Forewarded from McMullin, James D Mr CIV USA OSA <james.mcmullin (at) us.army.mil> The call for papers for the 78th Military Operations Research (MORS) symposium has gone out. The submission deadline for this year is 26 January 2010; this can be done online at: http://www.mors.org/events/78thsym.aspx The symposium is scheduled for 22-24 June 2010 at Marine Base Quantico, Virginia. MORS Symposia are classified (up to SECRET//NOFORN), normally three days in duration, and represent all military services (uniformed and civilian), government agencies, contractors and academic institutions. The meeting typically includes concurrent special and working group sessions and tutorials. Special sessions consist of formally prepared papers or panels centered on a theme approved by the Board of Directors. Thirty-three working groups are provided for informal discussion and debate on specific issues, methods and applications of operations research. Tutorials expose participants to new concepts, methods and techniques in operations research. Please consider submitting a paper to Working Group 8 (Information and Cyber Operations). WG 8 - Information and Cyber Operations Chair: Mr. Jim McMullin, USA CAA, 703-806-5384, james.mcmullin (at) us.army.mil Co-Chairs: Dr. Michael Atamian, Metron, Inc. 858-792-8904, atamian (at) ca.metsci.com Ms. Erika Banks, STRATCOM (BAH), 402-232-0299, banksens(at) stratcom.mil Mr. John Brand, ARL, 410-278-4454, jbrand (at) arl.army.mil Ms. Christie Hochstein, 443-479-9916, cmhochs (at) nsa.gov Mr. Tuyen V. Tran, NGC, 410-993-2943, tuyen.tran (at) ngc.com Information and Cyber Operations is a very broad field, requiring a wide range of disciplines to support its analytical, operational, planning, testing, training, and experimentation applications. From social network analysis to digital signal processing, from individual bits to transnational populations, information and cyber operations require an interdisciplinary approach to both define and solve its tough problems. Of crucial importance is the ability to demonstrate the impact of information and cyber operations capabilities during peace, crisis, war, or operations other than war. The Working Group (WG) seeks to showcase analyses and associated papers that provide insight into these important areas, regardless of the technique or capability used. We seek analyses demonstrating the impact of information and cyber operations and information strategies upon adversary, friendly, and neutral organizations. Results of actual analyses and exercises represent the WG.s primary focus, but actionable decision support techniques applied to information and cyber operations are also welcome. The WG will use as one starting point the Department of Defense (DoD) definition of Information Operations (IO) as defined by DoD Directive O-3600.01 (August 14, 2006): "Information Operations (IO)." The integrated employment of the core capabilities of Electronic Warfare (EW), Computer Network Operations (CNO), Psychological Operations (PSYOP), Military Deception (MILDEC), and Operations Security (OPSEC), in concert with specified supporting and related capabilities, to influence, disrupt, corrupt, or usurp adversarial human and automated decision making while protecting our own." The WG also recognizes that information and cyber operations efforts must also be globally integrated with actions taken by other instruments of national power, and as such must also consider Interagency, non-governmental, and Coalition partners, as well as potential opponent and neutrals across the full spectrum of conflict. Moreover, the heavy reliance upon information technologies and ensuing global integration has increased the importance of information and information superiority to the point that information technologies and information are becoming a critical objective for future conflicts. The WG encourages submission of presentations relevant to the information and cyber operations areas outlined below. The submission may be finished work, work in progress, or ideas and concepts. * Activities and analyses that demonstrate the integration of capabilities at the strategic, operational, and tactical levels of war to produce effective US Government (USG) responses * Real-world applications of IO tools or techniques * Multidisciplinary approaches to defining and solving information and cyber operations problems * Analyses of network operations that demonstrate the impact of information attack, defense, exploitation and assurance as well as on attack detection, and/or restoration across the spectrum of conflict * Studies using tools applied to any of the core competencies described above * Studies that examine the effects of attack, defense, and influence operations on friendly, adversarial, and/or neutral organizations * Studies that provide insight into the use of offensive, defensive, and local and global influence information strategies during conflict and stability operations, and their resulting successes and failures * Studies that deal with the interaction of information and cyber operations in dealing with the terrorist threat * Symposia, games, experiments or acquisition testing that involved information and cyber operations, emphasizing the vulnerabilities of information-dependent organizations * Analyses of historical examples of successful and unsuccessful information and cyber operations. Papers that describe development of information and cyber operations analysis tools, techniques, measures of effectiveness, damage indicators and damage assessment methods - or the refinement of existing ones - are welcome. We look forward to hearing from you! Procedures for Submitting Presentation Abstracts 1. Presentation Abstract Submissions - Abstracts for presentations offered to working groups should be of interest to a specific working group. Abstracts for presentations offered to composite groups should be broad and comprehensive and should be of interest to each of the working groups assigned to the composite group. 2. Abstracts . All abstracts should be submitted through the new MORS "Call for Presentations" site at: https://78morss.wingateweb.com/portal/cfp/login.ww. Once you are on the site please follow the instructions provided. Be sure to complete as many of the spaces as possible, and include your email address. This will ensure that you receive a confirmation of your submission. The deadline to submit abstracts for consideration at the 78th MORSS is 26 January 2010. 3. Abstracts Disclosure Form 109 A/B - If you would like your unclassified, approved for public release, distribution unlimited abstract to be included on the 78th MORSS Call for Presentations on-line website, a MORS Form 109 A/B (pages x & x) must be completed. The abstract MUST be Unclassified and Approved for Public Release; Distribution Unlimited. (If obtaining a signature to clear your unclassified abstract is a long process, you may submit your unclassified abstract for consideration without the releasing official.s signature and follow up with a signed copy before the 2 April 2010 deadline.) If you do not want your abstract included on the 78th MORSS Abstracts on-line website you do not have to complete form 109A/B. 8 4. Notification - If you are not notified of acceptance or rejection of abstracts offered for presentation at the 78th MORSS by 5 March 2010 please call the WG Chair(s) or Session Chairs directly. Guidelines for Presenting a MORSS Paper Some people equate presenting a paper at MORSS to writing a thesis - this is not true. To present at the Symposium, a presenter simply needs the approved abstract and briefing slides. However, if the presentation is deemed notable, you may be invited to compete for the Barchi Prize, at which time a written paper will be required. Another common misperception is that the research presented at the Symposium must be complete or a conclusion reached - this also is not true. Discussion of work in progress is an important part of the MORS working groups! This is a good opportunity to receive feedback from your peers on how your analysis is perceived and how it may be improved. ________________________________________ Did a friend send you this? From now on, be the first to find out! Subscribe to InfoSec News http://www.infosecnews.orgReceived on Thu Jan 07 2010 - 00:38:33 PST
This archive was generated by hypermail 2.2.0 : Thu Jan 07 2010 - 01:06:44 PST