Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support

Size: px
Start display at page:

Download "Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support"

Transcription

1

2 Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support Flight Lieutenant Charles Winsor Royal Australian Air Force Dr Thomas Millhouse Nova Systems, Australia

3 Introduction Electronic Support systems depend on libraries of accurate, current and relevant mission data to identify emitters and provide tactical threat warning to aircraft and ships Electronic Warfare Operational Support is the process of updating these mission data libraries to adapt to changes in the operational environment

4 Introduction Library reprogramming has historically been treated like software development Software engineering standards demand time-consuming Verification and Validation for mission critical systems Verification and Validation provide assurance that an Electronic Support system will perform in its intended operational environment

5 Introduction Excessive Verification and Validation may compromise the essential responsiveness of Electronic Warfare Operational Support We propose a new approach to balance the rigour of software engineering with the responsiveness of Electronic Warfare Operational Support

6 Acknowledgement

7 Outline Electronic Support Mission Data Libraries Electronic Warfare Operational Support Verification and Validation Finding the Balance A New Approach

8 Electronic Support Electronic Support is the branch of Electronic Warfare that deals with the passive intercept, analysis and exploitation of electromagnetic radiation Electronic Support is used in modern warfare for surveillance, intelligence collection and tactical threat warning of radar-guided weapons

9 Electronic Support Electronic Support systems aim to: intercept and detect signals locate, identify and report emitters INTERCEPT Receiver DETECT LOCATE Signal Processor Mission Data Library REPORT Operator Display IDENTIFY

10 Mission Data Libraries Most Electronic Support systems are loaded pre-mission with reprogrammable mission data libraries These libraries enable automatic identification of detected emitters High quality libraries are essential to achieve timely threat warning: manual emitter identification by an operator is slow fast reactions needed against threats

11 Mission Data Libraries Emitter parameters form the basis of a mission data library: enables identification of emitters from detected signals Emitter-to-platform associations improve situational awareness: identified emitters may be correlated to known platforms or locations Additional information can be associated to emitters to improve situational understanding

12 Mission Data Libraries Mission data quality characteristics: Accuracy Currency Relevance All share a common dependence on time All are interdependent

13 Mission Data Libraries Mission data libraries are typically specified to suit an Area of Operations: libraries should be updated as emitters enter or leave the specified region Mission data is typically based on observed emitter parameters: libraries should be updated as emitter parameters change particularly important as we enter the era of software-defined radio

14 Consequences No identification Misidentification Ambiguous identification

15 Consequences No identification: no threat warning countermeasures not initiated platform loss Misidentification or ambiguous identification: false alarm wrong countermeasures initiated mission abort

16 EW Operational Support Aim To update libraries before they become ineffective or unsuitable for operational use Problem The electromagnetic environment may change significantly on a daily basis Challenge To complete post-mission analysis, update library requirements, develop an updated library, and verify and validate that library to a suitable extent all before the current library becomes an operational liability!

17 EW Operational Support Pre-Mission Upload Post-Mission Download OPERATE Mission Replay ANALYSE Resolve Anomalies Recommend Changes Validate Verify REPROGRAM Develop Design

18 Verification & Validation Australian Technical Airworthiness regulations treat mission data libraries as software (not as data): similar regulations are applied in the Australian maritime and land domains Software engineering standards like DO-178B are applied to routine library reprogramming: threat warning sensors are mission critical systems libraries may be assessed to need high Software Assurance Levels Assurance of mission critical software demands time-consuming Verification and Validation

19 Verification & Validation Verification The evaluation of whether or not a product complies with a requirement specification The library was developed correctly Validation The assurance that a product meets the needs of the customer The correct library was developed [IEEE ]

20 Verification & Validation Verification and Validation are important to provide assurance that mission data requirements are satisfied by a library......but those mission data requirements change whilst library Verification and Validation is being conducted An optimal balance must be found between rigour and responsiveness

21 Finding the Balance 1. Programming errors found and resolved 2. System performance optimisation 3. Mission data currency degradation 4. Mission data relevance degradation

22 Verification Software-only testing: basic error checking basic performance estimation Was the library implemented as designed? Hardware-in-the-loop testing: advanced error checking advanced performance estimation assess emitter interactions Does the library design satisfy its requirements?

