Back to news

August 21, 2018 | International, C4ISR

Army Takes Its Radio Network Commercial

By

ARLINGTON: As the Army reboots its battlefield radio networks, it's jettisoning exquisitely custom-made military waveforms and moving to simpler — but more capable — commercial radio protocols. The move is underway on three fronts, Maj. Gen. David Bassett, the two-star Program Executive Officer for command, control & communications – Tactical (PEO C3T), says:

  • The Army's already moving its backpack-mounted tactical radio, the Manpack, from the milspec Soldier Radio Waveform (SRW) to the commercial TSM waveform, with both Harris and Rockwell Collins now integrating TSM in their radios. (Special operators already use TSM).
  • They're currently selecting vendors to do the same for their handheld Leader Radio, mainly used by junior and non-commissioned officers on foot. Bassett's staff told me to expect an award sometime in September.
  • They're exploring alternatives to the Wideband Networking Waveform (WNW) as the “backbone” of the Army's tactical network. TSM is one candidate but there are others, including some still in development, Bassett told me in an interview here.

It's all part of a wider effort to rebuild the Army's command, control, and communications (C3) networks for war against a high-tech great power. Speaking at a cyber and networks conference held here Aug. 2 by the Association of the US Army, Bassett said the Army will conduct operational testing of new command systems — including two lower-complexity alternatives to complement the current mainstay, JBC-P — and start fielding them, he said, “this fall.”

Why the rush? Army systems like WIN-T(Warfighter Information Network – Tactical) worked adequately as long as we had big bases in Afghanistan and Iraq, with plenty of time to set up extensive infrastructure and minimal enemy interference. China and Russia, however, have cutting-edge cyber and electronic warfare attackers to hack the network software, powerful electronic warfare units to jam its transmissions, and long-range precision guided missiles that can easily target large, stationary command posts. So last year Army Chief of Staff Mark Milley ordered a crash program of improvements, cancelling planned WIN-T upgrades in favor of new technologies, many from the thriving commercial IT sector.

“It was kind of a shock to the system,” the Army's Chief Information Officer, Lt. Gen. Bruce Crawford, told the AUSA conference. “The Army came forward and said there were some programs it wanted to halt and some things it fundamentally wanted to do differently.”

Appealing To Industry

Gen. Milley's announcement met with initial resistance, including on Capitol Hill, but inspired intense interest from industry. Maj. Gen. Bassett himself had come to the AUSA conference from a meeting in Raleigh, one corner of North Carolina's thrivingresearch triangle,” where he had briefed 400 representatives from some 126 companies.

“Down in Raleigh, the challenge that I gave them was learn how you fit into our network design. Propose solutions that will fit into our network,” Bassett said. “We want them to become part of that infrastructure rather than competing with it.”

https://breakingdefense.com/2018/08/army-takes-its-radio-network-commercial-can-you-hear-me-now

On the same subject

  • Denmark raises threat level for destructive cyber attacks to 3 on 5-level scale
  • Australia to buy U.S. Tomahawk missiles to boost long-range strike capability | Reuters

    August 21, 2023 | International, Land

    Australia to buy U.S. Tomahawk missiles to boost long-range strike capability | Reuters

    Australia will spend A$1.3 billion ($833 million) to boost its long-range strike capabilities as it finalised on Monday a deal to buy more than 200 Tomahawk cruise missiles from the United States, part of a wide-ranging defence shake-up.

  • Pentagon finalizes first set of cyber standards for contractors

    February 3, 2020 | International, Aerospace, Naval, Land, C4ISR, Security

    Pentagon finalizes first set of cyber standards for contractors

    Mark Pomerleau The Pentagon has finalized the long anticipated cybersecurity standards contractors will have to follow before winning contracts from the Department of Defense, a new process called the Cybersecurity Maturity Model Certification (CMMC) 1.0. The model is a tiered cybersecurity framework that grades companies on a scale of one to five based on the level of classification and security that necessary for the work they are performing. “The government and the contractor community must keep working together to address real and growing cybersecurity threats, and we need a robust response to protect our infrastructure, information, and supply chains,” said David Berteau, president and chief executive of the Professional Services Council, a trade association for federal contractors. “With today's announcement, DoD has achieved a significant milestone. Here's what industry officials need to know about the version finalized Jan. 31. Why it was needed Previously, the Pentagon did not have unified standard for cybersecurity that businesses needed to follow when bidding for contracts. Companies could claim to meet certain industry standards for cybersecurity, but those assertions were not tested by auditors, nor did the standards take into account the type of work a company was bidding to complete. Since then, defense officials have said that cybersecurity is not a one size fits all approach. In the meantime, adversaries have discovered it is easier to target unsuspecting down tier suppliers, rather than prime contractors. “Adversaries know that in today's great power competition environment, information and technology are both key cornerstones and attacking a sub-tier supplier is far more appealing than a prime,” Ellen Lord, the under secretary of defense for acquisition and sustainment, told reporters in a briefing at the Pentagon Jan. 31. Officials have said cyber theft by adversaries costs the United States about $600 billion a year. What will change? Contracts will mandate bidders reach a certain level of certification to win specific jobs. For example, if businesses aren't bidding on a contract that has extremely sensitive information, they must only achieve the first level of certification, which involves basic cybersecurity such as changing passwords and running antivirus software. More sensitive programs will require more stringent controls. Smaller companies down the supply chain will not, however, have to have the same level of certification as primes, said Katie Arrington, chief information security officer for the Office of the Under Secretary of Defense for Acquisition and the point person for the certification. Another significant change with the new process is the creation of an accreditation board and assessors. The board is an outside entity, separate from DoD, that will be charged with approving assessors to certify companies in the process. The accreditation body was formed earlier this month and officials are working on identifying and training the assessors, which will be called Certified Third-Party Assessment Organizations (C3PAO). What's next? Officials explained Jan. 31 that CMMC will follow a crawl, walk, run approach to ensure companies aren't unprepared for the change. The accreditation board is in the process of training the auditors that will oversee the certificaion. Once the requirements are met, a company's certification is good for 3 years. In the meantime, DoD plans to release 10 requests for information and 10 requests for proposals that will include the new cyber standards this year. The first solicitation could come as early as June. Arrington said earlier this week that she expects 1,500 companies to be certified by the end of 2021. She added that all new contracts starting in fiscal year 2026 will contain the cybersecurity requirements, however, Lord noted that they will not be not retroactive to previous contracts. https://www.fifthdomain.com/dod/2020/01/31/pentagon-finalizes-first-set-of-cyber-standards-for-contractors/

All news