Information and Cyberspace Symposium

22-25 September 2008

  • Purpose
  • Agenda
  • Papers
  • Presentations

The purpose of this symposium is to increase our understanding of the cyber-electronic aspects of the 2010-2015 operational environment by leveraging the expertise and perspectives of subject matter experts from across the Joint, Interagency, Intergovernmental, and Multinational (JIIM) community, academia, and industry. A secondary but important objective of the Symposium is to expand outreach to key stakeholders across the JIIM community, academia and industry. A broader community of practice will benefit all concerned.


Objectives and desired outcomes:


•  To gain knowledge from subject matter experts from across the JIIM, academia, and industry to better describe the cyber-electronic and information aspects of the operational environment


•  To get the ICDT and Community of Practice (CoP) to think more broadly and start developing a common understanding of the cyber-electronic and information aspects of the operational environment in order to better understand the problem and way forward


•  Expand JIIM, academia, and industry outreach to key stakeholders and potential partners (develop broader CoP and team build)


•  To sustain cross-disciplinary dialogue and foster ongoing information exchange, please join our social networking site at www.cybercognitor.ning.com. This site is a work-in-progress but allows for the strengthening of the community of practice, discussion board conversations, announcements and more. We welcome your feedback on ways to make this site more useful to promoting collaboration, constructive debate and substantive outcomes.

September 2008 Information and Cyberspace Symposium Revised Agenda (Download the PDF version)


Monday, 22 Sep


0950 - 1025 Mathematics for Cyber Warriors: LTC Jonathan Fox


1025 - 1100 Dr. Gurdip Singh, Kansas State University


1100 - 1130 Dr. John Hatcliff, Kansas State University


1130 - 1230 LUNCH


1230 - 1630 Plenary 2: C-E Aspects of the Operational Environment


1230 - 1310 Mr. Charles Ross, McAfee


1310 - 1350 Mr. John Barcomb, Sprint


1405 - 1445 Mr. Michael Berg, Sandia National Labs


1445 - 1525 Dr. Tim Gibson, DARPA


1545 - 1630 Dr. Kamal Jabbour, Air Force Research Lab - Rome, NY


Tuesday, 23 Sep


0810 - 0845 Dr. Bala Natarajan, Kansas State University


0845 - 0920 Mr. Scott Borg, US Cyber Consequences Unit


0935 - 1010 Dr. Joseph Evans, Univ of Kansas


1010 - 1045 Mr. Giorgio Bertoli, Intelligence and Information Warfare Directorate (I2WD)


1100 - 1200 Tech Panel Discussion

Panelists: Mr. John Barcomb - Sprint, Dr. Charles Ross - McAfee, Dr. Tim Gibson - DARPA, Dr. Simon Ou - Kansas State Univ., Dr. John Hatcliff - Kansas State Univ.

1300 - 1335 Cyber Attack Space Environment: Dr. Chris Scott, MIT Lincoln Labs


1335 - 1420 Space Environment and Challenges - LTC Wolfe, SMDC/ARSTRAT


1435 - 1605 Breakout Session 1: The Cyber-Electronic Aspects of Operational Environment

Breakout Group 1:
Facilitator: Dr. Plaudy Meadows
Panelists: Dr. Virgil Wallentine - Kansas State University
Dr. Joe Evans - University of Kansas, invited
Dr. Sriram Vishwanath - University of Texas
Dr. George F. (Fred) Wright - Georgia Tech University
Breakout Group 2:
Facilitator: Mr. Jeff Hoing
Panelists: Dr. Chris Scott, MIT Lincoln Labs
Mr. Michael Berg, Sandia National Labs
Dr. Dan Koller, Penn State University
Mr. Scott Harmon / Mr. John Homer - Kansas State University

Wednesday, 24 Sep


0810 - 0845 Dr. Scott DeLoach, Kansas State University


0850 - 0925 Mr. Peter Gasper, Idaho National Labs


0940 - 1045 Breakout Session 2: Emerging Technologies, Research & Study Areas, Way Ahead

Breakout Group 1:
Facilitator: Dr. Plaudy Meadows
Panelists: Dr. Scott DeLoach, Kansas State University
Dr. Randy Curry, University of Missouri
Mr. Scott Borg, US Cyber Consequences Unit
Dr. John Hatcliff, Kansas State University
Breakout Group 2:
Facilitator: Mr. Jeff Hoing
Panelists: Mr. Peter Gasper, Idaho National Labs
Dr. Blaine Burnham, University of Nebraska Omaha
Dr. Ricardo Bettati, Texas A&M University
Mr. Scott Harmon - Kansas State University
Mr. John Homer - Kansas State University

1400 -1600 Emerging Technologies Briefs Dr. Curry, University of Missouri

Mathematical Literacy as a Fundamental Component of Training Cyber Warriors: Moving Beyond the Tools and Towards Fishing, LTC Jon Fox, MAJ Samuel Huddleston, September 8, 2008.


Modern Traffic Analysis and its Capabilities, Dr. Riccardo Bettati, Department of Computer Science, andCenter for Information Assurance and Security, Texas A&M University, September 10, 2008.


