ELECTROMAGNETIC OPERATING ENVIRONMENT (EME) & UK JOINT ELECTRONIC WARFARE (EW)

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "ELECTROMAGNETIC OPERATING ENVIRONMENT (EME) & UK JOINT ELECTRONIC WARFARE (EW)"

Transcription

1 ELECTROMAGNETIC OPERATING ENVIRONMENT (EME) & UK JOINT ELECTRONIC WARFARE (EW) Commander Dave Hewitt OC JOINT EW OPERATIONAL SUPPORT CENTRE (JEWOSC)

2 Electronic Warfare Military action to Exploit the Electromagnetic Spectrum (EMS) which encompasses the interception and identification of EM emissions, the employment of EM energy, including directed energy, to Reduce or Prevent hostile use of the EMS and actions to ensure its effective use by own/friendly forces. EW enables EM Situational Awareness (SA) which critically informs decision making and the execution of Joint Effects/Action. Note this statement should also include elements of Cyber

3 EM Operating Environment Complex, Congested and Contested - EME Situational Awareness critically Informs and/or enables: Planning, C2, manoeuvre, exploitation, denial, Battlespace Management, CID, Targeting, BDA, Threat Warning, Platform Protection and future capability development

4 EME & UK Defence EW Period EME Defence EW Analogue, emerging digital caps, limited proliferation and commercial exploitation Digitisation and non-traditional emitter technology development, proliferation, EMS Commercial exploitation, Cyber, Asymmetric applications Above + Complex, Congested & Contested Traditional War Fighting - EW focus maintained across ES, EA, ED and SIGINT DLoDs. EW Governance, C2, Doctrine, training established and enabled. COIN EW shift to protection aspects of ES, EA, ED. ELINT and Collect caps reduced. Limited EW Governance, C2, Doctrine and training focus. Capability Development failed to integrate and enable all aspects of the EW Defence Lines of Development, particularly Training and Information (data). Post Libya/Syria lessons increased EME and EW awareness. 5th+ Generation capability data requirements, recognition of non-equipment DLoD aspects (especially Governance, C2, training, people, information), ELINT.

5 UK Defence Review of EW (Jan 2013) Identify the risk to Defence outputs caused by deinvestment Develop a coherent model for exploitation of the EME Recognise synergies between EW and Cyber Build on existing National and International EW relations Update National EW policy Produce a National EW Operating directive

6 Review Scope Background - Relevance of EME and EW interfaces EME Framework - Policy, Command, Spectrum Management, MOUs Capability Stocktake - Evidence based against Risks, Scenarios Organisation - Joint and single service elements engaged in EW activities Governance & Tasking - Collection & Analysis tasking mechanisms & Governance models Manpower & Training - Skills & training. Manpower Review & Cyber career stream work Future of EME - Evidenced view of future EM environment & challenges

7 Review Outcomes Key Points Risks, weaknesses, capability gaps & incoherency across ES, EA, ED and EM components of EW Recommendations Some quick wins Governance, Tasking Some longer term Equipment, People and training Improved coherency (Included DEWC move to JEWOSC) Summary Lacked EW champion for years No Joint oversight of pan-dlod issues; ES, EA, ED, EM activities Equip often Urgent Operational Requirement derived, single service specific and not sustained Establish operating coherence with Cyber, IO and ISR EW effects not considered in the round lack of whole EM spectrum Management, Planning & Operational C2 Various Governance, Tasking, Project lines The need to reinvigorate collaborative working with Allies and partners

8 EW ESM ECM EPM EW Management Search Intercept Identify Locate Record (ES) = EME SA Prevent, Reduce (EA) = Deceive Deny Protect, Ensure (ED) = Counter ES & EA Command, Direct Integrate, sustain, Develop Policy & Governance Jt Battlespace Management & Integration Operational Command, Control, Coordinate EWCC End-to-End EME Operating Process SIGINT, MASINT, Cyber Threat Warning, Targeting, CID Info, Comms, Cyber, Jt Fires across networks and sensors Physical and Procedural Spectrum Management, EWOS, EOB, Training, trials, CNO

9 Initial Actions Establish UK Defence Authority for EW Comd JFC EW Policy set & issued under CDI leadership, consistent with NATO (29 May 14) Delegate specific EW responsibilities for Develop, Plan, Manage, Deliver, Generate and Operate functions EW Delivery Programme (equip & enablers) established ES,EA,ED and EM Establish Joint EW operational planning team (EM Battlestaff) Develop Joint EW Operating Directive Develop a 1 Star Joint Force EW Group EW Capability assessment in advance of SDSR 15

