FIRST IMPRESSION EXPERIMENT REPORT (FIER)
|
|
|
- Esmond Blair
- 9 years ago
- Views:
Transcription
1 THE MNE7 OBJECTIVE 3.4 CYBER SITUATIONAL AWARENESS LOE FIRST IMPRESSION EXPERIMENT REPORT (FIER) 1. Introduction The Finnish Defence Forces Concept Development & Experimentation Centre (FDF CD&E Centre) organised the MNE 7 Cyber Situational Awareness (SA) Limited Objective Experiment (LOE) in Riihimäki March The Multinational Experimentation 7 (MNE7) campaign consists of several work strands, each dealing with different aspects of the theme Access to the Global Commons. Cyberspace is one of the core study areas. It consists of five objectives each studying different aspects of Situational Awareness (SA) in the Cyber domain. Objective 3.4 (SA enabling technologies) is lead by Finland and supported by contributing nations Austria, Denmark, Germany, Italy, Norway, Switzerland, United Kingdom and United States of America and by NATO ACT. Objective 3.4 has been drafting a Cyber Standard Operating Procedure (SOP) to set a proper framework to study SA technologies in cyberspace. The Aim of this experiment was to support the early phase of the SOP development by discovering solutions and investigating related issues. The next version of to SOP will be available by the end of April 2012 and further refined in a SOP workshop in Denmark 8-10 May. 2. Experiment Overview The LOE was executed virtually alongside a technical Cyber Defence Exercise (CDX) which was lead by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Estonia but distributed to several nations. The CDX was focused on training; Cyber specialists were to work in a virtual environment, where nine Blue teams defended their partially prebuilt computer systems against Red team attacks. The participants originated from both CDX contributing countries and MNE 7 nations. The MNE experiment design had the CDX providing a rich activity environment with adequate and suitable information feeds to support the requirements of the MNE Cyber experiment to study Situational Awareness. A schematic of the experiment design incorporating the CDX information feeds is shown below.
2 Report Documentation Page Form Approved OMB No Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 08 JUL REPORT TYPE N/A 3. DATES COVERED 4. TITLE AND SUBTITLE THE MNE7 OBJECTIVE 3.4 CYBER SITUATIONAL AWARENESS LOE FIRST IMPRESSION EXPERIMENT REPORT (FIER) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) JOINT STAFF-MN//ACT Integration 116 Lakeview Parkway Suffolk, VA PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release, distribution unlimited. 13. SUPPLEMENTARY NOTES The original document contains color images. 11. SPONSOR/MONITOR S REPORT NUMBER(S) 14. ABSTRACT The Multinational Experimentation 7 (MNE7) campaign consists of several work strands, each dealing with different aspects of the theme "Access to the Global Commons". Cyberspace is one of the core study areas. It consists of five objectives each studying different aspects of Situational Awareness (SA) in the Cyber domain. Objective 3.4 (SA enabling technologies) is lead by Finland and supported by contributing nations Austria, Denmark, Germany, Italy, Norway, Switzerland, United Kingdom and United States of America and by NATO ACT. Objective 3.4 has been drafting a Cyber Standard Operating Procedure (SOP) to set a proper framework to study SA technologies in cyberspace. The Aim of this experiment was to support the early phase of the SOP development by discovering solutions and investigating related issues. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified 18. NUMBER OF PAGES 6 19a. NAME OF RESPONSIBLE PERSON Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18
3 LOE participants were divided into two organisational functions each with a different SA purpose; an Awareness cell and an Inform cell. These cells would address the different working time spans within a fictitious Cyber Centre current and future. The cells were further divided into smaller functions (roles) as follows. Awareness cell (collects, combines, visualizes, and comprehends). Role A-1 Understand Us (Our services, operations and business, white team reports) Role A-2 Collect (reports, pulling from logs, blue team reporting) Role A-3 Analyse (categorize, combine, situation assessment, impact to us) Role A-4 Visualize, present, share (Information push) Inform Cell (estimates, projects, shares, informs) Role I-1 Understand Them (Intelligence) Role I-2 Estimate and project (Future Impact to us, make recommendations) Role I-3 Visualize, Present, Share, Inform (What can be done, what is expected?) Role I-4 Media perspective (What is needed? What can be offered?) It was not the intention to evaluate the structure being played during the event, rather its structure was intended to catalyse thinking and discussions during the event. A key part of the experiment design would be to ensure that the participants were from appropriate backgrounds to speak with authority and experience. In a traditional experiment the audience would have just played the game in an artificial environment under analysts observation. In this discovery event the audience followed the exercise activities closely (especially Blue team reporting), and at the same time actively contributed to the experimental research objectives through structured discussions and surveys. 3. Experiment Play The experiment audience assessed the situation in the CDX i.e. tried to comprehend the situation and project the (future) impact to the operations and businesses. The main focus was to bridge the gap between the infrastructure level actors and the strategic leaders. The obvious limitation here was that higher echelons (senior leaders in the political and media interface) were not simulated in the experiment. Instead - the challenge was addressed in briefings, orientations, sum-ups and surveys. The execution was paused regularly to discuss, assess, review or survey about any important activity, situation or other topic. This meant that the audience was regularly asked to change their focus (mindset) from the exercise and to start thinking in more generic terms. Four different orientations (as on the agenda below) were used to focus into the most important topics.
