The Challenges of Countering Terrorist Networks - CDE themed call launch 19 Mar 2013

1,465 views

Published on

Presentations from CDE themed call launch event on 19 March 2013. For full details of the call see: http://www.science.mod.uk/events/event_detail.aspx?eventid=202

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,465
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
56
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

The Challenges of Countering Terrorist Networks - CDE themed call launch 19 Mar 2013

  1. 1. The Challenges of Countering Terrorist NetworksCentre for Defence Enterprise (CDE)
  2. 2. The aim of CDE© Crown Copyright MOD 2011
  3. 3. Prove the value of novel, high-risk, high-potential-benefit research© Crown Copyright MOD 2011
  4. 4. To enable development of cost- effective capability advantage© Crown Copyright MOD 2011
  5. 5. Engaging a broad audience 6
  6. 6. Providing opportunity
  7. 7. Two routes to funding
  8. 8. Themed calls
  9. 9. CDE themed call programmeSmart and multifunctional materials Call closes 12 April 2013and structures (at 1700 hrs)The challenges of countering Call closes 1 May 2013terrorist networks (at 1700 hrs)Precision timing Call launch 23 April 2013Secure communications Call launch 18 June 2013Innovation in drug development Call launch 25 June 2013processesEnhancing military medical training Call launch 16 July 2013and support for the medicRegister and further details at www.science.mod.uk under ‘Events and Calls’ Centre for Defence Enterprise Dstl is part of the www.science.mod.uk/enterprise cde@dstl.gov.uk Ministry of Defence UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
  10. 10. Defence Open Call
  11. 11. Seeking the exceptional
  12. 12. Challenging conventions
  13. 13. Novel fibres for CBR protection
  14. 14. ‘Micro generators’
  15. 15. Sustaining participation
  16. 16. Minimising participation cost
  17. 17. Online bid submission
  18. 18. Compliance
  19. 19. Intellectual property
  20. 20. The future of CDE
  21. 21. Making an impact
  22. 22. 4283proposals received
  23. 23. 16%proposals funded
  24. 24. £37Mcontracts awarded
  25. 25. CDE advantagesAccessibleRapid assessmentEasy contractingQuick paymentsBenevolent IP arrangements
  26. 26. Effective proposals© Crown Copyright MOD 2011
  27. 27. Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking with lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking with refreshments15:15 Event close
  28. 28. Network and question
  29. 29. Centre for Defence Enterprise Advanced Design and 01235 438445 Manufacturing cde@dstl.gov.uk www.science.mod.uk/enterpriseCentre for Defence Enterprise Wing Commander Jim Pennycook
  30. 30. Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  31. 31. 20 March 2013© Crown copyright 2013 Dstl UNCLASSIFIED
  32. 32. The Challenges of Countering Terrorist Networks 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  33. 33. Countering terrorist networksHarnessing and developing science and technology (S&T) to increase defence and security capability to pursue and disrupt threats to UK 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  34. 34. Today’s CDE call S&T challenges Challenge 2: Identifying Individuals Challenge 3: Translating Information Challenge 1: Understanding the Network 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  35. 35. Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  36. 36. The Challenges of Countering TerroristNetworksMilitary Context 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  37. 37. 19 March 2013© Crown copyright 2013 Dstl UNCLASSIFIED
  38. 38. References 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  39. 39. References 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  40. 40. TerminologyISR = Intelligence, Surveillance and ReconnaissanceISTAR = Intelligence, Surveillance, Target Acquisition and ReconnaissanceC4ISR = Command Control , Computers, Communications and ISRE2E3 = End to End EnterpriseMPE = Materiel and Personnel ExploitationFABINT = Forensic and Biometric IntelligenceDOCEX/DOMEX = Document Exploitation/Document and Media ExploitationSIGINT = Signals IntelligenceOSINT = Open Source IntelligenceWTI = Weapons Technical Intelligence 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  41. 41. Future Character of Conflict: 5Cs Contested Connected Constrained Cluttered Congested 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  42. 42. The Future Battlespace Contested  Competition for resources. All geographies of operation are contested  Sea, land, air & space, cyberspace and information Congested  To influence people we have to operate in, over and close to where they live. People live in urban areas in the littoral  There is no empty battlefield Cluttered  Network Enabled Capability will not fully lift the fog of war  We need to understand and to discriminate Connected  Networks - source of strength for friend and foe  Nodes are also a source of weakness Constrained  Legal and social norms - essential to our legitimacy - will limit us but not our adversaries More UNCLASSIFIED Constrained
  43. 43. Future Character of Conflict Contested COMPLEX Connected Constrained CONTINGENCY COALITION URBAN Cluttered Congested 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  44. 44. Understanding 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  45. 45. Understanding “Intelligence is knowing a tomato is a fruit.Understanding is not putting it in a fruit salad.” JDP 04 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  46. 46. 19 March 2013© Crown copyright 2013 Dstl UNCLASSIFIED
  47. 47. Afghanistan 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  48. 48. Afghanistan 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  49. 49. 20 March 2013© Crown copyright 2013 Dstl
  50. 50. CONTINGENCY 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  51. 51. Change in intelligence focus Cold War Equipment Hierarchies Contingency People Activities/Relationships 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  52. 52. Change in intelligence focus 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  53. 53. 20 March 2013© Crown copyright 2013 Dstl
