Program & Conference Handbook

Program
&
Conference Handbook
Program: Day 1—Tuesday 11 November 2014................................................... 2 Program: Day 2—Wednesday 12 November 2014 ............................................. 3 Program: Day 3—Thursday 13 November 2014 ................................................. 4 Session Abstracts: Day 1—11 November 2014................................................... 5 Session Abstracts: Day 2—12 November 2014................................................... 8 Session Abstracts: Day 3—13 November 2014................................................. 13 Day 1—Tuesday 11 November 2014
07:30am
Session 1.1 Breakfast Session: Exhibition open and coffee available
9:00am
Session 1.2 Plenary Session: Opening Session
Welcome: Professor Michael Frater, Rector UNSW Canberra and Mr Peter Lawrence, Chief Information Officer, CIOG
Keynote Address: Mr Peter Lawrence, Chief Information Officer, CIOG
10.00am
Morning Tea
10.30am
Session 1.3a Plenary Session: CIO Session
Keynote Address: ICT Strategy and the Way Ahead: Mr Aiyaswami Mohan, Chief Technology Officer, CIOG
Keynote Address: The Infrastructure Journey: MAJGEN Mike Milford, Head ICT Operations Division, CIOG
12.30pm
Lunch
Session 1.3b Update: 2015 Defence White Paper (Mr Mike Kalms, KPMG & Dr Stephan Fruhling, ANU)
1.30pm
Session 1.4a
Update: Six Tech Trends to Transform
Defence
(Mr Dave Maunsell & Gordon Stewart,
Accenture)
Session 1.5a
Update: Bringing the Transformed Defence
Terrestrial Communications Capability to Life
(Mr Craig Smith, Telstra)
Session 1.6a
IEEE STREAM
Paper 1: Evaluating Impacts of System Integration
on Joint Fires Operations
Paper 2: Simultaneous X/Ka-Band Feed System for
Large Earth Station SATCOM Antennas
Session 1.7a
Product Brief: Building Safer Smart Cities
(Mr Leo Chu & Mr Jimmy Ng, NEC)
2.30pm
Session 1.4b
Update: Finding the Path Forward to
Interoperability of the Emerging Link 16
Upgrades
(Dr Pete Camana, ViaSat)
Session 1.5b
Product Brief: Case Studies in Mobility for
Classified Environments
(Mr Jon Green, Aruba Networks)
Session 1.6b
IEEE STREAM
Paper 1: Enhancing Space Situational Awareness
Using Passive Radar From Space Based Emitters of
Opportunity
Paper 2: Practical Implications of the New Australian
and New Zealand Laser Safety Standard
Session 1.7b
Product Brief: High Throughput Satellite (HTS)
Communications for Government and Military
Applications
(Mr “D” D’Ambrosio, O3b Networks)
4.00pm
Session 1.4c
Panel Session: Does Australia Need a
Defence Industry?
(Sponsored by ADIESA)
Session 1.5c
Product Brief: Dependable and Secure
(Mr Andy Start, President Inmarsat Global
Government)
Session 1.6c
Update: Developing a Mission Partner
Environment; Lessons from Exercise Aqua Terra
2014
(MAJ Jason Broderick and Dr Peter Holliday,
Land Network Integration Centre)
Session 1.7c
Update: Cloud Adoption for Government and the
Large Enterprise – Lessons Learned
(Mr Mark Potts, Hewlett-Packard Company)
5.00pm
to 6:30pm
Welcome Networking Drinks
3.30pm
Exhibition runs from 7:30am to 6:30pm (open to exhibition-only registration from 1:30pm to 4:30pm)
IEEE Stream (Refereed papers) co-sponsored by IEEE
Day 2—Wednesday 12 November 2014
07:30am
Session 2.1 Breakfast Session—Exhibition open and coffee available (SCAC Members in attendance)
Product Brief (Ballroom): Hitachi Data Systems
Mr Andrew McGee, CTO & Sales Director, Australia & New Zealand, Hitachi Data Systems
9.00am
Session 2.2 Plenary Session: Coalition and Whole-of-government Interoperability
Keynote Address: MAJGEN Mike Milford, Head ICT Operations Division, CIOG
Keynote Address: Mr Victor Vae’au, CIO NZDF
10.30am
Morning Tea
11.00am
Session 2.3a Plenary Session: Capability Developments
Keynote Address: LTGEN John Caligari, Chief Capability Development Group
Keynote Address: CDRE David Scott, Director General Strategic Capability Coordination, Joint Capability Coordination
12.30pm
Lunch
Session 2.3b Product Brief: New Directions In Secure Information Management (Mrs Lisette Holmes, Mr Ross King, & Mr David Klein, Berkeley IT)
1.30pm
Session 2.4a
Update: RPDE Update
(Mr Ken Snell, RPDE, CDG)
Session 2.5a
Update: Meeting Defence’s Secure
Information Sharing Challenge:
MuSE
(Mr Daniel Lai, BSTTech Consulting)
Session 2.6a
Session 2.7a
INDUSTRY STREAM
Product Brief: Deploying
Refereed Papers
SharePoint in the Theatre
Paper 1: Executable System of Systems
(Mr James Milne & Mr Chris Rumel, Modelling for Options Analysis
Myriad Technologies)
2.30pm
Session 2.4b
Update: Why Identity
Management?
