UNCLASSIFIED. ADF Tactical Data Link Authority Ground Network Capability Assurance Services UNCLASSIFIED

Size: px
Start display at page:

Download "UNCLASSIFIED. ADF Tactical Data Link Authority Ground Network Capability Assurance Services UNCLASSIFIED"

Transcription

1 UNCLASSIFIED MilCIS 2013 TDL Stream, Session 2.5a ADF Tactical Data Link Authority Ground Network Capability Assurance Services Mr. Josh Roth Ground Networks Manager Mr. Mark Rattigan Ground Networks Interoperability Analysis Manager UNCLASSIFIED ADFTA Role in Ground Networks The primary role of ADFTA is to ensure correct TDL functionality at the platform level to achieve Joint and Combined TDL interoperability in accordance with Defence Instructions and Policies. ADFTA provides capability assurance services for Ground Networks that are used for Command and Control, execution of Joint Fires, Manoeuvres and ISR. 1

2 ADF Ground Networks The ADF Ground Network domain includes a large range of C4ISR equipment that is used in support of achieving Army operational requirements. GN tactical equipment primarily utilises VMF for message exchange over a variety of bearers that include LAN, CNR and IP Radios (e.g. EPLRS). Capability Support Requirements Development Interoperability Analysis Provision of advice on MIL-STD Implementation/Use Representation in international working groups Test and Evaluation Integration and Experimentation 2

3 Variable Message Format US military standard Used by US services and agencies and coalition/partner nations Catalogue of messages Transfer of bit-oriented digital information Variable length Designed for use in bandwidth constrained networks Media independent ITAR controlled (restricted distribution) ADFTA has release Authority for ADO and Australian Defence Industry. VMF Header Message header usually used in conjunction with VMF MIL-STD (Connectionless Data Transfer Application Layer Standard) Application Layer: Message Identification and Addressing. Transport Layer: Defines Segmentation/Reassembly for large messages or use of IETF Internet Standards for TCP or UDP. Network Layer: Use of IETF Internet Standards for IP. Public distribution (available through the ASSIST Database for Military Specifications and Military Standards 3

4 Combat Net Radio Bearer often used with VMF MIL-STD (Digital Message Transfer Device Subsystems) Physical through Transport Layer Protocol Public distribution (available through the ASSIST Database for Military Specifications and Military Standards Developments in VMF/CNR XNPv2 (exchange Network Parameters v2) OPTASKCNR Rework of Segmentation/Reassembly Future Backward Compatibility 4

5 URN Management Unit Reference Number Globally unique number to identify friendly units/systems within systems implementing VMF (both for message addressing, and unit identification) URN Management requires: Collection of data relating to each friendly unit/system to be identified. Distribution of collated data Challenges: Disparate system implementation of address books Configuration Management Distributing the right data products to the right organisations Sharing data with partner nations US CI Effort Joint Fire Support Coordinated Implementation Change Control Board JFS CI CCB: Decision-making body for JFS Coordinated Implementation US Government (System Program Manager and Acquisition Authority) representatives Program offices planning to implement DACAS and DAFS capabilities agree to implement IAW applicable ECPs. DACAS and DAFS Working Groups Working Groups to interpret joint requirements and develop recommendations to promote interoperability through development of DACAS and DAFS SoS Specifications (ECPs). 5

6 US CI Effort Digitally Aided Close Air Support Working Group Triannual meeting facilitated by US Joint Staff, Joint Fires Division, Joint Close Air Support Section. Development of DACAS SoS Specifications (ECPs). Block 1 baseline capability for DACAS: ECP 1: Baseline Digitally-aided CAS Messaging and RF Network ECP 2: Designated Ground Target (DGT) / Sensor Point of Interest (SPI) ECP 3: Marked Still Imagery ECP 4: Exchange of Network Parameters (XNP) US CI Effort Digitally Aided Close Air Support Working Group Block 2 Approved ECPs ECP 5: Common Operational Tasking and Mission Data Loading ECP 8: Unmanned Aircraft System Integration as a Strike Platform Draft ECPs ECP 6: Joint Tactical Air Strike Request (JTAR) ECP 7: Forward Air Controller (Airborne) Terminal Attack Control (FAC(A) TAC) ECP 9: Network Enabled Weapons (NEW) Integration ECP 10: Multiple Targets in a Single 9-Line ECP 11: Beyond-Line-of-Sight Situation Update 6

