[ISN] CFP - Information and Cyber Operations Working Group MORS Symposium

From: InfoSec News <alerts_at_private>
Date: Thu, 7 Jan 2010 02:38:33 -0600 (CST)
Forewarded from	McMullin, James D Mr CIV USA OSA <james.mcmullin (at) us.army.mil>

The call for papers for the 78th Military Operations Research (MORS) 
symposium has gone out. The submission deadline for this year is 26 
January 2010; this can be done online at:
 
http://www.mors.org/events/78thsym.aspx 

The symposium is scheduled for 22-24 June 2010 at Marine Base Quantico, 
Virginia.

MORS Symposia are classified (up to SECRET//NOFORN), normally three days 
in duration, and represent all military services (uniformed and 
civilian), government agencies, contractors and academic institutions. 
The meeting typically includes concurrent special and working group 
sessions and tutorials. Special sessions consist of formally prepared 
papers or panels centered on a theme approved by the Board of Directors. 
Thirty-three working groups are provided for informal discussion and 
debate on specific issues, methods and applications of operations 
research. Tutorials expose participants to new concepts, methods and 
techniques in operations research.

Please consider submitting a paper to Working Group 8 (Information and 
Cyber Operations).

WG 8 - Information and Cyber Operations
Chair:
Mr. Jim McMullin, USA CAA, 703-806-5384, james.mcmullin (at) us.army.mil
Co-Chairs:
Dr. Michael Atamian, Metron, Inc. 858-792-8904, atamian (at) ca.metsci.com
Ms. Erika Banks, STRATCOM (BAH), 402-232-0299, banksens(at) stratcom.mil
Mr. John Brand, ARL, 410-278-4454, jbrand (at) arl.army.mil
Ms. Christie Hochstein, 443-479-9916, cmhochs (at) nsa.gov
Mr. Tuyen V. Tran, NGC, 410-993-2943, tuyen.tran (at) ngc.com

Information and Cyber Operations is a very broad field, requiring a wide 
range of disciplines to support its analytical, operational, planning, 
testing, training, and experimentation applications. From social network 
analysis to digital signal processing, from individual bits to 
transnational populations, information and cyber operations require an 
interdisciplinary approach to both define and solve its tough problems. 
Of crucial importance is the ability to demonstrate the impact of 
information and cyber operations capabilities during peace, crisis, war, 
or operations other than war. The Working Group (WG) seeks to showcase 
analyses and associated papers that provide insight into these important 
areas, regardless of the technique or capability used. We seek analyses 
demonstrating the impact of information and cyber operations and 
information strategies upon adversary, friendly, and neutral 
organizations. Results of actual analyses and exercises represent the 
WG.s primary focus, but actionable decision support techniques applied 
to information and cyber operations are also welcome. The WG will use as 
one starting point the Department of Defense (DoD) definition of 
Information Operations (IO) as defined by DoD Directive O-3600.01 
(August 14, 2006): "Information Operations (IO)." The integrated 
employment of the core capabilities of Electronic Warfare (EW), Computer 
Network Operations (CNO), Psychological Operations (PSYOP), Military 
Deception (MILDEC), and Operations Security (OPSEC), in concert with 
specified supporting and related capabilities, to influence, disrupt, 
corrupt, or usurp adversarial human and automated decision making while 
protecting our own." 

The WG also recognizes that information and cyber operations efforts 
must also be globally integrated with actions taken by other instruments 
of national power, and as such must also consider Interagency, 
non-governmental, and Coalition partners, as well as potential opponent 
and neutrals across the full spectrum of conflict. Moreover, the heavy 
reliance upon information technologies and ensuing global integration 
has increased the importance of information and information superiority 
to the point that information technologies and information are becoming 
a critical objective for future conflicts. The WG encourages submission 
of presentations relevant to the information and cyber operations areas 
outlined below. The submission may be finished work, work in progress, 
or ideas and concepts.

* Activities and analyses that demonstrate the integration of 
  capabilities at the strategic, operational, and tactical levels of war 
  to produce effective US Government (USG) responses

* Real-world applications of IO tools or techniques

* Multidisciplinary approaches to defining and solving information and 
  cyber operations problems

* Analyses of network operations that demonstrate the impact of 
  information attack, defense, exploitation and assurance as well as on 
  attack detection, and/or restoration across the spectrum of conflict

* Studies using tools applied to any of the core competencies described 
  above

* Studies that examine the effects of attack, defense, and influence 
  operations on friendly, adversarial, and/or neutral organizations

* Studies that provide insight into the use of offensive, defensive, and 
  local and global influence information strategies during conflict and 
  stability operations, and their resulting successes and failures

* Studies that deal with the interaction of information and cyber 
  operations in dealing with the terrorist threat

* Symposia, games, experiments or acquisition testing that involved 
  information and cyber operations, emphasizing the vulnerabilities of 
  information-dependent organizations

* Analyses of historical examples of successful and unsuccessful 
  information and cyber operations.

Papers that describe development of information and cyber operations 
analysis tools, techniques, measures of effectiveness, damage indicators 
and damage assessment methods - or the refinement of existing ones - are 
welcome. We look forward to hearing from you!

Procedures for Submitting Presentation Abstracts

1. Presentation Abstract Submissions - Abstracts for presentations 
   offered to working groups should be of interest to a specific working 
   group. Abstracts for presentations offered to composite groups should 
   be broad and comprehensive and should be of interest to each of the 
   working groups assigned to the composite group.

2. Abstracts . All abstracts should be submitted through the new MORS 
   "Call for Presentations" site at: 
   https://78morss.wingateweb.com/portal/cfp/login.ww. Once you are on 
   the site please follow the instructions provided. Be sure to complete 
   as many of the spaces as possible, and include your email address. 
   This will ensure that you receive a confirmation of your submission. 
   The deadline to submit abstracts for consideration at the 78th MORSS 
   is 26 January 2010.

3. Abstracts Disclosure Form 109 A/B - If you would like your 
   unclassified, approved for public release, distribution unlimited 
   abstract to be included on the 78th MORSS Call for Presentations 
   on-line website, a MORS Form 109 A/B (pages x & x) must be completed. 
   The abstract MUST be Unclassified and Approved for Public Release; 
   Distribution Unlimited. (If obtaining a signature to clear your 
   unclassified abstract is a long process, you may submit your 
   unclassified abstract for consideration without the releasing 
   official.s signature and follow up with a signed copy before the 2 
   April 2010 deadline.) If you do not want your abstract included on 
   the 78th MORSS Abstracts on-line website you do not have to complete 
   form 109A/B. 8

4. Notification - If you are not notified of acceptance or rejection of 
   abstracts offered for presentation at the 78th MORSS by 5 March 2010 
   please call the WG Chair(s) or Session Chairs directly.


Guidelines for Presenting a MORSS Paper

Some people equate presenting a paper at MORSS to writing a thesis - 
this is not true. To present at the Symposium, a presenter simply needs 
the approved abstract and briefing slides. However, if the presentation 
is deemed notable, you may be invited to compete for the Barchi Prize, 
at which time a written paper will be required. 

Another common misperception is that the research presented at the 
Symposium must be complete or a conclusion reached - this also is not 
true. Discussion of work in progress is an important part of the MORS 
working groups! This is a good opportunity to receive feedback from your 
peers on how your analysis is perceived and how it may be improved.


________________________________________ 
Did a friend send you this? From now on, be the 
first to find out! Subscribe to InfoSec News 
http://www.infosecnews.org
Received on Thu Jan 07 2010 - 00:38:33 PST

This archive was generated by hypermail 2.2.0 : Thu Jan 07 2010 - 01:06:44 PST