(Mr Richard Brown, Cogito Group)
Session 2.5b
Product Brief: T360 – Trusted
Information Sharing Capability
(Mr Bruce Talbot, BSTTech
Consulting)
Session 2.6b
Update: Crossing the Chasm
(Mr Craig Lindsay, Cisco)
3.30pm
Afternoon Tea
4.00pm
to
5:00pm
Session 2.4c
Update: Network Enabled Mission
Command
(COL (Retired, US Army) Buddy
Carman, ViaSat)
Session 2.5c
Product Brief: Overcoming Physics
for Networked Applications in a
Consolidated Data Centre
Architecture
(Mr Ian Raper, Riverbed ANZ)
Session 2.6c
Update: Security and the Internet
of Everything
(Mr Gary Spiteri, Cisco ANZ)
7.00pm–
11.00pm
Conference Dinner (7:00pm for 7:30pm)
Session 2.8a
Tutorial: Small Cells, HetNets, and Self
Session 2.7b
INDUSTRY STREAM
Organizing Networks (SON): Benefits to
Refereed Papers
Defence
Paper 1: Big Data over Limited Networks
(Dr Mark Reed, UNSW Canberra)
Paper 2: Rethinking Satellite Ground Station
Architecture
Session 2.7c
Product Brief: Reduce Risk and Increase
Collaboration through Secure
Information Sharing
(Mr Jason Ostermann, Raytheon Cyber
Products)
Exhibition runs from 7:30am to 5:00pm (open to exhibition-only registration from 1:30pm to 5:00pm)
Day 3—Thursday 13 November 2014
07:30am
Session 3.1 Breakfast Session—Exhibition open and coffee available
Product Brief (Ballroom): Handheld Push-to-Talk Radio Over Satellite – Secure, Fast, Easy Remote Push-to-talk Communications That Work Anywhere
Mr James de Vroome, Business Development Manager – Enterprise & Government, Pivotel
9.00am
Session 3.2 Plenary Session: Navy, Army, Air Force CIS Interoperability
Moderator: GPCAPT Darren May, Business Relationship Manager – Military, CIOG
Keynote Address: CAPT Brian Delamont, Director General Navy Communications and Information Warfare, Navy
Keynote Address: COL James Murray, Director Enabled Systems Development - Army
Keynote Address: WGCDR Daniel McManus, Deputy Director Intelligence, Surveillance and Reconnaissance, Air Force
10.30am
Morning Tea
11.00am
Session 3.3a Plenary Session: SecureCanberra Track
Welcome Address: Mr W. Hord Tipton, Executive Director, (ISC)², Former CIO, U.S. Department of the Interior, U.S.A
Keynote Address: Resilient Systems and Cyber Missions: Dr Mike Davies, Defence Science and Technology Organisation
Keynote Address: Forensics in the Cloud: Prof. Jill Slay, Australian Centre for Cyber Security, University of New South Wales
12.30pm
Lunch
Session 3.3b Product Brief: Tactical Advantage for Data Management at Scale and Gaining Value (Mr Callan Fox, Emerging Technologies Division, EMC Global Holdings)
1.30pm
Session 3.4a
SecureCanberra Track Session 3.5a
Product Brief: Google Cloud Innovation
- Be More Secure in the Cloud
1. Optimising Cyber Security Learning
Through Hands-on and Role-play Approach
(Mr Andrew Sklar, Dialog Google
Solutions Practice)
2. Developing an Architectural Framework
Towards Achieving Cyber Resiliency
Session 3.6a
Battlespace Communications System (Land)
Development
1. Land Network Concept and the Army Digitisation
2. Interdisciplinary Framework for BSC(L) Architecture
and Engineering
Session 3.7a
Tutorial: Collaborating with SharePoint
(Mr James Milne & Mr Nathan Pearce, Myriad
Technologies)
2.30pm
Session 3.4b
Session 3.6b
Battlespace Communications Architecture
Considerations
1. Considerations on ICT Architecture and Technologies
for the Battlefield Communications Systems (L)
2. C2 Systems Architectural Considerations in the
Tactical Communications Environment
Session 3.7b
Tutorial: Document and Records Management in
SharePoint
(Mr James Milne & Mr Chris Rumel, Myriad
Technologies)
Session 3.6c
Battlespace Communications Architecture Development
1. Land Communications Reference Architecture Brief
2. Enlightenment: Modelling and Simulation of Radio
Networks
Session 3.7c
Tutorial: Building Electronic Forms and
Workflows to Streamline your Business
Processes
(Mr James Milne & Mr Nathan Pearce, Myriad
Technologies)
SecureCanberra Track Session 3.5b
Update: GIS for Defence Operations
1. A Changing Landscape: The Internet of
(Mr David Eastman & Ms Kate Levy, Esri
Things
Australia)
2. Using Big Data to Secure Your Enterprise
3.30pm
Afternoon Tea
4.00pm
to
5:00pm
Session 3.4c
SecureCanberra Track Session 3.5c
Update: Defence Spectrum Management
Understanding Advanced Threats:
– Challenges and Trends
Identifying and Tracking the Hacker
(Mr David Murray, Department of
Defence)
Exhibition runs from 7:30am to 1:30pm (NO exhibition-only registrations available)
MILCIS2014
Session Abstracts
Session Abstracts: Day 1—11 November 2014
1.1 Breakfast Session
The Exhibition is open and coffee is available in the Exhibition Hall.
1.2 Plenary Session—Opening Session
Welcome: Professor Michael Frater, Rector UNSW Canberra and Mr Peter Lawrence, Chief Information Officer, CIOG
Keynote Address: Mr Peter Lawrence, Chief Information Officer, CIOG
1.3a Plenary Session: CIO Session
Keynote Address: Mr Aiyaswami Mohan, Chief Technology Officer, CIOG
Keynote Address: Major General Mike Milford, Head of ICT Operations Division, CIOG
1.3b Lunch Session Product Brief: Defence White Paper
Presenters: Mr Mike Kalms, KPMG & Dr Stephan Fruhling, ANU
1.4a Update: Six Tech Trends to Transform Defence
Presenters: Mr Dave Maunsell & Mr Gordon Stewart, Accenture
Defence organisations are at a critical juncture. Set against a backdrop of budget pressures, they face a volatile and
changing world, with new types of military engagements and adversaries. While advanced IT capabilities are the
hallmark of modern front line forces, defence’s administrative and logistical functional capabilities aren’t keeping pace.
Mobile, analytics, apps, cloud computing, Big Data – everywhere the digital revolution marches on; now is the time to
fully examine how it can help transform and optimise defence.
These new digital tools offer previously unavailable solutions for defence leader to do more with less, driving
operational efficiency and effectiveness.
This presentation will explore how this can be achieved. Drawing on six technology trends from the Accenture
Technology Vision 2014, and compelling examples from the private sector, it will outline the considerable cost and
efficiency benefits for those clear-thinking about digital.
1.4b Update: Finding the Path Forward to Interoperability of the Emerging Link 16 Upgrades
Presenter: Dr Pete Camana, ViaSat
Link 16 is widely deployed to provide Situation Awareness and Command and Control by many nations and on many
different mission platforms. This is a blessing for Coalition and Joint interoperability among Nations and Armed
Services but it is also an impediment when an improvement is to be deployed across this broad user base without
disruption. Such is the situation with the emerging Link 16 capabilities that are being introduced. What are the logical
uses for Link 16 Enhanced Throughput (ET), which is already in the MIDS JTRS terminals and to be deployed to all
MIDS-LVT terminals along with Crypto Modernization (CM), Dynamic Network management (DNM) and Frequency
Remap (FR) in Block Upgrade 2 (BU2)? But, what is the effect of ET not being deployed to the JTIDS terminals. Next,
along comes a Concurrent Multi-Net/Concurrent Contention Receive (CMN/CCR) capable terminal, designed to
enhance the fighter-to-fighter experience along with allowing seamless use of Stacked Surveillance zones for mobile
users. MIDS JTRS is getting CMN/CCR-4 while neither MIDS-LVT nor JTIDS are being upgraded for it. This
presentation discusses possible ways to use these capabilities in a mixed fleet of terminals (putting a heavy load on the
Network Designers of course) and where there are benefits and where the employment is not possible. It introduces
ways to overlay additional functions in multi-nets that can make use of these emerging capabilities. These ideas are
also part of the basis for the US Air Force Pathfinder Study that is addressing deployments of these capabilities to
existing USAF aircraft over a several year study.
