Presentations from CDE themed call launch event on 19 March 2013. For full details of the call see: http://www.science.mod.uk/events/event_detail.aspx?eventid=202
The document discusses intellectual property and provides information on various types of IP including patents, trademarks, registered designs, copyright, trade secrets, and plant varieties. It notes that most UK businesses do not understand the value of their intellectual property or know how to protect it. It provides details on registering various types of intellectual property both in the UK and overseas and explains related IP concepts like infringement searches, patent and trademark fees, and the UK patent box.
The document discusses the limitations of battery power for small autonomous robots and soldiers. While smaller robots are safer and more practical for defense applications, current battery technology only allows for an hour or two of operation, which is not enough. Batteries are also limited in their energy density and unlikely to improve much in the next 10-20 years. The document proposes potential alternative power solutions that could be explored, such as photovoltaic energy capture from flames, novel engine/generator combinations, or single-use power sources that last a day or two before recycling. It concludes that long-endurance power sources for smaller robots present an opportunity for defense applications if technical challenges can be addressed.
The document discusses utilizing synthetic biology to develop novel transparent materials for defence applications such as transparent armor. It describes two challenges for a competition: 1) producing and characterizing novel transparent materials, and 2) developing adhesives and interlayer materials compatible with transparent armor. Currently, transparent armor has poor ballistic performance compared to opaque armor and is expensive due to specialized materials and processing required. Synthetic biology may be able to create new transparent composite materials inspired by biology with enhanced properties for armor applications.
This document discusses potential applications of synthetic biology for developing novel transparent materials and adhesives/interlayer materials. It notes that new materials could help address issues like moisture degradation, delamination, and reducing costs. The document outlines challenges with current materials and desirable properties for new solutions. It provides details on a competition seeking proposals for using synthetic biology to create novel transparent materials or adhesives/interlayers, noting what is and isn't desired in submissions. Overall the document scopes opportunities for synthetic biology to enhance transparent materials for defense applications.
Presentation slides from CDE themed call launch event on 18 June - for full details of this call for research proposals see http://www.science.mod.uk/events/event_detail.aspx?eventid=259
Presentations from CDE themed call launch event on 21 February 2013. For more information on the call visit: http://www.science.mod.uk/events/event_detail.aspx?eventid=200
The document discusses intellectual property and provides information on various types of IP including patents, trademarks, registered designs, copyright, trade secrets, and plant varieties. It notes that most UK businesses do not understand the value of their intellectual property or know how to protect it. It provides details on registering various types of intellectual property both in the UK and overseas and explains related IP concepts like infringement searches, patent and trademark fees, and the UK patent box.
The document discusses the limitations of battery power for small autonomous robots and soldiers. While smaller robots are safer and more practical for defense applications, current battery technology only allows for an hour or two of operation, which is not enough. Batteries are also limited in their energy density and unlikely to improve much in the next 10-20 years. The document proposes potential alternative power solutions that could be explored, such as photovoltaic energy capture from flames, novel engine/generator combinations, or single-use power sources that last a day or two before recycling. It concludes that long-endurance power sources for smaller robots present an opportunity for defense applications if technical challenges can be addressed.
The document discusses utilizing synthetic biology to develop novel transparent materials for defence applications such as transparent armor. It describes two challenges for a competition: 1) producing and characterizing novel transparent materials, and 2) developing adhesives and interlayer materials compatible with transparent armor. Currently, transparent armor has poor ballistic performance compared to opaque armor and is expensive due to specialized materials and processing required. Synthetic biology may be able to create new transparent composite materials inspired by biology with enhanced properties for armor applications.
This document discusses potential applications of synthetic biology for developing novel transparent materials and adhesives/interlayer materials. It notes that new materials could help address issues like moisture degradation, delamination, and reducing costs. The document outlines challenges with current materials and desirable properties for new solutions. It provides details on a competition seeking proposals for using synthetic biology to create novel transparent materials or adhesives/interlayers, noting what is and isn't desired in submissions. Overall the document scopes opportunities for synthetic biology to enhance transparent materials for defense applications.
