dstl - cyber & influence - electronic warfare 20111101 ci stc cde call document final
TRANSCRIPT
-
7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL
1/13
FOR PUBLIC RELEASE
Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011
FOR PUBLIC RELEASE Page 1 of 13
Cyber and Influence
Science and Technology CentreInnovative solutions to protect and secure UK interests in cyberspace
Call release date: 1st
November 2011
Call closes: Thursday 8th
December 2011, at 1200 noon
Crown Copyright (c) Ministry of Defence 2011.
Nothing herein shall be relied upon as constituting a contract, agreement or representation that any contract shall be
offered in accordance herewith. The UK MOD reserves the right, subject to the appropriate procurement regulations, to
change without notice the basis of, or the procedures for, or to terminate the process at any time. Under no
circumstances shall MOD incur any liability in respect thereof.
Proposals for funding must be submitted by 1200 noon on 8
th
December 2011 using the Centre for Defence Enterpriseportal (www.science.mod.uk/enterprise). All proposals should be marked with Cyber & Infl Theme # as a prefix in the
title, where # is the theme (described in this document) that the proposal addresses.
Queries relating to the technical or ethical aspects of the call should be addressed Cyber and Influence Science and
Technology Centre [email protected].
Queries relating to the submissions process should be sent to CDE [email protected] tel 01235 438445.
www.science.mod.uk
www.dstl.gov.uk
http://www.science.mod.uk/enterprisehttp://www.science.mod.uk/enterprisehttp://www.science.mod.uk/enterprisemailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]://www.science.mod.uk/http://www.science.mod.uk/http://www.dstl.gov.uk/http://www.dstl.gov.uk/http://www.dstl.gov.uk/http://www.science.mod.uk/mailto:[email protected]:[email protected]://www.science.mod.uk/enterprise -
7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL
2/13
FOR PUBLIC RELEASE
Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011
FOR PUBLIC RELEASE Page 2 of 13
Cyber and Influence Science and Technology Centre (C&I STC)
CDE Call for Research Proposals
The Centre for Defence Enterprise (CDE) is the Ministry of Defences gateway for UK science andtechnology for industry, academia and other innovators to ensure that UK Armed Forces have
access to the best equipment, science and technology, now and in the future.
Introduction
The 2010 Strategic Defence and Security Review (SDSR)1
sets out the threat to the UKs Cyber
Security:
The Cyber and Influence Science & Technology Centre (C&I STC) is part of the Dstl Programme
Office2
and supports the implementation of the National Cyber Security Strategy across defence.
This involves inter-disciplinary research across the physical, information and human sciences
domains into the evolution of cyberspace and its influence on human behaviour. Its goal is to
deliver the capabilities needed by UK MOD to train, exercise, rehearse and conduct military
operations in cyberspace in the same way that it does on land, sea and in the air. The C&I STC also
works across Government to address the capabilities needed to secure the UKs broader interests in
cyberspace.
1Securing Britain in an Age of Uncertainty: The Strategic Defence and Security Review; available from
www.mod.uk/DefenceInternet/AboutDefence/WhatWeDo/PolicyStrategyandPlanning/SDSR/
2The Programme Office in the Defence Science and Technology Laboratory (dstl) is responsible for the planning, formulation and delivery of the
overall Science and Technology (S&T) research requirement for UK defence and security, as directed by the Ministry of Defence's (MOD) Research
and Development (R&D) Board.
The risks emanating from cyber space (including the internet, wider
telecommunications networks and computer systems) are one of the four Tier One
risks to national security (set out in the National Security Strategy). These risks include
hostile attacks upon the UK from other states, potential shortcomings in the UKs cyber
infrastructure, and the actions of cyber terrorists and criminals. But cyber space also
creates opportunities for the UK Government and British businesses, which will derive
benefits from the protection that effective cyber security measures bring to the UK
economy. These threats and opportunities are likely to increase significantly over the
next five to 10 years, as our dependence on cyber space deepens. SDSR Page 47,
Section 4.C.1
http://www.mod.uk/DefenceInternet/AboutDefence/WhatWeDo/PolicyStrategyandPlanning/SDSR/http://www.mod.uk/DefenceInternet/AboutDefence/WhatWeDo/PolicyStrategyandPlanning/SDSR/http://www.mod.uk/DefenceInternet/AboutDefence/WhatWeDo/PolicyStrategyandPlanning/SDSR/ -
7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL
3/13
FOR PUBLIC RELEASE
Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011
FOR PUBLIC RELEASE Page 3 of 13
The Cyber and Influence Science and Technology Centre is broadly divided into five areas of Space,
Spectrum, Cyber, Influence and Stabilisation.