1.4c Panel: Does Australia need a Defence industry - What would the Defence acquisition and sustainment landscape look
like without Australian Defence Industry partners?
Panel Members: Industry representative (multinational prime), Industry representative (small/medium Australian
company), Senior Defence Executive, Government representative
The facilitated panel comprises four speakers representing a broad range of views from Industry, Defence and
Government. Questions and comments relevant to the theme can be submitted in advance or on the day through email
or in person. Following a brief commentary from each panel member with their perspective on the theme, there will be
a Q&A session based on the audience submitted questions.
1.5a Update: Terrestrial Communications Capability to Life
Presenter: Mr Craig Smith, Chief Engineer, Defence Engagement, Telstra
The Defence Terrestrial Communications environment, one of the largest in Australia, is on the verge of a major
transformation. Join us to explore how Telstra and Australia’s Department of Defence have partnered to introduce best
practice architecture, new capabilities and an ongoing management and support structures. The new environment
delivers a robust platform for technological innovation, vital strategic initiatives and rapid response to future national
and global priorities, into the future.
Use this session to understand the transformed environment and how you might bring the technology to life for your
current or future needs. We’ll share:
• The new business and technical services that Telstra manage for Defence and the new capability that will support
them in the transformed environment
• How Defence ICT support is heightened in the event of military or emergency response and helps to ensure secure
and reliable command and control communication.
•
How the new communications solutions can help you to drive collaboration and productivity with your people
Additional insight – LTE advanced network for emergency services (LANES)
Learn how Telstra has worked with Victoria’s emergency services to introduce an innovative new solution supporting
critical communication. Through LANES, Telstra has provided certainty of emergency communication, even during
times of the extreme network congestion that can occur if disaster strikes.
1.5b Product Brief: Case Studies in Mobility for Classified Environments
Presenter: Mr Jon Green, CTO Government Solutions, Aruba Networks
Based on experience with the U.S. Commercial Solutions for Classified (CSfC) program, this session will present a
series of case studies showing how military and intelligence users have deployed commercial mobile devices and
networks in classified environments.
This broad technical briefing will demonstrate how standard commercial equipment can be combined with Aruba
technology to deliver highly secure mobile, WiFi and VPN solutions in real world scenarios. This includes:
•
•
•
•
A Wi-Fi network operating at the SECRET level with Windows 7 laptops
A mobile network operating at the TOP SECRET level with multi-OS laptops
A cellular LTE network operating at SECRET using Android handsets
An Ethernet-attached workstation supporting multiple security levels.
1.5c Product Brief: Dependable and Secure
Presenter: Mr Andy Start, President Inmarsat Global Government
Inmarsat has over 30 years of experience in designing, implementing and operating global mobile satellite
communications networks and has a track record of high-quality services and reliability. We have pioneered
innovations in satellite communication services to make higher data speeds available to smaller and lighter mobile
terminals. Our average satellite communications network availability exceeds 99.9% and this reliability was further
strengthened in 2013 with the successful launch of our new Alphasat satellite, providing in-orbit redundancy for the
Inmarsat-4 network. This dependability is particularly attractive to government and military-level users around the
world, whose operations typically require mission critical communications support. The successful launch of the global
express satellite in 2014 heralds the start of the next generation of satcom technology. A complimentary service to
WGS, global express will extend the capability of existing military terminals and increase broadband speeds available
to the end user.
1.6a Refereed Papers—IEEE Stream
Paper 1: Evaluating Impacts of System Integration on Joint Fires Operations
Authors: Edward Lo, Peter Hoek, and Andrew Au, Defence Science and Technology Organisation
Abstract. Advances in military information and systems technologies have greatly improved war fighters' situational
awareness on the battlefield and ability to make critical decisions in a timely manner. System integration is an important
enabler for improving planning and execution of operations via availability of timely, relevant information and
synchronization of activity. The Coalition Attack Guidance Experiment (CAGE) aims to assess potential joint fires
capabilities and the resulting operational impacts, which can be effective to meet challenges from new and evolving
threats. This paper highlights results from a recent CAGE activity and key lessons learnt to improve future endeavours.
Of primary importance is the need to consider the human dimension and extant processes for effective system
integration.
Paper 2: Simultaneous X/Ka-Band Feed System for Large Earth Station SATCOM Antennas
Authors: Christophe Granet, Ian Davis, John Kot, and Greg Pope, BAE Systems Australia Ltd, Australia
Abstract. A dual X/Ka-band feed system suitable for large Earth Station SATCOM antennas has been developed. The
feed system is suitable for simultaneous four-port operation over both X- and Ka-band and supports monopulse tracking
at Ka-band. Secondary radiation patterns on a representative 13m class reflector have been calculated and compared
with the requirements for WGS.
1.6b Refereed Papers—IEEE Stream
Paper 1: Enhancing Space Situational Awareness Using Passive Radar from Space Based Emitters of
Opportunity
Author: Craig Benson, University of New South Wales
Abstract. Space debris is a growing hazard to space users. Debris trajectories must be accurately predicted to maintain
safe space access. Accurate predictions are premised on precise knowledge of the current trajectory, and a detailed
understanding of disturbances that affect the future trajectory. Both tasks are facilitated by accurate and timely tracking
of debris. It is possible to track space debris using radar and telescopes, yet both are expensive and result in
unacceptable trajectory projections due to limitations on both accuracy and update frequency. In this paper we consider
the performance budget necessary to augment debris tracking by passive radar, initially using Global Navigation
Satellites as emitters of opportunity.
Paper 2: Practical Implications of the New Australian and New Zealand Laser Safety Standard
Author: Trevor Wheatley, University of New South Wales
Abstract. This paper provides an in context advance look at the practical implications to the Defence and general laser
community of the pending update to the premier Australian and New Zealand laser safety standard. It discusses the
significant changes to the standard, rationale and implications such as the revision of the maximum permissible
exposure (MPE) limits, the changes classification system and unavoidable issues creates by the adoption process. These
details are of value to laser operators, laser safety officers, policy makers, distributors and regulators alike who will be
impacted by this change.
1.6c Update: Developing a Mission Partner Environment; Lessons from Exercise Aqua Terra 2014
Presenters: MAJ Jason Broderick and Dr Peter Holliday, Land Network Integration Centre)
Exercise Aqua Terra 2014 (AT14) provided the Australian Army with a unique opportunity to build, test and evaluate
an Australian developed Mission Partner Environment (MPE) involving the five eyes ABCA community. This update
brief will present a background and summary of the key MPE enablers developed by the Land Network Integration
Centre (LNIC) for AT14, and provide an update on further improvements being evaluated by Army on the Road to
Hamel.
