SlideShare a Scribd company logo
1 of 34
Blue and Gray Berets
H4D Team Members
Chris Cottrell
J.D. Englehart
Patrick Hynes
Brian Norville
Jeremy Straughter
Team
Chris Cottrell J.D. Englehart Patrick Hynes Brian Norville
Jeremy
Straughter
MBA MBA MBA
Masters in Technology
Management
MPM
https://www.linkedin.c
om/in/chriscottrell
https://www.linkedin.c
om/in/jdenglehart
https://www.linkedin.c
om/in/patrickhynes
https://www.linkedin.c
om/in/brian-norville-
023b09131
https://www.linkedin.c
om/in/jeremystraughte
r
Experience in
government work,
future USAR
intelligence officer,
More than four years
experience in
government
contracting, including
in direct support of
cleared cyber
programs for IC
customers.
More than four years
experience developing
software for Defense
and Intelligence
customers as a
Software Engineer at
Harris Corp.
More than four years
providing intelligence
analysis and
document and media
exploitation support to
the Intelligence
Community.
More than fifteen
years in the United
States Army; six years
of special operations
experience within
USSOCOM.
Problem:
Develop a one-way, cross domain solution (CDS) that allows SOCOM to move information from an external media device
(e.g. thumb drive, hard drive, SD Card) directly into a SECRET computer system.
External Media Stand-Alone System Approved Media Classified Network
UNIFIED COMMAND STRUCTURE
THEATER SPECIAL OPERATIONS COMMAND
SOCOM ACQUISITION CENTER
Initial
MVP
• One Way Connection
• Windows Machine w/virus scanning capability
• Small form factor
• Support for multiple connections formats
• Durable
CDS
Transfer
Source Device
Destination Device
• Multiple formats
to include SD
cards, USB, CD
● Windows Machine
Temporar
y Storage
Virus
Scan
Hypothesis
Hypothesis
Special Operations Command (SOCOM) wants to transfer data from removable
media and SSE to a connected Secret computer system.
Experiments: USSOCOM, NSW
1. Why does SOCOM need a cross domain solution (CDS) when there are
several successful workaround methods?
2. How much time does data transfer currently take?
3. How long do current cross domain transfer processes take?
4. Is the Naval Special Warfare Command aware of how others are solving this
problem across SOCOM enterprise? Throughout the
interagency/intelligence community?
Hypothesis
Hypothesis
The CDS solution is required to go through an accreditation process.
Experiments: Customer Interviews- UCDSMO, DSAWG, NSA
1. What is the accreditation process for CDS solutions?
2. Is there a timeframe for the accreditation process?
3. Is there a cost associated with the accreditation process?
Discovery
◇The need for secure and expedited transfer of data from removable media and SSE to
SECRET classified systems
◇There is a multi-organization accreditation process. The process starts with the Air Force
CDO, then goes to the Cross Domain Technical Advisory Board (CDTAB), then to the Defense
Information Assurance Security Accreditation Working Group (DSAWG), and finally to the
DOD Information Security Risk Management Committee (DOD ISRMC). Accreditation costs is
between 500k-700k and can take 12 months or more.
◇A solution called TACDS already exists and is currently going through accreditation
process.
◇Each military branch has their own cross domain office.
“
I don’t think this is an issue of lack of technology.
The technology is out there.
Hypothesis
Hypothesis
Special Operations Command (SOCOM)’s needs are met by the broader
community, with occasional new feature introductions and associated
accreditation cycles.
Experiments: Customer Interview – SOCOM, Perfecta Federal, NSA, Army CDO
1. Why does SOCOM need a cross domain solution (CDS) when there are
several successful workaround methods and solutions?
2. Does TACDS solve the needs if approved?
3. Are policies valid?
Discovery
◇TACDS fits most of customer requirements, but does not support COT.
◇ Accreditation process is slow and does not allow rapid feature introduction.
◇There is an abbreviated accreditation process for new or modified features.
Process depends on complexity of feature.
◇The problem of not being able transfer information cross domain is primarily an
issue for Theater SOF and personnel in an office setting.
MVP
Mission Model Canvas
Mission/Problem
Description
Key Activities
Deployment
Value Propositions
Mission Budget/Cost Mission Achievement/Impact
Factors
Key Resources
Buy-In & SupportKey Partners
Beneficiaries
Design a one-way CDS to transfer unclassified data to a connected secret computer for
dissemination to SOTF Commander.
Secure, one-way transfer of
tactical ISR data to a SIPR
computer
Train SOF personnel in proper use
of hardware and software.
Conducts more missions because
the Intelligence Officer provides
more consistent targets with better
analysis.
Provides more targets to operators
because the CDS streamlines data
transfer process - more information,
better analysis, consistent
dissemination.
SOCOM Acquisition Center
Cross Domain Management
Office
Physically distribute to SOF units
through USSOCOM
Task Force Commander
Operations Officer
Intelligence Officer
Detachment Commander
Intelligence Sergeant
Communications Sergeant
Staff Judge Advocate
SOF personnel can easily use solution to successfully transfer ISR information from
unclassified systems to DOD SIPRNet.
USSOCOM Acquisition Center
● Comptroller
● Logistics/J4
● Procurement
● Science & Tech
● PEO C4
Perfecta Federal
Brendon Reedy, Sponsor,
USSOCOM PEO SOF Warrior XTS Guard 5
Perfecta Federal Software
Pricing information not available (we did ask)
Recommendations
1. Increased information sharing within SOCOM regarding cross domain
accreditation process and associated costs.
2. Information sharing on service level cross domain offices.
3. Information sharing on types of Cross Domain Solutions (Example: guards vs.
composed).
4. Greater knowledge of existing solutions on the market.
Way Forward
No viable commercial opportunity
◇High CAPEX
◇High barriers to entry (accreditation and time to revenue)
◇Technical expertise not on the team
◇Solutions exist
◇Relatively small market without product suite
We have connected USSOCOM and Perfecta Federal. They are in discussions for
potential purchase.
