slide1
Download
Skip this Video
Download Presentation
Virtual Collaboration: now through October

Loading in 2 Seconds...

play fullscreen
1 / 28

Virtual Collaboration: now through October - PowerPoint PPT Presentation


  • 80 Views
  • Uploaded on

Military Operations Research Society (MORS) Cyber Analysis Workshop Online Plenary Session 26 August 2008. Virtual Collaboration: now through October unclassified: http://cyberanalysis.pbwiki.com/ (advertise track and discipline group meetings) and

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Virtual Collaboration: now through October' - hu-ferrell


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1

Military Operations Research Society (MORS)Cyber Analysis WorkshopOnline Plenary Session26 August 2008

Virtual Collaboration: now through October

unclassified: http://cyberanalysis.pbwiki.com/ (advertise track and discipline group meetings) and

secret wiki – send request to [email protected]

These wiki discussions will become part of the workshop report!

Virtual Meetings:https://connect.dco.dod.mil/cyberanalysis(audio backup 877-206-5884 with code 547836)

Each track at least one DCO during September (unclassified or secret)

- Information Operations Joint Munitions Effectiveness Manual (IO JMEM), Monday 15 Sep, 1400-1600 (2 pm – 4 pm) EDT (unclassified)

Each discipline group at least one DCO session before17 October (unclassified or secret)

Plenary DCO Summary 21 October, 1400-1600 (2 pm – 4 pm) EDT (unclassified)

Physical Meeting: Whitney, Bradley, & Brown (WBB) Consulting, Reston, Virginia, 28-30 October

Government Senior Leader virtual review, 30 October

defense connect online dco
Defense Connect Online (DCO)
  • Connections for this meeting
    • DCO https://connect.dco.dod.mil/cyberanalysis with audio through computer speakers
    • Audio backup, call 877-206-5884 with code 547836 for teleconference
  • Anyone not connected?
    • If no audio, respond in chat pod
    • If no visual, speak up or call teleconference
dco rules of engagement roe
DCO Rules of Engagement (ROE)
  • Many individuals online today
    • We want all of your inputs!
    • Most of you can not talk
  • DCO has the communication capabilities—this is our ROE
    • Chat: any time to everyone or an individual
    • Comment/Question pod: write any time, addressed at planned periods
    • Suggestion pod: write any time, not reviewed in this session
    • Attendee/status: indicate “have a question” to interrupt
  • Other DCO capabilities
    • Agenda pod
    • Polls will occur later in this session
mors president s welcome
Dr. Michael J. Kwinn, Jr.

President, MORS

Thanks!!!

Dr. Henningsen, Headquarters Air Force A9, our official workshop sponsor

Mr. Brown, WBB Consulting for facilities for our physical meeting 28-30 October

Mr. Cares, Alidade Incorporated for providing SharePoint site for planning

New initiatives

Conducting both unclassified and classified tracks so uncleared individuals can contribute to solving these national security changes

Using wikis and these online sessions so you can guide the agenda and discussions

Vetting recommendations to senior government leaders during workshop

Request your active participation!

Questions?

MORS President’s Welcome
work shop chair s welcome
Dr. Mark A. Gallagher

Secretary, MORS

Deputy Director for Resource Analysis, HQ USAF/A9R

Thanks to the many who have and are contributing

The MORS Board of Directors and staff

Our sponsors and facilitators

The dedicated workshop staff

All participants, particularly those online

Many opportunities for you to contribute

Most of us are new to these cyber tools

If you have questions, please ask

Welcome your feedback and suggestions

We appreciate and value your time and involvement!

Questions?

