Director of Intelligence Proposed Research Topics
|
|
|
- Stanley Carson
- 10 years ago
- Views:
Transcription
1 Director of Proposed Research Topics Suggested Graduate Program Thesis Topics Headquarters, U.S., 3000, Pentagon, Room 1A262B, Washington, DC Sept 2011
2 DIRINT Suggested Graduate Program Thesis Topics In an effort to align the Enterprise investment in the Special Education Program and Professional Military Education Programs with the real problem solving needs of our Service the Director of, solicits thesis topics from operating force and supporting establishment should have some linkage to the Enterprise. The DIRINT's intent in gathering and disseminating these topics is to encourage USMC Officers in the Special Education Program to co research and write on topics that matter most to the, Surveillance and Reconnaissance Enterprise (without infringing on academic freedoms). Topics can cover virtually any matter of interest across the DOTMLPF spectrum. The key point is that the topics As this initiative matures, the DIRINT's intent is to assign each student a mentor from within the Enterprise to assist the student with his or her research. Additionally, thesis topic sponsors may provide TAD or other funding to support the students' research efforts. Manpower and Training Branch is coordinating across the Enterprise to identify key intelligence billets for Special Education Program graduates. The DIRINT's intent is for the Occupation Field Sponsor to assist Manpower Division with identifying for each program graduate an appropriate payback billet that directly ties to the thesis topic. Officers pursuing graduate degrees at Intermediate or Top Level Schools are also encouraged to conduct research on one of these topics. If you choose to conduct research or write on one of the DIRINT's topics, notify the Topic Originator and the Chief, Manpower and Training Branch (POC info below). The DIRINT's list of these topics will be updated regularly. To add a topic to the list, contact, the Chief, Manpower and Training Branch at ; [email protected]. 2
3 Topic Research Area Originator POC Info Acquisition Acquisition Acquisition Cyber & Electronic Attack Techniques Transitioning Science or Technology Investments into Battlefield Capabilities from Systems Integration Laboratories to Service Level Programs. Instilling Programmatic Simplicity and Cost Effectiveness through the Migration and Convergence of Material Capability Sets. Adopting an Enterprise Requirements Plan (ERP) Approach to "Generate" vice "Write" JCIDS Requirements through Semantically Rich, Machine Readable Language. As USMC cyber functions, activities, and capabilities within the Marine Corps become more mature, there are areas where cyber and intel may remain separate, merge, or have a supporting/supported relationship. Can we define what mission sets should belong to cyber, intel, or a merged capability? What are the boundaries of cyber and intel interns of concept of employment, command relationships, and legal and operation authorities? Should there by any modifications to those boundaries? MAGTF Electronic Attack requires reanalysis. What enemy C2 capabilities are we likely to face in the future? Future EA techniques may need to be looked at from the perspective of data links versus the predominant Layer 1 OSI layer. Different dimensions may need to be analyzed to determine appropriate techniques that could be utilized when considering Software Radios, Platform Independent Module, Platform Dependant Module, software controlled smart antennas via an open standard, effective radio power settings that support incremental power output settings and the availability of Open Software. Some research and travel support may be available to interested students. Marine Corps Marine Corps Marine Corps LtCol Thomas Naughton, Intel Dept, HQMC David Coe, Intel EW Team Engineer, PM Systems, PG12 CINS, Marine Corps Systems Command [email protected] [email protected] 3