JIDO Framework
“…as directed by the Deputy Secretary of Defense (DSD), JIDO will enable rapid tactical
responsiveness and anticipate acquisition requirements to prepare for, and react to,
battlefield surprise to help meet counter-terrorism (CT), counter-insurgency (COIN), and
other related operational challenges, including counter-improvised explosive device (C-IED).”
JIDO asked for a framework that
• Defines the improvised threat
• Considers the JIDO mission statement
• Considers the operational environment
• Could focus on domain and relevant technologies
• JIDO excels in rapid acquisitions by using its Joint Improvised Explosive
Device Defeat Fund (JIEDDF)
• JIDO’s pinwheel is a visualization of the authorities given it by the Joint
Staff to counter the IED threat (JROCM)
• JIDO lacks the authority to execute the preemptive acquisitions
strategies that its mission statement requires
• JIDO lacks a framework that articulates how its use of the JIEDDF has
achieved the desired outcomes (i.e., threat mitigation and reduction).
Key Findings
22
UNCLASSIFIED
UNCLASSIFIED
DTRA-JIDO
Rapid Reaction Technology
Office X X X
Rapid Equipping Force X X X X
Rapid Capabilities Offices X X X X
Countering Terrorism
Technical Support Office X X X
JIDO Organizational Comparison
✓ ✓ ✓ ✓ ✓
✓
✓
✓
✓
✓
1. DODD 5105. 62 Establishes DTRA’s mission, organization and management, responsibilities and functions, relationships, authorities, and administration
2. CJCSI 3170.01 Establishes JCIDS as the process used by JROC to fulfill its responsibilities to the CJCS to assess and prioritize joint military capability requirements
3. DoDD 5000.02 Enclosure 13 provides policy and procedure for acquisition programs to fulfill urgent operational needs and other quick reaction capabilities that can
be fielded in less than 2 years
4. 2007 NDAA Established the Joint IED Defeat Fund (JIEDDF), a standalone 3-year, flexible appropriation (i.e. “colorless”)
5. JIDO CONOPS Approved by USD(AT&L), the CONOPS establishes JIDO’s mission, responsibilities, organization, lines of operations, authorities, and relationship to
DTRA
6. DoDD 5000.71 Establishes the Warfighter Senior Integration Group (W-SIG) to lead and assign responsibility for rapid responses to combatant commander JUONs
and JEONs
7. DODD 3000.06 Establishes policy and responsibilities for Combat Support Agencies (CSA)
(1, 7) (2,5) (4) (3, 6)
JIDO Authorities
JIDO operates in a mission space which is unique in DoD
(5)
JIDO enables DOD actions to counter
improvised threats with tactical
responsiveness and through
anticipatory, rapid acquisition in
support of GCC efforts to prepare
for, and adapt to, battlefield
surprise in support of counter-
terrorism (CT), counter-insurgency
(COIN), and other related mission
areas, including counter-improvised
explosive device (C-IED).
Joint Improvised-Threat Defeat Organization
Mission Statement
24
UNCLASSIFIED
UNCLASSIFIED
Anticipatory
Actions
Understanding of
Capability Gaps
Risk Tolerant
Pursue Emerging
Technologies
Broad Understanding of the
Threat
Unified Team of
Operators & Scientists
Improvised Threat
Expertise
Partnering with Industry,
Academia, & Allied Nations
Unique Authorities &
Processes
0-2 Year Solution
Development & Delivery
Flexible Funding
Authority
In-Theater Implementation &
Integration Support
Rapid Solution
Development & Delivery
Agile Testing
& Evaluation
Integrated Approach to
Problem Solving
Customized and
Proven Oversight
Process
J8 has distinct capabilities in four strategic focus areas, which together compose an integrated solution set unique in DoD
JIDO J8 Strategic Focus Areas
Maintain Knowledge
Leadership
Mitigate Battlefield
Surprise
Ensure Rapid Response
Solve Warfighter
Problems
• Deliberate Requirements
– Service, CCMD or Agency Driven
– Traditional route for capabilities that require
significant tech development and/or are not urgent
or compelling in nature
• Emergent Requirements
– CCMD Driven
– Supports accelerated acquisition of capabilities
needed for an anticipated or pending contingency
operation
– VCJCS verifies, JCB or JROC validates
• Urgent Requirements
– CCMD Driven
– Urgent and compelling to prevent loss of life
and/or mission failure during current operations
– Require little tech development and can be
resolved in less than two years
– DDR validates
“Keep right, except to
pass”
D
E
L
I
B
E
R
A
T
E
E
M
E
R
G
E
N
T
U
R
G
E
N
T
0 – 2
YRS
0+ to
5 YRS
CONFLICT
LANE
ONLY
POTENTIAL
CONFLICT
LANE
2-6+
YRS
Three Requirements “Lanes”
Mission Model Canvas
Mission/Problem Description
Key Activities
Deployment
Value Propositions
Mission Budget/Cost Mission Achievement/Impact
Factors
Key Resources
Buy-In & SupportKey Partners
Beneficiaries
Develop a framework to anticipate improvised threats
Refine threat definition
parameters
Refine risk analysis
parameters
Method for categorizing
threats, prioritizing threats,
and categorizing responses
to threats in order to more
effectively organize
understanding of future
threats and responses.
Joint Staff
JIDO
Contracted Personnel
Adopted by JIDO, and
implemented in day-to-
day business across the
organization
Vice Chairman, JCS
Vice Chairman, Services
Geographic Combatant
CommanderContract Personnel
JIDO J8
Those supporting threat tactics, techniques, procedures (TTP)
and devices designed, fielded, or employed in any modality of
conflict that adversely affect US joint force maneuverability or
force protection.
-JIDO Concept of Operations
Improvised Threat Defined
Asymmetric Improvised
Tactics vs. Means
◇ Organized, unconventional
action against a much
larger force
◇ Common or Improvised
Weapons
◇ Low Barrier to Entry
■ Inexpensive,
■ Rapidly producible
■ Minimal Training
◇ Uses or combines items
contrary to their intended
purpose
JIDO
Framework
MVP
JIDO
Framework
MVP
● COA #1: Give JIDO an updated authorities document
that defines anticipatory acquisitions, improvised
threats, and JIDO’s role
● COA #2: Change the Mission Statement to focus
solely on the rapid acquisition and not anticipation
● COA #3: JIDO serves as a sensor for potential
improvised threats, but takes no further action
without GCC/Service concurrence
Recommendations
Thank You
Any questions?

