The Challenges of Countering Terrorist Networks - CDE themed call launch 19 Mar 2013
Upcoming SlideShare
Loading in...5
×
 

The Challenges of Countering Terrorist Networks - CDE themed call launch 19 Mar 2013

on

  • 1,400 views

Presentations from CDE themed call launch event on 19 March 2013. For full details of the call see: http://www.science.mod.uk/events/event_detail.aspx?eventid=202

Presentations from CDE themed call launch event on 19 March 2013. For full details of the call see: http://www.science.mod.uk/events/event_detail.aspx?eventid=202

Statistics

Views

Total Views
1,400
Views on SlideShare
1,400
Embed Views
0

Actions

Likes
0
Downloads
51
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

The Challenges of Countering Terrorist Networks - CDE themed call launch 19 Mar 2013 The Challenges of Countering Terrorist Networks - CDE themed call launch 19 Mar 2013 Presentation Transcript

  • The Challenges of Countering Terrorist NetworksCentre for Defence Enterprise (CDE)
  • The aim of CDE© Crown Copyright MOD 2011
  • Prove the value of novel, high-risk, high-potential-benefit research© Crown Copyright MOD 2011
  • To enable development of cost- effective capability advantage© Crown Copyright MOD 2011
  • Engaging a broad audience 6
  • Providing opportunity
  • Two routes to funding
  • Themed calls
  • CDE themed call programmeSmart and multifunctional materials Call closes 12 April 2013and structures (at 1700 hrs)The challenges of countering Call closes 1 May 2013terrorist networks (at 1700 hrs)Precision timing Call launch 23 April 2013Secure communications Call launch 18 June 2013Innovation in drug development Call launch 25 June 2013processesEnhancing military medical training Call launch 16 July 2013and support for the medicRegister and further details at www.science.mod.uk under ‘Events and Calls’ Centre for Defence Enterprise Dstl is part of the www.science.mod.uk/enterprise cde@dstl.gov.uk Ministry of Defence UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
  • Defence Open Call
  • Seeking the exceptional
  • Challenging conventions
  • Novel fibres for CBR protection
  • ‘Micro generators’
  • Sustaining participation
  • Minimising participation cost
  • Online bid submission
  • Compliance
  • Intellectual property
  • The future of CDE
  • Making an impact
  • 4283proposals received
  • 16%proposals funded
  • £37Mcontracts awarded
  • CDE advantagesAccessibleRapid assessmentEasy contractingQuick paymentsBenevolent IP arrangements
  • Effective proposals© Crown Copyright MOD 2011
  • Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking with lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking with refreshments15:15 Event close
  • Network and question
  • Centre for Defence Enterprise Advanced Design and 01235 438445 Manufacturing cde@dstl.gov.uk www.science.mod.uk/enterpriseCentre for Defence Enterprise Wing Commander Jim Pennycook
  • Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  • 20 March 2013© Crown copyright 2013 Dstl UNCLASSIFIED
  • The Challenges of Countering Terrorist Networks 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Countering terrorist networksHarnessing and developing science and technology (S&T) to increase defence and security capability to pursue and disrupt threats to UK 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Today’s CDE call S&T challenges Challenge 2: Identifying Individuals Challenge 3: Translating Information Challenge 1: Understanding the Network 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  • The Challenges of Countering TerroristNetworksMilitary Context 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 19 March 2013© Crown copyright 2013 Dstl UNCLASSIFIED
  • References 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • References 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • TerminologyISR = Intelligence, Surveillance and ReconnaissanceISTAR = Intelligence, Surveillance, Target Acquisition and ReconnaissanceC4ISR = Command Control , Computers, Communications and ISRE2E3 = End to End EnterpriseMPE = Materiel and Personnel ExploitationFABINT = Forensic and Biometric IntelligenceDOCEX/DOMEX = Document Exploitation/Document and Media ExploitationSIGINT = Signals IntelligenceOSINT = Open Source IntelligenceWTI = Weapons Technical Intelligence 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Future Character of Conflict: 5Cs Contested Connected Constrained Cluttered Congested 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • The Future Battlespace Contested  Competition for resources. All geographies of operation are contested  Sea, land, air & space, cyberspace and information Congested  To influence people we have to operate in, over and close to where they live. People live in urban areas in the littoral  There is no empty battlefield Cluttered  Network Enabled Capability will not fully lift the fog of war  We need to understand and to discriminate Connected  Networks - source of strength for friend and foe  Nodes are also a source of weakness Constrained  Legal and social norms - essential to our legitimacy - will limit us but not our adversaries More UNCLASSIFIED Constrained
  • Future Character of Conflict Contested COMPLEX Connected Constrained CONTINGENCY COALITION URBAN Cluttered Congested 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Understanding 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Understanding “Intelligence is knowing a tomato is a fruit.Understanding is not putting it in a fruit salad.” JDP 04 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 19 March 2013© Crown copyright 2013 Dstl UNCLASSIFIED
