Report of the Defense Science Board Task Force on Defense Biometrics

Report of the Defense Science Board Task Force on Defense Biometrics
Author: United States. Defense Science Board. Task Force on Defense Biometrics
Publisher:
Total Pages: 168
Release: 2007
Genre: Biometric identification
ISBN:

A Defense Science Board Task Force was organized to address a number of issues relating to the use of Biometrics in the Department of Defense. The Terms of Reference (Appendix A) asked that specific organizational issues be addressed promptly and the Task Force provided an interim briefing that focused on these issues. While the terms of reference refer to "biometrics," the Task Force is convinced that identity management is the more inclusive and the more useful construct. The Task Force holds two companion theses. First, while we can come up with an endless set of scenarios in which biometrics might be called upon to play a role, with analysis and a little abstraction without losing the essence, the endless array of scenarios can be reduced to a compact set of "use cases". This compact set of use cases will help us appreciate our companion thesis, that a common "back office" process (and associated "data model") can be envisioned to service all the biometric, and thus Identity Management, use cases. That said, we clearly did not have either the time or the resources to study Identity Management (IM) conclusively, especially in terms of the broadened set of organizational associations, use cases and Defense applications, and even social issues, attendant to that sprawling field.

Report of the Defense Science Board Task Force on Defense Biometrics

Report of the Defense Science Board Task Force on Defense Biometrics
Author:
Publisher:
Total Pages: 179
Release: 2007
Genre:
ISBN:

A Defense Science Board Task Force was organized to address a number of issues relating to the use of Biometrics in the Department of Defense. The Terms of Reference (Appendix A) asked that specific organizational issues be addressed promptly and the Task Force provided an interim briefing that focused on these issues. While the terms of reference refer to "biometrics," the Task Force is convinced that identity management is the more inclusive and the more useful construct. The Task Force holds two companion theses. First, while we can come up with an endless set of scenarios in which biometrics might be called upon to play a role, with analysis and a little abstraction without losing the essence, the endless array of scenarios can be reduced to a compact set of "use cases". This compact set of use cases will help us appreciate our companion thesis, that a common "back office" process (and associated "data model") can be envisioned to service all the biometric, and thus Identity Management, use cases. That said, we clearly did not have either the time or the resources to study Identity Management (IM) conclusively, especially in terms of the broadened set of organizational associations, use cases and Defense applications, and even social issues, attendant to that sprawling field.

Operations Research Applications for Intelligence, Surveillance and Reconnaissance

Operations Research Applications for Intelligence, Surveillance and Reconnaissance
Author:
Publisher: DIANE Publishing
Total Pages: 63
Release: 2009-11
Genre: Technology & Engineering
ISBN: 1437917208

The Defense Science Board (DSB) Advisory Group was asked to examine the use of operations research (OR) methods to support Intelligence, Surveillance and Reconnaissance (ISR) decision making within the DoD. The DSB was asked to survey the departments and agencies to determine how much OR is being performed; assess how the results of OR are being used in decision making; recommend a test cases(s) for using OR methodologies; and recommend steps DoD can take to institutionalize the use of OR in future DoD decision making. Illustrations.

Report of the Defense Science Board. Task Force on Combat Identification

Report of the Defense Science Board. Task Force on Combat Identification
Author:
Publisher:
Total Pages: 69
Release: 1996
Genre:
ISBN:

The Defense Science Board Task Force was formed to review the current state of combat Identification as well as to act as Senior Advisors to the DoD Combat ID Study. Although we looked at the individual developments now underway and under consideration, we spent most of our effort on trying to gain a broad understanding of the nature of combat ID in order to reach conclusions about what should be done. Our basic conclusion is that there is no crisis in combat ID calling for extraordinary action. Fratricide is a serious long term problem which can never be entirely prevented but which must be reduced to a practical minimum in any given situation. There is a tradeoff between the need to attack a dangerous enemy and the need to avoid attacking friends and neutrals. The real need is to minimize casualties while attaining military objectives, and minimum casualties is usually not the same as minimum fratricide. This familiar problem is now receiving increased attention, however, due to changes in the nature of expected conflicts, including highly mobile joint service operations, limited conflicts with reduced tolerance for both military and civilian casualties, and long-range highly lethal weapons. Combat ID does not result from a single device or process but results from the combination of many sources. Knowledge about the location and activities of friendly and enemy forces (situational awareness) comes from plans, reports, surveillance (often enhanced by distinctive uniforms and insignia) and necessarily includes identification. New technology for surveillance, processing, navigation, and networking is greatly increasing our ability to create and distribute accurate, timely situational information smoothing out the difference between situational awareness and combat ID.

Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on Dod Software

Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on Dod Software
Author: Office of Office of the Under Secretary of Defense
Publisher: Createspace Independent Publishing Platform
Total Pages: 114
Release: 2016-07-18
Genre:
ISBN: 9781535338110

Software has become the central ingredient of the information age, increasing productivity, facilitating the storage and transfer of information, and enabling functionality in almost every realm of human endeavor. However, as it improves the Department of Defense's (DoD) capability, it increases DoDs dependency. Each year the Department of Defense depends more on software for its administration and for the planning and execution of its missions. This growing dependency is a source of weakness exacerbated by the mounting size, complexity and interconnectedness of its software programs. It is only a matter of time before an adversary exploits this weakness at a critical moment in history. The software industry has become increasingly and irrevocably global. Much of the code is now written outside the United States (U.S.), some in countries that may have interests inimical to those of the United States. The combination of DoDs profound and growing dependence upon software and the expanding opportunity for adversaries to introduce malicious code into this software has led to a growing risk to the Nation's defense. A previous report of the Defense Science Board, "High Performance Microchip Supply," discussed a parallel evolution of the microchip industry and its potential impact on U.S. defense capabilities. The parallel is not exact because the microchip fabrication business requires increasingly large capital formation - a considerable barrier to entry by a lesser nation-state. Software development and production, by contrast, has a low investment threshold. It requires only talented people, who increasingly are found outside the United States. The task force on microchip supply identified two areas of risk in the off-shoring of fabrication facilities - that the U.S. could be denied access to the supply of chips and that there could be malicious modifications in these chips. Because software is so easily reproduced, the former risk is small. The latter risk of "malware," however, is serious. It is this risk that is discussed at length in this report.