![Page 1: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/1.jpg)
![Page 2: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/2.jpg)
The Challenges of Countering Terrorist Networks
Centre for Defence Enterprise (CDE)
![Page 3: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/3.jpg)
© Crown Copyright MOD 2011
The aim of CDE
![Page 4: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/4.jpg)
© Crown Copyright MOD 2011
Prove the value of novel, high-risk, high-potential-benefit research
![Page 5: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/5.jpg)
© Crown Copyright MOD 2011
To enable development of cost-effective capability advantage
![Page 6: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/6.jpg)
6
Engaging a broad audience
![Page 7: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/7.jpg)
Providing opportunity
![Page 8: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/8.jpg)
Two routes to funding
![Page 9: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/9.jpg)
Themed calls
![Page 10: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/10.jpg)
Dstl is part of the
Ministry of Defence
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
UNCLASSIFIED / FOR PUBLIC RELEASE
CDE themed call programme
Smart and multifunctional materials and structures
Call closes 12 April 2013 (at 1700 hrs)
The challenges of countering terrorist networks
Call closes 1 May 2013 (at 1700 hrs)
Precision timing Call launch 23 April 2013
Secure communications Call launch 18 June 2013
Innovation in drug development processes
Call launch 25 June 2013
Enhancing military medical training and support for the medic
Call launch 16 July 2013
Register and further details at www.science.mod.uk under ‘Events and Calls’
![Page 11: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/11.jpg)
Defence Open Call
![Page 12: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/12.jpg)
Seeking the exceptional
![Page 13: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/13.jpg)
Challenging conventions
![Page 14: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/14.jpg)
Novel fibres for CBR protection
![Page 15: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/15.jpg)
‘Micro generators’
![Page 16: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/16.jpg)
Sustaining participation
![Page 17: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/17.jpg)
Minimising participation cost
![Page 18: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/18.jpg)
Online bid submission
![Page 19: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/19.jpg)
Compliance
![Page 20: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/20.jpg)
Intellectual property
![Page 21: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/21.jpg)
The future of CDE
![Page 22: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/22.jpg)
Making an impact
![Page 23: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/23.jpg)
4283 proposals received
![Page 24: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/24.jpg)
16% proposals funded
![Page 25: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/25.jpg)
£37M contracts awarded
![Page 26: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/26.jpg)
Accessible Rapid assessment Easy contracting Quick payments Benevolent IP arrangements
CDE advantages
![Page 27: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/27.jpg)
© Crown Copyright MOD 2011
Effective proposals
![Page 28: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/28.jpg)
10:30 Introduction to CDE
10:45 Counter Terrorism Science & Technology Centre overview
10:55 Military context
11:25 Challenge 1 – understanding networks
11:40 Challenge 2 – identifying individuals
11:55 Q&A
12:05 Networking with lunch
13:00 Challenge 3 – translating information
13:15 Call summary
13:20 Ethics
13:25 CDE – submitting a successful proposal
13:35 Q&A
13:45 Networking with refreshments
15:15 Event close
Agenda
![Page 29: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/29.jpg)
Network and question
![Page 30: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/30.jpg)
Centre for Defence Enterprise
Advanced Design and Manufacturing
Wing Commander Jim Pennycook
Centre for Defence Enterprise
01235 438445
[email protected] www.science.mod.uk/enterprise
![Page 31: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/31.jpg)
10:30 Introduction to CDE
10:45 Counter Terrorism Science & Technology Centre overview
10:55 Military context
11:25 Challenge 1 – understanding networks
11:40 Challenge 2 – identifying individuals
11:55 Q&A
12:05 Networking lunch
13:00 Challenge 3 – translating information
13:15 Call summary
13:20 Ethics
13:25 CDE – submitting a successful proposal
13:35 Q&A
13:45 Networking
15:15 Event close
Agenda
![Page 32: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/32.jpg)
UNCLASSIFIED © Crown copyright 2013 Dstl
20 March 2013
![Page 33: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/33.jpg)
The Challenges of Countering Terrorist
Networks
UNCLASSIFIED © Crown copyright 2013 Dstl
20 March 2013
![Page 34: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/34.jpg)
UNCLASSIFIED © Crown copyright 2013 Dstl
20 March 2013
Harnessing and developing science
and technology (S&T) to increase
defence and security capability to
pursue and disrupt threats to UK
Countering terrorist networks
![Page 35: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/35.jpg)
