UNCLASSIFIED. ADF Tactical Data Link Authority Ground Network Capability Assurance Services UNCLASSIFIED
|
|
- Gilbert Hardy
- 5 years ago
- Views:
Transcription
1 UNCLASSIFIED MilCIS 2013 TDL Stream, Session 2.5a ADF Tactical Data Link Authority Ground Network Capability Assurance Services Mr. Josh Roth Ground Networks Manager Mr. Mark Rattigan Ground Networks Interoperability Analysis Manager UNCLASSIFIED ADFTA Role in Ground Networks The primary role of ADFTA is to ensure correct TDL functionality at the platform level to achieve Joint and Combined TDL interoperability in accordance with Defence Instructions and Policies. ADFTA provides capability assurance services for Ground Networks that are used for Command and Control, execution of Joint Fires, Manoeuvres and ISR. 1
2 ADF Ground Networks The ADF Ground Network domain includes a large range of C4ISR equipment that is used in support of achieving Army operational requirements. GN tactical equipment primarily utilises VMF for message exchange over a variety of bearers that include LAN, CNR and IP Radios (e.g. EPLRS). Capability Support Requirements Development Interoperability Analysis Provision of advice on MIL-STD Implementation/Use Representation in international working groups Test and Evaluation Integration and Experimentation 2
3 Variable Message Format US military standard Used by US services and agencies and coalition/partner nations Catalogue of messages Transfer of bit-oriented digital information Variable length Designed for use in bandwidth constrained networks Media independent ITAR controlled (restricted distribution) ADFTA has release Authority for ADO and Australian Defence Industry. VMF Header Message header usually used in conjunction with VMF MIL-STD (Connectionless Data Transfer Application Layer Standard) Application Layer: Message Identification and Addressing. Transport Layer: Defines Segmentation/Reassembly for large messages or use of IETF Internet Standards for TCP or UDP. Network Layer: Use of IETF Internet Standards for IP. Public distribution (available through the ASSIST Database for Military Specifications and Military Standards 3
4 Combat Net Radio Bearer often used with VMF MIL-STD (Digital Message Transfer Device Subsystems) Physical through Transport Layer Protocol Public distribution (available through the ASSIST Database for Military Specifications and Military Standards Developments in VMF/CNR XNPv2 (exchange Network Parameters v2) OPTASKCNR Rework of Segmentation/Reassembly Future Backward Compatibility 4
5 URN Management Unit Reference Number Globally unique number to identify friendly units/systems within systems implementing VMF (both for message addressing, and unit identification) URN Management requires: Collection of data relating to each friendly unit/system to be identified. Distribution of collated data Challenges: Disparate system implementation of address books Configuration Management Distributing the right data products to the right organisations Sharing data with partner nations US CI Effort Joint Fire Support Coordinated Implementation Change Control Board JFS CI CCB: Decision-making body for JFS Coordinated Implementation US Government (System Program Manager and Acquisition Authority) representatives Program offices planning to implement DACAS and DAFS capabilities agree to implement IAW applicable ECPs. DACAS and DAFS Working Groups Working Groups to interpret joint requirements and develop recommendations to promote interoperability through development of DACAS and DAFS SoS Specifications (ECPs). 5
6 US CI Effort Digitally Aided Close Air Support Working Group Triannual meeting facilitated by US Joint Staff, Joint Fires Division, Joint Close Air Support Section. Development of DACAS SoS Specifications (ECPs). Block 1 baseline capability for DACAS: ECP 1: Baseline Digitally-aided CAS Messaging and RF Network ECP 2: Designated Ground Target (DGT) / Sensor Point of Interest (SPI) ECP 3: Marked Still Imagery ECP 4: Exchange of Network Parameters (XNP) US CI Effort Digitally Aided Close Air Support Working Group Block 2 Approved ECPs ECP 5: Common Operational Tasking and Mission Data Loading ECP 8: Unmanned Aircraft System Integration as a Strike Platform Draft ECPs ECP 6: Joint Tactical Air Strike Request (JTAR) ECP 7: Forward Air Controller (Airborne) Terminal Attack Control (FAC(A) TAC) ECP 9: Network Enabled Weapons (NEW) Integration ECP 10: Multiple Targets in a Single 9-Line ECP 11: Beyond-Line-of-Sight Situation Update 6
7 US CI Effort Digitally Aided Fire Support Working Group To this point has been US-only. Expect to be opened to Partner Nations for 14-1 meeting. Aim as per DACAS WG, except for wider joint fires arena. Australian CI Effort Trying to move away from blocking. Previous US approach had been to block implementation and fielding of Military Standard revisions over future years. In practice, has remained fragmented. Australian challenges: Knowledge of US service plans Acquisition lead times Availability of MOTS systems if Australian plan were to diverge from US reality Actual publication timeframes for future MIL-STD revisions Realities of Acquisition projects or sustainment agencies to program future MIL-STD revision upgrades 7
