Research Focus August 2018 Classified by: Curt Beck Derived from:

Slides:



Advertisements
Similar presentations
Modelling CGFs for tactical air-to-air combat training
Advertisements

Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
InformationInWarfareIW-100 College of Aerospace Doctrine, Research, and Education.
Sensors and location technologies – the front end of ISR
Introduction to Information Operations Attaché Corps- SEP 09
The U.S. Coast Guard’s Role in Cybersecurity
Integrating information towards Digital ATM Cyber Situational Awareness Presented By: David M. Petrovich Date:August 28, 2013.
1 UNCLASSIFIED Mr. J. Frank Wattenbarger Director, Advanced Technology Directorate TECHNOLOGICAL CAPABILITIES FOR THE GLOBAL WAR ON TERRORISM 5 February.
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
ISAT Working Group Augmented Cognition Eric Horvitz (Chair), Lee Kollmorgen, Randy Pausch, Paul Rosenbloom, Dylan Schmorrow, Jean Scholtz, Allen Sears,
1 NCOIC MSD Agenda Net-Centric Operations 2.0, Domain-Specific SOA Frameworks, M&S Testbed Demos Bob Marcus
Commanding Officer’s Training Philosophy and Guidance Our training standards, in peace, will define our ability to win in war. As Artilleryman, the inherent.
DoD Acquisition Domain (Sourcing) (DADS) Analysis of Alternatives (AoA) E-Business/SPS Joint Users’ Conference November 15-19, 2004 Houston, TX.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
MCA-3 The Graduate Certificate of Africa Strategic Intelligence Studies Why CAS? This graduate certificate prepares students to critically identify, analyze.
1 NCOIC MSD Agenda Net-Centric Operations 2.0, Domain-Specific SOA Frameworks, M&S Testbed Demos Bob Marcus
Force Packaging. Overview Principles of War Process of Force Packaging Developing Packages.
Joint Training Challenges of Irregular Warfare/COIN and Full Spectrum Training Requirements Brief for WJTSC LtCol John Merna, J7/9-TJ 23 September.
Understanding the Human Network Martin Kruger LCDR Jodie Gooby November 2008.
FA50 Qualification Course
Military Intelligence
Protecting Against Cyber Challenges Pacific Operational Science & Technology Conference 15 March 2011 Rob Wolborsky Chief Technology Officer Space and.
Employment Considerations: Considerations at the Outset of Combat
GORT Planning/Guidance Session with LTG Barclay
Peace Support Training Centre / Centre de formation pour le soutien de la paix INTRO TO PSYOPS AIYJ PSTC Template designed by Maj McQueen.
“Existing world order is being redefined.” Henry Kissinger Jan 2015
Attention CFOs How to tighten your belt and still survive May 18, 2017.
DoD Cyberspace Workforce Definitions
architecting the DIGITAL enterprise
Distributed Operations Concept
Panel Discussion: C4I Solutions for Combating
Multi-domain Command & Control
J. A. “Drew” Hamilton, Jr., Ph.D.
CIO G-6 Signal Conference
Fires Conceptual Framework Supporting Multi-Domain Battle
Installations of the Future
CIO G-6 Signal Conference
Air Force Data Strategy
Exploring Application Lifecycle Management and Its Role in PLM
U.S. Introduction & Update to the 2017 QCJWC
DoD Cyberspace Workforce Definitions
Counter UAV program within NATO Joint Capability Group on Ground Based Air Defence by Fred Klumpers (NLD-MoD) Chairman JCGGBAD NATO UNCLASSIFIED.
Mission Command Center Excellence Directorate of Training
Mission Command Center Excellence Directorate of Training
Strategic Partnerships to Increase Student and Faculty Opportunities
Joint Staff J8, Deputy Director for C4
Introduction to Information Systems
Bush/Rumsfeld Defense Priorities/Objectives A Mandate For Change
EVP, Chief Administrative Officer
ADEISA – Industry’s contribution to ADF Superiority of the EMOE
Public Health Department Fakultas Kedokteran Universitas Padjadjaran
Presentation to the INTOSAI Working Group on IT Audit Systems assurance and data analytics for continued audit quality and improved efficiency of audits.
Overall Classification of this Briefing is UNCLASSIFIED
Joint Program Executive Office for Chemical and Biological Defense
Women in Cyber and Satellites Discuss Realities & Practicalities
Define Your IT Strategy
DISTRIBUTION A: APPROVED FOR PUBLIC RELEASE
Disrupter Event May 2019 Capability Submission Deadline: 3 April
KEY INITIATIVE Financial Data and Analytics
KEY INITIATIVE Shared Services Function Management
Sachiko A. Kuwabara, PhD, MA
S&T Main Focus Areas Linkages to 2018 NDS
KEY INITIATIVE Financial Data and Analytics
DISTRIBUTION A: APPROVED FOR PUBLIC RELEASE
KEY INITIATIVE Finance Function Management
AFSOC Research Interests
I4.0 in Action The importance of people and culture in the Industry 4.0 transformation journey Industry 4.0 Industry 3.0 Industry 2.0 Industry 1.0 Cyber.
Command Indoctrination Operations Security DD MMM YY
Department of Defense Principal Deputy Chief Information Officer
Presentation transcript:

