International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences The Holistan Scenario.

Slides:



Advertisements
Similar presentations
The International Technology Alliance in Network and Information Sciences Peer Review Meeting John Gowens ARL Collaborative Alliance Manager Graham George.
Advertisements

1 From Grids to Service-Oriented Knowledge Utilities research challenges Thierry Priol.
Key Messages National Riparian Lands Research & Development Program Assessing Community Capacity for Riparian Restoration.
Common Assessment Framework for Adults Demonstrator Site Programme Event to Support Expressions of Interest.
Police Leadership Review Horizon Scanning and Interpretation January 2015 Professor Harry Scarbrough.
ERS Overview 5/15/12 | Page-1 Distribution Statement A – Cleared for public release by OSR, SR Case #s 12-S-0258, 0817, 1003, and 1854 apply. Affordable,
GridWise ® Architecture Council Becky Harrison GridWise Alliance Future of the Grid Evolving to Meet America’s Needs.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Presenter’s Name June 17, 2003 Catastrophic Preparedness Incorporating Whole Community Philosophy  We must plan for the real, not the manageable  Plan.
Australian Army “ Future Trends and Combat Effectiveness” Brief to Manoeuvre Warfighting Conference Manoeuvre Centre of Excellence 10 September 2014 BRIGADIER.
David Kaufman Associate Administrator for Policy, Program Analysis, and International Affairs Toward More Resilient Futures: Putting Strategic Foresight.
Systems Engineering in a System of Systems Context
Presented to ISMORS September 2009 Dr. David S. Alberts Director, Research OASD/NII – DoD CIO Redefining the “M” in MOR st Century OR Challenges.
National Cohesive Wildland Fire Strategy 1. What is the Cohesive Strategy? A national, collaborative approach to addressing wildland fire across all lands.
Amanda Felix BUS 550 Tuesday, May 24,  Traditional methods are not enough!  Reduce costs, improve efficiency and spur innovation!  Information.
Contractor Assurance Discussion Forrestal Building Washington, D.C. December 14, 2011.
Mink Spaans What are the problems that need to be solved What is hard.
1 Welcome & Overview 2 nd Annual Workshop “What are National Security Threats?” Kathleen D. Morrison Co-Director, JTAC Professor of Anthropology Director,
KM enhances mission command, facilitates the exchange of knowledge, supports doctrine development, fosters leaders’ development, supports lessons learned,
The Natural Resources Digital Library Needs, Partners, and Challenges Bonnie Avery, Janine Salwasser, & Janet Webster Oregon State University.
Competency Mapping The Changing Face of Human Resources Management “From IR to HR to HRD”
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Alberta-A Province Prepared Alberta Emergency Management Agency- Provincial Services.
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
Welcome Abacoa Property Owner’s Assembly Welcome Abacoa Property Owner’s Assembly Robert Burns Senior Vice President Robert Burns Senior Vice President.
The Smart Grid Enabling Energy Efficiency and Demand Response Clark W
Dr. Jana Jagodick Polytechnic of Namibia, 2012 Project Management Chapter 3 Project Management for Strategic Goal Achievement.
Soldier-Vehicle Integration: a TTCP Approach Michel B. DuCharme 1, Pierre Urgings 2, Mark Unewisse 2, Colin Mooney 3, James Carr 4 1 DRDC, Canada, 2 DSTO,
Association of Defense Communities June 23, 2015
A complementary view from the DIGOIDUNA study Paolo Bouquet, University of Trento, Italy SMART 2010/0054.
IST 2006 – 22/11/2006 Aljosa Pasic Atos Origin Security, Dependability and Trust in Service Infrastructures.
1 World Wide Consortium for the Grid Global Grid Forum Network-Centric Operations Community Session 28 June
Supporting Civil-Military Information Integration in Military Operations Other than War Paul Smart, Alistair Russell and Nigel Shadbolt