UNCLASSIFIED © Crown copyright 2013 Dstl
20 March 2013
Challenge 1: Understanding the
Network
Challenge 3: Translating Information
Challenge 2: Identifying Individuals
Today’s CDE call S&T challenges
![Page 36: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/36.jpg)
10:30 Introduction to CDE
10:45 Counter Terrorism Science & Technology Centre overview
10:55 Military context
11:25 Challenge 1 – understanding networks
11:40 Challenge 2 – identifying individuals
11:55 Q&A
12:05 Networking lunch
13:00 Challenge 3 – translating information
13:15 Call summary
13:20 Ethics
13:25 CDE – submitting a successful proposal
13:35 Q&A
13:45 Networking
15:15 Event close
Agenda
![Page 37: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/37.jpg)
The Challenges of Countering Terrorist
Networks
Military Context
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 38: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/38.jpg)
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 39: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/39.jpg)
References
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 40: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/40.jpg)
References
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 41: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/41.jpg)
Terminology
ISR = Intelligence, Surveillance and Reconnaissance
ISTAR = Intelligence, Surveillance, Target Acquisition and Reconnaissance
C4ISR = Command Control , Computers, Communications and ISR
E2E3 = End to End Enterprise
MPE = Materiel and Personnel Exploitation
FABINT = Forensic and Biometric Intelligence
DOCEX/DOMEX = Document Exploitation/Document and Media Exploitation
SIGINT = Signals Intelligence
OSINT = Open Source Intelligence
WTI = Weapons Technical Intelligence
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 42: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/42.jpg)
Future Character of Conflict: 5Cs
Contested
Constrained
Congested Cluttered
Connected
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 43: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/43.jpg)
The Future Battlespace
Contested Competition for resources. All geographies of operation are contested Sea, land, air & space, cyberspace and information
Congested To influence people we have to operate in, over and close to where they
live. People live in urban areas in the littoral There is no empty battlefield
Cluttered Network Enabled Capability will not fully lift the fog of war We need to understand and to discriminate
Connected Networks - source of strength for friend and foe Nodes are also a source of weakness
Constrained Legal and social norms - essential to our legitimacy - will limit us but not our adversaries
More
Constrained UNCLASSIFIED
![Page 44: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/44.jpg)
Future Character of Conflict
Contested
Constrained
Congested Cluttered
Connected
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
COMPLEX
CONTINGENCY
COALITION
URBAN
![Page 45: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/45.jpg)
Understanding
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 46: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/46.jpg)
Understanding
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
“Intelligence is knowing a tomato is a fruit.
Understanding is not putting it in a fruit salad.” JDP 04
![Page 47: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/47.jpg)
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 48: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/48.jpg)
Afghanistan
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 49: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/49.jpg)
Afghanistan
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 50: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/50.jpg)
© Crown copyright 2013 Dstl
20 March 2013
![Page 51: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/51.jpg)
CONTINGENCY
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 52: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/52.jpg)
Change in intelligence focus
Contingency
People Activities/Relationships
Cold War
Equipment Hierarchies
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 53: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/53.jpg)
Change in intelligence focus
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 54: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/54.jpg)
© Crown copyright 2013 Dstl
20 March 2013
![Page 55: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/55.jpg)
Size, Weight and Power = SWaP
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 56: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/56.jpg)
Communications
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 57: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/57.jpg)
Constraint and oversight
Legal Ethical
Moral Political
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 58: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/58.jpg)
SCENARIOS
Maritime Boarding Operation
Insurgent Compound Assault
Non-combatant Evacuation Operation (NEO)
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 59: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/59.jpg)
Maritime boarding operation
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 60: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/60.jpg)
Maritime boarding operation