10 UK Joint EW Command Structure CDS/VCDS Commander Jt Forces (4 Star) Chief Defence Intelligence (3 Star) Director Cyber, Intelligence & Information Integration (2 Star) Joint Force EW Group Commander (1 Star) Single Service Headquarters EW Staff

11 UK Joint Operational EW Command Structure Director Joint Warfare (2 Star) Director Cyber, Intelligence & Information Integration (2 Star) UK Govt Depts Allies MoUs Joint Spectrum Authority PJHQ, EWCC, NATO Research & Development Joint Force Group EW Commander (1 Star) EWOS SIGINT EMBM Embeds Spectrum, Cyber, IO, Joint Intelligence Operations Centre EWCC DE&S Joint Force Intelligence Group Cyber and Info Ops NAVY LAND AIR Allies Industry Others

12 Summary Work is progressing much more to do EW has become more complex Art of the possible vs risk It must be carried out with less resource Efficiencies, collaboration, partnerships Equipment is only part of the solution Other Defence Lines of EW Development are equally as important Sustainability is key Must have Governance, resilience and through-life support solutions Collaboration and Integration is Key

13 Questions

Electronic Warfare System 2015. Integrated Electronic Warfare System. Own the Enemy s Battlespace

Electronic Warfare System 2015. Integrated Electronic Warfare System. Own the Enemy s Battlespace Electronic Warfare System 2015 Integrated Electronic Warfare System Own the Enemy s Battlespace NOBODY WANTS A FAIR FIGHT DRS offers an Integrated Electronic Warfare (EW) System, with comprehensive training

More information

Hybrid Warfare & Cyber Defence

Hybrid Warfare & Cyber Defence Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency

More information

Innovation. Performance. Security. SMARTSCAN man-portable land EW solutions. target. up-to-the-minute situational intelligence

Innovation. Performance. Security. SMARTSCAN man-portable land EW solutions. target. up-to-the-minute situational intelligence Innovation. Performance. Security SMARTSCAN man-portable land EW solutions target up-to-the-minute situational intelligence The increasing demands of Electronic Warfare As the digital era takes hold, the

More information

Navy Information Dominance Industry Day

Navy Information Dominance Industry Day Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic

More information

Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189

Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189 CALL FOR PAPERS for the IST/SET-126 Symposium on Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189 to be held in Norfolk Virginia,

More information

UK UNCLASSIFIED. Crown Copyright 2012 UK UNCLASSIFIED

UK UNCLASSIFIED. Crown Copyright 2012 UK UNCLASSIFIED 1 Embedding Architecture in the Enterprise Integrated-EA 2012 Wg Cdr Alex Hicks Cap ISTAR DPD Lead Planner Luke Tucker - Niteworks 2 Outline { Background { Approach { Benefits { Lessons { Wider Adoption

More information

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY

More information

Director of Intelligence Proposed Research Topics

Director of Intelligence Proposed Research Topics Director of Proposed Research Topics Suggested Graduate Program Thesis Topics Headquarters, U.S., 3000, Pentagon, Room 1A262B, Washington, DC 20350-3000 Sept 2011 DIRINT Suggested Graduate Program Thesis

More information

Improving Future Systems and Capabilities through Analysis and (Warfighting) Experimentation

Improving Future Systems and Capabilities through Analysis and (Warfighting) Experimentation Improving Future Systems and Capabilities through Analysis and (Warfighting) Experimentation Lessons learned from Niteworks experience of Live, Virtual, Constructive Experimentation 1 Scope of Presentation

More information

Army Doctrine Update

Army Doctrine Update Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near

More information

Codification World Forum Industry and Defence working together

Codification World Forum Industry and Defence working together Codification World Forum Industry and Defence working together John Stratton OBE - Director Maritime Equipment 1 Industry and Defence working together Defence Support encompasses all those activities that

More information

Mainstreaming European Military Cyber Defence Training & Exercises

Mainstreaming European Military Cyber Defence Training & Exercises 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises, 23-24 Sep 2013, Mr. Wolfgang Roehrig, Project Officer Cyber Defence Mainstreaming European Military Cyber Defence Training

More information

Version December How Defence Works

Version December How Defence Works Version 4.2 1 December 2015 How Defence Works Contents Introduction. 5 The operating model making Defence work...... 6 The control framework making sure we succeed.. 9 Direct how we lead Defence 10 Operate