Work Shop Chair’s Welcome
today s agenda
Today’s Agenda
  • Welcomes
  • Workshop Goal and Objectives
  • Requirements Discussion
    • Video from Dr. Henningsen
    • AFAMS Cyber Modeling and Simulations Requirements
  • Workshop Organization
  • Tracks Descriptions and Plans
  • Discipline Groups
  • Physical Workshop 28-30 Oct
  • Audience polling
  • How to participate
    • Wiki site for comments
    • Online sessions
    • Physical meeting (requires registration)
  • Join MORS
workshop goals and objectives
Workshop Goals and Objectives
  • Goal: Advance the analytical foundation for evaluating and implementing options for using, protecting, and exploiting the cyber domain for government operations, particularly national security
  • Objectives
    • Ensure attendees understand the nature of the 2008-2010 cyber threat
    • Improve analytical approaches and techniques that support cyberspace operations
      • Establish a comprehensive list of analysis needs for cyber
      • Critique present and proposed analytical approaches and techniques
      • Prepare recommendations to senior leaders to improve cyber analysis
    • Conduct discussions between workshop participants and senior government leaders on recommendations for improving the analytical capability of cyber operations
    • Write an unclassified report with classified appendices summarizing the workshop.
      • Initiate new cyber analysts to the available techniques and challenges
      • Provide recommendations for developing improved analytical approaches for current cyber analysts and their management
workshop report
Workshop Report
  • Workshop will produce a worthwhile written report
    • Makes current analysts aware of other initiatives
    • Brings new analysts up to current capability
    • Provides recommendations to senior leaders on how to proceed
  • Report Content
    • Summarizes of background
    • Identifies issues
    • Assesses current analysis approaches
    • Evaluates enhancements or alternative approaches
    • Recommends steps to develop or implement improved analytical approaches
  • Report sections on each topic and by discipline areas
    • Wiki discussion will provide part of the report
    • Workshop recommendations and rationale are also part of the report
  • Both workshop and report will have unclassified and secret portions!
    • Uncleared and cleared participants and attendees
video from our workshop sponsor
Video from our Workshop Sponsor
  • Her views on the needs for cyber analysis in this 8-minute video
  • Analytical techniques with capabilities similar to operations and acquisitions in other areas
  • Cyber offense is more difficult than the most challenging kinetic actions, combating terrorists
  • Cyber defense is more challenging than preventing crime
  • Cyber is crucial to our national security

Dr. Jacqueline R. Henningsen, SES Director for Studies and Analyses, Assessments and Lessons Learned, Headquarters U.S. Air Force

MORS Sponsor and Fellow

Cyber Analysis Workshop Sponsor

cyber modeling and simulation requirements meeting out brief
Cyber Modeling and Simulation Requirements Meeting Out brief
  • Organizer: Air Force Agency for Modeling and Simulation (Orlando, Florida)
  • Met 19-21 August 2008 at Lackland AFB, San Antonio, Texas
  • Collected cyber modeling requirements
  • Dennis Paquin will provide an unclassified summary of their results for us
  • Questions?
workshop structure
Workshop Structure
  • Staff Functions
    • Security and Facilities (Greg Ehlers)
    • Virtual Collaboration (Todd Hamill)
    • Physical Meeting (Jeff Cares)
    • Taxonomy (Bob Koury)
    • WBB Site Coordinators (Dennis Baer and Tim Hope)
    • Senior Leader Coordination (Greg Keethler)
    • Advertising: (Vacant)
    • Workshop Bulldog (Mark Reid)
  • Matrix participation for online collaboration, virtual meetings, and physical meeting
    • Tracks – desire co-leads external to DoD for unclassified tracks
      • Cyber Environment and Fourth Generation Warfare (Matt Berry and Ted Bennett)
      • Cyber networking for situation awareness and C2 (Pat Allen)
      • Cyber vulnerabilities and protection (Bud Whiteman)
      • Cyber deterrence (Pat McKenna)
      • Cyber exploitation and offensive operations (Col Bob Morris, Lt Col Mike Shields)
      • Humans in cyber networks (Dick Deckro)
      • Cyber impacts to MORS operations (Vacant)
    • Discipline Groups
      • Optimization (Vacant)
      • Decision Analysis (Hunter Marks)
      • Simulation (Sandy Thompson)
      • Computer Science (Vacant)
      • Social Sciences (Vacant)
      • Others?
workshop organization
Workshop Organization
  • Tracks and discipline groups collaborate online
    • Wikis
    • DCO sessions
  • Physical meeting alternate track and discipline group sessions
  • Questions?
unclassified and classified tracks
Unclassified and Classified Tracks
  • Cyber Environment – Fourth Generation Warfare (Matt Berry and Ted Bennett)
  • Cyber Situational Awareness and Command and Control (Pat Allen)
  • Cyber Vulnerabilities, Protection, and Defense (Bud Whiteman)
  • Cyber Deterrence (Pat McKenna)
  • Cyber Exploitation and Offensive Operations (Bob Morris)
  • Humans in Cyber Networks (Dick Deckro)
  • Cyber Impacts on Business Processes (Vacant)