4 Topic Research Area Originator POC Info EW Battle Federal Acquisition & Procurement The integration and management of Electronic Warfare capabilities across the MAGTF is diverse. With multiple ground based Electronic Warfare (EW) capable platforms (CREW, CESAS, RREP, MEWSS) spread out across the battle field, aviation assets, and CREW; how do we link them together to establish an EW enterprise? How do we deconflict EW, COMINT, and Communications? Some research and travel support may be available to interested students. The acquisition of IT and Intel equipment and services with two major overseas contingencies and numerous smaller global counterterrorist/ counterinsurgency operations ongoing has showed major inadequacies within the federal acquisition and procurement system. The momentum of the procurement of intel systems, the tech refresh of those systems, the rapid pace of commercial technology advancement, and the pact of buying IT equipment and services is in direct conflict with DoD 5000 series program requirements. DoD 5000 doesn't accommodate the procurement of new technologies, particularly for ACAT IV and urgent need programs that the operating forces wanted fielded in month's vs years. We have been working in these confines for a long time, and as budgets get tighter (read more competition which takes more time), and expectations of the war fighter increase, we will come to critical mass soon. Will we be able to adequately support the war fighter in this situation? Some research and travel support may be available to interested student. Michael Stanford, Intel EW Team Lead, PM Systems, PG12 CINS, Systems Command Scott Bishop Contracting PM Systems, PG12 CINS, System Command [email protected] [email protected] 4
5 Topic Research Area Originator POC Info Foreign Military Acquisition Strategies Assurance What are the acquisition priorities of the BRIC countries (Brazil, Russia, India, and China)? What are the challenges that will face in achieving their acquisition goals? If achieved, how will these goals shape the global and regional security environment? What are the USMC OTMLPF implications? of our ability to protect sensitive information and the Assurance (IA) process within DoD. What is its effectiveness, and impacts to the ability to fielding a new software baseline. What can be learned from commercial industry practices? How does it affect the operating forces? Some research and travel support may be available to interested students. What are the implications of cloud computing for networks, systems, and operation and concepts? What are the implications of cloud computing for networks, systems, and operation and concepts? Work flow modeling in intelligence units and organizations. Intra and inter domain management of intelligence data and information. Achieve a common computing environment across MCISR E. Mr. Dan Fitzgerald, Deputy Program Manager, Systems, PG12 CINS, Systems Command [email protected] 5
6 Topic Research Area Originator POC Info & Communications Combat Lessons Learned and New Requirements & Service Title 10 Activities Tackling the Data Glut Challenge from the Tactical Level up: Planning, Identifying, Exploitation & Disseminating Timely, Relevant Bits. Achieving a One Desktop Solution for Analysts and Operators (convergence of CIDNE, ML, TIGR, etc.) of and Communications lessons learned topics from combat operations. How effective have our processes been, and how might these processes be made more effective? What roles and missions in the combat development process might be streamlined to make this process faster? Some research and travel support may be available to interested student. What are the methods and means by which USMC intelligence capabilities can best support the Commandant s Title X responsibilities of organizing, equipping, training, and providing forces to support National Command Authority objectives? How do the clearly articulate intelligence requirements, satisfy those requirements and provide intelligence products which support the planning, development, acquisition and sustainment of USMC capabilities (equipment, training, and manpower) to support future USMC missions? Are there models which can be used to better forecast future threat environments and enemy capabilities? Mr. Dan Fitzgerald, Deputy Program Manager, Systems, PG12 CINS, Systems Command Ms Cheryl Young, Intel Dept, HQMC [email protected] [email protected] 6