1.7a Product Brief: Building Safer Smart Cities
Presenter: Mr Leo Chu & Mr Jimmy Ng, NEC
1.7b Product Brief: High Throughput Satellite (HTS) Communications for Government and Military Applications
Presenter: Mr “D” D’Ambrosio, EVP Government Solutions, O3b Networks
O3b Networks’ solution uses Medium Earth Orbit (MEO) satellites, which is an ideal solution for government and
military applications because of the three primary benefits delivered: high throughput, low latency, and focused
coverage. These beams can be put where the customer wants them, and adjusted constantly to where he wants them.
O3b’s “fibre in the sky” provides customers reduced latency and higher throughputs similar to terrestrial fibre.
The throughput on O3b’s satellites—as high as 1.6 Gbps in a single spot beam—provides uplink and downlink data
rates necessary for heavy traffic and large file sizes. Government and military IT groups’ Big Data requirements for
high volumes of varying data needing to be transferred at high speeds can be met. The low latency, high throughput
combination of the O3b solution supports interactive applications as well.
Because MEO satellites orbit far closer to the earth than a GEO satellite orbit (only 4,998 compared to 22,300 miles),
latency is reduced, (150ms compared to 500ms), so response time is dramatically faster. Cloud-based applications are
extremely important to government and military customers, but are extremely latency-sensitive. High latency makes use
of these productivity systems frustrating at best, and in many cases simply impractical.
In addition, since theO3b satellites only have high-powered, steerable spot beams, customers get connectivity where
they want and when they want between 62N and 62S. O3b has eight earth gateway stations globally, including two in
Australia. All gateway stations are built adjacent to terrestrial fiber rings, allowing the interconnection between remote
site, satellite terminal and the connection point allowing for full and complete backhaul. With O3b’s Beam on the Move
(BOTM) capability, it allows the beam to follow moving customers on the land, sea or air.
1.7c Update: Cloud Adoption for Government and the Large Enterprise – Lessons Learned
Presenter: Mr Mark Potts, CTO Corporate Strategy, Hewlett-Packard Company
Mark Potts is an HP Fellow, Chief Technology Officer (CTO) and Vice President Corporate Strategy. In this
presentation, he will cover:
• The Journey to the Cloud: Adoption paths and models, barriers and risk, where are we?
• Cost and/or Agility: The business value drivers.
• Hybrid Delivery: Organisational, business model and technology changes.
• Applications and Workloads: Which ones, new or migration?
• Obvious Concerns: Security, compliance, privacy, sovereignty etc.
Session Abstracts: Day 2—12 November 2014
2.1 Breakfast Session Product Brief: Hitachi Data Systems
Presenter: Mr Andrew McGee, CTO and Sales Director, Hitachi Data Systems
2.2 Plenary Session: Coalition and Whole-of-government Interoperability
Keynote Address: Major General Mike Milford, Head of ICT Operations Division, CIOG
Keynote Address: Mr Victor Vae’au, CIO, NZDF
2.3a Plenary Session: Capability Developments
Keynote Address: LTGEN John Caligari, Chief Capability Development Group
Keynote Address: CDRE David Scott, Director General Strategic Capability Coordination, Joint Capability
Coordination
2.3b Lunch Session Product Brief: New Directions in Secure Integration Management
Presenter: Ms Lisette Holmes, Mr Ross King, and Mr David Klein, Berkeley IT
Berkeley IT specialise in secure information management solutions. Operating in Defence since 1999, Berkeley IT
pride itself on delivering secure information management solutions to the ADO. We are dedicated to removing
information “stovepipes” and providing secure information management and exchange between applications,
dissimilarly classified networks, strategic and deployed systems, and between government departments and coalition
partners.
The session will be a “must see” for information management professionals in Defence, as we present a discussion on
information management and the methods we employ to deliver information in a secure manner to the ADF.
We will review recent developments and preview forthcoming product capabilities, including:
Substantial upgrade of the Nexus solution to meet the evolving needs of the Defence community.
 Enterprise Search with Context
 Inline Metadata Editing
 UI Enhancements
 Integration with Major Capabilities: Military Messaging, Objective, IC Pubs
Product Overview: Secure SharePoint via Enterprise Security Services Platform (ESSP)
 Insider Threat Protection
o No Lone Zone Patented Technology
o System Administrators Moved Away From The Data
o Devolved Administration Model
 Security Trimmed, Enterprise Search Capabilities
 Object Level Security
The session will demonstrate the practical benefits of reduced administrative overhead and improved information
security that Berkeley IT solutions are delivering every day.
2.4a Update: Rapid Prototyping, Development & Evaluation (RPDE) Program Update
Presenter: Mr Ken Snell, Engagement Manager, RPDE, CDG
RPDE is a unique collaboration between Defence, industry and academia, bringing together the best and brightest from
across the defence industry spectrum. Our mission is: To accelerate and enhance Australian Defence Force (ADF) warfighting capability through innovation and collaboration. When these forces join in a neutral, non-competitive
environment, knowing that intellectual property and commercial interests are protected, the results are formidable. This
update will cover a range of subjects that includes operational update and projects in progress, and coming
opportunities.
2.4b Update: Why Identity Management?
Presenter: Mr Richard Brown, Cogito Group
IdM is the management of individual and device identities, their authentication, authorisation, roles, and privileges
within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing
cost, downtime, and repetitive tasks.
Why do we need IdM?
IdM is inextricably linked to the security and productivity of any organisation involved in electronic commerce.
Companies are using IdM systems not only to protect their digital assets, but also to enhance business productivity. The
systems' central management capabilities can reduce the complexity and cost of an essential process. The centralised
access control also supports consistent security policy enforcement.
ID management systems also give organizations a way to control the swarm of untethered devices (Network Equipment,
Computers, mobile devices) in the enterprise. The ability to enforce a set of policies on the devices that connect with the
network through the management of the identities of the users of those devices is fast becoming a must-have security
capability.
Furthermore, the government says you have to care about identity management.
Benefits:
• Improved security, auditing and compliance
• Reduced operating costs US saved $142 per user PA = $14.2m for 100k users
• Dynamic access provisioning / deprovisioning
Challenges:
• Data mapping/alignment and transformation needs to be performed to simplify the automation of access control
decisions.
• Funding availability.
• Implementation can consume precious resources and
• Poor implementation can perpetuate existing problems
2.4c Update: Network Enabled Mission Command
Presenter: COL (Retired, US Army) Buddy Carman, ViaSat
“Net-Centric” discussions are misguided; the network is an ENABLER to leaders to accomplish missions, not the
center. The last decade of non-contiguous, non-linear, asymmetric conflict have highlighted the need for change in
sharing information and visualizing operations. The overwhelming majority of young leaders are “digital natives” –
having grown up in a world based on connectivity through the internet, mobile computing, and intuitive interfaces. The
military is woefully behind in leveraging the inherent skill set of digital natives as junior leaders in the military.
