UK Intelligence Community Postdoctoral Research Fellowships 2021 - Applicant guidance notes

Page created by Sean Shaw
 
CONTINUE READING
UK Intelligence Community Postdoctoral Research Fellowships 2021 - Applicant guidance notes
UK Intelligence Community
       Postdoctoral Research
          Fellowships 2021
                        Applicant guidance notes
                           Deadline 19 April 2021

© This is Engineering
UK Intelligence Community Postdoctoral Research Fellowships 2021 - Applicant guidance notes
Contents
Click a section below

Introduction 3
Diversity and inclusion 4
Part-time and flexible working 4
Submission deadline 4
Eligibility criteria 5
Mentoring and monitoring 6
Duration 6
How to apply 7
Completing the application form 8
Assessment process and criteria 17
Research topics 2021 18

                         2
UK Intelligence Community Postdoctoral Research Fellowships 2021 - Applicant guidance notes
Introduction
The Government Office for Science offers UK Intelligence Community (IC) Postdoctoral
Research Fellowships to outstanding early career science or engineering researchers. These
Research Fellowships are designed to promote unclassified basic research in areas of interest
to the intelligence, security, and defence communities. The Centre for Protection of National
Infrastructure, Department for Transport, Defence Science and Technology Laboratory, Home
Office, and the National Cyber Security Centre are among the organisations represented in
the UK Intelligence Community for the Postdoctoral Research Fellowships.

Members of the IC identify research topics and the Research Fellows work locally with
University Research Advisors to develop and submit research proposals that align with the
topics. The research is conducted by the Research Fellows while working in partnership with
the University Research Advisor and collaborating with an advisor from the Intelligence
Community (IC Advisor). The Research Fellowships are aimed at early career researchers from
all branches of science and engineering who have up to five years postdoctoral experience.
Each application for the UK IC Postdoctoral Research Fellowships is capped at a maximum
grant of £200,000 over a 2-year period.

                                                                             © This is Engineering

                                              3
UK Intelligence Community Postdoctoral Research Fellowships 2021 - Applicant guidance notes
Diversity and inclusion
The Royal Academy of Engineering is committed to diversity and inclusion and welcomes
applications from all underrepresented groups across engineering. It is the Academy's policy
to ensure that no applicant is disadvantaged or receives less favourable treatment because
of age, disability, gender reassignment, marriage and civil partnership, pregnancy and
maternity, race, religion or belief, sex or sexual orientation.

Part-time and
flexible working
The Academy wants to support applicants to achieve a balance between their personal and
work demands, and will consider individual requirements and part-time and other flexible
working arrangements.

UK IC Postdoctoral Research Fellowships can be held part-time, but must be the only source
of employment. The request for a part-time Research Fellowship (at no less than 50% of
full-time equivalent) must be made clear within the application. Alternatively, the Research
Fellowship can be converted from full time to part time, or from part time to full time, during
the fellowship, assuming the host institution’s HR department supports the request.

Research Fellows are entitled to maternity, paternity and adoption leave under the host
institution’s normal conditions of employment. The Academy will extend the duration of the
Research Fellowship pro-rata to take into account such periods of leave and any conversions
to part-time working. Research Fellows with caring responsibilities should liaise directly with
the host institution if they wish to apply for part-time or flexible working.

Submission deadline
There is one application round each year. The online application system for the 2021 round
will be open on 25 January 2021. The submission deadline for the 2021 round will be 4pm on
Monday 19 April 2021. Applicants will be informed of the result by July 2021.

                                               4
Eligibility criteria
1. UK IC Postdoctoral Research Fellowship              Requests for a shorter UK IC Postdoctoral
        must be held at a UK higher education               Research Fellowship are not accepted.
        institution/university in a department that
                                                          8. UK IC Postdoctoral Research Fellows will
        can show it is capable of fully supporting
                                                              be employed by the host institution and
        the research project and researcher.
                                                              are required to devote all their working
2. It is the responsibility of the applicant to             time to the Research Fellowship. The UK
   contact the host institution and gain the                  IC Postdoctoral Research Fellowship must
   formal approval from the relevant head of                  be the Research Fellow’s only source of
   department or school before submitting                     employment.
   an application.
                                                          9. There are no nationality and age
3. The proposed research project must                        restrictions for applicants. The host
    address one of the research topics outlined               institution is responsible for securing
    at the end of this document.
                                                              all necessary work permits and related
4. UK IC Postdoctoral Research Fellowships                   costs for the UK IC Postdoctoral Research
    are aimed at early-career researchers.                    Fellows.
    Applicants must have a PhD, which was
                                                          10. Applicants who have applied to this
    awarded no more than five years before
                                                               scheme before and were unsuccessful
    the submission deadline: Monday 19 April
                                                               are eligible to reapply.
    2021. This time period includes applicants’
    work experience in academia or/and in                 11. No security vetting is required as part
    industry. A margin of up to three months                   of the UK IC Postdoctoral Research
    more than the five-year limit is acceptable.               Fellowship scheme, but by applying to this
    If applicants have had maternity/paternity                 scheme the applicant is agreeing to be
    leave or other extenuating circumstances,                  vetted if it becomes necessary during the
    this will be taken into consideration if the               research fellowship. Applicants are asked
    relevant dates and details are provided in                 to declare any reasons why they might
    the application form.                                      not be eligible to work in this area (see
                                                               Statement of Support and Declaration in
5. PhD students are eligible to apply, but
                                                               the application form). If security vetting is
    must have been awarded their PhD (or
    the PhD has been unconditionally                           required and the Research Fellow does not
    approved) before 01 August 2021 or the                     meet the security vetting requirement, the
    offer will be withdrawn.                                   UK IC Postdoctoral Research Fellowship
                                                               award will be withdrawn.
6. The applicant must not hold a permanent
    academic position before the start of the             12. Any applications that are incomplete or
    UK IC Postdoctoral Research Fellowship.                    do not adhere to the guidance will be
                                                               rejected.
7. UK IC Postdoctoral Research Fellowships
    must commence between 01 October 2021
    and 01 December 2021. The duration of a
    UK IC Postdoctoral Research Fellowship
    is two years full-time, calculated on a
    pro-rata basis for part-time awards.

