Back to news

December 13, 2023 | International, Land

Defence Minister Bill Blair to visit Latvia and Poland

The Honourable Bill Blair, Minister of National Defence, accompanied by General Wayne Eyre, Chief of the Defence Staff, will visit Latvia from December 15-16, 2023, and then travel to Poland on December 17-18.

https://www.canada.ca/en/department-national-defence/news/2023/12/defence-minister-bill-blair-to-visit-latvia-and-poland.html

On the same subject

  • After huge hack, Biden security picks want more cyber coordination with industry

    January 21, 2021 | International, C4ISR, Security

    After huge hack, Biden security picks want more cyber coordination with industry

    Andrew Eversden WASHINGTON — Two top national security nominees advocated Tuesday for stronger federal cybersecurity and increased collaboration with contractors in the aftermath of a supply chain breach that infiltrated numerous federal agencies. If confirmed, retired Army Gen. Lloyd Austin and Avril Haines, President-elect Joe Biden's nominees for defense secretary and director of national intelligence, respectively, would start their jobs in the middle of the national security community's assessment of damage from a cybersecurity breach pinned on Russian hackers. They gained access through software from SolarWinds, a major government contractor. “We must elevate cybersecurity as an imperative across the government in order to defend the American people and U.S. critical infrastructure,” Austin told the Senate Armed Services Committee in his answers to the lawmaker's advance policy questions. “Additionally, the government must continue to strengthen its partnership with the private sector to foster greater information sharing and collaboration.” So far, federal investigators have discovered breaches at “fewer than 10” federal agencies, though the Pentagon and intelligence community haven't confirmed whether their offices were among the victims. Haines, who served as deputy CIA director and deputy national security adviser to President Barack Obama, found it concerning that the breach first came to light through cybersecurity company FireEye, instead of through U.S. government cybersecurity operators. “[I] absolutely share ... concern that we're actually able to detect these because that's obviously absolutely critical to us protecting against them,” Haines said before the Senate Select Committee on Intelligence. “I think ... it was pretty alarming that we found out about it through a private company as opposed to our being able to detect it ourselves to begin with.” In response to the breach, Austin committed to reviewing the DoD's cyber posture and emphasized that Russia must be punished for infiltrating federal networks. In the advance questions, Austin stopped short of calling the breach an act of war, arguing that designation “requires a case-by-case and fact-specific determination.” “For example, malicious cyber activities could result in injury, death or significant property destruction,” Austin wrote. “These activities would need to be considered in their totality.” An early January announcement from several federal investigators, including the NSA and Office of the Director of National Intelligence, stated that the breach was believed to be an espionage campaign and “likely Russian in origin.” “If that's the case, I think Russia should be held accountable,” Austin said at the hearing. “That's my personal belief.” Sen. Jack Reed, D-R.I., who sits on both SASC and SSCI, called the breach “the greatest cyber intrusion in the history, I think, perhaps, of the world” and said that the stovepiped nature of the U.S. national security apparatus needed to be addressed. Reed said one challenge for Haines will be developing a “more coherent, cohesive, integrated approach” to dealing with cybersecurity threats, particularly from advanced nation-state actors. Under questioning from senators, Haines said the SolarWinds supply chain hack was a “grave threat,” and the government needs new to improve its defenses against such attacks, though she noted that she hasn't received a classified briefing on the intrusion. In 2019, a report from ODNI warned of growing software supply chain hacks that provide an “efficient way to bypass traditional defenses and compromise a large number of computers.” “To prevent a recurrence of this kind of attack, we need to close the gap between where our capabilities are now and where they need to be in order to deter, detect, disrupt and respond to such intrusions far more effectively in the future,” Haines wrote in her questionnaire. “If confirmed as DNI, I will review the expert