23 Limitations of Verification The same mission data is used to develop and verify the library The performance of a library is fundamentally limited by the quality of the available mission data Verification predicts library performance assuming mission data is correct Library verification provides no assurance of underlying mission data quality

24 Validation Field testing: Were the library requirements fit for purpose? Options: controlled or mission conditions? generic test scenario or mission rehearsal? emitters of interest only, or background emissions as well?

25 Limitations of Validation High cost If emitter emulators are used, same fundamental limitation as verification: predicts library performance assuming emitter emulation is correct If authentic emitters are used, still not a true representation of the operational environment: no two radars emit exactly the same signal when does close enough become good enough?

26 A New Approach Verification and Validation are activities performed as part of the library reprogramming process Library reprogramming is an activity performed within the EWOS cycle What if we treated the entire EWOS cycle as a holistic Validation activity? Can rapid, continuous execution of the EWOS cycle fulfil the aim of Validation?

27 EWOS as Validation Collect test data from operations: true mission conditions emitters of interest background emitters Assess library performance in the operational environment through post-mission analysis Assess the ongoing suitability of library requirements: Were yesterday's library requirements still valid during today's mission? If not, what needs to change? And how else do we expect tomorrow's mission to change those library requirements?

28 EWOS as Validation Does rapid, continuous execution of the EWOS cycle mitigate the need for a formal Verification and Validation process? A low quality library can still cause mission failure or the loss of life and materiel: focussed testing of high risk emitters Potential to compound errors: initial library version must be of reasonable quality Similar principles to the Spiral Model for software development [Boehm, 1988]

29 EWOS as Validation OPERATE ANALYSE REPROGRAM [Boehm, 1988]

30 Improving Library Performance

31 Implementation Holistic consideration of Verification, Validation and the entire EWOS cycle Organisations, personnel and infrastructure capable of sustaining highly responsive EWOS Expertise to identify mission risks within libraries and tailor Verification and Validation processes to specifically address those risks: instead of blanket-application of generic software engineering standards to EWOS

32 Into the Future Mission data library development processes for Electronic Support systems are currently similar to the Waterfall Model [Royce, 1970] Rapid, continuous execution of the EWOS cycle could be considered similar to the Spiral Model [Boehm, 1988] Many new software development models have emerged in the last few decades Is it time for EWOS to move into the twenty-first century?

33 Conclusion Libraries of accurate, current and relevant mission data are essential to enable the performance of Electronic Support systems Low quality mission data libraries can result in mission failure and other serious consequences Assurance of library quality is conventionally achieved through application of software engineering rigour

34 Conclusion Conducting extensive Verification and Validation processes to assure library quality can actually reduce performance The EWOS cycle must be responsive to keep pace with an evolving electromagnetic environment A better balance must be found between rigour and responsiveness

35 References D.C. Schleher (1999), Electronic Warfare in the Information Age R.G. Wiley (2006), Electronic Intelligence: The Interception and Analysis of Radar Signals DO-178B, Software Considerations in Airborne Systems and Equipment Certification IEEE , A Guide to the Project Management Body of Knowledge W. Royce (1970), Managing the Development of Large Software Systems B. Boehm (1988), A Spiral Model of Software Development and Enhancement

36 Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support Flight Lieutenant Charles Winsor Royal Australian Air Force Dr Thomas Millhouse Nova Systems, Australia

37

38

Innovation. Performance. Security. SMARTSCAN man-portable land EW solutions. target. up-to-the-minute situational intelligence

Innovation. Performance. Security. SMARTSCAN man-portable land EW solutions. target. up-to-the-minute situational intelligence Innovation. Performance. Security SMARTSCAN man-portable land EW solutions target up-to-the-minute situational intelligence The increasing demands of Electronic Warfare As the digital era takes hold, the