                                                      5
Mentoring
and monitoring
The scheme’s programme manager will work with each UK IC Postdoctoral Research Fellow
to identify an Academy Fellow to be their mentor. The mentor will support and provide
independent expert advice throughout the research fellowship about research and career
development. In addition, UK IC Postdoctoral Research Fellows will be supplied with an
Intelligence Community Advisor (IC Advisor), who will advise the awardee and the University
Research Advisor on the research project.

UK IC Postdoctoral Research Fellows must submit a progress report every three months
throughout the duration of the fellowship as well as an annual report at the end of each
year. The reports summarise the research accomplishments during the UK IC Postdoctoral
Research Fellowship, including publications, papers presented, conference participation,
and other aspects of the research outcomes. A template will be provided for the report.
The release of payments is dependent upon the receipt of reports by the Royal Academy of
Engineering. In addition, the Research Fellow, Academy representative and mentor will meet
annually to discuss the annual reports, identify progress being made and make plans. The
Research Fellows are responsible for arranging the annual progress report meetings with
their mentors.

The UK IC Postdoctoral Research Fellow will be invited to attend the US Annual IC Academic
Research Symposium during the period of the research fellowship.

Duration
UK IC Postdoctoral Research Fellowships are for a two-year period with an evaluation
after the first year. If the project warrants a third year of research and the Research Fellow,
University Research Advisor, and IC Advisor concur, the Research Fellow is required to submit
a supplemental research proposal. The proposal should not exceed three pages and must be
emailed to the Royal Academy of Engineering no later than 1 January of the second year of
research. This submission does not replace the annual reporting requirement. The
third-year extensions will be based on the quality of the research proposed and the availability
of funding.

                                               6
How to apply
All applications must be submitted via the            the number of words used will be displayed
Academy’s Grants Management System                    beneath the question and updated in real
(GMS) https://grants.raeng.org.uk.                    time.

All applicants must first register and provide        Applicants can download a pdf of their
some basic log-in details to create a profile.        application after submission, which is
Before completing the application form,               recommend for reference. There is only one
applicants are asked to complete a Diversity          application stage and those meeting the
Monitoring Form to help the Academy                   eligibility criteria will enter the assessment
monitor and assess its equality, diversity            stage.
and inclusion policy. The information will
be treated as strictly confidential, non-
attributable and only reported when collated.
It is gathered, stored, and used in compliance
with the Academy’s Privacy Notice in line
with the General Data Protection Regulations
2018. The information will only be used for
statistical purposes with access restricted to
staff involved in processing and monitoring
the data. It will not be seen by anyone
involved in any selection processes. No
information will be published or used in any
way that identifies individuals. The Academy
will retain personal information for six years.

The application form has six sections and
should take approximately one hour to
complete, assuming you have answered the
questions offline and merely need to enter
the information, rather than compose it. To
compose the application in its entirety will
take significantly longer.

A summary of the guidance notes is
imbedded within GMS. However, the
guidance given below is more detailed and
recommended.

Many of the questions have prescribed word
limits, which are designed to keep answers
focused and give applicants an indication
of the level of detail required. In such cases
                                                                                      © This is Engineering

                                                  7
Completing the
application form
After logging in and selecting ‘UK IC Postdoctoral Research Fellowships’, you should be
presented with the ‘Instructions’ window. Here you will see some general instructions on how
to use the system as well as the following sections of the application form:

1. Applicant and institution details
2. Applicant profile
3. Project details
4. Resources requested
5. Statement of support and declaration
6. Marketing

At any stage in the application process you can save your work and return to it later. You can
answer the questions in any order you like, so you can freely skip some sections and return to
them later. Please read the guidance provided in this document in detail, so you know exactly
what is required in each section. You should also ensure that you have all the necessary
documentation to complete the application, such as a copy of your CV and supporting letters.

1. Applicant and institution details
Please provide your name and preferred correspondence details. You should also provide the
details of the host university, where the UK IC Postdoctoral Research Fellowship will be held
and confirm that this is the ‘lead’ organisation.

2. Applicant profile
This section requests details as to your suitability and eligibility for the Research Fellowship.
You will need to answer some general questions on your experience and upload your CV.

Q. What date was/will your PhD Certificate awarded?
Applicants must have a PhD, which was awarded no more than five years prior to the
submission deadline (19 April 2021). PhD students are eligible to apply, but must have been
awarded their PhD (or PhD has been unconditionally approved) before 01 August 2021. Please
enter the date your PhD Certificate was awarded or the date your PhD was unconditionally
approved by the university. If you have not yet received your PhD, please provide an estimate
of when it will be awarded or unconditionally approved.

Q. Extenuating circumstance (optional question)
Should your PhD Certificate have been awarded more than five years prior to the submission
deadline (19 April 2021), please provide details of the circumstances. Please cover any periods
of maternity/paternity leave, extended sick leave, national service, or other activity that you

                                                 8
feel should be considered when assessing your eligibility for the UK IC Postdoctoral Research
Fellowship. The Academy’s decision on eligibility is final.

Q. Do you currently hold a permanent academic position?
Applicants must not hold a permanent academic position before the start of the Research
Fellowship.

Q. Please upload your CV
The format and content of your CV is left to your discretion, but should include a list of
publications. You may wish to indicate which publications you deem most significant and
include a link to any that are open access. You do not need to include contact details as
these are included earlier in the application form. Please also avoid personal information
(e.g. gender, date of birth and nationality) in the CV. Your CV must not exceed three pages
and should be submitted as a PDF. Any pages beyond page three will be removed prior to
review.

