Visit the UNSW website Visit the Department of Defence website Visit the IEEE website Visit the (ISC)2 website



Conference Handbook



Program: Day 1—Tuesday 6 November 2012

Program: Day 2—Wednesday 7 November 2012

Program: Day 3—Thursday 8 November 2012

Session Abstracts: Day 1—6 November 2012

Session Abstracts: Day 2—7 November 2012

Session Abstracts: Day 3—8 November 2012


Day 1—Tuesday 6 November 2012


Session 1.1 Breakfast Session: Exhibition open and coffee available



Session 1.2 Plenary Session: Opening Session

   Welcome: Professor Michael Frater, Rector UNSW@ADFA and Mr Greg Farr, Chief Information Officer, CIOG

   Keynote Address: Mr Greg Farr, Chief Information Officer, CIOG

   Keynote Address: Mr Matt Yannopoulos, Chief Technology Officer, CIOG


Morning Tea


Session 1.3 Plenary Session: Coalition J6 Session

   Keynote Address: Major General Mike Milford, HICTO

   Keynote Address: Communications Information Systems and Information Management: Observations from Afghanistan, Colonel Chris Robinson




Session 1.4a

Update:  Empowering Mission Critical Systems Through Logistics Transformation: A Defense Logistics Agency Case Study

(Vice Admiral (retired) Keith Lippert, Chief Strategy Officer, Accenture National Security Services)


Session 1.5a  TDL STREAM

Update: Tactical information Exchange Domain Capability Mangement (Commander Michael Reis, CIOG, Mr Graham King, VCDF)

Panel: Tactical Information Exchange Domain Gaps, Needs and Requirements

Session 1.6a

Update:  Now We Are One!

(Mr James Thom, BAE Systems & Mr Eric Kordt, EAB, CIOG)

Session 1.7a     IEEE STREAM

Paper 1: Optimization of Compact SATCOM Terminals

Paper 2: On the Use of Multi-User Detection in Supporting Narrowband Waveforms on Wideband Satcom

Session 1.8a      Undersea Networks

Paper 1: A Tipping Point for Undersea Networks (IEEE Stream)

Paper 2: Effective Undersea Communications: A Critical Enabler for Future Undersea Warfare Concepts

Session 1.9a

Product Brief: Big Data Technology In Defence Applications—Leveraging through Graphical Analytics

(Mr Leon Guzenda, Objectivity)





Afternoon Tea (including watching the running of the Melbourne Cup in the Royal Theatre)


Session 1.4b

Product Brief:   Small Steps towards the Challenge of Big Data in Defence

(Mr Tim Paydos, Director, IBM Threat Prediction and Prevention)


Session 1.5b  TDL STREAM

Update:  Tactical Information Exchange Domain Acquisition and Engineering Services (Mr Mike Kenderes, Mr Dennis Healy, DMO)

Panel: Tactical Information Exchange Domain Acquisition and Engineering Services

Session 1.6b

Update:  CIS as a Capability

(SQNLDR Adam Pearsall, ICT Operations Division, CIOG)

Session 1.7b      IEEE STREAM

Paper 1: Downlink Interference Analysis in DS-CDMA for Unequal Power Requirements: The Dirty User Problem

Paper 2: Hardware Realization of UMTS Femtocell Modem with Uplink Interference Cancellation

Session 1.8b      Undersea Networks

Paper 1: Providing Undersea Communications to the Warfighter

Paper 2: The Problem of Multi-User Access in Undersea Networks (IEEE Stream)

Paper 3: Routing Challenges and Solutions for Underwater Networks (IEEE Stream)

Session 1.9c




Tutorial: Introduction to Satellite Communications

(Mr Greg Pope & Dr John Kot, BAE Systems Australia)


Session 1.4c

Update: Securing Defence Information

(Mr Daniel Lai, BSTTech & Mr Iain Johnstone, EAB, CIOG)

Session 1.5c   TDL STREAM

Update:  TIED In-service Support and Sustainment (Mr Mike Kenderes, Mr Dennis Healy, DMO)

Panel: TIED In-service Support and Sustainment


Paper 1: Cloud For Defence Applications: Benefits, Concerns, and Way Forward

Paper 2: Reducing the Footprint of Deployed Information Systems with Cross Domain Solutions

Session 1.7c      IEEE STREAM

Paper 1: Cognitive Radio Technologies: Envisioning the Realization of Network-centric Warfare


Session 1.8c     Undersea Networks

Panel Session: Mating Problems to Solutions


to 6:30pm

Welcome Networking Drinks

Exhibition runs from 7:30am to 6:30pm (open to free exhibition-only registration from 1:30pm to 4:30pm)

TDL Stream supported by TIE IO and the IDLS Society    /     IEEE Stream (Refereed papers) co-sponsored by IEEE



Day 2—Wednesday 7 November 2012


Session 2.1 Breakfast Session—Exhibition open and coffee available

Product Brief: Solutions for Satellite Voice, Data and Tracking Communications Everywhere, Pivotel Satellite Pty Ltd

The Product Brief will be presented in the Ballroom—a light breakfast will be served for attendees


Session 2.2a Plenary Session: CTO Session

   Keynote Address:   Modernising Our Infrastructure: The Journey So Far, Mr Daniel McCabe, Assistant Secretary Infrastructure Architecture, CIOG

   Keynote Address:   Our Service Oriented Architecture Journey and Progress, Mr Christopher Rodrigues-Macias, Assistant Secretary Enterprise Architecture,  CIOG


Session 2.2b Plenary Session: Network Centric Warfare and Information Security, Mr Joe Franzi, Assistant Secretary Information Security Operations, Defence Signals Directorate


Morning Tea


Session 2.3 Plenary Session: Capability Developments

   Keynote Address: AVM Neil Hart, JCC

   Keynote Address: BRIG Mal Rerden, Director General Integrated Capability Development, CDG




Session 2.4a

Update: When There Is No Room For Error: Using Advanced Analytics In Supply Chain Management

(Mr Steven Pantier, Asia-Pacific Defence Business Services Lead, Accenture)

Session 2.5a      TDL STREAM

Tutorial: Introduction to the Australian Tactical Information Exchange Domain (TIED)

(FLTLT Carl Jongsma, TDL Instructor Training Cell ADFTA)

Session 2.6a

Tutorial: Protecting SATCOMS

(Dr Rob Rideout, RT Logic Inc.)

Session 2.7a




Tutorial:  A Common Service-oriented Infrastructure Approach for Defence Tactical Environments

(Mr Derek Dominish, DSTO)

Session 2.8a

Update: The Cloud on a Sunny Day

(Mr C.J. Wallington, HP)


Session 2.9a




Tutorial: Testing Wideband Digital Radio Systems

(Mr Stan Pierson, Aeroflex Wichita)


Session 2.4b

Update: Mission Management Systems in Army Aviation

(MAJ Neil Squires & CAPT Gareth Pihl, Aviation Branch, HQ Forces Command)

Session 2.5b      TDL STREAM

Tutorial:  TIEIO Link 22 Trial

(Mr James Meredith, Head Emerging Technology Cell ADFTA & Mr Bob McGinnis, DRS-Defence Systems)

Session 2.6b

Update:  End-to-End Situational Awareness of Hybrid Satcom/Terrestrial Networks

(Mr Stuart Daughtridge, Kratos Integral Systems)

Session 2.8b

Tutorial:  Co-site communications interference

(Mr Ken Kenjale, Pole/Zero Corp)


Afternoon Tea

4.00pm to 5:00pm

Session 2.4c

Product Brief:   Deploying Next Generation Desktop Solutions to Solve Information Sharing Challenges

(Mr Chris Sortzi, Vice President of Sales, Raytheon Trusted Computer Solutions (RTCS) & Mr Paul Feighan, General Manager – Sales and Strategy Development, National Security & C4I, Thales Australia)

Session 2.5c      TDL STREAM

Tutorial:  Integrating Frequency Hopping Services (Link 22 UHF EPM) into the RF Layout of Naval Radio Communication Systems

(Mr Radek Novak, Regional Sales Manager, Naval Communication Systems, Rohde & Schwarz Germany

Session 2.6c

Update: Netcentric Satcom Management for Tomorrow’s Satcom Operations

(Mr Brian Van Luipen & Mr Thomas de Menthiere, Astrium)

Session 2.7c

Update:  Self Organising Networks

(Mr Matt Carling, Cisco Systems Australia)

Session 2.8c

Product Brief: WGS has Friends – The Complementary Commercial Satcom Systems Coming Online in 2013

(Mr Todd McDonell, TC Communications & Mr Peter Hadinger, Inmarsat GX)


Session 2.9c

Product Brief: Hughes Advanced Airborne SATCOM Solutions

(Mr Dan Losada, Senior Director, Defense and Intelligence Systems Division & Mr Tony Sewell, Senior Program Manager, Defense and Intelligence Systems Division, Hughes)


Conference Dinner  (7:00pm for 7:30pm)

Exhibition runs from 7:30am to 5:00pm (open to free exhibition-only registration from 1:30pm to 5:00pm)



Day 3—Thursday 8 November 2012


Session 3.1 Breakfast Session—Exhibition open and coffee available



Session 3.2 Plenary Session: Navy, Army, Air Force CIS Interoperability

  Moderator: GPCAPT Darren May, Director Military Engagement (DME)

  Keynote Address: CMDR Jeff Milward, Director Project Mercury

  Keynote Address: COL Shaun Love, Director Network Enabled Warfare, Army

  Keynote Address: GPCAPT John Heinrich, Director Intelligence Surveillance and Reconnaissance, Air Force


Morning Tea


Session 3.3a Plenary Session: Staying Ahead – The Network Way

  Keynote Address: Mr Michael Lawrey, Executive Director, Defence Engagement, Telstra Corporation


Session 3.3b Plenary Session: Cyber Security

  Keynote Address: Air Commodore Graham Wright (Retd), Director of Strategy for Intelligence Systems and Cyber Security, Northrop Grumman




Session 3.4a



Tutorial:  Cognitive Radios and Spectrum Sensing Techniques

(Dr Kandeepan Sithamparanathan RMIT University / NICTA)


Session 3.5a      TDL STREAM

Tutorial:  Tactical Information Exchange Domain (TIED) Interoperability Planning and Sustainment

(Mr Kym Fisher, Head Interoperability Cell, ADFTA)

Session 3.6a

Product Brief:  Driving down Size, Weight and Power in the Tactical Networking and Satcoms Space

(Mr Phil Sayers & Mr Simon Ascott, Vocality)

Session 3.7a

Product Brief:  SharePoint 2010 Collaboration in Low Bandwidth Environments

(Mr James Milne, CTO and Founder, Myriad Technologies)

Session 3.8a

Tutorial: Cyber Security Course for Senior Decision Makers - “Why should I care about Cyber Security?”