More information

COMBATSS-21 Scalable combat management system for the world s navies

COMBATSS-21 Scalable combat management system for the world s navies COMBATSS-21 Scalable combat management system for the world s navies The COMBATSS-21 total ship combat management system was designed to deliver capability rapidly and affordably. Built on an open architecture,

More information

www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS)

www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) Certified Foundation Watchkeeper X is built to the same standards as a manned aircraft, and conforms to CAA/MAA standards. It

More information

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY

More information

Tactical Oil Spill Management TOSM APTOMAR.COM

Tactical Oil Spill Management TOSM APTOMAR.COM Tactical Oil Spill Management TOSM APTOMAR.COM TCMS AIRBORNE OFFSHORE NEAR SHORE ONSHORE Operations Room Oil Rig Oil Rig Standby Vesel SECurus Radar Surveillance Aircraft TACTICAL OIL SPILL MANAGEMENT

More information

Bio-inspired cyber security for your enterprise

Bio-inspired cyber security for your enterprise Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t

More information

Services we provide. Tel: +1 561-623-8810 email: [email protected] http://www.eetengineering.com

Services we provide. Tel: +1 561-623-8810 email: contracts@eetengineering.com http://www.eetengineering.com EET Engineering specializes in providing timely, cost-efficient, quality engineering solutions to support the successful implementation of our customer s requirements. For over 24 years, our leadership

More information

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 6 R-1 Line #165

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 6 R-1 Line #165 COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Cost To Complete Total Program Element - 5.071 5.512 5.956-5.956 6.075 6.063 6.181

More information

GCC Homeland Security in a New Order. Dr. Theodore Karasik Director of Research and Consultancy INEGMA. September 2013

GCC Homeland Security in a New Order. Dr. Theodore Karasik Director of Research and Consultancy INEGMA. September 2013 GCC Homeland Security in a New Order Dr. Theodore Karasik Director of Research and Consultancy INEGMA September 2013 Secular Sectarian Tribal State Actors Regional Shifts and Threats in the New Order A

More information

Position Descriptions. Aerospace

Position Descriptions. Aerospace Position Descriptions Aerospace Aerospace Engineering? Aeromechanics / Flight Control / Flight Qualities Engineer Predict, analyze, and verify air vehicle flight dynamics including aircraft aerodynamics,

More information

Rapid software development. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 17 Slide 1

Rapid software development. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 17 Slide 1 Rapid software development Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 17 Slide 1 Objectives To explain how an iterative, incremental development process leads to faster delivery of

More information

Electronic Warfare System 2015. Integrated Electronic Warfare System. Own the Enemy s Battlespace

Electronic Warfare System 2015. Integrated Electronic Warfare System. Own the Enemy s Battlespace Electronic Warfare System 2015 Integrated Electronic Warfare System Own the Enemy s Battlespace NOBODY WANTS A FAIR FIGHT DRS offers an Integrated Electronic Warfare (EW) System, with comprehensive training

More information

The future of range instrumentation.

The future of range instrumentation. ROCKWELL COLLINS Common Range Integrated Instrumentation System (CRIIS) The future of range instrumentation. A proven solution for accurately testing next-generation weapon systems. The speed and accuracy

More information

AIRBUS GROUP AUSTRALIA PACIFIC

AIRBUS GROUP AUSTRALIA PACIFIC AIRBUS GROUP AUSTRALIA PACIFIC GLOBAL EXPERTISE LOCAL FOCUS Airbus Group Australia Pacific is a part of Airbus Group, a global leader in aeronautics, space and related services. The Group comprises the

More information

Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition

Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition Paulo Marques 1 Instituto Superior de Engenharia de Lisboa / Instituto de Telecomunicações R. Conselheiro Emídio

More information

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD

More information

INTRUSION PREVENTION AND EXPERT SYSTEMS

INTRUSION PREVENTION AND EXPERT SYSTEMS INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla [email protected] Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion

More information

Integrating System Safety and Software Assurance

Integrating System Safety and Software Assurance Integrating System Safety and Software Assurance Systems Certification and Integrity Directorate of Aviation Engineering Directorate General Technical Airworthiness 1 Overview Integration of software assurance

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

Case No COMP/M.3649 - FINMECCANICA / BAES AVIONICS & COMMUNICATIONS. REGULATION (EC) No 139/2004 MERGER PROCEDURE

Case No COMP/M.3649 - FINMECCANICA / BAES AVIONICS & COMMUNICATIONS. REGULATION (EC) No 139/2004 MERGER PROCEDURE EN Case No COMP/M.3649 - FINMECCANICA / BAES AVIONICS & COMMUNICATIONS Only the English text is available and authentic. REGULATION (EC) No 139/2004 MERGER PROCEDURE Article 6(1)(b) NON-OPPOSITION Date:

More information

SADEC - VIRTUAL TRAINING LABORATORY

SADEC - VIRTUAL TRAINING LABORATORY SADEC - VIRTUAL TRAINING LABORATORY The Virtual Training Laboratory named SADEC (Simulatore di Addestramento alla Difesa Elettronica Configurabile) has been developed in order: to train EW (Electronic

More information

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports 2005 SRI International SRI International Company Proprietary Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports Presented to: 10 th Annual Harbor Safety

More information

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing

More information

Image courtesy Newcastle Port Corporation CENTRE FOR OPTIMAL PLANNING & OPERATIONS. Productivity and Efficiency for the Energy & Resources Sector

Image courtesy Newcastle Port Corporation CENTRE FOR OPTIMAL PLANNING & OPERATIONS. Productivity and Efficiency for the Energy & Resources Sector Image courtesy Newcastle Port Corporation CENTRE FOR OPTIMAL PLANNING & OPERATIONS Productivity and Efficiency for the Energy & Resources Sector The energy and resources sectors are critical drivers of

More information

Compliance Guide: ASD ISM OVERVIEW

Compliance Guide: ASD ISM OVERVIEW Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework

More information

Surveillance and Security Systems

Surveillance and Security Systems Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems

More information

Data center solutions from Siemens. For the factories of the 21 st century. siemens.com/datacenters

Data center solutions from Siemens. For the factories of the 21 st century. siemens.com/datacenters Data center solutions from Siemens For the factories of the 21 st century siemens.com/datacenters We face the challenges for the factories of the 21 st century Based on our vast experience, we offer a

More information

ASTRAEA the findings so far

ASTRAEA the findings so far ASTRAEA the findings so far Lambert Dopping- Hepenstal, FREng RPAS CivOps 2014 3 rd December 2014 Contents The ASTRAEA programme Regulatory engagement Programme achievement examples Communications Detect

More information

A Cyber Security Integrator s perspective and approach

A Cyber Security Integrator s perspective and approach A Cyber Security Integrator s perspective and approach Presentation to Saudi Arabian Monetary Agency March 2014 What is a Cyber Integrator? Security system requirements - Finance Building a specific response

More information

Responsible Investment Policy

Responsible Investment Policy (ABN 30 006 169 286) (AFSL 246664) October 2011 Version 4.0 (September 2011) Contents 1. Fund Objectives... 1 2. Implications of the Fund s Objectives on its Investments... 2 3. Policy on Responsible Investment...