4 The intention was that there would be a 50/50 split between real play and informed critique and discussion of the SOP and general concept. As stated previously, this would only work with high calibre participants. The technical set-up was simple for usability reasons. A portal environment to follow Blue team reports and other CDX related information, a chat tool, exercise and one analysis tool (VS_Room) were available within the CDX environment. FacilitatePro was used to gather ideas and insights during the experiment using both structured data gathering (tailored surveys) and unstructured forms. 3. Achievement of Experiment Aim The primary aim of the experiment was to support the SOP development, but also to exploit the opportunity to study MNE 7 related cyber SA issues in CDX. Combining an exercise and an experiment is always a trade-of between training objectives in the exercise and research objectives in the experiment. The exercise provided the experiment with an environment with rich reporting from the Blue teams and adequate number of other cyber activities that catalysed discussions in the Cyber Centre. The most serious limitations from the experiment perspective were twofold: The experiment audience could not interfere with the game (communicate with other teams) and the exercise scenario was simplified to serve the training goals. For example all the Blue teams and their reporting were similar entities (ISPs with equal services). Therefore, the efficiency of different reporting mechanisms could not be observed. Neither were higher echelons (senior leaders) and their business needs adequately present in the scenario. That made the evaluation of executive level reporting more difficult. However, all these issues were well understood and anticipated prior to the event and incorporated into the design accordingly. An experiment is often about evaluating or testing a hypothesis or a solution and it should provide insights for that purpose. Additionally, as an event where new solutions are explored, an experiment should also be about education for the participants and their critical feedback. Based on the exit survey and other responses, the latter goal has been accomplished. The primary goal was to support the SOP development. Based on the SOP development team understanding, that goal has also been achieved. It can be expected that after the thorough analysis of the collected material we ll have much better understanding of the SOP scope, focus and content, which helps us to use the remaining MNE 7 events (2 workshops and the collective experiment for the outcome) more effectively. 4. Assessment of Experiment Execution Based on the exit survey, other responses of the audience and the general feeling, the execution of the experiment was successful. The core idea of using 50% of the time to participate/follow CDX and another 50% of the time to discuss more in generic terms about the SA-challenge between the different layers (actors) in cyberspace, seemed to be a viable approach. However, several ideas to improve such an effort were learned during the experiment. For example the split of the audience energy together with technical issues of the VPN-tunnelling in the beginning, limited the CDX contribution quite dramatically. Actually, during a short 2-day execution, the audience was not really capable of producing useful SA-products in the exercise environment. On the other hand through orchestrated discussions and surveys the ideas and insights beyond the CDX were effectively collected and recorded. From the brainstorming perspective, we might have been better off with smaller audience. The experiment construct with the control cell, two operational cells (Awareness and Inform) and the SOP development cell was understood and accepted by the audience. However because of the limited
5 time to play in the experiment the information flows and interfaces between the two operational functions were not properly investigated. It was seen important to work specifically for the immature SOP development during the experiment. However the SOP cell worked too much in isolation most of the experiment. The FacilitatePro tool was used to collect the ideas, insights and observations from the participants in addition two analysts recorded their observations. Data collection was based on both a standing opportunity to post ideas and comments to a structured discussion forum, and on five surveys conducted after each orientation and after the AAR (After Action Review). The next survey was always revisited based on the audience response and the quality of previous survey answers. After the first survey it became clear that all surveys need to be explained to the audience to get useful answers. The collected material is both quantitatively and qualitatively good. The technical environment and the facilities with known limitations served the experiment well. 20+ preconfigured workstations were used with the possibility to use own laptops. The use of own tools was encouraged, but no actual new tools were introduced by the audience. The only substantial problem rose when the access to the CDX environment (VPN, Virtual Private Network) slowed down dramatically for the first execution day after more users started using the collaborative environment. The network configuration was changed in the evening and the problem was solved. 