  • Afghanistan 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Afghanistan 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 20 March 2013© Crown copyright 2013 Dstl
  • CONTINGENCY 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Change in intelligence focus Cold War Equipment Hierarchies Contingency People Activities/Relationships 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Change in intelligence focus 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 20 March 2013© Crown copyright 2013 Dstl
  • Size, Weight and Power = SWaP 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Communications 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Constraint and oversight Legal Ethical Moral Political 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • SCENARIOS Maritime Boarding Operation Insurgent Compound Assault Non-combatant Evacuation Operation (NEO) 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Maritime boarding operation 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Maritime boarding operation 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Compound assaultCompound Assault 20 March 2013UNCLASSIFIED copyright 2013 Dstl © Crown
  • Compound assault19 March 2013© Crown copyright 2013 Dstl UNCLASSIFIED
  • Compound assault19 March 2013© Crown copyright 2013 Dstl UNCLASSIFIED
  • Compound assault 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Compound assault 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Compound assault 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Non-combatant Evacuation Operation (NEO) 20 March 2013UNCLASSIFIED copyright 2013 Dstl © Crown
  • NEO 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • NEO 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • SummaryFuture Character of Conflict: 5CsISR focus: People and activitiesUnderstanding: Requires lots of informationLegal, ethical, moral, political constraintsMilitary are open to novel, smart alternatives 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  • Challenge 1: UnderstandingNetworks 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Not just people: organisations, locations, events, vehicles, phones, computers……. 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Background• MOD may have a need to support multiple operations at any one time, including working with coalition partners and local security forces.• There is a requirement to build up an understanding of the networks of people and supporting infrastructure.• There is a need to mine all the available information to identify individuals and groups who are interested in countering defence and security activity.• Operations may be data rich or data sparse, with information being fed from a number of sources, with varying degrees of confidence.• Requirement to fuse sources to build up network picture. 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • S&T challenges Sources: Open source; MOD; OGDs; Local military/security; Coalition partners Formats: Audio, Video, Text, Tabular, Imagery, STRUCTURED & UNSTRUCTURED Data quality Automated data diagnosis Data complexity Complexity estimation Volume Extraction of structured content Uncertainty Metadata tagging Timeliness Conversion to common format FLEXIBLE EXTRACT, TRANSFORMATION, AND LOADING 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • S&T challenges INFORMATION Common Interface ANALYTICS/PROCESSING REPOSITORIES Automation of common tasks Flexible and scalable data Machine-led pattern finding (eg storage anomaly detection)Integration with traditional data Automated prediction and structures validation Enhanced collaborative mechanisms AUGMENTATION OF ANALYTICAL WORKFLOW 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • What we want Fix one part of the challenge well, rather than several parts poorly Open architectures Use of open-source software is encouraged State what data types and functions your proposal will consider (be clear) Scalability of algorithms/solutions – will it handle “big data” Simple interfaces encouraged to reduce training burden 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • What we don’t want Reliance on existing proprietary solutions or closed APIs Enterprise-level solutions Avoid reliance on third-party services Avoid focussing on simple aspects of challenges: •Entity extraction •Extraction of common file formats (eg HTML) 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Summary Effective methods to explore the potentially large volume of data available from a variety of sources, across a range of data formats to help identify the key activities and individuals that form any network. • Information fusion • Scalable • Open architectures • Handling uncertainty • Ease of use 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  • Challenge 2: IdentifyingIndividuals 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Background• People are a key part of networks and network activities.• This challenge is focused on identifying the individuals and exploiting available information to establish linkages.• Wide range of scenarios across defence and security where potential for S&T in this area can have impact on future UK capability. 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Approaches to identifying an individual? 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • The overarching challenge• Techniques exist to enable identification of individuals and to exploit finds.