Back to news

October 1, 2018 | Local, Naval

CSC 2018 Evaluation Stage

© 2018 FrontLine Defence (Vol 15, No 5)

The Canadian Surface Combatant program is the largest and most complex procurement to be undertaken by the Canadian Government to date. This program intends to replace the existing Royal Canadian Navy (RCN) frigates (specializing in anti-submarine capabilities and multi-role mission support) and the now-retired destroyers (providing anti-air capabilities) with a fleet of 15 versatile new warships that will be in service to the mid 21st century, if not longer.

As outlined in its defence policy, the Government remains committed to replacing the Navy's surface fleet with 15 surface combatants, which will all be built by Irving Shipbuilding as part of the “combatant” portion of the National Shipbuilding Strategy.

Although rumours are swirling about the possibility of two variants on a common platform, a DND spokesperson confirms that “the current requirement is that all 15 CSC ships will have the same capabilities: anti-air warfare, anti-submarine warfare, anti-surface warfare, electronic warfare as well as command and control.”

The DND email to FrontLine goes on to say that “Funding has been set aside to deliver the full complement of ships the Royal Canadian Navy needs, in order to provide capability across the full range of operations. This will replace both the recently retired Iroquois-class destroyers and the Halifax-class frigates with a single class of ship capable of meeting multiple threats on both the open ocean and the highly complex coastal (littoral) environment.”

Full article: https://defence.frontline.online/article/2018/5/10490-CSC-2018-Evaluation-Stage

On the same subject

  • MDA: All-Domain C2 Key To Countering Hypersonic Missiles

    May 19, 2020 | Local, Aerospace

    MDA: All-Domain C2 Key To Countering Hypersonic Missiles

    "We'll take anybody's sensors," MDA's John Bier said, "as long as it contributes to the missile warning, missile defense and space domain environment." By THERESA HITCHENSon May 14, 2020 at 2:44 PM WASHINGTON: Senior Missile Defense Agency officials say Joint All-Domain Command and Control (JADC2) will be fundamental to rapidly and seamlessly integrating future capability to track and intercept hypersonic and cruise missiles into its current architecture focused on ballistic missiles. “We need the ability to globally see, track and engage the threats in a multispectral environment in real time with persistent capabilities, so that we can provide the right data to the right targets,” MDA's chief architect Stan Stafira said. MDA has been able to develop its C2 network to link various layers in the overarching US missile defense architecture, but that integration has been achieved largely through “brute force,” John Bier, MDA program director for C2BMC, told a webinar sponsored by the Missile Defense Advocacy Association (MDAA) yesterday. “Where JADC2 is trying to drive the C2 community is: how do you make that easier?” MDA is working on first assessing how to tie in its current Command and Control, Battle Management and Communications (C2BMC) architecture with JADC2 as it develops, then look at how to integrate its future planned capabilities “when applicable,” a MDA spokesperson clarified in an email. Toward that end, MDA is planning on participating in the Air Force's second “On Ramp” exercise of the Advanced Battle Management System (ABMS) family of systems initiative aimed at developing a number of critical technologies to underpin JADC2, Bier said. The exercise, which would have involved a space-oriented scenario, was planned for last month, but has been postponed due to the COVID-19 crisis. After first being slipped to June, it now is slated for Aug. 31-Sept. 4 moved back to A MDA fully expects to be involved in the exercise, although Bier did not elaborate on exactly what role the agency would play or what systems might be involved. He said that MDA is working on spiral development of new technologies on an every two- to three-year cycle, but hopes to move even faster to integrate new capabilities. Part of that effort will involve moving to open standards, just as the ABMS program is doing now. “We'll take anybody's sensors,” Bier said, “as long as it contributes to the missile warning, missile defense, and space domain environment.” The ABMS On Ramp exercises are “great integration environments” to test out the new standards, he added. Bier said that up to now MDA has been successfully able to develop and manage a C2BMC system across the missile defense enterprise — one that links strategic systems such as the Ground-Based Midcourse Defense (GBMD) interceptors in silos in California and Alaska with regionally deployed, tactical systems such as Patriot batteries — in large part because of its special governance structure and flexible contractual authorities. Although Bier didn't say it, the obvious inference is that DoD and the Joint Chiefs of Staff may want to consider how to centralize authority over various service C2 and battle management programs and projects that will need to connect to make JADC2 a reality. “The JADC2 environment allows us to bring in multiple services along with MDA and the Intelligence Community and discuss these issues,” he said. https://breakingdefense.com/2020/05/mda-all-domain-c2-key-to-countering-hypersonic-missiles

  • Minister Blair to mark completion of new Health Services Centre at Canadian Forces Base North Bay

    October 18, 2023 | Local, Security

    Minister Blair to mark completion of new Health Services Centre at Canadian Forces Base North Bay

    The Honourable Bill Blair, Minister of National Defence, will visit 22 Wing/Canadian Forces Base North Bay to officially mark the completion of the base’s new Health Services Centre, which will better support Canadian Armed Forces members at the base.