Q. Impact of COVID-19 (optional question)
The Academy understands that the impact of the coronavirus pandemic on researchers
and their work will be varied. If you wish, please provide a summary of how the pandemic
has affected your research profile development that reviewers and panel members should
consider. Reviewers and panel members will be advised to take into consideration the
unequal impacts that COVID-19 related disruptions might have had on individuals.

The impact can include, but is not limited to, the following examples: pause on experiments/
research plans, reduced ability to work due to additional caring responsibilities, delays
in publishing/submitting a key paper(s) (please note pre-prints can be included in your
publications list). You have 500 words to answer this question.

3. Project details
Q. Research topic
Please select one of the research topics relevant to your application from the drop-down list.

Q. Project title
Enter a title for your research project. This will be used in communications should your
application be successful. Please use no more than ten words and ensure that it is
understandable to a non-specialist reader.

Q. Abstract
Describe the research in terms that can be understood by a non-specialist reader. What
similar research is being/has been undertaken nationally and internationally, and how does
your project differ. You have 300 words for this section.

Q. Statement of problem
A brief outline of the basic facts of the problem, explain why the problem matters, and
pinpoint a solution as quickly and directly as possible. You have 200 words for this section.

                                               9
Q. Background and relevance to previous work
Sufficient details should be given in this discussion (1) to make clear what the research
problem is and exactly what has been accomplished; (2) to give evidence of your own
competence in the field; and (3) to show why the previous work needs to be continued. You
have 1000 words for this section.

Q. General methodology
Please provide a detailed description of the exact work to be completed. Describe the
programme of work, indicating the research to be undertaken and the milestones that can
be used to measure progress. Detail the methodology to be used in pursuit of the research
and justify this choice. What similar research is being/has been undertaken nationally and
internationally, and how does your project differ? You have 1000 words for this section.

Q. Explanation of new or unusual techniques
If you are using any techniques that are not standard in the area of research proposed, please
explain the technique and the rational for using it. You have 500 words for this section.

Q. Expected results and their significance and application
Describe what you expect to get out of the research. It should join the data analysis and
possible outcomes to the theory and questions that you have raised. Summarize the
significance of the work and proposed applications. You have 1000 words for this section.

Q. Diversity and inclusion
The Royal Academy of Engineering strives to create cultures in which everyone can thrive,
and we believe that diverse perspectives enrich our collective performance. What does
diversity and inclusion mean to you and your research, and what are you and your team doing
to address it? Consider your team, collaborators and universities, the implications on your
research design and topic and the overall contribution this will have on your success. You
have 250 words for this section.

Q. Literature citations
List the reference material referred to in your proposal. Where possible include web-links to
any open access articles, to help reviewers in locating the articles quickly. You may want to
highlight the most relevant ones. You have 1000 words for this section.

Q. Images and diagrams
Upload any images and/or diagrams related to your project that add value to your application.
You should reference them in your response to the methodology and other questions. You
can upload a single pdf document only, so collate pages if necessary and ensure you order
them in the way you wish them to be viewed.

                                               10
4. Resources requested
Please see the relevant research grants office at your host institution for assistance with the
costs section. The below categories explain what costs should and should not be included
in your application. You must be able to demonstrate that the resources requested in this
application are justified and appropriate for delivering the proposed research.

Each application is capped at a maximum contribution from the Academy of £200,000
over the two-year period, at 80% of full economic costs.

4.1 Directly incurred costs
1) Staff
The UK IC Postdoctoral Research Fellowship’s aim is to support researchers at an early stage
of their research career. Salary should be at a level commensurate with skills, responsibilities,
expertise, and experience. It is expected that requested salary will be comparable to
postdoctoral researcher or early-stage lecturer salary scale points. The Academy reserves the
right to provide support at a different level if it is considered appropriate.
The Research Fellow’s salary can be requested for a period of two years full time equivalent.
Salary increments over the period of the Research Fellowship should be considered in
the costs, but possible future pay awards should not be anticipated. Please note that the
Academy does not pay inflation and inflation should not be applied to the costs. In addition,
the Academy is not able to cover the costs of the apprenticeship levy on research grants.
Salary costs do not need to be justified in the ‘Justification of costs’ section, but are expected
to be in line with the starting salaries of early-career researchers.

The UK IC Postdoctoral Research Fellowship may be held on a part-time basis (at no less than
50% of full-time equivalent) if the applicant is to be employed part time. Applicants wishing
to hold the award on a part-time basis must state the % time in the ‘Justification of costs’
section and explain why part-time working is requested. The costs table should be completed
as if it will be a two-year full-time research fellowship. This will be adjusted accordingly if the
award is offered.

Please note:
• No other staff salaries can be requested as part of a UK IC Postdoctoral Research Fellowship.
• The UK IC Postdoctoral Research Fellowship must be the Research Fellow’s only source of
   employment. The Research Fellows are encouraged to apply for other funding, but these
   grants should not include any components that require the Research Fellow to reduce their
   full-time working on the UK IC Postdoctoral Research Fellowship.

2) Travel and subsistence
You may request travel and subsistence costs for activities directly linked to the research
project if they are for the Research Fellow. You cannot request travel and subsistence costs for
anyone other than the Research Fellow.

Travel costs should be based on the most suitable and economical form of travel. Subsistence
costs should reflect the normal rates that apply in the host institution.

                                                 11
Costs for attending national and international conferences (including two visits to the US
Annual IC Academic Research Symposium) should also be included where such attendance
will directly benefit the research project. Conferences should, as far as possible, be individually
identified in the proposal with attendance costs and fees fully justified in the ‘Justification of
costs’ section.

3) Other Costs
Other costs should be specified and justified in the ‘Justification of costs’ with details
provided in terms of their requirement for the research project. Examples include purchase
or hire of small items of equipment, computer software licences, laboratory consumables,
purchase of specialist publications, publication/printing costs, professional membership
subscription fees or training costs. Unless the need for significant computing power can be
justified, no computer should cost more than £2,000 (including VAT) and you should not
request more than one computer over the UK IC Postdoctoral Research Fellowship.