This call for research proposals is focussed on challenges within Spectrum, Cyber and Influence
areas, which are explained in the following pages. Whilst the Space (hardening and protecting
satellite control and communication) and Stabilisation (influencing wide (national) audiences in
cultural and social terms) areas are not specifically addressed within this call they remain areas of
interest. Proposals for research in these areas may be submitted, as well as any ideas occurring
outside this theme call period, to the CDE open call process; enquiries or discussion points can be
made to the C&I STC centre enquiries email (see front of this document).
-
7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL
4/13
FOR PUBLIC RELEASE
Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011
FOR PUBLIC RELEASE Page 4 of 13
The challenges presented in this call document are supported by presentations from the launch
event on 1st
November in London and are available online at
http://www.science.mod.uk/events/event_detail.aspx?eventid=146
Theme 1 Cyber Spectrum
Use of the electromagnetic (EM) spectrum is an adjunct to cyber and influence capabilities
delivering useful operational effect and requiring defence. It is an integrated part of cyber
operations forming an access vector to modern Information Systems and direct RF (Radio
Frequency) effects can deliver destruction with DEW (Directed Energy Weapons) and more subtle
effects at lower powers. As part of influence capability, use of EM underpins social networking tools
and methods, delivering media messaging to home TV and radio and increasingly via the web to
handheld devices. Reliance on EM by cyber systems, the media and information systems will
continue to increase.
This theme seeks proposals to address the following challenges:
Innovative spectrum defence technologies or techniques enabling wireless enabled cyber
systems to survive in a hostile EM environment.
Innovative techniques and technology for generating cyber effect through the use of RF
spectrum.
Innovative methods of supporting Human Influence and Stabilisation processes through the
use of RF as part of a cross technology approach.
Proposals that enhance our understanding of the future EM environment improving our
ability to observe, plan, execute, measure and detect RF effects and the EM components of
more general cyber activities.
http://www.science.mod.uk/events/event_detail.aspx?eventid=146http://www.science.mod.uk/events/event_detail.aspx?eventid=146http://www.science.mod.uk/events/event_detail.aspx?eventid=146 -
7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL
5/13
-
7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL
6/13
FOR PUBLIC RELEASE
Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011
FOR PUBLIC RELEASE Page 6 of 13
Theme 3 Influence Through Cyber
This theme seeks to build on previous work in this area looking at the combination of cyber &
influence to achieve influence in & through cyberspace amongst individuals, groups and wider
audiences in their information environment and the wider context. The previous framework(below) still applies but we would like to focus on some aspects in more detail
Crowdsourcing: ISTAR & Effects
Transitions: online / offline, protest, strikes, etc.
Cyber security: human and social aspects
Socio-technical issues: ethnography and future trends
Social Media Monitoring and Analysis: Crowd Sourcing
Crowd Sourcing ISTAR
o
What are the most promising and / or unconventional methods for analysing,anticipating and countering events in cyberspace that threaten national security and
defence?
o What potential is there in approaches such as crowd-sourcing for the on-line public
to assist in detection of insider threats /online crime / other security risks?
o How can crowdsourcing techniques be used to gather information (ISTAR)?
o Will cultural dependencies affect collective uptake & subsequent effectiveness?
-
7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL
7/13
FOR PUBLIC RELEASE
Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011
FOR PUBLIC RELEASE Page 7 of 13
Crowd Sourcing Achieving Effects
o How can these be harnessed in practical tools, techniques and methods? How can
crowdsourcing be used to achieve effects?
o Is there a difference between effects in cyberspace as opposed to real world effects?
o For UK operations in other countries, are there socio-cultural factors that would
likely inhibit or improve behaviours such as crowd-sourcing? Will cultural
dependencies affect collective take-up and delivery of effect?
Transitions
Individual and organisational transitions: losing it, striking, protesting, whistle-blowing
o
How does an individual transition from rhetoric to personal action against theirorganisation? When do normally compliant individuals conclude they have had
enough?
o How does an individual get involved in collective action against their organisation /
any organisation?
o How does an individual move to action that adversely affects their work colleagues?
o How can we assess emerging sources of discontent and hence anticipate potential
social or political violence? Can social media tell us what is emerging significantlyfrom the noise or chatter?
o Does cyberspace alter these behavioural thresholds?
o Do cultural or social group factors affect these thresholds?
o Are there thresholds beyond which violent collective action is inevitable?