More Related Content

What's hot

Aqualink Week 7 H4D Stanford 2016
Aqualink Week 7 H4D Stanford 2016Aqualink Week 7 H4D Stanford 2016
Aqualink Week 7 H4D Stanford 2016Stanford University
 
Sentinel Lessons Learned H4D Stanford 2016
Sentinel Lessons Learned H4D Stanford 2016Sentinel Lessons Learned H4D Stanford 2016
Sentinel Lessons Learned H4D Stanford 2016Stanford University
 
Neurosmart H4D 2021 Lessons Learned
Neurosmart H4D 2021 Lessons LearnedNeurosmart H4D 2021 Lessons Learned
Neurosmart H4D 2021 Lessons LearnedStanford University
 
Lecture 7 Activities, Resources and Partners H4D Stanford 2016
Lecture 7 Activities, Resources and Partners H4D Stanford 2016Lecture 7 Activities, Resources and Partners H4D Stanford 2016
Lecture 7 Activities, Resources and Partners H4D Stanford 2016Stanford University
 
Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017Stanford University
 
Guardian Week 7 H4D Stanford 2016
Guardian Week 7 H4D Stanford 2016Guardian Week 7 H4D Stanford 2016
Guardian Week 7 H4D Stanford 2016Stanford University
 
Skynet Lessons Learned H4D Stanford 2016
Skynet Lessons Learned H4D Stanford 2016Skynet Lessons Learned H4D Stanford 2016
Skynet Lessons Learned H4D Stanford 2016Stanford University
 
Guardian Week 9 H4D Stanford 2016
Guardian Week 9 H4D Stanford 2016Guardian Week 9 H4D Stanford 2016
Guardian Week 9 H4D Stanford 2016Stanford University
 
Guardian Lessons Learned H4D Stanford 2016
Guardian Lessons Learned H4D Stanford 2016Guardian Lessons Learned H4D Stanford 2016
Guardian Lessons Learned H4D Stanford 2016Stanford University
 
Sentinel Week 8 H4D Stanford 2016
Sentinel Week 8 H4D Stanford 2016Sentinel Week 8 H4D Stanford 2016
Sentinel Week 8 H4D Stanford 2016Stanford University
 
2005 Project Management Institute presentation on Risk Management
2005 Project Management Institute presentation on Risk Management2005 Project Management Institute presentation on Risk Management
2005 Project Management Institute presentation on Risk ManagementKarl Davey
 
Guardian Week 4 H4D Stanford 2016
Guardian Week 4 H4D Stanford 2016Guardian Week 4 H4D Stanford 2016
Guardian Week 4 H4D Stanford 2016Stanford University
 
Aqualink Week 5 H4D Stanford 2016
Aqualink Week 5 H4D Stanford 2016Aqualink Week 5 H4D Stanford 2016
Aqualink Week 5 H4D Stanford 2016Stanford University
 

What's hot (19)

Aqualink Week 7 H4D Stanford 2016
Aqualink Week 7 H4D Stanford 2016Aqualink Week 7 H4D Stanford 2016
Aqualink Week 7 H4D Stanford 2016
 
Sentinel Lessons Learned H4D Stanford 2016
Sentinel Lessons Learned H4D Stanford 2016Sentinel Lessons Learned H4D Stanford 2016
Sentinel Lessons Learned H4D Stanford 2016
 