  54. 54. Size, Weight and Power = SWaP 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  55. 55. Communications 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  56. 56. Constraint and oversight Legal Ethical Moral Political 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  57. 57. SCENARIOS Maritime Boarding Operation Insurgent Compound Assault Non-combatant Evacuation Operation (NEO) 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  58. 58. Maritime boarding operation 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  59. 59. Maritime boarding operation 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  60. 60. Compound assaultCompound Assault 20 March 2013UNCLASSIFIED copyright 2013 Dstl © Crown
  61. 61. Compound assault19 March 2013© Crown copyright 2013 Dstl UNCLASSIFIED
  62. 62. Compound assault19 March 2013© Crown copyright 2013 Dstl UNCLASSIFIED
  63. 63. Compound assault 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  64. 64. Compound assault 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  65. 65. Compound assault 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  66. 66. Non-combatant Evacuation Operation (NEO) 20 March 2013UNCLASSIFIED copyright 2013 Dstl © Crown
  67. 67. NEO 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  68. 68. NEO 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  69. 69. SummaryFuture Character of Conflict: 5CsISR focus: People and activitiesUnderstanding: Requires lots of informationLegal, ethical, moral, political constraintsMilitary are open to novel, smart alternatives 19 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  70. 70. Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  71. 71. Challenge 1: UnderstandingNetworks 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  72. 72. Not just people: organisations, locations, events, vehicles, phones, computers……. 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  73. 73. Background• MOD may have a need to support multiple operations at any one time, including working with coalition partners and local security forces.• There is a requirement to build up an understanding of the networks of people and supporting infrastructure.• There is a need to mine all the available information to identify individuals and groups who are interested in countering defence and security activity.• Operations may be data rich or data sparse, with information being fed from a number of sources, with varying degrees of confidence.• Requirement to fuse sources to build up network picture. 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  74. 74. S&T challenges Sources: Open source; MOD; OGDs; Local military/security; Coalition partners Formats: Audio, Video, Text, Tabular, Imagery, STRUCTURED & UNSTRUCTURED Data quality Automated data diagnosis Data complexity Complexity estimation Volume Extraction of structured content Uncertainty Metadata tagging Timeliness Conversion to common format FLEXIBLE EXTRACT, TRANSFORMATION, AND LOADING 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  75. 75. S&T challenges INFORMATION Common Interface ANALYTICS/PROCESSING REPOSITORIES Automation of common tasks Flexible and scalable data Machine-led pattern finding (eg storage anomaly detection)Integration with traditional data Automated prediction and structures validation Enhanced collaborative mechanisms AUGMENTATION OF ANALYTICAL WORKFLOW 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  76. 76. What we want Fix one part of the challenge well, rather than several parts poorly Open architectures Use of open-source software is encouraged State what data types and functions your proposal will consider (be clear) Scalability of algorithms/solutions – will it handle “big data” Simple interfaces encouraged to reduce training burden 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  77. 77. What we don’t want Reliance on existing proprietary solutions or closed APIs Enterprise-level solutions Avoid reliance on third-party services Avoid focussing on simple aspects of challenges: •Entity extraction •Extraction of common file formats (eg HTML) 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  78. 78. Summary Effective methods to explore the potentially large volume of data available from a variety of sources, across a range of data formats to help identify the key activities and individuals that form any network. • Information fusion • Scalable • Open architectures • Handling uncertainty • Ease of use 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  79. 79. Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  80. 80. Challenge 2: IdentifyingIndividuals 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  81. 81. Background• People are a key part of networks and network activities.• This challenge is focused on identifying the individuals and exploiting available information to establish linkages.• Wide range of scenarios across defence and security where potential for S&T in this area can have impact on future UK capability. 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  82. 82. Approaches to identifying an individual? 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  83. 83. The overarching challenge• Techniques exist to enable identification of individuals and to exploit finds.• S&T to: – provide a significant step change in current approaches – provide a novel approach• This challenge is split into two key areas: – A. Person is present – B. Person is not present 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  84. 84. A. The person is present• Range of scenarios – Voluntary enrolment of a person in the field – Entry into a base – On approach to military forces – Through activity 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  85. 85. A. The person is present• Range of scenarios• As the person is present – Uncontaminated samples – Rapid processing – Range of environments – Ideally portable with low power (SWaP) – Although present person maybe at distance 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  86. 