Please note: The UK IC Postdoctoral Research Fellowship does not provide for any single
item of equipment or upgrade to existing equipment costing more than £3,000 (including
VAT). Should any item of equipment comprise multiple separate items that are purchased
individually and then combined to make a single functioning system, then the cost of the
entire system should not exceed the £3,000 limit.

The Research Fellows are expected to make full use of any equipment, which is already
available to them at the host institution and should therefore only request funding for
equipment that is necessary and not currently available.

4.2 Directly allocated costs
1) Estates
The Research Fellows may apply for estates costs over the entire duration of the UK IC
Postdoctoral Research Fellowship. Please consult with your proposed host institution for
guidance as to these costs. Estates costs do not require justification in the ‘Justification
of costs’ section. Where the Research Fellow will be away from the host institution for six
months or more in total, estates costs should not be requested for that period. In such
situations, this should be confirmed in the ‘Justification of costs’ section.

2) Other directly allocated
Other directly allocated costs can be requested, calculated on the basis of estimates and
should be justified in the ‘Justification of costs’ section. Potential costs include research/
technical staff whose time is shared across several projects and charge out costs for existing
equipment, for example access to departmental SEMs and analytical facilities. You cannot
request salary costs for specific technicians, but you can request pool technician time costs
for the host institution’s own facilities, equipment, and staff only.

Costs for major facilities not owned by the host institution, such as those supported by STFC,
cannot be requested. If such facilities are required for the project, the applicant should
contact the facility in question to determine access requirements. If access to a facility is
essential to the research programme and hence the UK IC Postdoctoral Research Fellowship,

                                                12
both access to and external funding for the cost of the facility must be secured within one
year of the proposed start date of the UK IC Postdoctoral Research Fellowship.

4.3 Indirect Costs
1) Indirect
Please consult with your host institution for guidance as to these costs. Research Fellows
may apply for indirect costs over the entire duration of the UK IC Postdoctoral Research
Fellowship. Indirect costs do not require justification in the ‘Justification of costs’ section.
Please refer to the efficiency savings published by RUCK in March 2011 when submitting your
figures for indirect costs. Your research office will be able to assist.

Q. Costs table
Applicants must consult the host institution’s research grants office to provide advice on
the cost elements that are required. The costs for UK IC Postdoctoral Research Fellowship
applications must be calculated using the full economic costing model (fEC). The Academy
provides 80% of the fEC for each UK IC Postdoctoral Research Fellowship – up to a
maximum of £200,000 for 2 years. The host institution is expected to provide the remaining
from its own funds or other grants. Please ensure that you allow plenty of time for your
research office to prepare these costings.

Please note: Some of the cells are auto-calculated and all values submitted should
be rounded up to the nearest pound.

Q. Justification of costs
Please provide a descriptive breakdown of the funding requested. Ensure you have adhered
to the guidance provided for allowable costs as detailed in this document. The justifications
should be a narrative description of what resources are being requested and why. It should
include:

• All necessary justifications for costs included in the costs table
• To what extent the equipment requested will be used by other researchers and what
   equipment you are not requesting funding for (or for which you are requesting funding at a
   reduced rate) because suitable equipment is already available to you
• What costs will be covered by other sources, for example industry or existing grants, so are
   not being requested as part of the application
• If relevant, an explanation of why you wish to work part time and at what rate. You have 500
   words for this section.

5. Statement of support and declaration
This section seeks confirmation that the applicant has provided accurate information and
will update the Academy of any material changes, which may affect the award. It should also
confirm that the host institution will support the UK IC Postdoctoral Research Fellowship. You
must upload all the additional documentation as per the details below and then tick the box
confirming the information provided is correct.

                                               13
Q. Research Advisor’s statement of support
The University Research Advisor must complete a statement in support of the application.
The statement should be a maximum of two pages and should confirm that they are willing
to act as a Research Advisor for the duration of the UK IC Postdoctoral Research Fellowship.

Q. Research Advisor’s CV
The CV must not exceed two pages, and should be submitted as a PDF.

Q. Host institution/university letter of support
The head of department or school, pro-vice-chancellor or dean at the host institution/
university must provide a statement in support of the application. The statement should be
on headed paper and signed. The deadline will not be extended for the relevant people/
person’s unavailability.

The statement should be a maximum of two pages and address the following areas:

Suitability of the applicant
• Quality of the applicant’s research track record
• Potential of the applicant to become a future leader in their chosen field
• Potential to act as an ambassador and advocate for the research

Support and commitment from the host university
• Alignment of the proposed research fellowship with university research strategy and
   priorities
• Details of mentoring and resources (e.g. laboratory equipment) that will be provided to the
   candidate, should the application be successful
• Other university activities (e.g. teaching, committees, etc.) the candidate will be expected to
   undertake
• Detail of the career development support that the applicant will be offered
• Details of how your institution adopts a proactive approach in encouraging researchers from
   underrepresented groups in engineering, especially women, to apply
• Evidence of your commitment to equality and diversity

Impact of COVID-19 on the host university’s support
The host university can use this letter of support to highlight the impact of the coronavirus
pandemic on their support for the UK IC Postdoctoral Research Fellowship if they wish.
Reviewers and panel members will be advised to take into consideration the unequal impacts
that COVID-19 related disruptions might have on the host university’s support for the research
fellowship.

The Academy and the Government Office for Science expect the host institutions to be
committed to and provide support that aligns with principles set out in The Concordat to
Support the Career Development of Researchers and The Concordat for Engaging the Public
with Research.

                                                14
Q. Host institution/university declaration
The declaration from the applicant’s host institution/university should be completed by an
appropriate officer/position from the central research grants office or equivalent. The letter
should be on headed paper and should carry the signatory’s name and position and the
institution/university’s official stamp (if applicable). The purpose is to check that the university
is in principle willing to host a Research Fellow, subject to contract. The letter must confirm
the application has been approved by the institution/university and must contain the exact
wording given in the box below, as well as any further remarks the university wishes to
make. The deadline will not be extended for the relevant people/person’s unavailability.

