Pittsburgh, /7/2014. Cyber Vulnerabilities in the Intangible World
|
|
- Alexia Bruce
- 6 years ago
- Views:
Transcription
1 Cyber Vulnerabilities in the Intangible World MACPA 2014 Government and Not for Profit Conference Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Robert Behler, Deputy Director and COO USAF Major General (ret.) April 25, 2014 Pittsburgh,
2 Pittsburgh, The DoD is in the software business The B-52 lived and died on the quality of its sheet metal. Today our aircraft will live or die on the quality of our software. Quote: Delivering Military Software Affordably, Defense AT&L, March-April
3 Increasing Complexity and Functionality Increase Attack Surface 9.9M SLOC Complexity 500K SLOC 2K Lines of Machine Code 0 SLOC Functionality Sourced from Washington Times and Atlantic Wire 5 Crown Jewels Vulnerabilities Critical infrastructures Insider threats Cloud/networked systems Insider threats Mobile devices Legacy system upgrades Complex software supply chain Emerging threats 6 3
4 Daunting Challenges Technology People Continuously emerging threat Making cyber resilience part of the business case 7 Cyber Attack Can Steal the Perception of Reality 8 4
5 2014 Super Bowl Wi-Fi Password Credentials Broadcast in Pre-Game Security Gaffe 9 Fake Netflix App Redirects Data to Attacker Targeted software supply chain for mobile devices New phones and tablets shipped with pre-installed fake Netflix app Phony app sends passwords and credit card information to Russia Phony Netflix apps were found on newly shipped mobile devices from four manufacturers (reported in March 2014) In the supply chain for new mobile devices, bundles of third-party applications are rarely run through anti-malware or privacy leak detection software. Security Analyst 10 5
6 Watering Hole Attack Uses VFW Website Used vulnerability in IE10 Served from VFW website during 2014 winter storm Pax and President s Day weekend Gave attacker access to site visitors important information In a watering hole strategy, an attacker plants malware on a website popular with targeted group. Possible object: targeting military service members to steal military intelligence. In addition to retirees, active military personnel use the VFW website. FireEye researchers 11 Make Cyber Resilience Part of the Business Case Astroinertial navigation system 12 6
7 The Ultimate Computer Technology Continuously emerging threat People Cyber resilience in the business case 13 Contact Information Robert Behler Deputy Director and COO Software Engineering Institute Telephone: Web U.S. Mail Software Engineering Institute Customer Relations 4500 Fifth Avenue Pittsburgh, PA USA Customer Relations Telephone: SEI Phone: SEI Fax:
8 Copyright 2014 Carnegie Mellon University This material is based upon work funded and supported by the Department of Defense under Contract No. FA C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the United States Department of Defense. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. This material has been approved for public release and unlimited distribution except as restricted below. This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu. Carnegie Mellon is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University. DM
Guide to the SEI Partner Network
Guide to the SEI Partner Network January 2018 Your Guide to Delivering SEI Services The SEI Partner Network is a premier group of organizations that deliver time-tested, proven services developed by the
More informationSoftware Sustainment: Continuous Engineering to
Software Sustainment: Continuous Engineering to Deliver Warfighter Capability Michael H. McLendon (SEI) John Stankowski (OSD) Dr. Forrest Shull (SEI) Stephany Bellomo (SEI) Software Engineering Institute
More informationCarnegie Mellon University Notice
Carnegie Mellon University Notice This video and all related information and materials ( materials ) are owned by Carnegie Mellon University. These materials are provided on an as-is as available basis
More informationMission Thread Workshop (MTW): Preparation and Execution
Mission Thread Workshop (MTW): Preparation and Execution Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Tim Morrow Mike Gagliardi Bill Wood SATURN 2013 May 2, 2013 Outline
More informationCyber Affordance Visualization in Augmented Reality (CAVIAR)
Research Review 2017 Cyber Affordance Visualization in Augmented Reality (CAVIAR) Josh Hammerstein, Research Team Lead Jeff Mattson, Deputy Director Cyber Workforce Development Directorate Problem Cyberspace
More informationWhen and Where to Apply the Family of Architecture- Centric Methods
When and Where to Apply the Family of - Centric Methods Mike Gagliardi Tim Morrow Bill Wood Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Copyright 2015 Carnegie Mellon
More informationApplying the Goal-Question-Indicator- Metric (GQIM) Method to Perform Military Situational Analysis
Applying the Goal-Question-Indicator- Metric (GQIM) Method to Perform Military Situational Analysis Douglas Gray May 2016 TECHNICAL NOTE CMU/SEI-2016-TN-003 CERT Division http://www.sei.cmu.edu REV-03.18.2016.0
More informationA Game-Theoretic Approach to Optimizing Behaviors in Acquisition
A Game-Theoretic Approach to Optimizing Behaviors in Acquisition William E. Novak Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Copyright 2017 Carnegie Mellon University.
