3.1 Breakfast Session Product Brief: Information Age Warfare

Presenter: Mr Jamie Wylly, Defence and Intelligence Solutions Lead, Microsoft

The amount of data being produced in the world today is larger than ever and increasing beyond the human capacity to process. The ability to leverage that data for destructive purposes is similarly increasing with thought-influence and attacks on critical infrastructure. International competition and conflict are today, and will be in the future, based increasingly on information. The need to predict and act is replacing the paradigm of observing, orienting, deciding, and acting as a faster means to reach an objective. If existing combat and support forces can be trained better, and if systems can operate at higher readiness rates, the gap between existing and required forces can be narrowed. The field of Artificial Intelligence is allowing forces to develop that ability. We see AI contributing to operations optimization in the fields of command and control, Intelligence Analysis, synthetic training, mixed reality operations, and in the methods of managing a large military force. Efficiency in the information age is not limited to the battlefield. Militaries are large organizations and the installations that support them – the posts, camps, stations, bases, and forward operating bases – must be modernized to meet the demands of the fighting force, the individual warfighter, and the civilian workforce and families. Artificial Intelligence and Machine Learning are offering amazing capabilities to improve the security of our world and we must embrace new technologies quickly to stay ahead. Dependency on information means that information must be protected, cyberattacks must be defended, mitigated, and studied to understand threats and prepare appropriate responses. Our military leaders, and the institutions that are entrusted to protect national security and the security of citizens, must embrace emerging technologies to prevail in optimizing operations and protecting the information systems on which our people and critical infrastructure depend.

3.2a Plenary Session:

3.2b Refereed Papers

IEEE Paper: Modelling Computational Workload in a Maritime Combat System

Authors: Matthew Britton, Andrew Coyle, Dinesha Ranathunga (University of Adelaide), Gavin Puddy (Defence Science and Technology Group, Australia)

Abstract. In this paper we examine computational workload modelling in a generic maritime combat system. We show how to construct models so that executable modelling can then be used to experiment with different hardware approaches for cost, power or performance improvements. This can assist in identifying problems earlier in the design lifecycle than by using traditional design methodologies such as prototyping. We use a generic sonar suite as an exemplar, showing the considerations required in building executable models for traditional and adaptive beamforming algorithms.

IEEE Paper: Performance and Integration Evaluation for Combat Systems (PIECS) Modelling and Analysis Environment: An Approach to Support Reducing Combat System Design Risks

Author: Gavin Puddy, (Defence Science and Technology Group, Australia)

Abstract. Space, Weight and Power-Cooling (SWaP-C) are major design concerns for resource constrained platforms. With modern combat system designs increasing in complexity, approaches that provide early insight into design choice impacts becomes important and critical for design and risk mitigation efforts. In response to this and an identified modelling and analysis capability gap for combat system integration and performance evaluation, DST Group has developed a new type of measurement-based modelling and analysis environment. Built on an approach of constructing the actual system computing infrastructure and deploying models representing application behaviours, measurement-based analysis can provide for early insight in integration and performance risks associated with combat system design choices. Furthermore, this approach provides insight earlier and at a higher fidelity than traditional modelling approaches.

IEEE Paper: Workload Models to Evaluate Heterogeneous Compute Environments Supporting Combat Systems

Authors: Dinesha Ranathunga, Matthew Britton, (Adelaide University) Gavin Puddy (Defence Science and Technology Group, Australia) and Mark Stewart (Adelaide University)

Abstract. Model Based Systems Engineering (MBSE) is accepted as a key enabler for evaluating requirements and designs of combat systems. Systems Execution Modelling (SEM) is an MBSE approach that allows the software system to be modelled independently from the target hardware, inferring hardware characteristics by direct stimulation and measurement. SEM builds a system model out of simple workers, and this paper proposes enhancements to existing workload models to better support the evaluation of combat systems in heterogeneous compute environments comprising CPU and GPUs.

3.2c Refereed Papers

IEEE Paper: Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment

Authors: Muna Al-Hawawreh and Elena Sitnikova (University of New South Wales, Canberra)

Abstract. Local Area Network (LAN) workstations, that operate at the edge tier of Industrial Internet of Things systems (IIoT) and have direct or indirect interaction with critical control devices, could be a key vector for advanced threats against control systems, such as ransomware threat. This indicates that there is a necessity for monitoring these workstations, detecting any malicious behaviour related to the ransomware, and generating an alarm for preventing ransomware from expanding its activity for more critical system entities. Efficiently, detection of ransomware attack very much relies on how accurately understanding its activities and figuring out its traits that can help in distinguishing it from the legitimate one. In this paper, we utilize deep learning techniques to learn the latent representation of high dimension collected data and identify the malicious behaviour accurately. Specifically speaking, a model that we propose is based on a hybrid feature engineering technique of classical and variational auto-encoder. This hybrid technique is used to reduce the dimension of data and extract a better representation of collected system activities. Then, the new feature vector is passed to a classifier that is built based on deep neural network and batch normalization technique. The paper concludes with the results demonstrated the benefits of our model and its good performance.

IEEE Paper: A Framework for Assessing the Cyber-worthiness of Complex Mission Critical Systems

Author: Stuart Fowler (University of New South Wales, Canberra and Raytheon, Australia)

Abstract. Complex military systems are typically cyber-physical systems which are the targets of high level threat actors, and must be able to operate within a highly contested cyber environment. There is an emerging need to provide a strong level of assurance against these threat actors, but the process by which this assurance can be tested and evaluated is not so clear. This paper outlines an initial framework developed through research for evaluating the cyber-worthiness of complex mission critical systems using threat models developed in SysML. The framework provides a visual model of the process by which a threat actor could attack the system. It builds on existing concepts from system safety engineering and expands on how to present the risks and mitigations in an understandable manner.

