Information Systems Office Dr. W. M. Mularie Director, Information Systems Office 703-696-7438 wmularie@darpa.mil
Information Systems Prosthetic Challenge: Overcome Human Limitations 10 Speed 10 Complexity Autonomic Human 2
ISO Program Areas Information Assurance & Survivability Command & Control Technology Base Asymmetric Threat 3
ISO Program Areas Information Assurance Autonomic Information Assurance IA Science and Engineering Tools Information Assurance & Survivability Intrusion Tolerant Systems Strategic Intrusion Assessment Cyber Command & Control BADD UltraLog Advanced Logistics ACTDs- Joint Logistics & Joint Theater Logistics JFACC Dynamic C2 Command Post of the Future Active Templates Command & Control Rapid Knowledge Formation DAML Technology Base DASADA TASK Control of Agent Based Systems Asymmetric Threat Evidence Extraction & Link Discovery Project Genoa Wargaming the Asymmetric Environment Human ID at a Distance 4
ISO Program Areas Information Assurance & Survivability Unconventional yet Command & Control Technology Base Asymmetric Threat highly lethal attack by a loosely organized group of transnational terrorists 5
I conceded that more intelligence about their war-making capabilities was a necessity. - President Dwight D. Eisenhower Post - Attack Preparation The Nuclear Threat A Historical Perspective Need to Know Sooner 1950 1955 1960 Yurya ICBM Complex of a SS-7 Launch Site (Mission 9038, June 28, 1962) 6
The Asymmetric Threat Today s Perspective Post - Attack Preparation Preemptive: Need to Know Sooner 2000 as as ModelaS Based Agents as Behavior & Intent Models Open Source Evidence Extraction & Link Discovery Target Selection? Nairobi Embassy Explosive Materials Owhali surveyed Fazil alias-of access? Fazul Human Identification 7 bin Laden member member Al Aqueda member Hage
Asymmetric Threat A Surveillance Problem 10 Needle in the haystack ❽ Find the parts of the needle Search Extraction & Link Discovery Threat Description Events Cues New Features 10 10 10 10 10 Sensors Web pages Individual sightings (e.g. HID) News feeds Online databases Other Intel Sensor Data Track Multiple Futures Prediction Histories Classify Interpretation Known Threats New Behaviors Forensic Studies Analysts 8 Autonomic Threats Human
Asymmetric Threat Programs Human ID at a Distance Search Extraction & Link Discovery Evidence Extraction & Link Discovery Events Sensors Sensor Data Track Multiple Futures Prediction 9 Project Genoa Classify Interpretation Wargaming the Asymmetric Environment
ISO Program Areas Command & Control Information Assurance & Survivability Technology Base Asymmetric Threat Mitigate national and defense computing infrastructure vulnerabilities that could be exploited by information warfare enemies 10
IA&S Community Policy National Security Telecommunications and Information Systems Security Committee President s Commission on Critical Infrastructure Protection Computer System Security and Privacy Advisory Board Information Assurance Outreach Program Forensics & Ops Services Infosec FEDERAL BUREAU OF INVESTIGATION NATIONAL COMPUTER CRIME SQUAD Defense Security Service NIPC Research NSF 11
Information Assurance & Survivability Problem Space The Problem: 10 Our current DOD information security strategy is failing to keep pace with the current threats. 10 We anticipate that future threats will be more sophisticated and widespread. 12
IA&S Responses 10 Change the business model ❽ Operationally focused, system oriented ❽ Transfer technology directly to DoD systems ❽ Let commercial systems catch up to military-level security 10 A broadening of our view of solution space ❽ Host-based/software approach ❽ Include communications and computer architectural engineering 10 A broadening of operational focus ❽ Wireless, mobile ❽ Operational challenge problems 13
FY01 IA&S Themes 10 DoD System Focus 10 Operational Experimentation 10 Security in Mobile, Wireless Domain 10 Impact Upon Command and Control 10 Next-Generation Secure Systems 14
ISO Program Areas Information Assurance & Survivability Tech Base Command & Control Asymmetric Threat 15