More informationMission Thread Workshop
Mission Thread Workshop Lessons Learned SATURN 2012 Mike, Bill Wood 1 Copyright 2012 Carnegie Mellon University This material is based upon work funded and supported by the Department of Defense under
More informationPanel: Experiences with. Engineering in the Defense Industry. Moderator: Mary Ann Lapham, PMP, CSM
Panel: Experiences with Agile for Systems Engineering in the Defense Industry Moderator: Mary Ann Lapham, PMP, CSM Principal Engineer Software Engineering Institute Carnegie Mellon University Lapham NDIA
More informationOverview of the New Introduction to CMMI Course and Changes to the Intermediate Concepts and Instructor Training Courses
Pittsburgh, PA 15213-3890 Overview of the New Introduction to Course and Changes to the Intermediate Concepts and Instructor Training Courses SM CMM Integration, IDEAL, and SCAMPI are service marks of
More informationSystems Engineering Capstone Marketplace Pilot
Systems Engineering Capstone Marketplace Pilot A013 - Interim Technical Report SERC-2013-TR-037-1 Principal Investigator: Dr. Mark Ardis Stevens Institute of Technology Team Members Missouri University
More informationThe impact of healthcare cybersecurity on SAUDI ARABIAN consumers. Accenture 2017 Consumer Survey on Healthcare Cybersecurity and Digital Trust
The impact of healthcare cybersecurity on SAUDI ARABIAN consumers Accenture 2017 Consumer Survey on Healthcare Cybersecurity and Digital Trust 2 Saudi trust in digital health data security depends on who
More informationFor More Information
THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE
More informationINSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems
United States Government Accountability Office Report to Congressional Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544
More informationSustaining Software-Intensive Systems - A Conundrum
Pittsburgh, PA 15213-3890 Sustaining Software-Intensive Systems - A Conundrum Mary Ann Lapham Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University Version 2 GSAW 2006 - page 1
More informationWest Virginia Trading Partner Account Patient Roster User Guide. Date of Publication: 01/19/2016 Document Version: 1.0
West Virginia Trading Partner Account Date of Publication: 01/19/2016 Document Version: 1.0 Privacy and Security Rules WV MMIS Trading Partner Account The Health Insurance Portability and Accountability
More informationAuthorized licensed use limited to: UNIVERSITA MODENA. Downloaded on November 10,2011 at 14:46:47 UTC from IEEE Xplore. Restrictions apply.
IEEE Std 830-1998(R2009) (Revision of IEEE Std 830-1993) IEEE Recommended Practice for Software Requirements Specifications Sponsor Software Engineering Standards Committee of the IEEE Computer Society
More informationOur Terms of Use and other areas of our Sites provide guidelines ("Guidelines") and rules and regulations ("Rules") in connection with OUEBB.