7 US CI Effort Digitally Aided Fire Support Working Group To this point has been US-only. Expect to be opened to Partner Nations for 14-1 meeting. Aim as per DACAS WG, except for wider joint fires arena. Australian CI Effort Trying to move away from blocking. Previous US approach had been to block implementation and fielding of Military Standard revisions over future years. In practice, has remained fragmented. Australian challenges: Knowledge of US service plans Acquisition lead times Availability of MOTS systems if Australian plan were to diverge from US reality Actual publication timeframes for future MIL-STD revisions Realities of Acquisition projects or sustainment agencies to program future MIL-STD revision upgrades 7

8 Offensive Fires Architecture Development (using MBSE) Why? VMF provides only a message catalogue No rules for processing No rules for transmission Very little description of use No readily available community in which to seek advice. Try to learn from US systems use of VMF, to apply to Australian requirements. Currently numerous pockets of knowledge within the ADF each centred on their piece of the puzzle Limited knowledge on implementation of VMF within FMS procured systems Offensive Fires Architecture Development (using MBSE) Initially aiming to consolidate Offensive Support Doctrine/TTPs and JF system capabilities Future aim to expand beyond joint fires Align VMF Implementation to Doctrine/Operational Requirements (avoid catalogue shopping as Message Names may be misleading) Development of traceable requirements for future systems Identify potential capability gaps with extant systems Development of standardised mission threads to allow a consistent testing regime for Interoperability Testing. 8

9 Composed of Architecture Composed of Built from Performers (Operational Node) Implemented by Joins to and Joins thru System/Component Built from Connected to and Connected Thru Interface Comprised of Performs Needline Implemented by Link Performs Exchanges (carries) carries Operational Information Implemented by Item Decomposed by Decomposed by Inputs/ Outputs/ Triggers Inputs/ Outputs/ Triggers Decomposed by Operational Activity Implemented by Function Decomposed by Operational Architecture Domain System Architecture Domain Test and Evaluation The ADFTA supports the TDL registration process for VMF by providing a number of formal testing services: Conformance To Standard (CTS) testing Verifying the VMF interface of a single platform meets the standard specifications Perform a TDL Compliance Certificate (TCC) assessment Joint Interoperability Testing (JIT) Validating Information Exchange Requirements between ADF platforms Combined Interoperability Testing (CIT) Validating Information Exchange Requirements between coalition platforms 9

10 Utilising Architecture Development to improve testing outcomes ADFTAs primary goal is improve the state of TDL interoperability within the ADF. By creating a master set of Mission Threads utilising Doctrine/Operational Requirements and aligning these to VMF implementations, ADFTA is able to: Provide improved guidance during requirements development Demonstrate traceability from Doctrine and OCD requirements through to Test Threads Improve assurance the Capability Manager has that the system meets the requirements and interoperability issues have been identified. Improve the fidelity of VMF implementation advice that may be implied but not specified within the standards. Significantly reduce the maintenance effort required for Interoperability Testing Integration, Experimentation and Advice ADFTA maintains a GN Laboratory with representative GN equipment including Battle Management Systems, Improved Device Modems and tactical radios It is used to assist TIED stakeholders to identify, characterise and resolve current and potential interoperability issues. Activities include: Monitor and support Project, Vendor and User activities Conduct of Risk Mitigation Experiments and Trials Facilitating trials of new equipment within the GN Specific technical investigations Coordinating activities between different equipment owners and stakeholders 10

11 Challenges ahead This is mostly the first generation of a digitised Ground Network Users are still aligning their needs and expectations with the digital capabilities acquired TTPs need to be adapted Lessons Learned need to be incorporated for the second generation of capability. Maintaining interoperability in an environment where the ADO only has limited control of equipment and standards implemented. Providing increasing support to a growing capability in a resource constrained environment. 11

Joint Capability Management by Design Tactical Information Exchange Domain

Joint Capability Management by Design Tactical Information Exchange Domain Joint Capability Management by Design Tactical Information Exchange Domain Director General C4I and Training Support BRIG John Gould C4ISR - Designing the Force Force Design Division in VCDF Group Consolidates

More information

UNCLASSIFIED MILCIS Session 2.5b Land Network Integration Centre (LNIC) Update 13 Nov 13