802.11n: Next-Generation Wireless LAN Technology White Paper, Broadcom Inc., April 2006.


An SDR Platform for Satellite Earth Stations , Rob Kraft, Field Applications Engineer, Spectrum Signal Processing, Inc., July/August 2001.


Assessing the Contribution of Cyber-Attacks to Military Operations: Applying the Value Creation / Value Destruction Model in a Non-Monetary Context, Abstract, Scott Borg, Director and Chief Economist, U.S. Cyber Consequences Unit.


Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security AND Privacy, Ann Cavoukian, Ph.D., Information and Privacy Commissioner/Ontario, Alex Stoianov, Ph.D., Biometrics Scientist, March 2007.


Cyber Threat to Critical Infrastructure - 2010-2015, Peter D. Gasper, Idaho National Laboratory, September 2008.


Does CNO + EW = Cyber ?, LtCol Jesse Bourque, Director of Operations , Joint EW Center, The Journal of Electronic Defense, September 2008.


From RF EAS to RFID Solutions: RF Technology To Be Taken To New Heights, Emily Harwood, Freelancer writer & Marketing consultant of security Industry, Checkpoint Systems Inc, May/June 2001.


High Performance VPN Solutions Over Satellite Networks, Encore Networks, October 2004.


Honeycomb - Creating Intrusion Detection Signatures Using Honeypots, Christian Kreibich, Jon Crowcroft University of Cambridge Computer Laboratory.


HUSH Encryption Engine White Paper, Hush Communications Ltd, November 29, 2004.


IntruProTM : IPS Inline Intrusion Prevention White Paper, Intoto Inc., May 5, 2004.


Network Intrusion Prevention Systems Justification and ROI, McAfee, October 2004.


Voice over IP (VoIP) Over Satellite: A White Paper, Galaxy Broadband Communications Inc., April 2007.

Opening Remarks, Mr. Jordan, Director - CDID, September 22, 2008.


Opening Remarks, COL Dave Haught, Director - US Army Information Operations Proponent, September 22, 2008.


Opening Remarks, COL Wayne Parks, Director - US Army Computer Network Operations and Electronic Warfare Proponent, September 22, 2008.


Mathematics Literacy brief is not available for posting but the white paper is available in the Papers section.


Programmable Data Collection Networks, Dr. Gurdip Singh, Computing and Information Sciences, Kansas State University, September 22, 2008.


Design, Development, and Certification of High Assurance Software, Dr. John Hatcliff, Professor, SAnToS Laboratory, Computing and Information Sciences, Kansas State University, September 22, 2008.


Combating Today's Cyber Threats- Inside Look at McAfee's Security, Mr. Charles Ross, Director Sales Engineering Public Sector, McAfee, September 22, 2008.


Future Wireless Networks, Mr. John Barcomb, Wireless Engineer, Sprint, September 22, 2008.


Advanced Malware Trends, Mr. Michael Berg, Senior Member of Technical Staff, Sandia National Laboratories, September 22, 2008.


An Overview of the Defense Advanced Projects Research Agency (DARPA), Dr. Tim Gibson, September 22, 2008.


Commanding General: Opening Remarks, LTG William Caldwell IV, Combined Arms Center Commanding Officer, September 22, 2008.


Air Force Cyber Development, Dr. Kamal Jabbour, Air Force Research Lab, September 22, 2008. (Awaiting approval to post document)


Transformation through Information in Cyberspace, Dr. Bala Natarajan, Associate Professor, Director -Wireless Communication (WiCom) Group, Dept. of Electrical and Computer Engineering, Kansas State University, September 23, 2008.


Mr. Scott Borg, US Cyber Consequences Unit (Awaiting approval to post document)


Intelligence in the Network-Future Wireless Networks, Dr. Joseph Evans, Deane E. Ackers Distinguished Professor, Electrical Engineering & Computer Science, Director, Information & Telecommunication Technology Center, September 23, 2008.


Cyberspace: Understanding the Environment, Technologies, and Challenges, Mr. Giorgio Bertolli, CISSP, Chief, Offensive Information Operations Branch, September 23, 2008.


Cyber Warfare: A Perspective on Cyber Threats and Technology in the Network-Centric Warfare Battlespace, Dr. Chris Scott, Information and Systems Technology Group, MIT Lincoln Laboratory, September 23, 2008.


Army Space Power, LTC Richard Wolfe, Integration Division Chief, Directorate of Combat Development, Future Warfare Center, SMDC, September 23, 2008.


Human - Robot Teams, Dr. Scott A. DeLoach, Kansas State University Computer and Information Sciences Department, September 24, 2008.


Cyber Threat to Critical Infrastructure 2010-2015: Increased Control System Exposure, Mr. Peter Gasper, Idaho National Laboratory, September 24, 2008.

 

Last Reviewed: October 2, 2008

 
          |   Privacy and Security Notice   |     |   Accessibility Help   |   External Link Disclaimer   |   No Fear Act   |
 
|   U.S. Army   |   Tradoc   TRADOC   |   iSALUTE   | Ft. Leavenworth   |   Site Map   |   FOIA   |   USA.GOV   |   This is an official U.S. Army Site   |