3.2d Refereed Papers

IEEE Paper: Degradation of Performance in Reinforcement Learning with State Measurement Uncertainty

Authors: Mark McKenzie and Mark McDonnell (University of South Australia)

Abstract. We detail the use of open source training environments to investigate the applicability of standard reinforcement learning techniques to inherently error prone tasks expected in real world application of artificial intelligence. Numerical experiments were conducted in which the performance of both Q Learning and Policy Gradient agents’ ability to obtain high reward was compared as the observation state measurement uncertainty was increased. The purpose of the research was to assess the applicability of reinforcement learning to real world applications of self-protection of military platforms, where it is expected that the observed state space is uncertain at best. We found in our experiments that Q Learning is more stable in the presence of state uncertainty than policy gradient learning.

IEEE Paper: A System Architecture for Time-sensitive Heterogeneous Wireless Distributed Software-defined Networks

Authors: Md Tanvir Ishtaique ul Huque (University of New South Wales, Canberra), Kiplimo Yego, Christos Sioutis, (Defence Science and Technology Group, Australia) Mehdi Nobakht, Elena Sitnikova and Frank den Hartog (University of New South Wales, Canberra)

Abstract. Software-Defined Networking (SDN) is a relatively new technology that enables network operators to have very tight but also very flexible, policy-defined control over traffic flows in the network. Using SDN in Time-Sensitive Networking (TSN) offers network operators not only control of the network but also manageability of key network parameters such as latency, throughput, and reliability. In this paper, we discuss the state-of-the-art research related to SDN-enabled TSN networks, present system requirements for time-sensitive heterogeneous wireless distributed software-defined networks, and derive a system architecture. The proposed system architecture not only enables large distributed heterogeneous TSN networks, but also integration with other (legacy) systems, and network management by multiple operators.

3.2e Refereed Papers

Industry Paper: Multi-Layer Approach Protecting Networks and Data

Author: Ken Lewis, (Cross Domain Community and Tresys Technology, USA)

Abstract. Targeted, well-organized cyberattacks with very specific purposes are growing in number. Attackers want to gain access to important data, plant zero-day attacks or interrupt daily operations for financial gain. Even though common practices like virus scanning, network monitoring, and access controls protect against many threats, cyberattacks are becoming increasingly targeted and much more sophisticated. As common attack vectors are closed, attackers are moving to other entry points. Sensitive data, networks, and unprotected systems must be known and isolated. Three approaches can provide additional layers of protection and isolation to highly sensitive networks and valuable data. Deep content inspection, controlled interfaces and trusted operating systems can find unknown attacks, isolate attacks and ensure operations even while under attack. These implementations can provide a layered approach to protecting your operations, data, and enterprise networks that is more cost-effective than clean-up expenses tomorrow.

Industry Paper: Cyber Threat Hunting Evolution

Author: Johnny Collins (FireEye, Inc & Mandiant, LLC, USA)

Abstract. This paper provides a background into the FireEye endpoint security solution, the evolution of the product, and the applicability to global military operations.

Industry Paper: The Weakest Link - Securing the Defence Industry Supply Chain

Authors: Nick Main and Bruce Talbot, (ARCHTIS, Australia)

Abstract. Defence capability is dependent on the industry that supports it. The Australian Defence Industry is a significant, and growing, target for foreign and domestic threat actors, who target high value sovereign capabilities and supply chains. Recent incidents such as breaches to Austal, the ANU, Parliament House, ASIO and BoM show that Australia is under attack from cyber criminals and foreign actors, targeting sensitive and Classified information such as that available through the supply chain. Even while government and enterprise cyber security awareness is increasing, attackers have expanded sights to include weaker links. Sub-contractors & small to medium enterprises become targeted—those without significant technical cyber skills and/or dedicated budget allocated to secure and protect their ICT systems. Defence's strong reliance and integration with its industry partners mean that Defence has an urgent responsibility to lead Industry in addressing these security challenges. Failure to respond will result in increased threats to Sovereign security, reputational damage to Defence and Industry partners, financial loss and reduction in Defence capability and productivity. The way forward for Defence and Defence Industry is through the use of a common platform, enabling secure collaboration between parties while improving security and reducing complexity.

3.2f Refereed Papers

Industry Paper: Development and Testing of High Speed Satellite Communications from a Small Unmanned Autonomous Maritime Vessel

Authors: Marshall Lewis, Rowan Gilmore (EM Solutions), Morio Toyoshima, Takashi Takahashi, Naoko Yoshimura, and Tomoshige Kan National Institute of Information and Communication Technology (NICT)

Abstract. A satellite communications on-the-move terminal was developed and tested for operation on Japan’s Ka-Band WINDs satellite. The terminal was developed for Japan’s National Institute of Information and Communications Technology’s (NICT) unmanned Autonomous Surface Vessel (ASV). The terminal’s challenging specifications included mass, redundancy, power, data throughput, and size, dictating a parabolic reflector diameter of 540mm. The challenges in this design came from ensuring the small terminal’s tracking system was capable of tracking a satellite in rough seas, while also providing redundant Block Upconverters and adhering to strict power consumption specifications. The terminal was successfully deployed and tested in 2018. A transmit data rate of 5Mbps was achieved during operation. The terminal was designed to track in seas up to sea-state 5 (2.5 to 4m swells), based on a wave motion study performed before commencing the design of the terminal. A tracking accuracy of <0.2deg was achieved when the terminal was tested on the autonomous vessel at sea-state 3. Time to acquire the satellite from power-up was less than 30 seconds. Superior tracking performance was achieved by using direct-drive motors rather than belt-drive motors and by using monopulse tracking rather than, for example, conical scanning.

