1 / 24

NSF Opportunities Relevant to the Multi-Disciplinary Worlds of Security and Intelligence

NSF Opportunities Relevant to the Multi-Disciplinary Worlds of Security and Intelligence. Thomas F. Russell NSF Office of Integrative Activities Oak Ridge Associated Universities Council of Sponsoring Institutions Annual Meeting Oak Ridge, TN March 9, 2011. NSF Statutory Mission.

dermot
Télécharger la présentation

NSF Opportunities Relevant to the Multi-Disciplinary Worlds of Security and Intelligence

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NSF Opportunities Relevant to the Multi-Disciplinary Worlds of Security and Intelligence Thomas F. Russell NSF Office of Integrative Activities Oak Ridge Associated Universities Council of Sponsoring Institutions Annual Meeting Oak Ridge, TN March 9, 2011

  2. NSF Statutory Mission From the NSF Act of 1950, as amended: “To promote the progress of science; to advance the national health, prosperity, and welfare; and to secure the national defense”

  3. Recommendation byPresident’s Council of Advisors onScience and Technology (PCAST) FromDesigning a Digital Future: Federally Funded Research and Development in Networking and Information Technology(NITRD Report, Dec. 2010, page xii): “The Federal Government should invest in a national, long-term, multi-agency research initiative on NIT that assures both the security and the robustness of cyber-infrastructure. NSF and DoD, in collaboration with the Department of Homeland Security (DHS), should aggressively accelerate funding and coordination of fundamental research • to discover more effective ways to build trustworthy computing and communications systems, • to continue to develop new NIT defense mechanisms for today’s infrastructure, and most importantly, • to develop fundamentally new approaches for the design of the underlying architecture of our cyber-infrastructure so that it can be made truly resilient to cyber-attack, natural disaster, and inadvertent failure.”

  4. NSF Response (in part) • Cyberinfrastructure Framework for 21st Century Science and Engineering (CIF21) • Announced in FY 2012 budget request, http://www.nsf.gov/about/budget/fy2012/pdf/40_fy2012.pdf(5-page description) • Data-Enabled Science, $50 million • Community Research Networks, $9M • New Computational Infrastructure, $43M • Access and Connections to Cyberinfrastructure Facilities, $15M

  5. Basic NSF Organization Disciplinary Directorates Divisions Programs Director & Deputy Director National Science Board Offices Social, Behavioral & Economic Sciences Computer & Information Sci & Eng Mathematical & Physical Sciences Biological Sciences Geo- Sciences Engineering (BIO) (ENG) (CISE) (GEO) (MPS) (SBE) Office of Cyber-infrastructure (OCI) Office of Polar Programs (OPP) Office of Budget, Finance & Award Management Office of International Sci & Eng (OISE) Office of Information & Resource Management Office of Integrative Activities (OIA) EPSCoR Education & Human Resources (EHR)

  6. Outline • Why NSF? • Find Funding for Crosscutting Programs • Programs (past, present, future) • Cyberinfrastructure Framework for 21st Century Science and Engineering (CIF21, future) • Trustworthy Computing (TC) • Cyber Trust (CT, archived) • Domestic Nuclear Detection Office – NSF Academic Research Initiative (ARI) • Explosives and Related Threats: Frontiers in Prediction and Detection (EXP) • Approaches to Combat Terrorism (ACT, archived) • Algorithms for Threat Detection (ATD) • Foundations of Data and Visual Analytics (FODAVA, archived)

  7. Find Funding for Crosscutting Programs Go to http://www.nsf.gov/funding/pgm_list.jsp?type=xcut

  8. Trustworthy Computing • Trustworthy Computing is a cross-cutting program in CISE, involving all three CISE Divisions. It is the primary focus for cybersecurity research funding at NSF and covers a broad scope of activities in security and privacy research. • TrustWORTHY Computing means: • There is a justifiable basis for placing trust in the computer/system • Trust/Trustworthiness is relative to some particular system property or set of actions to be performed • To merit trust, computer/system must not only be reliable, available, maintainable, safe, … but also secure – able to maintain specified operation even in the face of malicious acts • System includes people: trustworthy systems must incorporate the human factor in design and operation • Deadlines in Fall each year; FY11 – up to 60 awards, up to$70 million • Program Officers • Carl Landwehr, CNS • Xiaoyang (Sean) Wang, IIS • Sol Greenspan, CCF • Sam Weber, CNS • Administrative Staff • Richard Sheehey • Le’ Sha Dunn • Iesha McGee

