The purpose of this symposium is to increase our understanding of the cyber-electronic aspects of the 2010-2015 operational environment by leveraging the expertise and perspectives of subject matter experts from across the Joint, Interagency, Intergovernmental, and Multinational (JIIM) community, academia, and industry. A secondary but important objective of the Symposium is to expand outreach to key stakeholders across the JIIM community, academia and industry. A broader community of practice will benefit all concerned.
Objectives and desired outcomes:
• To gain knowledge from subject matter experts from across the JIIM, academia, and industry to better describe the cyber-electronic and information aspects of the operational environment
• To get the ICDT and Community of Practice (CoP) to think more broadly and start developing a common understanding of the cyber-electronic and information aspects of the operational environment in order to better understand the problem and way forward
• Expand JIIM, academia, and industry outreach to key stakeholders and potential partners (develop broader CoP and team build)
• To sustain cross-disciplinary dialogue and foster ongoing information exchange, please join our social networking site at www.cybercognitor.ning.com. This site is a work-in-progress but allows for the strengthening of the community of practice, discussion board conversations, announcements and more. We welcome your feedback on ways to make this site more useful to promoting collaboration, constructive debate and substantive outcomes.
September 2008 Information and Cyberspace Symposium Revised Agenda (Download the PDF version)
Monday, 22 Sep
0950 - 1025 Mathematics for Cyber Warriors: LTC Jonathan Fox
1025 - 1100 Dr. Gurdip Singh, Kansas State University
1100 - 1130 Dr. John Hatcliff, Kansas State University
1130 - 1230 LUNCH
1230 - 1630 Plenary 2: C-E Aspects of the Operational Environment
1230 - 1310 Mr. Charles Ross, McAfee
1310 - 1350 Mr. John Barcomb, Sprint
1405 - 1445 Mr. Michael Berg, Sandia National Labs
1445 - 1525 Dr. Tim Gibson, DARPA
1545 - 1630 Dr. Kamal Jabbour, Air Force Research Lab - Rome, NY
Tuesday, 23 Sep
0810 - 0845 Dr. Bala Natarajan, Kansas State University
0845 - 0920 Mr. Scott Borg, US Cyber Consequences Unit
0935 - 1010 Dr. Joseph Evans, Univ of Kansas
1010 - 1045 Mr. Giorgio Bertoli, Intelligence and Information Warfare Directorate (I2WD)
1100 - 1200 Tech Panel Discussion
||Mr. John Barcomb - Sprint, Dr. Charles Ross - McAfee, Dr. Tim Gibson - DARPA, Dr. Simon Ou - Kansas State Univ., Dr. John Hatcliff - Kansas State Univ.
1300 - 1335 Cyber Attack Space Environment: Dr. Chris Scott, MIT Lincoln Labs
1335 - 1420 Space Environment and Challenges - LTC Wolfe, SMDC/ARSTRAT
1435 - 1605 Breakout Session 1: The Cyber-Electronic Aspects of Operational Environment
|Breakout Group 1:
||Dr. Plaudy Meadows
Dr. Virgil Wallentine - Kansas State University
Dr. Joe Evans - University of Kansas, invited
Dr. Sriram Vishwanath - University of Texas
Dr. George F. (Fred) Wright - Georgia Tech University
|Breakout Group 2:
||Mr. Jeff Hoing
Dr. Chris Scott, MIT Lincoln Labs
Mr. Michael Berg, Sandia National Labs
Dr. Dan Koller, Penn State University
Mr. Scott Harmon / Mr. John Homer - Kansas State University
Wednesday, 24 Sep
0810 - 0845 Dr. Scott DeLoach, Kansas State University
0850 - 0925 Mr. Peter Gasper, Idaho National Labs
0940 - 1045 Breakout Session 2: Emerging Technologies, Research & Study Areas, Way Ahead
|Breakout Group 1:
||Dr. Plaudy Meadows
Dr. Scott DeLoach, Kansas State University
Dr. Randy Curry, University of Missouri
Mr. Scott Borg, US Cyber Consequences Unit
Dr. John Hatcliff, Kansas State University
|Breakout Group 2:
||Mr. Jeff Hoing
Mr. Peter Gasper, Idaho National Labs
Dr. Blaine Burnham, University of Nebraska Omaha
Dr. Ricardo Bettati, Texas A&M University
Mr. Scott Harmon - Kansas State University
Mr. John Homer - Kansas State University
1400 -1600 Emerging Technologies Briefs Dr. Curry, University of Missouri
Mathematical Literacy as a Fundamental Component of Training Cyber Warriors: Moving Beyond the Tools and Towards Fishing, LTC Jon Fox, MAJ Samuel Huddleston, September 8, 2008.
Modern Traffic Analysis and its Capabilities, Dr. Riccardo Bettati, Department of Computer Science, andCenter for Information Assurance and Security, Texas A&M University, September 10, 2008.