Tech Base: Supporting ISO, Commercial & DoD Systems Rapid Knowledge Formation DASADA 10 Agents 10 Run time integration of heterogeneous systems 10 Reinforcement learning 10 Hybrid nonlinear dynamic control 10 Mobile agents 10 Neural nets 10 Scalability 10 Interoperability 10 Agent clusters and interactions 10 Knowledge bases 10 System science 10 Dynamic assembly of software 16
Knowledge-Based Information Retrieval Which country has the greater gross domestic product: Saudi Arabia or Iran? 17 Altavista: 1M responses, first 10 (at least) irrelevant START (An HPKB Technology): Retrieved just the right information
CoABS Grid: Multi-Agent System Interoperability C2 Grid Networked Shooters KQML ANS Ariadne RMI Ariadne Teamcore Client Sensor Grid Engagement Grid RETSINA MatchMaker Grid RETSINA Proxy Agent Grid Agent Helper WTA WebTrader Grid Proxy Web Trader Grid Service Helper RMI Ariadne Teamcore Server Grid Proxy Ariadne Teamcore Agent Grid Agent Helper OAA Facilitator Grid OAA Proxy Agent Grid Agent Helper Networked Sensors Agents roam warfare grids Registry -White pages -Jini Lookup Service Grid Agent Helper CMU Logging Grid Agent Helper AAA Facilitator Match maker Logging -XML-based Java Platform -Supports visualization Java Platform Grid Agent Helper OAA RETSINA Interoperability Agent Visualization -status -interaction Grid Agent Helper TEAMCORE Agent Resource Manager 18 Navy Experiment: Cooperative Agents for Specific Tasks (CAST) 10 Facilitates interoperability of diverse systems ❽ Enables dynamic connection of disparate information sources and C2 applications ❽ Enables software systems to cooperatively solve user tasks 10 Grid Agent Helper and the Grid Service Helper facilitate CoABS component access to Grid services and to other registered Grid components
Cognitive Agent Architecture Capturing the human cognitive process Allocator ALP Data Management Domain Modules (Plug-Ins) Basic Building Block Agent Cluster Expander Assessor Live Sensor Data Outgoing Directives User Interactions Incoming Directives Outgoing Directives Click to add sub-title Penalties & Exceptions Click to add sub-title Click to add sub-title Click to add sub-title First Large-Scale Distributed Agent- Based Architecture Complex Agent Society Click to add sub-title Agent Community 19
ISO Program Areas Information Assurance & Survivability Command & Control Technology Base Asymmetric Threat 20
Current Command & Control Limitations Limitations Today 10 Operator reaction limited 10 Feedback loop is not coordinated 10 Unsynchronized ❿ Things start to break 10 OODA loop broken e.g., Kosovo Battle Damage Assessment Operator Battlespace The Future 10 Autonomic systems 10 Higher op tempo 10 Synchronized ops 10 Human becomes more of a limitation 21
Dynamic Control Concept Man & Machines Objective u = kxˆ + r Controller Optimal C2 Better Info Decision Aids The Commander is an actuator Commander/ Operator (Limiting case is A=1 for autonomic) Better Decisions Courses of Action x = Ax + Bu + Gw Plant Battlespace Embedded Hierarchy Better Performance xˆ = Better status knowledge Axˆ + Bu + L( y Cxˆ) State Estimation y = Cx +η Sensors Measured status Canonical Structure Synchronization of manned & autonomic forces in space, time, and purpose can be achieved through the application and extension of control theory 22
Command & Control Programs Total Air Combat Power 7.4 6.5 Current Situation 4.5 Intel estimate: Reinforced 3rd RED Mech massing for likely imminent attack west toward FT. IRWIN from BAKER SALIENT. Active Templates 2.54 1.5 4.6 Command Post of the Future Objective Controller Optimal C2 Plant Commander/ Operator State Estimation Advanced Logistics Project Ultra Log Battlespace Sensors Man & Machine Command & Control 23 LTRA*LOG OG ULTRA* Joint Logistics & Joint Theater Logistics ACTDs
Information Systems Office Today s Speakers Command & Control Information Assurance & Survivability Technology Base Asymmetric Threat Information Assurance & Survivability Brian Witten Command & Control Todd Carrico - Ultra Log Technology Base John Salasin - DASADA Jim Hendler - Agents Asymmetric Threat Tom Armour 24