UNCLASSIFIED MILCIS Session 2.5b Land Network Integration Centre (LNIC) Update 13 Nov 13 UNCLASSIFIED MILCIS 0 Session.5b Land Network Integration Centre (LNIC) Update Nov Mr Adam Mead Contractor to the Commonwealth Land TDL Manager / Land URN Manager Army Headquarters Scope Role of the (LNIC)

More information

Understanding Data Link Gateway Challenges

Understanding Data Link Gateway Challenges Understanding Data Link Gateway Challenges TDL Summit November 2018 Introduction Technology improvements allow new technology radios to be deployed in shorter periods of time than past history Gateway

More information

Systematic Software Engineering 2006

Systematic Software Engineering 2006 1 Coalition Interoperability Through Network Centric Standards Management Good afternoon ladies and gentlemen. My paper today is about a network centric solution for managing structured information standards.

More information

ICT & Battle-Space Networks

ICT & Battle-Space Networks ICT & Battle-Space Networks Anant Mahajan, CIOG Considerations on ICT Architecture and Technology for Battle-Space Communication Presentation for MILCIS 2014 13 November 2014 Outline 1. Information and

More information

Battlespace Communications Architecture Development

Battlespace Communications Architecture Development Battlespace Communications Architecture Development Land Communications Reference Architecture Brief Mr Graeme Neil, Lead Architect, Joint Project 2072, DMO Electronic s Division Communications Branch

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program Element - - 38.094-38.094 38.503 39.587 40.754 41.292 Continuing Continuing

More information

Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs

Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs Philomena Zimmerman Office of the Deputy Assistant Secretary of Defense for Systems Engineering

More information

DoD Strategy for Cyber Resilient Weapon Systems

DoD Strategy for Cyber Resilient Weapon Systems DoD Strategy for Cyber Resilient Weapon Systems Melinda K. Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Systems Engineering Conference October 2016 10/24/2016 Page-1

More information

Emerging Security Challenges November 22, 2012, Baku

Emerging Security Challenges November 22, 2012, Baku Emerging Security Challenges November 22, 2012, Baku NATO ENSEC COE: planned activities and importance for NATO-South Caucasus cooperation DR. ARŪNAS MOLIS Chief of Research and Analysis Energy Security

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Mapping The Network Mapping helps visualize the network and understand relationships and connectivity between

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Corporate Capabilities

Corporate Capabilities Corporate Capabilities 2017 Summary Thomas Edison stated, "there's a way to do it better find it." intellisolutions is 3 rd party certified as a Woman-Owned Small Business (WOSB)*. Founded in 2006 in San

More information

Process Definition: Security Services

Process Definition: Security Services Process Definition: Services 1. SUMMARY Process Definition: Services 1.1. This document defines the processes provided by the Services team in detail. 1.2. The relationship between this Business Unit process

More information

Defence services. Independent systems and technology advice that delivers real value. Systems and Engineering Technology

Defence services. Independent systems and technology advice that delivers real value. Systems and Engineering Technology Defence services Independent systems and technology advice that delivers real value Systems and Engineering Technology Frazer-Nash Consultancy Working in the UK and internationally, Frazer-Nash is making

More information

ANZPAA National Institute of Forensic Science BUSINESS PLAN

ANZPAA National Institute of Forensic Science BUSINESS PLAN ANZPAA National Institute of Forensic Science BUSINESS PLAN 2018 19 OUR STRATEGIC INTENT PROMOTE AND FACILITATE EXCELLENCE IN FORENSIC SCIENCE The National Institute of Forensic Science is a directorate

More information

ASD CERTIFICATION REPORT

ASD CERTIFICATION REPORT ASD CERTIFICATION REPORT Amazon Web Services Elastic Compute Cloud (EC2), Virtual Private Cloud (VPC), Elastic Block Store (EBS) and Simple Storage Service (S3) Certification Decision ASD certifies Amazon

More information

Secure information exchange

Secure information exchange www.thales.no Secure information exchange 2 together. Safer. everywhere. Whenever critical decisions need to be made, Thales has a role to play. In all its markets aerospace, space, ground transportation,

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 10 R-1 Line #218

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 10 R-1 Line #218 COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Office of Secretary Of Defense Page 1 of 10 R-1 Line #218 Cost To Complete Total

More information

Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)

Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) SSC Atlantic is part of the Naval Research & Development Establishment (NR&DE) Information Warfare Research Project

