UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Similar documents
UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED R-1 ITEM NOMENCLATURE. FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. R-1 Program Element (Number/Name) PE D8Z / Software Engineering Institute (SEI) Applied Research. Prior Years FY 2013 FY 2014

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED R-1 ITEM NOMENCLATURE

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED UNCLASSIFIED

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 11 R-1 Line #65

UNCLASSIFIED R-1 ITEM NOMENCLATURE. FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED. UNCLASSIFIED R-1 Line Item #49 Page 1 of 10

OSD RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit)

UNCLASSIFIED R-1 ITEM NOMENCLATURE

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8W: IT Software Development Initiatives. FY 2011 Total Estimate. FY 2011 OCO Estimate

The Perfect Storm Cyber RDT&E

UNCLASSIFIED R-1 ITEM NOMENCLATURE

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

Department of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Advanced Research Projects Agency Overview

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 8 R-1 Line #192

OSD RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit)

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #193

Exhibit R-2, RDT&E Budget Item Justification February 2004

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 10 R-1 Line #218

UNCLASSIFIED R-1 ITEM NOMENCLATURE

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Network Centric Collaborative Targeting FY 2012 OCO

Exhibit R-2, RDT&E Budget Item Justification February 2008

UNCLASSIFIED. Exhibit R-2, RDT&E Budget Item Justification Date February 2007 Appropriation/Budget Activity RDT&E Defense-Wide, BA 7

R-1 SHOPPING LIST - Item No. 110

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE N: Surface ASW

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Software Engineering Institute (SEI) FY 2012 OCO

UNCLASSIFIED. All Prior Years FY 2012 FY 2013 # Base

Cyber Security CRA Overview

UNCLASSIFIED UNCLASSIFIED

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Command Control and Communications. FY 2011 Total Estimate. FY 2011 OCO Estimate

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Polar MILSATCOM (Space) FY 2012 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

Cybersecurity in Acquisition

RDT&E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit) February 2000

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Facility Restoration and Modernization - T&E

Exhibit R-2, RDT&E Budget Item Justification

Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Joint Tactical Information Distribution System (JTIDS) FY 2013 OCO

Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)

U.S. Army Cyber Center of Excellence and Fort Gordon

New Horizons. Dr. Bryant Wysocki Chief Engineer AFRL Information Directorate. 13 March 2017

Exhibit R-2, RDT&E Budget Item Justification

Cyberspace: New Frontiers in Technology Insertion

Exhibit R-2, RDT&E Budget Item Justification

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

Space Cyber: An Aerospace Perspective

AC2 CTC Investment Strategy. Capt Brandon Keller, AFRL/RIS Acting CTC Lead

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

Naval Surface Warfare Center,

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT

Resilient Architectures

Test & Evaluation/Science & Technology (T&E/S&T) Cyberspace Test Technology (CTT) Project Overview. 2nd Annual ITEA Cyber Security Workshop

Cyber Challenges and Acquisition One Corporate View

Cyber Resiliency & Agility Call to Action

CERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

Directed Energy S&T. Challenges Overview. L. Bruce Simpson, SES Director Directed Energy Directorate Kirtland AFB, New Mexico

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE N: Tactical Data Links

Systems Engineering and System Security Engineering Requirements Analysis and Trade-Off Roles and Responsibilities

(U) COMPUTER NETWORK OPERATIONS (U) GENIE. (U) Project Description

Defense Engineering Excellence

National Policy and Guiding Principles

Joint Federated Assurance Center (JFAC): 2018 Update. What Is the JFAC?

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE N: Lightweight Torpedo Development

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE N: Navy Tactical Computer Resources

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Achieving a Secure and Resilient Cyber Ecosystem: A Way Ahead

UAS Operation in National Air Space (NAS) Secure UAS Command and Control

Exhibit R-2, RDT&E Budget Item Justification

Integrated C4isr and Cyber Solutions

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Exhibit R-2, RDT&E Budget Item Justification February 2004

EXHIBIT R-2, RDT&E Budget Item Justification RDT&E, N / BA-05. COST ($ in Millions) FY 2006 FY 2007 FY 2008 FY 2009 FY 2010 FY 2011 FY 2012 FY 2013

Quality Collaboration Across Government and Industry in a Time of Profound Changes

RDT&E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit) June 2001

UNCLASSIFIED R-1 ITEM NOMENCLATURE

Advanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin

Industry role moving forward

COUNTERING IMPROVISED EXPLOSIVE DEVICES

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

Department of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview

DoD Strategy for Cyber Resilient Weapon Systems

UNCLASSIFIED UNCLASSIFIED

RiskSense Attack Surface Validation for IoT Systems

Transcription:

Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program Element 4.847 5.539 19.935-19.935 19.995 29.707 30.783 31.342 Continuing Continuing 4.847 5.539 19.935-19.935 19.995 29.707 30.783 31.342 Continuing Continuing A. Mission Description and Budget Item Justification Our military forces require resilient, reliable networks and computer systems to conduct effective operations. However, the number and sophistication of threats in cyberspace are rapidly growing, making it urgent and critical to improve the cyber security of Department of Defense (DoD) networks to counter those threats and assure our missions. This program focuses on innovative and sustained research in both cyber security and computer network operations to develop new concepts to harden key network and computer components, design new resilient cyber infrastructures, increase the military s ability to fight and survive during cyber attacks, disrupt nation-state level attack planning and execution, measure the state of cyber security, and explore and exploit new ideas in cyber warfare for agile cyber operations and mission assurance. The Cyber Advanced Technology program element is budgeted in the advanced technology development budget activity because it will focus on the maturation of successful applied research results and their development into demonstrable advanced cyber capabilities. The Cyber Advanced Technology program will build on results of matured applied research from the Cyber Applied Research (0603668D8Z) and other programs to develop technology demonstrations for potential transition into capabilities that support the full spectrum of computer network operations. These approaches will include moving from cyber defense to cyber resilience by changing the defensive terrain of our existing digital infrastructure, identifying ways to raise the risk and lower the value of attack from an advanced, persistent cyber threat, and focusing on mission assurance. This program focuses on integrating computer network defense and computer network operations, addressing the advanced persistent threat, and filling DoD technology gaps as determined by assessments conducted by the Office of the Assistant Secretary of Defense for Research & Engineering (OASD(R&E)) over the past year. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 6 R-1 Line #42

Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) B. Program Change Summary ($ in Millions) FY 2011 FY 2012 Base OCO Total Previous President's Budget 10.000 10.709 20.496-20.496 Current President's Budget 4.847 5.539 19.935-19.935 Total Adjustments -5.153-5.170-0.561 - -0.561 Congressional General Reductions - - Congressional Directed Reductions - - Congressional Rescissions - - Congressional Adds - - Congressional Directed Transfers - - Reprogrammings - - SBIR/STTR Transfer -0.108-0.132 Congressional Adjustments -5.000-5.000 - - - Economic Assumptions -0.025 - - - - FFRDC -0.018-0.038 - - - Other Program Adjustments -0.002 - -0.561 - -0.561 UNCLASSIFIED Office of Secretary Of Defense Page 2 of 6 R-1 Line #42

0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions) FY 2011 FY 2012 Base OCO UNCLASSIFIED Office of Secretary Of Defense Page 3 of 6 R-1 Line #42 Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost 4.847 5.539 19.935-19.935 19.995 29.707 30.783 31.342 Continuing Continuing A. Mission Description and Budget Item Justification Efforts of the program will develop improved and demonstrable capabilities through the DoD S&T organizations within and across the following technical areas: Develop technologies to harden DoD network components; evolve from network defense to mission assurance; and enable systems to operate through cyber attacks in degraded and contested environments. Disrupt adversary attack planning and execution; explore game-changing ideas over the full spectrum of CNO and new concepts in cyber warfare; increase collaboration between disparate research communities within CNO; and address identified gaps in DoD CNO S&T to prepare for cyber conflict against advanced persistent threats. Explore new analytical methodologies, models, and experimental data sets to establish metrics to measure a system s state of security, apply the scientific method to establish the foundations of a scientific framework in which cyber security research can be conducted to test hypothesis with measurable and repeatable results, and quantitative experimentation and assessment of new cyber technologies. B. Accomplishments/Planned Programs ($ in Millions) FY 2011 FY 2012 Title: Cyber Advanced Technology Description: The Cyber Advanced Technology program will build on, mature, and transition the results of successful applied research results from the Cyber Applied Research program element. The link between the Cyber Applied Research and Cyber Advanced Technology program elements is intended to create a mechanism to take existing basic research results and mature them to the point of incorporation into technology demonstrations. This program focuses on integrating computer network defense and computer network operations, addressing joint problems in cyber operations, and filling capability and technology gaps as determined by assessments in the Office of the Assistant Secretary of Defense for Research & Engineering. Progress and results are reviewed by the DoD Cyber S&T Steering Council. FY 2011 Accomplishments: Initiated S&T for technology development with the specific focuses technical areas of information assurance and computer network defense, computer network operations, and cyber metrics and experimentation. Commenced a semi-annual technical 4.847 5.539 19.935