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 61: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/61.jpg)
Compound Assault
© Crown copyright 2013 Dstl
20 March 2013
Compound assault
UNCLASSIFIED
![Page 62: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/62.jpg)
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
Compound assault
![Page 63: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/63.jpg)
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
Compound assault
![Page 64: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/64.jpg)
Compound assault
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 65: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/65.jpg)
Compound assault
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 66: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/66.jpg)
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
Compound assault
![Page 67: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/67.jpg)
© Crown copyright 2013 Dstl
20 March 2013
Non-combatant Evacuation Operation (NEO)
UNCLASSIFIED
![Page 68: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/68.jpg)
NEO
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 69: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/69.jpg)
NEO
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 70: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/70.jpg)
Summary
Future Character of Conflict: 5Cs
ISR focus: People and activities
Understanding: Requires lots of information
Legal, ethical, moral, political constraints
Military are open to novel, smart alternatives
UNCLASSIFIED © Crown copyright 2013 Dstl
19 March 2013
![Page 71: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/71.jpg)
10:30 Introduction to CDE
10:45 Counter Terrorism Science & Technology Centre overview
10:55 Military context
11:25 Challenge 1 – understanding networks
11:40 Challenge 2 – identifying individuals
11:55 Q&A
12:05 Networking lunch
13:00 Challenge 3 – translating information
13:15 Call summary
13:20 Ethics
13:25 CDE – submitting a successful proposal
13:35 Q&A
13:45 Networking
15:15 Event close
Agenda
![Page 72: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/72.jpg)
Challenge 1: Understanding
Networks
20 March 2013
© Crown copyright 2013 Dstl UNCLASSIFIED
![Page 73: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/73.jpg)
UNCLASSIFIED © Crown copyright 2013 Dstl
20 March 2013
Not just people: organisations, locations, events, vehicles, phones, computers…….
![Page 74: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/74.jpg)
Background
• MOD may have a need to support multiple operations at any one time, including
working with coalition partners and local security forces.
• There is a requirement to build up an understanding of the networks of people
and supporting infrastructure.
• There is a need to mine all the available information to identify individuals and
groups who are interested in countering defence and security activity.
• Operations may be data rich or data sparse, with information being fed from a
number of sources, with varying degrees of confidence.
• Requirement to fuse sources to build up network picture.
20 March 2013
© Crown copyright 2013 Dstl UNCLASSIFIED
![Page 75: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/75.jpg)
S&T challenges
UNCLASSIFIED © Crown copyright 2013 Dstl
20 March 2013
Sources: Open source; MOD; OGDs; Local military/security; Coalition partners
Formats: Audio, Video, Text, Tabular, Imagery, STRUCTURED & UNSTRUCTURED
Data quality Data complexity
Volume Uncertainty Timeliness
Automated data diagnosis Complexity estimation
Extraction of structured content Metadata tagging
Conversion to common format
FLEXIBLE EXTRACT, TRANSFORMATION, AND LOADING
![Page 76: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/76.jpg)
S&T challenges
UNCLASSIFIED © Crown copyright 2013 Dstl
20 March 2013
INFORMATION REPOSITORIES
ANALYTICS/PROCESSING Common Interface
Flexible and scalable data storage
Integration with traditional data structures
Automation of common tasks
Machine-led pattern finding (eg anomaly detection)
Automated prediction and validation
Enhanced collaborative mechanisms
AUGMENTATION OF ANALYTICAL WORKFLOW
![Page 77: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/77.jpg)
What we want
UNCLASSIFIED © Crown copyright 2013 Dstl
20 March 2013
Fix one part of the challenge well, rather than several parts poorly
Open architectures
Use of open-source software is encouraged
State what data types and functions your proposal will consider (be clear)
Scalability of algorithms/solutions – will it handle “big data”
Simple interfaces encouraged to reduce training burden
![Page 78: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/78.jpg)
What we don’t want
UNCLASSIFIED © Crown copyright 2013 Dstl
20 March 2013
Reliance on existing proprietary solutions or closed APIs
Enterprise-level solutions
Avoid reliance on third-party services
Avoid focussing on simple aspects of challenges: •Entity extraction
•Extraction of common file formats (eg HTML)
![Page 79: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/79.jpg)
Summary
• Information fusion
• Open architectures
• Ease of use
UNCLASSIFIED © Crown copyright 2013 Dstl
20 March 2013
Effective methods to explore the potentially large volume of data
available from a variety of sources, across a range of data formats to
help identify the key activities and individuals that form any network.