(Mr Ray Kinard, Director of the Northrop Grumman Cyber Academy)

Session 3.9a







Tutorial:  Multiple-Input Multiple-Output (MIMO) Radar: From Distributed to Co-located Antennas

(Dr Mark Reed, UNSW Canberra)


Session 3.5b      TDL STREAM

Update:  Information Interoperability

(Mr Michael Stewart, CIOG IPP)

Session 3.6b

Update:  Aligning Innovation With the Enterprise to Enable Agencies to Help Keep Pace With Commercial IT Evolution

(Mr Curt Aubley, Lockheed Martin)

Session 3.7b

Update: Spectrum as a Battlespace

(Mr Ian Layzell, Defence Spectrum Office)


Afternoon Tea

4.00pm to 5:00pm

Session 3.4c

Update:  Defence Training and Experimentation Network (DTEN) and C2 Collective Training

(Mr James McRae & Mr Allan Deacon, Joint Operations Command)


Session 3.5c      TDL STREAM

Update:  The Australian Joint Fires Battlelab Capability

(GPCAPT Antony Martin, Director Battlespace Integration, Joint Capability Coordination)

Session 3.6c

Update: The Kill Chain and the Advanced Persistent Threat, What You Need to Understand to Better Protect Your Environment

(Mr John Hall, Lockheed Martin)

Session 3.7c

Product Brief: Optical LANs in Government—A Case Study

(Mr Thomas Ruvarac, Director Access Product Management and Marketing, Tellabs)


Session 3.8c

Product Brief:  Innovative Anti-Tamper Data Storage Technologies

(Mr Peter James, Chief Technology Officer, Secure Systems Limited, & Mr John Leiseboer, Chief Technology Officer, Quintessence Labs Pty Ltd)

Exhibition runs from 7:30am to 1:30pm (NO free exhibition-only registrations available)





Session Abstracts


Session Abstracts: Day 1—6 November 2012

1.1 Breakfast Session (top)

The Exhibition is open and coffee is available in the Exhibition Hall.

1.2 Plenary Session—Opening Session (top)

Welcome: Professor Michael Frater, Rector UNSW@ADFA and Mr Greg Farr, Chief Information Officer, CIOG

Keynote Address: Mr Greg Farr, Chief Information Officer, CIOG

Presentation not available

Keynote Address: Mr Matt Yannopoulos, Chief Technology Officer, CIOG

Click here for PDF


1.3  Plenary Session: Coalition J6 Session (top)


   Keynote Address: Major General Mike Milford, Head of ICT Operations Division, CIOG

                Presentation not available

   Keynote Address: Communications Information Systems and Information Management: Observations from Afghanistan, Colonel Chris Robinson:

                Presentation not available


1.4a Update: Empowering Mission Critical Systems Through Logistics Transformation: A Defense Logistics Agency Case Study (top)


Presenter: Vice Admiral (retired) Keith Lippert, Chief Strategy Officer, Accenture National Security Services

                Click here for PDF


Defence departments worldwide are feeling pressure to function with greater operational agility in the face of compounding challenges - fast paced technological advancements, constantly changing geopolitical landscapes and the increasing mandate for greater cost efficiencies. Faced with this scenario in the early 2000s, America’s Defense Logistics Agency (DLA) developed a plan to achieve high performance by enhancing their logistics function, modernising their supply chain processes and streamlining underlying systems. What learnings can Australia’s Department of Defence take from this approach and indeed the journey towards empowering mission critical systems?  

This session will explore the DLA case study, offer unique insight into the challenges faced in undertaking logistics transformation in a defence environment, and draw specific learnings from DLA’s approach and ultimate success. The DLA implemented a smooth and highly integrated approach to reduce cycle times, re-engineer processes based on tested best practices and create total asset visibility to reduce material costs and increase service.  The session will also highlight the next stage of modernisation which DLA embarked on with the Enterprise Business System.

The session will conclude with a discussion of the recommendations put forward in the DLA case study, their immediate and future relevance to Australia s Department of Defence and explore how such endeavours can be broken down into incremental, systematic change. 


1.4b Product Brief: Small Steps towards the Challenge of Big Data in Defence (top)


Presenter:  Mr Tim Paydos, Director, IBM Threat Prediction and Prevention

                Click here for PDF


IBM is delighted to host an exploratory session around the financial and information management challenges currently facing the Department of Defence. The challenge Defence face in today’s international networked society is not about getting the required information, but instead being able to harness, cross correlate, analyse and ultimately produce actionable intelligence in a timely manner.  Of course this isn’t the only ‘big data’ concern, within the Department itself there is a huge amount of data being produced daily both by the knowledge workers and the various enterprise systems and this is not being fully tapped for insight into how the business is running.  In these lean times, how can your department leverage and complement your existing resources to gain control of your data/information and harness the potential opportunities?

With productivity top of mind, Tim Paydos the Director of IBM’s World Wide Government Information Agenda Team will share some stories of how other government departments are grappling with this challenge across the globe.  Tim and Kate Muir, Strategic Information Management Leader for our Canberra team, will also be available for continued discussion at the IBM stand for the duration of MilCIS.   


1.4c Update: Securing Defence Information (top)


Presenters:  Mr Daniel Lai, BSTTech & Mr Iain Johnstone, EAB, CIOG

                Presentation not available


At MILCIS 2010 a metadata and business rules approach to secure information management was described. That approach is now being described at the Enterprise level through an evolving SIE Security Architecture (SIESA). The SIESA project began in January 2012 and will deliver a comprehensive security architecture that will identify and apply ‘defence-in-depth’ controls to enable dynamic response to changing threats and to ensure that security continues to be considered as a core part of service and system solution delivery. The architecture has a focus on protecting and managing information and will support a trusted environment for integrated information sharing across Defence’s architecture domains and with the extended enterprise, and balance ‘need-to-share’ and ‘need-to-know’ requirements. The architecture will enable seamless security to support the future operations of the ADF, enhance the user experience and utility and still maintain accountability and compliance with legal and regulatory requirements.


The update will describe the Architecture, its development, and how it is being used by the CIO Group Executive to:

map the required security needs to the ADF business functions,review and clarify roles and responsibilities for the future ICT security capability,identify and measure current ICT security capability against the target state,identify and map ICT security capability being developed through the DCP IPW and DIISI programs,identify gaps in the capability need, andplan and prioritise future capability development.


1.5a Update: Tactical information Exchange Domain Capability Management (top)


Presenters:  Commander Michael Reis, RAN TIED Capability Coordination Manager, CIOG & Mr Graham King, Director of Interoperability, VCDF

                Click here for PDF


In May 2010, CIO was appointed as the ADF Capability Manager for a range of core ADF ICT CIS capabilities. In November 2010, the Directorate of Capability Management (CM) under DGICTPP was established to assume Capability Manager responsibility for the TIED.


JCC Division was raised in January 2009 to improve Defence's ability to deliver joint capability. In January 2010 the division was further enlarged with the transfer of CDG's NCW Directorate in January 2011. Recently, JCC Division established the Australian Defence Interoperability and Information Exchange Office (ADIIO) to provide ‘oversight’ and manage the development of Coalition and Regional Interoperability and Battlespace Information Exchange.


As the respective Coordinating Capability Manager and the Capability Coordinator, CIOG and VCDF are excited about the contribution that the TIED will make in supporting a networked force.


Throughout 2012, the CIOG have been actively reshaping TIED Strategy, Policy and Governance arrangements with VCDF, this brief aims to provide an update on these activities and on other Joint aspects impacting the TIED.


1.5a Panel: Tactical Information Exchange Domain Gaps, Needs and Requirements (top)


Panel Members:  Mr Mike Kenderes, Director Tactical Information Exchange Integration Office, DMO; Mr Dennis Healy, Director Australian Defence Force Tactical Data Link Authority, DMO, Commander Michael Reis, RAN TIED Capability Coordination Manager, CIOG; Mr Graham King, Director of Interoperability, VCDF; & Colonel Sheldon Kidd, Director Network Infrastructure Development, CDG


The AS/NZ Chapter of the International Data Link Society (IDLSoc) will facilitate a discussion focussing on supporting the TIED across the Gaps, Needs and Requirements Phases of the CLC. The session will cover issues relating to;


•           Governance, Policy and Strategy

•           Architectures, their purpose and application

•           Standards and Interoperability Priorities

•           Capability Management and Coordination


1.5b Update: Tactical Information Exchange Domain Acquisition and Engineering Services  (top)


Presenter:  Mr Mike Kenderes, Director Tactical Information Exchange Integration Office, DMO & Mr Dennis Healy, Director Australian Defence Force Tactical Data Link Authority

                Presentation not available


Since 2001, the Australian Defence Force Tactical Data Link Authority (ADFTA) has been supporting the Tactical Information Exchange Domain (TIED) by providing Capability Support and Assurance Services (Engineering, Test and Evaluation) to ensure correct Tactical Data Link (TDL) implementation at the platform level and promote Joint and Coalition TDL interoperability within the ADF.

In July 2004, the Tactical Information Exchange Integration Office (TIEIO) was established to support the TIED through acquisition activities through assigned Defence Capital Major or Minor projects, system support through technical support to the TIED in the form of policy, engineering, implementation and interoperability assurance, test and compliance, operational and training and sustainment.

The Major acquisition project within the TIEIO is the delivery Joint Project (JP) 2089 Tactical Information Exchange Domain which is a program of projects to deliver a Tactical Information Exchange (TIE) capability in line with network enabled force objectives.

Over the last 12 months, both ADFTA and TIEIO have been supporting the TIED and the subject of a number of TIED related studies that will shape TIE Domain Support Organisation arrangements into the future. Throughout this period JP 2089 has been active in delivering new TIED capability to Defence. The Directors of TIEIO and ADFTA will provide an update on this effort and provide insight into the TIED Support Organisation plans for the next year.


1.5b Panel: Tactical Information Exchange Domain Acquisition and Engineering Services (top)


Panel Members:  Mr Mike Kenderes, Director Tactical Information Exchange Integration Office, DMO; Mr Dennis Healy, Director Australian Defence Force Tactical Data Link Authority, DMO, Commander Michael Reis, RAN TIED Capability Coordination Manager, CIOG; & Mr Graham King, Director of Interoperability, VCDF


The AS/NZ Chapter of the International Data Link Society (IDLSoc) will facilitate a discussion focussing on supporting the TIED across the Acquisition (and Engineering Services) Phase of the CLC. The session will cover issues relating to;


•           Multi-Link planning, monitoring and management Project activities;

•           Platform/Project Design Requirements Development;

•           Configuration Management of Interoperability; and

•           Test and Evaluation.


1.5c Update: TIED In-service Support and Sustainment (top)


Presenter:  Mr Mike Kenderes, Director Tactical Information Exchange Integration Office, DMO & Mr Dennis Healy, Director Australian Defence Force Tactical Data Link Authority

                Presentation not available


Since 2001, the Australian Defence Force Tactical Data Link Authority (ADFTA) has been providing TIED In-Service Support (Network Support, Network Design and Joint Training) to Warfighter during Joint/Coalition Operations and Exercises.