5. Initial Findings and Preliminary Conclusions The implications from the experiment for the SOP development effort will be assessed over the coming two weeks and reported separately. The experimental setting, notably the constraints imposed through the exploitation of the CDX, meant that the focus for the event was the study of procedural aspects to Situational Awareness development within a Cyber Centre. Also, there was no ongoing play of higher levels above the Cyber Centre. This meant that the focus, naturally, was placed on the lower Operator level inputs to the Cyber Centre and the related and achievable SA aspects. It is recommended that full cycles of activity between all levels are studied in the future. Key findings included the following: Information Timeliness Information timeliness emerged as a key imperative for achieving requisite SA within a Cyber Centre. This included both information processing and information sharing aspects. It is suggested that a more thorough study of such things as information processing loading & tolerances under different operational conditions would be useful. Decision-making It is suggested that decision-making across the organisational architecture should be studied more fully. The link between SA and decision-making was not explored rigorously during the event (this was anticipated from the outset and was a result of the CDX constraints). Socio-Technological Aspects Although an emphasis was, naturally, placed on information processing, many of the issues that arose fell into what could be called softer aspects of tool support; the socio-technological aspects of tool support. So, issues relating to Cyber Centre staff behaviours, competencies & capabilities, incentives & rewards arose as well as aspects like cultural and multinational issues, mandates, success indicators,
6 organisational interdependencies etc. These softer aspects should be considered in the ongoing investigations of Cyber SA and incorporated into the associated Tool requirements and the SOP. Relevance of findings and data to broader Outcome 3 (Cyber SA) aspects The experiment was focused on Objective 3.4 and Cyber SA technologies and tool support. However, much of the findings and data gathered would be of interest and utility for MNE7 peer sub-objectives (such as 3.5 Cyber SA) and, indeed, the Outcome 3 Cyber strand as a whole. It is suggested that the findings and data relating to the structures and functions played during this event (see diagram below) could be exploited directly in the planning for the upcoming Objective 3 integrating experiment. Technology Scope The experiment allowed the team to understand the extent of technological support required or, at the very least, where it might be applicable. The experiment was, quite deliberatley, not a tool or technology heavy event. Still, it became apparent that, for this objective, many practical tools and their capabilities need to be studied. The picture (next page) gives a broad idea of the tool related challenges.
7 6. Annexes Annex A: The Experiment Attendance Roster 7. Points of Contacts Experiment Lead Analyst Lead Auvo Viita-aho Commander Finish Defence Forces CD&E Centre +358 (0) Anne Koskinen-Kannisto Chief of Systems Development Navy Command Finland +358 (0)
Overview Presented by: Boyd L. Summers
Overview Presented by: Boyd L. Summers Systems & Software Technology Conference SSTC May 19 th, 2011 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity
73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation
73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation 21-23 June 2005, at US Military Academy, West Point, NY 712CD For office use only 41205 Please complete this form 712CD as your cover
Report Documentation Page
(c)2002 American Institute Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the
Asset Management- Acquisitions
Indefinite Delivery, Indefinite Quantity (IDIQ) contracts used for these services: al, Activity & Master Plans; Land Use Analysis; Anti- Terrorism, Circulation & Space Management Studies; Encroachment
