dstl - cyber & influence - electronic warfare 20111101 ci stc cde call document final

Upload: ideatrack

Post on 05-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL

    1/13

    FOR PUBLIC RELEASE

    Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011

    FOR PUBLIC RELEASE Page 1 of 13

    Cyber and Influence

    Science and Technology CentreInnovative solutions to protect and secure UK interests in cyberspace

    Call release date: 1st

    November 2011

    Call closes: Thursday 8th

    December 2011, at 1200 noon

    Crown Copyright (c) Ministry of Defence 2011.

    Nothing herein shall be relied upon as constituting a contract, agreement or representation that any contract shall be

    offered in accordance herewith. The UK MOD reserves the right, subject to the appropriate procurement regulations, to

    change without notice the basis of, or the procedures for, or to terminate the process at any time. Under no

    circumstances shall MOD incur any liability in respect thereof.

    Proposals for funding must be submitted by 1200 noon on 8

    th

    December 2011 using the Centre for Defence Enterpriseportal (www.science.mod.uk/enterprise). All proposals should be marked with Cyber & Infl Theme # as a prefix in the

    title, where # is the theme (described in this document) that the proposal addresses.

    Queries relating to the technical or ethical aspects of the call should be addressed Cyber and Influence Science and

    Technology Centre [email protected].

    Queries relating to the submissions process should be sent to CDE [email protected] tel 01235 438445.

    www.science.mod.uk

    www.dstl.gov.uk

    http://www.science.mod.uk/enterprisehttp://www.science.mod.uk/enterprisehttp://www.science.mod.uk/enterprisemailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]://www.science.mod.uk/http://www.science.mod.uk/http://www.dstl.gov.uk/http://www.dstl.gov.uk/http://www.dstl.gov.uk/http://www.science.mod.uk/mailto:[email protected]:[email protected]://www.science.mod.uk/enterprise
  • 7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL

    2/13

    FOR PUBLIC RELEASE

    Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011

    FOR PUBLIC RELEASE Page 2 of 13

    Cyber and Influence Science and Technology Centre (C&I STC)

    CDE Call for Research Proposals

    The Centre for Defence Enterprise (CDE) is the Ministry of Defences gateway for UK science andtechnology for industry, academia and other innovators to ensure that UK Armed Forces have

    access to the best equipment, science and technology, now and in the future.

    Introduction

    The 2010 Strategic Defence and Security Review (SDSR)1

    sets out the threat to the UKs Cyber

    Security:

    The Cyber and Influence Science & Technology Centre (C&I STC) is part of the Dstl Programme

    Office2

    and supports the implementation of the National Cyber Security Strategy across defence.

    This involves inter-disciplinary research across the physical, information and human sciences

    domains into the evolution of cyberspace and its influence on human behaviour. Its goal is to

    deliver the capabilities needed by UK MOD to train, exercise, rehearse and conduct military

    operations in cyberspace in the same way that it does on land, sea and in the air. The C&I STC also

    works across Government to address the capabilities needed to secure the UKs broader interests in

    cyberspace.

    1Securing Britain in an Age of Uncertainty: The Strategic Defence and Security Review; available from

    www.mod.uk/DefenceInternet/AboutDefence/WhatWeDo/PolicyStrategyandPlanning/SDSR/

    2The Programme Office in the Defence Science and Technology Laboratory (dstl) is responsible for the planning, formulation and delivery of the

    overall Science and Technology (S&T) research requirement for UK defence and security, as directed by the Ministry of Defence's (MOD) Research

    and Development (R&D) Board.

    The risks emanating from cyber space (including the internet, wider

    telecommunications networks and computer systems) are one of the four Tier One

    risks to national security (set out in the National Security Strategy). These risks include

    hostile attacks upon the UK from other states, potential shortcomings in the UKs cyber

    infrastructure, and the actions of cyber terrorists and criminals. But cyber space also

    creates opportunities for the UK Government and British businesses, which will derive

    benefits from the protection that effective cyber security measures bring to the UK

    economy. These threats and opportunities are likely to increase significantly over the

    next five to 10 years, as our dependence on cyber space deepens. SDSR Page 47,

    Section 4.C.1

    http://www.mod.uk/DefenceInternet/AboutDefence/WhatWeDo/PolicyStrategyandPlanning/SDSR/http://www.mod.uk/DefenceInternet/AboutDefence/WhatWeDo/PolicyStrategyandPlanning/SDSR/http://www.mod.uk/DefenceInternet/AboutDefence/WhatWeDo/PolicyStrategyandPlanning/SDSR/
  • 7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL

    3/13

    FOR PUBLIC RELEASE

    Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011

    FOR PUBLIC RELEASE Page 3 of 13

    The Cyber and Influence Science and Technology Centre is broadly divided into five areas of Space,

    Spectrum, Cyber, Influence and Stabilisation.

