The State of DoD Biometrics
|
|
- Eugene Haynes
- 8 years ago
- Views:
Transcription
1 The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E 1
2 Agenda What We ve Done Biometrics within DoD Required Capabilities Acquisition Future Vision Summary Friend? Enemy? Neutral? DoD must institutionalize and enhance our capabilities to to fight the wars we we are in in today and the scenarios we we are most likely to to face in in the years ahead. -- Secretary of of Defense Robert M. M. Gates, 6 Apr
3 Components of a Capacity Storage Matching Analysis Decide Combat Identification All source information Biometric Matching Engine Intelligence to Inform and Predict All Source Identity Intelligence Analysis Collection Developing Evidence to Detain, Prosecute and Convict Physical Access Controls 3
4 What We Have Done Collection Systems Biometrics Automated Toolset (BAT) Handheld Interagency Identity Detection Equipment (HIIDE) Secure Electronic Enrollment Kit (SEEK) Biometric Identification System for Access (BISA) Collection Systems ($m) 3, ,664 FY08 FY09 FY10 Store / Match / Share Store / Match / Share ($m) Automated Biometrics Identity System (ABIS) Analysis Biometrics Enabled Intelligence - Biometric Intelligence Repository (BIR) - Automated Identity Management System (AIMS) Expeditionary Forensics - Joint Expeditionary Forensic Facility (JEFFs) - Combined Explosives Exploitation Cell (CEXC) - Reach-back capability (AFDIL, USACIL, DCFL, TEDAC) FY08 FY09 FY10 Expeditionary Labs in Theater Iraq: 7 Afghanistan: 8 4
5 Current DoD Biometrics Focus Institutionalization - Developed a DoD Directive and formalized the governance process - Two formal Programs of Record and two pending Provide Capabilities to the Warfighter - Provide enterprise support to users in Iraq and Afghanistan - Field biometric collection devices to the warfighter - Address the urgent operational needs of the commanders on the ground Promote Interagency Sharing and Standardization - Share biometric data with FBI and DHS - Develop, implement, and enforce standards across DoD in conjunction with the Interagency and international community DHS FBI DoD 5
6 Developing DoD s Capability All DoD components dependent on a single authoritative repository (ABIS) for capability - That enterprise system is DoD s interface with Interagency partners Service unique Tactical Collection Systems are acceptable, and possibly appropriate, so long as they conform to enterprise system architecture and standards Deployed DoD Biometric capabilities depend on: - Formalized requirements that lead to Programs of Record - An enterprise architecture to support the sharing of data - Acquisition programs to develop and field capabilities 6
7 DoD s Biometric Capabilities Border Control/ Ports of Entry Vetting Base & Checkpoint Security Maritime Interception Operations Core Capabilities Biometrics Enterprise - Automated Biometrics Identification System (ABIS) Tactical Collection - Biometrics Automated Toolset (BAT) - Handheld Interagency Identity Detection Equipment (HIIDE) - Secure Electronic Enrollment Kit (SEEK) Sensitive Site Exploitation Detainee Operations Defend the Homeland Targeting Access Control - Biometric Identification System for Access (BISA) - Defense Biometrics Identification System (DBIDS) Intelligence - Biometric Intelligence Repository (BIR) - Automated Identity Management System (AIMS) Forensics - Joint Expeditionary Forensic Facility (JEFF) - Combined Explosives Exploitation Cell (CEXC) 7
8 Institutionalizing the Biometrics Capability Capabilities FY08 FY09 FY10 FY11 FY12 Biometrics Enterprise Biometric Enabling Capability (Army) Tactical Collection Joint Personnel Identification (Army) Identity Dominance System (Navy) Sensitive Site Exploitation (SOCOM) Intelligence Biometric Enabled Intelligence (DIA) Forensics Battlefield Forensics (Army) CPD AOA ICD CDD MS B ICD AOA CDD MS B CPD IOC CBA ICD MS B AOA ICD DCR IOC AOA Analysis of Alternatives CBA Capabilities Based Assessment CDD Capability Development Document CPD Capability Production Document DCR DOTMLPF Change Recommendation ICD Initial Capabilities Document IOC Initial Operational Capability MS B Milestone B (Acquisition Decision) 8
9 Army Acquisition Strategy Proposed Biometrics Enabling Capability (BEC) Characteristics / Description DoD authoritative biometric repository Multi-modal storage & matching (Fingerprint, Palm, Iris, Face) Planned Future Capabilities Increased system size & throughput SOA/web services SIPR/NIPR web portal Cross domain solution Acquisition Strategy ABIS/BEC to become Program of Record 4Q2011 Competitive contract awards in 2011 and 2012 MS B in 2012 to establish BEC INC 1 Joint Personnel Identification v2 (JPIv2) Characteristics / Description Tactical collection system to match, store, and share multimodal biometric (fingerprint, iris, face) and contextual data Planned Future Capabilities Increased collection speed, match speed, and memory Improved access to authoritative database Additional modalities (palm and voice) Geo-location support Acquisition Strategy MS B in 2012 to establish JPIv2 as Program of Record Competitive award in 2012 to select COTS replacement hand-held and static systems 9