In June 1998 the Joint Military Intelligence. Intelligence Education for Joint Warfighting A. DENIS CLIFT
Defense Intelligence Analysis Center, home of JMIC. Intelligence Education for Joint Warfighting Courtesy Joint Military Intelligence College By A. DENIS CLIFT In June 1998 the Joint Military Intelligence
Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett
Issue Paper Center for Strategic Leadership, U.S. Army War College May 2003 Volume 04-03 Wargaming Homeland Security and Army Reserve Component Issues By Professor Michael Pasquarett Background The President
EAD Expected Annual Flood Damage Computation
US Army Corps of Engineers Hydrologic Engineering Center Generalized Computer Program EAD Expected Annual Flood Damage Computation User's Manual March 1989 Original: June 1977 Revised: August 1979, February
THE MIMOSA OPEN SOLUTION COLLABORATIVE ENGINEERING AND IT ENVIRONMENTS WORKSHOP
THE MIMOSA OPEN SOLUTION COLLABORATIVE ENGINEERING AND IT ENVIRONMENTS WORKSHOP By Dr. Carl M. Powe, Jr. 2-3 March 2005 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
ELECTRONIC HEALTH RECORDS. Fiscal Year 2013 Expenditure Plan Lacks Key Information Needed to Inform Future Funding Decisions
United States Government Accountability Office Report to Congressional July 2014 ELECTRONIC HEALTH RECORDS Fiscal Year 2013 Expenditure Plan Lacks Key Information Needed to Inform Future Funding Decisions
Headquarters U.S. Air Force
Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e Air Force Technology Readiness Assessment (TRA) Process for Major Defense Acquisition Programs LtCol Ed Masterson Mr
DEFENSE CONTRACT AUDIT AGENCY
DEFENSE CONTRACT AUDIT AGENCY Fundamental Building Blocks for an Acceptable Accounting System Presented by Sue Reynaga DCAA Branch Manager San Diego Branch Office August 24, 2011 Report Documentation Page
Using the Advancement Degree of Difficulty (AD 2 ) as an input to Risk Management
Using the Advancement Degree of Difficulty (AD 2 ) as an input to Risk Management James W. Bilbro JB Consulting International Huntsville, AL Multi-dimensional Assessment of Technology Maturity Technology
DEFENSE BUSINESS PRACTICE IMPLEMENTATION BOARD
Defense Business Practice Implementation Board DEFENSE BUSINESS PRACTICE IMPLEMENTATION BOARD Report to the Senior Executive Council, Department of Defense MANAGEMENT INFORMATION TASK GROUP Report FY02-3
Cancellation of Nongroup Health Insurance Policies
Cancellation of Nongroup Health Insurance Policies Bernadette Fernandez Specialist in Health Care Financing Annie L. Mach Analyst in Health Care Financing November 19, 2013 Congressional Research Service
Advanced Micro Ring Resonator Filter Technology
Advanced Micro Ring Resonator Filter Technology G. Lenz and C. K. Madsen Lucent Technologies, Bell Labs Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
DCAA and the Small Business Innovative Research (SBIR) Program
Defense Contract Audit Agency (DCAA) DCAA and the Small Business Innovative Research (SBIR) Program Judice Smith and Chang Ford DCAA/Financial Liaison Advisors NAVAIR 2010 Small Business Aviation Technology
Guide to Using DoD PKI Certificates in Outlook 2000
Report Number: C4-017R-01 Guide to Using DoD PKI Certificates in Outlook 2000 Security Evaluation Group Author: Margaret Salter Updated: April 6, 2001 Version 1.0 National Security Agency 9800 Savage Rd.
Interagency National Security Knowledge and Skills in the Department of Defense
INSTITUTE FOR DEFENSE ANALYSES Interagency National Security Knowledge and Skills in the Department of Defense June 2014 Approved for public release; distribution is unlimited. IDA Document D-5204 Log:
RT 24 - Architecture, Modeling & Simulation, and Software Design
RT 24 - Architecture, Modeling & Simulation, and Software Design Dennis Barnabe, Department of Defense Michael zur Muehlen & Anne Carrigy, Stevens Institute of Technology Drew Hamilton, Auburn University
2010 2011 Military Health System Conference
2010 2011 Military Health System Conference Population Health Management The Missing Element of PCMH Sharing The Quadruple Knowledge: Aim: Working Achieving Together, Breakthrough Achieving Performance
Cyber Security Training and Awareness Through Game Play
Cyber Security Training and Awareness Through Game Play Benjamin D. Cone, Michael F. Thompson, Cynthia E. Irvine, and Thuy D. Nguyen Naval Postgraduate School, Monterey, CA 93943, USA {bdcone,mfthomps,irvine,tdnguyen}@nps.edu
Pima Community College Planning Grant For Autonomous Intelligent Network of Systems (AINS) Science, Mathematics & Engineering Education Center
Pima Community College Planning Grant For Autonomous Intelligent Network of Systems (AINS) Science, Mathematics & Engineering Education Center Technical Report - Final Award Number N00014-03-1-0844 Mod.