Neurosmart H4D 2021 Lessons Learned
Neurosmart H4D 2021 Lessons LearnedNeurosmart H4D 2021 Lessons Learned
Neurosmart H4D 2021 Lessons Learned
 
Lecture 7 Activities, Resources and Partners H4D Stanford 2016
Lecture 7 Activities, Resources and Partners H4D Stanford 2016Lecture 7 Activities, Resources and Partners H4D Stanford 2016
Lecture 7 Activities, Resources and Partners H4D Stanford 2016
 
Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017
 
Guardian Week 7 H4D Stanford 2016
Guardian Week 7 H4D Stanford 2016Guardian Week 7 H4D Stanford 2016
Guardian Week 7 H4D Stanford 2016
 
Skynet Lessons Learned H4D Stanford 2016
Skynet Lessons Learned H4D Stanford 2016Skynet Lessons Learned H4D Stanford 2016
Skynet Lessons Learned H4D Stanford 2016
 
Guardian Week 9 H4D Stanford 2016
Guardian Week 9 H4D Stanford 2016Guardian Week 9 H4D Stanford 2016
Guardian Week 9 H4D Stanford 2016
 
Guardian Lessons Learned H4D Stanford 2016
Guardian Lessons Learned H4D Stanford 2016Guardian Lessons Learned H4D Stanford 2016
Guardian Lessons Learned H4D Stanford 2016
 
Skynet Week 3 H4D Stanford 2016
Skynet Week 3 H4D Stanford 2016Skynet Week 3 H4D Stanford 2016
Skynet Week 3 H4D Stanford 2016
 
Sentinel Week 8 H4D Stanford 2016
Sentinel Week 8 H4D Stanford 2016Sentinel Week 8 H4D Stanford 2016
Sentinel Week 8 H4D Stanford 2016
 
Skynet Week 9 H4D Stanford 2016
Skynet Week 9 H4D Stanford 2016Skynet Week 9 H4D Stanford 2016
Skynet Week 9 H4D Stanford 2016
 
Skynet Week 2 H4D Stanford 2016
Skynet Week 2 H4D Stanford 2016Skynet Week 2 H4D Stanford 2016
Skynet Week 2 H4D Stanford 2016
 
2005 Project Management Institute presentation on Risk Management
2005 Project Management Institute presentation on Risk Management2005 Project Management Institute presentation on Risk Management
2005 Project Management Institute presentation on Risk Management
 
Riskpro security audit
Riskpro security auditRiskpro security audit
Riskpro security audit
 
Agile and the DoD
Agile and the DoDAgile and the DoD
Agile and the DoD
 
Skynet Week 5 H4D Stanford 2016
Skynet Week 5 H4D Stanford 2016Skynet Week 5 H4D Stanford 2016
Skynet Week 5 H4D Stanford 2016
 
Guardian Week 4 H4D Stanford 2016
Guardian Week 4 H4D Stanford 2016Guardian Week 4 H4D Stanford 2016
Guardian Week 4 H4D Stanford 2016
 
Aqualink Week 5 H4D Stanford 2016
Aqualink Week 5 H4D Stanford 2016Aqualink Week 5 H4D Stanford 2016
Aqualink Week 5 H4D Stanford 2016
 

Similar to Blue and Gray Berets H4D Final Presentation

BMNT Mission Results 2017
BMNT Mission Results 2017BMNT Mission Results 2017
BMNT Mission Results 2017BMNT Partners
 
Right of Boom Week 8 H4D Stanford 2016
Right of Boom Week 8 H4D Stanford 2016Right of Boom Week 8 H4D Stanford 2016
Right of Boom Week 8 H4D Stanford 2016Stanford University
 
HaleResume28June2016
HaleResume28June2016HaleResume28June2016
HaleResume28June2016David Hale
 
Doug maughan ppt
Doug maughan pptDoug maughan ppt
Doug maughan pptgbass12
 
BMNT Partners Year-In-Review 2017
BMNT Partners Year-In-Review 2017BMNT Partners Year-In-Review 2017
BMNT Partners Year-In-Review 2017Katie Saviano
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service providerpaulharry03
 
DTIC Virtual World Recommendations
DTIC Virtual World RecommendationsDTIC Virtual World Recommendations
DTIC Virtual World RecommendationsEric Hackathorn
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deckRichard (Dick) Kaufman
 
CTI_introduction_recording final.pptx
CTI_introduction_recording final.pptxCTI_introduction_recording final.pptx
CTI_introduction_recording final.pptxipalmer489
 
Christina Carson Resume 2016
Christina Carson Resume 2016Christina Carson Resume 2016
Christina Carson Resume 2016Christina Carson
 
DTRA CTR SME (David Margison)
DTRA CTR SME (David Margison)DTRA CTR SME (David Margison)
DTRA CTR SME (David Margison)David Margison
 
it-Select-a-Best-Fit-DR-Solution-Phases-1-3
it-Select-a-Best-Fit-DR-Solution-Phases-1-3it-Select-a-Best-Fit-DR-Solution-Phases-1-3
it-Select-a-Best-Fit-DR-Solution-Phases-1-3Robert Nardella
 
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelJohn Weiler
 

Similar to Blue and Gray Berets H4D Final Presentation (20)

Robert Carey, Principal Deputy CIO, DOD Insight session
Robert Carey, Principal Deputy CIO, DOD Insight sessionRobert Carey, Principal Deputy CIO, DOD Insight session
Robert Carey, Principal Deputy CIO, DOD Insight session
 
