Director of Intelligence Proposed Research Topics



Similar documents
Forecast to Industry 2015

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

OPNAVINST A USFF/CNO N3/N5 10 Nov 2014

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

Department of Defense NetOps Strategic Vision

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

G2 Industry Day JULY Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE

Systems Engineering and Integration Efforts. 11 Dec 2013

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

Marine Corps. Commercial Mobile Device Strategy

SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement

Cybersecurity: Mission integration to protect your assets

DoD Strategy for Defending Networks, Systems, and Data

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013

Department of Defense INSTRUCTION

AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration

The State of DoD Biometrics

DOCUMENT CHANGE RECORD

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

Program Manager Information Systems & Infrastructure. Mr. Dan Corbin

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

ReMilNet Service Experience Overview

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 6 R-1 Line #165

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

UNCLASSIFIED R-1 ITEM NOMENCLATURE

Department of Defense DIRECTIVE

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

Navy Information Dominance Industry Day

AUSA Background Brief

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING

ort Office of the Inspector General Department of Defense YEAR 2000 COMPLIANCE OF THE STANDARD ARMY MAINTENANCE SYSTEM-REHOST Report Number

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC

This Conference brought to you by

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

Who s got the grease pencil?! What Cyber Security can Learn from the Outer Air Battle

Threat Intelligence: Friend of the Enterprise

Department of Defense DIRECTIVE

Encl: (1) Surface Warfare Tactical Requirement Group Membership

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy February 2012

U.S. DoD Physical Security Market

Towards Software Engineering Process for C4I Systems

COL Joe Capobianco Program Executive Officer

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS K CH-63

Considerations: Mastering Data Modeling for Master Data Domains

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

Department of the Navy ebusiness Operations Office

Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS)

An Overview of Large US Military Cybersecurity Organizations

Army Intelligence Industry Day Foundation Layer Technology Focus Areas

MCO LR 15 May 2009

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

Some Thoughts on the Future of Cyber-security

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

Applying Business Architecture to the Cloud

DISA Testing Services for the Enterprise. Luanne Overstreet

Software Sustainment Issues and Challenges

FACT SHEET. General Information about the Defense Contract Management Agency

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength

Information Management for National Guard Agribusiness Development Teams: An Agile Development Case Study

CUSTOMER KEYNOTE Hal Buddenbohm

Battlespace Awareness and Information Operations Program Office (PMW 120)

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

UNCLASSIFIED R-1 ITEM NOMENCLATURE

Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models

Office of Warfighting Integration and Chief Information Officer SAF/CIO A6. Mission Brief

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

Fight the Network. Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches Briefing name l Date (1)

THE UNDER SECRETARY OF DEFENSE 3010 DEFENSE PENTAGON WASHINGTON, DC

Joint Operational Medicine Information Systems Program

Security and Emergency Services Community of Interest 0089 Emergency Management Career Road Map

Long Term Defence Study

Intelligence Officer Career Guide

How To Improve The Defense Communications System

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

The US Marine Corps: Fleet Marine Forces for the Twenty First Century. By Dakota L. Wood

Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals

Corporate Overview A

Security Threats on National Defense ICT based on IoT

NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN

Cybersecurity Strategic Talent Management. March, 2012

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Team Orlando International Team Analysis. By Capital Communications & Consulting, 2013

Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA

AT A HEARING ENTITLED THREATS TO THE HOMELAND

Table of Contents CYBER SECURITY STRATEGIC PLAN VERSION 1.0

Transcription:

Director of Proposed Research Topics Suggested Graduate Program Thesis Topics Headquarters, U.S., 3000, Pentagon, Room 1A262B, Washington, DC 20350-3000 Sept 2011

DIRINT Suggested Graduate Program Thesis Topics In an effort to align the Enterprise investment in the Special Education Program and Professional Military Education Programs with the real problem solving needs of our Service the Director of, solicits thesis topics from operating force and supporting establishment should have some linkage to the Enterprise. The DIRINT's intent in gathering and disseminating these topics is to encourage USMC Officers in the Special Education Program to co research and write on topics that matter most to the, Surveillance and Reconnaissance Enterprise (without infringing on academic freedoms). Topics can cover virtually any matter of interest across the DOTMLPF spectrum. The key point is that the topics As this initiative matures, the DIRINT's intent is to assign each student a mentor from within the Enterprise to assist the student with his or her research. Additionally, thesis topic sponsors may provide TAD or other funding to support the students' research efforts. Manpower and Training Branch is coordinating across the Enterprise to identify key intelligence billets for Special Education Program graduates. The DIRINT's intent is for the Occupation Field Sponsor to assist Manpower Division with identifying for each program graduate an appropriate payback billet that directly ties to the thesis topic. Officers pursuing graduate degrees at Intermediate or Top Level Schools are also encouraged to conduct research on one of these topics. If you choose to conduct research or write on one of the DIRINT's topics, notify the Topic Originator and the Chief, Manpower and Training Branch (POC info below). The DIRINT's list of these topics will be updated regularly. To add a topic to the list, contact, the Chief, Manpower and Training Branch at 703 614 4022; sean.m.mcbride1@usmc.mil. 2