TITLE: The Impact Of Prostate Cancer Treatment-Related Symptoms On Low-Income Latino Couples
AD Award Number: W81WH-07-1-0069 TITLE: The Impact Of Prostate Cancer Treatment-Related Symptoms On Low-Income Latino Couples PRINCIPAL INVESTIGATOR: Sally L. Maliski, Ph.D., R.N. CONTRACTING ORGANIZATION:
Mr. Steve Mayer, PMP, P.E. McClellan Remediation Program Manger Air Force Real Property Agency. May 11, 2011
Mr. Steve Mayer, PMP, P.E. McClellan Remediation Program Manger Air Force Real Property Agency May 11, 2011 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
THE FLATWORLD SIMULATION CONTROL ARCHITECTURE (FSCA): A FRAMEWORK FOR SCALABLE IMMERSIVE VISUALIZATION SYSTEMS
THE FLATWORLD SIMULATION CONTROL ARCHITECTURE (FSCA): A FRAMEWORK FOR SCALABLE IMMERSIVE VISUALIZATION SYSTEMS Anton Treskunov, Jarrell Pair*, and Bill Swartout Institute for Creative Technologies University
AFRL-RX-WP-TP-2008-4023
AFRL-RX-WP-TP-2008-4023 HOW KILLDEER MOUNTAIN MANUFACTURING IS OPTIMIZING AEROSPACE SUPPLY CHAIN VISIBILITY USING RFID (Postprint) Jeanne Duckett Killdeer Mountain Manufacturing, Inc. FEBRUARY 2008 Final
Obsolescence Considerations for Materials in the Lower Sub-Tiers of the Supply Chain
INSTITUTE FOR DEFENSE ANALYSES Obsolescence Considerations for Materials in the Lower Sub-Tiers of the Supply Chain Jay Mandelbaum Christina M. Patterson April 2015 Approved for public release; distribution
John Mathieson US Air Force (WR ALC) Systems & Software Technology Conference Salt Lake City, Utah 19 May 2011
John Mathieson US Air Force (WR ALC) Systems & Software Technology Conference Salt Lake City, Utah 19 May 2011 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the
Simulation of Air Flow Through a Test Chamber
Simulation of Air Flow Through a Test Chamber by Gregory K. Ovrebo ARL-MR- 0680 December 2007 Approved for public release; distribution unlimited. NOTICES Disclaimers The findings in this report are not
CERT Virtual Flow Collection and Analysis
CERT Virtual Flow Collection and Analysis For Training and Simulation George Warnagiris 2011 Carnegie Mellon University Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
A GPS Digital Phased Array Antenna and Receiver
A GPS Digital Phased Array Antenna and Receiver Dr. Alison Brown, Randy Silva; NAVSYS Corporation ABSTRACT NAVSYS High Gain Advanced GPS Receiver (HAGR) uses a digital beam-steering antenna array to enable
IISUP-. NAVAL SUPPLY SVSTE:MS COMMAND. Ready. Resourceful. Responsive!