In July 2004, the Tactical Information Exchange Integration Office (TIEIO) was established to support the TIED through acquisition activities through assigned Defence Capital Major or Minor projects, system support through technical support to the TIED in the form of policy, engineering, implementation and interoperability assurance, test and compliance, operational and training and sustainment.

Major TIEIO sustainment effort has been the fleet management of assigned equipment fleets and identifying opportunities to consolidate TIED sustainment effort as a Strategic Reform program initiative.

Throughout 2012 the ADFTA and TIEIO have been busy providing TIED In Service Support and Sustainment of equipment fleets. The Directors of ADFTA and TIEIO will provide an update on this effort.


1.5c Panel: TIED In-service Support and Sustainment (top)


Panel Members:  Mr Mike Kenderes, Director Tactical Information Exchange Integration Office, DMO; Mr Dennis Healy, Director Australian Defence Force Tactical Data Link Authority, DMO, Commander Michael Reis, RAN TIED Capability Coordination Manager, CIOG; Mr Graham King, Director of Interoperability, VCDF; & GPCAPT Antony Martin, Director Battlespace Integration Joint Capability Coordination, VCDF


The AS/NZ Chapter of the International Data Link Society (IDLSoc) will facilitate a discussion focussing on supporting the TIED across the In Service Support and Sustainment Phases of the CLC. The session will cover issues relating to;


•           Support to Operations and Exercises,

•           Joint TDL Training and TIED training continuum, and

•           Fleet Sustainment plans and TDL Terminal Upgrades.


1.6a Update: Now We Are One! (top)


Presenters:  Mr James Thom, BAE Systems and Mr Eric Kordt, EAB, CIOG

                Click here for PDF


As the CIOG MilSet AMSPA partnership has developed in its first year opportunities have arisen to work in collaboration to look at capability using Enterprise Architecture. Using an EA base we can work with stakeholders at all levels to look beyond just the ICT structures out to how work is done and information is garnered. 


From such works it is hoped to not just bring efficiencies to the AMSPA engagement but also solutions that can offer step-change improvements in effectiveness. The approach has been to use the detail inherent in Business Architecture layer of an EA approach to reflect back to stakeholders their own stated needs in Operational Concepts and show where synergies, opportunities and risk lie.


From this approach we can then work together to better enunciate where and why particular problems and needs will be amenable to ICT treatments, but also where the flow of work and effort itself warrants deeper examination.


CIOG MILSET works include efforts across domains as diverse as Cyber Security and Strategic Situational Awareness.


1.6b Update: CIS as a Capability (top)


Presenter:  SQNLDR Adam Pearsall, ICT Operations Division, CIOG

                Click here for PDF


Almost all Defence systems now incorporate a significant element of ICT-intensive solutions, some being purely ICT-based. The effects that Defence systems are intended to achieve also almost always require interfaces with other systems. These interfaces are predominantly provided by ICT. This paper examines the concept of ICT in Defence being transformed into CIS capabilities.

CIS as a Capability brings with it a number of complexities, including the lack of a highly visible capability platform, the low cost distributed nature of assets, the ubiquitous use of assets through all Groups, and the lack of central control of assets, personnel, facilities and support for the assets.

As an illustration, this paper considers the introduction of the Amphibious Task Group, centred on the Landing Helicopter Dock. There is a tactical Command and Control conundrum, as any solution must operate across all the military Domains, where current solutions are mostly limited to single Domains. A further illustration is given of the current Deployed LANs in use by Army, and how future developments may be driven based on the concept under which ADF considers CIS.

No matter which way CIS is viewed, the current and expected future demands for ICT-intensive solutions pose considerable challenges. CIO is addressing these challenges through development of Capability Manager functions in cooperation with Joint Capability Coordination Division in VCDF; developing cooperative engagement models within governance, project management and service management; and improving internal processes to better support CIS development and operation. CIOG has established the Directorate of ICT Capability Coordination, and several other organisation elements responsible for implementation of Defence Capability Plan Projects, to assist CIO in the Capability Manager role.


1.6c Refereed Papers—Industry Stream (top)


Paper 1: Cloud For Defence Applications: Benefits, Concerns, and Way Forward

Authors: Tariq Masroof, School of Engineering and IT, University of New South Wales at Canberra

                Click here for PDF

Abstract. Cloud computing has brought a fundamental change in the way IT services are used. Many organizations have already moved to cloud and the trend is on the increase due to its inherent benefits. However, as with any emerging concept and technology, this new paradigm poses certain problems and concerns like data security and availability especially for military organizations with the need for strict security and control over data. Therefore, there is a need to critically analyze the risks of cloud computing for military organizations. This paper is an outcome of analysis of literature on cloud computing and related areas. It discusses definition, service models, deployment models, benefits, and some key concerns of cloud computing for a military organization. The paper concludes that careful choice of cloud service provider can significantly reduce many of the threats related to the use of cloud computing.


Paper 2:  Reducing the Footprint of Deployed Information Systems with Cross Domain Solutions

Authors: Arthur Ollett; Scott Robertson; David Baker; Frederic Lafon; Ben Giesbertz; Michael Liu; Nihal Fernando; Alex Parkinson

                Click here for PDF

Abstract. Deployed land army operations across force, formation and unit node levels typically require information systems that support multiple security domains. Each domain requires its own servers, switching, cabling and user terminals. This infrastructure limits mobility and places significant demands on transportation, set-up time, engineering support and field power generation systems. Thales has successfully deployed the Cross Domain Solution (CDS), from Raytheon's Trusted Computer Solutions, aboard RAN platforms and we are currently developing it for the strategic environment under the CIOG’s Next Generation Desktop (NGD) program. The CDS enables user terminals to access multiple security domains across a single distribution network, improving user efficiency and significantly reducing the infrastructure footprint. This paper introduces CDS, explains how it works and provides supporting analysis of the logistical and other benefits from adopting CDS - compared to existing deployed LAN architectures. It also describes how CDS can be used to provide efficient access for users within the constraints of vehicle mounted C4I solutions. The reduced footprint has many benefits. These include lower overall power consumption - which in turn equates to lower generator loads and fuel consumption, reduced time to deploy with fewer devices and less cable roll out and simplified introduction of new network services to deployed users as deployment scale changes. The key benefit for Defence is that CDS will enable essential multi-domain information systems to be deployed in the land environment in a manageable, efficient and effective way.


1.7a Refereed Papers—IEEE Stream (top)


Paper 1: Optimization of Compact SATCOM Terminals

Authors: Christophe Granet; John Kot; Ian Davis; and Greg Pope

                Paper published in IEEE Xplore

Abstract. A strategy to optimize dual-reflector antennas for compact satellite communications (SATCOM) terminals to meet various user-specified requirements is described. An overview of the method and design methodology is given, and some of the challenges in designing compact antennas are compared to traditional earth station antennas are described.

Paper 2: On the Use of Multi-User Detection in Supporting Narrowband Waveforms on Wideband Satcom

Author: Mark Rice

                Paper published in IEEE Xplore

Abstract. Multi-User Detection (MUD) technology is most effective in situations where the transmitted information rate from an individual user is much less than 1 bps/Hz. MUD enables a substantial increase in number of simultaneous user signals supported and their aggregated traffic. Furthermore, MUD is highly advantageous in lowering the required terminal transmit power when used in conjunction with spectral spreading and carrier overlay, in contrast to TDMA with no overlay. With MUD in the receiving ground station, terminals with widely varying transmit powers and bit rates may share a common channel with minimal coordination between users - this is not feasible with traditional access methods: FDMA, TDMA and CDMA. These characteristics are well suited to supporting a large network of On-the-Move (OTM) micro terminals.


1.7b Refereed Papers—IEEE Stream (top)


Paper 1: Downlink Interference Analysis in DS-CDMA for Unequal Power Requirements: The Dirty User Problem

Authors: Mark C. Reed and Leif W. Hanlen

                Paper published in IEEE Xplore

Abstract. Downlink interference analysis within direct-sequence code-division multiple-access (DS-CDMA) systems is considered in this paper. Although orthogonal codes are used at the base-station transmitter, multi-path and different power requirements of terminals mean that substantial multiple access interference is suffered at the terminals. With the multitude of terminals available for 2G and 3G systems, inefficient terminal design leads to the ``Dirty User Problem'', that is, where a terminal requests more power from the base-station than an alternate terminal located at the same position. A ``dirty user'' causes higher interference on all other users in the cell and ultimately limits the capacity of the downlink link of a DS-CDMA system. This paper investigates this affect by determining the performance degradation in terms of the percentage of dirty users and their power requirement, compared to a conventional receiver.


Paper 2: Hardware Realization of UMTS Femtocell Modem with Uplink Interference Cancellation

Authors: Ming Zhao; Ming (Matt) Ruan; Raymond Chan; Andrew Sutton; Milind Neharkar; Nipun Bhaskar; Zhenning Shi; and Mark C. Reed

                Paper published in IEEE Xplore

Abstract. In this paper, the hardware realization of UMTS femtocell modem with multiuser interference cancellation technology is presented for the first time. The design and implementation are compliant with the 3GPP/UMTS standard for Wideband Code-Division Multiple Access (WCDMA) baseband air-interface and exceeds 3GPP minimum requirements by $2$dB in Additive White Gaussian Noise (AWGN) environment. The modem is designed with conventional and advanced interference cancellation to support up to eight users simultaneously with a mix of voice and data services. The conventional modem can achieve maximum data rate of 2Mbps in the downlink and 384kbps in the uplink. The implementation fully realizes the physical layer transport channel encoder, spreading, and modulation in the downlink, and random access, synchronization and acquisition, channel estimation, despreading, demodulation, and transport channel decoding in the uplink. The design is completely scalable such that the interference cancellation technology is realized on top of the conventional design of the modem to improve the reception sensitivity.


1.7c Refereed Papers—IEEE Stream (top)


Paper 1: Cognitive Radio Technologies: Envisioning the Realization of Network-centric Warfare

Authors: Andre Abadie and Duminda Wijesekera

                Paper published in IEEE Xplore

Abstract. Recent advancements in software defined radio (SDR) technologies have increased the likelihood that most radio infrastructures will transition away from legacy hardware architectures. SDR technologies offer simple flexibility combined with efficiencies in business models, making them the optimum solution for most radio requirements. As SDR proliferates, it is possible to envision cognitive radio technologies emerging from concept to application. Cognitive radio technologies provide an intelligent framework to allow the radio to manage its operational settings. Cognitive radios will be able to sense their environment and decide on the optimum performance parameters for initiation or maintenance of a communications link. Imagine a radio that can autonomously sense neighbouring units and establish communications during combat; radios that automatically change frequency bands as necessary to facilitate interoperability; radios that can seamlessly join necessary battlefield networks; radios designed to enable Soldiers to prosecute their influence across any battlespace.