10 Navy Acquisition Strategy Supports Navy Expanded Maritime Interception Operations Employed by shipboard Visit, Board, Search and Seizure (VBSS) teams Relies on DoD authoritative biometric repository As Is COTS product Finger / face only Supports wireless transfer IDS Overview To Be Collection of: Finger / face / iris Digital Forensic data: documents and electronic media After action mission reporting Local matching Supports wireless transfer Man portable < 10 lbs Marinized, EMI/EMC compliant Inventory Objective (328) facilitates use of Small Business Innovation Research (SBIR) development and production strategy Competitive awards Acquisition Strategy Phase I: 5 vendors delivered concept papers Phase II: 1 S/W, 2 H/W vendors for prototype, manufacturing plan, IOT&E (1 H/W vendor withdrew) Phase III: 3QFY12; single award for commercialization with production options(s) MS B Sep 10 Initial Operational Capability (IOC) 4QFY12 IDS aligns with the Biometrics Enterprise and future Joint solution (BEC/JPIv2) 10
11 Other Programs Multiple non acquisition activities COTS and GOTS Common Enterprise Architecture Synchronized through EXCOM Governance Structure with OSD Level visibility 11
12 Future DoD Biometrics Vision Strategic Drivers Executive Guidance -HSPD 12 -HSPD 24 Evolving Threat -Asymmetric -Individual Actor Future Operations -SOF -Limited Access Limitations -Resources -Infrastructure Key Considerations Future Collections - Intel, Special Operations, law enforcement o Where and how will we obtain future collections? Biometrics in Identity Management - Supporting physical access, logical access, and business functions o What role will biometrics play in support of Identity Management? Steady State of Battlefield Forensics - Forensic analysis of latent biometric samples link an individual to an event o What biometric enabled capabilities need to be enduring to support Battlefield Forensics? The future vision for biometrics must consider how to to provide an enabling capability to to existing and emerging DoD missions 12
13 Interagency Operational View IAFIS BAT HIIDE IDENT ABIS BIR/AIMS SEEK BISA DBIDS JEFF CEXC As the primary forward collector of of biometric information, DoD must continue to to encourage efficient data sharing across the US Government 13
14 Summary The DoD Biometrics program is on a positive trajectory, but still requires further investment and maturity Institutionalization Provide Capabilities to the Warfighter Promote Interagency Sharing and Standardization We are on track to develop an enduring capability within DoD Army BEC, JPI Navy IDS USSOCOM SSE Intelligence BEI Maintain an agile enterprise to support: Military operations and intelligence Physical access, logical access, and business functions Forensics Build on past success and focus on supporting the warfighter and DoD user in in a hybrid environment 14
15 Discussion What is is needed is is a portfolio of of military capabilities with maximum versatility across the widest possible spectrum of of conflict. -- Secretary of of Defense Robert M. M. Gates, Jul
Product Testing Programs
Catalog of USG Product Programs Version 1.0 November 15, 2010 NSTC Subcommittee on s and Identity Management 1. Introduction This Catalog of USG Product Programs (Catalog) supplements the Registry of USG,
More informationDepartment of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
More informationNavy Contributions to Identity Management
Navy Contributions to Identity Management CAPT John M. Boyd Director, Dept of the Navy Identity Management Capability Biometric Consortium Conference 22 September 2009 UNCLASSIFIED Applications UNCLASSIFIED
More informationDefining a Secure Mobile Framework Architecture at DHA
Ms. Janine Oakley, Transition Manager Innovation and Advanced Technology Development Division 2015 Defense Health Information Technology Symposium Defining a Secure Mobile Framework Architecture at DHA
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5205.15E April 26, 2011 USD(AT&L) SUBJECT: DoD Forensic Enterprise (DFE) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority vested in the Secretary
More informationU.S. Coast Guard Biometric Enabled Identity Program. Provide consistent and repeatable maritime safety and security throughout our nation.