Topic Research Area Originator POC Info Acquisition Acquisition Acquisition Cyber & Electronic Attack Techniques Transitioning Science or Technology Investments into Battlefield Capabilities from Systems Integration Laboratories to Service Level Programs. Instilling Programmatic Simplicity and Cost Effectiveness through the Migration and Convergence of Material Capability Sets. Adopting an Enterprise Requirements Plan (ERP) Approach to "Generate" vice "Write" JCIDS Requirements through Semantically Rich, Machine Readable Language. As USMC cyber functions, activities, and capabilities within the Marine Corps become more mature, there are areas where cyber and intel may remain separate, merge, or have a supporting/supported relationship. Can we define what mission sets should belong to cyber, intel, or a merged capability? What are the boundaries of cyber and intel interns of concept of employment, command relationships, and legal and operation authorities? Should there by any modifications to those boundaries? MAGTF Electronic Attack requires reanalysis. What enemy C2 capabilities are we likely to face in the future? Future EA techniques may need to be looked at from the perspective of data links versus the predominant Layer 1 OSI layer. Different dimensions may need to be analyzed to determine appropriate techniques that could be utilized when considering Software Radios, Platform Independent Module, Platform Dependant Module, software controlled smart antennas via an open standard, effective radio power settings that support incremental power output settings and the availability of Open Software. Some research and travel support may be available to interested students. Marine Corps Marine Corps Marine Corps LtCol Thomas Naughton, Intel Dept, HQMC David Coe, Intel EW Team Engineer, PM Systems, PG12 CINS, Marine Corps Systems Command 571 256 9287 thomas.naughton@usmc.mil 703 432 4046 david.coe@usmc.mil 3

Topic Research Area Originator POC Info EW Battle Federal Acquisition & Procurement The integration and management of Electronic Warfare capabilities across the MAGTF is diverse. With multiple ground based Electronic Warfare (EW) capable platforms (CREW, CESAS, RREP, MEWSS) spread out across the battle field, aviation assets, and CREW; how do we link them together to establish an EW enterprise? How do we deconflict EW, COMINT, and Communications? Some research and travel support may be available to interested students. The acquisition of IT and Intel equipment and services with two major overseas contingencies and numerous smaller global counterterrorist/ counterinsurgency operations ongoing has showed major inadequacies within the federal acquisition and procurement system. The momentum of the procurement of intel systems, the tech refresh of those systems, the rapid pace of commercial technology advancement, and the pact of buying IT equipment and services is in direct conflict with DoD 5000 series program requirements. DoD 5000 doesn't accommodate the procurement of new technologies, particularly for ACAT IV and urgent need programs that the operating forces wanted fielded in month's vs years. We have been working in these confines for a long time, and as budgets get tighter (read more competition which takes more time), and expectations of the war fighter increase, we will come to critical mass soon. Will we be able to adequately support the war fighter in this situation? Some research and travel support may be available to interested student. Michael Stanford, Intel EW Team Lead, PM Systems, PG12 CINS, Systems Command Scott Bishop Contracting PM Systems, PG12 CINS, System Command 703 432 4052 michael.stanford@usmc.mil 703 432 4118 scott.p.bishop@usmc.mil 4

Topic Research Area Originator POC Info Foreign Military Acquisition Strategies Assurance What are the acquisition priorities of the BRIC countries (Brazil, Russia, India, and China)? What are the challenges that will face in achieving their acquisition goals? If achieved, how will these goals shape the global and regional security environment? What are the USMC OTMLPF implications? of our ability to protect sensitive information and the Assurance (IA) process within DoD. What is its effectiveness, and impacts to the ability to fielding a new software baseline. What can be learned from commercial industry practices? How does it affect the operating forces? Some research and travel support may be available to interested students. What are the implications of cloud computing for networks, systems, and operation and concepts? What are the implications of cloud computing for networks, systems, and operation and concepts? Work flow modeling in intelligence units and organizations. Intra and inter domain management of intelligence data and information. Achieve a common computing environment across MCISR E. Mr. Dan Fitzgerald, Deputy Program Manager, Systems, PG12 CINS, Systems Command 703 432 4103 daniel.fitzgerald@usmc.mil 5