Presentation slides from CDE themed call launch event on 18 June - for full details of this call for research proposals see http://www.science.mod.uk/events/event_detail.aspx?eventid=259
Presentations from CDE themed call launch event on 21 February 2013. For more information on the call visit: http://www.science.mod.uk/events/event_detail.aspx?eventid=200
Centre for Defence Enterprise themed call for research proposals. This call closes on Monday 25 February 2013. See http://www.science.mod.uk/events/event_detail.aspx?eventid=198 for more information.
Centre for Defence Enterprise webinar on 18 December 2013. Featuring presentations from Dstl Programme Managers for integrated sensing, assured information infrastructure, C2I2, and dismounted soldier systems.
Launch of CDE themed call for research proposals "Generic Enablers for Low Size, Weight, Power and Cost ISTAR". Call closes Friday 15 March 2013 at 1700 hrs. For more information visit: http://www.science.mod.uk/events/event_detail.aspx?eventid=199
The article discusses Emergency Pipeline Repair Systems (EPRS), which are comprehensive emergency preparedness solutions that minimize downtime and impact following pipeline damage events. An EPRS is customized for each operator and involves risk assessments, procuring necessary repair materials and equipment in advance, and developing mobilization plans. This allows operators to reduce response times, better protect the environment, decrease outages, limit liability, and control communications regarding incidents. Creating an effective EPRS solution is complex, but proactively prepares operators to handle crises that will inevitably occur sometime in the future.
CrowdCasts Monthly: You Have an Adversary ProblemCrowdStrike
You Have an Adversary Problem. Who's Targeting You and Why?
Nation-States, Hacktivists, Industrial Spies, and Organized Criminal Groups are attacking your enterprise on a daily basis. Their goals range from espionage for technology advancement and disruption of critical infrastructure to for-profit theft of trade secrets and supporting a political agenda. You no longer have a malware problem, you have an adversary problem, and you must incorporate an intelligence-driven approach to your security strategy.
During this CrowdCast, you will learn how to:
Incorporate Actionable Intelligence into your existing enterprise security infrastructure
Quickly understand the capabilities and artifacts of targeted attacked tradecraft
Gain insight into the motivations and intentions of targeted attackers
Make informed decisions based off of specific threat intelligence
Presentations from CDE themed call launch event on 14 May 2013 - for full details of this call for proposals see: http://www.science.mod.uk/events/event_detail.aspx?eventid=264
This document outlines several enduring challenges facing the Centre for Defence Enterprise (CDE) including communication, data, human performance, lethality, lower cost of ownership, mobility, power, protection, and situational awareness. It discusses each of these challenges in military contexts and operational environments. The document is copyrighted by the UK Ministry of Defence and focuses on ensuring that the armed forces can effectively project military power, engage forward to prevent conflicts, defend the homeland, and provide help during domestic crises.
The Department for International Trade helps UK businesses export, especially in the defense, security, and cybersecurity sectors. It works with these industries and other government departments to promote UK capabilities abroad, build relationships with overseas buyers, and support key export opportunities. The DIT also led a strategy exercise with industry to define how the UK government will support the security sector in exporting from 2019-2024. This new strategy focuses on using all of the UK government's capabilities to help companies export in a collaborative way.
The document summarizes research and development efforts in the UK fire service. It describes the national structure which includes a national lead, regional leads across 11 regions, and support from 50 UK fire and rescue services. It works closely with various partners from government, industry, academia, and other emergency services. The approach covers fundamental, industrial, and capability development research. Key partners include various government defense and security organizations, universities, the fire industry association, and international partners through IFAFRI. It conducts surveys to identify emerging research needs and aims to map out fire and rescue related research. Future plans include more horizon scanning, capability analysis, and challenges to access science and technology assets.
The document discusses experiences working with DASA (Defense Aviation Security Agency) and outlines their vision for future aviation security solutions. The vision is to deliver transformational change in aviation security through innovative science and technology, improving ability to prevent terrorist attacks on planes while enhancing passenger experience and benefitting the aviation industry.