On-line / off-line Behaviours and Personality
o What psycho-social factors are important in understanding on-line behaviour, andhow can we test these?
o What are the dependencies and transitions, if any, between the online self and
offline behaviours?
o How does an understanding of on-line behaviour inform a better understanding of
off-line motivations and behaviours and how can this be exploited in practical terms?
-
7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL
8/13
FOR PUBLIC RELEASE
Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011
FOR PUBLIC RELEASE Page 8 of 13
o How can one be sure that the real world person you see before you is the same one
you first met online? How quickly does one sense suspicion, on- or off-line,
concerning the authenticity of the person you are meeting?
o How would you check (or test) the credibility or uniqueness of the person you are
meeting?
Cyber Security
Perceptions of the Internet
o How do people see or imagine the internet?
o How does this affect their behaviour and response to cyber security?
o
How are these perceptions (mental models) affected by cultural or social groupfactors?
Next Generation
o How can we build better cyber security awareness?
o How can we use gamification to instil cyber security awareness in kids?
Discouraging Perseverance
o How can determined individuals with malicious intent be persuaded to give up?
o How can attractive or compelling challenges be made less appealing?
o How can cyber security measures benefit from an understanding of the psychology
of risk and reward?
Socio-Technical Issues
Cyber-ethnography or Netnography
o How can we validate or test the current theories and practices in this area?
o How are cross-cultural differences manifest in online behaviours and how are these
connected to any online group or cultural norms of behaviour?
o Does open source information and social media change the way in which
ethnography needs to be conducted?
o How can on-line cultural differences be assessed in practical terms, and how can this
understanding be used to improve influence through cyberspace?
-
7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL
9/13
FOR PUBLIC RELEASE
Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011
FOR PUBLIC RELEASE Page 9 of 13
Online authority, influence and trust
o What novel approaches (current, real, future, imagined) can be brought to bear in
exploring the dynamics of personality, leadership, trust and emotion in on-line
settings?
o What can we learn from history & ethnography of Wikipedia about why people need
to be heard and why we trust some sources more than others?
o Why motivates some individuals / groups to seek ownership of content?
o Why do readers trust Wikipedia and does this vary according to personal or cultural
factors?
Proximity
o The Director of Research at Nielsen Mobile, "People look at every text message they
get", and they do so within 15 minutes.
o As mobile overtakes fixed and proximity devices become the norm, what new
forms of social behaviour and marketing will emerge?
o Will people feel more risky / vulnerable in public space than in their private spaces?
How will the concepts of private and public evolve?
o
Will this vary according to demographic, personal or cultural factors?
Novel Approaches to Cyber Influence
o How has the growing prevalence of cyber technologies and new modes of
communication such as social media changed the way in people interact with cyber
systems and each other?
o How can emerging techniques such as serious gaming / gamification or immersive
reality be adapted to the challenges of understanding influence in online settings?
o How do we know when we have influenced someone online, or detect that we ourselves
are being influenced adversely?
o What are the challenges of measuring effect?
-
7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL
10/13
FOR PUBLIC RELEASE
Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011
FOR PUBLIC RELEASE Page 10 of 13
General Advice
What we want
Proposals for short, sharp proof of concept projects:
o With a tangible output: demonstrator, code, components, few high quality vu-foils,
new approaches, do things differently and do different things.
o Which may have a high technology risk in return for a high pay off.
o Can be used and exploited.
What we dont want
Just a report (work diary).
COTS or existing products.
Proposals that are not clear on ownership and access to intellectual property.
Large or very complex proposals should not be submitted as part of this CDE call, although
you may wish to discuss them further with the centre (please use the technical contact
email on the front of this document).
Ethical Considerations
All research involving human participation conducted or sponsored by the MOD is subject to ethical
review. This ensures that acceptable ethical standards are met, upheld and recorded, and
advocates adherence to National & Internationally accepted principles and guidance. Cyber
research involving human participation e.g. online experimentation or observation must adhere to
the same level of standards and all proposals will be assessed for ethical considerations. As a result
some of the proposals may require full ethical approval, involving existing MOD processes and
procedures. Applying separate ethical procedures (e.g. from universities or other organisations)
does not negate this requirement.