8 Offensive Fires Architecture Development (using MBSE) Why? VMF provides only a message catalogue No rules for processing No rules for transmission Very little description of use No readily available community in which to seek advice. Try to learn from US systems use of VMF, to apply to Australian requirements. Currently numerous pockets of knowledge within the ADF each centred on their piece of the puzzle Limited knowledge on implementation of VMF within FMS procured systems Offensive Fires Architecture Development (using MBSE) Initially aiming to consolidate Offensive Support Doctrine/TTPs and JF system capabilities Future aim to expand beyond joint fires Align VMF Implementation to Doctrine/Operational Requirements (avoid catalogue shopping as Message Names may be misleading) Development of traceable requirements for future systems Identify potential capability gaps with extant systems Development of standardised mission threads to allow a consistent testing regime for Interoperability Testing. 8
9 Composed of Architecture Composed of Built from Performers (Operational Node) Implemented by Joins to and Joins thru System/Component Built from Connected to and Connected Thru Interface Comprised of Performs Needline Implemented by Link Performs Exchanges (carries) carries Operational Information Implemented by Item Decomposed by Decomposed by Inputs/ Outputs/ Triggers Inputs/ Outputs/ Triggers Decomposed by Operational Activity Implemented by Function Decomposed by Operational Architecture Domain System Architecture Domain Test and Evaluation The ADFTA supports the TDL registration process for VMF by providing a number of formal testing services: Conformance To Standard (CTS) testing Verifying the VMF interface of a single platform meets the standard specifications Perform a TDL Compliance Certificate (TCC) assessment Joint Interoperability Testing (JIT) Validating Information Exchange Requirements between ADF platforms Combined Interoperability Testing (CIT) Validating Information Exchange Requirements between coalition platforms 9
10 Utilising Architecture Development to improve testing outcomes ADFTAs primary goal is improve the state of TDL interoperability within the ADF. By creating a master set of Mission Threads utilising Doctrine/Operational Requirements and aligning these to VMF implementations, ADFTA is able to: Provide improved guidance during requirements development Demonstrate traceability from Doctrine and OCD requirements through to Test Threads Improve assurance the Capability Manager has that the system meets the requirements and interoperability issues have been identified. Improve the fidelity of VMF implementation advice that may be implied but not specified within the standards. Significantly reduce the maintenance effort required for Interoperability Testing Integration, Experimentation and Advice ADFTA maintains a GN Laboratory with representative GN equipment including Battle Management Systems, Improved Device Modems and tactical radios It is used to assist TIED stakeholders to identify, characterise and resolve current and potential interoperability issues. Activities include: Monitor and support Project, Vendor and User activities Conduct of Risk Mitigation Experiments and Trials Facilitating trials of new equipment within the GN Specific technical investigations Coordinating activities between different equipment owners and stakeholders 10
11 Challenges ahead This is mostly the first generation of a digitised Ground Network Users are still aligning their needs and expectations with the digital capabilities acquired TTPs need to be adapted Lessons Learned need to be incorporated for the second generation of capability. Maintaining interoperability in an environment where the ADO only has limited control of equipment and standards implemented. Providing increasing support to a growing capability in a resource constrained environment. 11
Joint Capability Management by Design Tactical Information Exchange Domain
Joint Capability Management by Design Tactical Information Exchange Domain Director General C4I and Training Support BRIG John Gould C4ISR - Designing the Force Force Design Division in VCDF Group Consolidates
More informationUNCLASSIFIED MILCIS Session 2.5b Land Network Integration Centre (LNIC) Update 13 Nov 13
UNCLASSIFIED MILCIS 0 Session.5b Land Network Integration Centre (LNIC) Update Nov Mr Adam Mead Contractor to the Commonwealth Land TDL Manager / Land URN Manager Army Headquarters Scope Role of the (LNIC)
More informationUnderstanding Data Link Gateway Challenges
Understanding Data Link Gateway Challenges TDL Summit November 2018 Introduction Technology improvements allow new technology radios to be deployed in shorter periods of time than past history Gateway
More informationSystematic Software Engineering 2006
1 Coalition Interoperability Through Network Centric Standards Management Good afternoon ladies and gentlemen. My paper today is about a network centric solution for managing structured information standards.