More information

U.S. Department of Transportation. Standard

U.S. Department of Transportation. Standard U.S Department of Transportation Federal Aviation Administration U.S. Department of Transportation Federal Aviation Administration Standard DATA STANDARD FOR THE NATIONAL AIRSPACE SYSTEM (NAS) Foreword

More information

Federated Mission Networking

Federated Mission Networking Federated Mission Networking Learning & Applying the Lessons John Palfreyman, IBM V4; 20 Mar 14 Agenda Future Mission Networking - Context Effective Coalitions through OPEN Integration Save money through

More information

Request for Information Technical Response White Paper for Joint Operational Medicine Information Systems (JOMIS)

Request for Information Technical Response White Paper for Joint Operational Medicine Information Systems (JOMIS) Request for Information Technical Response White Paper for Joint Operational Medicine Information Systems (JOMIS) Ensuring Continuity of Data 5 May 2017 Prepared by: Northrop Grumman Systems Corporation

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

The Perfect Storm Cyber RDT&E

The Perfect Storm Cyber RDT&E The Perfect Storm Cyber RDT&E NAVAIR Public Release 2015-87 Approved for public release; distribution unlimited Presented to: ITEA Cyber Workshop 25 February 2015 Presented by: John Ross NAVAIR 5.4H Cyberwarfare

More information

CCRTS 2004 Title: Systems and Capability Relation Management in Defence SoS Context

CCRTS 2004 Title: Systems and Capability Relation Management in Defence SoS Context CCRTS 2004 Title: Systems and Capability Relation Management in Defence SoS Context Authors: Pin Chen and Ronnie Gori Integrated Capabilities Branch DSAD, DSTO. Outline Introduction Classification of Relations

More information

BAE SYSTEMS Developing Coalition Interoperability Marcus Krackowizer - September 2004

BAE SYSTEMS Developing Coalition Interoperability Marcus Krackowizer - September 2004 BAE SYSTEMS Developing Coalition Interoperability Marcus Krackowizer - September 2004 Today s Objectives Introduce the problem context and interdependencies. Discuss BAE SYSTEMS Position Review example

More information

ALTER TECHNOLOGY TÜV NORD (ATN)

ALTER TECHNOLOGY TÜV NORD (ATN) ALTER TECHNOLOGY TÜV NORD (ATN) H2020 Secure Societies - Interest as a PARTNER OBJECTIVE 7. Enhance standardisation and interoperability of systems, including for emergency purposes TÜV NORD GROUP 2 TÜV

More information

Air Force Mission: Air Power for Australia s interests. Air Force Values: Respect Excellence Agility Dedication Integrity Teamwork

Air Force Mission: Air Power for Australia s interests. Air Force Values: Respect Excellence Agility Dedication Integrity Teamwork Air Force Vision: Air Force will provide the most rapid, effective and responsive military options for the Australian Government to achieve national objectives within our region and globally. Air Force

More information

Electronic and Mission Systems

Electronic and Mission Systems Electronic and Mission Systems Boeing Networks, Space, and Security Small Business Workshop Bob Tamaru November 8, 2011 Where We Fit In Boeing Boeing Military Aircraft AEW&C P-8A C-17 Italy Japan 7A7 F-18

More information

Update. HFIA Conference 3 February Page 1 HFIA 16 Jan 03 (JLM)

Update. HFIA Conference 3 February Page 1 HFIA 16 Jan 03 (JLM) HF in the US Navy Update HFIA Conference 3 February 2005 Page 1 Briefing Outline Present Battle Force Email 66 Status Service Level & Program Infrastructure Upgrades Incremental I.T. updates & Adaptive

More information

Integrated C4isr and Cyber Solutions

Integrated C4isr and Cyber Solutions Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a

More information

Request for Proposals Atlanta Legal Aid Society and Legal Services Law Line of Vermont

Request for Proposals Atlanta Legal Aid Society and Legal Services Law Line of Vermont Request for Proposals Atlanta Legal Aid Society and Legal Services Law Line of Vermont Web Accessibility Reviews and Recommendations for Two Legal Aid Websites and Assistance Creating an Accessibility

More information

SESSION G.1 CONVERGING LIVE AND VIRTUAL ARCHITECTURES FOR TRAINING, TEST AND EVALUATION

SESSION G.1 CONVERGING LIVE AND VIRTUAL ARCHITECTURES FOR TRAINING, TEST AND EVALUATION SESSION G.1 CONVERGING LIVE AND VIRTUAL ARCHITECTURES FOR TRAINING, TEST AND EVALUATION Common Open Architecture for Test and Training Airborne Instrumentation Packages Presenter: Rob Scott OBJECTIVE Compare

More information

Submission. to the. Australian Communications and Media Authority. on the. Planning for mobile broadband within the 1.