   On behalf of the institution/university I can confirm that I have read and accept the
   application guidance and other information regarding this award scheme, which is
   provided on the website of the Royal Academy of Engineering. I also confirm that:

   • The costs submitted in the application are correct and sufficient to complete the
      project as envisaged. Any shortfall in funding discovered after the award has been
      made will be covered by the university, potentially through other grants.
   • The applicant will be employed by the university for the duration of the award.
   • If awarded, the applicant will be given full access to the facilities, equipment,
      personnel, and funding as required by the application.
   • The applicant’s teaching and administrative duties will be restricted to enable them
      to dedicate their time to research.
   • We are aware that the UK IC Postdoctoral Research Fellowships scheme has
      non-standard intellectual property rights (IPR) conditions relating to or resulting
      from the proposed research. If proposal is recommended for funding, we will be
      ready to assess the IPR conditions in the offered award contract.
   •I am authorised to approve the submission of applications for funding and this
    application has successfully met all our internal approval procedures.

Q. Other support letters (optional)
Other letters of support must:
• Be on headed paper and clearly state who they are
• Be external collaborators so people and organisations NOT working at the host institution
   and its affiliates
• Be signed
• Confirm that the author knows the applicant
• Explain why they are interested in the project
• Provide details on what form the collaboration will take.
• Clearly demonstrates the nature of the collaboration and how it will be beneficial to the
   applicant and the project
• Be no more than two pages.

                                                 15
As reviewers are asked to assess these alongside your plans for collaboration, aim for quality
over quantity and keep the letters short and concise to better enable the reviewer to identify
the salient information. A bullet-point list of contributions is a highly effective method of
making the reviewers’ role easier. Please do not submit more than three relevant letters of
support and ensure they are collated into a single pdf document.

Q. Applicant declaration Part 1
No security vetting is required as part of the UK IC Postdoctoral Research Fellowship scheme,
but by applying to this scheme you are agreeing to be vetted if it becomes necessary during
the research fellowship. Please declare any reasons why you might not be eligible to work in
this area. If security vetting is required and the Research Fellow does not meet the security
vetting requirement, the UK IC Postdoctoral Research Fellowship award will be withdrawn.

Q. Applicant declaration Part 2
Please complete with your full name and position once you have read and understood the
declaration written in the application form.

6. Marketing
This section is optional, but helps the Academy to understand which of our marketing
materials are most successful at reaching the academic community and helps us to improve
our future communications work.

Once the entire application form is completed, a ‘submit application’ button will become
available. Please note that once submitted the application cannot be edited, but you may log-
in to view it from your GMS account. You may also want to print a copy of the application for
your record.

                                                                               © This is Engineering

                                               16
Assessment process
and criteria
The scheme has one-stage assessment process. Applications will be assessed by a review
panel consisting of the UK government intelligence, security, and defence community
members (under the auspices of the Government Office for Science). The panel will provide
comments against each of the following assessment criteria, the overall quality of the
application and make a recommendation on whether the applicant should be funded:

1. Candidate
Quality of the applicant’s research track record

2. Research quality and vision
Quality of the applicant’s research vision and novelty of the approach to the chosen
research topic

3. Impact
The potential contribution of the research to the UK government intelligence, security, and
defence community

4. Research environment
Quality and level of the host institution/university’s support and commitment to the research
fellow’s research project and their career development

For all queries please contact the Royal Academy of Engineering’s research programmes
team at research@raeng.org.uk

                                               17
Research
topics 2021

     18
An investigation of 5G technology and the threats it presents for the security
Topic 1    community and identification of countermeasure opportunities

           Intelligent, distributed, dynamic software defined RF spectrum sensor network
Topic 2    for detection and identification of devices in a dense RF environment

           Does utility monitoring improve or compromise security? Considering the
Topic 3    associated dilemma of carbon neutral agenda, balanced with the need to
           maintain security of assets and generated data

Topic 4    Machine learning inversion

Topic 5    Digital cities/countries for intelligence and investigative purposes

Topic 6    Cybersecurity model for visible light communications (VLC)

Topic 7    Cybersecurity of swarm robotics in smart cities

Topic 8    Satellite IoT communications

Topic 9    Mathematical approaches to complex imaging problems

Topic 10   Machine led discovery of novel materials for automated chemical synthesis

Topic 11   Predicting the unpredictable: Can you predict drone intent?

           What would Socrates think? The legal and ethical implications behind
Topic 12   autonomous drones and future aviation

           Low shot training and testing of machine learning algorithms for detection of
Topic 13   items of concern

           Eddy diffusion modelling for enhanced hazard assessments of exposures to
Topic 14   airborne toxic materials

Topic 15   Improving energy harvesting in IoT wireless sensor nodes

Topic 16   Automated intelligibility tests through the use of AI or novel algorithms

Topic 17   Detecting use of synthetic biology methods

           Cyber influence on behaviour change: prevalence, predictors, progress, and
Topic 18   prevention

           Autonomous control for small uninhabited air vehicles enabling monitoring of
Topic 19   infrastructure

Topic 20   Quantum engineering for quantum sensors

Topic 21   THz RF transmission for wideband atmospheric communications

                                               19
Topic 1
An investigation of 5G technology and the threats it presents for the security community
and identification of countermeasure opportunities

Key words: 5G; millimetre wave; radio physics; technical security; wireless sensing; pattern
recognition

Research topic description, including problem statement:
Modern and future wireless technologies, such as fifth generation (5G), are utilizing
increasingly higher frequencies extending into the millimetre wave and beyond with their
associated ability to support higher information bandwidths. The commercialization of this
technology is leading to the availability of low-cost RF sub systems and components at these
higher frequencies. This will mean, we will see an increase in technical threats operating
at these higher frequencies, which will be produced at a significantly lower cost with easy
deployment. This will mean the public, businesses and infrastructure are vulnerable to
cyber-attack. There is also a use case within airport security and screening techniques used
at border checkpoints. Therefore, we need to investigate what these threats are so that we
a) detect their presence and b) put effective counter measures in place to protect the public,
businesses, and national infrastructure.