DASA Innovation Partner, Tony Collins, discusses International Outreach.
DASA Senior Exploitation Manager, Eleanor Rice, discusses exploitation of innovation.
DASA Access to Mentoring and Finance Lead, Alan Scrase, discusses how his support will add value
The Bank of England is seeking novel security features for future banknote generations to aid authentication by the public and retailers. The features should be difficult to counterfeit, intuitive to use, easy to communicate and educate about, durable, compatible with high-volume printing, and integrated into designs. The Bank has moved to polymer notes to address counterfeiting threats from advancing print technologies. It manages counterfeiting through secure designs, quality control, education, cash machine regulation, and law enforcement cooperation.
This document summarizes a presentation given to the Defence and Security Accelerator about Blue Bear's journey working with the Accelerator. The presentation discusses Blue Bear's project on open architectures for air-land interoperability and last mile resupply. It proposes a 6-month project to demonstrate autonomous airborne resupply for soldiers using unmanned aerial vehicles and open software architectures. It then outlines Blue Bear and its partners' experience working with the Accelerator, emphasizing the importance of attending launch events, engaging with stakeholders, and clearly writing proposals that solve problems and clarify exploitation pathways.
This document discusses challenges and opportunities in defense innovation. It outlines many technology areas that could be improved, such as robotics, autonomy, cybersecurity, and artificial intelligence. It also summarizes recent defense innovation competitions and their results. The document encourages collaboration between government, academia and industry to address defense problems through innovative solutions.
The document provides guidance on creating proposals for the Defence and Security Accelerator Innovation network event. It outlines that proposals should include details about the innovation idea, its relevance to defence and security, a proposed work plan, and exploitation strategy. It notes that technology readiness levels will be used to measure maturity. The document also describes the assessment criteria for proposals, which includes impact, likelihood of exploitation, advancing innovation, quality, and level of challenge.
The Defence and Security Accelerator is an innovation network established in 2016 to find and exploit innovations that support UK defence and security. It provides multiple entry points for innovators, including open calls and themed competitions. It offers a simple application process, funding for successful proposals, and support to help bring ideas to UK defence and security customers. Recent themed competitions have focused on areas like autonomous resupply, human-information relationships, battery power alternatives, and aviation security.
The document summarizes an innovation network event hosted by the Defence and Security Accelerator to launch a competition called "Improving Crowd Resilience". The event provided an overview of the competition which seeks innovative solutions that can use crowds to detect explosive and weapon threats in public spaces. Specifically, it challenges participants to develop technologies or methods that can 1) detect crowds' conscious and subconscious reactions to threats, 2) train the public to spot threats, or 3) enable crowds to report potential threats. Representatives from the Accelerator and Home Office discussed the goals and scope of the competition, emphasized their interest in multi-layered approaches, and took questions from attendees.
The document discusses challenges with rapidly integrating new sensors for military use. It describes how sensors currently have different data formats and standards, making integration difficult. It proposes developing common preprocessing and postprocessing functions, as well as an open architecture algorithm repository, to allow automated integration and fusion of data from various sensors. This would help overcome issues around scalability and real-time performance when exploiting sensor data for military operations.
Centre for Defence Enterprise themed call for research proposals. This call closes on Monday 25 February 2013. See http://www.science.mod.uk/events/event_detail.aspx?eventid=198 for more information.
Centre for Defence Enterprise webinar on 18 December 2013. Featuring presentations from Dstl Programme Managers for integrated sensing, assured information infrastructure, C2I2, and dismounted soldier systems.
Launch of CDE themed call for research proposals "Generic Enablers for Low Size, Weight, Power and Cost ISTAR". Call closes Friday 15 March 2013 at 1700 hrs. For more information visit: http://www.science.mod.uk/events/event_detail.aspx?eventid=199
The article discusses Emergency Pipeline Repair Systems (EPRS), which are comprehensive emergency preparedness solutions that minimize downtime and impact following pipeline damage events. An EPRS is customized for each operator and involves risk assessments, procuring necessary repair materials and equipment in advance, and developing mobilization plans. This allows operators to reduce response times, better protect the environment, decrease outages, limit liability, and control communications regarding incidents. Creating an effective EPRS solution is complex, but proactively prepares operators to handle crises that will inevitably occur sometime in the future.