OUE Beauty Bar - Terms of Use These are the terms of use ("Terms of Use") governing the purchase of products in the vending machine(s) installed by Alkas Realty Pte Ltd at OUE Downtown Gallery, known as
More informationSATURN Sponsorship Opportunities. 13th Annual SEI Architecture Technology User Network Conference. May 1 4, 2017 Denver, Colorado
SATURN 2017 13th Annual SEI Architecture Technology User Network Conference Sponsorship Opportunities May 1 4, 2017 Denver, Colorado In 2017, the Software Engineering Institute (SEI) Architecture Technology
More informationLifecycle Models for Survivable Systems
Lifecycle Models for Survivable s Rick Linger Carnegie Mellon University Pittsburgh, PA 15213-3890 Sponsored by the U.S. Department of Defense 2000 by Carnegie Mellon University Version 2 SNA Tutorial
More informationAdvanced Explosive Ordnance Disposal Robotic System (AEODRS)
Advanced Explosive Ordnance Disposal Robotic System (AEODRS) NDIA Meeting DISTRIBUTION UNLIMITED 22 MARCH 2017 Mr. Jim Ryan Assistant Program Manager Joint Service EOD 22 March 2017 Purpose Provide JEOD
More informationEngaging the DoD Enterprise to Protect U.S. Military Technical Advantage
Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage Brian Hughes Office of the Deputy Assistant Secretary of Defense for Systems Engineering 19th Annual NDIA Systems Engineering Conference
More informationINFORMATION TECHNOLOGY, MOBILES DIGITAL MEDIA POLICY AND PROCEDURES
INFORMATION TECHNOLOGY, MOBILES AND DIGITAL MEDIA POLICY AND PROCEDURES Updates Who Updated Comments Aug annually Lewis External version TABLE OF CONTENTS AIMS AND LEGISLATION... 3 MOBILE PHONES PARENTS/CARERS
More informationCastles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness)
Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness) The Nation's Army in Cyberspace OVERALL CLASSIFICATION: US Army Cyber Command and Second Army 1 COL Mark Schonberg,
More informationJoint Warfare System (JWARS)
Joint Warfare System (JWARS) Update to DMSO Industry Days June 4, 1999 Jim Metzger JWARS Office Web Site: http://www.dtic.mil/jwars/ e-mail: jwars@osd.pentagon.mil 6/4/99 slide 1 Agenda Background Development
More informationNotre Dame College Website Terms of Use
Notre Dame College Website Terms of Use Agreement to Terms of Use These Terms and Conditions of Use (the Terms of Use ) apply to the Notre Dame College web site located at www.notre-dame-college.edu.hk,
More informationTranSync Compliance Monitoring Manual. Homecare Provider/Authorized Monitors
TranSync Compliance Monitoring Manual Homecare Provider/Authorized Monitors Page ii Notices Revised Notice Trademark Copyright for Homecare Providers/Authorized Monitors 103516 Rev A Published March 21,
More informationCMMI: The DoD Perspective
Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University CMMI: The DoD Perspective Rick Barbour Chief Engineer Navy, Acquisition Support Program page 1 Acknowledgement Presentation
More informationSubj: ELECTRONIC WARFARE DATA AND REPROGRAMMABLE LIBRARY SUPPORT PROGRAM
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3430.23C N2/N6 OPNAV INSTRUCTION 3430.23C From: Chief of Naval Operations Subj: ELECTRONIC
More informationAVIONICS CYBER TEST AND EVALUATION
AVIONICS CYBER TEST AND EVALUATION Joseph Nichols, PhD Technical Advisor for Flight Test and Evaluation Air Force Test Center Edwards AFB CA joseph.nichols.13@us.af.mil 1 Defining avionics cyber testing
More informationSOUTH AFRICAN NATIONAL STANDARD
ISBN 978-0-626-31239-8 Edition 1 and IEEE amdt 1 IEEE Std 1584-2002 and IEEE Std 1584a-2004 (amdt to IEEE Std 1584-2002) SOUTH AFRICAN NATIONAL STANDARD IEEE guide for performing arc-flash hazard calculations
More informationU.S. DEPARTMENT OF HOMELAND SECURITY
U.S. DEPARTMENT OF HOMELAND SECURITY SECRETARY DEPUTY SECRETARY Executive Secretariat Military Advisor MANAGEMENT Under Secretary SCIENCE & TECHNOLOGY Under Secretary NATIONAL PROTECTION & PROGRAMS Under
More informationIntegrating Software Architecture Evaluation in a DoD System Acquisition
Pittsburgh, PA 15213-3890 Integrating Software Architecture Evaluation in a DoD System Acquisition John Bergey Timothy Morrow April 2005 Sponsored by the U.S. Department of Defense 2005 by Carnegie Mellon
More informationTo be prepared for war is one of the most effectual means of preserving peace.