More information

Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support

Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support Flight Lieutenant Charles Winsor Royal Australian Air Force Dr Thomas Millhouse Nova Systems, Australia

More information

ELBIT SYSTEMS. Jefferies Global Industrials Conference - August 2014. Joseph Gaspar EVP & CFO

ELBIT SYSTEMS. Jefferies Global Industrials Conference - August 2014. Joseph Gaspar EVP & CFO ELBIT SYSTEMS Jefferies Global Industrials Conference - August 2014 Joseph Gaspar EVP & CFO AT A GLANCE HEADQUARTED ISRAEL with International Operations 11,700 EMPLOYEES 50% engineers TEL AVIV & NASDAQ

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

ESKISP6046.02 Direct security architecture development

ESKISP6046.02 Direct security architecture development Overview This standard covers the competencies concerned with directing security architecture activities. It includes setting the strategy and policies for security architecture, and being fully accountable

More information

Overview TECHIS60851. Manage information security business resilience activities

Overview TECHIS60851. Manage information security business resilience activities Overview Information security business resilience encompasses business continuity and disaster recovery from information security threats. As well as addressing the consequences of a major security incident,

More information

NEXIUM SAT. Satcom systems solutions

NEXIUM SAT. Satcom systems solutions w w w. t h a l e s g r o u p. c o m NEXIUM SAT Satcom systems solutions DEFENCE SECURITY SATELLITES B ased on its long experience and worldwide leadership in military communications and battlespace digitization,

More information

Development, Concepts and Doctrine Centre. Rear Admiral J M L Kingwell Director DCDC

Development, Concepts and Doctrine Centre. Rear Admiral J M L Kingwell Director DCDC Development, Concepts and Doctrine Centre Rear Admiral J M L Kingwell Director DCDC Development, Concepts and Doctrine Centre Impartial and objective DCDC is the MOD s independent think tank Secretary

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute

More information

Technological Convergence in Radar & EW

Technological Convergence in Radar & EW www.thalesgroup.com Technological Convergence in Radar & EW Barry Trimmer 2 / Content The Drivers for Change Bugetary Pull Technological Push Two Alternate Paths for STAR Highly converged technology to

More information

Su S rface Force Strategy Return to Sea Control

Su S rface Force Strategy Return to Sea Control S Surface urface F orce SReturn trategy to Sea Control Surface Force Strategy Return to Sea Control Preface WWII SHIPS GO HERE We are entering a new age of Seapower. A quarter-century of global maritime

More information

Bio-inspired cyber security for your enterprise

Bio-inspired cyber security for your enterprise Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t

More information

The technological superiority that we and our partners

The technological superiority that we and our partners Communities of Interest Collaborating on Technology Challenges Alan Shaffer The technological superiority that we and our partners and allies have enjoyed for the past 50 years can no longer be assured,

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST

More information

Department of Defense DIRECTIVE. SUBJECT: The National Security Agency and the Central Security Service

Department of Defense DIRECTIVE. SUBJECT: The National Security Agency and the Central Security Service Department of Defense DIRECTIVE NUMBER 5100.20 December 23, 1971 Incorporating Through Change 4, June 24, 1991 SUBJECT: The National Security Agency and the Central Security Service ASD(I) Reference: (a)

More information

CHAPTER 6 HUMAN RESOURCE MANAGEMENT CONTENTS. Leadership/Management and Command Development 83

CHAPTER 6 HUMAN RESOURCE MANAGEMENT CONTENTS. Leadership/Management and Command Development 83 81 CHAPTER 6 HUMAN RESOURCE MANAGEMENT CONTENTS Introduction 82 Developmental Areas 82 Professional Functional Development 82 Leadership/Management and Command Development 83 Human Resource Development

More information

The EU s approach to Cyber Security and Defence

The EU s approach to Cyber Security and Defence Workshop "Cyberwar & Cyberpeace Berlin, 23 Oct 15 Wolfgang Röhrig EDA Programme Manager Cyber Defence Woilfgang.Roehrig@eda.europa.eu +32 (0)2 504 2966 Political & Strategic Framework Dual-Use Specific

More information

NATO Organization & Structure

NATO Organization & Structure NATO Organization & Structure Briefing to NATO senior NCO Orientation Course M5-33-C-12 Oberammergau, 25 June 2012 Lt Col Roland G. Iffert, DEU AF 1 Objectives & Agenda Objectives: To describe NATO s Organization