1.8a Undersea Networks Stream (top)


Paper 1: A Tipping Point for Undersea Networks

Authors: Craig Benson, Michael Frater, & Michael Ryan, UNSW, Canberra

                Paper published in IEEE Xplore

Abstract. For a long time cable-free undersea communication devices have provided a very modest communication capability.  Relying on acoustic signals transmitted through a lossy channel with complex propagation characteristics they have provided unreliable connections and very low data rates.  Because of the harsh environment, undersea modems have been very expensive, which in turn has limited their deployment and the resources available for development and production.  We are now at a tipping point where the technology is available to produce systems that are orders of magnitude more useful to users than previous products.  In this paper we outline the key developments in undersea modems from the user perspective.


Paper 2: Effective Undersea Communications: A Critical Enabler for Future Undersea Warfare Concepts

Authors: Stuart Anstee & Roger Neill, DSTO

                Click here for PDF

Abstract. For several years the potential value of networked undersea warfare systems has been recognised. The scope for application of such systems to military operations is very broad indeed, including intelligence, surveillance and reconnaissance, anti-submarine warfare and mine countermeasures. We have probably all seen the PowerPoint presentations showing virtually unlimited and unrestrained communications connectivity between all manner of military assets distributed below, upon and above the ocean surface. The physical characteristics of the environment impose significant constraints upon communications systems and consequently actual, fielded systems will inevitably fall well short of this ideal. This isn’t automatically a bad thing, however, because it may be possible to design communications systems that actually take advantage of these constraints. This presentation briefly considers some undersea warfare capabilities which could be supported by undersea communications concepts that are realistically achievable in the near future.


1.8b Undersea Networks Stream (top)


Paper 1: Providing Undersea Communications to the Warfighter

Author: Allesandro Ghiotto, L3-Nautronix

                Click here for PDF

Abstract. Undersea acoustic communications first became available to submarines around 1945, using modulation techniques based on the AM radio technology of the day. Half a century later, the Hydro Acoustic Information Link (HAIL) brought digital spread spectrum communications to the RAN and US submarines, and the associated advantages of improved reliability and range, data security, and the ability to transfer binary based information and precisely measure the range between communicators. More recent advances in electronic Digital Signal Processing (DSP) have enabled significantly faster data throughput, improved data security and underwater networking capabilities (rather than point-to-point), as well as the demonstration of SATCOM/acoustic gateways for the interconnectivity of wireless undersea and above water networks. This presentation describes key enabling technologies that are currently available, are in development, or are staged for future development for providing undersea communications to the Warfighter.


Paper 2: The Problem of Multi-User Access in Undersea Networks

Author: Qichao Zhao, UNSW in Canberra

                Paper published in IEEE Xplore

Abstract. Underwater acoustic networks (UWANs) can be applied in a vast range of applications. Unlike terrestrial networks, UWANs suffers from a much harsher communication environment. This paper starts with discussing the underwater environment characters, and argues the challenges in designing UWANs in details. Although terrestrial MAC protocols have been extensively studied for a long time, they are not suitable in UWANs. This paper then discussed couple of newly proposed MAC protocols tailored for UWANs by dividing them into different categories according to their strategies and concerns. Our further work will be simulating some proposed underwater acoustic MAC (UWA-MAC) protocols and then arranging practical underwater experiments to test their performance.


Paper 3: Routing Challenges and Solutions for Underwater Networks

Author: Rony Rahman, UNSW in Canberra

                Paper published in IEEE Xplore

Abstract. Routing is one of the fundamental concerns in any communication network. Over the last two decades, a significant amount of attention has been given to the design of terrestrial routing protocols. However, the distinctive properties of the underwater communication channel – such as distance-dependent bandwidth, large propagation delay and time-varying mulitpath – render the existing terrestrial routing protocols implausible for underwater networks. In this paper we explore the challenges in developing a suitable routing protocol for underwater networks. We also look at existing routing protocols designed for both terrestrial and underwater networks, identify their shortcomings and finally lay out some guidelines for the design of routing protocols suitable for next generation underwater networks/applications.


1.8c Undersea Networks Stream (top)


Panel Session: Mating Problems to Solutions


Contemporary experience with undersea communications is with low data-rate, sparse systems.  The advent of more widely deployable, higher performing networks will facilitate numerous new applications.  Finding the applications that can be fulfilled with emerging technology requires a merging of operational and technical expertise.  This panel session will focus on eliciting opportunities for near term demonstrations of budding capabilities.


1.9a Product Brief: Big Data Technology in Defence Applications—Leveraging through Graphical Analytics (top)


Presenter:  Mr Leon Guzenda, Objectivity

                Click here for PDF


Leon Guzenda, the Founder of Objectivity, Inc will show how a mature, distributed database technology that was built to handle structured, semi-structured and unstructured data has been enhanced to support powerful graph analytics applications. The underlying technology has been widely deployed in C4I* applications, such as Command and Control systems, UAV and satellite-based reconnaissance systems, communications infrastructure, logistics, and intelligence gathering and analysis systems. Leon will describe the technology and typical deployments before covering the new field of graph databases and their application to a broad range of problems where there are complex networks of interactions, such as cybersecurity, social network analysis and logistics.


1.9c Tutorial: Introduction to Satellite Communications (top)

                Presentation not available


Presenters:  Mr Greg Pope & Dr John Kot, BAE Systems Australia


This tutorial gives a brief introduction to the technical aspects of satellite communications. The material presented will describe the basic elements of a satellite communications system, and show how the elements are connected together and analysed to calculate a link budget. The tutorial will also cover the regulation of satellite frequency bands, terminal design, multiple access, and network aspects. The detailed outline of the tutorial is:


Overview of a satellite communications system:

·         Space segment: Description of simple transponder bent-pipe operation; More-advanced transponders; Single beam, multiple beams, and steerable-spot beams.

·         Ground segment: Fixed, transportable, and mobile ground stations.

Frequency bands and international regulation: Important frequency bands for military communications; The ITU and international regulation of frequency bands.Uplink, downlink, and overall link performance: The link budget: basic concepts of EIRP, G/T, spreading loss, C/N; Link margin and closing the link.Multiple access: FDMA; TDMA; Other Access Schemes (CDMA, PCMA).Terminal Design: Modems; RF systems for uplink and downlink; Earth Station Antennas.Satellite networks: The satellite link as part of a communications network.




Session Abstracts: Day 2—7 November 2012


2.1 Breakfast Session (top)


The Exhibition is open and coffee is available in the Exhibition Hall.


2.2a Plenary Session: CTO Session (top) 


Keynote Address:   Modernising Our Infrastructure: The Journey So Far

               Mr Daniel McCabe, Assistant Secretary Infrastructure Architecture, CIOG

                Click here for PDF

Keynote Address:   Our Service Oriented Architecture Journey and Progress

              Mr Christopher Rodrigues-Macias, Assistant Secretary Enterprise Architecture, CIOG

                Click here for PDF


2.2b Plenary Session:  Network Centric Warfare and Information Security (top)


Keynote Address:   Mr Joe Franzi, Assistant Secretary Information Security Operations, Defence Signals Directorate

                Presentation not available


2.3 Plenary Session: Capability Developments (top)


   Keynote Address: AVM Neil Hart, JCC

                Presentation not available

   Keynote Address: BRIG Mal Rerden, Director General Integrated Capability Development, CDG

                Presentation not available


2.4a Update:  When There Is No Room For Error: Using Advanced Analytics In Supply Chain Management (top)


Presenter:  Mr Steven Pantier, Asia-Pacific Defence Business Services Lead, Accenture

                Click here for PDF


Implementing a sophisticated new supply chain management system is the first step in creating a truly agile logistics capability for Australia’s Defence organisation. Such a system should provide flexibility as well as genuine cost savings, ultimately allowing Australia s defence leaders to steer the organisation in virtually any direction and empower mission critical systems. However, the scope offered by such flexibility can sometimes lead to confusion driven by the structural complexity of countless parameter and configuration options. Rather than relying on a rule-of-thumb approach to configuration, Defence departments are joining the private sector in creating transformational improvements to logistics by utilising advanced analytics to produce sustained optimisation resulting in better long-term outcomes via genuine cost savings, faster system delivery and reduced forecasting errors, inventory needs and backorders. 


This session will draw on Accenture research and first-hand experience at the United States Defense Logistics Agency (DLA) to explore the use of advanced analytics to drive high performance in the realm of large scale logistics. The session will offer the latest insight into a variety of topics in this field such as business outcome simulations, asset management prediction, alignment of needs and investment and forecasting optimisation. 


The session will conclude with discussion on how Defence forces such as Australia’s can look to use advanced analytics both with existing and future supply chain processes. The discussion will address to what extent advanced analytics models rely on organisation-wide enterprise resource planning (ERP) being fully established, or whether these techniques can also drive better business outcomes prior to transformational logistics change?


2.4b Update: Mission Management Systems in Army Aviation (top)


Presenters:  MAJ Neil Squires and CAPT Gareth Pihl, Aviation Branch, HQ Forces Command

                Click here for PDF


Traditionally, the Army Aviation capability has been managed and operated with a platform-centric, rather than a systems-focussed, mindset. As a result, Army Aviation has not been structured to focus on cross platform and holistic capability functions. This has resulted in systems that are not connected; hence, Army Aviation does not, in reality, act as effectively as it could as a force multiplier to the ADF. This lack of connectivity has a number of flow-on effects – information needs to be manually analysed, transferred and fused retrospectively to events occurring. Army Aviation has addressed these issues organisationally by restructuring from a single weapon systems effects model to a weapon systems management model. However, Army Aviation must now address these issues practically, which includes a holistic review of the C4ISR capabilities.


In the future, Army Aviation requires an integrated Aviation Mission Management System that is mobile, can operate within both the Army and ADF tactical networks, and supports the rapid exchange of combat information with other C2 systems. The Aviation Mission Management System will comprise of all of the ground-based planning, mission management, during and post-mission functions required to deliver the aviation effects to the battlespace.


To support the Aviation Mission Management System, a new information and communications technology architecture for the rotary wing platforms has been conceptualised. This architecture leverages off a number of current ADF projects, which are considered keystones to the Aviation Mission Management System. These projects include JOINT PROJECT 2072 – Battlespace Communications System (Land) and LAND 75 PHASE 3.4 – Track Management System.


The aforementioned architecture intends to rapidly close the information transfer gap presented by the current lack of connectivity, and increase the rate of data transfer across force elements. The Aviation Mission Management System would merge the extant planning tools and software into a common, highly connected system. Through the migration to an ‘Everything over IP’ architecture, together with the use of common Army equipment and bearers, Army Aviation will be able to move in a parallel direction to the ground Army and enhance the interoperability and situational awareness of ADF (particularly Army) elements through a common operating picture and provide near-real-time monitoring of missions to any node on the battlefield network.


Perhaps more critical in a strategic sense, are the information and communication technology points of presence required to host and deliver the required application functionality. Ideally, Army Aviation needs to host and deliver such application functionality (including mission support systems) from a standard Defence information environment, depending upon the application and the mission. This would deliver functionality to command posts as part of a combat team, battle group or task force. It should be noted that Army Aviation does not intend to solve the ADF’s C4ISR issues; our efforts in this space are to ensure that we are aligned with current ADF strategy and concepts.