NOTE: The requirement for ethical approval is not a barrier to funding; proposals are assessed on
the basis of technical merit and potential for exploitation. Successful bids will be supported
through the ethical review process however clearly defined research methods in the bid are
encouraged to aid this process.
-
7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL
11/13
FOR PUBLIC RELEASE
Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011
FOR PUBLIC RELEASE Page 11 of 13
Invitation for Proposals
Proposals are invited in response to this Cyber and Influence Call. Although the call includes
specific research objectives under the three themes, all innovative proposals that address the areas
above will be considered.
This call will fund proof-of-concept proposals of typically 3-5 months duration, after which
promising programmes may be developed further, but Dstl does not commit to fund any follow on
work as a result of any contracts placed via this CDE call. Whilst all proposals will be considered, it is
more likely that a larger number of lower value proposals (c30k-100k) will be funded than a small
number of higher value proposals.
Proposals may scope a longer programme but should be primarily concerned with this call and have
a clear, distinct and costed proof-of-concept/demonstration phase that addresses the focus of this
call. The proof-of-concept stage should be used to understand the potential contribution tocapability; the theoretical feasibility of the idea(s) should be confirmed, and ideally demonstrated.
If proposals are made for longer-duration projects they must include details of the proposed scope,
timescale, and costs. Further development of successful proposals will only be considered after a
successful proof of concept stage.
Proposals must include:
A clear description of what is novel in the proposed solution and the value of the solution to
operational capability.
A clear statement of the programme of work that would be carried out and the outputs(deliverable) from the work.
A development or exploitation plan beyond the initial proof of concept phase.
Proposals will be assessed by MOD and other relevant UK government staff (incl government
agencies) using the MODPerformance Assessment Framework (PAF)(available from the CDE
website). For proposals successful at assessment, contract placement will be initiated during
FY2011-12 and it is anticipated that work against these contracts will be undertaken during FY2011-
12 and FY2012-13.
Deliverables from contracts will be made available to technical advisors and subject to review by UK
MOD and other relevant parts of UK government; deliverables will also require a two page
documentation summary, the format of which will be provided in the contract. Source code
generated under any contract placed in response to this call must be included as a deliverable;
access to pre-existing source code that is proposed for re-use in response to this call must be
addressed as part of any proposal
Dstl will be available to provide advice and/or guidance throughout the project and provide the
interface with the MOD and wider government stakeholder community.
http://www.science.mod.uk/engagement/documents/performance%20assessment%20framework%20version%203.pdfhttp://www.science.mod.uk/engagement/documents/performance%20assessment%20framework%20version%203.pdfhttp://www.science.mod.uk/engagement/documents/performance%20assessment%20framework%20version%203.pdfhttp://www.science.mod.uk/engagement/documents/performance%20assessment%20framework%20version%203.pdf -
7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL
12/13
FOR PUBLIC RELEASE
Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011
FOR PUBLIC RELEASE Page 12 of 13
How to Submit a Proposal
Key Dates
1st
November 2011 Call for proposals launched; presentations available at
8th December 2011 Call closes 1200 noon
Mid Jan 2012 Target for Decision Conference on submitted proposals
Late Jan 2012 Contract placement initiated for successful proposers and formal
feedback released to unsuccessful proposers
CDE Proposal Submission Process
Proposals must be submitted by 1200 noon on 8th
December 2011, via the Centre for Defence
Enterprise Portalwww.science.mod.uk/engagement/the_portal.aspx
All proposals should be clearly marked with Cyber & Inf Theme # as a prefix in the proposal title
and where # corresponds to the theme described in this document.
Please plan the timeline for submitting your proposal carefully. If you have not used the CDE Portal
before you will need to become familiar with the guidance, including how to open an account
starting with theQuick Start Guide(available on the CDE website or click to open as a new pdf).
Other information and guides are available on the CDE website:
General CDE Advice:www.science.mod.uk/engagement/cde/working_with_cde.aspx
Contract & IPR Guidance:www.science.mod.uk/engagement/cde/funding_contracts.aspx
On using the Portal:www.science.mod.uk/engagement/the_portal.aspx. The Portal is
optimised for proposals based on physical sciences and engineering and we are aware that
proposers sometimes struggle to adapt to using it with social science based proposals. The
key points (rather than the detailed questions) that are sought under the main headings still
apply and further advice can be obtained from CDE.