• Scalable
• Handling uncertainty
![Page 80: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/80.jpg)
10:30 Introduction to CDE
10:45 Counter Terrorism Science & Technology Centre overview
10:55 Military context
11:25 Challenge 1 – understanding networks
11:40 Challenge 2 – identifying individuals
11:55 Q&A
12:05 Networking lunch
13:00 Challenge 3 – translating information
13:15 Call summary
13:20 Ethics
13:25 CDE – submitting a successful proposal
13:35 Q&A
13:45 Networking
15:15 Event close
Agenda
![Page 81: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/81.jpg)
UNCLASSIFIED
Challenge 2: Identifying
Individuals
20 March 2013
© Crown copyright 2013 Dstl
![Page 82: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/82.jpg)
UNCLASSIFIED
Background
• People are a key part of networks and network
activities.
• This challenge is focused on identifying the individuals
and exploiting available information to establish
linkages.
• Wide range of scenarios across defence and security
where potential for S&T in this area can have impact
on future UK capability.
20 March 2013
© Crown copyright 2013 Dstl
![Page 83: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/83.jpg)
UNCLASSIFIED
Approaches to identifying an individual
20 March 2013
© Crown copyright 2013 Dstl
?
![Page 84: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/84.jpg)
UNCLASSIFIED
The overarching challenge
20 March 2013
© Crown copyright 2013 Dstl
• Techniques exist to enable identification of
individuals and to exploit finds.
• S&T to: – provide a significant step change in current approaches
– provide a novel approach
• This challenge is split into two key areas: – A. Person is present
– B. Person is not present
![Page 85: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/85.jpg)
UNCLASSIFIED
A. The person is present
• Range of scenarios
– Voluntary enrolment of a person in the field
– Entry into a base
– On approach to military forces
– Through activity
20 March 2013
© Crown copyright 2013 Dstl
![Page 86: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/86.jpg)
UNCLASSIFIED
A. The person is present
• Range of scenarios
• As the person is present
– Uncontaminated samples
– Rapid processing
– Range of environments
– Ideally portable with low power (SWaP)
– Although present person maybe at distance
20 March 2013
© Crown copyright 2013 Dstl
![Page 87: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/87.jpg)
UNCLASSIFIED
B. The person is not present
• Opportunities to exploit from traces or items left behind
at a scene
20 March 2013
© Crown copyright 2013 Dstl
Scene of
interest
?
![Page 88: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/88.jpg)
UNCLASSIFIED 20 March 2013
© Crown copyright 2013 Dstl
B. The person is not present
• Biometrics
• Range of surfaces – time
• Contamination
• Environmental conditions
• Other opportunities from the scene
• Imagery, voice recordings, others?
• Robust and adaptable to maximise opportunities
• Add value to identify the individual(s) and/or establish linkages across the network
![Page 89: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/89.jpg)
UNCLASSIFIED
What are we looking for? General
• New methods and approaches
• Efficient collection of information
• Wider information sources
• Open architecture for software solutions
• Sampling
• Processing rates
• Defence Lines of Development (DLODs)
• Interoperability and use of international standards
20 March 2013
© Crown copyright 2013 Dstl
![Page 90: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/90.jpg)
UNCLASSIFIED
What are we looking for? In the field
• Remote use of equipment
– Degrees of man portability
– Lower power requirements
• Ability to use in a range of environments
• Approaches to consider lower bandwidth data links
• Fast or very fast processing to support decision
making
• Efficient and effective sampling and storage
20 March 2013
© Crown copyright 2013 Dstl
![Page 91: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/91.jpg)
UNCLASSIFIED
What are we looking for? Static location
• External power supply
• Access to on-site servers
20 March 2013
© Crown copyright 2013 Dstl
![Page 92: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/92.jpg)
UNCLASSIFIED
What we don’t want
20 March 2013
© Crown copyright 2013 Dstl
• Standard law enforcement techniques or
commercially available techniques for:
• Detection of fingerprints
• Face recognition
• Iris recognition
• DNA or its analysis
• Speaker recognition
![Page 93: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/93.jpg)
UNCLASSIFIED
Summary
20 March 2013
© Crown copyright 2013 Dstl
• Range of use scenarios
• Timeliness of sampling and
processing
We need to be able to confirm the identity of individuals
reliably with a step change in current capability or using
novel approaches
• SWaP
• Interoperability
![Page 94: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/94.jpg)
10:30 Introduction to CDE
10:45 Counter Terrorism Science & Technology Centre overview
10:55 Military context
11:25 Challenge 1 – understanding networks
11:40 Challenge 2 – identifying individuals
11:55 Q&A
12:05 Networking lunch
13:00 Challenge 3 – translating information
13:15 Call summary
13:20 Ethics
13:25 CDE – submitting a successful proposal
13:35 Q&A
13:45 Networking
15:15 Event close
Agenda
![Page 95: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/95.jpg)
Challenge 3: Translating
Information
20 March 2013
© Crown copyright 2013 Dstl UNCLASSIFIED
![Page 96: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/96.jpg)
Background
• MOD is active in a number of military operations globally, often in a CT role.
