June 4, 2024 | International, Security
August 21, 2018 | International, C4ISR
ARLINGTON: As the Army reboots its battlefield radio networks, it's jettisoning exquisitely custom-made military waveforms and moving to simpler — but more capable — commercial radio protocols. The move is underway on three fronts, Maj. Gen. David Bassett, the two-star Program Executive Officer for command, control & communications – Tactical (PEO C3T), says:
It's all part of a wider effort to rebuild the Army's command, control, and communications (C3) networks for war against a high-tech great power. Speaking at a cyber and networks conference held here Aug. 2 by the Association of the US Army, Bassett said the Army will conduct operational testing of new command systems — including two lower-complexity alternatives to complement the current mainstay, JBC-P — and start fielding them, he said, “this fall.”
Why the rush? Army systems like WIN-T(Warfighter Information Network – Tactical) worked adequately as long as we had big bases in Afghanistan and Iraq, with plenty of time to set up extensive infrastructure and minimal enemy interference. China and Russia, however, have cutting-edge cyber and electronic warfare attackers to hack the network software, powerful electronic warfare units to jam its transmissions, and long-range precision guided missiles that can easily target large, stationary command posts. So last year Army Chief of Staff Mark Milley ordered a crash program of improvements, cancelling planned WIN-T upgrades in favor of new technologies, many from the thriving commercial IT sector.
“It was kind of a shock to the system,” the Army's Chief Information Officer, Lt. Gen. Bruce Crawford, told the AUSA conference. “The Army came forward and said there were some programs it wanted to halt and some things it fundamentally wanted to do differently.”
Appealing To Industry
Gen. Milley's announcement met with initial resistance, including on Capitol Hill, but inspired intense interest from industry. Maj. Gen. Bassett himself had come to the AUSA conference from a meeting in Raleigh, one corner of North Carolina's thriving“research triangle,” where he had briefed 400 representatives from some 126 companies.
“Down in Raleigh, the challenge that I gave them was learn how you fit into our network design. Propose solutions that will fit into our network,” Bassett said. “We want them to become part of that infrastructure rather than competing with it.”
https://breakingdefense.com/2018/08/army-takes-its-radio-network-commercial-can-you-hear-me-now
June 4, 2024 | International, Security
August 21, 2023 | International, Land
Australia will spend A$1.3 billion ($833 million) to boost its long-range strike capabilities as it finalised on Monday a deal to buy more than 200 Tomahawk cruise missiles from the United States, part of a wide-ranging defence shake-up.
February 3, 2020 | International, Aerospace, Naval, Land, C4ISR, Security
Mark Pomerleau The Pentagon has finalized the long anticipated cybersecurity standards contractors will have to follow before winning contracts from the Department of Defense, a new process called the Cybersecurity Maturity Model Certification (CMMC) 1.0. The model is a tiered cybersecurity framework that grades companies on a scale of one to five based on the level of classification and security that necessary for the work they are performing. “The government and the contractor community must keep working together to address real and growing cybersecurity threats, and we need a robust response to protect our infrastructure, information, and supply chains,” said David Berteau, president and chief executive of the Professional Services Council, a trade association for federal contractors. “With today's announcement, DoD has achieved a significant milestone. Here's what industry officials need to know about the version finalized Jan. 31. Why it was needed Previously, the Pentagon did not have unified standard for cybersecurity that businesses needed to follow when bidding for contracts. Companies could claim to meet certain industry standards for cybersecurity, but those assertions were not tested by auditors, nor did the standards take into account the type of work a company was bidding to complete. Since then, defense officials have said that cybersecurity is not a one size fits all approach. In the meantime, adversaries have discovered it is easier to target unsuspecting down tier suppliers, rather than prime contractors. “Adversaries know that in today's great power competition environment, information and technology are both key cornerstones and attacking a sub-tier supplier is far more appealing than a prime,” Ellen Lord, the under secretary of defense for acquisition and sustainment, told reporters in a briefing at the Pentagon Jan. 31. Officials have said cyber theft by adversaries costs the United States about $600 billion a year. What will change? Contracts will mandate bidders reach a certain level of certification to win specific jobs. For example, if businesses aren't bidding on a contract that has extremely sensitive information, they must only achieve the first level of certification, which involves basic cybersecurity such as changing passwords and running antivirus software. More sensitive programs will require more stringent controls. Smaller companies down the supply chain will not, however, have to have the same level of certification as primes, said Katie Arrington, chief information security officer for the Office of the Under Secretary of Defense for Acquisition and the point person for the certification. Another significant change with the new process is the creation of an accreditation board and assessors. The board is an outside entity, separate from DoD, that will be charged with approving assessors to certify companies in the process. The accreditation body was formed earlier this month and officials are working on identifying and training the assessors, which will be called Certified Third-Party Assessment Organizations (C3PAO). What's next? Officials explained Jan. 31 that CMMC will follow a crawl, walk, run approach to ensure companies aren't unprepared for the change. The accreditation board is in the process of training the auditors that will oversee the certificaion. Once the requirements are met, a company's certification is good for 3 years. In the meantime, DoD plans to release 10 requests for information and 10 requests for proposals that will include the new cyber standards this year. The first solicitation could come as early as June. Arrington said earlier this week that she expects 1,500 companies to be certified by the end of 2021. She added that all new contracts starting in fiscal year 2026 will contain the cybersecurity requirements, however, Lord noted that they will not be not retroactive to previous contracts. https://www.fifthdomain.com/dod/2020/01/31/pentagon-finalizes-first-set-of-cyber-standards-for-contractors/