This presentation outlines the Aviation Mission Management System being developed under the proposed new Army Aviation architecture.


2.4c Product Brief: Deploying Next Generation Desktop Solutions to Solve Information Sharing Challenges (top)


Presenters:  Mr Chris Sortzi, Vice President of Sales, Raytheon Trusted Computer Solutions (RTCS) & Mr Paul Feighan, General Manager – Sales and Strategy Development, National Security & C4I, Thales Australia

                Click here for PDF


Today there are many large-scale virtualization, cloud utilization, and desktop replacement/augmentation efforts underway around the globe. These efforts embrace both standard virtualization and cloud technologies and apply them to multilevel, multi-domain solutions in order to foster and protect in-country and multinational information sharing. These “Next Generation Desktop” (NGD) deployments allow agencies to become more agile by tapping into private and community clouds while relieving IT budgetary pressures.


The total economic impact of including a cross domain component like Trusted Thin Client®, from Raytheon Trusted Computer Solutions (RTCS), to NGD deployments include: shorter deployment time, ease of replacement, lower administrative overhead, reduced software cost, significantly less power consumption, quicker desktop recovery time and decreased carbon footprint. Running cross domain solutions in this environment adds to these benefits, as a secure operating system mitigates the likelihood of an Advanced Persistent Threat (APT) infiltration and prevents data leakage.


The first portion of this session will explore the costs of such an implementation as well as the savings. Hardware and software costs are relatively easy to calculate but how do you assess lowered administration overhead and increased user productivity? Based on data from customers within the US Department of Defense and Intelligence Community, Mr. Sortzi (VP Sales, RTCS) will examine the cost/savings equation in detail to reveal how cross domain thin client computing   in conjunction with virtualization   can deliver secure desktop-like performance in task-oriented work environments and ultimately save government customers significant monetary sums over time.


RTCS, through close partnership with Thales Australia, continues to foster secure information sharing within Australia. TTC is part of deployments aboard Royal Australian Navy (RAN) platforms and within the Chief Information Officer Group’s (CIOG) Next Generation Desktop program helping Defence reach the cost reduction requirements laid out in Defence’s ICT Reform Strategy. In the second portion of this session, Mr. Feighan (GM, Sales & Strategy, Thales AU) will discuss highlights from these deployments.


Finally, Mr. Sortzi and Mr. Feighan will discuss future cross domain NGD directions and new TTC product features and functions to include Suite B support.


Outline of Subject Matter:

•     Next Generation Desktop solutions

•     Cross domain solutions

•     Total Economic Impact of deploying cross domain solutions

•     Information sharing

•     Highlights from current Australian deployments

•     New features of RTCS Trusted Thin Client


2.5a  Tutorial: Introduction to the Australian Tactical Information Exchange Domain (TIED) (top)


Presenter:  FLTLT Carl Jongsma, TDL Instructor, Training Cell ADFTA

                Click here for PDF


The ADF Multi-TDL Networks, or MTN, consists of a number of Tactical Data Links (TDL) to disseminate real-time tactical information to build a Common Tactical Picture (CTP).


Link 16 is the primary TDL used by Australian and Allied/Coalition forces.  However, it uses Joint Tactical Information Data System (JTIDS) and Multi-Information Data System (MIDS) terminals that operate in the UHF aeronautical band.   Therefore, it only supports Line-of-sight connectivity and dispersed network participants must rely on a suitable and dedicated airborne rely unit, which is always available.


To overcome Link 16 beyond line-of-sight problems, the TIE Domain rely on a number of techniques to achieve connectivity, such as the Joint Range Extension Application Protocol (JREAP).  This enables C2 units and sites the exchange of tactical data over communications media, such as: Satellite communications, serial Point-to-Point connections and Internet Wide Area Networks.


This tutorial aims to explain the scope of the ADF MTN that will provide a brief introduction of the TDL employed by the ADF; outlines the layers of TDL Beyond Line-of-site connectivity; and provides a brief overview of the Pro’s, Con’s and plans for BLOS TDLs in the ADF.


2.5b  Tutorial: TIEIO Link 22 Trial (top)


Presenters:  Mr James Meredith, Head Emerging Technology Cell ADFTA

                Click here for PDF

      & Mr Bob McGinnis, DRS-Defence Systems

                Click here for PDF


The ADF and its Allies have an operational need to exchange real-time tactical information Beyond Line-of-sight (BLOS between units, national assets, and allied and coalition partners.  To date, BLOS TDL connectivity has been achieved using High Frequency (HF) Link 11 to exchange tactical track data to produce the Common Tactical Picture (CTP). 


However, Link 11 standards were developed in the late 1950s and have numerous technical and tactical deficiencies.  Over time there has been a dramatic increase in the information exchange requirements for the coordinated employment of advanced weapon systems; and increased communications threats, coupled with decreased warning and reaction times, have also created deficiencies in the current operational capability.


Link 16 is the tactical data link employed widely by US forces, and is suitable for a US Navy (USN) Carrier Strike Group (CSG) architecture, with its persistent 24/7 organic air cover; but it is very tenuous for maritime forces that cannot employ the persistent air cover of a USN CSG.  However, airborne assets operate at low attitudes and at distance from the force, so Line of Sight (LOS) connectivity cannot be maintained throughout the mission.


Alternative BLOS TDLs include Satellite communications, but access cannot be guaranteed, or the electronic threat could deny this service; the other the Joint Range Extension (JRE) Application Protocol (JREAP), which is ideal for ‘reaches’ to distant commands over IP-based wide area networks.    


The only other tactical HF Based BLOS TDL capability is Link 22.  It has being developed by a seven nation NATO consortia.  It is a secure TDL that provides a BLOS HF capability, and is designed to interconnect air, surface, subsurface, and ground-based tactical data systems.  Link 22 was developed to replace and overcome the known deficiencies of Link 11, and designed to complement and interoperate easily with Link 16.  Link 22 provides a persistent BLOS TDL ‘J’ series message capability essential for current TDL operations, and shares a common library with the Link 16 message standard.


The AUS, NZL and USA have agreed to promote further technical risk reduction investigation activities into BLOS TDL and endorse the need to conduct a trial or demonstration using HF Fixed Frequency Link 22 in the Pacific Rim.


Therefore the ADF must conduct a series of trials, evaluation and demonstrations to verify the suitability of Link 22 and raise the awareness of Link 22 in Australia.  This brief will provide an provide background of the NATO Link 22 program, highlight implementation issues, overview of the Australian Link 22 trials program, and specific details on the initial core Australian Trials suite hardware.


2.5c Tutorial: Integrating Frequency Hopping Services (Link 22 UHF EPM) into the RF Layout of Naval Radio Communication Systems (top)


Presenter:  Mr Radek Novak, Regional Sales Manager, Naval Communication Systems, Rohde & Schwarz Germany

                Presentation not available


The V/UHF RF layout of naval radio communication systems is mainly influenced by the following general requirements:

·            Number of radio communication services to be used simultaneously


2V/UHF  radios in small systems20 or more V/UHF  radios in big systems


·            Available number of antennas


2 V/UHF antennas in small systems20 or more V/UHF antennas for radio communication services in big systems, more than 100 antennas in total for all RF systems on a Navy ship


·            Desired radiation patterns


Mainly omni - directional pattern for standard communication services


·            Narrowband and broadband services


Typical narrowband services are voice services or tactical data links using channel bandwidths of 25kHzTypical broadband services are Sub Net Relay (SNR) or other similar High Data Rate Services for MTWAN applications using bandwidths of up to 500kHz.


·            Fix Frequency or EPM services


Fix frequency mode is mainly used for standard narrowband and broadband servicesEPM modes e.g. with frequency hopping techniques are mainly used for RF services with the need for enhanced anti jamming robustness


·            Simultaneous operation of all V/UHF services


Simultaneous operations are possible by using well defined minimum frequency offsets between the various services. Normally high selectivity filters are necessary because the antennas in bigger systems may be strongly coupled to each other.



This brief will provide an overview how an existing V/UHF RF layout can be upgraded with new frequency hopping services, such as Link 22 UHF EPM.  It will provide details on the various Link 22 RF media options, and provide details on the technical constraints associated with coupling multiple radios to a limited number of antennas.


2.6a Tutorial: Protecting SATCOMS (top)


Presenter:  Dr Rob Rideout, RT Logic Inc.

                Presentation not available


The threat to SATCOM connectivity continues to increase through accidental and hostile attacks on both the space and ground segments. Also, as more military SATCOM finds its way onto leased bandwidth on commercial satellites we describe potential issues and case studies associated with operating in this environment. We present what can be expected from current and future systems from across industry in terms of providing increased SATCOM situational awareness through satellite monitoring and geolocation, and also cyber protection. The presentation includes a live capability demonstration of one such solution to demonstrate the effectiveness of being able to geolocate interference or a hostile jammer.


2.6b Update: End-to-End Situational Awareness of Hybrid Satcom/Terrestrial Networks (top)


Presenter:  Mr Stuart Daughtridge, Vice President Advanced Technology, Kratos Integral Systems

                Click here for PDF


Network Centric Warfare is now at the core of any conflict, and can provide a significant asymmetric advantage to the warfighter.  Network Centric Warfare relies on both terrestrial and satcom networks working as a single integrated system.  To reach the next level of efficiency in the operations of these integrated networks requires full end-to-end network management of the entire hybrid satcom/terrestrial networks.  


This end-to-end management will allow the improvement of overall network efficiency, situational awareness, and help ensure effective operations in a contested environment.  End-to-end network management also helps reduce the cyber security risks associated with satcom networks, which as they become more IP based, have a greater vulnerable to cyber attack.  To achieve this level of network management integration requires full RF spectrum situational awareness on the satcom links, integrated with the satcom network status, and that further integrated up into the overall IP network management to give full end-to-end network management. 


2.6c Update: Netcentric Satcom Management for Tomorrow’s Satcom Operations (top)


Presenters:  Mr Brian Van Luipen & Mr Thomas de Menthiere, Astrium

                Click here for PDF


Today, the Commonwealth is planning to deploy more and more satcom terminals on the battlefield. The Commonwealth relies on different Satellite bearers with latest addition of UHF capacity and WGS terminals.


This session describes the approach to a truly communication service orientated Enterprise scale system solution that provides the enabling platform for delivering Netcentric satcom capability.


Netcentric capability requires communications resources that deliver the operational needs of Command and Control organisations in a planned and managed way. To provide seamless integrated communications on demand at short notice requires a network that is interoperable and responsive. Satcom is a mainstream part of the modern communications function for military and peacekeeping deployments. The ability to configure satcom terminals and gateways to control secure access and manage the flow of traffic in a regulated way is at the heart of a Satcom Management System.  The Satcom network is characterised by highly mobile communication terminals many of which can operate on the move, some at very high speed. 