86. B. The person is not present• Opportunities to exploit from traces or items left behind at a scene ? Scene of interest 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  87. 87. B. The person is not present• Biometrics • Range of surfaces – time • Contamination • Environmental conditions• Other opportunities from the scene • Imagery, voice recordings, others?• Robust and adaptable to maximise opportunities• Add value to identify the individual(s) and/or establish linkages across the network 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  88. 88. What are we looking for? General• New methods and approaches• Efficient collection of information• Wider information sources• Open architecture for software solutions• Sampling• Processing rates• Defence Lines of Development (DLODs)• Interoperability and use of international standards 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  89. 89. What are we looking for? In the field• Remote use of equipment – Degrees of man portability – Lower power requirements• Ability to use in a range of environments• Approaches to consider lower bandwidth data links• Fast or very fast processing to support decision making• Efficient and effective sampling and storage 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  90. 90. What are we looking for? Static location• External power supply• Access to on-site servers 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  91. 91. What we don’t want• Standard law enforcement techniques or commercially available techniques for: • Detection of fingerprints • Face recognition • Iris recognition • DNA or its analysis • Speaker recognition 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  92. 92. Summary We need to be able to confirm the identity of individuals reliably with a step change in current capability or using novel approaches• Range of use scenarios • SWaP• Timeliness of sampling and • Interoperability processing 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  93. 93. Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  94. 94. Challenge 3: TranslatingInformation 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  95. 95. Background• MOD is active in a number of military operations globally, often in a CT role.• Majority of UK troops not fluent in local written or spoken language for area of operation.• Too much information to manually process.• Human translators support high accuracy but low volume translations.• Requirement for capability to better enable MOD’s understanding of local environment and population (feeds Challenge 1). 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  96. 96. S&T challenges Video Audio Hard copy Digital Speaker attribution (eg dialect, emotion) Keyword extraction Speech to textOptical Character Recognition Speaker ID Machine translation Challenge 1 (to English) 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  97. 97. What we want Optical Character Recognition Speech to text Portable/small solutions (tablet sized) Multiple languages (including non- Rapid processing western) Non-Latin text support Preference for untrained solutions Handwritten text Resilience to background noise Use of open standards Scalable to large volumes of dataMachine translation/Keyword extraction Speaker ID/Attribution Open software interfaces to enable Resilience to noise addition of classified keywords High accuracy High volume processing Minimal training (seconds) Rule-based machine translation Near real-time processing 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  98. 98. What we don’t want Speech to text Optical Character Recognition English language solutions Latin alphabet OCR Closed interfaces/proprietary solutions Office-based solutions (non-portable) Reliance on third-party services Closed APIs which are difficult to Low volume/higher accuracy integrate Speaker ID/AttributionMachine translation/Keyword extraction Reliance on third-party services (eg Reliance on third-party services existing proprietary language models) Bilingual text corpora built from news Proposals requiring significant feeds or open sources (BBCM) Government Furnished Extras (GFX) Western languages 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  99. 99. Summary We need to be able to rapidly prioritise sources of information (audio, paper and electronic) to enable human interpreters to focus only on key information sources for full translation.• Modular solutions • Non-western language focus• High volume and real-time • Open architectures focus 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  100. 100. Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  101. 101. CDE Call Summary 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  102. 102. Aim of this CDE call• Identify innovative research that will provide a change in our ability to counter terrorist networks• Broad scope Proof of Initial Concept concept for a investigation development novel idea More Prototype advanced development research 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  103. 103. For non-technology solutions the delta should be articulated Technology readiness levels programmeResearch 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  104. 104. TRL for proposals TRL 1-6 • Only interested in proposals that have an end point from TRL 1- 6 • Proof-of-principle research feeding into the longer-term researchA portfolio of projects • TRL 4-5 work that could make a difference in the near term • Show a defined rise in TRL within the 6-month proposal TRL change • Further increases in TRL outside the 6-month timescale could be an option within the proposal • Please clearly articulate the technical aspects of the proposal and Technical aspects show how you expect the research to raise the TRL 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  105. 