Networks need to be simple to use, adaptive and reliable. Formations will continue to operate well beyond the doctrinal
ranges they were designed to cover. The linear battlefield is unlikely to exist again, even against “conventional/near
peer” adversaries. Nation states and/or non-state actors have seen the impact of insurgent, low-tech, targeting on the
battle space that erodes combat power and disrupts lines of communication. Networks must include beyond-line-ofsight connectivity to overcome the effects of this asymmetric threat in complex, extended terrain. Efficient use of
bandwidth is critical to allow for real-time updates of friendly and threat positions, changes in control measures,
clearance of fires, as well as multiple modes of collaboration: voice, chat, and graphical. Security domains must also be
simplified to allow coalition/multinational task force collaboration, as “need to know” morphs into “need to share”.
Adaptive, efficient networks enable leaders to be successful in the future: reducing fratricide risk, enhancing decision
making, and enabling effective, timely targeting of threats.
2.5a Update: Meeting Defence’s Secure Information Sharing Challenge: MuSE
Presenter: Mr Daniel Lai, BSTTech Consulting
The need to efficiently and effectively share information securely and in a timely way has never been a greater
challenge for Defence. From Special Access Programs, Tactical Operations Planning, Intelligence, and Joint
Operations, solving this problem is a major priority across Defence.
BSTTech Consulting first presented at MilCIS in 2009 on the successful delivery of Silver Birch, an accredited Multi
Level Security system to securely share information across compartmented security holdings. Silver Birch was the first
NSA attribute based access control (ABAC) accredited system in Defence. This Update describes how that
Implementation led to the development of Muse (Multi Level Security Environment) Architecture to address the
challenges of Trusted Information Sharing.
From Strategy, through Architecture, to Solution, MuSE is a comprehensive system to address the challenges of secure
information management. MuSE has been proven to deliver Defence outcomes including The Single Information
Environment Security Architecture (SIESA) for Defence and the CIOG Nexus Architectural Review. BSTTech
presented the Single information Environment at MilCIS in 2012 and 2013.
This update tells the story of the development of MuSE from the implementation of Silver Birch to its application to the
SIESA and the Nexus Architectural Review. Most importantly it describes its applicability to how it can assist Defence
meet its current information management challenges addressing the need to provide information securely, flexibly and
in a timely fashion. The presentation will describe how this can be achieved cost effectively and rapidly implemented.
If you have an information sharing challenge this presentation is a must.
2.5b Product Brief: T360 – Trusted Information Sharing Capability
Presenter: Mr Bruce Talbot, BSTTech Consulting
The secure and controlled flow of information between parties is a key factor in achieving operational success. In
support of disaster relief, covert, bare base and other similar deployments, Defence operations frequently require
seamless collaboration between different people, nationalities, security clearance levels and information structures.
Using isolated networks for this purpose has proven to be overly complex, ineffective, costly and difficult to secure.
T360 has been designed to meet these specific operational requirements. It is a self-contained, portable product that
provides multilevel secure information management and control for communities of interest and deployed
environments. T360 has been designed using BSTTech’s MuSE Architecture Framework to align information sharing
and security requirements to mission objectives. Moving away from a roles-based approach to information
management, T360 combines business rules and attribute based access control (ABAC) to positively secure the flow of
information between parties and prevent unauthorised disclosure, modification or access. Not only does this
combination enable information to be accessed according to specific contexts, it also allows the conditions of access to
be dynamically modified to reflect events and changes in organisational/security policies.
This brief will outline how the product’s design draws on ICT enterprise architecture to balance information security
and sharing requirements and how it aligns to the Defence Single Information Environment Security Architecture
(SIESA). It will then demonstrate a number of scenarios to show how the product delivers trusted information sharing
for communities of interest within a Defence operational context.
2.5c Product Brief: Overcoming Physics for Networked Applications in a Consolidated Data Centre Architecture
Presenter: Mr Ian Raper, Regional VP, Riverbed ANZ
The existing and evolving Defence network architecture presents several challenges—not the least of which is the
tyranny of distance and the ever constant speed of light. Both challenge network design and this design is judged by end
users, be they Operational troops in the field or staff in HQJOC, and everyone in between. Their yardstick is the
performance of their applications and ultimately the end user experience.
The nature of incumbent applications based upon TCP/IP is that they tend to traverse the network many times for each
application function. Add in a measure of network latency for each application turn, due simply to distance rather than
bandwidth, and suddenly the end-user is experiencing unacceptable application performance. This is a challenge.
True centralisation involves minimising the hardware footprint at the remote offices. But some applications are heavy
network users and really need to have local storage and compute power. How can this be resolved? This is a challenge.
When centralised processing architecture exists for remote branch offices, there is a requirement to be able to recover or
restore operational capability in the event of a serious outage. This window to restore is governed by the physical
limitations of the network to perform this function. This is a challenge.
When a large change in network architecture is undertaken, it’s important to baseline the existing networked application
performance before you start. Once the change is made, how do you take out the human element and objectively know
the performance impact of the change? Have you satisfied the success criteria or not? This is a challenge.
This presentation will address these challenges and explain how Riverbed’s world-class WAN optimisation technology
is at the forefront of assisting Defence move to a faster, more efficient network infrastructure.
2.6a Product Brief: Deploying SharePoint in Theatre
Presenter: Mr James Milne & Mr Chris Rumel, Myriad Technologies
Some of the key challenges facing organisations today is the geographically dispersed networks both in Australia and
abroad and the limited network connectivity and availability. Sharing information in these hostile environments has
previously been limited and the need to exchange information about operations in the field is critical. In this session we
will demonstrate how Microsoft SharePoint 2013 technology combined with iOra Geo-replicator can be utilised to
allow collaboration on documents in multiple locations regardless of the network status.
2.6b Update: Crossing the Chasm
Presenter: Mr Craig Lindsay, Director Advisory Services, Cisco
In order to enhance security decision-making effectiveness and to ensure security can operate within an innovative
business framework, security needs to be more than a gatekeeper. The goal is to put in place the ability to discover,
investigate, adapt, and evolve your network such that it enable business and allow for new productivity measures
securely. Moving from a security practice that selects, integrates, logs and performs basic compliance of security boxes
to a model where security is a business partner protecting not only the security of but also the operations and brand of
the business is essential given current and further threats. In this regard, many companies are at the point of ‘Crossing
the Chasm’.
This session discusses how to ensure security can operate in partnership with business, operations and security
stakeholders. The end goal is for your security practice to be viewed as a partner rather than as an impediment within
the business that may be slowing down progress and productivity. Security can enable the business while managing the
increased environmental complexity and new technologies.
The use of data and machine speed analytics is a critical element of future security solutions, and must be combined
with sufficient defensive strategies to include security instrumentation, identity, zones, and access control to drive a
learning and adaption capability that keeps you at pace with the changes in your business or operational execution.