The challenges of ensuring efficient and effective communication between vehicles on the ground, ships at sea and airborne terminals when utilising multiple satellites requires advanced mapping of IP services to a dynamic RF bearer network.


Overall, the presentation will discuss the benefits and challenges of automation of the complexity of radio spectrum optimisation and equipment management, and simplifies all aspects of delivering voice, video and data services and reducing planning and configuration overheads in the Satcom enterprise.


2.7a Tutorial: A Common Service-oriented Infrastructure Approach for Defence Tactical Environments (top)


Presenter:  Mr Derek Dominish, DSTO

                Click here for PDF


With the recent adoption of a service oriented architectural (SOA) approach to application development within defence worldwide there is a need to provide architectural guidance that is supported through recognised standards. There is a considerable amount of effort being undertaken to developing a standardised network centric implementation. A DSTO research program is currently focused on the design and development of generic software elements that are representative of the components incorporated into many modern military platform mission/combat systems. It is the goal of this research that these representative components are both adaptable and configurable to meet the needs of a varied mix of experimental requirements imposed by defence clients through the platform related tasks currently being supported by DSTO. This SOA approach to application and systems composition is becoming increasingly typical of modern mission/combat systems and particularly to those within the air domain.


This tutorial will describe how applications developed under a SOA approach are more akin to an assemblage rather than the more traditional software development methodology of construct and execute. There is a growing collection of common services that are available for the tactical defence environment. However there exists the need to manage the availability of these services and their usage by applications through a common approach to infrastructure, configuration and deployment. This tutorial describes how an application can be assembled with separate and distinct service components to form a Composite Application and how these components can be interconnected through a ServiceConfigurator Gestalt pattern.


2.7c Update: Self Organising Networks (top)


Presenter:  Mr Matt Carling, Cisco Systems Australia

                Click here for PDF


Self-Organising Networks (SON) is a concept applied in many technology domains from Long Term Evolution (LTE) and next generation mobile networks through to 802.11 wifi mesh networks through to computing networks.


SON refers to a set of capabilities that increases the level of automation in network planning, operations and maintenance networks. These automated functions aim towards a self-configured, self-optimised and self-healing network, increasing network performance and quality by adapting to dynamic changes in network conditions. The scope of this presentation is to investigate an approach to deploying SON capabilities to converged IP networks – using today’s COTS routers, switches, and other network infrastructure.


The goal in Self-Organising IP Networks is twofold:

•     Adopt SON capabilities into current fixed and deployed IP networks to reduce both the time to deploy and to the simplify the ongoing operation support.

•     Support dynamic ad hoc topologies for IP networks optimised for the tactical mobile space where the pace of mobility necessitates automated control.


This session uses the Open Systems Interconnection (OSI) stack as the reference for discussing available SON capabilities at each layer – starting at the physical access layer through to the application layer. Hence we will look at the challenges not only at the physical connectivity layer but also IP addressing and routing, security, voice and video communication services, and management.


2.8a Update: The Cloud on a Sunny Day (top)


Presenter:  Mr C.J. Wallington, HP

                Click here for PDF


The United States Department of Defense (DoD) and Federal Government are facing an enormous shift in Information Technology.  Their customers are demanding an “anytime, anywhere” environment to give them greater mobility, access to services and improved availability without sacrificing security.  At the same time, these organizations are facing decreasing budgets and a constrained pool of skilled labor against a rise in network probes and attacks.  Compounding it all is an ever changing array of products and capabilities.

Cloud services offer a wide array of computing options, many of which could reduce operating costs while improving the security posture.  This means the greatest question is not “how” these organizations successfully manage their environments, but “should” they manage them?  What are the challenges and risks associated when outsource your IT services to industry?  Should you trust them with what could be sensitive information?  How can you use these services to your advantage?

Get insights into the basics of Cloud Computing and how you can capitalize on the gains in security, efficiencies, mobility and new technologies to help you decide whether a move to Cloud services is right for you.


2.8b Tutorial: Co-site Communications Interference (top)


Presenter:  Mr Ken Kenjale, Pole/Zero Corp

                Presentation not available


Modern military communications transceivers commonly cover many operational frequency bands with such capabilities as waveform upgradeability via field software change, embedded cryptography, frequency hopping and networking capabilities.  The transceiver data sheets highlight a myriad of other operational features—all contained in the relatively small package that modern electronics packaging allows. Typically, the transceiver data sheet offers no information on the transceiver’s receive mode vulnerability to interference caused by local, friendly emitters—a condition called cosite communications interference. Additionally, little indication is given of the transceiver’s spectral characteristics in transmit mode – characteristics which can dramatically affect a cosite receiver’s sensitivity. Losses in receive sensitivity will rapidly and dramatically reduce the communications range of the affected communications link!


Inadequate isolation between a transmitter and a receiver in a cosite environment results in the receiver’s diminished ability to process a weak desired signal—a condition termed desensitization. This condition exists due to the great disparity between the cosite transmitter output power level and the weak desired receive signal level. This isolation is commonly available through a combination of transmit and receive antenna isolation and system selectivity. With typical cosite transmit-to-receive antenna isolation of 20–40 dB, considerable system selectivity is required to prevent desensitization. Fortunately, with proper design, techniques exist to accommodate this challenging goal. This tutorial will discuss the issues involved in cosite interference mitigation from the perspective of both the transmitter and the receiver and will introduce techniques ranging from simple (antenna placement), to moderate (agile filtering, filter/PA cascading), to complex (interference cancellation) to allow simultaneous long-range communications in a local environment of multiple communicators and will discuss when each technique is appropriate. If time permits, cutting-edge technology developments addressing co-site interference will be covered in light of their tradeoffs and military applications.


2.8c Product Brief: WGS has Friends – The Complementary Commercial Satcom Systems Coming Online in 2013 (top)


Presenters:  Mr Todd McDonell, TC Communications & Mr Peter Hadinger, Inmarsat GX

                Click here for PDF


With a continuously growing need for deployable bandwidth to support Network Centric Warfare in 21st century Australia, the DMO is running multiple projects to deliver WGS or Wideband Global Satellite capability to the ADF.


However, the increasing need for bandwidth is also being felt by coalition partners in other key militaries such as the UK and Canada, as well as by WGS’s owners, the US DoD.


As the total WGS bandwidth available is finite, military communications operators will almost certainly need to supplement this capacity through the deployment of satellite terminals with multiple auxiliary RF kits. These kits allow military satcom terminals to access services such as commercial Ku band in order to meet their operational bandwidth requirements.


Inmarsat’s upcoming Global Express service will revolutionise the satellite communications experience for the military user by providing commercial satcom bandwidth through new bands, such as Ka, which are already in use by the military.


This coming together of commercial and military satellite communications capability offers some significant advantages to the military satcom user.


This presentation will highlight the benefits available to the military satcom user through access to new commercial satellite services that provide similar, or in some cases more advanced, capability in more commercially attractive ways than currently offered to the military by today’s commercial satellite payloads.


2.9a Tutorial: Testing Wideband Digital Radio Systems (top)


Presenter:  Mr Stan Pierson, Aeroflex Wichita

                Click here for PDF


Problems and solutions for testing radio systems that utilize wideband, complex modulation techniques.  As compared to legacy radio systems, the data radios often do not have clear text operation or test modes available.  Alternative tests presently use a golden radio, or implement the radio physical layer and possibly higher protocol layers.  This can become a security issue, or involve hard-to-get intellectual property.  


Various methods of test and measurement for wideband radio technology will be presented, as it applies to field testing, depot-level testing and development lab testing.


2.9c Product Brief: Hughes Advanced Airborne SATCOM Solutions (top)


Presenters:  Mr Dan Losada, Senior Director, Defense and Intelligence Systems Division and Tony Sewell, Senior Program Manager, Defense and Intelligence Systems Division, Hughes

                Click here for PDF


As the maturity of aeronautical broadband systems grows, so too does the recognition of the huge organizational and mission benefits that these technologies can provide to a range of sectors.   The adoption of broadband satellite communications (SATCOM) by large commercial airline fleets, and in high-end government and military applications, has helped to solidify the enablers of the technology, as well as the infrastructure and operational procedures to support it.  The explosion in the range of aeronautical missions that can now be supported by SATCOM is realized though technical solutions for large and small, manned and unmanned, fixed and rotary wing aircraft.  Whether supporting internet and voice applications for senior leaders, or complex high-throughput Intelligence Surveillance and Reconnaissance (ISR) missions for border protection, achieving high availability and high throughput communications in the airborne environment presents a number of significant challenges.


This product brief will provide a detailed discussion of how Hughes is approaching the operational and technical challenges of providing SATCOM On-The-Move (SOTM) ‘in the air’, with a particular discussion of challenges posed in different frequency bands and by the configuration of the new range of high-tech satellite payloads, and Hughes’ technical approach to delivering on the new ‘Holy Grail’ of high-throughput data on rotary wing platforms.





Session Abstracts: Day 3—8 November 2012


3.1 Breakfast Session (top)


The Exhibition is open and coffee is available in the Exhibition Hall.


Product Brief: Solutions for Satellite Voice, Data and Tracking Communications Everywhere


Presenter: Pivotel Satellite Pty Ltd


The Product Brief will be presented in the Ballroom—a light breakfast will be served for attendees.


Pivotel will highlight new smart solutions for satellite voice, data and tracking capabilities at a time when military and commercial military providers are seeking cost effective ways to keep personnel connected and assets under control.  Iridium will provide an update on Iridium NEXT – the development plan for its next generation network.


About Pivotel

Pivotel is Australia’s leading mobile satellite service provider and an Australian licensed mobile telecommunications company. Pivotel operates an interconnected Australian network so we can offer unique networking solutions and security configuration. Pivotel provides high quality services including voice and data communications and Location Based Services right across Australia and the world. Pivotel’s product range includes the Iridium and Globalstar Satellite networks and TracerTrak, the company’s remote worker safety and asset tracking solution. Pivotel also provides wholesale carrier services such as bulk messaging and call centre services. Pivotel Group is an Australian owned company employing over 50 staff. For more information, visit


About Iridium Communications Inc.

Iridium is the only mobile voice and data satellite communications network that spans the entire globe. Iridium enables connections between people, organizations and assets to and from anywhere, in real time. Together with its ever-expanding ecosystem of partner companies, Iridium delivers an innovative and rich portfolio of reliable solutions for markets that require truly global communications. The company has a major development program underway for its next-generation network — Iridium NEXT. Iridium Communications Inc. is headquartered in McLean, Va., U.S.A., and its common stock trades on the NASDAQ Global Select Market under the ticker symbol IRDM. For more information about Iridium products, services and partner solutions, visit .


