Information Systems Office

Similar documents
Joint Improvised-Threat Defeat Organization - Mission -

UNCLASSIFIED UNCLASSIFIED

NORAD and USNORTHCOM Technology Needs Mr. John Knutson J8 Office of S&T

Tactical Technology Office

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release.

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

Department of Defense DIRECTIVE

Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness)

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Requirements Analysis and Maturation. FY 2011 Total Estimate. FY 2011 OCO Estimate

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 7 R-1 Line #9

Multi-vehicle Mission Control System (M2CS) Overview

AFCEA Mission Command Industry Engagement Symposium

17 th ITEA Engineering Workshop: System-of-Systems in a 3rd Offset Environment: Way Forward

Next Generation Chem Bio Battle Management Integrated Information Management System

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

Coast Guard Cyber Command. Driving Mission Execution CAPT John Felker Deputy Commander, CGCYBERCOM August 2011

Air Force Cyber Operations Command

Expeditionary Maneuver Warfare & Combating Terrorism S&T Department

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Navy Information Warfare Pavilion 19 February RADM Matthew Kohler, Naval Information Forces

Expeditionary Maneuver Warfare Department ONR Code 30 Dr. John Pazik Department Head

Future Force Capabilities

From Stove-pipe to Network Centric Leveraging Technology to Present a Unified View

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

Defense Daily Open Architecture Summit EMS Panel

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Common Joint Tactical Information. FY 2011 Total Estimate. FY 2011 OCO Estimate

Iowa Air National Guard Cyber Protection Team. Maj Brian Dutcher Director of Operations, 168th Cyber Operations Squadron

TECHNICAL SUPPORT WORKING GROUP. Perry Pederson Infrastructure Protection Subgroup

WARFIGHTER MODELING, SIMULATION, ANALYSIS AND INTEGRATION SUPPORT (WMSA&IS)

COMMON AVIATION COMMAND AND CONTROL SYSTEM

Federal Bureau of Investigation (FBI)

GOOD MORNING I D LIKE TO UNDERSCORE THREE OF ITS KEY POINTS:

UNCLASSIFIED. COST (in millions) FY02 FY03 FY04 FY05 FY06 FY07 FY08 FY09

Annual Automated ISR and Battle Management Symposium

UNCLASSIFIED

Science and Technology Conference for Chem-Bio Information Systems

24th Air Force/ AFCYBER Delivering Outcomes through Cyberspace

UNCLASSIFIED. FY 2017 Base FY 2017 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Dynamic Training Environments of the Future

aselsan EW SPECTRUM MANAGEMENT

Air Armament Symposium All in Today Shaping Tomorrow

AFRL Biographies Mr. Steven Drager AFRL/RIT Mr. Robert Ehret AFRL/RYT Mr. Dan Fayette AFRL/RIS

Training and Evaluation Outline Report

Air Force Institute of Technology

Power Projection: - Where We Were - Where We Are - Where We Need To Be

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

Single Integrated Ground Picture

AMRDEC. Core Technical Competencies (CTC)

Predictive Battlespace Awareness: Linking Intelligence, Surveillance and Reconnaissance Operations to Effects Based Operations

Conducting. Joint, Inter-Organizational and Multi-National (JIM) Training, Testing, Experimentation. in a. Distributive Environment

U.S. Army Training and Doctrine Command (TRADOC) Analysis Center (TRAC)

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE A: Military Engineering Advanced Technology

UNCLASSIFIED. UNCLASSIFIED Navy Page 1 of 7 R-1 Line #16

UNCLASSIFIED R-1 ITEM NOMENCLATURE

NORAD and USNORTHCOM J8 Science & Technology

Admiral Harold W. Gehman, Jr. Supreme Allied Commander, Atlantic Commander in Chief, U.S. Atlantic Command

Reconsidering military ICT security A risk-based approach to modernisation and information superiority for GCC armed forces

Joint Staff J7 / Deputy Director for Joint Training

AUSA BACKGROUND BRIEF

UNCLASSIFIED R-1 ITEM NOMENCLATURE

Department of Defense DIRECTIVE. SUBJECT: Electronic Warfare (EW) and Command and Control Warfare (C2W) Countermeasures

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit)

05/14/2003. Science Committee, U.S. House of Representatives. Statement by Dr. Tony Tether

Comprehensive 360 Situational Awareness for the Crew Served Weapons Leader

UNCLASSIFIED R-1 ITEM NOMENCLATURE. FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018

Intelligence Support for Military Operations Using

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

R-2 Exhibit RDT&E Budget Item Justification DATE FEBRUARY 1999 APPROPRIATION/BUDGET ACTIVITY RDT&E,DW/BA7

Naval Unmanned Combat Air Vehicle

Data Collection & Field Exercises: Lessons from History. John McCarthy

FORCE XXI BATTLE COMMAND, BRIGADE AND BELOW (FBCB2)

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit)

Training and Evaluation Outline Report

Department of Defense Cyber Workforce Initiatives. April 2017

UNCLASSIFIED UNCLASSIFIED

Marine Corps Warfighting Laboratory

N857 NAVY EXPEDITIONARY COMBAT BRANCH

Army Vision - Force 2025 White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release.