Submission. to the. Australian Communications and Media Authority. on the. Planning for mobile broadband within the 1. Submission to the Australian Communications and Media Authority on the Planning for mobile broadband within the 1.5 GHz mobile band Submission by: Australian Mobile Telecommunications Association and Communications

More information

Developing an integrated approach to the analysis of MOD cyber-related risks

Developing an integrated approach to the analysis of MOD cyber-related risks Developing an integrated approach to the analysis of MOD cyber-related risks James Tate, Colette Jeffery Joint Enablers Analysis Group 28 th July 2016 COVERING Overview 1. risk research 2. Customer requirement

More information

INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE

INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 7 8 11 12 13 14 15 INTRODUCTION IEG SCENARIOS REFERENCE ARCHITECTURE ARCHITECTURE

More information

Strategic Security Analyst

Strategic Security Analyst Strategic Security Analyst Location: [North America] [United States] Town/City: Monrovia Category: Security Job Type: Fixed term, Full-time *Preferred location: USA, UK or Australia where WVI is registered*

More information

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power

More information

Paper for Consideration by CHRIS. Cooperation Agreement Between IHO and DGIWG

Paper for Consideration by CHRIS. Cooperation Agreement Between IHO and DGIWG CHRIS17-12.2A Paper for Consideration by CHRIS Cooperation Agreement Between IHO and DGIWG Submitted by: Executive Summary: Related Documents: IHB The IHO standards for digital hydrographic information

More information

C2-Simulation Interoperability in NATO

C2-Simulation Interoperability in NATO C2-Simulation Interoperability in NATO Dr Hans Jense Chief, Capability Planning, Exercises and Training NATO UNCLASSIFIED 1 NATO CIS Services Agency NATO Consultation, Command and Control Agency NATO Air

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

Defence Spectrum Strategy

Defence Spectrum Strategy Alex Wright Spectrum Engineer Defence Spectrum Office Chief Information Officer Group Department of Defence Outline 1) Contemporary Spectrum Context 2) Defence Spectrum Strategy 3) Continuing Adaptation

More information

Digital Health Cyber Security Centre

Digital Health Cyber Security Centre Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting

More information

Developing an integrated approach to the analysis of MOD cyber-related risks

Developing an integrated approach to the analysis of MOD cyber-related risks Developing an integrated approach to the analysis of MOD cyber-related risks Colette Jeffery, James Tate Defence Science Technology Laboratory COST Expert Judgement Meeting 12 to 14 October 2016 COVERING

More information

POSITION DESCRIPTION

POSITION DESCRIPTION Network Security Consultant POSITION DESCRIPTION Unit/Branch, Directorate: Location: Regulatory Unit Information Assurance and Cyber Security Directorate Auckland Salary range: I $90,366 - $135,548 Purpose

More information

C2-Simulation Interoperability in NATO

C2-Simulation Interoperability in NATO C2-Simulation Interoperability in NATO Dr Hans Jense Chief, Capability Planning, Exercises and Training NATO UNCLASSIFIED 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden

More information

A ROADMAP TO STANDARDIZING THE IRIG 106 CHAPTER 10 COMPLIANT DATA FILTERING AND OVERWRITNG SOFTWARE PROCESS

A ROADMAP TO STANDARDIZING THE IRIG 106 CHAPTER 10 COMPLIANT DATA FILTERING AND OVERWRITNG SOFTWARE PROCESS A ROADMAP TO STANDARDIZING THE IRIG 106 CHAPTER 10 COMPLIANT DATA FILTERING AND OVERWRITNG SOFTWARE PROCESS Item Type text; Proceedings Authors Berard, Alfredo; Manning, Dennis; Kim, Jeong Min Publisher

More information

Electronic warfare, information and cyber

Electronic warfare, information and cyber Electronic warfare, information and cyber 2018-2019 Symposia Symposia at Shrivenham provides a forum to Government agencies, military and civilian, industry and research establishments for the exploration

