Back to news

August 1, 2023 | International, Aerospace, C4ISR, Security, Other Defence

How Taiwan plans to counter drones by mid-2024

Taiwan is trying to accelerate the development and production of military drones and countermeasures by expanding two national defense programs.

https://www.c4isrnet.com/unmanned/2023/08/01/how-taiwan-plans-to-counter-drones-by-mid-2024/

On the same subject

  • Chinese threats means the Pentagon needs new C4ISR systems

    January 30, 2020 | International, C4ISR

    Chinese threats means the Pentagon needs new C4ISR systems

    By: Chiara Vercellone For the United States to meet the goals laid out in the National Defense Strategy, especially in Asia, and to realize President Donald Trump's vision of an open Indo-Pacific, the Department of Defense's battlefield technology must undergo significant changes, according to a Center for a New American Security report released Jan. 28. The report, an independent assessment mandated by Congress in the 2019 National Defense Authorization Act, proposed the revamping of C4ISR systems as they remain “brittle in the face of Chinese cyberattacks, electronic warfare and long-range strikes.” The Pentagon's C4ISR capabilities have fallen behind technologically, as they were developed “in an era when competitors or adversaries could not attack U.S. assets in space or at long ranges,” the report found. At the same time, a 2019 Department of Defense's report on China's military and security developments found that country has prioritized military capabilities with disruptive potential, including hypersonic weapons, counterspace capabilities, artificial intelligence and C4ISR advanced robotics. Thus far, the Department of Defense has been able to develop countermeasures against China's abilities, said Chris Dougherty, a senior fellow at CNAS and one of the authors of the report. “As the threat continues to get more sophisticated, these [countermeasures] will likely lose their effectiveness,” Dougherty said. “This necessitates building a new architecture that is designed around resiliency, kill webs, and graceful degradation.” While under attack, U.S. systems sometimes fail to have any connectivity and have sporadic dial-up speeds. Instead, they should still have some level of communication even while the attack is going on, even if this means at lower bandwidths. To strengthen its systems, the report recommended, the U.S. military should develop space capabilities resistant to kinetic attacks, synthetic training environments for U.S. forces to practice C4ISR operations, systems that can transmit data via multiple pathways and surveillance systems that can avoid being detected. A recent project by RAND found that, while the Department of Defense maintains an advantage in airspace penetration capabilities, it remains vulnerable to air base attacks and Chinese anti-surface warfare. An initial system with these developments could be in place in the next decade if the Department of Defense and armed services create a basic system and improve it over time, Dougherty said. “If, as we have done in the past, we wait around for a ‘perfect' set of requirements to develop an ‘objective' future system, we could see this take 15-20 years, at which point China will likely have far surpassed us in this competition,” he said. https://www.c4isrnet.com/newsletters/daily-brief/2020/01/29/chinese-threats-means-the-pentagon-needs-new-c4isr-systems/

  • DoD SBIR/STTR Component BAA Open: Army SBIR BAA 21.4, Topics A214-002 and A214-003

    February 26, 2021 | International, C4ISR

    DoD SBIR/STTR Component BAA Open: Army SBIR BAA 21.4, Topics A214-002 and A214-003

    The DoD Small Business and Technology Partnerships Office announces the opening of the following Broad Agency Announcement (BAA) Topics: Army SBIR 21.4 SBIR Topic A214-002: Same Frequency (SF) Simultaneous Transmit and Receive (STAR) Tactical Radios, published at: https://beta.sam.gov/opp/65e7e650cdf548c297093827779a020b/view SBIR Topic A214-003: EXOSENSE: Exoskeleton Sensor Data Fusion and Insight System, published at: https://beta.sam.gov/opp/a5778b7a4bdf40ff8dd571e5d0549662/view IMPORTANT DATES: February 25, 2021: BAA opens, begin submitting proposals in DSIP March 12, 2021: Topic Q&A closes to new questions at 12:00 p.m. ET March 24, 2021: BAA closes, full proposals must be submitted in DSIP no later than 12:00 p.m. ET The instructions and topics for these BAAs are available on DSIP at: https://www.dodsbirsttr.mil/submissions/login , at: https://rt.cto.mil/rtl-small-business-resources/sbir-sttr/, and the links above. Topic Q&A Proposers may submit technical questions through the Topic Q&A page at https://www.dodsbirsttr.mil/submissions/login. All questions and answers are posted electronically for general viewing. Topic Q&A will close to new questions on March 12, 2021 at 12:00 p.m. ET but will remain active to view questions and answers related to the topics until the BAA close. Proposers are advised to monitor the Topic Q&A during the BAA period for questions and answers, and frequently monitor the beta.SAM.gov link above for updates and amendments to the topic.