More information

Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience

Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience Mike O Neill Managing Director Graeme McGowan Associate Director of Cyber Security

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

How far should the core services of the military be contracted out? Dr D M Moore Centre for Defence Acquisition Cranfield University

How far should the core services of the military be contracted out? Dr D M Moore Centre for Defence Acquisition Cranfield University How far should the core services of the military be contracted out? Dr D M Moore Centre for Defence Acquisition Cranfield University CONTENT Context Background Complexities Challenge Importance of Knowledge

More information

NATO CRISIS MANAGEMENT

NATO CRISIS MANAGEMENT NATIONAL DEFENCE ACADEMY NATIONAL SECURITY AND DEFENCE FACULTY OPERATIONAL ART DEPARTMENT NATO CRISIS MANAGEMENT Col. IVO MARINOV Assoc. Prof., PhD Name IVO MARINOV Rank COLONEL, BGR A Current Position

More information

Training NATO for an uncertain future: An interview with Major General Erhard Bühler

Training NATO for an uncertain future: An interview with Major General Erhard Bühler 25 Neil Webb Training NATO for an uncertain future: An interview with Major General Erhard Bühler In facing potential threats, being lean and agile will be critical. Wolff Sintern Major General Erhard

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical

More information

Electronic Communications Industry support for London 2012

Electronic Communications Industry support for London 2012 Industry support for London 2012 Telecommunications Industry View Feb 2012 Agenda EC RRG National Emergency Alert for Telecomms Industry Planning Resilience & Response Group Keith Wallis Emergency Planning

More information

Critical Topics and Capabilities for Multiorganizational

Critical Topics and Capabilities for Multiorganizational Critical Topics and Capabilities for Multiorganizational Lessons Learned Susan McIntyre, Defence Research and Development Canada, Ottawa Canada Her Majesty the Queen in Right of Canada (Department of National

More information

Resources projected in the previous development plan and the reality

Resources projected in the previous development plan and the reality NATIONAL DEFENCE DEVELOPMENT PLAN 2013-2022 Resources projected in the previous development plan and the reality 1. The previous 10-year development plan approved in 2009 (Military Defence Development

More information

The Defence Geospatial Strategy 2010 A New Geospatial Domain

The Defence Geospatial Strategy 2010 A New Geospatial Domain The Defence Geospatial Strategy 2010 A New Geospatial Domain To take maximum advantage of the suite of sensors, weapons and other systems that are being acquired, Defence needs to ensure that it adheres

More information

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document

More information

Model-Based Conceptual Design through to system implementation

Model-Based Conceptual Design through to system implementation Australian Systems Engineering Workshop 28-30 October 2015, Sydney, NSW, Australia Model-Based Conceptual Design through to system implementation Lessons from a structured yet agile approach Presenter:

More information

FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY

FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY A d d r e s s C i t y, S t a t e Z i p FEDERAL RÉSUMÉ Client Name E m a i l A d d r e s s P h o n e N u m b e r Citizenship: U.S. Citizen Veteran Status: Retired Job Announcement Number: ABDC-4894892 Job

More information

Trends Concerning Cyberspace

Trends Concerning Cyberspace Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming

More information

1 Cyberspace and Security

1 Cyberspace and Security 1 Cyberspace and Security 1 Paper by Deputy Secretary of Defense William J. Lynn, Defending a New Domain: The Pentagon s Cyber Strategy, Foreign Affairs (Sep Oct 2010). In addition, an annual report by

More information

Jürgen Menner is University education in Mathematics

Jürgen Menner is University education in Mathematics 142 Jürgen Menner is University education in Mathematics (MSc) and Electrical Engineering (MSc). Officer of the Army Maintenance Corps. German and Brazilian general staff officer s training. Assistant

More information

SUFFOLK COASTAL DISTRICT COUNCIL DOMESTIC FLOOD PROTECTION POLICY

SUFFOLK COASTAL DISTRICT COUNCIL DOMESTIC FLOOD PROTECTION POLICY SUFFOLK COASTAL DISTRICT COUNCIL DOMESTIC FLOOD PROTECTION POLICY 1. Introduction 1.1 The Council recognises the threat to local communities from flooding following severe weather events and as a result