• Majority of UK troops not fluent in local written or spoken language for area of
operation.
• Too much information to manually process.
• Human translators support high accuracy but low volume translations.
• Requirement for capability to better enable MOD’s understanding of local
environment and population (feeds Challenge 1).
20 March 2013
© Crown copyright 2013 Dstl UNCLASSIFIED
![Page 97: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/97.jpg)
S&T challenges
UNCLASSIFIED © Crown copyright 2013 Dstl
20 March 2013
Hard copy
Speech to text
Optical Character Recognition
Machine translation (to English)
Keyword extraction
Audio Digital
Video
Speaker attribution
(eg dialect, emotion)
Speaker ID Challenge 1
![Page 98: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/98.jpg)
What we want
UNCLASSIFIED © Crown copyright 2013 Dstl
20 March 2013
Optical Character Recognition Portable/small solutions (tablet sized)
Rapid processing Non-Latin text support
Handwritten text Use of open standards
Machine translation/Keyword extraction Open software interfaces to enable
addition of classified keywords High volume processing
Rule-based machine translation
Speaker ID/Attribution Resilience to noise
High accuracy Minimal training (seconds) Near real-time processing
Speech to text Multiple languages (including non-
western) Preference for untrained solutions
Resilience to background noise Scalable to large volumes of data
![Page 99: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/99.jpg)
What we don’t want
UNCLASSIFIED © Crown copyright 2013 Dstl
20 March 2013
Optical Character Recognition Latin alphabet OCR
Office-based solutions (non-portable) Closed APIs which are difficult to
integrate
Machine translation/Keyword extraction Reliance on third-party services
Bilingual text corpora built from news feeds or open sources (BBCM)
Western languages
Speaker ID/Attribution Reliance on third-party services (eg
existing proprietary language models) Proposals requiring significant
Government Furnished Extras (GFX)
Speech to text English language solutions
Closed interfaces/proprietary solutions Reliance on third-party services
Low volume/higher accuracy
![Page 100: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/100.jpg)
Summary
• Modular solutions
• High volume and real-time
focus
UNCLASSIFIED © Crown copyright 2013 Dstl
20 March 2013
We need to be able to rapidly prioritise sources of information (audio,
paper and electronic) to enable human interpreters to focus only on key
information sources for full translation.