• S&T to: – provide a significant step change in current approaches – provide a novel approach• This challenge is split into two key areas: – A. Person is present – B. Person is not present 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • A. The person is present• Range of scenarios – Voluntary enrolment of a person in the field – Entry into a base – On approach to military forces – Through activity 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • A. The person is present• Range of scenarios• As the person is present – Uncontaminated samples – Rapid processing – Range of environments – Ideally portable with low power (SWaP) – Although present person maybe at distance 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • B. The person is not present• Opportunities to exploit from traces or items left behind at a scene ? Scene of interest 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • B. The person is not present• Biometrics • Range of surfaces – time • Contamination • Environmental conditions• Other opportunities from the scene • Imagery, voice recordings, others?• Robust and adaptable to maximise opportunities• Add value to identify the individual(s) and/or establish linkages across the network 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • What are we looking for? General• New methods and approaches• Efficient collection of information• Wider information sources• Open architecture for software solutions• Sampling• Processing rates• Defence Lines of Development (DLODs)• Interoperability and use of international standards 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • What are we looking for? In the field• Remote use of equipment – Degrees of man portability – Lower power requirements• Ability to use in a range of environments• Approaches to consider lower bandwidth data links• Fast or very fast processing to support decision making• Efficient and effective sampling and storage 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • What are we looking for? Static location• External power supply• Access to on-site servers 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • What we don’t want• Standard law enforcement techniques or commercially available techniques for: • Detection of fingerprints • Face recognition • Iris recognition • DNA or its analysis • Speaker recognition 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Summary We need to be able to confirm the identity of individuals reliably with a step change in current capability or using novel approaches• Range of use scenarios • SWaP• Timeliness of sampling and • Interoperability processing 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  • Challenge 3: TranslatingInformation 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Background• MOD is active in a number of military operations globally, often in a CT role.• Majority of UK troops not fluent in local written or spoken language for area of operation.• Too much information to manually process.• Human translators support high accuracy but low volume translations.• Requirement for capability to better enable MOD’s understanding of local environment and population (feeds Challenge 1). 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • S&T challenges Video Audio Hard copy Digital Speaker attribution (eg dialect, emotion) Keyword extraction Speech to textOptical Character Recognition Speaker ID Machine translation Challenge 1 (to English) 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • What we want Optical Character Recognition Speech to text Portable/small solutions (tablet sized) Multiple languages (including non- Rapid processing western) Non-Latin text support Preference for untrained solutions Handwritten text Resilience to background noise Use of open standards Scalable to large volumes of dataMachine translation/Keyword extraction Speaker ID/Attribution Open software interfaces to enable Resilience to noise addition of classified keywords High accuracy High volume processing Minimal training (seconds) Rule-based machine translation Near real-time processing 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • What we don’t want Speech to text Optical Character Recognition English language solutions Latin alphabet OCR Closed interfaces/proprietary solutions Office-based solutions (non-portable) Reliance on third-party services Closed APIs which are difficult to Low volume/higher accuracy integrate Speaker ID/AttributionMachine translation/Keyword extraction Reliance on third-party services (eg Reliance on third-party services existing proprietary language models) Bilingual text corpora built from news Proposals requiring significant feeds or open sources (BBCM) Government Furnished Extras (GFX) Western languages 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Summary We need to be able to rapidly prioritise sources of information (audio, paper and electronic) to enable human interpreters to focus only on key information sources for full translation.• Modular solutions • Non-western language focus• High volume and real-time • Open architectures focus 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  • CDE Call Summary 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Aim of this CDE call• Identify innovative research that will provide a change in our ability to counter terrorist networks• Broad scope Proof of Initial Concept concept for a investigation development novel idea More Prototype advanced development research 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • For non-technology solutions the delta should be articulated Technology readiness levels programmeResearch 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • TRL for proposals TRL 1-6 • Only interested in proposals that have an end point from TRL 1- 6 • Proof-of-principle research feeding into the longer-term researchA portfolio of projects • TRL 4-5 work that could make a difference in the near term • Show a defined rise in TRL within