More information

Propsim enabled Aerospace, Satellite and Airborne Radio System Testing

Propsim enabled Aerospace, Satellite and Airborne Radio System Testing www.anite.com Propsim enabled Aerospace, Satellite and Airborne Radio System Testing Anite is now part of Keysight Technologies Realistic and repeatable real-time radio channel emulation solutions for

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges

More information

Coordinated Operation Capability Using Scalable C2

Coordinated Operation Capability Using Scalable C2 Coordinated Operation Capability Using Scalable C2 Authors: Hüseyin KUTLUCA, İbrahim AKSU, Arda ÜNAL MilSOFT Yazılım Teknolojileri A.Ş. Teknokent, 06800 ODTU Ankara / TURKEY [email protected] [email protected]

More information

IAI/Malat Solutions for the Maritime Arena

IAI/Malat Solutions for the Maritime Arena IAI/Malat Solutions for the Maritime Arena Any country with a proximity to the sea has an important operational need to positively and unambiguously identify, in time, threats that originate in the maritime

More information

Observation and Findings

Observation and Findings Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network

More information

Sea Eagle FCCT. Naval Electro-Optical Fire Control System

Sea Eagle FCCT. Naval Electro-Optical Fire Control System CHESS DYNAMICS Sea Eagle FCCT Naval Electro-Optical Fire Control System Sea Eagle FCCT Sea Eagle FCCT (Fire Control Compact Turret) is an advanced electro-optical fire control system, optimised for deployment

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

How To Set Up A Wide Area Surveillance System

How To Set Up A Wide Area Surveillance System Introduction The purpose of this white paper is to examine the benefits and limitations of shore based marine radar for waterside security applications. This technology has been deployed for over 60 years

More information

Venator -110 General Purpose Light Frigate Technical Brief

Venator -110 General Purpose Light Frigate Technical Brief Technical Brief VENATOR-110 GENERAL PURPOSE LIGHT FRIGATE A TECHNICAL BRIEF 1. INTRODUCTION Flexible and affordable Globally deployable Fulfils comprehensive range of roles Designed for optimum balance

More information

IN FLIGHT SECURITY INCIDENT MANAGEMENT

IN FLIGHT SECURITY INCIDENT MANAGEMENT 1. Introduction IN FLIGHT SECURITY INCIDENT MANAGEMENT The tragic events on 9/11 drastically changed the way in-flight security incidents are managed. That day, the world witnessed an unprecedented dimension

More information

WWW.PACOM.COM. Pacom Systems. All rights reserved.

WWW.PACOM.COM. Pacom Systems. All rights reserved. WWW.PACOM.COM Pacom Systems. All rights reserved. SECURITY SOLUTIONS MANAGED SERVICES Did you know? Research shows that a remotely managed system can reduce false alarms by more than 90%.? 3 ? Managed

More information

UNCLASSIFIED PE 0604940D8Z 136.917 137.648 133.772 134.095 137.462 139.586 141.764 143.949

UNCLASSIFIED PE 0604940D8Z 136.917 137.648 133.772 134.095 137.462 139.586 141.764 143.949 Exhibit R-2, RDT&E Budget Item Justification February 2007 APPROPRIATION/BUDGET ACTIVITY R-1 ITEM NOMENCLATURE RDT&E, Defense Wide (0400), Budget Activity 6 0604940D8Z/Central Test and Evaluation Investment

More information

Encl: (1) Surface Warfare Tactical Requirement Group Membership

Encl: (1) Surface Warfare Tactical Requirement Group Membership DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 5420.113 N9 OPNAV INSTRUCTION 5420.113 From: Chief of Naval Operations Subj: SURFACE

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

TIBCO Cyber Security Platform. Atif Chaughtai

TIBCO Cyber Security Platform. Atif Chaughtai TIBCO Cyber Security Platform Atif Chaughtai 2 TABLE OF CONTENTS 1 Introduction/Background... 3 2 Current Challenges... 3 3 Solution...4 4 CONCLUSION...6 5 A Case in Point: The US Intelligence Community...7

More information

The European and UK Space Agencies

The European and UK Space Agencies The European and UK Space Agencies A response to the House of Commons Science and Technology Select Committee April 2013 Introduction The Royal Academy of Engineering is pleased to submit evidence to the

More information

PATRIOT MISSILE DEFENSE Software Problem Led to System Failure at Dhahran, Saudi Arabia