Common errors in preparing and submitting a proposal include:
Character limit there is a limit of 1000 characters in the descriptive paragraphs of the
proposal which when completed must be added to the document; additional paragraphs
can be added if 1000 characters is insufficient.
It is a web based tool please save your work regularly to avoid time-outs that lose work.
Attachments fail they must be Word 97-2003 format, portrait format, should have
generous margins with no material overhanging the margin and a max size of 1 Mb. Please
note that attachments should only be used for supplementary information the main
points of your proposal should be written into the online form. Care should also be taken to
http://www.science.mod.uk/engagement/the_portal.aspxhttp://www.science.mod.uk/engagement/the_portal.aspxhttp://www.science.mod.uk/engagement/the_portal.aspxhttp://www.science.mod.uk/engagement/documents/20110321%20u%20cde%20portal%20quick%20start%20version%203%20point%200.pdfhttp://www.science.mod.uk/engagement/documents/20110321%20u%20cde%20portal%20quick%20start%20version%203%20point%200.pdfhttp://www.science.mod.uk/engagement/documents/20110321%20u%20cde%20portal%20quick%20start%20version%203%20point%200.pdfhttp://www.science.mod.uk/engagement/cde/working_with_cde.aspxhttp://www.science.mod.uk/engagement/cde/working_with_cde.aspxhttp://www.science.mod.uk/engagement/cde/working_with_cde.aspxhttp://www.science.mod.uk/engagement/cde/funding_contracts.aspxhttp://www.science.mod.uk/engagement/cde/funding_contracts.aspxhttp://www.science.mod.uk/engagement/cde/funding_contracts.aspxhttp://www.science.mod.uk/engagement/the_portal.aspxhttp://www.science.mod.uk/engagement/the_portal.aspxhttp://www.science.mod.uk/engagement/the_portal.aspxhttp://www.science.mod.uk/engagement/the_portal.aspxhttp://www.science.mod.uk/engagement/cde/funding_contracts.aspxhttp://www.science.mod.uk/engagement/cde/working_with_cde.aspxhttp://www.science.mod.uk/engagement/documents/20110321%20u%20cde%20portal%20quick%20start%20version%203%20point%200.pdfhttp://www.science.mod.uk/engagement/the_portal.aspx -
7/31/2019 DSTL - Cyber & Influence - Electronic Warfare 20111101 CI STC CDE Call Document FINAL
13/13
FOR PUBLIC RELEASE
Centre for Defence EnterpriseCyber and Influence STCIssue 1, 1 Nov 2011
FOR PUBLIC RELEASE Page 13 of 13
make sure that attachments are placed in the relevant section (e.g. technical information
should not be attached to the commercial section).
Failing to properly submit - publish is not the same as submit. You have not completed the
submission process if your proposal is at the FINAL / PUBLISHED stage (in the status and
published status columns respectively); CDE have no sight of the proposal at this stage. To
complete submission you need to press the submit button under the 'Tasks' column. This
will change the status of your proposal to 'SUBMITTED'; this will then change (normally after
a few days, often sooner) to 'RECEIVED' indicating that the proposal has been accepted by
CDE for assessment.
For a proposal to be accepted for assessment:
The standard terms and conditions of the CDE must be unequivocally accepted.
There must be at least one deliverable against which payment can be made.
The commercial section of the proposal must be completed.
A good proposal is likely to have the following characteristics:
ACME has developed a concept for a new xxx material
The material has potential to meet xxx requirements at yyy weight and zzz volume
Here is the analysis of why this material will meet you requirements and this is what we
will do
Here are some results from our initial work
We need xxk to prove feasibility and to take the technology to a suitable TRL
Please do not leave submission of your proposal until the last morning before the deadline. Past
experience has shown that the Portal becomes heavily loaded near the call close and that this
results in slow operation (up to 1 hour to publish rather than a few minutes) and that with the
pressure of the deadline, mistakes are made that mean proposals are not submitted or accepted.
Proposals that are received after the deadline will not be included in the call but will be submitted
into the CDE Open Call process automatically.
Queries and Help
As part of the proposal preparation process, queries and clarifications on the types of sensor are
welcomed by the technical team.
Queries relating to the technical or ethical aspectsof the call should be addressed Cyber andInfluence Science and Technology Centre [email protected].
Queries relating to the submission process (including how to use the portal) should be addressed
directly to the CDE [email protected] by phone on 01235 438445.
mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]