More information

CYBER ZONE INTRODUCING THE 10% CALL FOR EXHIBITORS

CYBER ZONE INTRODUCING THE 10% CALL FOR EXHIBITORS CALL FOR EXHIBITORS 10% DISCOUNT FOR FIRST TIME EXHIBITORS* INTRODUCING THE CYBER ZONE Get ready to really showcase your products and services to a specific and vetted audience in a distinctive, dedicated

More information

Current Trends in NATO RTO Space Activities

Current Trends in NATO RTO Space Activities Current Trends in NATO RTO Space Activities Capt. Giovanni Sembenini NATO R&T Coordination Officer NATO Research and Technology Agency Tel. +33 (0)1 55.61.22.25 sembeninig@rta.nato.int SPACE FOR A SAFE

More information

Other reports in this series. National Cyber Security Organisation in Czech Republic. National Cyber Security Organisation in Estonia

Other reports in this series. National Cyber Security Organisation in Czech Republic. National Cyber Security Organisation in Estonia This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre, NATO, any agency or any government.

More information

ESKISP6064.03 Conducts vulnerability assessment under supervision

ESKISP6064.03 Conducts vulnerability assessment under supervision Conducts vulnerability assessment under supervision Overview This standard covers the competencies required to conduct vulnerability assessments under supervision. This includes following processes for

More information

Playing Our Part in Responding to National Threats

Playing Our Part in Responding to National Threats Agenda Item 7 Report of: The Secretary of the Police and Crime Panel Date: 1 February 2016 1. Purpose of Report Playing Our Part in Responding to National Threats 1.1 This report provides Members with

More information

AUSA Background Brief

AUSA Background Brief AUSA Background Brief No. 96 November 2002 An Institute of Land Warfare Publication Space, Missile Defense and Computer Network Operations Challenges: Computer Network Operations: A Critical Element of

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior

More information

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security 1 NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations Ian J West Chief, Cyber Security Ian.west@ncia.nato.int 2 NATO UNCLASSIFIED Cyber Security Service Line Ian West

More information

SECURITY & RISK MANAGEMENT CONSULTANTS COURSE (SRMC)

SECURITY & RISK MANAGEMENT CONSULTANTS COURSE (SRMC) SECURITY & RISK MANAGEMENT CONSULTANTS COURSE (SRMC) Protesters enter the Parliament in Ouagadougou, the capital of Burkina Faso Source: Issouf Sanogo, Getty Images Course Overview PGI s Security Risk

More information

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?

More information

Government response to the AIV/CAVV report on cyber warfare

Government response to the AIV/CAVV report on cyber warfare Government response to the AIV/CAVV report on cyber warfare On 17 January 2012 a joint committee of members of the Advisory Council on International Affairs (AIV) and the Advisory Committee on Issues of

More information

Session 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: Introduction Political cyber attacks

Session 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: Introduction Political cyber attacks 1 Session 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: remarks prepared for the CCADD conference in Paris, September 2014 Introduction Cyberspace has become part of

More information

EXERCISE RF. Interactive Signals Stimulator for SIGINT Applications

EXERCISE RF. Interactive Signals Stimulator for SIGINT Applications EXERCISE RF Interactive Signals Stimulator for SIGINT Applications Introduction EXERCISE is the family of simulation products developed by the Aerospace Business Unit of LOG.IN. EXERCISE CGF (Computer

More information

Emerging Capability & Prototyping

Emerging Capability & Prototyping Emerging Capability & Prototyping Mr. Earl Wyatt Deputy Assistant Secretary of Defense, Emerging Capability & Prototyping Office of the Assistant Secretary of Defense (Research and Engineering) http://www.acq.osd.mil/ecp/

More information

RUAG Cyber Security. More security for your data

RUAG Cyber Security. More security for your data RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making

More information

Insights. Connections. Business.

Insights. Connections. Business. Insights. Connections. Business. Insights. Connections. Business. The D Group is the UK s foremost business development network for leading corporations, partnerships and institutions. Our members employ

More information

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT) Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction

More information

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010 1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In

More information

Public Private Partnerships and National Input to International Cyber Security

Public Private Partnerships and National Input to International Cyber Security Public Private Partnerships and National Input to International Cyber Security 10 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington,

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

SCAF Conference 2011 Cost, Value and Affordability. Optimism or objectivity?