The aim of the research is to:
• Explore how these frequencies and waveforms interact with electronic systems at a
   fundamental level
• Adapt 5G technology sub systems to demonstrate:
        - The technical surveillance vulnerabilities posed by these
        - Their application for countermeasures to detect threats
        - Provide advice and guidance to protect the public, businesses and national
           infrastructure and enhance security screening at airports/ border checkpoints.

Example approaches:
• There is a growing area of research that examines security and privacy concerns, identifying
   attack methods and identifying countermeasures to offer greater protection from such
   attacks. For example, there has been research to discover how audio from loudspeakers
   can be recovered from soundproof buildings due to the subtle disturbances they cause to
   RF transmitters such as widely available such as Wi-Fi. The research identifies the risk and
   then describes how to protect against this potential attack method. (Reference: “Acoustic
   Eavesdropping through Wireless Vibrometry” Teng Weiy, Shu Wangy, Anfu Zhou and Xinyu
   Zhangy University of Wisconsin - Madison, Institute of Computing Technology, Chinese
   Academy of Sciences)

• Research has also produced a series of portable screening prototypes mm Wave sensing.
   With potential applications for screening in prisons or at airports. (Reference: E-Eye: Hidden
   Electronics Recognition through mmWave Nonlinear Effects Zhengxiong Li1, Zhuolin Yang1,
   Chen Song1, Changzhi Li2, Zhengyu Peng3, Wenyao Xu1 1-CSE Department, SUNY University
   at Buffalo, Buffalo, NY, USA 2-ECE Department, Texas Tech University, Lubbock, TX, USA,
   3-Aptiv Corporation, Kokomo, IN, USA)

                                                20
Topic 2
Intelligent, distributed, dynamic software defined RF spectrum sensor network for
detection and identification of devices in a dense RF environment

Key words: RF (Radio Frequency); sensors; software; distributed networks; pattern recognition

Research topic description, including problem statement:
The rise of the Internet of Things has seen an increased use of wireless technologies to
provide connectivity between devices. These platforms are vulnerable to various types of
attack and authentication of devices, spoofing and detecting unauthorized transmissions
are a constant challenge. Some progress has been made to address this through device
fingerprinting, which identifies unique elements specific to a device. However, more work
is needed to provide greater security to our wireless network particularly in a dense RF
environment, where detection of malicious activity is challenging. This could make it even
more challenging to secure environments for legitimate devices.

This topic seeks to understand the dynamic RF landscape and build upon previous research
to detect and identify a specific radio among similar devices in a dense environment and
catalogue these accordingly. The ambition is to achieve an intelligent sensing capability
that can detect all devices operating in a dense RF environment and define its fingerprint
as legitimate or unauthorized adding it to a classifier. This will provide better security for the
public spaces from malicious activity. This will also benefit the security community better
protect their environments and could be of use to detect unauthorized devices in places such
as prisons.

The aim of the research is to:
• Build upon existing research in this field and develop a prototype for practical use to detect
   threats within the dynamic RF landscape
• Develop a means of identifying unauthorized devices through effective fingerprinting.
• Develop a classifier to identify unique signatures for devices that is robust enough to work
   in a dynamic environment.
• Develop counter measure approaches for unauthorized devices, such as denial of service or
   location to enable recovery/ proactive investigations.

Example approaches:
Some pioneering early investigative work examined the concept of radio fingerprinting,
detecting specific devices in a distance ranging between 2ft to 50ft using deep learning
convolutional neural networks. This has also built upon previous research examining device
fingerprinting in wireless networks.

                                                21
Topic 3
Does utility monitoring improve or compromise security? Considering the associated
dilemma of carbon neutral agenda, balanced with the need to maintain Security of assets
and generated data

Key words: cyber security; energy analytics; carbon friendly; psychology; patterns of life;
estate management; IoT security

Research topic description, including problem statement:
The UK Government has set out its agenda for carbon neutrality and the focus has steered
towards creating carbon efficient products for building construction/ upgrade and secondly
on greater use of utility monitoring and modifying behaviours of the associated occupants of
buildings to reduce energy consumption.

This topic seeks to understand the associated security risks (and opportunities) to be gained
from utility monitoring. Does this enable us to have greater security of buildings or not?
Furthermore, do we understand if there are any security risks associated with the new
recommended building materials.

Utility monitoring/ fabrication of materials is part of the on premise IoT landscape and any
development in this environment should ideally offer security assurance.

The aim of the research is to:
• Build upon existing research in this field to understand the security risks
• Develop counter measure approaches to protect our assets and data generated
• Provide a balanced risk approach with implementation of monitoring devices (data)
• Cognizance/ awareness of security risks associated with introduction of new carbon
   efficiency construction materials or devices into the property.

Example approaches:
• A commercial example is smart metering of utilities and making recommendations to
   achieve a reduction of energy usage or more efficient means of usage by users or occupants
   within the monitored environment.

• Potential for identifying ‘pattern of life’ via simple utility monitoring as a positive side benefit
   to assist elderly or vulnerable persons living alone. Pattern of activity, inactivity.

                                                  22
Topic 4
Machine learning inversion

Key words: machine learning; artificial intelligence; model inversion

Research topic description, including problem statement:
Can a machine learning model be inverted to reveal the data it was trained on?

Machine learning (ML) is ubiquitous in the current landscape. It is often operating in
uncharted territory in terms of ethics and governance.

In supervised ML the model learns from an existing data set where the answer is known. This
may potentially use sensitive data to train on.

To what extent can this data be exposed across the many ML techniques? What data is
currently at risk and what threats and opportunities does this pose? Attempts to recreate
data from existing models has been published under the title model inversion but is not an
established field.