7 Topic Research Area Originator POC Into Flow Systems Architecture The availability of Intel information has exploded resulting in data overload for Intel analysts and commanders. Research and propose how we can better manage & process the information flow beyond the Intel enterprise to support integration into combat decision cycles at various echelons of the MAGTF, Research and propose how we will ultimately merge all this data into an understandable, useful repository that drives actionable decision making. Some research and travel support may be available to interested students. Constructing a Service Wide Enterprise Architecture through an Incremental, Evolutionary, Product Line Architecture Approach that mirrors Service War fighting Functions (IPISR PLA + IDU PLA + DCGS PLA = MCISR EA) + C2 PLA + FORCEPRO PLA + LOG PLA + MANEUVER PLA + FIRE PLA = USMC EA). What are the most likely antiaccess/area denial threats in the next years? Where are these threats most likely to occur? How can they be deterred or countered? What are the DOTMLPF implications? What are the top 5 opportunities for USMC engagement in the next years? Where are these opportunities most like to occur? What will be the primary threats and challenges? What are the DOTMLPF implications? What will an evolved hybrid threat ("Hybrid War 2.0") look like? What are the likely TTP's of an evolved hybrid adversary? Where is this threat most likely to operate? What are the likely DOTMLPF implications? Mr. John Powers, Program Manager, Data Fusion & Dissemination (IDF&D) Systems, PG12 CINS, System Command [email protected] Topic Research Area Originator POC Into 7
8 Who are our most likely competitors for control of the global commons? How will competition with these competitors shape the future security environment? What are the DOTMLP implications for the USMC? How will climate change affect the emerging security environment? Where will climate change have the most impact? What will be the threats and challenges to countering this threat? What are the DOTMLPF implications? Will Distributed Denial of Service (DDoS) operations similar to what we saw in Estonia (2006) pose a threat to future USMC operations? Where and how are these attacks likely to emerge? How can they be deterred, countered, or defeated? What are the top 5 technology trends likely to shape the security environment in the next years? Where is resource competition most likely to create conflict in the next years? Can this conflict be prevented through USMC engagement? If so, what are the threats and challenges to doing so? How will the shifting nature of partnerships / coalitions in the post OIF/OEF security environment affect USMC operations? Who will be our most likely partners/allies? How can we improve interoperability with these potential "friends"? 8
9 Topic Research Area Originator POC Into Rapid Prototyping Model What are some models (other Services other government agencies), processes, and best practices to create and sustain a rapid prototype and innovation activity for USMC intelligence capabilities? Items to consider are effectiveness in terms of transitioning prototypes to Program of Record capabilities; adherence/compliance to law, policy, and regulation (e.g., Federal Acquisition Regulation RAR); and current USMC construct for research and development, prototyping activities, and systems acquisition. Mr. Jeffrey Small Intel Dept HQMC [email protected] 9
Forecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 9410.5C N2/N6 OPNAV INSTRUCTION 9410.5C From: Chief of Naval Operations Subj: NAVY
OPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3000.15A USFF/CNO N3/N5 OPNAV INSTRUCTION 3000.15A From: Chief of Naval Operations
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE
G2 Industry Day 2015 29 JULY 2015 Mr. Stephen Kreider PEO IEW&S 1 PEO IEW&S Organization 2 PEO IEW&S Snap-Shot Overview Army Chartered Program Executive Officer responsible for management of assigned programs
Systems Engineering and Integration Efforts. 11 Dec 2013
Systems Engineering and Integration Efforts 11 Dec 2013 Mr. Leo Smith Director, PoR Engineering Support ASA(ALT) System of Systems Engineering & Integration Directorate (SOSE&I) Approved for Public Release;
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
Marine Corps. Commercial Mobile Device Strategy
Marine Corps Commercial Mobile Device Strategy April 2013 THIS PAGE INTENTIONALLY LEFT BLANK FOREWORD The currently constrained budget environment requires us to balance fiscal responsibility and mission
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement 1.0 INTRODUCTION The Department of the Navy Space and Naval Warfare Systems
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems
Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY
AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013
AIR- SEA BATTLE Service Collaboration to Address Anti-Access & Area Denial Challenges White PantoneBlackC PantoneReflexBlueC Pantone 116C Pantone 165C Pantone 422C Pantone 471C Pantone 551C May 2013 This
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8320.05 August 18, 2011 ASD(NII)/DoD CIO SUBJECT: Electromagnetic Spectrum Data Sharing References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes
AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration
Headquarters Air Combat Command AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration This Briefing is: UNCLASSIFIED Mr. John Vona, GS-15 AFC2IC/C2P Purpose Discuss
The State of DoD Biometrics
The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E [email protected] 1 Agenda What We ve Done Biometrics
DOCUMENT CHANGE RECORD
DOCUMENT CHANGE RECORD Version Number Date Description V 0.1 April 19, 2010 Pre-Decisional Draft Release V 0.2 July 23, 2010 Pre-Decisional Draft Release V 0.3 September 15, 2010 Pre-Decisional Draft Release
Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace
, pp.137-146 http://dx.doi.org/10.14257/ijseia.2014.8.9.11 Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace Jung ho Eom Military Studies, Daejeon University, 62 Daehakro,
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
Program Manager Information Systems & Infrastructure. Mr. Dan Corbin
Program Manager Information Systems & Infrastructure Mr. Dan Corbin 22 SEPTEMBER 2015 1 MARCORSYSCOM PEO Land Systems Staff Staff Deputy Commander Resource Management Deputy Commander SIAT Assistant Commander
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations
ReMilNet Service Experience Overview
ReMilNet Service Experience Overview ReMilNet s knowledge across all functional service areas enables us to provide qualified personnel with knowledge across the spectrum of support services. This well
UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 6 R-1 Line #165
COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Cost To Complete Total Program Element - 5.071 5.512 5.956-5.956 6.075 6.063 6.181
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology [email protected] 256.922.
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology [email protected] 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
UNCLASSIFIED R-1 ITEM NOMENCLATURE
Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Office of Secretary Of Defense DATE: April 2013 COST ($ in Millions) All Prior Years FY 2012 FY 2013 # Base OCO ## FY 2015 FY 2016 FY 2017 FY 2018
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5000.01 May 12, 2003 Certified Current as of November 20, 2007 SUBJECT: The Defense Acquisition System USD(AT&L) References: (a) DoD Directive 5000.1, The Defense
GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
Navy Information Dominance Industry Day
Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic
AUSA Background Brief
AUSA Background Brief No. 96 November 2002 An Institute of Land Warfare Publication Space, Missile Defense and Computer Network Operations Challenges: Computer Network Operations: A Critical Element of
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING
SECNAV INSTRUCTION 1543.2 From: Secretary of the Navy SECNAVINST 1543.2 DON CIO Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING Ref: See Enclosure (1) Encl: (1) References (2) Responsibilities
ort Office of the Inspector General Department of Defense YEAR 2000 COMPLIANCE OF THE STANDARD ARMY MAINTENANCE SYSTEM-REHOST Report Number 99-165
it ort YEAR 2000 COMPLIANCE OF THE STANDARD ARMY MAINTENANCE SYSTEM-REHOST Report Number 99-165 May 24, 1999 Office of the Inspector General Department of Defense Additional Copies To obtain additional
DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350 3000
DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350 3000 MCO 3030.1 POC MARINE CORPS ORDER 3030.1 From : To: Commandant of the Marine Corps Distribution
This Conference brought to you by www.ttcus.com
This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com U.S. Army Intelligence and Security Command Army
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)
The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL
The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term
Who s got the grease pencil?! What Cyber Security can Learn from the Outer Air Battle
Phantom Works Advanced Modeling & Simulation Who s got the grease pencil?! What Cyber Security can Learn from the Outer Air Battle Mark N. Clemente 15 th ICCRTS June 22, 2010 BOEING is a trademark of Boeing
Threat Intelligence: Friend of the Enterprise
SECURELY ENABLING BUSINESS Threat Intelligence: Friend of the Enterprise Danny Pickens Principal Intelligence Analyst MSS FishNet Security DANNY PICKENS Principal Intelligence Analyst, FishNet Security
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