• Non-western language focus
• Open architectures
![Page 101: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/101.jpg)
10:30 Introduction to CDE
10:45 Counter Terrorism Science & Technology Centre overview
10:55 Military context
11:25 Challenge 1 – understanding networks
11:40 Challenge 2 – identifying individuals
11:55 Q&A
12:05 Networking lunch
13:00 Challenge 3 – translating information
13:15 Call summary
13:20 Ethics
13:25 CDE – submitting a successful proposal
13:35 Q&A
13:45 Networking
15:15 Event close
Agenda
![Page 102: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/102.jpg)
CDE Call Summary
20 March 2013
© Crown copyright 2013 Dstl UNCLASSIFIED
![Page 103: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/103.jpg)
Aim of this CDE call
• Identify innovative research that will provide a change in our ability
to counter terrorist networks
• Broad scope
20 March 2013
© Crown copyright 2013 Dstl UNCLASSIFIED
Initial investigation
Proof of concept for a
novel idea
Concept development
Prototype development
More advanced research
![Page 104: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/104.jpg)
20 March 2013
© Crown copyright 2013 Dstl UNCLASSIFIED
Technology readiness levels F
or n
on
-tech
no
log
y s
olu
tion
s th
e d
elta
sh
ou
ld b
e a
rticu
late
d
Re
se
arc
h
pro
gra
mm
e
![Page 105: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/105.jpg)
TRL for proposals
•Only interested in proposals that have an end point from TRL 1- 6 TRL 1-6
•Proof-of-principle research feeding into the longer-term research
•TRL 4-5 work that could make a difference in the near term A portfolio of projects
•Show a defined rise in TRL within the 6-month proposal
•Further increases in TRL outside the 6-month timescale could be an option within the proposal
TRL change
•Please clearly articulate the technical aspects of the proposal and show how you expect the research to raise the TRL Technical aspects
20 March 2013
© Crown copyright 2013 Dstl UNCLASSIFIED
![Page 106: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/106.jpg)
Proposal timings
20 March 2013
© Crown copyright 2013 Dstl UNCLASSIFIED
CDE launch
event Call
closes:
17.00
19 Mar 1 May Before 31 May
Successful
candidates informed
Proposal Potential further research
Decision point
Up to 6 months x months
Assessment
![Page 107: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/107.jpg)
Proposals
20 March 2013
© Crown copyright 2013 Dstl UNCLASSIFIED
• We are looking for proposals of up to 6 months in duration.
– This timing will inform programme formulation for the following financial year.
– This may provide the opportunity for follow-on work after the initial 6 months phase.
Therefore after a clearly defined decision point at 6 months please state possible
continuation work (subject to funding and possible alternate contracting routes).
• There is no fixed value for any proposal but we would prefer to fund a larger
number of smaller value proposals. We have allocated up to £700K for this call.
• If GFX (government-furnished equipment/information/personnel) is unavoidable,
please clearly state any assumptions in the proposal.
![Page 108: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/108.jpg)
What are we looking for?
• Longer proposals will not be funded Duration less than 6 months
•In the view of experienced assessors (achievable within the proposed time frames and budgets)
Value for money and achievable
• Not “off the shelf” A step change in capability
• Rather than funding development of existing proprietary technology/software Open architectures
• Rather than duplication of already existing technology/ideas Novel ideas
• Expected outcome and the methods to achieve this
Clear articulation of technical details and output
• Please state clearly how this answers part/parts of the challenges
Explain how the proposal answers the challenge
20 March 2013
© Crown copyright 2013 Dstl UNCLASSIFIED
![Page 109: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/109.jpg)
20 March 2013
© Crown copyright 2013 Dstl UNCLASSIFIED
• For further questions on the proposal requirements or technical details
please contact us via:
![Page 110: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/110.jpg)
10:30 Introduction to CDE
10:45 Counter Terrorism Science & Technology Centre overview
10:55 Military context
11:25 Challenge 1 – understanding networks
11:40 Challenge 2 – identifying individuals
11:55 Q&A
12:05 Networking lunch
13:00 Challenge 3 – translating information
13:15 Call summary
13:20 Ethics
13:25 CDE – submitting a successful proposal
13:35 Q&A
13:45 Networking
15:15 Event close
Agenda
![Page 111: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/111.jpg)
Ethics • Some of the proposals may require Ethics Approval
– Any research involving human participants in MOD research, both clinical and non-
clinical requires ethics committee approval
20 March 2013
© Crown copyright 2013 Dstl UNCLASSIFIED
• Conduct research upon the human participant, including (but not limited to) administering substances, taking blood or urine samples, removing biological tissue, radiological investigations, or obtaining responses to an imposed stress or experimental situation.
Clinical
• Conduct research to collect data on an identifiable individual’s behaviour, either directly or indirectly (such as by questionnaire or observation).