Industry Paper: The Evolving Space Systems Integrator Role in a Dynamic, Contested Environment

Author: Ron Burch (Boeing Space and Launch)

Abstract. Military space systems continue to grow in complexity to service a greater number of missions and users in an escalating threat environment. Change is accelerating, requiring these systems and their operators to become more dynamic and responsive. These challenges require the role of the System Integrator (SI) to expand and evolve. This paper discusses the new SI responsibilities required to respond to this more dynamic, contested environment to ensure that space systems maintain their relevance by continuing to provide robust, uninterrupted mission support to its users.

Industry Paper: Telesat Global LEO Constellation: Enabling Edge Operations with Broadband Connectivity

Authors: Gerry Jansson and Don Brown (Telesat Government Services)

Abstract. Future military satellite enterprise will consist of military and commercial systems; delivering high capacity, global coverage, lower cost, and resilience to support military missions ranging from benign to contested operational environments. Led by Telesat Canada in development, this constellation will support ally forces like the Australian Defence Force (ADF) to conduct its missions. Flexibility in accessing low earth orbiting space systems with optical inter-satellite link (OISL) interoperability are important requirements that drive the architecture, capability and solution.

Presenter: Mr Greg Gale, Principal Program Manager, Azure Engineering

Innovation has always been seen as a key to success, providing smarter services in a more efficient manner, and enabling better decision-making at every level of an organization. Yet despite a desire to digitally transform, most defence agencies face unique challenges that complicate transformation, especially when embracing cloud-enabled services such as Artificial Intelligence (AI) and machine learning. Keeping this in mind, Microsoft goes to great lengths to understand the distinct issues defence agencies face and prides itself on championing innovation in this space. In order to meet the defence and intelligence challenges of the 21st century, agencies must embrace the cloud as a strategic and tactical asset that empowers them to meet their mandates. Cloud technologies such as Artificial Intelligence, Machine Learning and Cognitive Services are transforming our world. Defence and intelligence agencies can meet mission requirements and provide near-real-time operation visualisation with communication solutions, applications, and specialised intelligent operations tools. Microsoft partners have designed, built and delivered specialised solutions on Microsoft Azure for the Defence and Intelligence community to stay at the forefront of new technology. Given the scale of most defence agencies, budgetary limitations, and the critical nature of security, digital transformation harnesses the power of innovation to create a more mission-capable and supportive environment that supports continued innovation. In our presentation you will hear about how Microsoft’s industry-based approach and cloud-based technology combined addresses the unique needs of defence agencies to help them to achieve more effective results. Microsoft is committed to providing the military community with leading-edge technology to help them address the unique challenges of military life.

3.3b Expo Session: Cyber Security

Opportunities and Obstacles - Does Cyber Security have an Image Problem?

Presenter: Mr Tony Vizza, Lead Auditor, Director of Cyber Security Advocacy, Asia-Pacific (ISC)2

The cyber security skills gap is well known and well documented. Research from Austcyber as well as (ISC)2 indicates that there is a severe shortage of skilled workers in the sector. In this presentation, we look at the gap, consider the job roles that are most in demand and question why the industry is failing to attract the levels of interest, despite the good job prospects and salaries on offer. We also consider the importance of a home-grown cyber security workforce in terms of strategic competitive advantage compared to our peers internationally, and how to ensure that Australia can become a cyber security world power. Applying the Principles of Military Deception to Cyber Presenter: Mr Ben Whitham, Founder and Director, Penten The application of deception has been a tenet of military operations for thousands of years. It has been demonstrated to reduce casualties and cause confusions by tricking the adversary into concentrating forces in the wrong location, wasting time, effort and munitions, and disregarding real intelligence successes. Deception offers similar potential to turn the tables on adversaries and obfuscate data and systems in the cyber domain. It also has the added benefit of producing high fidelity intrusion and insider threat detection that, unlike traditional systems, does not contribute to alert fatigue. This talk will discuss some of the tools and tactics in this growing field and how you might be able to apply them to detect, hunt and track cyber adversaries.

Presenter: Mr Gareth Oakes, Chief Architect, GPSL

Mission planning and the expected outcomes are measured in the health of key systems and the preparedness of the personnel involved. An increasing industry standard sees complex weapon and soldier systems being networked to communicate the status that impacts the overall mission strategy.

Operators and technicians must expertly respond to the signals of degraded or offline equipment to restore crucial capabilities. Their actions can be improved, mistakes can be eliminated, and systems can be restored to availability faster when they are presented with accurate and up-to-date operations and service information.

The digital thread is a responsive process that directly associates essential service and parts information with upstream engineering design changes, and logistics data. Information delivered to the field is completely relevant to the systems being operated and repaired. Having all the data linked together allows a system health analysis to contextually address and deliver the best answers first to technicians and operators, leading to reduced equipment downtime and increased mission readiness and effectiveness.

Our presentation will introduce the advantages of the digital thread, integrating engineering content and workflows with operations, service, and parts information. Then we will focus on the technology challenges unique to supporting multiple military content standards, including S1000D, throughout this digital thread. Ultimately, we will explain the digital thread as a foundation for delivering specific and contextual information relevant to signals from the field to support positive mission outcomes.

Presenter: Mr Andy Lincoln, VP/CTO, Government Products, Viasat

This update describes recent activity in multi-mission terminal development and fielding. In previous years, we have discussed the rise of multi-waveform modems and multi-band terminals, critical enabling technologies that allow users to access multiple available networks. This year’s update will discuss the continued collaborative efforts of industry in Australia, the US, UK, and other Allied countries in bringing multi-mission flexibility based on commercial and defense technologies to tactical military users. This update is a companion piece to Mr. Craig Miller’s update on how Hybrid Adaptive Networking can provide resilient, assured communications to users with multi-mission terminals. In this update, we will recap some of the concepts behind and successful operation of multi-mission modems and terminals. We will also discuss Industry progress in the building blocks of multi-mission terminals: modems, waveforms, RF equipment, and terminals. Further, the update will discuss recent efforts by Industry to envision a commercial standard for multi-network Ka-band RF equipment to better enable seamless roaming over multiple satellite constellations and polarization options. Finally, the update will describe near-term plans and predictions for the continued evolution of multi-mission terminals and their relevance to the tactical military user.