  • Hacker Community to Take on DARPA Hardware Defenses at DEF CON 2019

    August 5, 2019 | Local, Security

    Hacker Community to Take on DARPA Hardware Defenses at DEF CON 2019

    This month, DARPA will bring a demonstration version of a secure voting ballot box equipped with hardware defenses in development on the System Security Integrated Through Hardware and Firmware (SSITH) program to the DEF CON 2019 Voting Machine Hacking Village (Voting Village). The SSITH program is developing methodologies and design tools that enable the use of hardware advances to protect systems against software exploitation of hardware vulnerabilities. To evaluate progress on the program, DARPA is incorporating the secure processors researchers are developing into a secure voting ballot box and turning the system loose for public assessment by thousands of hackers and DEF CON community members. Many of today's hardware defenses cover very specific instances or vulnerabilities, leaving much open to attack or compromise. Instead of tackling individual instances, SSITH researchers are building defenses that address classes of vulnerabilities. In particular, SSITH is tackling seven vulnerabilities classes identified by the NIST Common Weakness Enumeration Specification (CWE), which span exploitation of permissions and privilege in the system architectures, memory errors, information leakage, and code injection. “There are a whole set of cyber vulnerabilities that happen in electronic systems that are at their core due to hardware vulnerabilities – or vulnerabilities that hardware could block,” said Dr. Linton Salmon, the program manager leading SSITH. “Current efforts to provide electronic security largely rely on robust software development and integration, utilizing an endless cycle of developing and deploying patches to the software firewall without addressing the underlying hardware vulnerability. The basic concept around SSITH is to make hardware a more significant participant in cybersecurity, rather than relegating system security only to software.” Under the SSITH program, researchers are exploring a number of different design approaches that go well beyond patching. These include using metadata tagging to detect unauthorized system access; employing formal methods to reason about integrated circuit systems and guarantee the accuracy of security characteristics; and combining hardware performance counters (HPCs) with machine learning to detect attacks and establish protective fences within the hardware. One team from the University of Michigan is developing a novel security approach that changes the unspecified semantics of a system every 50 milliseconds. Currently, attackers continuously probe a system to locate these undefined sections and, over time, are able to create a system map to identify possible hacks. By changing the construct every 50 milliseconds, attackers do not have enough time to find those weaknesses or develop an accurate representation of the system as a whole. To evaluate the hardware security concepts in development on the SSITH program, DARPA – working with Galois – is pursuing a voting system evaluation effort to provide a demonstration system that facilitates open challenges. The program elected to use a voting system as its demonstration platform to provide researchers with an accessible application that can be evaluated in an open forum. Further, the topic of election system security has become an increasingly critical area of concern for the hacker and security community, as well as the United States more broadly. “DARPA focuses on creating technologies to enhance national defense, and election system security falls within that remit. Eroding trust in the election process is a threat to the very fabric of our democracy,” noted Salmon. While protecting democracy is a critical national defense issue, SSITH is not trying to solve all issues with election system security nor is it working to provide a specific solution to use during elections. “We expect the voting booth demonstrator to provide tools, concepts, and ideas that the election enterprise can use to increase security, however, our true aim is to improve security for all electronic systems. This includes election equipment, but also defense systems, commercial devices, and beyond,” said Salmon. During DEF CON 2019, the SSITH voting system demonstrator will consist of a set of RISC-V processors that the research teams will modify to include their SSITH security features. These processors will be mounted on field programmable gate arrays (FPGAs) and incorporated into a secure ballot box. Hackers will have access to the system via an Ethernet port as well as a USB port, through which they can load software or other attacks to challenge the SSITH hardware. Since SSITH's research is still in the early stages, only two prototype versions of the 15 processors in development will be available for evaluation. “At this year's Voting Village, hackers may find issues with the processors and quite frankly we would consider that a success. We want to be transparent about the technologies we are creating and find any problems in these venues before the technology is placed in another venue where a compromise could be more dangerous,” said Salmon. Following DEF CON 2019, the voting system evaluation effort will go on a university roadshow where additional cybersecurity experts will have an opportunity to further analyze and hack the technology. In 2020, DARPA plans to return to DEF CON with an entire voting system, which will incorporate fixes to the issues discovered during the previous year's evaluation efforts. The 2020 demonstrator will use the STAR-Vote system architecture, which is a documented, open source architecture that includes a system of microprocessors for the voting booth, ballot box, and other components. It also includes a verifiable paper ballot, providing both digital and physical representations of the votes cast within the booth. “While the 2020 demonstrator will provide a better representation of the full attack surface, the exercise will not result in a deployable voting system. To aid in the advancement of secure election equipment as well as electronic systems more broadly, the hardware design approaches and techniques developed during the SSITH program will be made available to the community as open-source items,” concluded Salmon. https://www.darpa.mil/news-events/2019-08-01

All news