the 6-month proposal TRL change • Further increases in TRL outside the 6-month timescale could be an option within the proposal • Please clearly articulate the technical aspects of the proposal and Technical aspects show how you expect the research to raise the TRL 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Proposal timingsCDE launch Decision pointevent Call closes: Successful 17.00 candidates informed Proposal Potential further research Assessment Up to 6 months x months 19 Mar 1 May Before 31 May 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Proposals• We are looking for proposals of up to 6 months in duration. – This timing will inform programme formulation for the following financial year. – This may provide the opportunity for follow-on work after the initial 6 months phase. Therefore after a clearly defined decision point at 6 months please state possible continuation work (subject to funding and possible alternate contracting routes).• There is no fixed value for any proposal but we would prefer to fund a larger number of smaller value proposals. We have allocated up to £700K for this call.• If GFX (government-furnished equipment/information/personnel) is unavoidable, please clearly state any assumptions in the proposal. 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • What are we looking for? Duration less than 6 months • Longer proposals will not be funded •In the view of experienced assessors (achievable Value for money and achievable within the proposed time frames and budgets) A step change in capability • Not “off the shelf” • Rather than funding development of existing Open architectures proprietary technology/software • Rather than duplication of already existing Novel ideas technology/ideas Clear articulation of technical details and • Expected outcome and the methods to achieve output this Explain how the proposal answers the • Please state clearly how this answers part/parts of challenge the challenges 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • • For further questions on the proposal requirements or technical details please contact us via: ctcenquiries@dstl.gov.uk 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  • Ethics• Some of the proposals may require Ethics Approval – Any research involving human participants in MOD research, both clinical and non- clinical requires ethics committee approval Clinical • Conduct research upon the human participant, including (but not limited to) administering substances, taking blood or urine samples, removing biological tissue, radiological investigations, or obtaining responses to an imposed stress or experimental situation. Non-Clinical • Conduct research to collect data on an identifiable individual’s behaviour, either directly or indirectly (such as by questionnaire or observation). 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Ethics• All proposals should declare if there are potential ethical hurdles to address• A proposal must, in the first instance, be scientifically robust in order for it to be, prima facie, ethical• If the proposal may require ethics approval, please make a three part proposal: – Milestone 1: Produce research protocols – Milestone 2: Obtaining ethics approval for the project – Milestone 3: Proposed research (subject to ethics approval)• More information – http://www.science.mod.uk/engagement/modrec/modrec.aspx 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  • Centre for Defence EnterpriseSubmitting a Successful Proposal Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
  • Maximising your chances
  • Know what is available Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  • Know what is available Centre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  • Know what is availableRead availableinformationIncluding CDEmanualsEspecially Quick StartGuide Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  • Developing a CDE proposal Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  • Value from technologyInnovative Futureconcept capability Proof of concept Incremental development Dstl is part of the Ministry of Defence
  • The essentials
  • Abstract
  • Assessmentmins
  • MOD Performance Assessment FrameworkFive criteria:Operational relevanceLikelihood of exploitationBuilds critical S&T capability to meet UKneedsScientific quality/innovationScience, innovation and technology risk
  • Proposal health check Centre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
  • Claim of future benefit
  • Contribution to future benefit
  • Logical programme of work
  • Generation of evidence
  • Demonstration of progress
  • Health checkBased on a claim of future benefitContribution to realisation of future benefitLogical programme of workEvidential outcomesDemonstration of progress towards goal Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
  • Government-furnished X Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  • Ethics
  • Health and safety
  • Unclassified
  • Early birds
  • Deadline This call closes: 17:00 hrs onWednesday 1 May 2013 Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  • Call process queries Centre for Defence Enterprise 01235 438445 cde@dstl.gov.ukwww.science.mod.uk/enterprise Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
  • Call technical queriesctcenquiries@dstl.gov.uk Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  • Further information www.science.mod.ukEvents and Calls > Current calls for proposals > The Challenges of Countering Terrorist Networks Webinar – Tuesday 26 March 2013 12:30-13:30 Details on the call webpage Email craig.cook@aadktn.co.uk to join Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  • Network and question