Encl: (1) Surface Warfare Tactical Requirement Group Membership
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 5420.113 N9 OPNAV INSTRUCTION 5420.113 From: Chief of Naval Operations Subj: SURFACE
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012
(U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)
U.S. DoD Physical Security Market
U.S. DoD Physical Security Market Technologies Used for DoD Applications June 2011 Table of Contents Executive Summary 7 Introduction 8 Definitions and Scope 9-11 Percentage of FY 2010 Total Budget Request
Towards Software Engineering Process for C4I Systems
Towards Software Engineering Process for C4I Systems Tazar Hussain, Khalid Naseer Al-Mutib, Abdullah Sharaf Alghamdi Department of Software Engineering College of Computer and Information Sciences, King
COL Joe Capobianco Program Executive Officer
COL Joe Capobianco Program Executive Officer SOF WARRIOR Operator Focused: On Time, On Target! SPECIAL OPERATIONS RESEARCH, DEVELOENT, & ACQUISITION CENTER Commander Acquisition Executive Deputy Military
Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission
Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST
Considerations: Mastering Data Modeling for Master Data Domains
Considerations: Mastering Data Modeling for Master Data Domains David Loshin President of Knowledge Integrity, Inc. June 2010 Americas Headquarters EMEA Headquarters Asia-Pacific Headquarters 100 California
DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO
DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes
Department of the Navy ebusiness Operations Office
ebus iness Innovation DON Card Management www.don-ebusiness.navsup.navy.mil Department of the Navy ebusiness Operations Office Presented by: Ms. Karen Meloy Deputy Commander, DON ebusiness Operations Office
Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS)
Department of Defense DIRECTIVE NUMBER 4630.05 May 5, 2004 Certified Current as of April 23, 2007 ASD(NII)/DoD CIO SUBJECT: Interoperability and Supportability of Information Technology (IT) and National
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Army Intelligence Industry Day Foundation Layer Technology Focus Areas
CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,
MCO 5220.12 LR 15 May 2009
LR MARINE CORPS ORDER 5220.12 From: Commandant of the Marine Corps To: Distribution List Subj: MARINE CORPS CONTINUOUS PROCESS IMPROVEMENT Ref: (a) DOD Directive 5010.42, DOD-Wide Continuous Process Improvement
CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
Some Thoughts on the Future of Cyber-security
Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
Applying Business Architecture to the Cloud
Applying Business Architecture to the Cloud Mike Rosen, Chief Scientist Mike.Rosen@ WiltonConsultingGroup.com Michael Rosen Agenda n What do we mean by the cloud? n Sample architecture and cloud support
DISA Testing Services for the Enterprise. Luanne Overstreet
DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information
Software Sustainment Issues and Challenges
Software Sustainment Issues and Challenges 9 December 2015 Presented to: 2015 DoD Maintenance Symposium Distribution Statement A. Approved for Public Release. Distribution is unlimited (3 December 2015).
FACT SHEET. General Information about the Defense Contract Management Agency
FACT SHEET General Information about the Defense Contract Management Agency Mission: We are the independent eyes and ears of DoD and its partners, delivering actionable acquisition insight from the factory
Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength
Enterprise IT Aligning Strong Solutions, Assuring Enterprise Strength Strategic planning aligns your enterprise IT infrastructure with your mission, operational and efficiency goals. From the start, we
Information Management for National Guard Agribusiness Development Teams: An Agile Development Case Study
Information Management for National Guard Agribusiness Development Teams: An Agile Development Case Study Authors: Lynndee Kemmet, Network Science Center at West Point; Ray McGowan, Army CERDEC; C. Reed
CUSTOMER KEYNOTE Hal Buddenbohm
CUSTOMER KEYNOTE Hal Buddenbohm Supply Chain Director ITT Force Protection Systems Hal Buddenbohm is the Supply Chain Director at ITT Force Protection Systems in Thousand Oaks, CA. Prior to joining ITT,
Battlespace Awareness and Information Operations Program Office (PMW 120)
Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) Battlespace Awareness and Information Operations Program Office (PMW 120) Statement A: Approved for public
COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
UNCLASSIFIED R-1 ITEM NOMENCLATURE
COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program Element 9.986 10.218 19.380-19.380 19.060 19.332 19.217 19.405 Continuing Continuing
Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models
G00237716 Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models Published: 6 February 2013 Analyst(s): David W. Cearley, Donna Scott, Joe Skorupa, Thomas J. Bittman Cloud
Office of Warfighting Integration and Chief Information Officer SAF/CIO A6. Mission Brief
Office of Warfighting Integration and Chief Information Officer SAF/CIO A6 Mission Brief AF Mission The mission of the United States Air Force is to fly, fight and win in air, space and cyberspace. 2 Continue
ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE
ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality
Fight the Network. Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches [email protected]. Briefing name l Date (1)
Fight the Network Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches [email protected] Briefing name l Date (1) Problem Army Strategy for Net-Centric Fighting Force
THE UNDER SECRETARY OF DEFENSE 3010 DEFENSE PENTAGON WASHINGTON, DC 20301 3010
THE UNDER SECRETARY OF DEFENSE 3010 DEFENSE PENTAGON WASHINGTON, DC 20301 3010 ACQUlsmON, TECHNOLOGY AND LOG ISTICS AUG 1 0 2011 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT
Joint Operational Medicine Information Systems Program
COL John R. Bailey, Deputy Program Manager 2015 Defense Health Information Technology Symposium Joint Operational Medicine Information Systems Program 1 DHA Vision A joint, integrated, premier system of
Security and Emergency Services Community of Interest 0089 Emergency Management Career Road Map
Security and Emergency Services Community of Interest 0089 Emergency Management Career Road Map Prepared by: Booz Allen Hamilton Career Progression within the 0089 Occupational Series is Marked by Support
Long Term Defence Study
Long Term Defence Study 2014-09-10 LtCol Johan Hansson SwAF HQ 1 Long Term Defence Studies Three main objectives: To identify uncertainties. To create some scenarios which demonstrates the coming challenges
Intelligence Officer Career Guide
UNITED STATES COAST GUARD Intelligence Officer Career Guide Active Duty LTJG CAPT Table of Contents The General Development of an Officer... 3 Building the Intelligence Officer... 3 1. Training... 4 2.
How To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3115.12 August 24, 2010 USD(I) SUBJECT: Open Source Intelligence (OSINT) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes policy, assigns
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
The US Marine Corps: Fleet Marine Forces for the Twenty First Century. By Dakota L. Wood
S T R A T E G Y F O R T H E L O N G H A U L The US Marine Corps: Fleet Marine Forces for the Twenty First Century By Dakota L. Wood Marine Corps Forces Today ~200K on active duty 37,000 forward deployed
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals JANUARY 2014 Deputy Assistant Secretary of Defense for Systems
Corporate Overview A
Corporate Overview A WHO WE ARE ManTech International Corporation uses advanced technology to help government and industry meet some of their greatest challenges and succeed in their most important endeavors.
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN 2013-2018 2 NAVAL SEA SYSTEMS COMMAND Foreword Everything the United States Navy brings to the fight, and ultimately does for the nation, is delivered
Cybersecurity Strategic Talent Management. March, 2012
Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
Team Orlando International Team Analysis. By Capital Communications & Consulting, 2013
Team Orlando International Team Analysis By Capital Communications & Consulting, 2013 Table of Contents The U.S. Army Research Laboratory Human Research & Engineering Directorate Simulation & Training
Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA
Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA A Marine Corps fighting force armed with assured, secure, accurate, and timely information,
AT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
Table of Contents CYBER SECURITY STRATEGIC PLAN VERSION 1.0
U.S DEPARTMENT OF ENERGY CYBER SECURITY PROGRAM CYBER SECURITY STRATEGIC PLAN FEBRUARY 12, 2007 Table of Contents INTRODUCTION... 4 CYBER SECURITY STRATEGY OVERVIEW... 5 CYBER SECURITY VISION AND MISSION...