    This call for research proposals is focussed on challenges within Spectrum, Cyber and Influence

    areas, which are explained in the following pages. Whilst the Space (hardening and protecting

    satellite control and communication) and Stabilisation (influencing wide (national) audiences in

    cultural and social terms) areas are not specifically addressed within this call they remain areas of

    interest. Proposals for research in these areas may be submitted, as well as any ideas occurring

    outside this theme call period, to the CDE open call process; enquiries or discussion points can be

    made to the C&I STC centre enquiries email (see front of this document).

  • 7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL

    4/13

    FOR PUBLIC RELEASE

    Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011

    FOR PUBLIC RELEASE Page 4 of 13

    The challenges presented in this call document are supported by presentations from the launch

    event on 1st

    November in London and are available online at

    http://www.science.mod.uk/events/event_detail.aspx?eventid=146

    Theme 1 Cyber Spectrum

    Use of the electromagnetic (EM) spectrum is an adjunct to cyber and influence capabilities

    delivering useful operational effect and requiring defence. It is an integrated part of cyber

    operations forming an access vector to modern Information Systems and direct RF (Radio

    Frequency) effects can deliver destruction with DEW (Directed Energy Weapons) and more subtle

    effects at lower powers. As part of influence capability, use of EM underpins social networking tools

    and methods, delivering media messaging to home TV and radio and increasingly via the web to

    handheld devices. Reliance on EM by cyber systems, the media and information systems will

    continue to increase.

    This theme seeks proposals to address the following challenges:

    Innovative spectrum defence technologies or techniques enabling wireless enabled cyber

    systems to survive in a hostile EM environment.

    Innovative techniques and technology for generating cyber effect through the use of RF

    spectrum.

    Innovative methods of supporting Human Influence and Stabilisation processes through the

    use of RF as part of a cross technology approach.

    Proposals that enhance our understanding of the future EM environment improving our

    ability to observe, plan, execute, measure and detect RF effects and the EM components of

    more general cyber activities.

    http://www.science.mod.uk/events/event_detail.aspx?eventid=146http://www.science.mod.uk/events/event_detail.aspx?eventid=146http://www.science.mod.uk/events/event_detail.aspx?eventid=146
  • 7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL

    5/13

  • 7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL

    6/13

    FOR PUBLIC RELEASE

    Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011

    FOR PUBLIC RELEASE Page 6 of 13

    Theme 3 Influence Through Cyber

    This theme seeks to build on previous work in this area looking at the combination of cyber &

    influence to achieve influence in & through cyberspace amongst individuals, groups and wider

    audiences in their information environment and the wider context. The previous framework(below) still applies but we would like to focus on some aspects in more detail

    Crowdsourcing: ISTAR & Effects

    Transitions: online / offline, protest, strikes, etc.

    Cyber security: human and social aspects

    Socio-technical issues: ethnography and future trends

    Social Media Monitoring and Analysis: Crowd Sourcing

    Crowd Sourcing ISTAR

    o

    What are the most promising and / or unconventional methods for analysing,anticipating and countering events in cyberspace that threaten national security and

    defence?

    o What potential is there in approaches such as crowd-sourcing for the on-line public

    to assist in detection of insider threats /online crime / other security risks?

    o How can crowdsourcing techniques be used to gather information (ISTAR)?

    o Will cultural dependencies affect collective uptake & subsequent effectiveness?

  • 7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL

    7/13

    FOR PUBLIC RELEASE

    Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011

    FOR PUBLIC RELEASE Page 7 of 13

    Crowd Sourcing Achieving Effects

    o How can these be harnessed in practical tools, techniques and methods? How can

    crowdsourcing be used to achieve effects?

    o Is there a difference between effects in cyberspace as opposed to real world effects?

    o For UK operations in other countries, are there socio-cultural factors that would

    likely inhibit or improve behaviours such as crowd-sourcing? Will cultural

    dependencies affect collective take-up and delivery of effect?