Presenter: Mr Gregory Judd, Senior Research Specialist, Defence Science and Technology Group

In high intensity war-fighting scenarios, or even during natural disasters, high band-width civilian communications may be unavailable or too insecure. War-fighters therefore often need to use directly connected military radios that may be blocked by buildings, the terrain, or even the enemy. The dynamic nature of this environment also seriously restricts the amount of data they can be share and makes it very difficult to know if, or when, important digital messages have been received. To get the right information to the right person at the right time therefore, War-fighters need automated systems that make information prioritisation decisions based on current mission and network conditions. Defence Science and Technology Group (DST) in conjunction with the US Army Research Laboratory (ARL) and collaborators from Adelaide University and local industry (Consilium Technology) are developing just such a system. Called SMARTNet it will, like a human, adjust the rate and priority of data based on an understanding of both the current military situation and the current tactical network. Building and delivering such a system however is challenging. This tutorial will therefore describes in detail how SMARTNet will address the following critical challenges: 1. how to measure the state of a tactical network without using too much bandwidth 2. how a machine can identify the current network and military situation 3. how to apply new artificial intelligence-based techniques in an environment where data is: limited, delayed, incomplete, or corrupted, using devices with limited computational and electrical power 4. how to identify whether SMARTNet’s decisions make ‘good’ military sense 5. how to implement such a capability on tactical platforms, networks and systems.

Presenter: Mr Imtiaz Bahadur, GPS Product Line Manager, Cobham Aerospace Connectivity

GNSS-enabled systems are a cornerstone of a modern, networked society and of particular interest to the military that operates across all domains: air, land, sea and space. GPS signals are extremely weak and easy to disrupt. Disruption technology is low-cost, readily available on the commercial market and already deployed. Even the smallest discrepancy in data accuracy, availability and stability can result in battlefield disadvantage, mission failure, loss of life and significant economic loss. It is imperative to protect the integrity of the GPS signal. This tutorial provides a general overview of the various techniques and technologies deployed to protect the GPS timing and navigation signals.

Presenter: Mr Glen Tindall, Head, Global Government Sales, Asia-Pacific, SES Networks

Modern militaries rely increasingly on Beyond Line of Sight (BLOS) communications systems to support operations. Recently, there has been evidence of an increase in both the level and variety of threats directed towards commercial and military SATCOM systems. The presentation details how SES is addressing the key elements of a resilience architecture to deliver Space Domain Mission Assurance.

3.4b Expo Session: Cyber Security

Assuring Cross Domain Solutions Presenter: Mr Matt B., Australian Cyber Security Centre (ACSC)

Presenter: Ms Brenda Banning, Head Architecture and Industry Strategy - Asia Pacific, Oracle

How do you get the right information, in the right format, on the right device to the right person? The pace of change of technology is accelerating. More and more organisations are taking advantage of their data holdings. The points of data collection are exploding and the processing power continues to climb, allowing for the long awaited promise of artificial intelligence and machine learning to become mainstream. How would Australian Defence incorporate new technology into its information management? Our vision is based on enabling organisations to achieve this through a truly Adaptive Architecture. To compete and exploit change, enterprises must increasingly be as flexible as a lean start-up and behave and learn in an agile way. They need to do this at the same time as retaining their scale, and differentiation they have built up over the years. Enterprises must work with the complexities and operational pressures that have built up over years. It must engage with, bring together and learn from its citizens, ecosystem and workforce, as well as its information and technology systems and apply them in new ways. This means putting people at the centre – using data and technology to enable innovation. Being able to capture, analyse, apply and predict more effectively to be an enterprise that activates data – its most important asset – and uses it to power change.

Presenter: Dr Andrew Dowse, Director Defence Research, Edith Cowan University

In this presentation, Dr (AVM retd) Andrew Dowse will lead a discussion on Resilience in a Hostile Information Environment. Specifically he will discuss what is changing in the environment that will necessitate in future a different approach to information warfare and cyber security. The themes that he will focus on include:

• Two sides of information-enabled capabilities;

• The factors that drive a shift from perimeter defence to a ubiquitous security approach;

• The revival of electronic warfare in the tactical environment;

• The need for redundancies and contingencies to be established, tested and practised;

• Speed, technology cycles and the need for agility in development;

• The whole of nation approach to information warfare, including protection of critical infrastructure;

• Information manipulation as a growing concern for national security;

• The importance of managing equities and activities in information warfare;

• Sovereignty and the trusted agent;

• Introducing cyber-worthiness; and

• Preparing the cyber warriors.

There will be an allowance for Q&A.

Presenter: Mr Scott Testi, Engineering Manager - C2 Systems, Daronmont Technologies

The REALMS Training System is an integrated multi-site trainer supporting multiple concurrent virtualised training environments operating collaboratively, independently or globally as part of the Defence Training and Experimentation Network (DTEN). Through comprehensive application of virtualisation from the server to the desktop, REALMS delivers a software agnostic architecture that can support mission system and simulation products from a diverse range of vendors. REALMS delivers robust configuration management and training integrity measures while remaining flexible and responsive to continuously changing training needs. In addition to performing existing Raise-Train-Sustain missions, operators are empowered to explore new mission software products/configurations and evaluate their Tactics, Techniques and Procedures. We will describe both the REALMS Training System and the operational and support environment, and challenges faced sustaining and securing cutting edge ICT within operator communities. As the 41WG training systems evolve from standalone mission simulators to a distributed multi-environment network, so too the through life maintenance and support arrangements are evolving from unit managed to contractor managed. Daronmont Technologies is deploying the REALMS Training System across four RAAF bases. The system embodies the evolution of two decades of work by Daronmont Technologies in developing and supporting mission systems and training systems for Air Surveillance and Air Battle Management/C2.