Topic Research Area Originator POC Info & Communications Combat Lessons Learned and New Requirements & Service Title 10 Activities Tackling the Data Glut Challenge from the Tactical Level up: Planning, Identifying, Exploitation & Disseminating Timely, Relevant Bits. Achieving a One Desktop Solution for Analysts and Operators (convergence of CIDNE, ML, TIGR, etc.) of and Communications lessons learned topics from combat operations. How effective have our processes been, and how might these processes be made more effective? What roles and missions in the combat development process might be streamlined to make this process faster? Some research and travel support may be available to interested student. What are the methods and means by which USMC intelligence capabilities can best support the Commandant s Title X responsibilities of organizing, equipping, training, and providing forces to support National Command Authority objectives? How do the clearly articulate intelligence requirements, satisfy those requirements and provide intelligence products which support the planning, development, acquisition and sustainment of USMC capabilities (equipment, training, and manpower) to support future USMC missions? Are there models which can be used to better forecast future threat environments and enemy capabilities? Mr. Dan Fitzgerald, Deputy Program Manager, Systems, PG12 CINS, Systems Command Ms Cheryl Young, Intel Dept, HQMC 703 432 4103 daniel.fitzgerald@usmc.mil 703 614 4426 cheryl.young@usmc.mil 6

Topic Research Area Originator POC Into Flow Systems Architecture The availability of Intel information has exploded resulting in data overload for Intel analysts and commanders. Research and propose how we can better manage & process the information flow beyond the Intel enterprise to support integration into combat decision cycles at various echelons of the MAGTF, Research and propose how we will ultimately merge all this data into an understandable, useful repository that drives actionable decision making. Some research and travel support may be available to interested students. Constructing a Service Wide Enterprise Architecture through an Incremental, Evolutionary, Product Line Architecture Approach that mirrors Service War fighting Functions (IPISR PLA + IDU PLA + DCGS PLA = MCISR EA) + C2 PLA + FORCEPRO PLA + LOG PLA + MANEUVER PLA + FIRE PLA = USMC EA). What are the most likely antiaccess/area denial threats in the next 15 20 years? Where are these threats most likely to occur? How can they be deterred or countered? What are the DOTMLPF implications? What are the top 5 opportunities for USMC engagement in the next 15 20 years? Where are these opportunities most like to occur? What will be the primary threats and challenges? What are the DOTMLPF implications? What will an evolved hybrid threat ("Hybrid War 2.0") look like? What are the likely TTP's of an evolved hybrid adversary? Where is this threat most likely to operate? What are the likely DOTMLPF implications? Mr. John Powers, Program Manager, Data Fusion & Dissemination (IDF&D) Systems, PG12 CINS, System Command 703 432 4267 john.w.powers@usmc.mil Topic Research Area Originator POC Into 7

Who are our most likely competitors for control of the global commons? How will competition with these competitors shape the future security environment? What are the DOTMLP implications for the USMC? How will climate change affect the emerging security environment? Where will climate change have the most impact? What will be the threats and challenges to countering this threat? What are the DOTMLPF implications? Will Distributed Denial of Service (DDoS) operations similar to what we saw in Estonia (2006) pose a threat to future USMC operations? Where and how are these attacks likely to emerge? How can they be deterred, countered, or defeated? What are the top 5 technology trends likely to shape the security environment in the next 15 20 years? Where is resource competition most likely to create conflict in the next 15 20 years? Can this conflict be prevented through USMC engagement? If so, what are the threats and challenges to doing so? How will the shifting nature of partnerships / coalitions in the post OIF/OEF security environment affect USMC operations? Who will be our most likely partners/allies? How can we improve interoperability with these potential "friends"? 8

Topic Research Area Originator POC Into Rapid Prototyping Model What are some models (other Services other government agencies), processes, and best practices to create and sustain a rapid prototype and innovation activity for USMC intelligence capabilities? Items to consider are effectiveness in terms of transitioning prototypes to Program of Record capabilities; adherence/compliance to law, policy, and regulation (e.g., Federal Acquisition Regulation RAR); and current USMC construct for research and development, prototyping activities, and systems acquisition. Mr. Jeffrey Small Intel Dept HQMC 703 614 4503 jeffrey.s.small@usmc.mil 9