conclusions from the SolarWinds incident and the current intelligence about supply chain vulnerabilities and what steps may be taken to address any vulnerabilities.” Haines told senators that she would assess how the intelligence community can improve its cybersecurity partnerships with industry and the whole federal government. “I believe that the IC plays an integral role in detecting and warning against nation-state targeting of U.S. networks and infrastructure,” she wrote. “If confirmed, I will examine how better collaboration between the IC and the rest of the U.S. government, coupled with closer partnerships with the private sector and our international allies, can enhance our ability to deter, detect, and mitigate cyberattacks.” Haines will review whether the intelligence community is allocating resources properly to face advanced cyber threats and will examine the adequacy of the IC's existing authorities to protect the digital infrastructure of the United States, she said. Austin pointed to a cyber-threat sharing partnership the department has with the defense industrial base and stated that the department should “continue to look for ways to better integrate with interagency partners and the private sector.” In light of the SolarWinds breach, the senators on SSCI wrote that they are worried about a “lack of mandatory threat information sharing between the private sector and government,” adding that any information sharing from the private sector after the breach is voluntary. Haines would review the relationship. “Information sharing between the IC and the private sector is increasingly important to ensure that our data systems and networks are secure,” she wrote. “If confirmed as DNI, I look forward to reviewing the Intelligence Community's data sharing and information exchange relationship with the private sector, to engaging with IC experts and private sector leaders on what information is currently being shared, and to examining the efficacy of the current framework for sharing threat information.” The incoming Biden administration has signaled that it will prioritize cybersecurity in the aftermath of the SolarWinds breach. The Biden team named Anne Neuberger, the NSA's cybersecurity director who worked to improve information sharing with the private sector, to National Security Council as deputy national security adviser for cyber and emerging technology. Haines wrote that she will “ensure” that the intelligence community has a “robust data sharing and information exchange relationship” with private companies and said that she will be “studying current information sharing to determine how it can be improved and what types of information can be shared to enhance cybersecurity protections.” “The private sector has unique insight and expertise on malicious activity occurring within its networks,” Haines said. “Real-time integration of private sector and government data could lead to more effective prevention and mitigation outcomes.” Cyber norms and deterrence For the last few years, the U.S. government wrestled with the concept of deterrence in the cyber domain, a complex challenge that including resilient defenses, risk management and strong international partnerships. As the SolarWinds breach demonstrated, deterring adversaries from hacking, which is seen as below the threshold of an armed response, is difficult. In response to a question from Sen. John Cornyn, R-Texas, about how to approach cyber deterrence, Haines pointed to many of the same tenets of current U.S. cyber deterrence, including imposition of costs for malicious actors' behavior, bringing foreign allies together to impose those costs, building resilient systems that are hard to hack, developing norms and creating strong relationship with the private sector. Haines wrote that setting norms should include outlining sanctionable behavior with the agreement from allies. A cornerstone to sanctioning is attributing cyberattacks to actors, a challenging undertaking in the cyber realm. Sen. Mark Warner, D-Va., said he wanted Haines to be more forthcoming with attribution of cyberattacks, stating that he found it “extraordinarily concerning” that the “[Trump] White House underplay[ed] attribution on Russia.” Attribution, Haines said, would be a major piece of the ODNI's role in deterrence. “Something we [ODNI] can do is promote the ability to detect when adversaries are engaging in such activity so as then to provide information about attribution, for example. And then hold adversaries to account through that.” https://www.c4isrnet.com/cyber/2021/01/20/after-huge-hack-biden-security-picks-want-more-cyber-coordination-with-industry