3.4f Tutorial: Introduction to Cyber Traps and Deception

Presenter: Mr Ben Whitham, Director and Founder, Penten

This tutorial is an introduction to practical cyber deception. Cyber traps and other tools are becoming increasingly popular due to their ability to generate low numbers of high value alerts to intrusion. A well designed deception strategy can also provide valuable information about an intruder, their intentions and methods. Understanding how cyber traps work will become increasingly important for those personnel involved in cyber capability development, implementing cyber security programmes and managers of cyber capability. Participants in this tutorial will learn about the elements of a cyber trap and get hands-on experience exploring a number of different cyber traps that can be applied to breach detection, including breadcrumbs, honeypots, honeyfiles and honey tokens. Participants will also learn gain an understanding about where these techniques are best employed to detect and track intruders. This tutorial is presented at an introductory level. Only basic computer skills are needed to attend. Participants need to supply a recent laptop with a modern web browser.

Presenter: Mr Adam Carey, Teradata

The proliferation of new sensors (IoT) and associated explosion in data is challenging analytics capabilities amongst the five eyes community – but you must know your data to be successful. In this session, we will illustrate how the application of analytics at the tactical communications level can better enable us to get data to the right place, in the right order, and understand our own digital ‘pattern of life’ to protect against tactical cyber threats.

Presenter: Mr Markus Dolfen, Sales Director Secure Communications, Rohde & Schwarz

The prerequisite for digital sovereignty is technological independence. Technological independence is a core value of Rohde & Schwarz. SOVERON® stands for fully integrated, high-performance and scalable, trusted communications solutions for all branches of the armed forces. SOVERON® AR is the latest generation of software defined airborne radios providing reliable radio links that are protected against eavesdropping and/or jamming. Since airspace worldwide is used largely for civil purposes, military aircraft must also meet civil standards in order to fly in this airspace without restrictions. SOVERON® AR is the only military radio with software communications architecture that meets civil certification regulations. The search for information superiority in network centric operations and flexible deployment have caused a growing demand for network capable and robust waveforms that are suitable for a wide range of simultaneous voice and data transmissions. The waveforms for the SOVERON® software defined radios are based on innovative RF technology and form a viable, +future-ready foundation for interoperable communications systems. SOVERON® WAVE provides increased situation awareness through adaptive high bandwidth IP networking. An embedded mobile ad hoc networking capability enables continuous communications within agile networks. The German company Rohde & Schwarz, through its subsidiary in Australia, offers innovative solutions in all fields of wireless communications. Thanks to longstanding experience and in-house product development, Rohde & Schwarz is the centre of excellence when it comes to creating high-quality solutions in state-of-the-art communications engineering, enhanced by expert knowledge in cybersecurity.

3.6b Expo Session: Cyber Security

Panel Discussion: IoT Security for Critical Infrastructure and Military Applications

Moderator:

Mr Tony Vizza, Lead Auditor, Director of Cyber Security Advocacy, Asia-Pacific (ISC)2

Panel:

Ms Daniella Traino, Managing Director, Pinecone Technology Strategies and Director IoTSEC

Mr Suneel Randhawa, Group Research Leader in Cyberwarfare, DSTG

Mr Matt Tett, Managing Director, Enex Testlabs

Ms Sally Krebs, Enterprise Sales Director, APJ

In this panel, the panellists will discuss the issue of cyber security in the IoT realm and look at how to address an area that will only increase in importance as more and more devices are connected to networks. A key focus for the panel will be to consider secure software development and lifecycle, and to consider the military ramifications from poorly secured IoT devices.

Presenter: Dr Gina Kingston and Dr Andrew Flahive, C4ISR Design Directorate, ADF Headquarters

This update will discuss the forward work plan for the Australian Defence’s Command, Control, Computers, Communication, Intelligence, Surveillance and Reconnaissance (C4ISR) Design including the development of Operational Design Patterns (ODP). The presentation will explain how the ODPs are making an impact on Australian Defence’s Joint Force and outline how industry can be involved in their development. To address future C4ISR integration and interoperability issues and maximise the opportunities that good C4ISR design offers, ODPs are being developed to align Defence on what they should be acquiring, using repeatable patterns, rules and guidance. The ODPs address what Defence needs to do rather than presenting rigid ‘as-is’ and ‘to-be’ C4ISR architectures. When a more forceful approach is needed Joint Force Authority Directives can be used to specifically nominate who in defence needs to do what by when so as to ensure an integrated future Joint Force. There are five main areas where industry can become involved in Defence’s future C4ISR Design including: 1. Command and Control, 2. Intelligence, Surveillance and Reconnaissance, 3. Mission Based Activities, 4. Defence Operational Networks and 5. C4ISR Vulnerabilities. We aim to seek a closer relationship with Defence Industry so that we become true partners in the design and development of fit-for-purpose C4ISR capability. Through closer collaboration Defence Industry may better position their research and development efforts across these five main areas and contribute to the development of the ODPs and Defence’s C4ISR Design goals. Contributions such as advising Defence against: considering options that are not technically feasible; adopting outdated concepts and unnecessarily constraining the solution space; will help Defence design a much better Joint Force.

Presenter: Mr David Abel, Co-founder and Director, Luminact

It’s time to make what we do focused around of end user. Gone are the days of exclusive platform purchase. The future is in system of systems and procurement at an integrated level maximizing capability for the force commander. In this tutorial we will debate the importance of a combined approach to complex platform acquisition.