    Transitions

    Individual and organisational transitions: losing it, striking, protesting, whistle-blowing

    o

    How does an individual transition from rhetoric to personal action against theirorganisation? When do normally compliant individuals conclude they have had

    enough?

    o How does an individual get involved in collective action against their organisation /

    any organisation?

    o How does an individual move to action that adversely affects their work colleagues?

    o How can we assess emerging sources of discontent and hence anticipate potential

    social or political violence? Can social media tell us what is emerging significantlyfrom the noise or chatter?

    o Does cyberspace alter these behavioural thresholds?

    o Do cultural or social group factors affect these thresholds?

    o Are there thresholds beyond which violent collective action is inevitable?

    On-line / off-line Behaviours and Personality

    o What psycho-social factors are important in understanding on-line behaviour, andhow can we test these?

    o What are the dependencies and transitions, if any, between the online self and

    offline behaviours?

    o How does an understanding of on-line behaviour inform a better understanding of

    off-line motivations and behaviours and how can this be exploited in practical terms?

  • 7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL

    8/13

    FOR PUBLIC RELEASE

    Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011

    FOR PUBLIC RELEASE Page 8 of 13

    o How can one be sure that the real world person you see before you is the same one

    you first met online? How quickly does one sense suspicion, on- or off-line,

    concerning the authenticity of the person you are meeting?

    o How would you check (or test) the credibility or uniqueness of the person you are

    meeting?

    Cyber Security

    Perceptions of the Internet

    o How do people see or imagine the internet?

    o How does this affect their behaviour and response to cyber security?

    o

    How are these perceptions (mental models) affected by cultural or social groupfactors?

    Next Generation

    o How can we build better cyber security awareness?

    o How can we use gamification to instil cyber security awareness in kids?

    Discouraging Perseverance

    o How can determined individuals with malicious intent be persuaded to give up?

    o How can attractive or compelling challenges be made less appealing?

    o How can cyber security measures benefit from an understanding of the psychology

    of risk and reward?

    Socio-Technical Issues

    Cyber-ethnography or Netnography

    o How can we validate or test the current theories and practices in this area?

    o How are cross-cultural differences manifest in online behaviours and how are these

    connected to any online group or cultural norms of behaviour?

    o Does open source information and social media change the way in which

    ethnography needs to be conducted?

    o How can on-line cultural differences be assessed in practical terms, and how can this

    understanding be used to improve influence through cyberspace?

  • 7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL

    9/13

    FOR PUBLIC RELEASE

    Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011

    FOR PUBLIC RELEASE Page 9 of 13

    Online authority, influence and trust

    o What novel approaches (current, real, future, imagined) can be brought to bear in

    exploring the dynamics of personality, leadership, trust and emotion in on-line

    settings?

    o What can we learn from history & ethnography of Wikipedia about why people need

    to be heard and why we trust some sources more than others?

    o Why motivates some individuals / groups to seek ownership of content?

    o Why do readers trust Wikipedia and does this vary according to personal or cultural

    factors?

    Proximity

    o The Director of Research at Nielsen Mobile, "People look at every text message they

    get", and they do so within 15 minutes.

    o As mobile overtakes fixed and proximity devices become the norm, what new

    forms of social behaviour and marketing will emerge?

    o Will people feel more risky / vulnerable in public space than in their private spaces?

    How will the concepts of private and public evolve?

    o

    Will this vary according to demographic, personal or cultural factors?

    Novel Approaches to Cyber Influence

    o How has the growing prevalence of cyber technologies and new modes of

    communication such as social media changed the way in people interact with cyber

    systems and each other?

    o How can emerging techniques such as serious gaming / gamification or immersive

    reality be adapted to the challenges of understanding influence in online settings?

    o How do we know when we have influenced someone online, or detect that we ourselves

    are being influenced adversely?

    o What are the challenges of measuring effect?

  • 7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL

    10/13

    FOR PUBLIC RELEASE

    Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011

    FOR PUBLIC RELEASE Page 10 of 13

    General Advice

    What we want

    Proposals for short, sharp proof of concept projects:

    o With a tangible output: demonstrator, code, components, few high quality vu-foils,

    new approaches, do things differently and do different things.

    o Which may have a high technology risk in return for a high pay off.

    o Can be used and exploited.

    What we dont want

    Just a report (work diary).

    COTS or existing products.

    Proposals that are not clear on ownership and access to intellectual property.

    Large or very complex proposals should not be submitted as part of this CDE call, although

    you may wish to discuss them further with the centre (please use the technical contact

    email on the front of this document).

    Ethical Considerations

    All research involving human participation conducted or sponsored by the MOD is subject to ethical

    review. This ensures that acceptable ethical standards are met, upheld and recorded, and

    advocates adherence to National & Internationally accepted principles and guidance. Cyber

    research involving human participation e.g. online experimentation or observation must adhere to

    the same level of standards and all proposals will be assessed for ethical considerations. As a result

    some of the proposals may require full ethical approval, involving existing MOD processes and

    procedures. Applying separate ethical procedures (e.g. from universities or other organisations)

    does not negate this requirement.