SCAF Conference 2011 Cost, Value and Affordability. Optimism or objectivity? SCAF Conference 2011 Cost, Value and Affordability. Optimism or objectivity? Bob Barton MD Niteworks Crown Copyright 2011 UNCLASSIFIED 1 What happens when you just don't know... Crown Copyright 2011 UNCLASSIFIED

More information

Unmanned Aerial Systems (UAS) A maritime perspective

Unmanned Aerial Systems (UAS) A maritime perspective Unmanned Aerial Systems (UAS) A maritime perspective Cdr Al Cummings RN British Embassy Staff Aviation Officer Cdr Gavin Edward British Embassy Staff C4ISR Mr Philip Rayfield British Embassy Staff Air

More information

Technology management in warship acquisition

Technology management in warship acquisition management in warship acquisition A J Shanks B.Eng(Hons) MIET BMT Defence Services Limited SYNOPSIS Today s warship designers and engineers look to technology to provide warships and systems better, cheaper

More information

Risk Management Policy

Risk Management Policy 1 Purpose Risk management relates to the culture, processes and structures directed towards the effective management of potential opportunities and adverse effects within the University s environment.

More information

Center of Excellence Concept Plan

Center of Excellence Concept Plan 1 Agenda Spectrum Management Operations have evolved in recent years from a pre-mission planning task into an ongoing operational activity spanning well beyond Signal operations across all Warfighting

More information

UNCLASSIFIED. UNCLASSIFIED Navy Page 1 of 12 R-1 Line #145

UNCLASSIFIED. UNCLASSIFIED Navy Page 1 of 12 R-1 Line #145 Exhibit R2, RDT&E Budget Item Justification: PB 2015 Navy Date: March 2014 1319: Research, Development, Test & Evaluation, Navy / BA 5: System Development & Demonstration (SDD) COST ($ in Millions) Prior

More information

ESKISP6055.01 Manage security testing

ESKISP6055.01 Manage security testing Overview This standard covers the competencies concerning with managing security testing activities. Including managing resources activities and deliverables. This includes planning, conducting and reporting

More information

UNCLASSIFIED. R-1 Program Element (Number/Name) PE 0603925N / Directed Energy and Electric Weapon System. Prior Years FY 2013 FY 2014 FY 2015

UNCLASSIFIED. R-1 Program Element (Number/Name) PE 0603925N / Directed Energy and Electric Weapon System. Prior Years FY 2013 FY 2014 FY 2015 Exhibit R2, RDT&E Budget Item Justification: PB 2015 Navy Date: March 2014 1319: Research, Development, Test & Evaluation, Navy / BA 4: Advanced Component Development & Prototypes (ACD&P) COST ($ in Millions)

More information

Civilian Headline Goal 2010

Civilian Headline Goal 2010 Civilian Headline Goal 2010 (approved by the ministerial Civilian Capabilities Improvement Conference and noted by the General Affairs and External Relations Council on 19 November 2007 - doc. 14823/07)

More information

Det talte ord gælder

Det talte ord gælder Thank you for the invitation. I m pleased to be given this opportunity to speak to you about Homeland Security, seen from my point of view. Homeland Security is a concept we ve all grown very familiar

More information

Advanced Electronics Company. Photonics Based ELINT for Interception and Analysis of Radar Signals

Advanced Electronics Company. Photonics Based ELINT for Interception and Analysis of Radar Signals Advanced Electronics Company (An Economic Offset Program Company) Radar Symposium 2014 Photonics Based ELINT for Interception and Analysis of Radar Signals Presented By: Engr. Ziad H. Al-Musallam Senior

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

DEPARTMENT OF THE NAVY. OFFICE OF THE SECRETARY JAN 3a2006 1000 NAVY PENTAGON WASHINGTON, D.C. 20350-1000

DEPARTMENT OF THE NAVY. OFFICE OF THE SECRETARY JAN 3a2006 1000 NAVY PENTAGON WASHINGTON, D.C. 20350-1000 DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY JAN 3a2006 1000 NAVY PENTAGON WASHINGTON, D.C. 20350-1000 SECNAVINST 5090.8A ASN (I&E) SECNAV INSTRUCTION 5090.8A From: Subj: Secretary of the Navy POLICY

More information

Cyber Situation Awareness Package. Product Descriptions

Cyber Situation Awareness Package. Product Descriptions Annex D Cyber Situation Awareness Package Product Descriptions Contents: CySAP COMMON STAFF REQUIREMENT Page 2 CySAP BUSINESS CASE Page 8 CySAP THROUGH LIFE MANAGEMENT PLAN Page 14 1 PRODUCT DESCRIPTION

More information

POLICIES CONCERNING THE NAVAL POSTGRADUATE SCHOOL. 1. Purpose. To update and clarify policies concerning the Naval Postgraduate School.