Classified sessions will be limited to Secret No Forn

cyber environment fourth generation warfare track
Cyber Environment – Fourth Generation Warfare Track
  • Lead Vacant, Co-leads Matt Berry and Ted Bennett
  • Track classification will be Unclassified
  • Fourth Generation Warfare (4GW)
    • Who are adversaries?
    • How do they exploit the cyber world?
    • How do we assess their effectiveness of 4GW cyber operations?
  • Network-centric operations (NCO) are a foundation concept for the U.S. military strategy
  • How effective are network-centric operations against 4GW adversaries? Is the strategy more important than the network-centric capabilities?
  • Questions?
cyber situational awareness sa and command and control c2 track
Cyber Situational Awareness (SA) and Command and Control (C2)Track
  • Lead Pat Allen
  • Track will be unclassified
  • Definitions for cyber support to C2 and SA
  • Operational SWOT: strengths, weaknesses and threats for current cyber support to C2 & SA, and for future cyber support to C2 & SA
  • Analytic SWOT: Analytic techniques that are strong or weak to analyze cyber support to C2 and SA for current and future operations
  • Summary of findings
  • Questions?
cyber vulnerabilities protection and defense track
Cyber Vulnerabilities, Protection, and DefenseTrack
  • Lead Bud Whiteman
  • Session classification will be classified
  • Our nation, including forces contributing to national security, rely on cyber systems and services 
    • What are the vulnerabilities of these systems? 
    • How do we protect and defend them?  
  • This track focuses on analytical methods to address these questions
  • Information Operations Joint Munitions Effectiveness Manual (IO JMEM) session on accreditation process for computer network defense and attack models on Monday, 15 Sep, 1400-1600 (2 pm – 4 pm) EDT
  • Questions?
cyber deterrence track
Cyber Deterrence Track
  • Lead Pat McKenna
  • Session classification will be Unclassified
  • How is deterring cyber similar/different from “traditional” deterrence?
    • Who is the actor (e.g., state, non-state, individual)?
    • Attribution vs. non-attribution vs. not attributable
    • Lack of precedents, red lines, and established declaratory policy
  • What analytic capabilities are required?
    • Across academic disciplines (Social sciences, OR, etc.)
  • What analytic tools exist? What are the analytic gaps?
  • War gaming deterring cyber issues
    • Is it a valuable approach?
    • What has been done in the past?
    • What are the “best practices”?
  • How do you assess actions to deter cyber?
    • What is the contribution of cyber defense to deterring cyber?
    • How are 2nd (nth) order implications represented?
  • Questions?
cyber exploitation and offensive operations track
Cyber Exploitation and Offensive OperationsTrack
  • Lead Bob Morris
  • Session classification will be classified
  • How can the US use cyber capabilities?
  • How can we plan and assess the effectiveness of these techniques?
  • Questions?
humans in cyber networks track
Humans in Cyber Networks Track

Lead Dick Deckro

Session classification will be Unclassified & Classified

Investigate how issues of human interface and networking, both social and operationally, effects cyber operations

Initial focus will be on the effects on national strategic computer network operations, the intelligence, training, and over all operational questions will be considered

Finally, the existence of developing cyber cultures and societies and their effects on current and future postures will be explored

Questions?