BMNT Mission Results 2017
BMNT Mission Results 2017BMNT Mission Results 2017
BMNT Mission Results 2017
 
The Tactical Value Of Rfid
The Tactical Value Of RfidThe Tactical Value Of Rfid
The Tactical Value Of Rfid
 
Right of Boom Week 8 H4D Stanford 2016
Right of Boom Week 8 H4D Stanford 2016Right of Boom Week 8 H4D Stanford 2016
Right of Boom Week 8 H4D Stanford 2016
 
HaleResume28June2016
HaleResume28June2016HaleResume28June2016
HaleResume28June2016
 
Doug maughan ppt
Doug maughan pptDoug maughan ppt
Doug maughan ppt
 
BMNT Partners Year-In-Review 2017
BMNT Partners Year-In-Review 2017BMNT Partners Year-In-Review 2017
BMNT Partners Year-In-Review 2017
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
 
DTIC Virtual World Recommendations
DTIC Virtual World RecommendationsDTIC Virtual World Recommendations
DTIC Virtual World Recommendations
 
H4d DOD 101 workshop 040516
H4d DOD 101 workshop 040516H4d DOD 101 workshop 040516
H4d DOD 101 workshop 040516
 
2012 2017 STRATEGIC VISION
2012 2017 STRATEGIC VISION2012 2017 STRATEGIC VISION
2012 2017 STRATEGIC VISION
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
 
CTI_introduction_recording final.pptx
CTI_introduction_recording final.pptxCTI_introduction_recording final.pptx
CTI_introduction_recording final.pptx
 
Christina Carson Resume 2016
Christina Carson Resume 2016Christina Carson Resume 2016
Christina Carson Resume 2016
 
DTRA CTR SME (David Margison)
DTRA CTR SME (David Margison)DTRA CTR SME (David Margison)
DTRA CTR SME (David Margison)
 
Tgs capabilities brief
Tgs capabilities briefTgs capabilities brief
Tgs capabilities brief
 
USEUCOM i3T
USEUCOM i3TUSEUCOM i3T
USEUCOM i3T
 
it-Select-a-Best-Fit-DR-Solution-Phases-1-3
it-Select-a-Best-Fit-DR-Solution-Phases-1-3it-Select-a-Best-Fit-DR-Solution-Phases-1-3
it-Select-a-Best-Fit-DR-Solution-Phases-1-3
 
Session Three: Defence Authority for C4ISR
Session Three: Defence Authority for C4ISRSession Three: Defence Authority for C4ISR
Session Three: Defence Authority for C4ISR
 
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 Panel
 

More from H4Diadmin

gARGoyle H4D Final Project Video
gARGoyle H4D Final Project VideogARGoyle H4D Final Project Video
gARGoyle H4D Final Project VideoH4Diadmin
 
James Madison University Final Presentation
James Madison University Final PresentationJames Madison University Final Presentation
James Madison University Final PresentationH4Diadmin
 
Austra Lumina
Austra LuminaAustra Lumina
Austra LuminaH4Diadmin
 
The Librarian Lessons Learned
The Librarian Lessons LearnedThe Librarian Lessons Learned
The Librarian Lessons LearnedH4Diadmin
 
Team Surgency
Team SurgencyTeam Surgency
Team SurgencyH4Diadmin
 
Xplomo final presentation
Xplomo final presentationXplomo final presentation
Xplomo final presentationH4Diadmin
 
Technology Threat Prediction
Technology Threat PredictionTechnology Threat Prediction
Technology Threat PredictionH4Diadmin
 
Modern Day Minutemen
Modern Day MinutemenModern Day Minutemen
Modern Day MinutemenH4Diadmin
 
Light Tactical All-terrain Vehicle (LTATV) Crew Augmentation
Light Tactical All-terrain Vehicle (LTATV) Crew AugmentationLight Tactical All-terrain Vehicle (LTATV) Crew Augmentation
Light Tactical All-terrain Vehicle (LTATV) Crew AugmentationH4Diadmin
 
Big Crypto for Little Things
Big Crypto for Little ThingsBig Crypto for Little Things
Big Crypto for Little ThingsH4Diadmin
 
Deep Clearance Situational Awareness
Deep Clearance Situational AwarenessDeep Clearance Situational Awareness
Deep Clearance Situational AwarenessH4Diadmin
 
Digital Overlay
Digital OverlayDigital Overlay
Digital OverlayH4Diadmin
 
Drone detection.pptx
Drone detection.pptxDrone detection.pptx
Drone detection.pptxH4Diadmin
 
Team Spyglass Final Presentation
Team Spyglass Final PresentationTeam Spyglass Final Presentation
Team Spyglass Final PresentationH4Diadmin
 
Lessons Learned
Lessons LearnedLessons Learned
Lessons LearnedH4Diadmin
 
H4D Week 12 Final Presentation
H4D Week 12 Final PresentationH4D Week 12 Final Presentation
H4D Week 12 Final PresentationH4Diadmin
 

More from H4Diadmin (20)

gARGoyle H4D Final Project Video
gARGoyle H4D Final Project VideogARGoyle H4D Final Project Video
gARGoyle H4D Final Project Video
 