2.6c Update: Security and the Internet of Everything
Presenter: Mr Gary Spiteri, Consulting Security Engineer, Cisco ANZ
In the rapidly emerging Internet of Everything, which ultimately builds on the foundation of the connectivity within the
Internet of Things, adversaries committed to finding weak links and using them to their full advantage will be made
even easier. Anything connected to a network, in business, home and on the field, presents an attack surface to exploit.
The effects of cyber attacks are sobering, in terms of both costs and losses in productivity and reputation. This session
discusses threat intelligence and cybersecurity trends and what can be done to reduce their number and effects.
2.7a Refereed Papers—Industry Stream
Paper 1: Executable System of Systems Modelling for Options Analysis
Authors: Matthew Britton, The University of Adelaide and Gavin Puddy DSTO
Abstract. In this paper we demonstrate the viability of an affordable model-based end to end performance
determination of military System of Systems leveraging the model-based systems engineering framework combined
with a system execution modelling approach in the context of operational scenarios. We show how designs of COTSbased real-time systems, such as defence combat management systems, can be realistically analysed early in their
design lifecycle using the technique of executable modelling, potentially identifying problems earlier in the design
lifecycle than by using traditional design methodologies, with resultant cost and time savings. We then present results
of a system-in-the-loop experiment showing the performance of middleware implementations in realistic operational
conditions.
2.7b Refereed Papers—Industry Stream
Paper 1: Big Data over Limited Networks
Authors: Lawrence Poynter and Philip Wilcocks, iOra Limited
Abstract. This paper examines the emergence of Big Data repositories and the particular problems that are encountered
when these data sources need to be transmitted over limited military networks. Following a review of the historical
development of Big Data the paper details the technology challenges involved in the management and analysis of large
repositories and is illustrated by some existing and emerging military examples including applications in Intelligence,
Command and Control, operations, logistics and field maintenance. In an attempt to offer options for dealing with Big
Data an evaluation of some of the techniques that can be applied to data to overcome the network constraints that exist
are examined.
Paper 2: Rethinking Satellite Ground Station Architecture
Authors: Paul Solomon, Jeremy Hallett, and Samuel Kenny, Clearbox Systems
Abstract. The systems architecture of the satellite ground station has not changed significantly in the last 35 years.
However, during this time technologies have been developed that could serve to introduce sustained innovation to the
satellite ground station. This paper explores how recent advances in spectrum digitisation, high speed fibre
communications, and computational power may unlock the next evolution in ground station design and how the
convergence of Signal Processing and Heterogeneous Computing could lead to the development of an open hardware
and software platform for satellite signal processing. This would evolve the existing marketplace, opening up
competition and standardisation in satellite communications environments, paving the way for new levels of value,
capability, redundancy, flexibility and surge capacity.
2.7c Product Brief: Reduce Risk and Increase Collaboration through Secure Information Sharing
Presenter: Mr Jason Ostermann, Chief Engineer – Transfer Solutions, Raytheon Cyber Products
We are inundated with data at every turn. And that just involves work and personal data for yourself and your relatively
small network of contacts. Now, consider the same for billions of people, companies, and governments and imagine the
task of collecting and sorting out what is critical. World events continue to shed light on the fact that data collection
from satellites, sensors and other sources must be augmented with data from social networks for a full picture. This data
must be securely shared with a myriad of people and systems across governments, militaries, law enforcement and
corporations. The need to quickly, securely and appropriately link these entities through information sharing across
public, private, and national boundaries is critical to global security.
Governments and industries are realizing that ‘it takes a village’– no one entity can handle all this data on their own.
IBM estimates that 2.5 quintillion bytes of new data are created every day – ‘90% of the data in the world today has
been created in the last two years alone’. Entities from businesses to governments are tapping this vast data ocean to
develop multi-faceted holistic pictures. Big data is not just about analytics, before you can use tools, data must be
collected and stored in the right places with the right protections and access controls. Most data is from unclassified or
unrestricted domains – social media, the Internet. Before that data can be considered ‘intelligent’ or ‘actionable’ it must
be combined into a larger picture.
Cross domain information sharing solutions are built with strict security controls, ensuring that the right data is shared
with the right people and across systems to efficiently and effectively protect personal and public interests. Raytheon
Cyber Products provides a suite of solutions to ensure that your data is moved securely inside and outside of your
network.
This session will discuss the importance of secure data transfer – from machine to machine and person to person, while
mitigating against viruses, malware and policy violations.
2.8a Tutorial: Small Cells, HetNets, and Self Organizing Networks (SON): Benefits to Defence
Presenter: Dr Mark Reed, UNSW Canberra
Small Cells and Heterogeneous wireless cellular networks (HetNets) are being introduced to provide a scalable solution
to the forecast ten times increase in mobile broadband demand over the next five years. HetNets utilize multiple tiers of
cells to serve users, this results in a massive increase in operational complexity and cost if traditional approaches to
radio management are used. To overcome these challenges, SON has emerged as paradigm that can reduce costs while
at the same time yield optimal performance which otherwise can be virtually impossible with manual configuration.
This tutorial will first introduce Small Cells by looking at the utilisation and deployment scenarios. We will then
introduce key concepts of HetNets with emphasis on the air interface. We will finally discuss SON use cases, including
latest standardization activities and industrial progress. The tutorial will utilise examples from commercial activities,
however, we will also consider the benefits of this technology to Defence.
Session Abstracts: Day 3—13 November 2014
3.1 Breakfast Session Product Brief: Handheld Push-to-Talk Radio Over Satellite – Secure, Fast, Easy Remote Push-to-talk
Communications That Work Anywhere
Presenter: Mr James de Vroome, Business Development Manager – Enterprise & Government, Pivotel
Pivotel Group is an Australian owned and operated satellite communications company offering a secure, reliable
Australian satellite network across a range of satellite service providers. With network interconnect points across
Australia users can rely on their connection to the Pivotel Network Gateway to transmit sensitive information quickly
and securely.
Pivotel’s new Push-to-talk (PTT) service using the Iridium Satellite Network takes push-to-talk communications to the
next level. Remote Defence personnel often require a fast, reliable and secure communication channel for one-to-many
voice communications when making a one-to-one satellite call is not time-effective. The PTT service allows a group of
users to communicate in the same way they would use push-to-talk radio services, but using a secure, reliable satellite
connection. Using specially configured Iridium Extreme satellite handsets, a group of users within a specified
geographic footprint can simply push a button to broadcast a message to the other users within their talk group.
The Iridium Satellite Network offers truly global coverage and its Low Earth Orbit (LEO) satellite constellation
provides a fast PTT service with very low latency. Iridium’s PTT is secure; it uses AES256 encryption to transport all
PTT voice content; AES256 is one of the top encryptions in use and is currently used by the leading Governments when
transmitting top secret data. The PTT service is affordable and flexible, with the ability to configure handsets within a
group easily and quickly.