  • Dutch government to spend billions on military procurement

    October 19, 2022 | International, Other Defence

    Dutch government to spend billions on military procurement

    The Dutch government will invest up to 3.5 billion euros ($3.44 billion) in military procurement, the defence ministry said, in a policy turnaround in the wake of Russia's invasion of Ukraine.

  • DARPA Awards Six Teams During Final Spectrum Collaboration Challenge Qualifier

    December 20, 2018 | International, C4ISR

    DARPA Awards Six Teams During Final Spectrum Collaboration Challenge Qualifier

    On December 12, DARPA held the second preliminary event of the Spectrum Collaboration Challenge (SC2) – the world's first collaborative machine-intelligence competition to overcome spectrum scarcity. Fifteen teams represented by members from across the academic, commercial and defense landscapes gathered at Johns Hopkins University Applied Physics Laboratory (APL) to pit their intelligent radio designs against each other in a head-to-head competition. At the event's conclusion, six of the eight top-scoring teams walked away with $750,000 each in prize money. While not all competitors received interim prizes, all 15 teams have an opportunity to move on to the next stage and compete in the 2019 Spectrum Collaboration Challenge grand finale, which will be held in conjunction with MWC19 Los Angeles, in partnership with CTIA, on October 23, 2019. The six prize-winning teams from the second preliminary event are: Zylinium, a team of independent researchers MarmotE from Vanderbilt University Sprite from Northeastern University Erebus, a team of independent researchers Gator Wings from University of Florida SCATTER from IDLab, an imec research group at Ghent University and University of Antwerp, and Rutgers University "During the second preliminary event we witnessed a technological shift," said Paul Tilghman, the DARPA program manager leading SC2. "For the first time, we saw autonomous collaboration outperform the status quo for spectrum management." Starting in early December, each team's radio participated in 105 matches against competitors in the Colosseum, a massive RF testbed that was developed specifically for SC2. The matches were held in a round-robin fashion where each radio network – working in groups of threes, fours or fives – had multiple opportunities to compete against every other radio design in the competition. Roughly 400 matches were held in total to determine the final team rankings and the prize recipients. During the PE2 matches, teams were put through six different RF scenarios designed to mimic the challenges that collaborative, autonomous radios will face in the real world. These scenarios challenged the radios to collaboratively mitigate interfering with an incumbent radio system, sense and adapt to the spectrum demands of high-traffic environments, handle the data demands of the connected soldier of the future, and beyond. Each scenario was designed to pressure test various elements of the teams' approaches and, in particular, their ability to successfully collaborate with the other radios operating within the same environment. “The six different scenarios were closely aligned to actual situations that our defense and commercial systems face in the field. The Wildfire scenario, for example, replicates the complex communications environment that surrounds an emergency response situation, while the Alleys of Austin scenario was designed to mimic what's needed to help dismounted soldiers navigate and communicate as they sweep through an urban environment. This real-world relevance was critical for us as we want to ensure these technologies can continue to develop after the event and can transition to commercial and/or military applications,” said Tilghman. The sixth scenario of the competition was used to determine the six prize winning teams. This scenario explored the essential question of the SC2 competition: can the top teams' collaborative SC2 radios outperform the status quo of static allocation? Each of the six teams that received awards at PE2 demonstrated that their radio was capable of carrying more wireless applications without the aid of a handcrafted spectrum plan, while simultaneously ensuring four other radio networks operating in the same area had improved performance. In short, each of these six radio networks demonstrated the autonomous future of the spectrum. To aid with decision making, teams applied AI and machine learning technologies in various ways. Some leveraged the current generation of AI technologies like deep learning, while others used more conventional optimization approaches. There were also a few teams that used first wave, rule-based AI technologies. “We're very encouraged by the results we saw at PE2. The teams' radios faced new and unexpected scenarios but were still able to demonstrate smart, collaborative decision making. PE2 showed us that AI and machine learning's application to wireless spectrum management creates a very real opportunity to rethink our current century-old approach,” said Tilghman. The competition now enters its third year and moves closer to the finale, which will be held at one of the country's largest annual technology and telecommunications shows – MWC19 Los Angeles. More than 22,000 attendees from the broad mobile ecosystem and adjacent industry sectors will convene at this three-day event to discuss the current opportunities and future trends shaping the industry. The SC2 championship event will be held on the keynote stage of MWC19 Los Angeles on October 23, 2019. At the conclusion of SC2's finale, three teams will be awarded $2 million, $1 million and $750,000, respectively, for first, second and third place. The real prize, however, will be the promise of a more efficient wireless paradigm in which radio networks autonomously collaborate to determine how the spectrum should be used moment-to-moment, helping to usher in an era of spectrum abundance. For more information about DARPA's Spectrum Collaboration Challenge, please visit: https://spectrumcollaborationchallenge.com/ https://www.darpa.mil/news-events/2018-12-19

All news