The missions of US Strategic Command are diverse, but have one important thing in common with each other: they are all critical to the security of our nation and our allies. The threats we face today are
More informationSentinel LDK. Migration Guide HASP HL to Sentinel LDK
Sentinel LDK Migration Guide HASP HL to Sentinel LDK All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and
More informationQualifications for Authorized Inspection
ASME QAI-1 2016 (Revision of ASME QAI-1 2010) Qualifications for Authorized Inspection ASME QAI-1 2016 (Revision of ASME QAI-1 2010) Qualifications for Authorized Inspection Two Park Avenue New York, NY
More informationST. JOSEPH COUNTY, INDIANA REQUEST FOR PROPOSALS ST. JOSEPH COUNTY ELECTION BOARD ELECTRONIC POLL-BOOKS. RELEASED January 19, 2016
ST. JOSEPH COUNTY, INDIANA REQUEST FOR PROPOSALS ST. JOSEPH COUNTY ELECTION BOARD ELECTRONIC POLL-BOOKS RELEASED January 19, 2016 PROPOSALS DUE February 2, 2016 ST. JOSEPH COUNTY, INDIANA REQUEST FOR PROPOSALS
More informationCybersecurity United States National Security Strategy President Barack Obama
Cybersecurity As the birthplace of the Internet, the United States has a special responsibility to lead a networked world. Prosperity and security increasingly depend on an open, interoperable, secure,
More informationSecond Line of Defense Program
Preprint UCRL-JC-135067 Second Line of Defense Program L. Cantuti, L. Thomas This article was submitted to The Institute of Nuclear Materials Management Phoenix, AZ, July 26-29, 1999 July 15, 1999 U.S.
More informationResearch Proposal Major William Torn Tompkins ISR RTF Vigilant Horizons. Working Title
Working Title Multi-Domain Command and Control of ISR: Ensuring support to Unit Level Intelligence DISCLAIMER The views expressed in this academic research paper are those of the author and do not reflect
More informationNational Security and the Accelerating Risk of Climate Change
National Security and the Accelerating Risk of Climate Change American Association for the Advancement of Science 13 February 2015 Vice Admiral Lee Gunn, USN (Ret.) Vice Chair CNA Military Advisory Board
More informationCYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy
CYBER SECURITY PROTECTION Section III of the DOD Cyber Strategy Overview Build and maintain ready forces and capabilities to conduct cyberspace operations Defend the DOD information network, secure DOD
More information17 th ITEA Engineering Workshop: System-of-Systems in a 3rd Offset Environment: Way Forward
17 th ITEA Engineering Workshop: System-of-Systems in a 3rd Offset Environment: Way Forward Mr. Paul D. Mann (Acting) Principal Deputy Director Test Resource Management Center January 26, 2017 1 2 TRMC
More informationAccommodation and Compliance Series. Personal Assistance Services (PAS) in the Workplace
Accommodation and Compliance Series Personal Assistance Services (PAS) in the Workplace Preface The Job Accommodation Network (JAN) is a service of the Office of Disability Employment Policy of the U.S.
More informationTerms of Submission In order to participate, you must be at least eighteen (18) years old.
Terms of Submission NBCUniversal Media, LLC company ( NBCU ) located at 30 Rockefeller Plaza, New York, NY 10112, invites you to join in on the fun with The Tonight Show Starring Jimmy Fallon (the Show
More informationNew Ways of Working - How Cross-Boundary Collaboration is Transforming Business
New Ways of Working - How Cross-Boundary Collaboration is Transforming Business We work differently on a smarter planet We work from anywhere Your closest collaborators may be scattered around the globe
More informationWhen you work with Walker Modular, you get a lot more than a bathroom in a box.
When you work with Walker Modular, you get a lot more than a bathroom in a box. Five star style Our unrivalled knowledge, experience and state of the art facilities make Walker Modular the leading bathroom
More informationDoD Joint Federated Assurance Center (JFAC) 2017 Update
DoD Joint Federated Assurance Center (JFAC) 2017 Update Thomas Hurt Office of the Deputy Assistant Secretary of Defense for Systems Engineering 20th Annual NDIA Systems Engineering Conference Springfield,
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5230.24 March 18, 1987 USD(A) SUBJECT: Distribution Statements on Technical Documents References: (a) DoD Directive 5230.24, subject as above, November 20, 1984 (hereby
More informationCoast Guard Cyber Command. Driving Mission Execution CAPT John Felker Deputy Commander, CGCYBERCOM August 2011
Coast Guard Command Driving Mission Execution CAPT John Felker Deputy Commander, CGCYBERCOM August 2011 CGCYBERCOM Mission / Vision The mission of the United States Coast Guard Command (CGCYBERCOM) is
More information3 rd Annual Electromagnetic Spectrum Operations Summit
Defense Strategies Institute professional educational forum: 3 rd Annual Electromagnetic Spectrum Operations Summit ~ Delivering EW and Cyber Capabilities for Multi-Domain Operations ~ June 20-21, 2017
More informationEmergency Procedures at the Workplace
Slide 1 Emergency Procedures at the Workplace Practicum in Human Services Page1 Slide 2 Copyright Copyright Texas Education Agency, 2015. These Materials are copyrighted and trademarked as the property
More informationIntroduction to Homeland Security. The Intelligence Community (IC) Director of National Intelligence (DNI) National Intelligence Coord.