If risk is established what are the mitigating steps and what costs would they have?

Example approaches:
Publicly available models and data sets could be used to test problem. This would enable
work to be carried out with few initial barriers.

                                               23
Topic 5
Digital cities/countries for public safety

Key words: smart cities; digital twins; intelligence; subthreshold; modelling

Research topic description, including problem statement:
A digital twin is a virtual recreation of any systems. With the future rollout of Smart Cities this
presents the opportunity for incredibly detailed mapping of an entire town/City function. This
includes electrical systems to traffic flows, to pedestrian footfall. Visual mapping will likely
become prevalent with the cameras and sensors on autonomous and connected vehicles. A
National Digital Twin has already been proposed by Cambridge University’s Centre for Digital
Britain.

Digital Twins of cities already exist, notably in China. Such detailed mapping will be powered
by IoT (Internet of Things) and 5G.

Opportunity:
It seems highly likely that creating digital twins of cities and even the entire country, would
allow for extremely accurate mapping and modelling of events in real time, drawing in data
from a range of open source and classified material to support decision making and planning
from a public safety perspective. The combination with AI would allow for the efficient
deployment of emergency services to likely hotspots, identify high risk areas and also the
testing of variables to understand and predict reactions within a city to events, whether
natural or otherwise.

Possible steps:
Creation of a digital twin as a case study for law enforcement and the emergency services,
incorporating the relevant information and data streams. This would also require mapping
of what data is available and timely. An Agile approach would likely work best, small sprints
producing results that layer on one another. For example, twin a street, then a university
campus, then a borough etc.
Incorporation of behavioural analysis and relevant AI. For example, predicative aftershock
analysis (earthquakes) has been trailed by police to predict future crime hot spots.

Such a volume of data could be exploited by malicious actors, so it is important to understand
the vulnerabilities to digital twins and the threats posed by their misuse. The security of such
information should also be considered.

Example approaches:
Such a project will require a collaborative approach as it incorporates very technical data
but would also need detailed behavioural analysis drawing from a range of open source and
government data.

                                                24
Topic 6
Cybersecurity model for visible light communications (VLC)

Key words: visible light communications; Li-Fi

Research topic description, including problem statement:
Visible Light Communications continues to develop, with several Li-Fi products being
considered for use. However, we are missing a propagation model for visible light
communications that can be used as the foundation for cybersecurity risk modelling at the
physical layer. Such models exist for conventional radio, but these do not reliably extrapolate
to VLC because the physics of light interaction is different to radio. There are plenty of
analyses for propagation on co-operative paths (i.e., luminaire to user), but none that we have
seen that deals with luminaire to interceptor. The lack of basic science around cybersecurity
risk modelling means that network design using VLC is currently ‘vernacular’ – that is, based
on hearsay, speculation, and opinion. We need a solid reliable foundation that allows VLC
networks to be designed to a known cybersecurity risk.

Example approaches:
Indoor propagation model, from the perspective of an adversary, that can be re-expressed as
an intercept risk model.

                                                 25
Topic 7
Cybersecurity of swarm robotics in smart cities

Key words: robotics; smart cities; swarms

Research topic description, including problem statement:
Robotic systems may be used in smart city infrastructure and resource supply (water, power,
logistics, etc), smart manufacturing, unmanned transportation systems, and as robotic
assistants and companions. This is IoT operating dynamically in uncontrolled environments
off-grid, or with low bandwidth backhaul, or within restricted, isolated and/or constrained
physical environments. Issues in addition to conventional fixed IoT include assurance in the
field of robot operation to avoid harm, accident, or malicious performance degradation;
tamper detection on moving/transforming machinery; corruption of machine perception;
perversion of machine personality & behaviours; reliable secure mobile communications
(mesh/multimedia) in hostile environments; implications for personal data creation &
handling (in medical/personal applications, etc)

This research should consider the implications of cyberattack on robotic individuals and
swarms that are programmed to exhibit personalities (e.g., innate decision preferences in
response to risk) and behaviours (e.g., situation-adaptable actions and problem solutions).
It should consider the ways in which personality and behaviour may be implemented, and
the ways in which this is vulnerable to corruption through cyberattack. A key question is the
roles of robotic wisdom (contextual judgement) and ethics (as countermeasures).

Example approaches:
Demonstration of the types of cyber vulnerability of currently researched robotic behaviour
and personality models, and mitigation strategies using robotic wisdom and ethical models.

                                              26
Topic 8
Satellite IoT communications

Key words: satellite; internet of things (IoT); LoRaWan

Research topic description, including problem statement:
The Internet of Things (IoT) has now reached space, and start-up companies such as Lacuna
are hoping to roll out a service using modified LoRaWan that will allow users to transmit data
to a satellite from low power remote devices in locations that lack terrestrial infrastructure.
Applications amongst others include asset tracking (including vehicles, aircraft, and vessels),
wildlife conservation, climate change monitoring, situation awareness for disaster relief,
policing and border control.

The concept of worldwide universal IoT connectivity from remote locations normally not
serviced by terrestrial networks is potentially a game changer for so many applications
however this scheme will only offer one-way communication from the ground to the
spacecraft and the initiative is predicated on a modified stack/silicon so the IoT devices
must be specific to space transmission. This research topic aims to explore the theory,
practicality, and limits of operating native IoT communications waveforms for bi-directional
IoT communications to and from a low Earth orbit satellite. This focus on ground-based
technologies for satellite IoT will investigate radio waveforms and protocol designs,
maximising exploitation of entropy sources for secure cryptographic communications, and
constraints from necessary power saving/harvesting and ‘wake-up’ designs. Optimisation
is for power efficiency and endurance, and effective exploitation of channels with very low
link budgets. Low gain antennas with limited efficiency can be assumed to be a real-world
constraint of any practical system.