CrowdCasts Monthly: You Have an Adversary ProblemCrowdStrike
You Have an Adversary Problem. Who's Targeting You and Why?
Nation-States, Hacktivists, Industrial Spies, and Organized Criminal Groups are attacking your enterprise on a daily basis. Their goals range from espionage for technology advancement and disruption of critical infrastructure to for-profit theft of trade secrets and supporting a political agenda. You no longer have a malware problem, you have an adversary problem, and you must incorporate an intelligence-driven approach to your security strategy.
During this CrowdCast, you will learn how to:
Incorporate Actionable Intelligence into your existing enterprise security infrastructure
Quickly understand the capabilities and artifacts of targeted attacked tradecraft
Gain insight into the motivations and intentions of targeted attackers
Make informed decisions based off of specific threat intelligence
Presentations from CDE themed call launch event on 14 May 2013 - for full details of this call for proposals see: http://www.science.mod.uk/events/event_detail.aspx?eventid=264
This document outlines several enduring challenges facing the Centre for Defence Enterprise (CDE) including communication, data, human performance, lethality, lower cost of ownership, mobility, power, protection, and situational awareness. It discusses each of these challenges in military contexts and operational environments. The document is copyrighted by the UK Ministry of Defence and focuses on ensuring that the armed forces can effectively project military power, engage forward to prevent conflicts, defend the homeland, and provide help during domestic crises.
Similar to The Challenges of Countering Terrorist Networks - CDE themed call launch 19 Mar 2013 (10)
The Department for International Trade helps UK businesses export, especially in the defense, security, and cybersecurity sectors. It works with these industries and other government departments to promote UK capabilities abroad, build relationships with overseas buyers, and support key export opportunities. The DIT also led a strategy exercise with industry to define how the UK government will support the security sector in exporting from 2019-2024. This new strategy focuses on using all of the UK government's capabilities to help companies export in a collaborative way.
The document summarizes research and development efforts in the UK fire service. It describes the national structure which includes a national lead, regional leads across 11 regions, and support from 50 UK fire and rescue services. It works closely with various partners from government, industry, academia, and other emergency services. The approach covers fundamental, industrial, and capability development research. Key partners include various government defense and security organizations, universities, the fire industry association, and international partners through IFAFRI. It conducts surveys to identify emerging research needs and aims to map out fire and rescue related research. Future plans include more horizon scanning, capability analysis, and challenges to access science and technology assets.
The document discusses experiences working with DASA (Defense Aviation Security Agency) and outlines their vision for future aviation security solutions. The vision is to deliver transformational change in aviation security through innovative science and technology, improving ability to prevent terrorist attacks on planes while enhancing passenger experience and benefitting the aviation industry.
DASA Innovation Partner, Tony Collins, discusses International Outreach.
DASA Senior Exploitation Manager, Eleanor Rice, discusses exploitation of innovation.
DASA Access to Mentoring and Finance Lead, Alan Scrase, discusses how his support will add value
The Bank of England is seeking novel security features for future banknote generations to aid authentication by the public and retailers. The features should be difficult to counterfeit, intuitive to use, easy to communicate and educate about, durable, compatible with high-volume printing, and integrated into designs. The Bank has moved to polymer notes to address counterfeiting threats from advancing print technologies. It manages counterfeiting through secure designs, quality control, education, cash machine regulation, and law enforcement cooperation.
This document summarizes a presentation given to the Defence and Security Accelerator about Blue Bear's journey working with the Accelerator. The presentation discusses Blue Bear's project on open architectures for air-land interoperability and last mile resupply. It proposes a 6-month project to demonstrate autonomous airborne resupply for soldiers using unmanned aerial vehicles and open software architectures. It then outlines Blue Bear and its partners' experience working with the Accelerator, emphasizing the importance of attending launch events, engaging with stakeholders, and clearly writing proposals that solve problems and clarify exploitation pathways.