PATRIOT MISSILE DEFENSE Software Problem Led to System Failure at Dhahran, Saudi Arabia --.- /Initcd Stdcs General Accounting Offiw Ikport to the Chairman, Subcommittee on Investigations and Oversight, Committee on Science, Space, and Technology, House of Rcprcsentativcs PATRIOT MISSILE DEFENSE

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication

More information

COMPETITIVE INTELLIGENCE

COMPETITIVE INTELLIGENCE COMPETITIVE INTELLIGENCE GOVOREANU Alexandru MORA Andreea ŞERBAN Anca Abstract: There are many challenges to face in this century. It s an era of information. Those who have the best information are going

More information

A Methodology for Safety Critical Software Systems Planning

A Methodology for Safety Critical Software Systems Planning A Methodology for Safety Critical Software Systems Planning EHAB SHAFEI 1, IBRAHIM F. MOAWAD 2, HANY SALLAM 1, ZAKI TAHA 3, MOSTAFA AREF 3 1 Operation Safety and Human Factors Department, 2 Information

More information

Feedback on the Inquiry into Serious Injury. Presented to the Road Safety Committee of the Parliament of Victoria. 08 May 2013

Feedback on the Inquiry into Serious Injury. Presented to the Road Safety Committee of the Parliament of Victoria. 08 May 2013 Feedback on the Inquiry into Serious Injury Presented to the Road Safety Committee of the Parliament of Victoria 08 May 2013 About the APA The Australian Physiotherapy Association (APA) is the peak body

More information

Organizational Requirements Engineering

Organizational Requirements Engineering Chapter 9, Non-functional Requirements Organizational Requirements Engineering Prof. Dr. Armin B. Cremers Sascha Alda Armin B. Cremers, Sascha Alda Organizational Requirements Engineering 1 Overview of

More information

ELBIT SYSTEMS. Jefferies Global Industrials Conference - August 2014. Joseph Gaspar EVP & CFO

ELBIT SYSTEMS. Jefferies Global Industrials Conference - August 2014. Joseph Gaspar EVP & CFO ELBIT SYSTEMS Jefferies Global Industrials Conference - August 2014 Joseph Gaspar EVP & CFO AT A GLANCE HEADQUARTED ISRAEL with International Operations 11,700 EMPLOYEES 50% engineers TEL AVIV & NASDAQ

More information

Records Authority. Australian Security Intelligence Organisation

Records Authority. Australian Security Intelligence Organisation Records Authority Australian Security Intelligence Organisation This is an accurate reproduction of the authorised records authority content, created for accessibility purposes CONTENTS INTRODUCTION 3

More information

Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189

Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189 CALL FOR PAPERS for the IST/SET-126 Symposium on Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189 to be held in Norfolk Virginia,

More information

CUSTOMER KEYNOTE Hal Buddenbohm

CUSTOMER KEYNOTE Hal Buddenbohm CUSTOMER KEYNOTE Hal Buddenbohm Supply Chain Director ITT Force Protection Systems Hal Buddenbohm is the Supply Chain Director at ITT Force Protection Systems in Thousand Oaks, CA. Prior to joining ITT,

More information

30 In Compliance October 2014 www.incompliancemag.com

30 In Compliance October 2014 www.incompliancemag.com 30 In Compliance October 2014 www.incompliancemag.com Medical Devices in a Wireless World BY IVAYLO TANKOV While wireless technology is now an integral component of a wide variety of manufactured products,

More information

Data Intensive Science and Computing

Data Intensive Science and Computing DEFENSE LABORATORIES ACADEMIA TRANSFORMATIVE SCIENCE Efficient, effective and agile research system INDUSTRY Data Intensive Science and Computing Advanced Computing & Computational Sciences Division University

More information

Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, 2003. Internal Information Services

Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, 2003. Internal Information Services Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, 2003 Internal Information Services Outline Background Northrop Grumman Service Business Models Service as primary

More information

Socio technical Systems. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 2 Slide 1

Socio technical Systems. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 2 Slide 1 Socio technical Systems Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 2 Slide 1 Objectives To explain what a socio technical system is and the distinction between this and a computer