More information

Argon ST. Creative People Applying Advanced Technology

Argon ST. Creative People Applying Advanced Technology Argon ST Creative People Applying Advanced Technology Background Argon ST provides advanced intelligence, surveillance, and reconnaissance systems to the U.S. Department of Defense and certain foreign

More information

DoD CIO s Areas of Focus. David A. Cotton Deputy CIO for Information Enterprise May 20, 2015

DoD CIO s Areas of Focus. David A. Cotton Deputy CIO for Information Enterprise May 20, 2015 DoD CIO s Areas of Focus David A. Cotton Deputy CIO for Information Enterprise May 20, 2015 DoD CIO s Areas of Focus Joint Regional Security Stacks Cloud Computing & Data Center Consolidation Mission Partner

More information

Geospatial Intelligence Interoperability Through Standards Gordon C.Ferrari Chief, Content Standards and Interoperability Division

Geospatial Intelligence Interoperability Through Standards Gordon C.Ferrari Chief, Content Standards and Interoperability Division Geospatial Intelligence Interoperability Through Standards Gordon C.Ferrari Chief, Content Standards and Interoperability Division 15 May 2002 NIMA Vision and Mission Statements National Imagery and Mapping

More information

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS Tactical Communications & Networking Wireless / wired networks Full spectrum of tactical communications Tactical datalinks Radio ancillaries and accessories

More information

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions)

More information

Green Star Volume Certification. Process Guide

Green Star Volume Certification. Process Guide Green Star Volume Certification Process Guide Contents Executive Summary... 3 Volume Certification... 3 The Volume Certification Process Guide... 3 Questions?... 4 Volume Certification Summary... 5 Stage

More information

Security Director - VisionFund International

Security Director - VisionFund International Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone

More information

Intercom Systems in Combat Vehicles (R)evolution

Intercom Systems in Combat Vehicles (R)evolution Intercom Systems in Combat Vehicles (R)evolution Tomáš Mazúrek 1, 1 Faculty of Military Technology, University of Defence, Kounicova 65, 612 00 Brno, Czech Republic tomas.mazurek@unob.cz Abstract. The

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8551.1 August 13, 2004 ASD(NII)/DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: (a) DoD Directive 8500.1, "Information Assurance (IA),"

More information

Understand the past, support the present, shape the future. Enabling Land Force Mobility Dr Peter Holliday MAJ Jason Broderick

Understand the past, support the present, shape the future. Enabling Land Force Mobility Dr Peter Holliday MAJ Jason Broderick Understand the past, support the present, shape the future Enabling Land Force Mobility Dr Peter Holliday MAJ Jason Broderick Scope Land Force Mobility challenges (CIS Focus) Talisman Sabre 2015 Overview

More information

IT Security vs. Defensive Cyber Operations: The evolution of CAF Cyber

IT Security vs. Defensive Cyber Operations: The evolution of CAF Cyber ASSISTANT DEPUTY MINISTER (INFORMATION MANAGEMENT) DIRECTOR GENERAL INFORMATION MANAGEMENT OPERATIONS JOINT FORCE CYBER COMPONENT COMMANDER IT Security vs. Defensive Cyber Operations: The evolution of

More information

Standardizing Warfare System Interfaces to Reduce Integration Costs During Ship Construction, Modernization, and Maintenance

Standardizing Warfare System Interfaces to Reduce Integration Costs During Ship Construction, Modernization, and Maintenance Standardizing Warfare System Interfaces to Reduce Integration Costs During Ship Construction, Modernization, and Maintenance F. Scott Parks 15 March 2016 Study Guidance Objectives Identify commercial data

More information

ENISA s Position on the NIS Directive

ENISA s Position on the NIS Directive ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides

More information

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates Corporate Security & Emergency Management Summary of Submitted 2015 From Rates Service Expense 2014 2015 Revised Non Tax Revenue Net Tax Supported Expense Draft Non Tax Revenue Net Tax Supported Increase

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

PRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR)

PRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR) PRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR) 1. INTRODUCTION 1.1 Purpose of the Guidelines These guidelines have been developed by TVETA to guide TVET Providers on how to: (i) Prepare, plan, and implement