James Madison University Final Presentation
James Madison University Final PresentationJames Madison University Final Presentation
James Madison University Final Presentation
 
Frogman
FrogmanFrogman
Frogman
 
Austra Lumina
Austra LuminaAustra Lumina
Austra Lumina
 
Broadcom
BroadcomBroadcom
Broadcom
 
The Librarian Lessons Learned
The Librarian Lessons LearnedThe Librarian Lessons Learned
The Librarian Lessons Learned
 
Seacurity
Seacurity Seacurity
Seacurity
 
Team Surgency
Team SurgencyTeam Surgency
Team Surgency
 
Xplomo final presentation
Xplomo final presentationXplomo final presentation
Xplomo final presentation
 
Technology Threat Prediction
Technology Threat PredictionTechnology Threat Prediction
Technology Threat Prediction
 
Modern Day Minutemen
Modern Day MinutemenModern Day Minutemen
Modern Day Minutemen
 
Light Tactical All-terrain Vehicle (LTATV) Crew Augmentation
Light Tactical All-terrain Vehicle (LTATV) Crew AugmentationLight Tactical All-terrain Vehicle (LTATV) Crew Augmentation
Light Tactical All-terrain Vehicle (LTATV) Crew Augmentation
 
Big Crypto for Little Things
Big Crypto for Little ThingsBig Crypto for Little Things
Big Crypto for Little Things
 
Deep Clearance Situational Awareness
Deep Clearance Situational AwarenessDeep Clearance Situational Awareness
Deep Clearance Situational Awareness
 
Digital Overlay
Digital OverlayDigital Overlay
Digital Overlay
 
Drone detection.pptx
Drone detection.pptxDrone detection.pptx
Drone detection.pptx
 
Vital
VitalVital
Vital
 
Team Spyglass Final Presentation
Team Spyglass Final PresentationTeam Spyglass Final Presentation
Team Spyglass Final Presentation
 
Lessons Learned
Lessons LearnedLessons Learned
Lessons Learned
 
H4D Week 12 Final Presentation
H4D Week 12 Final PresentationH4D Week 12 Final Presentation
H4D Week 12 Final Presentation
 

Recently uploaded

Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...ResolutionFoundation
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Servicenarwatsonia7
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...yalehistoricalreview
 
VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...Suhani Kapoor
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageTechSoup
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhellokittymaearciaga
 
Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Christina Parmionova
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26JSchaus & Associates
 
(怎样办)Sherbrooke毕业证本科/硕士学位证书
(怎样办)Sherbrooke毕业证本科/硕士学位证书(怎样办)Sherbrooke毕业证本科/硕士学位证书
(怎样办)Sherbrooke毕业证本科/硕士学位证书mbetknu
 
Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.Christina Parmionova
 
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012rehmti665
 
Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.Christina Parmionova
 
(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证mbetknu
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...narwatsonia7
 
VIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,Ms
VIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,MsVIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,Ms
VIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,Msankitnayak356677
 
(官方原版办理)BU毕业证国外大学毕业证样本
(官方原版办理)BU毕业证国外大学毕业证样本(官方原版办理)BU毕业证国外大学毕业证样本
(官方原版办理)BU毕业证国外大学毕业证样本mbetknu
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxHenryBriggs2
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfyalehistoricalreview
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urgesnarwatsonia7
 

Recently uploaded (20)

Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
 
VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Doodh Bowli ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptx
 
Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
 
(怎样办)Sherbrooke毕业证本科/硕士学位证书
(怎样办)Sherbrooke毕业证本科/硕士学位证书(怎样办)Sherbrooke毕业证本科/硕士学位证书
(怎样办)Sherbrooke毕业证本科/硕士学位证书
 
Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.
 
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
 
Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.Take action for a healthier planet and brighter future.
Take action for a healthier planet and brighter future.
 
(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
 
VIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,Ms
VIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,MsVIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,Ms
VIP Greater Noida Call Girls 9711199012 Escorts Service Noida Extension,Ms
 
(官方原版办理)BU毕业证国外大学毕业证样本
(官方原版办理)BU毕业证国外大学毕业证样本(官方原版办理)BU毕业证国外大学毕业证样本
(官方原版办理)BU毕业证国外大学毕业证样本
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptx
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
 