More information

Air Traffic Management Services Plan 2012-2017

Air Traffic Management Services Plan 2012-2017 Air Traffic Management Services Plan 2012-2017 Airservices Australia 2012 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process

More information

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 9410.5C N2/N6 OPNAV INSTRUCTION 9410.5C From: Chief of Naval Operations Subj: NAVY

More information

CLOUD. Enabling your location intelligence capability. Introducing PSMA Cloud

CLOUD. Enabling your location intelligence capability. Introducing PSMA Cloud CLOUD Enabling your location intelligence capability PSMA provides Australia s national asset of location datasets. Our flagship product is the Geocoded National Address File (G-NAF), recognised as the

More information

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT Mar 31, 2014 Japan Aerospace Exploration Agency This is an English translation of JERG-2-610. Whenever there is anything ambiguous in this document, the original

More information

How DCMA Helps To Ensure Good Measurements

How DCMA Helps To Ensure Good Measurements How DCMA Helps To Ensure Good Measurements Speaker/Author: Robert Field Defense Contract Management Agency 605 Stewart Avenue Garden City, New York 11530 Email: [email protected] Phone: (516) 228-5886;

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Certification Authorities Software Team (CAST) Position Paper CAST-3

Certification Authorities Software Team (CAST) Position Paper CAST-3 Certification Authorities Software Team (CAST) Position Paper CAST-3 Guidelines for Assuring the Software Aspects of Certification When Replacing Obsolete Electronic Parts Used in Airborne Systems and

More information

Speeding up Level 3 CMM Certification Process with Estimation Tool General Dynamics Calgary

Speeding up Level 3 CMM Certification Process with Estimation Tool General Dynamics Calgary Speeding up Level 3 CMM Certification Process with Estimation Tool General Dynamics Calgary Implementing a commercial estimation software tool has eliminated one to two years of data collection, quickening

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

DRONE DETECTION RADAR

DRONE DETECTION RADAR DRONE DETECTION RADAR MEETING TODAY S CHALLENGES Drones are increasingly becoming wide spread. They ve become affordable, easy to obtain and simple to fly. This creates new opportunities, but also poses

More information

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9

More information

PRIVACY POLICY. This document is our privacy policy and it tells you how we collect and manage your personal information.

PRIVACY POLICY. This document is our privacy policy and it tells you how we collect and manage your personal information. PRIVACY POLICY Introduction iproximity Pty Ltd (we, our, us) recognise the importance of protecting the privacy and the rights of individuals in relation to their personal information this includes existing

More information

FCC HOMELAND SECURITY LIAISON ACTIVITIES

FCC HOMELAND SECURITY LIAISON ACTIVITIES FCC HOMELAND SECURITY LIAISON ACTIVITIES Committee on National Security Systems (CNSS) The CNSS consists of sixty Federal departments and agencies. The CNSS provides a forum for the discussion of policy

More information

Why it may be time to consider Certified Avionics for UAS (Unmanned Aerial Vehicles/Systems) White paper

Why it may be time to consider Certified Avionics for UAS (Unmanned Aerial Vehicles/Systems) White paper Why it may be time to consider Certified Avionics for UAS (Unmanned Aerial Vehicles/Systems) White paper UAS growth There are a number of different UAS types flying today in multiple applications. There

More information

PERSONNEL SECURITY PRACTICAL ADVICE FOR HR AND SECURITY MANAGERS

PERSONNEL SECURITY PRACTICAL ADVICE FOR HR AND SECURITY MANAGERS PERSONNEL SECURITY PRACTICAL ADVICE FOR HR AND SECURITY MANAGERS A DELICATE BALANCE Every year brings stories of organisations falling victim to the embarrassing, costly or disruptive consequences of staff

More information

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE G2 Industry Day 2015 29 JULY 2015 Mr. Stephen Kreider PEO IEW&S 1 PEO IEW&S Organization 2 PEO IEW&S Snap-Shot Overview Army Chartered Program Executive Officer responsible for management of assigned programs