Introduction to Homeland Security Chapter 5 Safety & Security: The Intelligence Community The Intelligence Community (IC) Director of National Intelligence (DNI) DDNI National Intelligence Coord. Center
More informationCOTS Selection and Adoption in a Small Business Environment. How Do You Downsize the Process?
Pittsburgh, PA 15213-3890 COTS Selection and Adoption in a Small Business Environment How Do You Downsize the Process? Bill Anderson, MTS, SEI Sponsored by the U.S. Department of Defense 2003 by Carnegie
More informationDIUx Quarterly Results Q Silicon Valley Boston Austin Washington D.C.
DIUx Quarterly Results Q4 2017 Silicon Valley Boston Austin Washington D.C. DIUx Quarterly Results Q4 2017 October 17, 2017, Mountain View, CA: In the 17 months since its relaunch in May 2016, Defense
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5210.88 February 11, 2004 USD(I) SUBJECT: Safeguarding Biological Select Agents and Toxins References: (a) Directive-Type Memorandum, "Safeguarding Biological Select
More informationSupplement 2 Department of Defense FAR Supplement (DFARS) Government Contract Provisions
General Terms and Conditions of Purchase Supplement 2 Department of Defense FAR Supplement (DFARS) Government Contract Provisions 1. When the products or services furnished are for use in connection with
More informationDM Quality Consulting, LLC
DM Quality Consulting, LLC Providing an honest, compliant, quality service Medicare Provider Enrollment Paper Applications Physicians, non-physician practitioners, suppliers, hospitals and clinics must
More informationTalk IN THIS EDITION. Fall 2017
August 2017 IN THIS EDITION Life: World Tour Advanced Threat Protection (ATP) Xfinity Cable and Streaming Lineup Multipass Enabled Computer Labs Duquesne Partners With EduRoam And More! Fall 2017 The Newsletter
More informationDEPARTMENT OF DEFENSE STANDARD PRACTICE
NOT MEASUREMENT SENSITIVE 21 April 2003 SUPERSEDING MIL-STD-1647D 04 October 1993 DEPARTMENT OF DEFENSE STANDARD PRACTICE IDENTIFICATION MARKINGS FOR DOMESTICALLY MANUFACTURED BEARINGS, BALL, ANNULAR FOR
More informationSometimes different words, appropriate at different levels, all say
Who s in Charge? Commander, Air Force Forces or Air Force Commander? Lt Col Brian W. McLean, USAF, Retired I ve got the stick. I ve got the conn. Sir, I accept command. Sometimes different words, appropriate
More informationCOMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE COMMANDER OF THE 51ST FIGHTER WING 51ST FIGHTER WING INSTRUCTION 90-103 25 APRIL 2013 Certified Current 07 August 2017 Special Management OSAN PATRIOT EXCALIBUR (PEX) COMPLIANCE WITH THIS
More informationMCPON visits NAWCTSD Orlando seeking innovative ideas
150114-N-OT964-111 ORLANDO, Fla. (Jan. 14, 2015) Master Chief Petty Officer of the Navy (MCPON) Mike Stevens speaks with members at Naval Air Warfare Center Training Systems Division aboard Naval Support
More informationMEMBERSHIP AGREEMENT FOR THE ANALYTIC TECHNOLOGY INDUSTRY ROUNDTABLE
MEMBERSHIP AGREEMENT FOR THE ANALYTIC TECHNOLOGY INDUSTRY ROUNDTABLE This (hereinafter referred to as the Agreement ) is entered by and among Members (as defined below). Each respective Member is bound
More informationThe Only Government-wide Forum for Technology Transfer
Trademarks and Technology Licensing What You Need to Know The Only Government-wide Forum for Technology Transfer William S. Gardiner Office of the Assistant Secretary of Defense (PA) (703) 738-2518 gardinerb@stripes.osd.mil
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5240.16 August 27, 2012 USD(I) SUBJECT: Counterintelligence Functional Services (CIFS) References: See Enclosure 1 1. PURPOSE. In accordance with the authority
More informationWARFIGHTER MODELING, SIMULATION, ANALYSIS AND INTEGRATION SUPPORT (WMSA&IS)
EXCERPT FROM CONTRACTS W9113M-10-D-0002 and W9113M-10-D-0003: C-1. PERFORMANCE WORK STATEMENT SW-SMDC-08-08. 1.0 INTRODUCTION 1.1 BACKGROUND WARFIGHTER MODELING, SIMULATION, ANALYSIS AND INTEGRATION SUPPORT
More informationThe best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen,
The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, Marines, and Civilians who serve each day and are either involved in war, preparing for war, or executing
More informationImprov DARPA-BAA Frequently Asked Questions (FAQs) as of 4/6/16
Improv DARPA-BAA-16-22 Frequently Asked Questions (FAQs) as of 4/6/16 The Improv Broad Agency Announcement (BAA) may be found on the Federal Business Opportunities (FBO) website at https://www.fbo.gov/spg/oda/darpa/cmo/darpa-baa-