  9. Some Fundamental Research Questions in Trustworthy Computing • How do you express the system properties that you want to trust? • System specification, from the technical side but also the human side • What do “privacy” and “security” mean, abstractly and in real systems? • How can we represent information flow and authorization controls? • How do you build a system with the desired properties? • How do you assure yourself that the system as built has those properties? • Verification and testing, but also empirical study of how users interact with systems • How do you establish the provenance / trustworthiness of data? • How do you detect/defeat malicious behavior from design through operation? • How do you provide incentives/reduce disincentives for people to adopt trustworthy systems? For people to behave responsibly? • How do you measure results?

  10. Academic Research Initiative (ARI) • Interagency partner: Domestic Nuclear Detection Office (DHS/DNDO) • Enable the nation's ability to prevent and respond to nuclear or radiological threats • Cross-cutting multidisciplinary approaches to: • Enhancement of the Global Nuclear Detection Architecture (GNDA) to improve the detection and interdiction of nuclear or radiological threat materials or devices • Response and recovery from nuclear or radiological events at the local, state and Federal level, including nuclear forensics • Awards: 7-8 starts / yr; 1st year NSF; later years DNDO • Spending: FY11-FY15 – $58 million

  11. Explosives and Related Threats: Frontiers in Prediction and Detection (EXP) • In coordination with efforts of DOE, DOD, DHS, others • Fundamental knowledge in: • New technologies for sensors and sensor networks • Use of sensor data in control and decision making • Prediction: mathematical, behavioral, cognitive modeling; AI, pattern recognition, information management • Detection: sensor technologies, signal processing, data fusion, autonomous system technologies • Proposals / awards: FY07 – 189 / 47 • Spending: FY07 – $20 million

  12. Approaches to Combat Terrorism (ACT) • Subtitle: Opportunities in Basic Research in the Mathematical and Physical Sciences with the Potential to Contribute to National Security • Partners: MPS, Intelligence Community; following on NSF / IC joint workshop in November 2002 • NSF mission: “to promote the progress of science; to advance the national health, prosperity, and welfare; and to secure the national defense” • Small Grants for Exploratory Research (SGER, since replaced by EAGER), maximum award $200,000 • Proposals / awards: FY04 – 235 / 23; FY03 – 175 / 28 • Spending: total about $3.5 million each year

  13. Algorithms for Threat Detection (ATD) • Interagency partner: Defense Threat Reduction Agency (DOD/DTRA) • Develop the next generation of mathematical and statistical algorithms for the detection of chemical and biological threats • Mathematical/statistical algorithm development for: • Analysis of data from sensor systems • Genomics • Proposals / awards: FY09 – 33 / 10; FY10 – 42 / 12 • Spending: FY09 FY10 FY11 FY12 $4 million $6M $8M $10M

  14. Foundations of Data and Visual Analytics (FODAVA) • Partners: CISE/CCF, CISE/IIS, MPS/DMS, DHS • Science of analytical reasoning facilitated by interactive visual interfaces • Knowledge from massive data sets: mathematical sciences, computer science, management and discovery technologies, cognitive sciences, decision sciences • Dimension reduction, metric embedding, geospatial modeling, statistics, data mining, machine learning • Proposals / awards: FY08 – 28 / 8; FY09 – 49 / 8; FY10 – 15 / 3 • Spending: total about $6 million

  15. For More Information CIF21 (future) http://www.nsf.gov/about/budget/fy2012/pdf/40_fy2012.pdf TC http://nsf.gov/funding/pgm_summ.jsp?pims_id=503326 CT (archived) http://nsf.gov/funding/pgm_summ.jsp?pims_id=6191 ARI http://nsf.gov/funding/pgm_summ.jsp?pims_id=503223 EXP http://nsf.gov/funding/pgm_summ.jsp?pims_id=500085 ACT (archived) http://nsf.gov/funding/pgm_summ.jsp?pims_id=5702

  16. For More Information ATD http://nsf.gov/funding/pgm_summ.jsp?pims_id=503427 FODAVA (archived) http://nsf.gov/funding/pgm_summ.jsp?pims_id=501081

  17. For More Information Ask Often! Ask Early, http://www.nsf.gov/staff http://www.nsf.gov/staff/orglist.jsp

More Related