113. Crown Copyright (c) 2012Centre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukUNCLASSIFIED / FOR PUBLIC RELEASECentre for Defence Enterprisecde@dstl.gov.ukwww.science.mod.uk/enterpriseCall process queries
  114. 114. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012dstlsecurecommscde@dstl.gov.ukCall technical queries
  115. 115. Dstl is part of theMinistry of DefenceUNCLASSIFIED / For Public ReleaseCentre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.ukCrown Copyright Dstl 2012www.science.mod.ukEvents and Calls > Current calls for proposals> Secure communicationsWebinar: 20 June 12:30-13:30Register onlineFurther information
  116. 116. Network and question
  117. 117. 15-minute slotsEncourage those who have not workedwith us beforeBook at registration desk over lunchName, organisation, which challengeSurgery sessions
  118. 118. Introduction to CDE 1030Military context 1050Programme overview 1105Call overview 1110Technical challenges 1120Submitting a CDE proposal 1200Q&A 1210Networking lunch(Book surgery appointments)1230Surgery sessions 1400Event close 1600Agenda

×