More informationUpdate on SwAF replacement of Air Surveillance, Air Defence Sensors and ground based naval sensors
Update on SwAF replacement of Air Surveillance, Air Defence Sensors and ground based naval sensors LtCol (AF) Martin Bergstrand Head of sensor branch at the HQ C 4 I Department Scope Principles Where we
More informationPersonal Electronic Devices Acceptable Use Policy
Personal Electronic Devices Acceptable Use Policy Version 1.0 Purpose: For use by: This document is compliant with /supports compliance with: This document supersedes: Approved by: To advise Trust staff
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE. FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018
Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Office of Secretary Of Defense DATE: April 2013 COST ($ in Millions) Years FY 2012 FY 2013 # PE 0607210D8Z: Industrial Analysis and Support ## FY 2015
More informationPresentation Notes Serving Those Who Serve
Slide 1 There are men and women in our country that on any given day are willing to serve our country by protecting each United States citizen whether they know them or not. Slide 2 Copyright Texas Education
More informationDEPARTMENT OF DEFENSE Defense Contract Management Agency HANDBOOK. Lead Platform Command
DEPARTMENT OF DEFENSE Defense Contract Management Agency HANDBOOK Lead Platform Command Engineering and Analysis Directorate DCMA-HBK 205-01 OPR: DCMA-EAPI 1. PURPOSE. This Handbook: a. Supplements DCMA-Instruction
More informationEmploy Florida Marketplace Terms and Conditions Governing your access and use of the Employ Florida Marketplace (EFM)
Attachment 1 Employ Florida Marketplace Terms and Conditions Governing your access and use of the Employ Florida Marketplace (EFM) Introduction: Please read the following information carefully. It contains
More informationPublic Safety News Montgomery County Department of Public Safety
Public Safety News Department of Public Safety SEPT. 13, 2017 VOLUME 16, NUMBER 9 Department of Public Safety 610-631-6500 Thomas Sullivan Director John Corcoran Deputy Director, Public Affairs Public
More informationThe Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects
The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects Power Projection through Cyberspace Capt Jason M. Gargan, USAF Disclaimer: The views and opinions expressed or
More informationCOMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE COMMANDER FAIRCHILD AIR FORCE BASE FAIRCHILD AIR FORCE BASE INSTRUCTION 33-114 18 FEBRUARY 2014 Communication and Information SOFTWARE LICENSE MANAGEMENT PROGRAM COMPLIANCE WITH THIS PUBLICATION
More informationWICareerPathways Website
WICareerPathways Website Career Explorer Training Guide March 2016 WI Career Pathways is a creation of Wisconsin s Technical Colleges and maintained by Fox Valley Technical College. WI Career Pathways
More informationCOMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 41-103 22 SEPTEMBER 2014 Health Services MEDICAL VISUAL INFORMATION SERVICES COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY:
More informationM-COR Modular Hip System Surgical Technique Chart
M-COR Modular Hip System Surgical Technique Chart t h e f r e e d o m o f a n a c t i v e l i f e s t y l e M-Cor Modular Hip System Device Dimension Rationale MODULAR NECK DIMENSIONS LARGE MODULAR NECK
More informationA Tivoli Field Guide Maximo for the Nuclear Power Industry Duty Stations (Nuc) Release 7.51
A Tivoli Field Guide Maximo for the Nuclear Power Industry Duty Stations (Nuc) Release 7.51 By Jean Bellefeuille Version 1.0 Copyright Notice Copyright IBM Corporation 2009. All rights reserved. May only
More informationSystem Security Engineering for Safer Systems
System Security Engineering for Safer Systems John Maziarz, CSEP-Acquisition Gary Dockall, CSEP Copyright 2017 by John A. Maziarz and Gary Dockall. Published and used by INCOSE with permission. Disclaimer
More informationBoeing in Washington 2016 Impact
Boeing in Washington 2016 Impact www.boeing.com/washington Largest private employer in Washington MILLION Giving to Washington organizations by Boeing, its employees and retirees MILLION 2016 grants supporting
More informationSuccessful disease management requires technology that can measure progress, show gaps
Successful disease management requires technology that can measure progress, show gaps The days of health insurance payers relying on fee-for-service models to pay for healthcare services are rapidly fading.