This document discusses challenges and opportunities in defense innovation. It outlines many technology areas that could be improved, such as robotics, autonomy, cybersecurity, and artificial intelligence. It also summarizes recent defense innovation competitions and their results. The document encourages collaboration between government, academia and industry to address defense problems through innovative solutions.
The document provides guidance on creating proposals for the Defence and Security Accelerator Innovation network event. It outlines that proposals should include details about the innovation idea, its relevance to defence and security, a proposed work plan, and exploitation strategy. It notes that technology readiness levels will be used to measure maturity. The document also describes the assessment criteria for proposals, which includes impact, likelihood of exploitation, advancing innovation, quality, and level of challenge.
The Defence and Security Accelerator is an innovation network established in 2016 to find and exploit innovations that support UK defence and security. It provides multiple entry points for innovators, including open calls and themed competitions. It offers a simple application process, funding for successful proposals, and support to help bring ideas to UK defence and security customers. Recent themed competitions have focused on areas like autonomous resupply, human-information relationships, battery power alternatives, and aviation security.
The document summarizes an innovation network event hosted by the Defence and Security Accelerator to launch a competition called "Improving Crowd Resilience". The event provided an overview of the competition which seeks innovative solutions that can use crowds to detect explosive and weapon threats in public spaces. Specifically, it challenges participants to develop technologies or methods that can 1) detect crowds' conscious and subconscious reactions to threats, 2) train the public to spot threats, or 3) enable crowds to report potential threats. Representatives from the Accelerator and Home Office discussed the goals and scope of the competition, emphasized their interest in multi-layered approaches, and took questions from attendees.
The document discusses challenges with rapidly integrating new sensors for military use. It describes how sensors currently have different data formats and standards, making integration difficult. It proposes developing common preprocessing and postprocessing functions, as well as an open architecture algorithm repository, to allow automated integration and fusion of data from various sensors. This would help overcome issues around scalability and real-time performance when exploiting sensor data for military operations.
The document discusses the limitations of battery power for small autonomous robots and soldiers. While small robots are attractive for defense applications like reconnaissance and patrolling, battery technology cannot provide enough energy density for more than an hour or two of operation. Fuel cells and generators are not feasible options at small scales either. However, the document suggests some potential solutions being explored, such as photovoltaic energy capture from flames, novel engine/generator combinations, or single-use power sources that could operate for a day before recycling. The goal is to develop alternative power sources that would enable the widespread use of smaller autonomous robots in defense applications.
An introduction to the themed competition and an overview of how it would be applied in a military setting. Presentation first shown on 1 December 2016.
Introduction to innovation and network event hosted by the Centre for Defence Enterprise. This presentation outlines CDE's role and signposts the future direction of the project.
This document discusses screening methods and technologies for hold baggage and cargo at airports. It outlines the threat materials that screening aims to detect, which does not include firearms, ammunition, or knives. Various screening methods are described, including canine screening, X-ray systems, explosive detection systems, hand searches, and trace detection. A multi-level screening process is outlined. The document also discusses screening capabilities for cargo, including X-ray, explosive detection systems, hand searches, metal detection, explosive trace detection, and explosive detection dogs. It notes technologies being developed and requirements for improving cargo screening. Important dates for a competition on new screening technologies are provided.
The document provides guidance on creating a proposal for an Innovation Network event hosted by the CDE Technology Manager. It instructs applicants to include details about their innovative idea, its relevance to defense and security, a work plan, and plans for exploitation. Proposals will be assessed on their potential impact, likelihood of exploitation, advancement of science/technology, innovation/quality, and technical challenge. The document ends with reminders and an offer to answer any questions.
CDE provides funding opportunities through competitions to support technology innovation in defence and security. It aims to engage innovators from academia and industry, including SMEs, and funds projects from early research through development and commercialization. Since 2008, CDE has funded over 1000 proposals with £72.6 million, with a 17% success rate. Interested parties can get involved by visiting the CDE website or social media channels.