UNCLASSIFIED. R-1 Program Element (Number/Name) PE BB / SOF Visual Augmentation, Lasers and Sensor Systems. Prior Years FY 2013 FY 2014 FY 2015

RDT&E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit) MAY 2009 APPROPRIATION / BUDGET ACTIVITY RDT&E, DEFENSE-WIDE / 7

UAV s And Homeland Defense Now More Critical Than Ever. LCDR Troy Beshears UAV Platform Manager United States Coast Guard

WHICH KIND OF STEM PIONEER ARE YOU?

This block in the Interactive DA Framework is all about joint concepts. The primary reference document for joint operations concepts (or JOpsC) in

UNCLASSIFIED. Unclassified

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Central Test and Evaluation Investment Program (CTEIP) FY 2013 OCO

SMART ENERGY DISTRIBUTION SYSTEMS

Net-Enabled Mission Command (NeMC) & Network Integration LandWarNet / LandISRNet

Defense Transformation

United States General Accounting Office. DISTRIBUTION STATEMENT A Approved for Public Release Distribution Unlimited GAP

navy strategy For AChIevIng InFormAtIon dominance navy strategy For AChIevIng InFormAtIon dominance Foreword

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

Rapid Innovation Fund (RIF) Program

Assessing Technologies using Campaign Analysis and War Gaming: The Warfare Innovation Continuum at NPS

Network Centric Operations Urban Warfare

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit)

Transcription:

Information Systems Office Dr. W. M. Mularie Director, Information Systems Office 703-696-7438 wmularie@darpa.mil

Information Systems Prosthetic Challenge: Overcome Human Limitations 10 Speed 10 Complexity Autonomic Human 2

ISO Program Areas Information Assurance & Survivability Command & Control Technology Base Asymmetric Threat 3

ISO Program Areas Information Assurance Autonomic Information Assurance IA Science and Engineering Tools Information Assurance & Survivability Intrusion Tolerant Systems Strategic Intrusion Assessment Cyber Command & Control BADD UltraLog Advanced Logistics ACTDs- Joint Logistics & Joint Theater Logistics JFACC Dynamic C2 Command Post of the Future Active Templates Command & Control Rapid Knowledge Formation DAML Technology Base DASADA TASK Control of Agent Based Systems Asymmetric Threat Evidence Extraction & Link Discovery Project Genoa Wargaming the Asymmetric Environment Human ID at a Distance 4

ISO Program Areas Information Assurance & Survivability Unconventional yet Command & Control Technology Base Asymmetric Threat highly lethal attack by a loosely organized group of transnational terrorists 5

I conceded that more intelligence about their war-making capabilities was a necessity. - President Dwight D. Eisenhower Post - Attack Preparation The Nuclear Threat A Historical Perspective Need to Know Sooner 1950 1955 1960 Yurya ICBM Complex of a SS-7 Launch Site (Mission 9038, June 28, 1962) 6

The Asymmetric Threat Today s Perspective Post - Attack Preparation Preemptive: Need to Know Sooner 2000 as as ModelaS Based Agents as Behavior & Intent Models Open Source Evidence Extraction & Link Discovery Target Selection? Nairobi Embassy Explosive Materials Owhali surveyed Fazil alias-of access? Fazul Human Identification 7 bin Laden member member Al Aqueda member Hage

Asymmetric Threat A Surveillance Problem 10 Needle in the haystack ❽ Find the parts of the needle Search Extraction & Link Discovery Threat Description Events Cues New Features 10 10 10 10 10 Sensors Web pages Individual sightings (e.g. HID) News feeds Online databases Other Intel Sensor Data Track Multiple Futures Prediction Histories Classify Interpretation Known Threats New Behaviors Forensic Studies Analysts 8 Autonomic Threats Human

Asymmetric Threat Programs Human ID at a Distance Search Extraction & Link Discovery Evidence Extraction & Link Discovery Events Sensors Sensor Data Track Multiple Futures Prediction 9 Project Genoa Classify Interpretation Wargaming the Asymmetric Environment

ISO Program Areas Command & Control Information Assurance & Survivability Technology Base Asymmetric Threat Mitigate national and defense computing infrastructure vulnerabilities that could be exploited by information warfare enemies 10

IA&S Community Policy National Security Telecommunications and Information Systems Security Committee President s Commission on Critical Infrastructure Protection Computer System Security and Privacy Advisory Board Information Assurance Outreach Program Forensics & Ops Services Infosec FEDERAL BUREAU OF INVESTIGATION NATIONAL COMPUTER CRIME SQUAD Defense Security Service NIPC Research NSF 11

Information Assurance & Survivability Problem Space The Problem: 10 Our current DOD information security strategy is failing to keep pace with the current threats. 10 We anticipate that future threats will be more sophisticated and widespread. 12