3.2 Plenary Session—Navy, Army, Air Force CIS Interoperability (top)


   Keynote Address: CMDR Jeff Milward, Director Project Mercury

                Presentation not available

   Keynote Address: COL Shaun Love, Director Network Enabled Warfare, Army

                Presentation not available

   Keynote Address: GPCAPT John Heinrich, Director Intelligence Surveillance and Reconnaissance, Air Force

                Presentation not available


3.3a Plenary Session: Staying Ahead—The Network Way (top)


   Keynote Address:   Mr Michael Lawrey, Executive Director, Defence Engagement, Telstra Corporation

               Presentation not available


The rapid evolution of network-centric warfare and cyber terrorism has placed the network front and centre of modern warfare. However, like many industries, Defence organisations around the world are under pressure to reduce costs and improve productivity. With telecommunications continuously evolving, it is now more important than ever to understand what can be done to deliver telecommunications needs specific to Defence and other national security agencies whilst reducing those costs and increasing productivity.  Others are moving in this direction – find out how you can too.


3.3b Plenary Session: Cyber Security (top)


   Keynote Address:   Air Commodore Graham Wright (Retd), Director of Strategy for Intelligence Systems and Cyber Security, Northrop Grumman

                Presentation not available



3.4a Tutorial: Cognitive Radios and Spectrum Sensing Techniques (top)


Presenter:  Dr Kandeepan Sithamparanathan, RMIT University / NICTA

                Click here for PDF


The new paradigm shift in wireless communications towards cognitive radio technology had attracted many stakeholders of the spectrum users around the world especially the defense force. This tutorial discusses the current trends in wireless communications related Cognitive Radios (CR). CR has been investigated heavily around the world in order to bring intelligence into future radios using software defined radio (SDR) technology to optimize the utilization of scarce radio resource. The intelligence also can be utilized for various other purposes for identifying, detecting and localizing radios and thus the users especially in the defense field. The implementation of the cognitive cycle by means of a cognitive engine within the radio is the main innovation considered here, which is described in-depth in this tutorial. One of the main functionality of the cognitive engine is to sense and learn the radio environment, and in this context in this tutorial we present the fundamentals of CR technology, the new trends, standardization activities, and an in depth study of the spectrum sensing strategies, techniques and performance.


Tutorial Overview:


Part-1: Introduction to CR, background work, history and current developments, the cognitive cycle and the cognitive engine, standardization activities, future trends.


Part-2: Systems models and necessary mathematical background (statistical models or radio users, signals, and statistical detection techniques)


Part-3: Spectrum sensing techniques for cognitive radios, local sensing, cooperative sensing, distributed sensing, temporal sensing and joint sensing and localization of radio users.


Part-4: Conclusion, open research and technical challenges, open discussion.


3.4c Update: Defence Training and Experimentation Network (DTEN) and C2 Collective Training (top)


Presenter:  Mr James McRae & Mr Allan Deacon, Joint Operations Command

                Click here for PDF


The Australian Defence Forces' Defence Training and Experimentation Network (DTEN) is a classified national network for supporting distributed simulation, exercises, experimentation and other events.  A key characteristic of the DTEN is its persistent connection to the US managed Joint Training Enterprise Network (JTEN).


Managed by the Joint and Combined Training Capability (JCTC), the DTEN has achieved several milestones in the last 24 months.  These significant advancements have been both technical and policy related, all focused on enhancing the methodology of ‘train as you fight’.


Anyone in Defence who conducts or supports exercises and experimentation should be familiar with the DTEN.

The presentation will describe the DTEN, how the network is managed with key stakeholders such as CIOG and US DoD.


Applying the DTEN as it expands to Command and Control (C2) collective training is an emerging task for JCTC.  A driver for this task is the new amphibious capability that requires joint and combined C2 collective training to the JTF/DJFHQ/HQJOC training audience.  The significant need for C2 collective training in the Australian Defence Force will be described and how JCTC plans to deliver this through simulation based Command Post Exercises will be discussed.


3.5a Tutorial: Tactical Information Exchange Domain (TIED) Interoperability Planning and Sustainment (top)


Presenter:  Mr Kym Fisher, Head Interoperability Cell, ADFTA

                Click here for PDF


The TIED Policy is contained in Defence Instruction General 6.5.001, which states ‘Interoperability is critical to the effectiveness of the ADF’s TIED’. This is achieved by compliance with agreed standards and formats for interoperable transmission of data over a Tactical Data Link (TDL) or connected networks.’  More specifically some of the key TIED policy statements include: ‘All Defence personnel developing, managing, operating and supporting the TIED:

must develop systems to conform to the TIED development and interoperability priorities;must implement and comply with the approved version of the TIED standards, specifications and manuals listed in Australian Defence Force Communications Instruction (ADFCI) 6.2.4—Tactical Information Exchange Domain until documented in the Approved Technical Standards List (ATSL);must use the interoperability assurance processes for TIED projects and systems as detailed in ADFCI 6.2.4; and

·         must not operate any system that has not passed the TIED interoperability assurance and registration process  - as detailed in the ADF TDL Interoperability Requirements Guide (IRG).

TIED interoperability is achieved through the exchange of valid and unambiguous tactical information in real time, or as near to real time as the information exchange requirement demands.  Enablers of this capability include tactical data links, message formatting, common architecture, common engineering and operational standards, suitable communications bearers, and the tactics, techniques and procedures necessary to achieve the effects. 

The related enablers must be developed in unison, not in isolation.  The track record in achieving Joint TIE Interoperability is varied, largely due to the project centric approach to capability development, that severely restricts the requisite ‘System-of-Systems’ development needed to achieve interoperability.

Key factors are:  

projects procuring ‘elements’ of systems that were not designed to interface with other TIE capabilities in the ADF,procuring capabilities with TIE systems that cannot be tailored to meet ADF requirementslatent systems not being upgraded to meet interoperability requirements with emerging capabilities; and

·         a ‘single’ service approach that does not adequately address joint or combined TIE requirements.

This can be attributed to: expediency, ignorance, perceptions of cost or time penalties or not fully understanding the interoperability requirement.  It is not assisted by the view that TIE interoperability can be ‘fixed later’. The Defence Capability Development Manual (DCDM) devotes considerable text to the overall concepts of interoperability.  The policy in the DCDM for consideration of interoperability is clear: ‘The ADF needs to be able to operate effectively as a joint force, and also to be interoperable with allies’.


To realise the benefits of a networked force, a high level of TIE interoperability is required, otherwise the collective capability effects of the ADF’s TIE environment will never be fully realised.


This brief identifies: the core components of TIE interoperability, the TIE enablers, the relevant attributes, associated interoperability pitfalls, and overviews the TIED interoperability assurance process.


3.5b Update: Information Interoperability (top)


Presenter:  Mr Michael Stewart, CIOG IPP

                Click here for PDF


Many politicians, military personal and civilian military contractors use the term ‘interoperability’ as a definitive statement of requirements, as if the mere mention of the term is sufficient to ensure ‘systems’ will interoperate.  I will make some broad statements for discussion:


Defence White Paper 2009 makes mention of ‘interoperability’ in thirteen separate paragraphs, only one of which clarifies the term in relation to people/systems/infrastructure or processes (para 8.65) and none which quantifies the term in regard to a level of interoperability. 


Since 1999, the ADF has had 16 major interoperability reviews/investigations/assessments and all have been unsuccessful.


The real problems with interoperability are not technical – it’s the people who are the problem, because most CIS are only extensions of the people who wrote them and for people to understand each other, not only must they be able to exchange words with each other, but they must agree about what those words mean, and


Instead of solving interoperability problems we should focus more effort on avoiding the problems in the first place.  To quote Albert Einstein: ‘Intellectuals solve problems, geniuses prevent them’.


So, a number of problems and a couple of likely solutions:


•         Use an architectural framework to solve the interoperability problems before they manifest themselves – Enterprise Architecture,

•         Use a model for interoperability that allows people to define a level of interoperability – LISI.  The DIEC in 2004 approved LISI for use in the ADF and it is now part of the ADF’s doctrine in ADFP 6.0, and

•         Establish an Australian Defence Interoperability and Information Exchange Office (ADII) to specifically address the exchange and interoperability of information in the Battlespace, or more specifically, the information exchanged on the Joint Data Networks, with emphasis on Army systems being introduced in the near future


It is time to stop the arguments and agree to proceed along the EA/LISI/ADIIO road until technology can solve the system interoperability problems we suffer now and in the foreseeable future.


3.5c Update: The Australian Joint Fires Battlelab Capability (top)


Presenter: GPCAPT Antony Martin, Director Battlespace Integration, Joint Capability Coordination

                Click here for PDF


Australia has developed a Joint Fires Battlelab capability at BSC-Enoggera to support training, exercises and experimentation. The Joint Fires Battlelab implements the ADF Joint Fires applications including: AFATDS, AMDWS, BMS-C2, JADOCS, TBMCS, GCCS-J, and C2PC. The Joint Fires Battlelab can be networked over either CFBLNet or DTEN/JTEN enabling distributed activities with other battlelabs either within Australia or with Coalition partners.


The purpose of the Joint Fires Battlelab is to enable the ADF to examine and test new socio-technical configurations for conducting Joint Fires enabled by digital systems. The first experiment to be conducted in the Joint Fires Battlelab is a TTCP CAGE II experiment to be conducted in November 2012.


This experiment will focus on the SACC/JOR onboard the LHD and will examine:

the utility of the digital joint fires systems in this environment;the development of a recognized land picture (in partnership with LAND75 and LNIC);the development of a tactical air picture; andthe development of an end-to-end targeting capability from DTCS to AFATDS to JADOCS to the intelligence preparation of the battlespace, particularly for time sensitive targeting.


The CAGE II experiment is being conducted as a distributed simulation where each nation develops the sims for their AO, with the exchange of entities as assets cross the AO boundaries, the simulations for these systems are being developed in partnership with Army Sim Wing. The CAGE II experiment then tests both Joint Fires operational systems interoperability as well as simulation interoperability. Future CAGE experiments may examine the peer to peer interactions across multiple joint fires C2 nodes, for example the SACC/JOR interacting with a BDE JFECC and the AOC.


With the infrastructure being developed these Joint Fires C2 nodes could either be located in separate rooms at BSC-Enoggera or at different battlelabs (eg HMAS Watson, AOC Battlelab) networked over either CFBLNet or DTEN/JTEN.


3.6a Product Brief: Driving down Size, Weight and Power in the Tactical Networking and Satcoms Space (top)


Presenters:  Mr Phil Sayers, SVP International, & Mr Simon Ascott, Head of Technical Strategy, Vocality

                Click here for PDF


Vocality, whose routers and voice solutions are used by ADF, Australian Government, and NZDF, are presenting their new cutting edge developments in the field of tactical network communications.


In the United Kingdom, Vocality s solutions are widely used by MoD in Land, Sea and Air, both direct and via partners such as Paradigm Services. Vocality s routers also form the core of one of the UK s largest deployed tactical IP applications. Worldwide, Vocality has a strong user-base in Special Forces and first-in communicator sectors   anything from providing communications to government leaders in the sky to the demanding world of secure communications on submarines.


So why are tactical users selecting Vocality instead of an established mainstream router solution?


The answer comes through Vocality s focus on the needs of the warfighter, the fast responder and the user facing size, weight and power challenges.