    NOTE: The requirement for ethical approval is not a barrier to funding; proposals are assessed on

    the basis of technical merit and potential for exploitation. Successful bids will be supported

    through the ethical review process however clearly defined research methods in the bid are

    encouraged to aid this process.

  • 7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL

    11/13

    FOR PUBLIC RELEASE

    Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011

    FOR PUBLIC RELEASE Page 11 of 13

    Invitation for Proposals

    Proposals are invited in response to this Cyber and Influence Call. Although the call includes

    specific research objectives under the three themes, all innovative proposals that address the areas

    above will be considered.

    This call will fund proof-of-concept proposals of typically 3-5 months duration, after which

    promising programmes may be developed further, but Dstl does not commit to fund any follow on

    work as a result of any contracts placed via this CDE call. Whilst all proposals will be considered, it is

    more likely that a larger number of lower value proposals (c30k-100k) will be funded than a small

    number of higher value proposals.

    Proposals may scope a longer programme but should be primarily concerned with this call and have

    a clear, distinct and costed proof-of-concept/demonstration phase that addresses the focus of this

    call. The proof-of-concept stage should be used to understand the potential contribution tocapability; the theoretical feasibility of the idea(s) should be confirmed, and ideally demonstrated.

    If proposals are made for longer-duration projects they must include details of the proposed scope,

    timescale, and costs. Further development of successful proposals will only be considered after a

    successful proof of concept stage.

    Proposals must include:

    A clear description of what is novel in the proposed solution and the value of the solution to

    operational capability.

    A clear statement of the programme of work that would be carried out and the outputs(deliverable) from the work.

    A development or exploitation plan beyond the initial proof of concept phase.

    Proposals will be assessed by MOD and other relevant UK government staff (incl government

    agencies) using the MODPerformance Assessment Framework (PAF)(available from the CDE

    website). For proposals successful at assessment, contract placement will be initiated during

    FY2011-12 and it is anticipated that work against these contracts will be undertaken during FY2011-

    12 and FY2012-13.

    Deliverables from contracts will be made available to technical advisors and subject to review by UK

    MOD and other relevant parts of UK government; deliverables will also require a two page

    documentation summary, the format of which will be provided in the contract. Source code

    generated under any contract placed in response to this call must be included as a deliverable;

    access to pre-existing source code that is proposed for re-use in response to this call must be

    addressed as part of any proposal

    Dstl will be available to provide advice and/or guidance throughout the project and provide the

    interface with the MOD and wider government stakeholder community.

    http://www.science.mod.uk/engagement/documents/performance%20assessment%20framework%20version%203.pdfhttp://www.science.mod.uk/engagement/documents/performance%20assessment%20framework%20version%203.pdfhttp://www.science.mod.uk/engagement/documents/performance%20assessment%20framework%20version%203.pdfhttp://www.science.mod.uk/engagement/documents/performance%20assessment%20framework%20version%203.pdf
  • 7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL

    12/13

    FOR PUBLIC RELEASE

    Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011

    FOR PUBLIC RELEASE Page 12 of 13

    How to Submit a Proposal

    Key Dates

    1st

    November 2011 Call for proposals launched; presentations available at

    8th December 2011 Call closes 1200 noon

    Mid Jan 2012 Target for Decision Conference on submitted proposals

    Late Jan 2012 Contract placement initiated for successful proposers and formal

    feedback released to unsuccessful proposers

    CDE Proposal Submission Process

    Proposals must be submitted by 1200 noon on 8th

    December 2011, via the Centre for Defence

    Enterprise Portalwww.science.mod.uk/engagement/the_portal.aspx

    All proposals should be clearly marked with Cyber & Inf Theme # as a prefix in the proposal title

    and where # corresponds to the theme described in this document.

    Please plan the timeline for submitting your proposal carefully. If you have not used the CDE Portal

    before you will need to become familiar with the guidance, including how to open an account

    starting with theQuick Start Guide(available on the CDE website or click to open as a new pdf).

    Other information and guides are available on the CDE website:

    General CDE Advice:www.science.mod.uk/engagement/cde/working_with_cde.aspx

    Contract & IPR Guidance:www.science.mod.uk/engagement/cde/funding_contracts.aspx

    On using the Portal:www.science.mod.uk/engagement/the_portal.aspx. The Portal is

    optimised for proposals based on physical sciences and engineering and we are aware that

    proposers sometimes struggle to adapt to using it with social science based proposals. The

    key points (rather than the detailed questions) that are sought under the main headings still

    apply and further advice can be obtained from CDE.