Blue and Gray Berets H4D Final Presentation

  • 1. Blue and Gray Berets H4D Team Members Chris Cottrell J.D. Englehart Patrick Hynes Brian Norville Jeremy Straughter
  • 2. Team Chris Cottrell J.D. Englehart Patrick Hynes Brian Norville Jeremy Straughter MBA MBA MBA Masters in Technology Management MPM https://www.linkedin.c om/in/chriscottrell https://www.linkedin.c om/in/jdenglehart https://www.linkedin.c om/in/patrickhynes https://www.linkedin.c om/in/brian-norville- 023b09131 https://www.linkedin.c om/in/jeremystraughte r Experience in government work, future USAR intelligence officer, More than four years experience in government contracting, including in direct support of cleared cyber programs for IC customers. More than four years experience developing software for Defense and Intelligence customers as a Software Engineer at Harris Corp. More than four years providing intelligence analysis and document and media exploitation support to the Intelligence Community. More than fifteen years in the United States Army; six years of special operations experience within USSOCOM.
  • 3. Problem: Develop a one-way, cross domain solution (CDS) that allows SOCOM to move information from an external media device (e.g. thumb drive, hard drive, SD Card) directly into a SECRET computer system. External Media Stand-Alone System Approved Media Classified Network
  • 7. Initial MVP • One Way Connection • Windows Machine w/virus scanning capability • Small form factor • Support for multiple connections formats • Durable CDS Transfer Source Device Destination Device • Multiple formats to include SD cards, USB, CD ● Windows Machine Temporar y Storage Virus Scan
  • 8. Hypothesis Hypothesis Special Operations Command (SOCOM) wants to transfer data from removable media and SSE to a connected Secret computer system. Experiments: USSOCOM, NSW 1. Why does SOCOM need a cross domain solution (CDS) when there are several successful workaround methods? 2. How much time does data transfer currently take? 3. How long do current cross domain transfer processes take? 4. Is the Naval Special Warfare Command aware of how others are solving this problem across SOCOM enterprise? Throughout the interagency/intelligence community?
  • 9. Hypothesis Hypothesis The CDS solution is required to go through an accreditation process. Experiments: Customer Interviews- UCDSMO, DSAWG, NSA 1. What is the accreditation process for CDS solutions? 2. Is there a timeframe for the accreditation process? 3. Is there a cost associated with the accreditation process?
  • 10. Discovery ◇The need for secure and expedited transfer of data from removable media and SSE to SECRET classified systems ◇There is a multi-organization accreditation process. The process starts with the Air Force CDO, then goes to the Cross Domain Technical Advisory Board (CDTAB), then to the Defense Information Assurance Security Accreditation Working Group (DSAWG), and finally to the DOD Information Security Risk Management Committee (DOD ISRMC). Accreditation costs is between 500k-700k and can take 12 months or more. ◇A solution called TACDS already exists and is currently going through accreditation process. ◇Each military branch has their own cross domain office.
  • 11. “ I don’t think this is an issue of lack of technology. The technology is out there.
  • 12. Hypothesis Hypothesis Special Operations Command (SOCOM)’s needs are met by the broader community, with occasional new feature introductions and associated accreditation cycles. Experiments: Customer Interview – SOCOM, Perfecta Federal, NSA, Army CDO 1. Why does SOCOM need a cross domain solution (CDS) when there are several successful workaround methods and solutions? 2. Does TACDS solve the needs if approved? 3. Are policies valid?
  • 13. Discovery ◇TACDS fits most of customer requirements, but does not support COT. ◇ Accreditation process is slow and does not allow rapid feature introduction. ◇There is an abbreviated accreditation process for new or modified features. Process depends on complexity of feature. ◇The problem of not being able transfer information cross domain is primarily an issue for Theater SOF and personnel in an office setting.
  • 14. MVP
  • 15. Mission Model Canvas Mission/Problem Description Key Activities Deployment Value Propositions Mission Budget/Cost Mission Achievement/Impact Factors Key Resources Buy-In & SupportKey Partners Beneficiaries Design a one-way CDS to transfer unclassified data to a connected secret computer for dissemination to SOTF Commander. Secure, one-way transfer of tactical ISR data to a SIPR computer Train SOF personnel in proper use of hardware and software. Conducts more missions because the Intelligence Officer provides more consistent targets with better analysis. Provides more targets to operators because the CDS streamlines data transfer process - more information, better analysis, consistent dissemination. SOCOM Acquisition Center Cross Domain Management Office Physically distribute to SOF units through USSOCOM Task Force Commander Operations Officer Intelligence Officer Detachment Commander Intelligence Sergeant Communications Sergeant Staff Judge Advocate SOF personnel can easily use solution to successfully transfer ISR information from unclassified systems to DOD SIPRNet. USSOCOM Acquisition Center ● Comptroller ● Logistics/J4 ● Procurement ● Science & Tech ● PEO C4 Perfecta Federal Brendon Reedy, Sponsor, USSOCOM PEO SOF Warrior XTS Guard 5 Perfecta Federal Software Pricing information not available (we did ask)
  • 16. Recommendations 1. Increased information sharing within SOCOM regarding cross domain accreditation process and associated costs. 2. Information sharing on service level cross domain offices. 3. Information sharing on types of Cross Domain Solutions (Example: guards vs. composed). 4. Greater knowledge of existing solutions on the market.
  • 17. Way Forward No viable commercial opportunity ◇High CAPEX ◇High barriers to entry (accreditation and time to revenue) ◇Technical expertise not on the team ◇Solutions exist ◇Relatively small market without product suite We have connected USSOCOM and Perfecta Federal. They are in discussions for potential purchase.