3.6e Tutorial: Use Cases and Usages for XML in a TDL World

Presenter: Prof. Dr. Tobias Eggendorfer, University of the Federal Armed Forces Munich / Universität der Bundeswehr München

Our last year presentation on using XML to describe TDL standards in a machine readable format and to use this description to automatically import TDL specifications in TDL systems, thereby providing automatic configuration and support for new standard revisions, resulted in three interesting discussion topics, which we would like to address in this tutorial:

- Could XML be used as a TDL, instead of only describing TDLs? Is there a difference between the newer VMF (variable message format) messages and the well known FMF (fixed message format) TDLs, such as Link 11, Link 16 and NILE.

- How do several XML-descriptions of TDL specifications differ, what are the relevant differences between these formats and how could they be transformed using standardised and automated systems.

Since we were also asked about tools and further background information, we cover this in the session as well.

The aim of this tutorial is to provide the TDL community by their own request last year with a in-depth background on use cases and usages of XML in a TDL environment.

3.6f Update: Introduction to Cyber Traps and Deception – Part 2

Presenter: Mr Ben Whitham & Mr David Liebowitz, Penten

This tutorial is an introduction to practical cyber deception. Cyber traps and other tools are becoming increasingly popular due to their ability to generate low numbers of high value alerts to intrusion. A well designed deception strategy can also provide valuable information about an intruder, their intentions and methods. Understanding how cyber traps work will become increasingly important for those personnel involved in cyber capability development, implementing cyber security programmes and managers of cyber capability. Participants in this tutorial will learn about the elements of a cyber trap and get hands-on experience exploring a number of different cyber traps that can be applied to breach detection, including breadcrumbs, honeypots, honeyfiles and honey tokens. Participants will also learn gain an understanding about where these techniques are best employed to detect and track intruders. This tutorial is presented at an introductory level. Only basic computer skills are needed to attend. Participants need to supply a recent laptop with a modern web browser.

Presenter: Mr Les Berry, Business Development Manager, General Dynamics Mission Systems

The US Department of Defense is moving forward with upgrading and improving Positioning, Navigation, and Timing (PNT) equipment. Three major programs, Modernized GPS (M-Code), an Assured PNT Program of Record, and an effort led by the US Army Rapid Capability Office, will allow US forces unhindered access to trusted PNT in all environments. GPS Source, a wholly-owned subsidiary of General Dynamics Mission Systems and an industry leader in Assured PNT, is the prime contractor for the US Army’s M-Code integration effort. In addition, our equipment has been selected and is being fielded as part of an Operational Needs Statement (ONS). GPS Source has a unique perspective to the challenges of implementing Assured PNT in challenging military environments, and is currently working to ensure that this technology is compatible with GVA. The purpose of this talk is to update the international community on the status of those efforts and discuss methods to establish a capability for providing uninterrupted and valid PNT.

3.7b Expo Session: Cyber Security

How to Prevent Breaches with Phishing Threat Intelligence

Presenter: Mr Ryan Jones, Principal Sales Engineer, Cofense

Mottos like "If you see something, say something" speak to the power of human observation in preventing security disasters. Similarly, valuable human-generated intelligence can be effective in preventing data breaches emanating from phishing attacks. In today’s changing cyber threat landscape, humans need to be conditioned to recognise phishing attacks and security teams need to be armed with actionable threat intelligence to rapidly manage an attack once it hits.

This is where Phishing Threat Intelligence comes into play. By extracting key IOCs from newer phishing threats and making them available to security teams, government defence organisations can detect attacks in progress and respond quickly to reduce the effect of a breach. Plus, by incorporating the same intelligence and tactics in your awareness program, you can train your users to more quickly detect and report an active threat.

Join this session to learn about:

· The constantly changing threat landscape.

· Turning active, real threats into learning moments for your users.

· Speeding up response with timely, actionable intelligence.

Behavioral Analytics to Beat Machine Learning

Presenter: Mr Rob Dooley, Regional Director, Australia and New Zealand, Carbon Black TBA

Presenter: Mr Peter Stauffer, Threat Analyst & Space Operations Specialist, Downer Group

The Department of Defence (DoD) and Australian Space Agency (ASA) have incorporated Science, Technology, Engineering, and Mathematics (STEM) outreach and advocacy within their 2019 Strategies.

The Defence Industry Skilling and STEM Strategy recognises the collaboration required between Government, Industry, and Education sectors. This collaboration will ensure Australia’s future Defence industry workforce can thrive and grow to meet the $200b investment over the next decade. The Defence Skilling and STEM Strategy outlines the Government’s intent to collaborate with industry to establish and maintain a sustainable workforce.

The ASA Advancing Space Australian Civil Space Strategy identifies 4 Strategic Space Pillars – International, National, Responsible, and Inspire. The Inspire Pillar is focused on inspiring young people to take up STEM careers and to support the growth of the future workforce.

Downer Defence and National Security is poised to align with the DoD and ASA 2019 STEM strategies. Our ability to recruit and retain STEM workforce is critical to ensuring our competitive edge in the fast-growing and competitive Defence and Space industry. During this presentation Mr Peter Stauffer will provide an overview of how Downer as Industry partner is working with Government and Education sectors to ensure Australia’s workforce is poised to meet the current and future demands of Australian Space and Defence. Peter will draw upon his 30+ years supporting Coalition SATCOM and most recently the development of the ADF JP9102 to outline the future of Australian industry to foster future generations.

Presenter: Mr Jon Stearn, CTO, Viasat NextGen Tactical Data Links

Many believe that Link 16 is heading towards its sunset and can be replaced by wide band capability designed into Generation IV and Generation V air platforms. However, Link 16 is not dead, it is alive and well and moving toward a bright future. Today’s Link 16 is not the same network implemented in the early 1980s. Focus includes near term enhancements as well as future enhancements improving data throughput, data security and overall information sharing.