Overview of Research Activities Aylin Yener
Measuring the Quality of Decisionmaking and Planning Framed in the Context of IBC Experimentation February 9, 2007 Evidence Based Research, Inc.
INTELLIGENCE SERVICES. The Stratfor Advantage As the world’s leading private intelligence company, Stratfor is able to analyze and deliver timely, accurate.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e 1 GPS Operations Past, Present, Future Colonel John E. Hyten Commander, 50th Space Wing 29 Mar.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Towards a Virtual Institute for Research into eGovernment Prof. Zahir Irani & Dr Tony Elliman Information Systems Evaluation and Integration Group School.
1 Confidential, unpublished property of CIGNA. Do not duplicate or distribute. Use and distribution limited solely to authorized personnel. (c) Copyright.
Landstar Application Case Study: Development Of Content-rich Solutions For The Mobile Employee Bob Leo Director of Professional Services October 15, 2000.
® The importance of international standards for data exchange Denise McKenzie Executive Director, Communications & Outreach Open Geospatial Consortium.
AF3 is a collaborative project carried out by a consortium of nineteen members from ten countries. Among the members there are universities, research technology.
EPA Geospatial Segment United States Environmental Protection Agency Office of Environmental Information Enterprise Architecture Program Segment Architecture.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Presented by: Steve Litke, Fraser Basin Council Winnipeg, Manitoba June 18, 2012 Collaborative Approaches to Watershed Governance – Lessons from BC.
Crisis “Management”: A Way Forward David S. Alberts presented to Crisis Management 3.0: Social Media and Governance in Times of Transition.
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
Transforming Patient Experience: The essential guide
Marv Adams Chief Information Officer November 29, 2001.
1 Lotus Connections Customer Use Cases The following are stories from early customer engagements. They were created to help people understand the many.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
Student Technology Services June Student Technology Services Team Dedicated to creating a holistic strategy to improve the technological services.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
1 Power to the Edge Agility Focus and Convergence Adapting C2 to the 21 st Century presented to the Focus, Agility and Convergence Team Inaugural Meeting.
Technology Demonstration Opportunities Annual Conference of ITA Project 8 Semantic integration of sensor asset datasets; application of match- making techniques.
System Operations, Power Flow, and Control Jeff Dagle Pacific Northwest National Laboratory April 2016.
Center of Excellence PEACE OPERATIONS COMMAND & CONTROL AND COMMAND & CONTROL AND TRANSITION ISSUES Lt Col (R) John Derick Osman Center of Excellence in.
ADVANCED TRANSPORTATION AND CONGESTION MANAGEMENT TECHNOLOGIES DEPLOYMENT (ATCMTD) PROGRAM 1 Bob Arnold, Director Office of Transportation Management,
Driving Innovation Connect & Catalyse The Cultural – Creative Industries Contemporary & Future Challenges Sian Brereton 24 th February 2010.
Delivering Global Goals in human settlements and city regions by 2030 with data partnerships #roadmap rd May 2016 WMO, Geneva Stephen Passmore Head.
Why KM is Important KM enhances mission command, facilitates the exchange of knowledge, supports doctrine development, fosters leaders’ development, supports.
Extensive Experience in Cyber Environments
Standards for success in city IT and construction projects
Critical Factors in Managing Technology
Public Health Intelligence Adviser
MODULE 11: Creating a TSMO Program Plan
Presentation transcript:

International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences The Holistan Scenario A Futuristic Scenario for Coalition Operations

Introduction International Technology Alliance (ITA) is a collaborative partnership between –US Army Research Laboratories –UK Ministry of Defense –a consortium of industries and universities in US and UK Research issue in four technical areas –Network Theory –Security Across a System of Systems –Sensor Information Processing & Delivery and –Distributed Coalition Planning & Decision Making

The ITA Vision Creating an international collaborative research culture –Academia, Industry, Government in US and UK –Innovative multidisciplinary approaches Developing ground-breaking fundamental science –Empower innovators –Develop understanding of the root cause of military technical challenges Making an impact on coalition military effectiveness –Focus on key problems with a critical mass of researchers –Gain synergies from UK/US alignment –Innovative transition model

U.S. Gov. Industry Academia U.K. Gov. INDUSTRY 9.BBNT Solutions LLC 10.The Boeing Corporation 11.Honeywell Aerospace Electronic Systems 12.IBM Research 13.Klein Associates ACADEMIA 1.Carnegie Mellon University 2.City University of New York 3.Columbia University 4.Pennsylvania State University 5.Rensselaer Polytechnic Institute 6.University of California Los Angeles 7.University of Maryland 8.University of Massachusetts INDUSTRY 8.IBM UK 9.LogicalCMG 10.Roke Manor Research Ltd. 11.Systems Engineering & Assessment Ltd. ACADEMIA 1.Cranfield University, Royal Military College of Science, Shrivenham 2.Imperial College, London 3.Royal Holloway University of London 4.University of Aberdeen 5.University of Cambridge 6.University of Southampton 7.University of York ITA Team Overview

Goal: Enhancing distributed, secure, and flexible decision-making to improve coalition operations Technical Areas Network Theory –Enable the formation/operation of ad hoc coalition teams Security Across a System of Systems –Fundamental underpinnings for adaptive networking and security to support complex system-of-systems Sensor Information Processing and Delivery –Sensor information processing/delivery from distributed sensor networks to support enhanced decision-making Distributed Coalition Planning and Decision Making –Understand and support complex human, social, and technical interactions in distributed coalition teams

Why Create a New Scenario Provide a background for telling stories –How each of our projects will improve coalitions –How our projects work together Provide a range of possibilities –Both conflict and humanitarian actions –A wide range of players with a variety of capabilities Broader than Binni –Avoid implicit assumptions –Not clearly good-guys versus bad-guys

The Structure of the Scenario Holistan Vignette 1 Search and Rescue Vignette 2 Dirty Bomb Vignette 3 Tracking Insurgents Geography Political and Cultural Situation Each Vignette has elements that could impact the four technical areas Enough details to start but not enough to constrain

Theatre of Operations Holistan is somewhere in the middle-east –Former colony –Unstable political situation Segments of population Disputes with neighbors Weapons of mass destruction –Coalition force Protecting installations –Varied terrain Coast, mountain and plains

Vignette 1: Search and Rescue Helicopter crash –Humanitarian mission with potential conflict Site of cultural significance Potential for interference Rapid deployment of ‘infrastructure’ –Network assets –Security and trust –Changes in sensor requirements Cultural issues

Vignette 2: Dirty Bomb Misuse of nuclear material –Terrorism on a large scale –HUMINT source Four phases of the operation –Deploy new assets –Plan intervention –Capture insurgents and –Recover in a safe manner

Vignette 3: Tracking Insurgents Longer term deployment –Sensors from multiple parties –Human intelligence agents –Collection and processing of information –Potential for tampering Difficult to track those who are trying to hide Local forces are the public face

Further Developments Develop and change as needed –As storyboards are created we learn –At least one large scale humanitarian intervention Vignette Incorporate a mixture of parties Cross cutting Themes Theme 1 - Information Flows Theme 2 - Dynamic Mission-Focused Communities of Interest Theme 3 - Trust and Risk – Enabling Risk-Based Decisions

Theme 1 - Information Flows Information sharing is a key component of Network Centric Operations: providing both the right information to the right users at the right time and also the means for users to share and use information. For the soldier on the ground this is a hard problem since he/she is often dependent upon ad-hoc mobile communications networks and will be part of a coalition force with national differences in equipment, security policies and culture.

Theme 2 - Dynamic Mission-Focused Communities of Interest A community of interest is a smaller subgroup of a coalition force which is formed to undertake a mission. To be effective such subgroups require networks to provide robust operation, small world properties, security properties, bandwidth and efficiency. There are a range of issues to be addressed.

Theme 3 - Trust and Risk – Enabling Risk-Based Decisions The visions for Network Enabled Capability and Network Centric Warfare embrace the concept of providing more flexible access to information in response to operational needs. To do this requires a shift in security policy to risk-based decisions. Trust is an important factor in evaluating risk. There is a range of issues to be addressed, from conceptual concerns to system design and usability issues.

Conclusion “It’s hard to make predictions, especially about the future” –Attributed to Yogi Berra Need to have a flexible framework we can develop from –We have a starting point

Contacts Dinesh Verma Dave Roberts Project Web Site Gavin Lock has subsequently left the team