  • 18. JIDO Framework “…as directed by the Deputy Secretary of Defense (DSD), JIDO will enable rapid tactical responsiveness and anticipate acquisition requirements to prepare for, and react to, battlefield surprise to help meet counter-terrorism (CT), counter-insurgency (COIN), and other related operational challenges, including counter-improvised explosive device (C-IED).”
  • 19. JIDO asked for a framework that • Defines the improvised threat • Considers the JIDO mission statement • Considers the operational environment • Could focus on domain and relevant technologies
  • 20. • JIDO excels in rapid acquisitions by using its Joint Improvised Explosive Device Defeat Fund (JIEDDF) • JIDO’s pinwheel is a visualization of the authorities given it by the Joint Staff to counter the IED threat (JROCM) • JIDO lacks the authority to execute the preemptive acquisitions strategies that its mission statement requires • JIDO lacks a framework that articulates how its use of the JIEDDF has achieved the desired outcomes (i.e., threat mitigation and reduction). Key Findings
  • 21.
  • 22. 22 UNCLASSIFIED UNCLASSIFIED DTRA-JIDO Rapid Reaction Technology Office X X X Rapid Equipping Force X X X X Rapid Capabilities Offices X X X X Countering Terrorism Technical Support Office X X X JIDO Organizational Comparison ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ 1. DODD 5105. 62 Establishes DTRA’s mission, organization and management, responsibilities and functions, relationships, authorities, and administration 2. CJCSI 3170.01 Establishes JCIDS as the process used by JROC to fulfill its responsibilities to the CJCS to assess and prioritize joint military capability requirements 3. DoDD 5000.02 Enclosure 13 provides policy and procedure for acquisition programs to fulfill urgent operational needs and other quick reaction capabilities that can be fielded in less than 2 years 4. 2007 NDAA Established the Joint IED Defeat Fund (JIEDDF), a standalone 3-year, flexible appropriation (i.e. “colorless”) 5. JIDO CONOPS Approved by USD(AT&L), the CONOPS establishes JIDO’s mission, responsibilities, organization, lines of operations, authorities, and relationship to DTRA 6. DoDD 5000.71 Establishes the Warfighter Senior Integration Group (W-SIG) to lead and assign responsibility for rapid responses to combatant commander JUONs and JEONs 7. DODD 3000.06 Establishes policy and responsibilities for Combat Support Agencies (CSA) (1, 7) (2,5) (4) (3, 6) JIDO Authorities JIDO operates in a mission space which is unique in DoD (5)
  • 23. JIDO enables DOD actions to counter improvised threats with tactical responsiveness and through anticipatory, rapid acquisition in support of GCC efforts to prepare for, and adapt to, battlefield surprise in support of counter- terrorism (CT), counter-insurgency (COIN), and other related mission areas, including counter-improvised explosive device (C-IED). Joint Improvised-Threat Defeat Organization Mission Statement
  • 24. 24 UNCLASSIFIED UNCLASSIFIED Anticipatory Actions Understanding of Capability Gaps Risk Tolerant Pursue Emerging Technologies Broad Understanding of the Threat Unified Team of Operators & Scientists Improvised Threat Expertise Partnering with Industry, Academia, & Allied Nations Unique Authorities & Processes 0-2 Year Solution Development & Delivery Flexible Funding Authority In-Theater Implementation & Integration Support Rapid Solution Development & Delivery Agile Testing & Evaluation Integrated Approach to Problem Solving Customized and Proven Oversight Process J8 has distinct capabilities in four strategic focus areas, which together compose an integrated solution set unique in DoD JIDO J8 Strategic Focus Areas Maintain Knowledge Leadership Mitigate Battlefield Surprise Ensure Rapid Response Solve Warfighter Problems
  • 25.
  • 26. • Deliberate Requirements – Service, CCMD or Agency Driven – Traditional route for capabilities that require significant tech development and/or are not urgent or compelling in nature • Emergent Requirements – CCMD Driven – Supports accelerated acquisition of capabilities needed for an anticipated or pending contingency operation – VCJCS verifies, JCB or JROC validates • Urgent Requirements – CCMD Driven – Urgent and compelling to prevent loss of life and/or mission failure during current operations – Require little tech development and can be resolved in less than two years – DDR validates “Keep right, except to pass” D E L I B E R A T E E M E R G E N T U R G E N T 0 – 2 YRS 0+ to 5 YRS CONFLICT LANE ONLY POTENTIAL CONFLICT LANE 2-6+ YRS Three Requirements “Lanes”
  • 27.
  • 28. Mission Model Canvas Mission/Problem Description Key Activities Deployment Value Propositions Mission Budget/Cost Mission Achievement/Impact Factors Key Resources Buy-In & SupportKey Partners Beneficiaries Develop a framework to anticipate improvised threats Refine threat definition parameters Refine risk analysis parameters Method for categorizing threats, prioritizing threats, and categorizing responses to threats in order to more effectively organize understanding of future threats and responses. Joint Staff JIDO Contracted Personnel Adopted by JIDO, and implemented in day-to- day business across the organization Vice Chairman, JCS Vice Chairman, Services Geographic Combatant CommanderContract Personnel JIDO J8
  • 29. Those supporting threat tactics, techniques, procedures (TTP) and devices designed, fielded, or employed in any modality of conflict that adversely affect US joint force maneuverability or force protection. -JIDO Concept of Operations Improvised Threat Defined
  • 30. Asymmetric Improvised Tactics vs. Means ◇ Organized, unconventional action against a much larger force ◇ Common or Improvised Weapons ◇ Low Barrier to Entry ■ Inexpensive, ■ Rapidly producible ■ Minimal Training ◇ Uses or combines items contrary to their intended purpose
  • 33. ● COA #1: Give JIDO an updated authorities document that defines anticipatory acquisitions, improvised threats, and JIDO’s role ● COA #2: Change the Mission Statement to focus solely on the rapid acquisition and not anticipation ● COA #3: JIDO serves as a sensor for potential improvised threats, but takes no further action without GCC/Service concurrence Recommendations