0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) B. Accomplishments/Planned Programs ($ in Millions) FY 2011 FY 2012 program review cycle and a series of laboratory-hosted cross-fertilization workshops to enable joint collaboration across DoD S&T organizations and between the defensive and offensive S&T communities. Focuses of each technical area: -Resilient architectures and protocols to reduce cyber reaction time for rapid system reconstitution to a known secure state and enable critical mission operation through cyber attacks in degraded environments. -Agile cyber operations to enable moving target defense and defensive cyber maneuver. -Attack detection and understanding to reduce, rapidly and autonomously detect, and mitigate attack effects. -Vulnerability discovery and analysis to improve cyber risk assessment, situational awareness, and the impact of cyber assets on missions. -Resilient CNO frameworks and architectures. -Wireless discovery and access techniques. -Situational awareness in near real-time during cyber operations. -Agile cyber maneuver to disrupt and confuse adversarial attack planning cycles to increase adversary risk and work factor and decrease effectiveness during adversary attack and exploitation attempts. -Improved understanding of the adversarial threat. -Measurements of effectiveness of existing countermeasures and the current level of DoD cyber security. -Measurements of impacts of new cyber security technologies. -Measurements of computer and network assurance levels for enhanced situational awareness. -Quantitative analysis and experimental testing of the effect of resilient and agile cyber operations and architectures on DoD system and network security. FY 2012 Plans: -Enable interoperability amongst computer network defense and computer network attack software framework capabilities for broader threat mitigation coverage. -Analysis of protocols for tactical assured information sharing solutions and assessment of embedded or stand-alone solutions. UNCLASSIFIED Office of Secretary Of Defense Page 4 of 6 R-1 Line #42

0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) B. Accomplishments/Planned Programs ($ in Millions) FY 2011 FY 2012 -Develop automated reverse engineering framework that discovers and analyzes software and system vulnerabilities and targets multiple processor architectures through a plug-in application programming interface. -Perform a security analysis of COTS components (e.g. CPU, chipsets, RAM, BIOS, hard disks, peripheral cards) to identify supply chain vulnerabilities unaddressed in current DoD software protection and anti-tamper systems. -Develop real-time data collection techniques and active deception techniques to specifically target and engage humans behind attacks rather than attack attributes to advance determinations of adversaries behavioral characteristics. -Demonstrate prototype system that evaluates a host s integrity at startup by checking and measuring a modern PC s runtime operations. -Research application programming interfaces to extract data from cyber operations platforms for more effective data fusion and situational awareness. - of common protocols and services to enable a common command and control infrastructure and more efficient effects development to enhance existing but disparate computer network operations software frameworks. -Develop techniques to use collaborative analysis, scalable tools, and extendable generic processor models to reduce static and dynamic software analysis time from weeks to hours. -Develop and test a time difference of arrival system for tactical wireless emitter localization. -Improve attack detection techniques for operating system-independent attacks, included stealthy kernel, hypervisor, and firmware rootkits. -Demonstrate automatic experiment configuration tools, automatic correlation capabilities, and situational awareness capabilities in a cyber R&D experimentation environment. Plans: -Design security architecture and trusted execution flow framework for tactical assured information sharing and validate proof of concept. -Evaluate automated reverse engineering framework through red-team testing. -Develop non-invasive hardware Trojan prevention and detection using firmware programming countermeasures and side channel analysis to mitigate firmware-based and hardware-based attacks. -Develop countermeasures to adversarial deception tactics of concealment, decoys, diversion, and emulation. -Develop game-theoretic based algorithms to predict cyber attacks using machine learning and new trusted sensing capabilities. UNCLASSIFIED Office of Secretary Of Defense Page 5 of 6 R-1 Line #42

0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) B. Accomplishments/Planned Programs ($ in Millions) FY 2011 FY 2012 -Develop insider threat attack detection techniques by monitoring and certifying known legitimate end-node behavior and detecting abnormalities in real-time. -Enhance cyber operations platform with implementation of newly developed application programming interface and demonstrate unimpeded data access across multiple platforms and operators in near-real time. -Develop graded-response mechanisms based on real-time threat assessment of operating system-independent attacks, included stealthy kernel, hypervisor, and firmware rootkits. -Decouple programming language-dependent constructs in existing CNO software frameworks to allow for development of clients developed in different languages to operate within the SW architecture. -Investigate and test a hybrid time of arrival and phased array system for wireless localization. -Design practical information operations metrics for assessment of classified technologies on a cyber R&D experimentation environment. Accomplishments/Planned Programs Subtotals 4.847 5.539 19.935 C. Other Program Funding Summary ($ in Millions) Line Item FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost BA 2, PE # 0602668D8Z, P003: Cyber Applied Research 4.538 4.581 18.985 18.985 19.041 9.581 9.851 10.030 Continuing Continuing D. Acquisition Strategy N/A E. Performance Metrics N/A UNCLASSIFIED Office of Secretary Of Defense Page 6 of 6 R-1 Line #42