~ IISUP-. NAVAL SUPPLY SVSTE:MS COMMAND Ready. Resourceful. Responsive! Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated
Software Security Engineering: A Guide for Project Managers
Software Security Engineering: A Guide for Project Managers Gary McGraw Julia H. Allen Nancy Mead Robert J. Ellison Sean Barnum May 2013 ABSTRACT: Software is ubiquitous. Many of the products, services,
Integrated Force Method Solution to Indeterminate Structural Mechanics Problems
NASA/TP 2004-207430 Integrated Force Method Solution to Indeterminate Structural Mechanics Problems Surya N. Patnaik Ohio Aerospace Institute, Brook Park, Ohio Dale A. Hopkins and Gary R. Halford Glenn
An Oil-Free Thrust Foil Bearing Facility Design, Calibration, and Operation
NASA/TM 2005-213568 An Oil-Free Thrust Foil Bearing Facility Design, Calibration, and Operation Steve Bauman Glenn Research Center, Cleveland, Ohio March 2005 The NASA STI Program Office... in Profile
A Limited Objective Experiment on Wireless Peer-To-Peer Collaborative Networking
A Limited Objective Experiment on Wireless Peer-To-Peer Collaborative Networking Dr. Alex Bordetsky LCDR Glenn R. Cook Dr. Bill Kemple LCDR Timothy Thate Naval Postgraduate School Department of Information
Intelligence Community Public Key Infrastructure (IC PKI)
Intelligence Community Public Key Infrastructure (IC PKI) 2002 The MITRE Corporation This technical data was produced for the U.S. Government under contract 99-G000109-000, and is subject to the Rights
I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216
I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216 A Consistent Approach for Security Risk Assessments of Dams and Related Critical Infrastructure J. Darrell Morgeson Jason A. Dechant Yev Kirpichevsky
Non-Autoclave (Prepreg) Manufacturing Technology
Non-Autoclave (Prepreg) Manufacturing Technology Gary G. Bond, John M. Griffith, Gail L. Hahn The Boeing Company Chris Bongiovanni, Jack Boyd Cytec Engineered Materials 9 September 2008 Report Documentation
PREPARED FOR: U.S. Army Medical Research and Materiel CommandFort Detrick, Maryland 21702 5012
AD Award Number: W81XWH 07 1 0542 TITLE: Is Nuclear Structure Altered in Breast Cancer Cells? PRINCIPAL INVESTIGATOR: Han Htun, Ph.D. CONTRACTING ORGANIZATION: University of California Los Angeles, CA
E X A D A T A NEW EXPLOSIVES ACCIDENT DATABASE
E X A D A T A NEW EXPLOSIVES ACCIDENT DATABASE Peter O. Kummer dipl. Ing. HTL/SIA, EUR ING BIENZ, KUMMER & PARTNER LTD, Langägertenstrasse 6 CH-8125 ZOLLIKERBERG, SWITZERLAND Tel: int 41 1 391 27 37 FAX:
PROBLEM STATEMENT: Will reducing the ASD for Kadena AB F-15 C/Ds increase the CPFH for this Mission Design Series (MDS)?
CONSULTING REPORT Kadena F-15 C/D Cost per Flying Hour Analysis PROJECT MANAGERS: Capt Jeremy Howe and Capt Kevin Dawson AFLMA PROJECT NUMBER: LM200520700 16 August 2005 BACKGROUND: Kadena AB is currently
Mobile Robot Knowledge Base
Mobile Robot Knowledge Base Tracy Heath Pastore* a, Mitchell Barnes** a, Rory Hallman b b SPAWAR Systems Center, San Diego, Code 2371, 53560 Hull Street, San Diego, CA 92152; b Computer Sciences Corporation,
NAVSUP FLC NORFOLK PHILADELPHIA OFFICE
NAVSUP FLC NORFOLK PHILADELPHIA OFFICE Gerald Furey Deputy for Small Business Ready. Resourceful. Responsive! 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the
THE CHALLENGES OF CYBERSECURITY TRAINING
THE CHALLENGES OF CYBERSECURITY TRAINING DR. JORGE LÓPEZ HERNÁNDEZ ARDIETA DR. MARINA SOLEDAD EGEA GONZÁLEZ Cybersecurity Research Group Cybersecurity& Privacy Innovation Forum Brussels Belgium 28-29 April
REPORT DOCUMENTATION PAGE *
REPORT DOCUMENTATION PAGE * Form Approved OMBNo. 07040188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
An Application of an Iterative Approach to DoD Software Migration Planning
An Application of an Iterative Approach to DoD Software Migration Planning John Bergey Liam O Brien Dennis Smith September 2002 Product Line Practice Initiative Unlimited distribution subject to the copyright.