10. CDE themed call programme
Smart and multifunctional materials Call closes 12 April 2013
and structures (at 1700 hrs)
The challenges of countering Call closes 1 May 2013
terrorist networks (at 1700 hrs)
Precision timing Call launch 23 April 2013
Secure communications Call launch 18 June 2013
Innovation in drug development Call launch 25 June 2013
processes
Enhancing military medical training Call launch 16 July 2013
and support for the medic
Register and further details at www.science.mod.uk under ‘Events and Calls’
Centre for Defence Enterprise Dstl is part of the
www.science.mod.uk/enterprise cde@dstl.gov.uk Ministry of Defence
UNCLASSIFIED / FOR PUBLIC RELEASE Crown Copyright (c) 2012
30. Centre for Defence Enterprise
Advanced Design and
01235 438445
Manufacturing
cde@dstl.gov.uk
www.science.mod.uk/enterprise
Centre for Defence Enterprise
Wing Commander Jim Pennycook
31. Agenda
10:30 Introduction to CDE
10:45 Counter Terrorism Science & Technology Centre overview
10:55 Military context
11:25 Challenge 1 – understanding networks
11:40 Challenge 2 – identifying individuals
11:55 Q&A
12:05 Networking lunch
13:00 Challenge 3 – translating information
13:15 Call summary
13:20 Ethics
13:25 CDE – submitting a successful proposal
13:35 Q&A
13:45 Networking
15:15 Event close
43. The Future Battlespace
Contested
Competition for resources. All geographies of operation are contested
Sea, land, air & space, cyberspace and information
Congested
To influence people we have to operate in, over and close to where they
live. People live in urban areas in the littoral
There is no empty battlefield
Cluttered
Network Enabled Capability will not fully lift the fog of war
We need to understand and to discriminate
Connected
Networks - source of strength for friend and foe
Nodes are also a source of weakness
Constrained
Legal and social norms - essential to our legitimacy -
will limit us but not our adversaries
More
UNCLASSIFIED
Constrained
113. Agenda
10:30 Introduction to CDE
10:45 Counter Terrorism Science & Technology Centre overview
10:55 Military context
11:25 Challenge 1 – understanding networks
11:40 Challenge 2 – identifying individuals
11:55 Q&A
12:05 Networking lunch
13:00 Challenge 3 – translating information
13:15 Call summary
13:20 Ethics
13:25 CDE – submitting a successful proposal
13:35 Q&A
13:45 Networking
15:15 Event close
114. Centre for Defence Enterprise
Submitting a Successful Proposal
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
Crown Copyright (c) 2012
116. Know what is available
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012
117. Know what is available
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012
118. Know what is available
Read available
information
Including CDE
manuals
Especially Quick Start
Guide
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012
119. Developing a CDE proposal
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012
120. Value from technology
Innovative Future
concept capability
Proof of
concept Incremental development
Dstl is part of the
Ministry of Defence
124. MOD Performance Assessment Framework
Five criteria:
Operational relevance
Likelihood of exploitation
Builds critical S&T capability to meet UK
needs
Scientific quality/innovation
Science, innovation and technology risk
125. Proposal health check
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
Crown Copyright (c) 2012
131. Health check
Based on a claim of future benefit
Contribution to realisation of future benefit
Logical programme of work
Evidential outcomes
Demonstration of progress towards goal
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
Crown Copyright (c) 2012
132. Government-furnished X
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012
137. Deadline
This call closes:
17:00 hrs on
Wednesday 1 May 2013
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012
138. Call process queries
Centre for Defence Enterprise
01235 438445
cde@dstl.gov.uk
www.science.mod.uk/enterprise
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
Crown Copyright (c) 2012
139. Call technical queries
ctcenquiries@dstl.gov.uk
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012
140. Further information
www.science.mod.uk
Events and Calls > Current calls for proposals > The
Challenges of Countering Terrorist Networks
Webinar – Tuesday 26 March 2013 12:30-13:30
Details on the call webpage
Email craig.cook@aadktn.co.uk to join
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Crown Copyright Dstl 2012