More information

WHY THE WATERFALL MODEL DOESN T WORK

WHY THE WATERFALL MODEL DOESN T WORK Chapter 2 WHY THE WATERFALL MODEL DOESN T WORK M oving an enterprise to agile methods is a serious undertaking because most assumptions about method, organization, best practices, and even company culture

More information

Type selection of. DenMARK S new

Type selection of. DenMARK S new Executive Summary Type selection of DenMARK S new fighter aircraft Evaluations of EuRofighter, Joint Strike Fighter and Super Hornet SUMMARY Objective The objective of this basis for decision is to present

More information

Should you allow your employees to bring their own technology to work?

Should you allow your employees to bring their own technology to work? Should you allow your employees to bring their own technology to work? August 2014 Should you allow your employees to bring their own technology to work? Known by a number of terms such as Bring Your Own

More information

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8320.05 August 18, 2011 ASD(NII)/DoD CIO SUBJECT: Electromagnetic Spectrum Data Sharing References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes

More information

Prepared for tomorrow s challenges with your global full service partner

Prepared for tomorrow s challenges with your global full service partner Prepared for tomorrow s challenges with your global full service partner The changing nature of conflicts RUAG Defence: independent, flexible, solution-oriented RUAG Defence stands for top-level technological

More information

The Moloney Asset Management System (MAMS)

The Moloney Asset Management System (MAMS) The Moloney Asset Management System (MAMS) Software specialising in the management and condition assessment of Local Government Infrastructure Assets 20 February 2013 Prepared By Jason Strawbridge Spiire

More information

The Truth about False Positives

The Truth about False Positives An ISS Technical White Paper The Truth about False Positives 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Overview In the security industry, many security analysts remark that

More information

National Information Assurance Certification and Accreditation Process (NIACAP)

National Information Assurance Certification and Accreditation Process (NIACAP) NSTISSI No. 1000 April 2000 National Information Assurance Certification and Accreditation Process (NIACAP) THIS DOCUMENT PROVIDES MINIMUM STANDARDS. FURTHER INFORMATION MAY BE REQUIRED BY YOUR DEPARTMENT

More information

NATIONAL TABLE OF FREQUENCY ALLOCATIONS

NATIONAL TABLE OF FREQUENCY ALLOCATIONS State Commission on Radio Frequencies of the Republic of Moldova NATIONAL TABLE OF FREQUENCY ALLOCATIONS Adopted by Decision of the State Commission on Radio Frequencies of the Republic of Moldova no.

More information

Introduction to PAS 127:2014 Checkpoint security screening of people and their belongings Guide

Introduction to PAS 127:2014 Checkpoint security screening of people and their belongings Guide Introduction to PAS 127:2014 Checkpoint security screening of people and their belongings Guide Introduction PAS 127:2014 is a guide to checkpoint security screening of people and their belongings within

More information

Guidance for Data Users on the Collection and Use of Personal Data through the Internet 1

Guidance for Data Users on the Collection and Use of Personal Data through the Internet 1 Guidance for Data Users on the Collection and Use of Personal Data through the Internet Introduction Operating online businesses or services, whether by commercial enterprises, non-government organisations

More information

Achieve. Performance objectives

Achieve. Performance objectives Achieve Performance objectives Performance objectives are benchmarks of effective performance that describe the types of work activities students and affiliates will be involved in as trainee accountants.

More information

Extended Resolution TOA Measurement in an IFM Receiver

Extended Resolution TOA Measurement in an IFM Receiver Extended Resolution TOA Measurement in an IFM Receiver Time of arrival (TOA) measurements define precisely when an RF signal is received, necessary in the identification of type and mode of RF and radar

More information

International Investigator Course

International Investigator Course International Investigator Course By the Institute for International Criminal Investigations COURSE OVERVIEW. The IICI International Investigator Course covers four topic areas considered essential to

More information