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
Addressing the Real-World Challenges in the Development of Propulsion IVHM Technology Experiment (PITEX)
NASA/CR 2005-213422 AIAA 2004 6361 Addressing the Real-World Challenges in the Development of Propulsion IVHM Technology Experiment (PITEX) William A. Maul, Amy Chicatelli, and Christopher E. Fulton Analex
Graduate Level Credit for Resident EWS Students. Natasha McEachin CG 1
Graduate Level Credit for Resident EWS Students Natasha McEachin CG 1 February 20, 2009 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information
MINDS: A NEW APPROACH TO THE INFORMATION SECURITY PROCESS
MINDS: A NEW APPROACH TO THE INFORMATION SECURITY PROCESS E. E. Eilertson*, L. Ertoz, and V. Kumar Army High Performance Computing Research Center Minneapolis, MN 55414 K. S. Long U.S. Army Research Laboratory
PREPARED FOR: U.S. Army Medical Research and Materiel Command Fort Detrick, Maryland 21702-5012
AD Award Number: W81XWH-10-1-0957 TITLE: PRINCIPAL INVESTIGATOR: Andrea L. Behrman, Ph.D., P.T. CONTRACTING ORGANIZATION: University of Florida Gainesville, FL 32611 REPORT DATE: October 2011 TYPE OF REPORT:
An Overview of Romanian Command and Control Systems
Col. eng. Stefan Cantaragiu, Ph. D. Military Equipment and Technologies Research Agency P.O. Box 51-16 76550 Bucharest ROMANIA Tel.: +40 1 4231483 Fax: +40 1 4231030 [email protected] Lt. eng. Adrian
DATA ITEM DESCRIPTION
DATA ITEM DESCRIPTION Form Approved OMB NO.0704-0188 Public reporting burden for collection of this information is estimated to average 110 hours per response, including the time for reviewing instructions,
PhD Education in Educational Sciences in Finland: Systematic Development of the Programmes
PhD Education in Educational Sciences in Finland: Systematic Development of the Programmes Jari Lavonen Department of Teacher Education, University of Helsinki, Finland Käyttäytymistieteellinen tiedekunta
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
REPORT DOCUMENTATION PAGE
REPORT DOCUMENTATION PAGE Form Approved OMB NO. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
THE NATIONAL SHIPBUILDING RESEARCH PROGRAM
SHIP PRODUCTION COMMITTEE FACILITIES AND ENVIRONMENTAL EFFECTS SURFACE PREPARATION AND COATINGS DESIGN/PRODUCTION INTEGRATION HUMAN RESOURCE INNOVATION MARINE INDUSTRY STANDARDS WELDING INDUSTRIAL ENGINEERING
Systematic Professional Services. Together we achieve the best
Systematic Professional Services Together we achieve the best 2 l Sitaware Enhancing your expertise Planning, installing and maintaining a Command & Control (C2) system is no small task. Hardware and software
Dr. Gary S. E. Lagerloef Earth and Space Research, 1910 Fairview Ave E
Establishing a NOAA Operational Data Center for Surface Currents Derived from Satellite Altimeters and Scatterometers; Pilot Study for the Tropical Pacific Including the Hawaiian Islands and US Territorial
ADVANCED NETWORK SECURITY PROJECT
AFRL-IF-RS-TR-2005-395 Final Technical Report December 2005 ADVANCED NETWORK SECURITY PROJECT Indiana University APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AIR FORCE RESEARCH LABORATORY INFORMATION
-Blue Print- The Quality Approach towards IT Service Management
-Blue Print- The Quality Approach towards IT Service Management The Qualification and Certification Program in IT Service Management according to ISO/IEC 20000 TÜV SÜD Akademie GmbH Certification Body
Development and Support for the USGODAE Server
Development and Support for the USGODAE Server Mr. Mike Clancy Fleet Numerical Meteorology and Oceanography Center 7 Grace Hopper Ave, Stop 1 Monterey, CA 93943-5501 phone: (831) 656-4414 fax: (831) 656-4489
AN INTEGRATED SOFTWARE SYSTEM FOR MEDICAL EQUIPMENT MANAGEMENT
1 of 4 AN INTEGRATED SOFTWARE SYSTEM FOR MEDICAL EQUIPMENT MANAGEMENT Z. Bliznakov, N. Pallikarakis Department of Medical Physics, School of Medicine, University of Patras, 26500, Rio - Patras, Greece
A DOCTORAL PROGRAM WITH SPECIALIZATION IN INFORMATION SECURITY A High Assurance Constructive Security Approach
A DOCTORAL PROGRAM WITH SPECIALIZATION IN INFORMATION SECURITY A High Assurance Constructive Security Approach Cynthia E. Irvine and Timothy E. Levin Department of Computer Science, Naval Postgraduate