More informationICT & Battle-Space Networks
ICT & Battle-Space Networks Anant Mahajan, CIOG Considerations on ICT Architecture and Technology for Battle-Space Communication Presentation for MILCIS 2014 13 November 2014 Outline 1. Information and
More informationBattlespace Communications Architecture Development
Battlespace Communications Architecture Development Land Communications Reference Architecture Brief Mr Graeme Neil, Lead Architect, Joint Project 2072, DMO Electronic s Division Communications Branch
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program Element - - 38.094-38.094 38.503 39.587 40.754 41.292 Continuing Continuing
More informationImplementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs
Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs Philomena Zimmerman Office of the Deputy Assistant Secretary of Defense for Systems Engineering
More informationDoD Strategy for Cyber Resilient Weapon Systems
DoD Strategy for Cyber Resilient Weapon Systems Melinda K. Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Systems Engineering Conference October 2016 10/24/2016 Page-1
More informationEmerging Security Challenges November 22, 2012, Baku
Emerging Security Challenges November 22, 2012, Baku NATO ENSEC COE: planned activities and importance for NATO-South Caucasus cooperation DR. ARŪNAS MOLIS Chief of Research and Analysis Energy Security
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Mapping The Network Mapping helps visualize the network and understand relationships and connectivity between
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationCorporate Capabilities
Corporate Capabilities 2017 Summary Thomas Edison stated, "there's a way to do it better find it." intellisolutions is 3 rd party certified as a Woman-Owned Small Business (WOSB)*. Founded in 2006 in San
More informationProcess Definition: Security Services
Process Definition: Services 1. SUMMARY Process Definition: Services 1.1. This document defines the processes provided by the Services team in detail. 1.2. The relationship between this Business Unit process
More informationDefence services. Independent systems and technology advice that delivers real value. Systems and Engineering Technology
Defence services Independent systems and technology advice that delivers real value Systems and Engineering Technology Frazer-Nash Consultancy Working in the UK and internationally, Frazer-Nash is making
More informationANZPAA National Institute of Forensic Science BUSINESS PLAN
ANZPAA National Institute of Forensic Science BUSINESS PLAN 2018 19 OUR STRATEGIC INTENT PROMOTE AND FACILITATE EXCELLENCE IN FORENSIC SCIENCE The National Institute of Forensic Science is a directorate
More informationASD CERTIFICATION REPORT
ASD CERTIFICATION REPORT Amazon Web Services Elastic Compute Cloud (EC2), Virtual Private Cloud (VPC), Elastic Block Store (EBS) and Simple Storage Service (S3) Certification Decision ASD certifies Amazon
More informationSecure information exchange
www.thales.no Secure information exchange 2 together. Safer. everywhere. Whenever critical decisions need to be made, Thales has a role to play. In all its markets aerospace, space, ground transportation,
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 10 R-1 Line #218
COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Office of Secretary Of Defense Page 1 of 10 R-1 Line #218 Cost To Complete Total
More informationSpace and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)
Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) SSC Atlantic is part of the Naval Research & Development Establishment (NR&DE) Information Warfare Research Project
More informationU.S. Department of Transportation. Standard