More information

Configuration Security (ConSec) Proposers Day

Configuration Security (ConSec) Proposers Day Configuration Security (ConSec) Mr. Jacob I. Torrey Proposers Day November 17, 2017 1 ConSec objective statement Develop a system to automatically generate, deploy, and enforce secure configurations of

More information

TECHNOLOGY FOR A SAFER WORLD

TECHNOLOGY FOR A SAFER WORLD DESENSE & SECURITY TECHNOLOGY FOR A SAFER WORLD We implement our expertise in the five domains of Defense: Land, Sea, Air, Space and Cyberspace indracompany.com DEFENSE SYSTEMS Indra offers an integrated

More information

IAF Strategic Plan to Identify and Achieve Expectations

IAF Strategic Plan to Identify and Achieve Expectations Saturday,,, IAF Day IAF Strategic Plan to Identify and Achieve Expectations of the users of certified organisations like organisations, governments, end users, etc. Presentation by man Slide 1 Saturday,,,

More information

Air Force Test Center

Air Force Test Center Air Force Test Center Avionics Cyber Range (ACR) Mark Erickson 46 TS/OGE 26 January 2017 DISTRIBUTION STATEMENT A: Approved for public release: distribution is unlimited. 96TW-2017-0005 1 What is the Avionics

More information

Computing and Communications Infrastructure for Network-Centric Warfare: Exploiting COTS, Assuring Performance

Computing and Communications Infrastructure for Network-Centric Warfare: Exploiting COTS, Assuring Performance for Network-Centric Warfare: Exploiting COTS, Assuring Performance Dr. James P. Richardson Mr. Lee Graba Mr. Mukul Agrawal Honeywell International, Inc. {james.p.richardson,lee.graba,mukul.agrawal}@honeywell.com

More information

The U.S. Government s Role in Standards and Conformity Assessment

The U.S. Government s Role in Standards and Conformity Assessment The U.S. Government s Role in Standards and Conformity Assessment ASTM International-Russian Federation on Technical Regulating and Metrology Coordinated Program Mary Saunders Chief, Standards Services

More information

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing

More information

to-end System Test Architecture

to-end System Test Architecture End-to to-end System Test Architecture Sr. Manager, Lockheed Martin SSC masuma.ahmed@lmco.com (408) 742-2553 2553 1 Net-Centric Mission Operations Features Fully Synchronized Interoperable, of ed Systems

More information

CASE STUDY CHIEF INFORMATION OFFICER GROUP

CASE STUDY CHIEF INFORMATION OFFICER GROUP CASE STUDY Project description The Chief Information Officer Group is responsible for ensuring that Defence has a dependable, secure and integrated ICT environment that supports Defence business and military

More information

Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment

Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment 26 January 2017 Presented by: Mr. Chad Miller NAVAIR Cyber T&E What: Replicate Cyber Battlespace

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior

More information

CONVERTING SENSOR DATA TO TACTICAL INFORMATION

CONVERTING SENSOR DATA TO TACTICAL INFORMATION 2011 NDIA GROUND VEHICLE SYSTEMS ENGINEERING AND TECHNOLOGY SYMPOSIUM VEHICLE ELECTRONICS AND ARCHITECTURE (VEA) MINI-SYMPOSIUM AUGUST 9-11 DEARBORN, MICHIGAN CONVERTING SENSOR DATA TO TACTICAL INFORMATION

More information

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate. Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance

More information

Integrating TOGAF, Zachman and DoDAF Into A Common Process

Integrating TOGAF, Zachman and DoDAF Into A Common Process Integrating TOGAF, Zachman and DoDAF Into A Common Process Rolf Siegers Senior Principal Software Systems Engineer The Open Group Architecture Practitioner s Conference October 2003 Customer Success Is

More information

Flight Test Instrumentation System Integration

Flight Test Instrumentation System Integration Flight Test Instrumentation System Integration Suzanne Shipp Nova Defence Aerospace Operational Support Group Nova Aerospace Pty Ltd 2007 1 Background Nova formed in 1999 as an independent, experienced

More information

Overview of the Federal Interagency Operational Plans

Overview of the Federal Interagency Operational Plans Overview of the Federal Interagency Operational Plans July 2014 Table of Contents Introduction... 1 Federal Interagency Operational Plan Overviews... 2 Prevention Federal Interagency Operational Plan...2

More information

Coalition Interoperability Ontology:

Coalition Interoperability Ontology: Coalition Interoperability Ontology: Sharing Situational Awareness with Allies and Agents Erik Chaum Naval Undersea Warfare Center, Division Newport, TTCP, Maritime Systems Group, TP1 US National Leader

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY

More information

Procedure for Network and Network-related devices

Procedure for Network and Network-related devices Lloyd s Register Type Approval System Type Approval Requirements for components within Cyber Enabled Systems on board Ships Procedure for Network and Network-related devices September 2017 1 Reference:

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

CCSDS Space Link Extension (SLE)

CCSDS Space Link Extension (SLE) CCSDS Space Link Extension (SLE) Proposal for a NASA Wide Ground Data Service Standard Nascom Block Phase Out Work Group Team Prepared by Larry Muzny Lockheed Martin Space Operations Consolidated Space

More information

6/18/ ACC / TSA Security Capabilities Workshop THANK YOU TO OUR SPONSORS. Third Party Testing Program Overview.

6/18/ ACC / TSA Security Capabilities Workshop THANK YOU TO OUR SPONSORS. Third Party Testing Program Overview. 2015 ACC / TSA Security Capabilities Workshop June 16-18, 2015 #SecurityCapabilities THANK YOU TO OUR SPONSORS 2015 ACC/TSA Security Capabilities Workshop June 24-26 Arlington, VA #SecurityCapabilities

More information

Structural Analysis Tools. Modernization

Structural Analysis Tools. Modernization Structural Analysis Tools David Fowler Modernization Section Manager, Bethpage Structural Analysis Northrop Grumman Northrop Grumman Structural Analysis Tools Modernization NX CAE Symposium Fall 2012 David

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

strategy IT Str a 2020 tegy

strategy IT Str a 2020 tegy strategy IT Strategy 2017-2020 Great things happen when the world agrees ISOʼs mission is to bring together experts through its Members to share knowledge and to develop voluntary, consensus-based, market-relevant

More information

Global Security Advisor

Global Security Advisor Global Security Advisor Location: [North America] [United States] Category: Security *Preferred location: USA. Other locations will be considered globally where WVI is registered to operate. PURPOSE OF

More information

A joint approach to tactical data links The Swedish way

A joint approach to tactical data links The Swedish way A joint approach to tactical data links The Swedish way LtCol Sigvard Wiss Joint C4I Systems Department Kristin Strömberg, Pgm Manager SW TDL Office, FMV SCOPE Operational Background Swedish TDL CONOPS

More information

Professor Robert Clark Chief Defence Scientist & Chief Executive Officer

Professor Robert Clark Chief Defence Scientist & Chief Executive Officer Professor Robert Clark Chief Defence Scientist & Chief Executive Officer Defence Science & Technology Organisation Department of Defence Australia 10 th Annual SET Conference 21 April 2009 The Australian

More information

Branding Guidance December 17,

Branding Guidance December 17, Branding Guidance December 17, 2014 1 Executive Summary This document provides guidelines on the use of the FedRAMP name and logo on all FedRAMP marketing and collateral materials. General guidelines are

More information

RESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016

RESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016 RESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016 HunterNet Co-Operative Limited T: 02 4908 7380 1 P a g e RESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016 Project Manager Marq Saunders, HunterNet Defence

More information

UNCLASSIFIED. Exhibit R-2, RDT&E Budget Item Justification Date February 2007 Appropriation/Budget Activity RDT&E Defense-Wide, BA 7

UNCLASSIFIED. Exhibit R-2, RDT&E Budget Item Justification Date February 2007 Appropriation/Budget Activity RDT&E Defense-Wide, BA 7 Exhibit R-2, RDT&E Budget Item Justification Date February 2007 Appropriation/Budget Activity RDT&E Defense-Wide, BA 7 R-1 Item Nomenclature: Net Centricity PE 0305199D8Z Cost ($ in millions) FY 2006 FY

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

Implementation Strategy for Cybersecurity Workshop ITU 2016

Implementation Strategy for Cybersecurity Workshop ITU 2016 Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential

More information

A Strategy for the Implementation of IPv6 in Australian Government Agencies

A Strategy for the Implementation of IPv6 in Australian Government Agencies A Strategy for the Implementation of IPv6 in Australian Government Agencies July 2009 Version 2 For General Distribution AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE (AGIMO) A Strategy for the

More information