U.S. Coast Guard Biometric Enabled Identity Program Provide consistent and repeatable maritime safety and security throughout our nation. Unclassified 17 July 2012 Agenda Understanding the maritime domain
More informationEnterprise Biometric Identity Services at DHS: OBIM Update and Plans AFCEA Global Identity Summit 2014 Tampa, Florida September 15-18, 2014
Enterprise Biometric Identity Services at DHS: OBIM Update and Plans AFCEA Global Identity Summit 2014 Tampa, Florida September 15-18, 2014 Acting Deputy Director Kenneth Gantt Office of Biometric Identity
More informationDoD Software Assurance (SwA) Overview
DoD Software Assurance (SwA) Overview Tom Hurt Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Program Protection Summit / Workshop McLean, VA May 19, 2014 May 19, 2014
More informationIDEAL INNOVATIONS, INC. CORPORATE OVERVIEW
CORPORATE OVERVIEW 950 North Glebe Road Suite 800 Arlington VA 22203 Tel (703) 528-9101 Fax (703) 528-1913 www.idealinnovations.com FACE IDEAL INNOVATIONS, INC. ( ) FACE CENTER OF EXCELLENCE (FACE) is
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE
Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Office of Secretary Of Defense DATE: April 2013 COST ($ in Millions) All Prior Years FY 2012 FY 2013 # Base OCO ## FY 2015 FY 2016 FY 2017 FY 2018
More informationDEPARTMENT OF DEFENSE FORENSIC CAPABILITIES. Larry C. Chelko Director U.S. Army Criminal Investigation Laboratory (USACIL)
DEPARTMENT OF DEFENSE FORENSIC CAPABILITIES Larry C. Chelko Director U.S. Army Criminal Investigation Laboratory (USACIL) DOD s s FORENSIC CHALLENGE Forensic requirements are growing New uses are emerging
More informationOptical Memory Cards in Federal Government
NIST Storage & Processor Card Workshop July 7 & 8, 2003, Gaithersburg, MD Optical Memory Cards in Federal Government Stephen Price-Francis Vice President, Business Development LaserCard Systems Corporation
More informationThe Leading Provider of Identity Solutions and Services in the U.S.
THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that
More informationAPPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
More informationConsolidated Afloat Networks and Enterprise Services (CANES)
Consolidated Afloat Networks and Enterprise Services (CANES) Re-architecting the Navy s s C4I Network Infrastructure Lockheed Martin SNA Media Brief 11 January 2010 Lockheed Martin Proprietary Information
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
More informationCyber Situational Awareness - Big Data Solution
Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and
More informationForecast to Industry 2015 External Contracting Opportunities
Forecast to Industry 2015 External Contracting Opportunities Mr. Douglas W. Packard Director, Procurement Services Directorate 2 November 2015 UNCLASSIFIED 109 103 ENCORE III Navy Maintenance Database
More informationSpace and Naval Warfare Systems Center Atlantic
Space and Naval Warfare Systems Center Atlantic Business and Force Support Portfolio Industry Opportunities SSC Atlantic Small Business and Industry Outreach Initiative Gulf Coast Government Contractor
More informationWORKFORCE COMPOSITION CPR. Verification and Validation Summit 2010
WORKFORCE COMPOSITION CPR PEO IEW&S Organizational Assessment VCSA Brief Date 2010 October 13, 2010 This briefing is UNCLASSIFIED/FOUO PREDECISIONAL LIMITED DISTRIBUTION AS OF: 11 Sep 2010 Verification
More informationIDENTITY SOLUTIONS FOR A BETTER WORLD
IDENTITY SOLUTIONS FOR A BETTER WORLD OUR COMPANY #1 GLOBAL PROVIDER OF BIOMETRICS-BASED IDENTITY SOLUTIONS Founded in 2002, Fulcrum Biometrics is a leading provider, distributor, and integrator of biometric
More informationTechNet Land Forces South Small Business Opportunities. Carey Webster Director, Federal Information Solutions Deltek
TechNet Land Forces South Small Business Opportunities Carey Webster Director, Federal Information Solutions Deltek Agenda Review of Upcoming Opportunities for Small Businesses Army 8 Small Business Navy
More informationJoint Operational Medicine Information Systems Program
COL John R. Bailey, Deputy Program Manager 2015 Defense Health Information Technology Symposium Joint Operational Medicine Information Systems Program 1 DHA Vision A joint, integrated, premier system of
More informationEnterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength
Enterprise IT Aligning Strong Solutions, Assuring Enterprise Strength Strategic planning aligns your enterprise IT infrastructure with your mission, operational and efficiency goals. From the start, we
More informationVirginia National Guard. The Commonwealth s Guardian
Virginia National Guard The Commonwealth s Guardian Objective To understand the origins, constitutional and legal underpinnings of the National Guard To understand the roles, missions, and capabilities