  • The DoD needs data-centric security, and here’s why

    September 30, 2020 | International, C4ISR, Security

    The DoD needs data-centric security, and here’s why

    Drew Schnabel The U.S. Department of Defense is set to adopt an initial zero-trust architecture by the end of the calendar year, transitioning from a network-centric to a data-centric modern security model. Zero trust means an organization does not inherently trust any user. Trust must be continually assessed and granted in a granular fashion. This allows defense agencies to create policies that provide secure access for users connecting from any device, in any location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. How does the Pentagon's AI center plan to give the military a battlefield advantage? The Pentagon's artificial intelligence hub is working on tools to help in joint, all-domain operations as department leaders seek to use data to gain an advantage on the battlefield. Andrew Eversden To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. Initially, the JIE was an innovative concept that took the DoD from a highly fragmented architecture, in which each agency managed its own cybersecurity strategy, to an architecture in which there is a unified SSA. However, one of the early challenges identified for the JIE was managing cloud cybersecurity as part of the SSA. The components in the JIE — the Joint Regional Security Stacks family's internet access points and cloud access points — have traditionally focused on securing the network, rather than the data or user. As more DoD employees and contractors work remotely and data volumes increase, hardware cannot scale to support them. This has created ongoing concerns with performance, reliability, latency and cost. A cloud-first approach In response, the DoD leverages authorized solutions from the Federal Risk and Authorization Management Program, and it references the Secure Cloud Computing Architecture guidance for a standard approach for boundary and application-level security for impact Level 4 and 5 data hosted in commercial cloud environments. The purpose of the SCCA is to provide a barrier of protection between the DoD Information Services Network and the commercial cloud services that the DoD uses while optimizing the cost-performance trade in cybersecurity. Defense agencies are now exploring enterprise-IT-as-a-service options to move to cloud, and reduce the need for constant updates and management of hardware. Through enterprise-IT-as-a-service models, defense agencies will be able to scale easily, reduce management costs and achieve a more competitive edge over their adversaries. Before the pandemic hit, defense agencies were already moving to support a more mobile workforce, where employees can access data from anywhere on any device. However, a cyber-centric military requires security to be more deeply ingrained into employee culture rather than physical protection of the perimeter. The next evolution to secure DISA and DoD networks is to embrace a secure access edge model with zero-trust capabilities. The SASE model moves essential security functions — such as web gateway firewalls, zero-trust capabilities, data loss prevention and secure network connectivity — all to the cloud. Then, federal employees have direct access to the cloud, while security is pushed as close to the user/data/device as possible. SP 800-27, zero-trust guidance from the National Institute of Standards and Technology, provides a road map to migrate and deploy zero trust across the enterprise environment. This guidance outlines the necessary tenants of zero trust, including securing all communication regardless of network location, and granting access on a per-session basis. This creates a least-privilege-access model to ensure the right person, device and service have access to the data they need while protecting high-value assets. As the DoD transforms the JIE architecture to an as-a-service model with zero-trust capabilities, defense agencies will experience cost savings, greater scalability, better performance for the end user and war fighter, improved visibility, and control across DoD networks — and ultimately a stronger and more holistic cybersecurity capability moving forward. https://www.c4isrnet.com/opinion/2020/09/29/the-dod-needs-data-centric-security-and-heres-why/

All news