cyber impacts on business processes track
Cyber Impacts on Business ProcessesTrack
  • Lead Vacant
  • Session classification will be Unclassified
  • Cyber capabilities can greatly enhance productivity and create vulnerabilities. Government policy makers are attempting to weigh the tradeoffs.
    • This workshop planned to write an unclassified report using our wiki
    • DoD policy prohibits their employees from posting to open sites without a public affairs reviews that requires weeks
    • How can DoD effectively collaborate across federal and state government and with academia and industry?
  • How can we assess the benefits of using cyber tools?
  • Can we evaluate the vulnerabilities and risks?
  • Do our techniques enable assess the ability of technical means to mitigate risks?
  • Questions?
discipline groups
Discipline Groups
  • Discipline Groups
    • Simulation (Sandy Thompson)
    • Decision Analysis (Hunter Marks)
    • Optimization (Vacant)
    • Computer Science (Vacant)
    • Social Sciences (Vacant)
    • Others discipline groups may be added
  • Groups are based on specialties or academic background
    • Determine how their specialty can contribute to improving the analytical approaches
    • Individuals may participate in multiple discipline groups online
    • Individuals will be limited to a single group during the physical meeting
  • Groups get visibility and work issues across the tracks
    • Examine issues raised by tracks
    • Within limit of their security clearances
    • Groups provide cross-fertilization of ideas for the workshop
  • Groups may write their own section of the workshop report
  • Questions?
workshop plan
Workshop Plan
  • Security Procedures and Access
    • Classified wiki, DCO sessions, and physical workshop tracks are limited to individuals with secret clearances.
    • Unclassified wiki, DCO sessions, and physical workshop tracks are open to anyone
    • DCO Sessions apply the same approval and security procedures as physical meetings. The senior leader DCO session is an internal workshop review.
  • Virtual meetings and collaboration
    • Opening Plenary today (26 August) with this DCO session
    • Each track at least one DCO during September (unclassified or secret)
    • Each discipline group at least one before17 October (unclassified or secret)
    • Summary plenary unclassified DCO session 21 October
    • Collaboration on going on wikis
    • DCO meetings will be advertised on morsnet and cyberanalysis wikis and announced through Alidade SharePoint.
  • Physical Meeting: 28-30 October, Whitney, Bradley, & Brown (WBB) Consulting, Reston, Virginia
  • Questions?
unclassified wiki use
Unclassified Wiki Use
  • www.cyberanalysis.pbwiki.com
  • Login in or request an account – upper right
    • Account enables preferences on frequency of email notifications
  • You may edit anywhere – Please add you views without deleting other views
    • “View” or “Edit” tabs – top left
    • Select “Edit” – like a simple word processor
      • Add Text, just type with format functions on top
      • Add horizontal bar to divide section, function on top
      • Under “Insert Links” – Middle of right side
        • Select “Page”, highlight text to be link, click on either
          • Existing page that is listed on right side
          • “Insert a link to new page”
        • Select “Insert file or image”
          • Browse to file, click upload, click on file name in list, file inserted in text at cursor location
    • You may create as many pages as you need to isolate discussion or have a unique comment thread
  • Navigating the wiki pages—the top cyberanalysis will bring you back to the frontpage
wbb facilities
WBB Facilities
  • The physical meeting on 28-30 Oct
    • WBB Consulting facilities in Reston, Virginia
    • Sheraton is next door
  • The facilities are nice and spacious
  • Almost all rooms have internet capability
    • Senior Leader DCO session can be projected in the various rooms
  • Questions?
physical meeting schedule
Physical Meeting Schedule

9 Ninety-Minute Sessions: 5 for Tracks and 4 for Discipline Groups

workshop participation
Workshop Participation
  • Many opportunities for you to participate in enhancing our national security
  • Use the Wiki sites
    • Learn from the background and others
    • Inputs, comments, suggestions
  • Watch and participate in online sessions
  • Register and attend the physical meeting
    • Go to www.mors.org for invitation
  • Questions?
audience polling
Audience Polling
  • Do you think this online session was worthwhile?
  • Do you expect to provide inputs on the wikis? (yes or no)
  • Which tracks do you expect to participate through either the wikis or online sessions? (May select multiple)
  • Which discipline groups do you expect to participate in either through the wikis or online sessions? (May select multiple?
  • At the physical meeting, which track do you intend to attend? (Select only one)
  • For the physical meeting, which discipline group do you best align with? (select only one)
join mors
Join MORS
  • MORS has been supporting the Department of Defense (DoD) for over 40 years
    • Improving analysis
    • Networking experts
    • Enhancing professional development
  • MORS is expanding to national and international security
    • Added Department of Homeland Security as a sponsor
    • Initiated a dialog with NASA
  • View www.mors.org for more details on the society, membership, and registration for this workshop
ad