During this session, the presenter will take the audience on a journey of size, weight and power reduction, taking the fast responder from a position where they are bringing in comms vehicles to the point where they have a complete tactical communication solution in the palm of their hand. Users can now have voice, VoIP, radio over IP, network applications, satellite aware routing and compatibility with tactical voice and data systems in equipment more compact than ever before.


Through the process of size reduction, Vocality has continued to keep an eye on the needs of the tactical systems providers, delivering to the international markets a kit of parts for their own systems to use, while in the UK and now in Australia, providing a fully integrated platform for dual enclave communications provision, making Vocality the only platform with a major installed-base in Europe and America, now available in Australia and New Zealand. We will be giving the ADF and the audience the very first view of the new tactical communications platform, Fusion, developed specifically for the Special Forces and first responder community.


Vocality   Efficient Networks. Efficient in Size, Weight, Power and Bandwidth.


3.6b Update: Aligning Innovation With the Enterprise to Enable Agencies to Help Keep Pace With Commercial IT Evolution (top)


Presenter:  Mr Curt Aubley, VP /CTO of NexGen Cyber Innovation & Technology, Lockheed Martin

                Presentation not available


The evolution of IT is accelerating faster and faster due to the introduction and relevant capabilities such as Cloud that now enables any organisation to be as big as they need to be, Big Data that enables the end users to find more useful information more quickly and cheaper in order to make better decisions and finally mobility that enables the true anytime, anywhere access to information.   For Government, this acceleration is stretching what industry is capable of providing and what Agencies are able to successfully implement.  Although it appears as though getting started down the road with any of these technologies is easy, it still needs to align closely to the goals, risk appetite and overall business strategy of any organisation and even more so in today’s environment of affordability and low risk profiles that most Agencies now have. 


Curt will discuss a strategy that will be used to align what industry has to offer to the goals of an organisation that uses a self-funding business model that can bring in new capabilities in a safe and affordable manner.  



3.6c Update: The Kill Chain and the Advanced Persistent Threat, What You Need to Understand to Better Protect Your Environment (top)


Presenter:  Mr John Hall, Lockheed Martin

                Click here for PDF


80 % of cyber threats are relatively straight forward.  Defending against them takes planning, infrastructure and discipline. But there is another 20% that are incredibly sophisticated.  Advanced Persistent Threat, commonly referred to as APT, is a phrase coined by the US DoD to describe a class of very sophisticated threats has plagued the US military and Defence Industrial Base and has now moved to critical infrastructure.  These are well trained and well-resourced adversaries that conduct multi-year intrusion campaigns targeting economic, proprietary and national security information. They are advanced, meaning their tactics typically evade detection from commercially available technology and they will respond to the tactics of defenders. Persistent means that they will stop at nothing to achieve their goals.


This conversation is about how Lockheed defends the advanced persistent threat. Intelligence driven network defence is a risk management strategy that addresses the threat components of risk, incorporating analysis of adversaries, their capabilities, objectives, doctrine and limitations.  The talk will put some context around what it is we defend, describe the evolution of our security posture towards an intelligence driven approach and the benefits we have obtained from employing this approach. Along the way I’ll describe the defence in depth approach we draw from what we call the cyber kill chain.


3.7a Product Brief: SharePoint 2010 Collaboration in Low Bandwidth Environments  (top)


Presenter:  Mr James Milne, CTO and Founder, Myriad Technologies

                Click here for PDF


Myriad Technologies is an Australian Industry leader in the development of services and solutions that incorporate Microsoft SharePoint’s wide range of capabilities – improving communications, leveraging information and encouraging knowledge-sharing cultures. We specialise in collaboration, content, business forms and workflow, search and business intelligence for large organisations from across a number of industries.


The purpose of this product brief is to demonstrate how, from a technical perspective, it is possible to deliver, without having to move entire documents or expose the configuration and technical solution, to access shared information using a reliable and accurate replication system across disparate sites with varying network reliability. This functionality alongside the other features of this solution assists in providing continuity of operations across the organisation no matter the distance or situation.  


For remote users having full access to their intranet is of critical concern.  Data replication can provide all users in remote areas from a fixed site to a laptop in the field access to a virtualised intranet, with all the usability and functionality of the last synchronisation at HQ. This allows for the end user to have access to critical information that would normally be out of reach on the organisations intranet to be made available in the field, be it strategic or procedural in nature. 


In particular, this is essential when dealing with logistical processes, munitions handling guidelines or looking for information on training for specific hardware in the field.  If the answer can be found on the local intranet, then it can be found in the virtual copy in the field, carried on a ruggedized laptop.


Fidelity of an organisation's data is of paramount concern to decision makers, both at home and when on deployment.  In this session, we will discuss a case of replication technologies being used in the field, from a fixed high bandwidth connection to a remote deployed location with intermittent connectivity and how these issues were overcome.


3.7b Update: Spectrum as a Battlespace (top)


Presenter:  Mr Ian Layzell, Defence Spectrum Office

                Click here for PDF


The Department of Defence is the largest single user of radiofrequency (RF) spectrum in Australia. Defence has over 6,000 radiocommunications licenses that enable over 21,000 frequency assignments to be made to Defence users. These assignments authorise the operation of hundreds of diverse systems from combat net radios to surveillance radars. Demand for spectrum from all sectors of the Australian economy is increasing pressure for Defence to make spectrum available for civilian use. At the same time, the spectrum requirements of Defence capabilities are increasing.


In order to manage this complexity and allow the ADF to manage spectrum as part of the battlespace the DSO is bringing in to service a number of spectrum management and planning software tools for ADF use.  These tools are Spectrum XXI ( Spectrum twenty-one ), SPEED and AESOP.


Spectrum XXI is an automated spectrum management tool that supports spectrum planning as well as near real-time management of radiofrequency spectrum with emphasis on assigning compatible frequencies and performing spectrum engineering tasks.


Systems Planning Engineering & Evaluation Device (SPEED) allows communications planners and frequency managers at the tactical level with a set of tools that can perform a wide range of communications planning and engineering to support a rapidly changing tactical environment.    


Afloat Electromagnetic Spectrum Operations Program (AESOP) is an integrated operational radar, combat system, and communications frequency planning tool.  AESOP is being sought by the Royal Australian Navy to cater for both current and future major fleet units, especially the Landing Helicopter Dock and Air Warfare Destroyer.


3.7c Product Brief: Optical LANs in Government—A Case Study (top)


Presenter:  Thomas Ruvarac, Director Access Product Management and Marketing, Tellabs

                Presentation not available


Tellabs is the industry leading supplier of Optical LAN solutions.  Tellabs' innovation has enabled a revolution in how local area networks are deployed.  By using Optical LAN solutions and single mode fiber, enterprises and government agencies can now reduce their capital spending by up to 70%, associated power utilization by up to 80%, and space by 90%.  In recent years, every agency within the US Department of Defense has deployed Tellabs Optical LAN solutions, along with many more civilian government agencies.  This presentation will provide an overview of Tellabs Optical LAN solutions and review a recent case study showing measured savings in a US Government agency deployment.



3.8a Tutorial: Cyber Security Course for Senior Decision Makers - “Why should I care about Cyber Security?” (top)


Presenter: Mr Ray Kinard, Director of the Northrop Grumman Cyber Academy

                Click here for PDF


As an executive or decision maker, you must determine how to best manage risk and protect your networks, infrastructure and critical data. In the end, being able to trust the data, that you need and leverage every day and the networks that support that data is essential for your mission success.


In this two-hour awareness presentation, Ray Kinard, the Director of the Northrop Grumman Cyber Academy will share a high-level overview of Cybersecurity and its impact on your organization.  After attending this course you will walk away with a sound understanding of the cyber threat landscape including the Advanced Persistent Threat (APT), attack methodologies and includes demonstrations of techniques and tools hackers utilize to gain access to computer systems and leverage vulnerabilities in networks to exploit, manipulate, damage and/or exfiltrate sensitive data.   It will provide insight into sound defense methodologies and how to protect your organization from vicious cyber attacks by preparing reliable defense mechanisms.


In addition, the presentation will provide ideas and recommendations on secure architectural design and strategies for implementation to include the integration of SANS 20 Critical Controls, CyCapeTM  and The Northrop Grumman defense-in-Depth FANTM.


3.8c Product Brief: Innovative Anti-Tamper Data Storage Technologies (top)


Presenters:  Mr Peter James, Chief Technology Officer, Secure Systems Limited

                Click here for PDF

  & Mr John Leiseboer, Chief Technology Officer, Quintessence Labs Pty Ltd

                Click here for PDF


The Defence Material Organisation has identified ‘Anti-Tampering’ capabilities as a Priority Industry Capability (PIC).  The award of ‘Anti-Tampering’ PIC Innovation Program funding to both Secure Systems and QuintessenceLabs (QLabs) confirms the importance of the capability to Defence.  Secure Systems and QLabs have complementary anti-tamper capabilities and are both working together and separately to commercialise their respective technology.


Secure Systems will present and demonstrate its Silicon Data Vault High Assurance range (SDV HA), a secure portable execution and storage device currently being evaluated by the Defence Signals Directorate to protect Top Secret data yet allow the device to be handled as For Official Use Only when it is unpowered; stored Secret data can also be handled as Unclassified when the device is not powered.  The SDV HA incorporates three anti-tamper boundaries, Suite B encryption, strong key management, multiple modes of operation, two-factor pre-boot and post-boot authentication and both eSATA and USB connectivity.


QLabs will present the core elements of its Cyber Security Product Family (CSPF), and show how these, when combined with a Virtual Zeroisation Storage Device (VZSD) provide a secure data collection, distribution, and recovery system that is immune from algorithmic and computational attacks, regardless of an adversary’s capabilities. Two key components of the CSPF that enable this capability are a multi-Gbit/s true random number generator (RNG), based on novel quantum technology, and a key management system (KMS) with centralised policy control that securely generates, stores, distributes, and manages the lifecycle of cryptographic key material.


Secure Systems and QLabs are working together to develop a Virtual Zeroisation Storage System, comprising SDV technology and VZSD, RNG, and KMS.  By using the one-time pad cipher, and securely erasing key material as it is consumed, the VZD is equivalent to a zeroised disk.


3.9a Tutorial: Multiple-Input Multiple-Output (MIMO) Radar: From Distributed to Co-located Antennas (top)


Presenter:  Dr Mark Reed, UNSW Canberra

                Presentation not available


Radar systems are traditionally developed using digital phased array methods to perform beam forming.  With the advent of Multiple-Input Multiple-Output (MIMO) from the wireless communications community the opportunity has arisen to utilise this technology for Radar systems.  This tutorial will introduce the topic and the motivation for MIMO Radar before spending time discussing both the distributed and co-located variants.  System models and the key assumptions and configuration will be discussed, including a comparison to phased array radar.  The current status of the research will be explored and the research and development challenges will be discussed, specifically to do with hardware realisation.  Finally a look into the future of MIMO Radar will be discussed.