3.2 Plenary Session—Navy, Army, Air Force CIS Interoperability
Moderator: GPCAPT Darren May, Business Relationship Manager – Military, CIOG
Keynote Address: CAPT Brian Delamont, Director General Navy Communications and Information Warfare, Navy
Keynote Address: COL James Murray, Director Enabled Systems Development, Army
Keynote Address: WGCDR Daniel McManus, Deputy Director Intelligence, Surveillance and Reconnaissance, Air
Force
3.3a Plenary Session: SecureCanberra Plenary
Welcome Address: W. Hord Tipton, Executive Director, (ISC)², Former CIO, U.S. Department of the Interior, U.S.A
Keynote Address: Resilient Systems and Cyber Missions: Dr Mike Davies, Research Leader, Cyber Assurance and
Operations, Cyber and EW Division, Defence Science and Technology Organisation
Keynote Address: Forensics in the Cloud: Prof. Jill Slay, Director, Australian Centre for Cyber Security, School of
Engineering and Information Technology, University of New South Wales
3.3b Lunch Session Product Brief: Tactical Advantage for Data Management at Scale and Gaining Value
Presenter: Mr Callan Fox, Emerging Technologies Division, EMC Global Holdings
This session will explore a storage solution which make managing large datasets at scale easy, while providing out-ofthe-box integration with analytics platforms to gain intelligence from the data in place.
The sheer amount and ever-increasing sophistication of information can overwhelm analysis systems and processes.
Data from sources as varied as unmanned aerial vehicles, surveillance video, network devices and online chat result in
a constant flood of information so vast that only a fraction of it can be analysed quickly. The Intelligence, Surveillance
and Reconnaissance (ISR) community are struggling to develop capabilities to analyse intelligence at an unprecedented
speed and capacity. The growth in the number of UAVs collecting intelligence is exponential. Airborne sensors now
track dozens of targets simultaneously. UAVs feed full-motion video directly to front-line troops. Automated systems
suction emails, chats and Twitter feeds continuously from the ether, forming constellations of sensors and sensor
networks. The problem of collection has largely been addressed, but has created massive challenges related to storing
and analysing data, and to disseminate useful intelligence.
3.4a SecureCanberra Track
Optimising Cyber Security Learning Through Hands-on and Role-play Approach
Presenter: Mr Jimmy Ng & Mr Wee Kok, NEC
Developing an Architectural Framework Towards Achieving Cyber Resiliency
Presenter: Mr TBA, Secure Logic
3.4b SecureCanberra Track
The Changing Landscape: The Internet of Things
Presenter: Professor Sanjay Jha, University of New South Wales
Using Big Data to Secure Your Enterprise
Presenter: Mr Matt Carling, Cisco Australia
3.4c SecureCanberra Track
Understanding Advanced Threats: Identifying and Tracking the Hacker
Presenter: Mr David Roberts, NTT Comm Security
3.5a Product Brief: Google Cloud Innovation - Be More Secure in the Cloud
Presenter: Mr Andrew Sklar, Dialog Google Solutions Practice
With Google’s recent release of Google Drive unlimited, organisations are now offered with never before seen
unlimited storage capacity and live collaboration solutions at only $10 per user, per month. Google Drive is the only
tool in the world allowing live document creation, edit and review capability on any mobile platform across over forty
file types. These include MS Office file types, Google Documents and more.
With proven security certifications including Google Drive for Work and the corresponding data centres are SSAE 16 /
ISAE 3402 Type II, SOC 2-audited and have achieved ISO 27001 certification. For industries or geographies subject to
specific regulations, Google Drive supports FISMA, FERPA, and HIPAA and adheres to the Safe Harbor Privacy
Principles. Additionally, administration can leverage audit API’s to track sharing of files across any department and
allocate/revoke access as required, from any device, at any given moment.
Google Drive includes dozens of critical security features specifically designed to keep data safe, secure and in your
control. These include encryption in transit as your data moves from your device to Google, as it moves between
Google's data centres and encryption at rest when it is stored on your mobile device.
Drive for work and Google Cloud Innovation technologies deliver an Environment of tomorrow with unmatched
security protocols, data capacity, unsurpassed uptime reliability of 99.8% and a new benchmark of productivity.
3.5b Update: GIS for Defence Operations
Presenters: Mr David Eastman & Ms Kate Levy, Esri Australia
An ever evolving breadth and depth of sensor capabilities and outputs exists across the Australian Defence Forces
(ADF). This trend is adding to the collection of an almost overwhelming amount of data. Being able to intuitively and
effectively integrate, synthesise and share this information is critical for precise and timely decision-making, and is a
stated Defence goal. Almost all decisions in the defence environment involve location and as such, geography provides
vital intelligence. When making decisions, being able to answer the 'where?' component is important - and increasingly,
knowing the 'why?', 'what?' and 'where will' of any given scenario will become absolutely critical. Today's advanced
Geographic Information System (GIS) technology goes far beyond displaying a map background in a defence
application - and it is no longer a specialised niche capability in defence operations. Rather, GIS technology facilitates
the integration and exchange of information across and within Defence environments and has the capability to extend
information sharing to partners, agencies and allies. The technology also empowers individual staff by providing access
to information required to make informed and timely decisions. By leveraging geography, it provides a platform of
understanding - enhancing situational awareness and supporting decision-making across the spectrum of operations at
the strategic, operational and tactical levels alike. This paper outlines a new approach for how the ADF can deploy its
existing investment in GIS technology to seamlessly integrate its joint taskforces. It also discusses how the latest
paradigm shift in GIS technology will ensure a common understanding and flow of information across all levels of
Defence. The net result is better, faster, and less expensive analysis and information dissemination. For Defence, this
will result in more informed and timely decision-making, ensuring a cohesive and collaborative approach to all
operations.
3.5c Update: Defence Spectrum Management – Challenges and Trends
Presenter: Mr David Murray, Director Defence Spectrum Office, Department of Defence
Electromagnetic spectrum (EMS) is considered as a scarce and hence valuable resource by organisations operating
spectrum-dependant (SD) systems. In the military context, the ability to control access to electromagnetic spectrum is
crucial in the modern battlefield where advanced systems compete for spectrum. A commander would not commit
forces to an area in which he could not reasonably expect to contest freedom of action and the EMS is no different.
Access to spectrum when and where required is essential for a number of current and future Defence capabilities during
wartime and peacetime alike. Defence organisations own and operate a complex and advanced mix of SD systems in the
C4ISR domain, including but not limited to, space and terrestrial communications, radars, telemetry, training aids, base
protection, weapon control systems and electronic warfare systems. These applications are found on maritime, ground
and air platforms. In this brief we will discuss: the fundamentals of spectrum management, an overview of spectrum
related legislation in Australia, the provisions for spectrum access by Defence, sharing vs exclusive access to spectrum,
spectrum sharing methods, spectrum supportability, international regulations (ITU-R), frequency management tools,
emerging trends and spectrum technologies. The discussion consists of case studies (not necessarily Defence) of
spectrum supportability and frequency assignment in Australia. We will also look at the roles, responsibilities and
challenges faced by present day military spectrum management agencies.