Currently designed enhancements include Concurrent Multi-net and Enhanced Throughput capabilities. These capabilities allow additional participants and more diverse information. The addition of these participants will change how information is shared on the battlefield and how networks must be designed in order to accommodate the new participants.

Anticipated technology improvements in the future will include IP addressable messaging, enhanced data encoding and compression algorithms, improved waveform performance and digital processing advancements, once implemented, these improvements will establish Link 16 as the preferred Situational Awareness data link for decades to come. These possible Future enhancements to the Link 16 waveform and processing capabilities will allow the data link to expand to peak performance and remain viable through 2050.

Link 16 participation in network centric warfare Concept of Operations increases the necessity for improved network security both at the data processing level as well as the RF transport level.

3.7e Tutorial: Meta Antennas and Adaptive Antennas - Solving the Military Integration Challenges

Presenter: Dr Amit Mehta, Swansea University

Antennas integration on different military platforms are a big challenge, especially when SWaP (size, weight and power) restrictions are increasing and platforms available size is reducing. This tutorial will provide introduction to new type of META antennas. Compare to conventional half wavelength antennas these are ultra thin and therefore offers the potential of 'extreme ease of antenna systems integration'. In addition, some field examples of adaptive reconfigurable antennas will be presented for achieving high throughput, wide bandwidth and shared TX/ Rx apertures. Antennas integration on different military platforms are a big challenge, especially when SWaP restrictions are increasing and platforms available size is reducing. This tutorial will provide introduction to new type of META antennas. Compare to conventional half wavelength antennas these are ultra small and therefore offers the potential of 'extreme ease of antenna systems integration'. In addition, some field examples of adaptive reconfigurable antennas will be presented for achieving high throughput, wide bandwidth and shared TX/ Rx apertures.

Presenter: Mr James Gibson, Strategic Innovation, Fujitsu Australia New Zealand

At recent defence industry forums, senior ADF officers emphasised the need ‘to continue to fight while hurt’ in the modern congested, contested and competed battlespace. Concerns about the overwhelming pace of change surfaced in statements that ‘5th generation platforms on 4th generation infrastructure result in 3rd generation effects’. For the 5th Gen IME to be an enabler, a future concept of operations must directly address these needs and concerns. All this points to the need for ICT to be treated as a core business and weapons system for the 5th Gen Force. This tutorial takes a first principles approach to help understand some of the essential concepts and capabilities required – and why they are required. On the way it highlights inversions in current thinking – new ways of doing things which explains why current approaches fail and points the way to the future transformations. This new way of thinking helps shape how innovation and stability can be achieved and how emerging technologies can be exploited for maximum effect. Emerging technologies includes artificial intelligence, big data, machine learning, autonomous behaviour, agent based systems, cyber protection, networks, open standards, information fusion and management. Closer to the time for the tutorial a number of papers and Australian Defence Magazine Articles will be distributed to form the basis for discussion.

Presenter: Mr Luke Brown, Assistant Secretary Space & Communications, JCG

Space and Communications Branch in the Defence Joint Capability Group is developing the vision for the future delivery of Beyond Line of Sight communications for the Australian Defence Force. Key elements of the overall long range communication include Satellite Communications and High Frequency Communications. Capabilities that will be delivered in these areas can be viewed as providing infrastructure as part of a communications network. The main purpose of this presentation is to provide an overview of current thinking regarding potential future directions in Joint Project 9102, the Australian Defence Satellite Communications System and Joint Project 9101, the Enhanced Defence High Frequency Communications System.

3.8b Expo Session: Cyber Security

Whistleblowers – It’s a Brave New World Presenter: Ms Nicole Murdoch, Founding Director, Eaglegate and Director, Australian Information Security Association (AISA)

3.8c Update: Artificial Intelligence in the Defence Domain

Presenter: Dr Mike Sweeney, Solutions Consultant, Fujitsu Australia

The use of Artificial Intelligence (AI) technology is now a critical capability in many business sectors, however the Australian Defence domain has been slow to appreciate the possible efficiency increases and military advantages that AI can provide. The American, Russian, and Chinese governments have recognised the huge economic and military benefits that will result from investments in AI and have committed their countries to the research and exploitation of this disruptive fast growing technology. Other countries must invest effort and funding in AI technology now or accept a role as a poor cousin in a world driven by the AI boosted economies and dominated by military forces augmented with AI. This update talk will explain the basic ideas behind current AI and Deep Learning in non-specialist language, then explore the potential benefits to the Defence domain. New applications of current Deep Learning such as image understanding, text classification, language translation, and cyber defence will be introduced. The last part of the talk will inform the audience on the emerging capabilities which will result from today’s advances in the art, followed by a discussion on the impact of possible ‘thinking’ machines and the challenges of integrating them into our workforce, culture, legal system, and military capabilities.





Presenter: Mr Sean Dardis, ANZ Chief Technology Officer for Department of Defence, Dell EMC and Mr Cameron Chehreh, Chief Technology Officer / Vice President Pre-Sales Engineering, Dell Technologies Federal

An organisation the size of Dell Technologies has a number of solutions. We work together with our own FVEY aligned teams globally on the solutions that are can be used for our Defence customers. How do we take our significant end to end portfolio of products and solutions through to Defence effectively? How do we increase the speed of innovation and yield financial benefits to Defence overall? How do we take our global learnings and communicate this through to Defence in an easy to understand way without creating noise and confusion? Dell Technologies is working together with the FVEY community to ensure that what we communicate is aligned to the Defence priorities and outcomes. We call this ‘Consistently Mission Relevant’ and it helps manage our People, Technologies and Processes through our four Transformation Pillars and then again through to Defence. IT Transformation at the Tactical Edge: One of our Transformation Pillars is ‘IT Transformation.’ In this transformation pillar we look to optimise IT for performance, agility and efficiency. We look to enable IT to help Defence innovate and become more digital ready for a future which makes the most of hybrid clouds, multi clouds and unlocks emerging technologies in a way that Defence can adopt. We have an example to talk about today. Analytics at the Edge: How can we use our technology to provide commanders with an analytics capability at the Tactical Edge. The ability to push insights from the Edge, to the Core then through to the Cloud. Using our state of the art IOT Edge Solutions, real time sensor data can be analysed at the Edge whilst deeper processing of this data across multiple areas of operation can be analysed in the core. This approach uses a light weight and deployable solution at the edge where size weight, power and cooling are all considerations and then effectively uses the higher processing and storage capabilities at the core and cloud.