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Army : February 2015 2040: Research, Development, Test & Evaluation, Army / BA 7: Operational Systems Development COST ($ in Millions) Years FY 2014
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
More informationHealth Solutions. Mission-Critical Support Across the Health Spectrum
Health Solutions Mission-Critical Support Across the Health Spectrum IT Experts Who Know Health, Health Experts Who Know IT Today s healthcare challenges are formidable: an aging population, lack of interoperability
More informationCOL Joe Capobianco Program Executive Officer
COL Joe Capobianco Program Executive Officer SOF WARRIOR Operator Focused: On Time, On Target! SPECIAL OPERATIONS RESEARCH, DEVELOENT, & ACQUISITION CENTER Commander Acquisition Executive Deputy Military
More informationPEO Land Systems It s All About the Warfighter. Mr. William E. Taylor REPORT TO INDUSTRY. Modern Day Marine Quantico, Virginia 23 September 2015
Mr. William E. Taylor PEO Land Systems It s All About the Warfighter REPORT TO INDUSTRY Modern Day Marine Quantico, Virginia 23 September 2015 PEO LS Organization ASN RD&A PROGRAM TRANSITION to PEO LS
More informationOperational Energy Strategy: Implementation Plan
Operational Energy Strategy: Implementation Plan Department of Defense March 2012 Preparation of this report/study cost the Department of Defense 2011 - a 2012. total of approximately Generated $240,000
More informationHow To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
More informationDepartment of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)
Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction
More informationFulfillment of Urgent Operational Needs
Report of the Defense Science Board Task Force on the Fulfillment of Urgent Operational Needs July 2009 Office of the Under Secretary of Defense For Acquisition, Technology, and Logistics Washington, D.C.
More informationMultimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research
More informationMAJOR AUTOMATED INFORMATION SYSTEMS. Selected Defense Programs Need to Implement Key Acquisition Practices
United States Government Accountability Office Report to Congressional Committees March 2014 MAJOR AUTOMATED INFORMATION SYSTEMS Selected Defense Programs Need to Implement Key Acquisition Practices GAO-14-309
More informationSatCom For Net-Centric Warfare July/August 2011. MilsatMagazine
SatCom For Net-Centric Warfare July/August 2011 MilsatMagazine Emergency Communications C-COM, Hughes Boeing GPS II-F IvySys Technologies Command Center Guardian Mobility idirect Government Technologies
More informationImplementing the DoD/VA Virtual Lifetime Electronic Record
Implementing the DoD/VA Virtual Lifetime Electronic Record SOA IN HEALTHCARE CONFERENCE July 14, 2010 Doug Felton Manager, Enterprise Framework DoD/VA Interagency Program Office (IPO) Agenda What is the
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 4630.09 July 15, 2015 DoD CIO SUBJECT: Communication Waveform Management and Standardization References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues
More informationDefense Business Systems Investment Management Process Guidance. June 2012
Defense Business Systems Investment Management Process Guidance June 2012 Executive Summary Section 901 of the Fiscal Year 2012 National Defense Authorization Act (FY2012 NDAA), now codified at Title 10
More informationCloud Computing and Enterprise Services
Defense Information Systems Agency A Combat Support Agency Cloud Computing and Enterprise Services Alfred Rivera Technical Program Director 29 July 2010 Peak of Inflated Expectations You Are Here Plateau
More informationDirector of Intelligence Proposed Research Topics
Director of Proposed Research Topics Suggested Graduate Program Thesis Topics Headquarters, U.S., 3000, Pentagon, Room 1A262B, Washington, DC 20350-3000 Sept 2011 DIRINT Suggested Graduate Program Thesis
More informationFlexible, Life-Cycle Support for Unique Mission Requirements
Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics
More informationArmy Supply Chain: Delivering the Future to the Warfighter
Army Supply Chain: Delivering the Future to the Warfighter Logistics Supporting Activity Life Cycle Logistics Tools Workshop 8 March 2010 Army Transformation Demands SC Transformation Seven years of conflict
More informationCommon Operating Environment (COE) and Global Information Grid (GIG) Enterprise Services (GES) Mr. Rob Walker 24 September 2003
Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise (GES) Mr. Rob Walker 24 September 2003 Common Operating Environment COE is mission-application independent - A basis for
More informationCorporate Overview A
Corporate Overview A WHO WE ARE ManTech International Corporation uses advanced technology to help government and industry meet some of their greatest challenges and succeed in their most important endeavors.