POLICIES CONCERNING THE NAVAL POSTGRADUATE SCHOOL. 1. Purpose. To update and clarify policies concerning the Naval Postgraduate School. DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON. D.C. 20350 1000 SECNAVINST 1524.2B DASN (MPP) October 27, 2005 SECNAV INSTRUCTION 1524.2B From: Subj: Secretary of the Navy

More information

RIIO-ED1 BUSINESS PLAN SA-09 Supplementary Annex Data assurance. June 2013 (Updated April 2014)

RIIO-ED1 BUSINESS PLAN SA-09 Supplementary Annex Data assurance. June 2013 (Updated April 2014) 2015-2023 RIIO-ED1 BUSINESS PLAN SA-09 Supplementary Annex Data assurance June 2013 (Updated April 2014) SA-09 Data assurance Contents 1 Introduction... 3 Structure of this document... 3 2 Data assurance

More information

AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013

AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013 AIR- SEA BATTLE Service Collaboration to Address Anti-Access & Area Denial Challenges White PantoneBlackC PantoneReflexBlueC Pantone 116C Pantone 165C Pantone 422C Pantone 471C Pantone 551C May 2013 This

More information

UNDERSEA WARFARE (USW) ELECTROMAGNETIC SYSTEMS DEPARTMENT CODE 34 OVERVIEW

UNDERSEA WARFARE (USW) ELECTROMAGNETIC SYSTEMS DEPARTMENT CODE 34 OVERVIEW UNDERSEA WARFARE (USW) ELECTROMAGNETIC DEPARTMENT CODE 34 OVERVIEW October 2015 Distribution Statement D - Distribution authorized to DoD and DoD contractors only; Administrative/Operational use; 2009.

More information

NDIA Ground Robotics Capabilities. Realizing the Robotic & Autonomous Systems Vision 2 March 2016

NDIA Ground Robotics Capabilities. Realizing the Robotic & Autonomous Systems Vision 2 March 2016 NDIA Ground Robotics Capabilities Realizing the Robotic & Autonomous Systems Vision 2 March 2016 Frank Kelley Deputy Assistant Secretary of the Navy Unmanned Systems Distribution Statement A: Approved

More information

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES. Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive

More information

Air Superiority 2030 Flight Plan Enterprise Capability Collaboration Team

Air Superiority 2030 Flight Plan Enterprise Capability Collaboration Team Air Superiority 2030 Flight Plan Enterprise Capability Collaboration Team May 2016 AIR SUPERIORITY BACKGROUND The Chief of Staff of the Air Force chartered the Air Superiority 2030 (AS 2030) Enterprise

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

Department of Defense NetOps Strategic Vision

Department of Defense NetOps Strategic Vision Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps

More information

Executive Diploma in Cloud Computing Innovation

Executive Diploma in Cloud Computing Innovation Executive Diploma in Cloud Computing Innovation Achieve More We encourage our students to challenge their thinking, to extend their boundaries, to strive for excellence. We create a positive environment

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

NATO Intelligence, Surveillance, and Reconnaissance (ISR) Interoperability Architecture (NIIA)

NATO Intelligence, Surveillance, and Reconnaissance (ISR) Interoperability Architecture (NIIA) ALLIED ENGINEERING DOCUMENTATION PUBLICATION NATO Intelligence, Surveillance, and Reconnaissance (ISR) Interoperability Architecture (NIIA) : Architecture Description SEPTEMBER 2005 RECORD OF CHANGES

More information

Technology and Cyber Resilience Benchmarking Report 2012. December 2013

Technology and Cyber Resilience Benchmarking Report 2012. December 2013 Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities

More information

Tackling fraud in the charity sector Making your money count

Tackling fraud in the charity sector Making your money count Supported by Tackling fraud in the charity sector Making your money count Friday 30 October 2015 Royal College of Physicians, London A conference run by the charity sector for the charity sector About

More information

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note A Community Position paper on Law of CyberWar Paul Shaw 12 October 2013 Author note This law and cyberwar paper / quasi-treatise was originally written for a course in a CISO certification curriculum,

More information

Overview TECHIS60441. Carry out security testing activities

Overview TECHIS60441. Carry out security testing activities Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being

More information