802.11n: Next-Generation Wireless LAN Technology White Paper, Broadcom Inc., April 2006.
An SDR Platform for Satellite Earth Stations , Rob Kraft, Field Applications Engineer, Spectrum Signal Processing, Inc., July/August 2001.
Assessing the Contribution of Cyber-Attacks to Military Operations: Applying the Value Creation / Value Destruction Model in a Non-Monetary Context, Abstract, Scott Borg, Director and Chief Economist, U.S. Cyber Consequences Unit.
Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security AND Privacy, Ann Cavoukian, Ph.D., Information and Privacy Commissioner/Ontario, Alex Stoianov, Ph.D., Biometrics Scientist, March 2007.
Cyber Threat to Critical Infrastructure - 2010-2015, Peter D. Gasper, Idaho National Laboratory, September 2008.
Does CNO + EW = Cyber ?, LtCol Jesse Bourque, Director of Operations , Joint EW Center, The Journal of Electronic Defense, September 2008.
From RF EAS to RFID Solutions: RF Technology To Be Taken To New Heights, Emily Harwood, Freelancer writer & Marketing consultant of security Industry, Checkpoint Systems Inc, May/June 2001.
High Performance VPN Solutions Over Satellite Networks, Encore Networks, October 2004.
Honeycomb - Creating Intrusion Detection Signatures Using Honeypots, Christian Kreibich, Jon Crowcroft University of Cambridge Computer Laboratory.
HUSH Encryption Engine White Paper, Hush Communications Ltd, November 29, 2004.
IntruProTM : IPS Inline Intrusion Prevention White Paper, Intoto Inc., May 5, 2004.
Network Intrusion Prevention Systems Justification and ROI, McAfee, October 2004.
Voice over IP (VoIP) Over Satellite: A White Paper, Galaxy Broadband Communications Inc., April 2007.
Opening Remarks, Mr. Jordan, Director - CDID, September 22, 2008.
Opening Remarks, COL Dave Haught, Director - US Army Information Operations Proponent, September 22, 2008.
Opening Remarks, COL Wayne Parks, Director - US Army Computer Network Operations and Electronic Warfare Proponent, September 22, 2008.
Mathematics Literacy brief is not available for posting but the white paper is available in the Papers section.
Programmable Data Collection Networks, Dr. Gurdip Singh, Computing and Information Sciences, Kansas State University, September 22, 2008.
Design, Development, and Certification of High Assurance Software, Dr. John Hatcliff, Professor, SAnToS Laboratory, Computing and Information Sciences, Kansas State University, September 22, 2008.
Combating Today's Cyber Threats- Inside Look at McAfee's Security, Mr. Charles Ross, Director Sales Engineering Public Sector, McAfee, September 22, 2008.
Future Wireless Networks, Mr. John Barcomb, Wireless Engineer, Sprint, September 22, 2008.
Advanced Malware Trends, Mr. Michael Berg, Senior Member of Technical Staff, Sandia National Laboratories, September 22, 2008.
An Overview of the Defense Advanced Projects Research Agency (DARPA), Dr. Tim Gibson, September 22, 2008.
Commanding General: Opening Remarks, LTG William Caldwell IV, Combined Arms Center Commanding Officer, September 22, 2008.
Air Force Cyber Development, Dr. Kamal Jabbour, Air Force Research Lab, September 22, 2008. (Awaiting approval to post document)
Transformation through Information in Cyberspace, Dr. Bala Natarajan, Associate Professor, Director -Wireless Communication (WiCom) Group, Dept. of Electrical and Computer Engineering, Kansas State University, September 23, 2008.
Mr. Scott Borg, US Cyber Consequences Unit (Awaiting approval to post document)
Intelligence in the Network-Future Wireless Networks, Dr. Joseph Evans, Deane E. Ackers Distinguished Professor, Electrical Engineering & Computer Science, Director, Information & Telecommunication Technology Center, September 23, 2008.
Cyberspace: Understanding the Environment, Technologies, and Challenges, Mr. Giorgio Bertolli, CISSP, Chief, Offensive Information Operations Branch, September 23, 2008.
Cyber Warfare: A Perspective on Cyber Threats and Technology in the Network-Centric Warfare Battlespace, Dr. Chris Scott, Information and Systems Technology Group, MIT Lincoln Laboratory, September 23, 2008.
Army Space Power, LTC Richard Wolfe, Integration Division Chief, Directorate of Combat Development, Future Warfare Center, SMDC, September 23, 2008.
Human - Robot Teams, Dr. Scott A. DeLoach, Kansas State University Computer and Information Sciences Department, September 24, 2008.
Cyber Threat to Critical Infrastructure 2010-2015: Increased Control System Exposure, Mr. Peter Gasper, Idaho National Laboratory, September 24, 2008.