U.S Department of Transportation Federal Aviation Administration U.S. Department of Transportation Federal Aviation Administration Standard DATA STANDARD FOR THE NATIONAL AIRSPACE SYSTEM (NAS) Foreword
More informationFederated Mission Networking
Federated Mission Networking Learning & Applying the Lessons John Palfreyman, IBM V4; 20 Mar 14 Agenda Future Mission Networking - Context Effective Coalitions through OPEN Integration Save money through
More informationRequest for Information Technical Response White Paper for Joint Operational Medicine Information Systems (JOMIS)
Request for Information Technical Response White Paper for Joint Operational Medicine Information Systems (JOMIS) Ensuring Continuity of Data 5 May 2017 Prepared by: Northrop Grumman Systems Corporation
More informationThe Key Principles of Cyber Security for Connected and Automated Vehicles. Government
The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational
More informationThe Perfect Storm Cyber RDT&E
The Perfect Storm Cyber RDT&E NAVAIR Public Release 2015-87 Approved for public release; distribution unlimited Presented to: ITEA Cyber Workshop 25 February 2015 Presented by: John Ross NAVAIR 5.4H Cyberwarfare
More informationCCRTS 2004 Title: Systems and Capability Relation Management in Defence SoS Context
CCRTS 2004 Title: Systems and Capability Relation Management in Defence SoS Context Authors: Pin Chen and Ronnie Gori Integrated Capabilities Branch DSAD, DSTO. Outline Introduction Classification of Relations
More informationBAE SYSTEMS Developing Coalition Interoperability Marcus Krackowizer - September 2004
BAE SYSTEMS Developing Coalition Interoperability Marcus Krackowizer - September 2004 Today s Objectives Introduce the problem context and interdependencies. Discuss BAE SYSTEMS Position Review example
More informationALTER TECHNOLOGY TÜV NORD (ATN)
ALTER TECHNOLOGY TÜV NORD (ATN) H2020 Secure Societies - Interest as a PARTNER OBJECTIVE 7. Enhance standardisation and interoperability of systems, including for emergency purposes TÜV NORD GROUP 2 TÜV
More informationAir Force Mission: Air Power for Australia s interests. Air Force Values: Respect Excellence Agility Dedication Integrity Teamwork
Air Force Vision: Air Force will provide the most rapid, effective and responsive military options for the Australian Government to achieve national objectives within our region and globally. Air Force
More informationElectronic and Mission Systems
Electronic and Mission Systems Boeing Networks, Space, and Security Small Business Workshop Bob Tamaru November 8, 2011 Where We Fit In Boeing Boeing Military Aircraft AEW&C P-8A C-17 Italy Japan 7A7 F-18
More informationUpdate. HFIA Conference 3 February Page 1 HFIA 16 Jan 03 (JLM)
HF in the US Navy Update HFIA Conference 3 February 2005 Page 1 Briefing Outline Present Battle Force Email 66 Status Service Level & Program Infrastructure Upgrades Incremental I.T. updates & Adaptive
More informationIntegrated C4isr and Cyber Solutions
Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a
More informationRequest for Proposals Atlanta Legal Aid Society and Legal Services Law Line of Vermont
Request for Proposals Atlanta Legal Aid Society and Legal Services Law Line of Vermont Web Accessibility Reviews and Recommendations for Two Legal Aid Websites and Assistance Creating an Accessibility
More informationSESSION G.1 CONVERGING LIVE AND VIRTUAL ARCHITECTURES FOR TRAINING, TEST AND EVALUATION
SESSION G.1 CONVERGING LIVE AND VIRTUAL ARCHITECTURES FOR TRAINING, TEST AND EVALUATION Common Open Architecture for Test and Training Airborne Instrumentation Packages Presenter: Rob Scott OBJECTIVE Compare
More informationSubmission. to the. Australian Communications and Media Authority. on the. Planning for mobile broadband within the 1.