105. Proposal timingsCDE launch Decision pointevent Call closes: Successful 17.00 candidates informed Proposal Potential further research Assessment Up to 6 months x months 19 Mar 1 May Before 31 May 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  106. 106. Proposals• We are looking for proposals of up to 6 months in duration. – This timing will inform programme formulation for the following financial year. – This may provide the opportunity for follow-on work after the initial 6 months phase. Therefore after a clearly defined decision point at 6 months please state possible continuation work (subject to funding and possible alternate contracting routes).• There is no fixed value for any proposal but we would prefer to fund a larger number of smaller value proposals. We have allocated up to £700K for this call.• If GFX (government-furnished equipment/information/personnel) is unavoidable, please clearly state any assumptions in the proposal. 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  107. 107. What are we looking for? Duration less than 6 months • Longer proposals will not be funded •In the view of experienced assessors (achievable Value for money and achievable within the proposed time frames and budgets) A step change in capability • Not “off the shelf” • Rather than funding development of existing Open architectures proprietary technology/software • Rather than duplication of already existing Novel ideas technology/ideas Clear articulation of technical details and • Expected outcome and the methods to achieve output this Explain how the proposal answers the • Please state clearly how this answers part/parts of challenge the challenges 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  108. 108. • For further questions on the proposal requirements or technical details please contact us via: ctcenquiries@dstl.gov.uk 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  109. 109. Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  110. 110. Ethics• Some of the proposals may require Ethics Approval – Any research involving human participants in MOD research, both clinical and non- clinical requires ethics committee approval Clinical • Conduct research upon the human participant, including (but not limited to) administering substances, taking blood or urine samples, removing biological tissue, radiological investigations, or obtaining responses to an imposed stress or experimental situation. Non-Clinical • Conduct research to collect data on an identifiable individual’s behaviour, either directly or indirectly (such as by questionnaire or observation). 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  111. 111. Ethics• All proposals should declare if there are potential ethical hurdles to address• A proposal must, in the first instance, be scientifically robust in order for it to be, prima facie, ethical• If the proposal may require ethics approval, please make a three part proposal: – Milestone 1: Produce research protocols – Milestone 2: Obtaining ethics approval for the project – Milestone 3: Proposed research (subject to ethics approval)• More information – http://www.science.mod.uk/engagement/modrec/modrec.aspx 20 March 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  112. 112. Agenda10:30 Introduction to CDE10:45 Counter Terrorism Science & Technology Centre overview10:55 Military context11:25 Challenge 1 – understanding networks11:40 Challenge 2 – identifying individuals11:55 Q&A12:05 Networking lunch13:00 Challenge 3 – translating information13:15 Call summary13:20 Ethics13:25 CDE – submitting a successful proposal13:35 Q&A13:45 Networking15:15 Event close
  113. 113. Centre for Defence EnterpriseSubmitting a Successful Proposal Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
  114. 114. Maximising your chances
  115. 115. Know what is available Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  116. 116. Know what is available Centre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  117. 117. Know what is availableRead availableinformationIncluding CDEmanualsEspecially Quick StartGuide Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  118. 118. Developing a CDE proposal Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  119. 119. Value from technologyInnovative Futureconcept capability Proof of concept Incremental development Dstl is part of the Ministry of Defence
  120. 120. The essentials
  121. 121. Abstract
  122. 122. Assessmentmins
  123. 123. MOD Performance Assessment FrameworkFive criteria:Operational relevanceLikelihood of exploitationBuilds critical S&T capability to meet UKneedsScientific quality/innovationScience, innovation and technology risk
  124. 124. Proposal health check Centre for Defence Enterprisewww.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
  125. 125. Claim of future benefit
  126. 126. Contribution to future benefit
  127. 127. Logical programme of work
  128. 128. Generation of evidence
  129. 129. Demonstration of progress
  130. 130. Health checkBased on a claim of future benefitContribution to realisation of future benefitLogical programme of workEvidential outcomesDemonstration of progress towards goal Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
  131. 131. Government-furnished X Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  132. 132. Ethics
  133. 133. Health and safety
  134. 134. Unclassified
  135. 135. Early birds
  136. 136. Deadline This call closes: 17:00 hrs onWednesday 1 May 2013 Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  137. 137. Call process queries Centre for Defence Enterprise 01235 438445 cde@dstl.gov.ukwww.science.mod.uk/enterprise Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
  138. 138. Call technical queriesctcenquiries@dstl.gov.uk Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  139. 139. Further information www.science.mod.ukEvents and Calls > Current calls for proposals > The Challenges of Countering Terrorist Networks Webinar – Tuesday 26 March 2013 12:30-13:30 Details on the call webpage Email craig.cook@aadktn.co.uk to join Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Crown Copyright Dstl 2012
  140. 140. Network and question

×