More informationThe State of US Voting System Security DEFCON Voting Machine Hacking Village July 2017
The State of US Voting System Security DEFCON Voting Machine Hacking Village July 2017 Joshua M Franklin National Institute of Standards and Technology Election Fraud Types - 1934 Registration fraud Repeating
More informationDEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 5510.165A DNS OPNAV INSTRUCTION 5510.165A From: Chief of Naval Operations Subj: NAVY
More informationProposal for the Suicide Bomb Detector Model # RDS400
Proposal for the Suicide Bomb Detector Model # RDS400 Presented From: HSS Development 75 S. Broadway White Plains, NY 10601 USA Office: +1-914-304-4333 Web: www.secintel.com info@secintel.com (Email) 2017
More informationUS Economic Indicators: Industrial Production & Capacity Utilization
US Economic Indicators: Industrial Production & Capacity Utilization August 1, 218 Dr. Edward Yardeni 16-972-7683 eyardeni@ Debbie Johnson 4-664-1333 djohnson@ Mali Quintana 4-664-1333 aquintana@ Please
More informationLessons in Health IT. John Paganini, MBA, CPHIMS, CIIP Sr. Manager Interoperability Initiatives
Lessons in Health IT John Paganini, MBA, CPHIMS, CIIP Sr. Manager Interoperability Initiatives HIMSS Innovation Center Health Care Initiatives Emerging Technologies HIMSS s Strength in Innovation 52 years
More informationGAO TACTICAL AIRCRAFT. Comparison of F-22A and Legacy Fighter Modernization Programs
GAO United States Government Accountability Office Report to the Subcommittee on Defense, Committee on Appropriations, U.S. Senate April 2012 TACTICAL AIRCRAFT Comparison of F-22A and Legacy Fighter Modernization
More informationImportant: Please read these rules before entering this contest (the "Contest").
Photo Contest Rules June 6, 2014 Fishful Thinker LLC PHOTO CONTEST OFFICIAL RULES Important: Please read these rules before entering this contest (the "Contest"). By participating in this Contest, you
More informationProtecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information
Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Mr. Brian D. Hughes Office of the Deputy Assistant Secretary of Defense for
More informationDEPARTMENT OF DEFENSE (DFAR) GOVERNMENT CONTRACT PROVISIONS
PAGE 1 OF 6 INCORPORATION OF FAR CLAUSES The following terms and conditions apply for purchase orders, subcontracts, or other applicable agreements issued in support of a US Government Department of Defense
More informationTHE NAVY RESERVE. We cannot be the Navy we are today without our Reserve component. History of the Navy Reserve
CHAPTER SIXTEEN THE NAVY RESERVE A strong Naval Reserve is essential, because it means a strong Navy. The Naval Reserve is our trained civilian navy, ready, able, and willing to defend our country and
More informationAir Armament Symposium. 5 October 2011 Col Tim Morris, USAF Director of Development F-35 Lightning II Program
Air Armament Symposium 5 October 2011 Col Tim Morris, USAF Director of Development F-35 Lightning II Program FOR OFFICIAL USE DISTRIBUTION ONLY // REL TO USA, STATEMENT GBR MOD, A. ITA Approved MOD, NLD
More informationUNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 7 R-1 Line #198
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Air Force : February 2015 3600: Research, Development, Test & Evaluation, Air Force / BA 7: Operational Systems Development COST ($ in Millions) FY
More informationUNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #199
COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Cost To Complete Total Program Element - 0.343 0.195 0.498-0.498 0.475 0.412 0.421
More informationNational IP Awards- 2018
National IP Awards- 2018 Application Form Last date of submission of Hard Copy: 28.02.2018 Last date of submission of Soft Copy: 28.02.2018 S. Category of IP Award Forms No. 1 Top Individual for Patents
More information