IA&S Responses 10 Change the business model ❽ Operationally focused, system oriented ❽ Transfer technology directly to DoD systems ❽ Let commercial systems catch up to military-level security 10 A broadening of our view of solution space ❽ Host-based/software approach ❽ Include communications and computer architectural engineering 10 A broadening of operational focus ❽ Wireless, mobile ❽ Operational challenge problems 13

FY01 IA&S Themes 10 DoD System Focus 10 Operational Experimentation 10 Security in Mobile, Wireless Domain 10 Impact Upon Command and Control 10 Next-Generation Secure Systems 14

ISO Program Areas Information Assurance & Survivability Tech Base Command & Control Asymmetric Threat 15

Tech Base: Supporting ISO, Commercial & DoD Systems Rapid Knowledge Formation DASADA 10 Agents 10 Run time integration of heterogeneous systems 10 Reinforcement learning 10 Hybrid nonlinear dynamic control 10 Mobile agents 10 Neural nets 10 Scalability 10 Interoperability 10 Agent clusters and interactions 10 Knowledge bases 10 System science 10 Dynamic assembly of software 16

Knowledge-Based Information Retrieval Which country has the greater gross domestic product: Saudi Arabia or Iran? 17 Altavista: 1M responses, first 10 (at least) irrelevant START (An HPKB Technology): Retrieved just the right information

CoABS Grid: Multi-Agent System Interoperability C2 Grid Networked Shooters KQML ANS Ariadne RMI Ariadne Teamcore Client Sensor Grid Engagement Grid RETSINA MatchMaker Grid RETSINA Proxy Agent Grid Agent Helper WTA WebTrader Grid Proxy Web Trader Grid Service Helper RMI Ariadne Teamcore Server Grid Proxy Ariadne Teamcore Agent Grid Agent Helper OAA Facilitator Grid OAA Proxy Agent Grid Agent Helper Networked Sensors Agents roam warfare grids Registry -White pages -Jini Lookup Service Grid Agent Helper CMU Logging Grid Agent Helper AAA Facilitator Match maker Logging -XML-based Java Platform -Supports visualization Java Platform Grid Agent Helper OAA RETSINA Interoperability Agent Visualization -status -interaction Grid Agent Helper TEAMCORE Agent Resource Manager 18 Navy Experiment: Cooperative Agents for Specific Tasks (CAST) 10 Facilitates interoperability of diverse systems ❽ Enables dynamic connection of disparate information sources and C2 applications ❽ Enables software systems to cooperatively solve user tasks 10 Grid Agent Helper and the Grid Service Helper facilitate CoABS component access to Grid services and to other registered Grid components

Cognitive Agent Architecture Capturing the human cognitive process Allocator ALP Data Management Domain Modules (Plug-Ins) Basic Building Block Agent Cluster Expander Assessor Live Sensor Data Outgoing Directives User Interactions Incoming Directives Outgoing Directives Click to add sub-title Penalties & Exceptions Click to add sub-title Click to add sub-title Click to add sub-title First Large-Scale Distributed Agent- Based Architecture Complex Agent Society Click to add sub-title Agent Community 19

ISO Program Areas Information Assurance & Survivability Command & Control Technology Base Asymmetric Threat 20

Current Command & Control Limitations Limitations Today 10 Operator reaction limited 10 Feedback loop is not coordinated 10 Unsynchronized ❿ Things start to break 10 OODA loop broken e.g., Kosovo Battle Damage Assessment Operator Battlespace The Future 10 Autonomic systems 10 Higher op tempo 10 Synchronized ops 10 Human becomes more of a limitation 21

Dynamic Control Concept Man & Machines Objective u = kxˆ + r Controller Optimal C2 Better Info Decision Aids The Commander is an actuator Commander/ Operator (Limiting case is A=1 for autonomic) Better Decisions Courses of Action x = Ax + Bu + Gw Plant Battlespace Embedded Hierarchy Better Performance xˆ = Better status knowledge Axˆ + Bu + L( y Cxˆ) State Estimation y = Cx +η Sensors Measured status Canonical Structure Synchronization of manned & autonomic forces in space, time, and purpose can be achieved through the application and extension of control theory 22

Command & Control Programs Total Air Combat Power 7.4 6.5 Current Situation 4.5 Intel estimate: Reinforced 3rd RED Mech massing for likely imminent attack west toward FT. IRWIN from BAKER SALIENT. Active Templates 2.54 1.5 4.6 Command Post of the Future Objective Controller Optimal C2 Plant Commander/ Operator State Estimation Advanced Logistics Project Ultra Log Battlespace Sensors Man & Machine Command & Control 23 LTRA*LOG OG ULTRA* Joint Logistics & Joint Theater Logistics ACTDs

Information Systems Office Today s Speakers Command & Control Information Assurance & Survivability Technology Base Asymmetric Threat Information Assurance & Survivability Brian Witten Command & Control Todd Carrico - Ultra Log Technology Base John Salasin - DASADA Jim Hendler - Agents Asymmetric Threat Tom Armour 24