Research Focus August 2018 Classified by: Curt Beck Derived from: UNCLASSIFIED Classified by: Curt Beck Derived from: Declassify on: Research Focus August 2018 UNCLASSIFIED

AGENDA JSOC Mission Research Focus Research Support Questions UNCLASSIFIED AGENDA JSOC Mission Research Focus Research Support Questions UNCLASSIFIED

UNCLASSIFIED Mission JSOC prepares assigned, attached, and augmentation forces, and when directed, conducts special operations against threats to protect the Homeland and U.S. interests abroad. UNCLASSIFIED

Research Focus Big Data/ Information Management UNCLASSIFIED Research Focus Big Data/ Information Management Innovation and Technology/Cyber Near-Peer Competition North Korea unpredictability w/ regard to WMD Countering Violent Extremist Organizations (VEO) Disenfranchised youth AQ/ISIS Radicalization in refugee camps UNCLASSIFIED

JSOC Technology Roadmap Aimpoints UNCLASSIFIED JSOC Technology Roadmap Aimpoints MAJ Ed Churchill Kirk Windmueller JSOC-X JSOC-X 910-243-8078 910-243-8079 churchille@jdi.socom.mil windmuellera.ctr@jdi.socom.mil Autonomous Systems: Distributed computing systems capable of self management to overcome changes or complexities in environments/situations. Autonomous systems (a) take data and intent from operators and the environment and (b) determine solutions and take actions, within the constraints provided by the operator. SCOPE: Enterprise initiatives that leverage sensors and computational decision-making aids to allow select systems to ingest, analyze, and recommend/take physical actions where machine analytics are expected to be more effective, more efficient, or more capable than human analysis. Autonomous Systems Sensor Fusion Sensor Fusion is the ability to collect and format multiple sources of information into a central database that can leverage next generation technologies and provide operators at all levels information that will dramatically enhance the commands effectiveness. SCOPE: Sensor Fusion will be implemented from the Tactical Edge to the IC. Signature Management Signature Management is enterprise initiatives that enable forces to move, observe and engage the enemy and communicate globally while remaining undetected. It includes digital, physical, audible, visual, and electromagnetic signatures. Human Effects Human Effects are tactical-level initiatives that allow us to neutralize or incapacitate a combatant with the intent to capture without the application of lethal force, while limiting / mitigating risk to friendly forces. Includes: Non-lethal munitions, chemical agents, other sensory weapons (audible, visual, psyops, influence, etc). Human Effects also includes enhancing and protecting operators and the workforce. This includes the mental/cognitive and physical aspects of our personnel to increase resilience and overall human function. Influence Warfare Influence Warfare enables SOF maneuver in the cognitive domain. Utilizes next generation targeting to combine CEM, PAI, and commercially procured information for precision delivery of cyber, information, and deception payloads. SCOPE: Enterprise and tactical-level initiatives that allow forces to manipulate adversary’s cognitive process including pattern of life and actions in order to make decisions of our choosing. Includes: Psychological warfare and cyber targeting. UNCLASSIFIED

Research SUPPORT 4 x JIANT Computers Limited TDY support possible UNCLASSIFIED Research SUPPORT 4 x JIANT Computers Limited TDY support possible Post-graduation work opportunity UNCLASSIFIED

POINTS OF CONTACT Mr. Curt Beck, JSOC Chief Learning Officer UNCLASSIFIED POINTS OF CONTACT Curt Beck J7 425-3488 Aug 2018 Mr. Curt Beck, JSOC Chief Learning Officer beckcu@jdi.socom.mil (910) 243-3488 Ms. Kristin Simmler, Operations Analyst simmlerk.ctr@jdi.socom.mil (910) 243-2940 UNCLASSIFIED

UNCLASSIFIED Questions UNCLASSIFIED