Example approaches:
As an example of possible inclusion in the research, ultra-narrowband as typified by SIGFOX
devices use a very low power transmitted waveform which coupled with digital processing
gain techniques are achieving communications over many tens of kilometres in terrestrial
applications. The questions the research would be addressing is could such a waveform
be used in a space application? What are the limits to its use given the constraints of link
budgets through the atmosphere and the effects of Doppler?

                                               27
Topic 9
Mathematical approaches to complex imaging problems

Key words: inverse problems; sensing; explosives detection; landmine detection; SAR
imaging; LiDAR; non-destructive testing; imaging; acoustic sensing; radar; electro-optics

Research topic description, including problem statement:
We are looking to apply new mathematical approaches to our sensing problems. We would
like to investigate the application of inverse problem solutions to data from a variety of
traditional sensors such as radar, electro-optic (EO), infrared (IR) and X-ray with the aim of
improving our ability to sense through complex media or multiple paths (e.g., through foliage,
walls, fog, and round corners). We are also interested in the fusion of data from different
modalities to improve solutions and information from inverse imaging problems.

The Defence, Security and Intelligence communities require capability development of novel
game-changing sensing modalities. Science & Technology (S&T) is growing faster than ever
before and has become a new domain of international competition. In order to counteract
this, a variety of sensing modalities are being used to give us insight for Intelligence,
Surveillance, Target Acquisition and Reconnaissance (ISTAR) purposes.

The physical phenomena occurring due to the interaction of Electromagnetic (EM) waves
and the scene adds to the complexity of the sensing problem. For example, in Synthetic
Aperture Radar (SAR), multi-path reflections cause difficulty in imaging through obscurants,
commonly urban and foliage areas. In EO/IR systems similar issues arise, particularly at low
photon flux, and further out in the EM spectrum, X-ray and Gamma-ray technologies are used
in non-destructive testing for security purposes.

Classically, the image formation techniques for various sensing modality datasets have
been limited to the data processing tools which were highly dependent on computational
power and storage. Due to the rise in efficient Size, Weight and Power (SWAP) sensors and
computing technology, it has allowed the development of processing and image formation
tools which were once deemed impossible. All such sensing modalities would benefit from
a Fellowship in the area of developing and implementing tools for processing data that
incorporates non-canonical imaging techniques to give Security and Defence the added
advantage it requires. Furthermore, data fusion from multiple sensors can be exploited so
that a single platform can do the work of multiple platforms and complement other sensing
data, e.g. SAR data can be fused with EO/IR data. A non-exhaustive list of government
departments interested in sensing modalities is mentioned hereunder:
• Multistatic SAR Imaging and Ground-Penetrating Radar (Ministry of Defence [MoD]);
• EO/IR Imaging (Home Office [HO] / MoD / Department of Transport [DfT]);
• Quantum (LiDAR) Imaging (HO/ DfT/ MoD);
• Acoustic Imaging (UK Hydrographic Office [UKHO] / MoD) – Ocean Acoustic Tomography;
• Magnetic Imaging (Atomic Weapons Establishment [AWE] / National Nuclear Lab. [NNL] /
   MoD / HO / DfT);
• X-ray Tomography (MoD / HO / DfT)

                                              28
Example approaches:
Due to storage of data and faster computational processing power, the general trend in data
processing technique developments is to exploit the rich nature of the datasets. Consider that
next generation SAR is attempting to process multi-dimensional datasets (i.e., multi-static,
multi-channel, multi-look and multi-polar) to form better quality images so that information
is retrieved which wasn’t apparent before. [3D SAR Imaging for Multistatic GPR, M. Pereira et
al, SPIE Digital Library, 2019, DOI - https://doi.org/10.1117/12.2519430]. The paper [A. Horne et al.,
"Exploration of Multidimensional Radio Frequency Imaging to Derive Remote Intelligence of
Building Interiors," 2018 International Conference on Radar (RADAR), Brisbane, QLD, 2018, pp.
1-6, doi: 10.1109/RADAR.2018.8557263] also provides an example of a situation where inverse
techniques may provide benefit.

Elsewhere in the EM spectrum, inverse problems in LiDAR imaging is found in [W. Marais, R.
Holz, Y. H. Hu and R. Willett, "Atmospheric lidar imaging and poisson inverse problems," 2016
IEEE International Conference on Image Processing (ICIP), Phoenix, AZ, 2016, pp. 983-987, doi:
10.1109/ICIP.2016.7532504.]. This describes an approach to an atmospheric lidar photon-limited
imaging problem in which observations are contaminated with Poisson noise. [Gariepy,
G., Tonolini, F., Henderson, R. et al. Detection and tracking of moving objects hidden from
view. Nature Photon 10, 23–26 (2016). https://doi.org/10.1038/nphoton.2015.234] uses LiDAR
imaging to track moving objects around corners.

Baggage inspection based on X-ray imaging has been established to protect environments
in which access control is of vital significance. In several public entrances, like airports,
government buildings, stadiums and large event venues, security checks are carried out
on all baggage to detect suspicious objects (e.g., handguns and explosives). This is an ever-
increasing field of research. See the IEEE Spectrum article, “Future Baggage Scanners Will
Tell Us What Things Are Made Of”.

A Through-Wall Radar Imaging (TWIR) PhD is to be completed next year, which has
demonstrated some fascinating image processing schemes by exploiting synthetic data
using radio frequency propagation models and DNNs (Machine Learning) at University of
Manchester. Two EPSRC iCASE PhD studies (part funded by DSTL) are to start in October 2021
at Universities of Cambridge (Towards Scalable EM Solvers on High Performance Computer
[HPC] Platforms) to support Full-Waveform Inversion (FWI) and Manchester (Tensor
Tomographic Imaging of Foliage Penetration [FOPEN]) to support the Detection, Tracking,
Recognition and Identification (DTRI) of difficult targets through foliage (dense vegetation).
The PhDs further highlight the interdisciplinary nature of the topic and the relevance of a
Fellowship to provide focus and drive.

                                                  29
You can also read