More informationProduct Manager Force Sustainment Systems
Product Manager Force Sustainment Systems Contingency Basing and Operational Energy Initiatives SUSTAINING WARFIGHTERS AWAY FROM HOME LTC(P) James E. Tuten Product Manager PM FSS Outline The Problem Contingency
More informationFight the Network. Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches kevinj@netwerxinc.com. Briefing name l Date (1)
Fight the Network Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches kevinj@netwerxinc.com Briefing name l Date (1) Problem Army Strategy for Net-Centric Fighting Force
More informationCyber Security Research and Development a Homeland Security Perspective
FBI ----------------------------------------- INFRAGARD National Conference ----------------------------------------- 2005 Cyber Security Research and Development a Homeland Security Perspective Annabelle
More informationDoD CIO ITSM Overview Enterprise Architecture Conference
DoD CIO ITSM Overview Enterprise Architecture Conference April 14, 2011 Barbara McCain Enterprise Architecture & Infrastructure DoD CIO Barbara.McCain@osd.mil What is IT Service Management (ITSM)? ITSM
More informationHomeland Open Security Technology HOST Program
Homeland Open Security Technology HOST Program Informational Briefing August 2011 Sponsored by: U.S. Department of Homeland Security Science and Technology Directorate Implemented by: Open Technology Research
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 3000.09 November 21, 2012 USD(P) SUBJECT: Autonomy in Weapon Systems References: See Enclosure 1 1. PURPOSE. This Directive: a. Establishes DoD policy and assigns
More informationEXPLOSIVE ORDNANCE DISPOSAL
GAO United States Government Accountability Office Report to Congressional Committees April 2013 EXPLOSIVE ORDNANCE DISPOSAL DOD Needs Better Resource Planning and Joint Guidance to Manage the Capability
More informationNDIA Manufacturing Council: DoD Systems Engineering / Manufacturing Update
NDIA Manufacturing Council: DoD / Manufacturing Update 12 May 2010 Nicholas Torelli Director, Mission Assurance Office of the Secretary of Defense 05/12/2010 Page-1 DISTRIBUTION STATEMENT A -- Cleared
More informationARL. Laboratory Overview ARCTIC SOF CAPABILITIES WORKSHOP. Penn State. Presented to: Presented by: Mr. Tom Goodall 20 November 2014
ARL Penn State Laboratory Overview Presented to: ARCTIC SOF CAPABILITIES WORKSHOP Presented by: Mr. Tom Goodall 20 November 2014 ARL Penn State University-Affiliated Research Center (UARC) As a DoD designated
More informationU.S. Defense Priorities OSD PA&E
1 U.S. Defense Priorities Deter potential adversaries and defend America and American interests Counter asymmetric threats including terrorism, cyber attacks and ballistic and cruise missiles Fight and
More information2. APPLICABILITY AND SCOPE
Department of Defense DIRECTIVE NUMBER 1000.25 July 19, 2004 Certified Current as of April 23, 2007 USD(P&R) SUBJECT: DoD Personnel Identity Protection (PIP) Program References: (a) DoD Directive 1000.22,
More informationSTATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
More informationApplication of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports
2005 SRI International SRI International Company Proprietary Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports Presented to: 10 th Annual Harbor Safety
More informationUNCLASSIFIED. UNCLASSIFIED Defense Health Program Page 1 of 10 R-1 Line #9
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Defense Health Program Date: March 2014 0130: Defense Health Program / BA 2: RDT&E COST ($ in Millions) Prior Years FY 2013 FY 2014 OCO # Total FY
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1322.24 October 6, 2011 ASD(HA) SUBJECT: Reference: Medical Readiness Training (a) DoD Directive 5124.02, Under Secretary of Defense for Personnel and Readiness
More informationMiddle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
More informationCYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS Steve Mills DAU-South 1 Overview Questions Cybersecurity Owners and Stakeholders Cybersecurity Why It Matters to DoD Program Managers Defense Science
More informationCYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922.