Presenter: Ms Jane Hatton, DSTG

INTRODUCTION Defence Science & Technology (DST) Group aims to be a world leader in defence science and technology – indispensable in supporting and transforming Australia’s defence and national security. The presentation will provide an overview of the new High Performance Computing (HPC) and Computational Science program at DST and its future development. Significant progress in the development of the DST HPC program has occurred over the past year. The talk will cover the major research challenges where DST is applying HPC and computational science. Potential opportunities for collaboration will also be identified. THE ROLE OF HPC World-wide research and development have involved the use of computational science to model, simulate and solve contemporary and projected problems ever since computers became common place in the last century. Computational science involves the application of scientific algorithms across data sets to produce outputs relevant to solving problems. As the size of the data sets and the complexity of the problems and algorithms have increased, so has the need for faster and bigger computers, resulting in increased demand for supercomputing capabilities. As the application of supercomputing has widened and as its technology has become based on the aggregation of standard computing components at a massive scale, supercomputers have evolved into HPC. An increasing range of technical and operational problems can be investigated and solved using computational science on HPC. The application of computational science on HPC is unlike corporate or business process computing due the nature and size of the data sets and the specialised scientific algorithms, altogether requiring specialised capabilities and management for high speed data flows and the optimization of computer performance. Computational science and its supporting HPC infrastructure are vital enabling technologies that are likely to deliver significant value. In a recent study for the US Department of Energy (1) , 700 case studies across a range of industry sectors and countries were reviewed, showing estimated financial returns in the order of USD $52.00 of profits/cost savings per dollar invested in HPC. The return to the defence sector was estimated to be USD $141.50 per dollar invested in HPC (noting open sources are likely to result in underestimation for the defence sector). HPC can be used to model or simulate real world systems and scenarios across the widest range of real-world variables and without the risks and opportunity costs associated with physical prototyping and experimentation. HPC FOR DEFENCE RESEARCH The 2016 Defence White Paper stated that: “The Government will make a significant new investment in information management capabilities to ensure that the right information is available to Defence decision makers at the right time. These investments will ensure that our armed forces are able to respond quickly to emerging threats, as well as ensuring that Defence’s business processes become more effective and efficient (p105, para 4.87).” In national security and defence endeavours, the earliest and most significant area of use of supercomputers has been in intelligence agencies for highly classified problems. Over time, use has expanded into other problem sets, such as using Computational Fluid Dynamics (CFD) to analyse airflow over aircraft to ensure safe release of their payloads, or to analyse the noise created by the flow of water over submarine hulls and their propellers in order to maximise stealth. Computational science and HPC can now be used to model, simulate and solve complex problems in almost every military domain and application of Defence science and technology, ranging in scale from sub-molecular simulation of cracks in military aircraft components up to the virtual simulation of military battle tactics and force structures. DST HPC CAPABILITY The DST HPC capability will consist of a new purpose built state-of-the-art HPC Centre. The HPC Centre will comprise a data hall and associated HPC visualisation facilities and training rooms. F Effective support to Researchers is critical to productive and successful use of HPC. Computational science requires a comprehensive understanding of models being used, software engineering, and code optimisation for efficient running of research tasks. The current team of HPC staff will be expanded to meet the needs of the new HPC capability - see Figure 2. A development and experiential approach to training will be provided, similar to that used by the Commonwealth Scientific and Industrial Research Organisation (CSIRO) in developing its HPC capability. The HPC Program will provide additional support through training services to the DST Researcher community and will focus on skills development and skills transfer to develop HPC relevant expertise.

3.8f Panel: Pathways and Blockers to Delivering Transformative ICT Capability for the 5th Gen Force

Moderator: Mr James Gibson, Strategic Innovation, Fujitsu Australia New Zealand

Panel Members: AVM (retired) John Blackburn; Michael Branch, INSITEC; Dr Greg Judd, DSTG

This panel based workshop is aimed at strategists, policy makers, systems architects and change managers responsible for ensuring the 5th Generation ICT systems can take their rightful place as a weapons system in the 5th Generation Environment.

Past experience of transformative ICT projects has been poor with many, perhaps most, large ICT projects failing to deliver all or part of the desired outcomes. Outcomes which were delivered were fragile and degraded over time, eventually requiring yet another transformation - with the cycle repeating. The present outlook is not reassuring, complexity is skyrocketing but the underlying systems architecture and conceptualisation remain almost unchanged.

The first part of this workshop has already argued that a paradigmatic shift in thought is required—a joint, ever-evolving transformation not a one-off project. The big question is how can we achieve this transformation when Defence is structured around projects which use continuous improvement—the antithesis of transformation?

In this workshop we discuss strategies, pathways to adoption, and the fundamental structural issues which may be either and enabler or blocker to this initiative. We also briefly look at how we select the appropriate technologies to ensure that the initiative has a solid and foundational evolutionary core to support a life of type measured not in years but in decades.

The final 10 minutes of this workshop will be spent shaping a course of action with panel members and attendees.