Non-Clinical
![Page 112: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/112.jpg)
Ethics
• All proposals should declare if there are potential ethical hurdles to address
• A proposal must, in the first instance, be scientifically robust in order for it to be,
prima facie, ethical
• If the proposal may require ethics approval, please make a three part proposal:
– Milestone 1: Produce research protocols
– Milestone 2: Obtaining ethics approval for the project
– Milestone 3: Proposed research (subject to ethics approval)
• More information
– http://www.science.mod.uk/engagement/modrec/modrec.aspx
20 March 2013
© Crown copyright 2013 Dstl UNCLASSIFIED
![Page 113: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/113.jpg)
10:30 Introduction to CDE
10:45 Counter Terrorism Science & Technology Centre overview
10:55 Military context
11:25 Challenge 1 – understanding networks
11:40 Challenge 2 – identifying individuals
11:55 Q&A
12:05 Networking lunch
13:00 Challenge 3 – translating information
13:15 Call summary
13:20 Ethics
13:25 CDE – submitting a successful proposal
13:35 Q&A
13:45 Networking
15:15 Event close
Agenda
![Page 114: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/114.jpg)
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
UNCLASSIFIED / FOR PUBLIC RELEASE
Centre for Defence Enterprise Submitting a Successful Proposal
![Page 115: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/115.jpg)
Maximising your chances
![Page 116: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/116.jpg)
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
Know what is available
![Page 117: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/117.jpg)
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
Know what is available
![Page 118: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/118.jpg)
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
Read available
information
Including CDE
manuals
Especially Quick Start
Guide
Know what is available
![Page 119: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/119.jpg)
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
Developing a CDE proposal
![Page 120: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/120.jpg)
Dstl is part of the
Ministry of Defence
Value from technology
Innovative concept
Future capability
Proof of
concept Incremental development
![Page 121: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/121.jpg)
The essentials
![Page 122: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/122.jpg)
Abstract
![Page 123: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/123.jpg)
mins
Assessment
![Page 124: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/124.jpg)
MOD Performance Assessment Framework
Five criteria:
Operational relevance
Likelihood of exploitation
Builds critical S&T capability to meet UK needs
Scientific quality/innovation
Science, innovation and technology risk
![Page 125: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/125.jpg)
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
UNCLASSIFIED / FOR PUBLIC RELEASE
Proposal health check
![Page 126: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/126.jpg)
Claim of future benefit
![Page 127: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/127.jpg)
Contribution to future benefit
![Page 128: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/128.jpg)
Logical programme of work
![Page 129: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/129.jpg)
Generation of evidence
![Page 130: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/130.jpg)
Demonstration of progress
![Page 131: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/131.jpg)
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
UNCLASSIFIED / FOR PUBLIC RELEASE
Based on a claim of future benefit
Contribution to realisation of future benefit
Logical programme of work
Evidential outcomes
Demonstration of progress towards goal
Health check
![Page 132: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/132.jpg)
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
Government-furnished X
![Page 133: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/133.jpg)
Ethics
![Page 134: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/134.jpg)
Health and safety
![Page 135: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/135.jpg)
Unclassified
![Page 136: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/136.jpg)
Early birds
![Page 137: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/137.jpg)
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
This call closes:
17:00 hrs on
Wednesday 1 May 2013
Deadline
![Page 138: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/138.jpg)
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
UNCLASSIFIED / FOR PUBLIC RELEASE
Centre for Defence Enterprise
01235 438445
www.science.mod.uk/enterprise
Call process queries
![Page 139: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/139.jpg)
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
Call technical queries
![Page 140: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/140.jpg)
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise [email protected]
Crown Copyright Dstl 2012
www.science.mod.uk
Events and Calls > Current calls for proposals > The Challenges of Countering Terrorist Networks
Webinar – Tuesday 26 March 2013 12:30-13:30
Details on the call webpage
Email [email protected] to join
Further information
![Page 141: The Challenges of Counteringindianstrategicknowledgeonline.com/web/20130319-ct... · The challenges of countering terrorist networks Call closes 1 May 2013 (at 1700 hrs) Precision](https://reader034.vdocuments.us/reader034/viewer/2022042020/5e77aa48dad058766400e8e4/html5/thumbnails/141.jpg)
Network and question