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -
More informationBig Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation
More informationWhat s What Ahead For Architectures in the DoD? Mr. Dav Da e v DeVr DeV ies Mr. Martin Westphal
What s Ahead For Architectures in the DoD? Mr Dave DeVries Mr. Dave DeVries Mr. Martin Westphal What Has Happened Organization changes and declining budgets Progress made in Electronic Health Record Data
More informationInterim DoDI 5000.02 -- The Cliff Notes Version --
Interim DoDI 5000.02 -- The Cliff Notes Version -- A Quick Glance at New Guidance -- 17 December 2013 -- Defense Acquisition University/Midwest Region 5000Answers@dau.mil 17 Jan 2014, v 1.0 The New Department
More informationAdvanced Systems & Development
Advanced Systems & Development Transitioning to an Enterprise Ground System Lt Col Matt Kimsal SMC/ADY Envisioning and Shaping the Future of Space BLUF SMC/AD is generating a plan for the transformation
More informationOPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3000.15A USFF/CNO N3/N5 OPNAV INSTRUCTION 3000.15A From: Chief of Naval Operations
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3115.10E March 24, 2006 USD(I) SUBJECT: Intelligence Support to Personnel Recovery References: (a) Title 10, United States Code (b) Title 50, United States Code
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5000.70 May 10, 2012 Incorporating Change 1, Effective March 19, 2014 USD(AT&L) SUBJECT: Management of DoD Modeling and Simulation (M&S) Activities References:
More informationInformation Management for National Guard Agribusiness Development Teams: An Agile Development Case Study
Information Management for National Guard Agribusiness Development Teams: An Agile Development Case Study Authors: Lynndee Kemmet, Network Science Center at West Point; Ray McGowan, Army CERDEC; C. Reed
More informationJourney to Peak Performance. Mountain Point. NCTA Mobility Network Agile Methodologies
Journey to Peak Performance Mountain Point NCTA Mobility Network Agile Methodologies Background 2000: Inception U.S. Army Biometric Program 2003: Biometrics could be used to prevent the enemy in Iraq and
More informationNAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN 2013-2018 2 NAVAL SEA SYSTEMS COMMAND Foreword Everything the United States Navy brings to the fight, and ultimately does for the nation, is delivered
More information2013 2016 STRATEGIC PLAN
2013 2016 STRATEGIC PLAN Minnesota Bureau of Criminal Apprehension Contents Introduction... 1 DPS Mission BCA Mission BCA Vision BCA Values Agency History and Staffing...3 Organizational Chart Staff /
More informationImprovements Needed for Awarding Service Contracts at Naval Special Warfare Command
Inspector General U.S. Department of Defense Report No. DODIG-2015-124 MAY 15, 2015 Improvements Needed for Awarding Service Contracts at Naval Special Warfare Command INTEGRITY EFFICIENCY ACCOUNTABILITY
More informationENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE
ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality
More informationCOMBATSS-21 Scalable combat management system for the world s navies
COMBATSS-21 Scalable combat management system for the world s navies The COMBATSS-21 total ship combat management system was designed to deliver capability rapidly and affordably. Built on an open architecture,
More informationMHS Health Information Technology Transformation March 1, 2016
MHS Health Information Technology Transformation March 1, 2016 Colonel Richard Chip Terry Acting Military Health System Chief Information Officer Defense Health Agency Conflict of Interest Richard N. Terry,
More informationAeroVironment, Inc. Unmanned Aircraft Systems Overview Background
AeroVironment, Inc. Unmanned Aircraft Systems Overview Background AeroVironment is a technology solutions provider with a more than 40-year history of practical innovation in the fields of unmanned aircraft
More informationTo the Men and Women of the Coast Guard:
United States Coast Guard Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance & Information Technology (C4ISR&IT) Strategic Plan Fiscal Years 2015-2019 To the Men and
More informationCYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