    Common errors in preparing and submitting a proposal include:

    Character limit there is a limit of 1000 characters in the descriptive paragraphs of the

    proposal which when completed must be added to the document; additional paragraphs

    can be added if 1000 characters is insufficient.

    It is a web based tool please save your work regularly to avoid time-outs that lose work.

    Attachments fail they must be Word 97-2003 format, portrait format, should have

    generous margins with no material overhanging the margin and a max size of 1 Mb. Please

    note that attachments should only be used for supplementary information the main

    points of your proposal should be written into the online form. Care should also be taken to

    http://www.science.mod.uk/engagement/the_portal.aspxhttp://www.science.mod.uk/engagement/the_portal.aspxhttp://www.science.mod.uk/engagement/the_portal.aspxhttp://www.science.mod.uk/engagement/documents/20110321%20u%20cde%20portal%20quick%20start%20version%203%20point%200.pdfhttp://www.science.mod.uk/engagement/documents/20110321%20u%20cde%20portal%20quick%20start%20version%203%20point%200.pdfhttp://www.science.mod.uk/engagement/documents/20110321%20u%20cde%20portal%20quick%20start%20version%203%20point%200.pdfhttp://www.science.mod.uk/engagement/cde/working_with_cde.aspxhttp://www.science.mod.uk/engagement/cde/working_with_cde.aspxhttp://www.science.mod.uk/engagement/cde/working_with_cde.aspxhttp://www.science.mod.uk/engagement/cde/funding_contracts.aspxhttp://www.science.mod.uk/engagement/cde/funding_contracts.aspxhttp://www.science.mod.uk/engagement/cde/funding_contracts.aspxhttp://www.science.mod.uk/engagement/the_portal.aspxhttp://www.science.mod.uk/engagement/the_portal.aspxhttp://www.science.mod.uk/engagement/the_portal.aspxhttp://www.science.mod.uk/engagement/the_portal.aspxhttp://www.science.mod.uk/engagement/cde/funding_contracts.aspxhttp://www.science.mod.uk/engagement/cde/working_with_cde.aspxhttp://www.science.mod.uk/engagement/documents/20110321%20u%20cde%20portal%20quick%20start%20version%203%20point%200.pdfhttp://www.science.mod.uk/engagement/the_portal.aspx
  • 7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL

    13/13

    FOR PUBLIC RELEASE

    Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011

    FOR PUBLIC RELEASE Page 13 of 13

    make sure that attachments are placed in the relevant section (e.g. technical information

    should not be attached to the commercial section).

    Failing to properly submit - publish is not the same as submit. You have not completed the

    submission process if your proposal is at the FINAL / PUBLISHED stage (in the status and

    published status columns respectively); CDE have no sight of the proposal at this stage. To

    complete submission you need to press the submit button under the 'Tasks' column. This

    will change the status of your proposal to 'SUBMITTED'; this will then change (normally after

    a few days, often sooner) to 'RECEIVED' indicating that the proposal has been accepted by

    CDE for assessment.

    For a proposal to be accepted for assessment:

    The standard terms and conditions of the CDE must be unequivocally accepted.

    There must be at least one deliverable against which payment can be made.

    The commercial section of the proposal must be completed.

    A good proposal is likely to have the following characteristics:

    ACME has developed a concept for a new xxx material

    The material has potential to meet xxx requirements at yyy weight and zzz volume

    Here is the analysis of why this material will meet you requirements and this is what we

    will do

    Here are some results from our initial work

    We need xxk to prove feasibility and to take the technology to a suitable TRL

    Please do not leave submission of your proposal until the last morning before the deadline. Past

    experience has shown that the Portal becomes heavily loaded near the call close and that this

    results in slow operation (up to 1 hour to publish rather than a few minutes) and that with the

    pressure of the deadline, mistakes are made that mean proposals are not submitted or accepted.

    Proposals that are received after the deadline will not be included in the call but will be submitted

    into the CDE Open Call process automatically.

    Queries and Help

    As part of the proposal preparation process, queries and clarifications on the types of sensor are

    welcomed by the technical team.

    Queries relating to the technical or ethical aspectsof the call should be addressed Cyber andInfluence Science and Technology Centre [email protected].

    Queries relating to the submission process (including how to use the portal) should be addressed

    directly to the CDE [email protected] by phone on 01235 438445.

    mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]