Facilitated Workshops in Software Development Projects
Facilitated Workshops in Software Development Projects Members of an IT team spent a lot of time and effort working on the requirements for a major project. At the end of three weeks, they had produced
Army Environmental Policy and ISO 14001
Army Environmental Policy and ISO 14001 Army Environmental Policy and ISO 14001 Rick Sinclair and Rochie Tschirhart Since the 1970s, the U.S. Army has instituted environmental policies, programs, regulations,
PRINCIPLES FOR EVALUATION OF DEVELOPMENT ASSISTANCE
PRINCIPLES FOR EVALUATION OF DEVELOPMENT ASSISTANCE DEVELOPMENT ASSISTANCE COMMITTEE PARIS, 1991 DAC Principles for Evaluation of Development Assistance Development Assistance Committee Abstract: The following
4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER FA8720-05-C-0002. 6. AUTHOR(S) 5d. PROJECT NUMBER
REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Metamaterials and Transformation Optics
AFRL-AFOSR-UK-TR-2011-0021 Metamaterials and Transformation Optics John Pendry Imperial College London Physics Department South Kensington Campus Exhibition Road London, United Kingdom SW7 2AZ EOARD GRANT
Microsoft Business Analytics Accelerator for Telecommunications Release 1.0
Frameworx 10 Business Process Framework R8.0 Product Conformance Certification Report Microsoft Business Analytics Accelerator for Telecommunications Release 1.0 November 2011 TM Forum 2011 Table of Contents
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
Roadmap for Teacher Access to Student-Level Longitudinal Data
Roadmap for Teacher Access to Student-Level Longitudinal Data Key s to Ensure Quality Implementation Where are we going? Teachers have access to information about the students in their classrooms each
The German interagency approach to SSA
Lieutenant Colonel (GS) Karsten Auras, German Air Force Headquarters, 1 I b Space Concepts Presentation for the 2015 Japan Space Forum SSA Symposium, Tokyo, Japan The German interagency approach to SSA
U.S. Department of the Treasury. Treasury IT Performance Measures Guide
U.S. Department of the Treasury Treasury IT Performance Measures Guide Office of the Chief Information Officer (OCIO) Enterprise Architecture Program June 2007 Revision History June 13, 2007 (Version 1.1)
Saskatoon North Partnership for Growth (P4G) Draft Communications and Engagement Strategy
Saskatoon North Partnership for Growth (P4G) Draft Communications and Engagement Strategy Introduction This Communications and Engagement Strategy (Strategy) sets the communications and engagement framework
Ultra-low Sulfur Diesel Classification with Near-Infrared Spectroscopy and Partial Least Squares
1132 Energy & Fuels 2009, 23, 1132 1133 Communications Ultra-low Sulfur Diesel Classification with Near-Infrared Spectroscopy and Partial Least Squares Jeffrey A. Cramer, Robert E. Morris,* Mark H. Hammond,
Multiple Network Marketing coordination Model
REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
Important dimensions of knowledge Knowledge is a firm asset: Knowledge has different forms Knowledge has a location Knowledge is situational Wisdom:
Southern Company Electricity Generators uses Content Management System (CMS). Important dimensions of knowledge: Knowledge is a firm asset: Intangible. Creation of knowledge from data, information, requires
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
Optical Blade Position Tracking System Test
National Renewable Energy Laboratory Innovation for Our Energy Future A national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Optical Blade Position Tracking
NATIONAL DEFENSE UNIVERSITY NATIONAL WAR COLLEGE
NATIONAL DEFENSE UNIVERSITY NATIONAL WAR COLLEGE THE REAL TRANSFORMATION: BUILDING AND MAINTAINING LONG-TERM COMPETITIVE ADVANTAGE LTC EDWARD C. CARDON, USA A TRANFORMATION PAPER FOR THE CHAIRMAN OF THE
RUAG Cyber Security. More security for your data
RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
Secure Autonomous Automated Scheduling (SAAS) Phase 1 Final Report
NASA/CR 2010-216097 Secure Autonomous Automated Scheduling (SAAS) Phase 1 Final Report Rev 1.1 Jon G. Walke, Larry Dikeman, Stephen P. Sage, and Eric M. Miller General Dynamics Advanced Information Systems,