More informationSystem Security Engineering
A Critical Discipline of SE Ms. Kristen Baldwin Director, Systems Analysis DDR&E/Systems Engineering 12th Annual NDIA Systems Engineering Conference 28 October 2009 10/28/09 Page-1 Defense Research & Engineering
More informationRequest for Records Disposition Authority
Records Schedule: DAA-0330-20.14-0006 Records Schedule Number Schedule Status DAA-0330-2014-0006 Approved Agency o~ Establishment Record Group I Scheduling Group Records Schedule applies to Major Subdivision
More informationUnited States Coast Guard Cyber Command. Achieving Cyber Security Together. Homeland Security
United States Coast Guard Cyber Command Achieving Cyber Together Brett Rouzer Chief of MCIKR Protection U.S. Coast Guard Cyber Command DHS NCCIC Liaison Officer (202) 372-3113 Brett.R.Rouzer@uscg.mil Vision
More informationCoast Guard Top Acquisition Priorities and the Interoperability Imperative
Coast Guard Top Acquisition Priorities and the Interoperability Imperative CG 9 Capt Joe Vojvodich, C4ISR Acquisition Program Mgr ComDef West 2010 01 February 2010 Advancing Force Multiplicity Coast Guard
More informationNICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8320.05 August 18, 2011 ASD(NII)/DoD CIO SUBJECT: Electromagnetic Spectrum Data Sharing References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes
More informationAFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015
AFCEA Aberdeen Luncheon Army Common Operating Environment (COE) Update Mr. Phillip Minor, Deputy Director, COE Directorate Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT))
More informationDepartment of Defense Fiscal Year (FY) 2016 President's Budget Submission
Department of Defense Fiscal Year (FY) 2016 President's Budget Submission February 2015 Defense Contract Management Agency Defense Wide Justification Book Volume 5 of 5 Research,, Test & Evaluation, Defense-Wide
More informationNetwork Systems Integration
Network Systems Integration Strong Networks for Mission-Critical Services Turnkey Solutions for Today s Large-Scale Networks Government and business enterprises turn to General Dynamics Information Technology
More informationIssue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett
Issue Paper Center for Strategic Leadership, U.S. Army War College May 2003 Volume 04-03 Wargaming Homeland Security and Army Reserve Component Issues By Professor Michael Pasquarett Background The President
More informationJOINT STATEMENT COMMISSION ON WARTIME CONTRACTING
JOINT STATEMENT COMMISSION ON WARTIME CONTRACTING TOTAL FORCE POLICY, THE QDR, AND OTHER DEFENSE OPERATIONAL PLANNING: WHY DOES PLANNING FOR CONTRACTORS CONTINUE TO LAG? JULY 12, 2010 Chairman Thibault,
More informationREQUEST FOR INFORMATION
Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services 3 September 2015 6506 Loisdale Rd, Ste 325
More informationStatement. Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation. Before
Statement of Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation Before THE UNITED STATES SENATE ARMED SERVICES COMMITTEE (SUBCOMMITTEE ON READINESS AND MANAGEMENT SUPPORT)
More informationRECORD VERSION STATEMENT BY BRIGADIER GENERAL PAUL A. OSTROWSKI PROGRAM EXECUTIVE OFFICER SOLDIER. and
RECORD VERSION STATEMENT BY BRIGADIER GENERAL PAUL A. OSTROWSKI PROGRAM EXECUTIVE OFFICER SOLDIER and MR. PETER B. BECHTEL, G-3/5/7 DIRECTOR, CAPABILITIES INTEGRATION, PRIORITIZATION AND ANALYSIS BEFORE
More informationRapid Prototyping: Leapfrogging into Military Utility
Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e Rapid Prototyping: Leapfrogging into Military Utility Mr. Randy Walden Air Force Rapid Capabilities Office (SAF/RCO)
More informationJump Starting Data Governance: a Program Manager's Story
Jump Starting Data Governance: a Program Manager's Story ABSTRACT One of the many challenges facing a federal organization endeavoring to implement an enterprise Data Governance framework involves the
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8440.01 December 24, 2015 DoD CIO SUBJECT: DoD Information Technology (IT) Service Management (ITSM) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority
More information