Submission to the Australian Communications and Media Authority on the Planning for mobile broadband within the 1.5 GHz mobile band Submission by: Australian Mobile Telecommunications Association and Communications
More informationDeveloping an integrated approach to the analysis of MOD cyber-related risks
Developing an integrated approach to the analysis of MOD cyber-related risks James Tate, Colette Jeffery Joint Enablers Analysis Group 28 th July 2016 COVERING Overview 1. risk research 2. Customer requirement
More informationINFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE
INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 7 8 11 12 13 14 15 INTRODUCTION IEG SCENARIOS REFERENCE ARCHITECTURE ARCHITECTURE
More informationStrategic Security Analyst
Strategic Security Analyst Location: [North America] [United States] Town/City: Monrovia Category: Security Job Type: Fixed term, Full-time *Preferred location: USA, UK or Australia where WVI is registered*
More informationChapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS
Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power
More informationPaper for Consideration by CHRIS. Cooperation Agreement Between IHO and DGIWG
CHRIS17-12.2A Paper for Consideration by CHRIS Cooperation Agreement Between IHO and DGIWG Submitted by: Executive Summary: Related Documents: IHB The IHO standards for digital hydrographic information
More informationC2-Simulation Interoperability in NATO
C2-Simulation Interoperability in NATO Dr Hans Jense Chief, Capability Planning, Exercises and Training NATO UNCLASSIFIED 1 NATO CIS Services Agency NATO Consultation, Command and Control Agency NATO Air
More informationFIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017
FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The
More informationDefence Spectrum Strategy
Alex Wright Spectrum Engineer Defence Spectrum Office Chief Information Officer Group Department of Defence Outline 1) Contemporary Spectrum Context 2) Defence Spectrum Strategy 3) Continuing Adaptation
More informationDigital Health Cyber Security Centre
Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting
More informationDeveloping an integrated approach to the analysis of MOD cyber-related risks
Developing an integrated approach to the analysis of MOD cyber-related risks Colette Jeffery, James Tate Defence Science Technology Laboratory COST Expert Judgement Meeting 12 to 14 October 2016 COVERING
More informationPOSITION DESCRIPTION
Network Security Consultant POSITION DESCRIPTION Unit/Branch, Directorate: Location: Regulatory Unit Information Assurance and Cyber Security Directorate Auckland Salary range: I $90,366 - $135,548 Purpose
More informationC2-Simulation Interoperability in NATO
C2-Simulation Interoperability in NATO Dr Hans Jense Chief, Capability Planning, Exercises and Training NATO UNCLASSIFIED 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
More informationA ROADMAP TO STANDARDIZING THE IRIG 106 CHAPTER 10 COMPLIANT DATA FILTERING AND OVERWRITNG SOFTWARE PROCESS
A ROADMAP TO STANDARDIZING THE IRIG 106 CHAPTER 10 COMPLIANT DATA FILTERING AND OVERWRITNG SOFTWARE PROCESS Item Type text; Proceedings Authors Berard, Alfredo; Manning, Dennis; Kim, Jeong Min Publisher
More informationElectronic warfare, information and cyber
Electronic warfare, information and cyber 2018-2019 Symposia Symposia at Shrivenham provides a forum to Government agencies, military and civilian, industry and research establishments for the exploration
More informationArgon ST. Creative People Applying Advanced Technology
Argon ST Creative People Applying Advanced Technology Background Argon ST provides advanced intelligence, surveillance, and reconnaissance systems to the U.S. Department of Defense and certain foreign
More informationDoD CIO s Areas of Focus. David A. Cotton Deputy CIO for Information Enterprise May 20, 2015
DoD CIO s Areas of Focus David A. Cotton Deputy CIO for Information Enterprise May 20, 2015 DoD CIO s Areas of Focus Joint Regional Security Stacks Cloud Computing & Data Center Consolidation Mission Partner
More informationGeospatial Intelligence Interoperability Through Standards Gordon C.Ferrari Chief, Content Standards and Interoperability Division
Geospatial Intelligence Interoperability Through Standards Gordon C.Ferrari Chief, Content Standards and Interoperability Division 15 May 2002 NIMA Vision and Mission Statements National Imagery and Mapping
More informationSYNERGISTIC WARFARE COMMUNICATION SOLUTIONS
SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS Tactical Communications & Networking Wireless / wired networks Full spectrum of tactical communications Tactical datalinks Radio ancillaries and accessories
More informationUNCLASSIFIED FY 2016 OCO. FY 2016 Base
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions)
More informationGreen Star Volume Certification. Process Guide
Green Star Volume Certification Process Guide Contents Executive Summary... 3 Volume Certification... 3 The Volume Certification Process Guide... 3 Questions?... 4 Volume Certification Summary... 5 Stage
More informationSecurity Director - VisionFund International
Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone
More informationIntercom Systems in Combat Vehicles (R)evolution
Intercom Systems in Combat Vehicles (R)evolution Tomáš Mazúrek 1, 1 Faculty of Military Technology, University of Defence, Kounicova 65, 612 00 Brno, Czech Republic tomas.mazurek@unob.cz Abstract. The
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.1 August 13, 2004 ASD(NII)/DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: (a) DoD Directive 8500.1, "Information Assurance (IA),"
More informationUnderstand the past, support the present, shape the future. Enabling Land Force Mobility Dr Peter Holliday MAJ Jason Broderick
Understand the past, support the present, shape the future Enabling Land Force Mobility Dr Peter Holliday MAJ Jason Broderick Scope Land Force Mobility challenges (CIS Focus) Talisman Sabre 2015 Overview
More informationIT Security vs. Defensive Cyber Operations: The evolution of CAF Cyber
ASSISTANT DEPUTY MINISTER (INFORMATION MANAGEMENT) DIRECTOR GENERAL INFORMATION MANAGEMENT OPERATIONS JOINT FORCE CYBER COMPONENT COMMANDER IT Security vs. Defensive Cyber Operations: The evolution of
More informationStandardizing Warfare System Interfaces to Reduce Integration Costs During Ship Construction, Modernization, and Maintenance
Standardizing Warfare System Interfaces to Reduce Integration Costs During Ship Construction, Modernization, and Maintenance F. Scott Parks 15 March 2016 Study Guidance Objectives Identify commercial data
More informationENISA s Position on the NIS Directive
ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides
More informationCorporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates
Corporate Security & Emergency Management Summary of Submitted 2015 From Rates Service Expense 2014 2015 Revised Non Tax Revenue Net Tax Supported Expense Draft Non Tax Revenue Net Tax Supported Increase
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationPRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR)
PRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR) 1. INTRODUCTION 1.1 Purpose of the Guidelines These guidelines have been developed by TVETA to guide TVET Providers on how to: (i) Prepare, plan, and implement
More informationConfiguration Security (ConSec) Proposers Day
Configuration Security (ConSec) Mr. Jacob I. Torrey Proposers Day November 17, 2017 1 ConSec objective statement Develop a system to automatically generate, deploy, and enforce secure configurations of
More informationTECHNOLOGY FOR A SAFER WORLD
DESENSE & SECURITY TECHNOLOGY FOR A SAFER WORLD We implement our expertise in the five domains of Defense: Land, Sea, Air, Space and Cyberspace indracompany.com DEFENSE SYSTEMS Indra offers an integrated
More informationIAF Strategic Plan to Identify and Achieve Expectations
Saturday,,, IAF Day IAF Strategic Plan to Identify and Achieve Expectations of the users of certified organisations like organisations, governments, end users, etc. Presentation by man Slide 1 Saturday,,,
More informationAir Force Test Center
Air Force Test Center Avionics Cyber Range (ACR) Mark Erickson 46 TS/OGE 26 January 2017 DISTRIBUTION STATEMENT A: Approved for public release: distribution is unlimited. 96TW-2017-0005 1 What is the Avionics
More informationComputing and Communications Infrastructure for Network-Centric Warfare: Exploiting COTS, Assuring Performance
for Network-Centric Warfare: Exploiting COTS, Assuring Performance Dr. James P. Richardson Mr. Lee Graba Mr. Mukul Agrawal Honeywell International, Inc. {james.p.richardson,lee.graba,mukul.agrawal}@honeywell.com
More informationThe U.S. Government s Role in Standards and Conformity Assessment
The U.S. Government s Role in Standards and Conformity Assessment ASTM International-Russian Federation on Technical Regulating and Metrology Coordinated Program Mary Saunders Chief, Standards Services
More informationRSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief
RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing
More informationto-end System Test Architecture
End-to to-end System Test Architecture Sr. Manager, Lockheed Martin SSC masuma.ahmed@lmco.com (408) 742-2553 2553 1 Net-Centric Mission Operations Features Fully Synchronized Interoperable, of ed Systems
More informationCASE STUDY CHIEF INFORMATION OFFICER GROUP
CASE STUDY Project description The Chief Information Officer Group is responsible for ensuring that Defence has a dependable, secure and integrated ICT environment that supports Defence business and military
More informationAvionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment
Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment 26 January 2017 Presented by: Mr. Chad Miller NAVAIR Cyber T&E What: Replicate Cyber Battlespace
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior
More informationCONVERTING SENSOR DATA TO TACTICAL INFORMATION
2011 NDIA GROUND VEHICLE SYSTEMS ENGINEERING AND TECHNOLOGY SYMPOSIUM VEHICLE ELECTRONICS AND ARCHITECTURE (VEA) MINI-SYMPOSIUM AUGUST 9-11 DEARBORN, MICHIGAN CONVERTING SENSOR DATA TO TACTICAL INFORMATION
More informationPosition Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.
Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance
More informationIntegrating TOGAF, Zachman and DoDAF Into A Common Process
Integrating TOGAF, Zachman and DoDAF Into A Common Process Rolf Siegers Senior Principal Software Systems Engineer The Open Group Architecture Practitioner s Conference October 2003 Customer Success Is
More informationFlight Test Instrumentation System Integration
Flight Test Instrumentation System Integration Suzanne Shipp Nova Defence Aerospace Operational Support Group Nova Aerospace Pty Ltd 2007 1 Background Nova formed in 1999 as an independent, experienced
More informationOverview of the Federal Interagency Operational Plans
Overview of the Federal Interagency Operational Plans July 2014 Table of Contents Introduction... 1 Federal Interagency Operational Plan Overviews... 2 Prevention Federal Interagency Operational Plan...2
More informationCoalition Interoperability Ontology:
Coalition Interoperability Ontology: Sharing Situational Awareness with Allies and Agents Erik Chaum Naval Undersea Warfare Center, Division Newport, TTCP, Maritime Systems Group, TP1 US National Leader
More informationUNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY
More informationProcedure for Network and Network-related devices
Lloyd s Register Type Approval System Type Approval Requirements for components within Cyber Enabled Systems on board Ships Procedure for Network and Network-related devices September 2017 1 Reference:
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationCCSDS Space Link Extension (SLE)
CCSDS Space Link Extension (SLE) Proposal for a NASA Wide Ground Data Service Standard Nascom Block Phase Out Work Group Team Prepared by Larry Muzny Lockheed Martin Space Operations Consolidated Space
More information6/18/ ACC / TSA Security Capabilities Workshop THANK YOU TO OUR SPONSORS. Third Party Testing Program Overview.
2015 ACC / TSA Security Capabilities Workshop June 16-18, 2015 #SecurityCapabilities THANK YOU TO OUR SPONSORS 2015 ACC/TSA Security Capabilities Workshop June 24-26 Arlington, VA #SecurityCapabilities
More informationStructural Analysis Tools. Modernization
Structural Analysis Tools David Fowler Modernization Section Manager, Bethpage Structural Analysis Northrop Grumman Northrop Grumman Structural Analysis Tools Modernization NX CAE Symposium Fall 2012 David
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationstrategy IT Str a 2020 tegy
strategy IT Strategy 2017-2020 Great things happen when the world agrees ISOʼs mission is to bring together experts through its Members to share knowledge and to develop voluntary, consensus-based, market-relevant
More informationGlobal Security Advisor
Global Security Advisor Location: [North America] [United States] Category: Security *Preferred location: USA. Other locations will be considered globally where WVI is registered to operate. PURPOSE OF
More informationA joint approach to tactical data links The Swedish way
A joint approach to tactical data links The Swedish way LtCol Sigvard Wiss Joint C4I Systems Department Kristin Strömberg, Pgm Manager SW TDL Office, FMV SCOPE Operational Background Swedish TDL CONOPS
More informationProfessor Robert Clark Chief Defence Scientist & Chief Executive Officer
Professor Robert Clark Chief Defence Scientist & Chief Executive Officer Defence Science & Technology Organisation Department of Defence Australia 10 th Annual SET Conference 21 April 2009 The Australian
More informationBranding Guidance December 17,
Branding Guidance December 17, 2014 1 Executive Summary This document provides guidelines on the use of the FedRAMP name and logo on all FedRAMP marketing and collateral materials. General guidelines are
More informationRESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016
RESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016 HunterNet Co-Operative Limited T: 02 4908 7380 1 P a g e RESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016 Project Manager Marq Saunders, HunterNet Defence
More informationUNCLASSIFIED. Exhibit R-2, RDT&E Budget Item Justification Date February 2007 Appropriation/Budget Activity RDT&E Defense-Wide, BA 7
Exhibit R-2, RDT&E Budget Item Justification Date February 2007 Appropriation/Budget Activity RDT&E Defense-Wide, BA 7 R-1 Item Nomenclature: Net Centricity PE 0305199D8Z Cost ($ in millions) FY 2006 FY
More informationIT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive
IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation
More informationImplementation Strategy for Cybersecurity Workshop ITU 2016
Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential
More informationA Strategy for the Implementation of IPv6 in Australian Government Agencies
A Strategy for the Implementation of IPv6 in Australian Government Agencies July 2009 Version 2 For General Distribution AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE (AGIMO) A Strategy for the
More information