3.6a Battlespace Communications System (Land) Development
Presentation 1: Land Network Concept and the Army Digitisation
Presenter: COL James Murray, Director Enabling Systems Development - Army
Land Network Concept and the Army Digitisation Implementation Plan with respect to the BCS(L).
Presentation 2:
Interdisciplinary Framework for BSC(L) Architecture and Engineering
Presenter: Dr. Mansoor Syed, Engineering Director, Project 2072, DMO
Large scale Defence systems are typically developed through a well established System Engineering approach.
However, ICT systems are increasingly developed using an architectural approach. Both approaches have their merit,
though an interdisciplinary approach for materialising large scale Defence ICT systems is not practised let alone
documented. The Joint Project 2072 has developed an interdisciplinary framework for developing ADF deployable
Communications Network infrastructure for land battlespace. The framework ensures that the development of
Communications Network Infrastructure is based on services model and functional model typical characterised for ICT
Architecture and Systems Engineering respectively. Key features of the framework include streamlining the ICT
architectural development process and artefacts within a typical Systems Engineering lifecycle process.
3.6b Battlespace Communications Architecture Considerations
Presentation 1: Considerations on ICT Architecture and Technologies for Battlefield Communications Systems (L)
Presenter: Mr. Anant Mahajan, Director/Lead Domain Architect – Land, CTO Division, CIOG
Different considerations are required for managing Information and Communications Networks in battlefield
environments. Strategic Network centric architecture and technology approaches need to be suitably adapted and/or
tailored for tactical edges where battlefield communications systems face a plethora of challenges.
This presentation will cover essential ICT needs of the tactical edges covering network characteristics, resource
availability, information assurance needs and user interface profiles. Furthermore, it will introduce a brief background
on the ICT reference architecture work that has been undertaken for the Defence deployed and Mobile tactical
networking environments. Future BCS implementation challenges with respect to technology and design patterns such
as SOA-based tactical systems, IPv6, Software defined networking and Network Function Virtualisation will be
discussed in brief
Presentation 2: C2 Systems Architectural Considerations in the Tactical Communications Environment
Presenter: Ms Jenny Abela, Chief Engineer, Project Land 75, DMO
The design of C2 Architecture and its ability to deliver timely information to the commander is challenging in a highly
mobile tactical environment. The effectiveness of a C2 system is not only dependant on the proficient integration and
use of the available communications network but in its ability to provide a customisable C2 system. Understanding and
balancing the commanders’ priorities, the growing demand for battlefield data and maximising the use of the available
communications bandwidth are all key contributors in the design of the system. The capability advantage of providing
the commander with a well designed C2 system that delivers an all informed “Common Operating Picture’ will increase
operational tempo and support quicker and more informed decisions.
3.6c Battlespace Communications Architecture Development
Presentation 1: Land Communications Reference Architecture Brief
Presenter: Mr Graeme Neil, Lead Architect, Project 2072, DMO
The Battlespace Communications System (Land) (BCS(L)) supports the information environment for the ADF land
battlespace. Effectively, the BCS(L) transports information around the land battlespace, thus enabling almost every
other Defence Capability within and about the battlespace. Joint Project 2072 has developed a Land Communications
Reference Architecture (LCRA), based on DoDAF v2.02 process, underpinning the acquisition, operations and
sustainment of ADF deployable Communications. The LCRA addresses the business of ADF Land Communications
through reusable Architectural Patterns, Architectural Objects and relationship between them. The LCRA scope
includes the Information and Security domains associated with the Land Communications. The LCRA is documented
together with a method for validation and evaluation of architectural artefacts. The Reference Architecture is delivered
via a BCS(L) Solution Architecture which informs the development of Capability Development Documents. The
Architecture Patterns, Architecture Objects and the method of architecture validation are employed to identify gaps
between the target and current Communications capabilities. The BCS(L) Solution Architecture is, in turn, implemented
via a BSC(L) System Architecture.
Presentation 2: Enlightenment: Modelling and Simulation of Radio Networks
Presenter: Dr Daniel Salmond, Senior Research Scientist, Cyber and Electronics Warfare Division, DSTO
Quantifying the performance of a radio network is notoriously difficult as performance depends on diverse parameters
in a complex and interacting manner. Modelling and simulation of radio networks is however, often the best available
means for evaluating their performance when it is not possible to test hundreds of radios in the laboratory using realistic
traffic models and path losses. However, modelling and simulation has its limitations and requires careful application
and assessment of the results. This presentation will discuss these issues using examples drawn from a recent modelling
and simulation activity undertaken by the Centre for Defence Communications and Information Networking (CDCIN)
on behalf of DSTO and the Australian Defence Battlespace Communications System Project Office. The CDCIN
characterised the performance of a network of over 700 radios implementing a TDMA waveform with well-defined
node dispositions and traffic load. In this case, modelling and simulation could indeed provide valuable data to assist
stakeholders in assessing the function and applicability of the proposed networks.
3.7a Tutorial: Collaborating with SharePoint
Presenters: Mr James Milne and Mr Nathan Pearce, Myriad Technologies
This session will demonstrate how SharePoint can be leveraged as a collaboration platform in the field to share and
exchange critical information in a timely manner. During this session we will demonstrate how information can be
shared and updated in a collaborative manner. Using SharePoint to dynamically create content online can dramatically
change how information is shared within your organisation. Come along to this session to see how SharePoint can
change the way you work today.
3.7b Tutorial: Document and Records Management in SharePoint
Presenters: Mr James Milne & Mr Chris Rumel, Myriad Technologies
From the point of creation through to eventual disposal, an organisation's business information needs to be managed,
protected, secure and easily accessible. With unprecedented growth in electronic information and the complexities
inherent in determining what information to trust, to keep, to secure, and of course, to discard it becomes exceedingly
difficult for an organisation to effectively manage information. In this session we will demonstrate the technology
available today that can make managing, finding and securing information efficient and seamless.
3.7c Tutorial: Building Electronic Forms and Workflows to Streamline your Business Processes
Presenters: Mr James Milne & Mr Nathan Pearce, Myriad Technologies
This session will demonstrate how Nintex workflow combined with SharePoint can be used to workflow and automate
your business processes both within your organisation and in the field. During this session we will build an electronic
form and create the workflow behind the form to ensure the business process completes in a timely manner. Using
Nintex and SharePoint can dramatically change the way your organisation streamlines your business processes. Come
along to this session to see how Nintex can change the way you work today.