October 10, 2023 | International, Land
Competing robotic vehicles on display after Army signals new approach
The four companies have until August 2024 to provide the Army with their prototypes for testing
February 8, 2023 | International, C4ISR
The five-year contract is worth up to $192 million and will provide high-resolution electro-optical and synthetic aperture radar imagery.
October 10, 2023 | International, Land
The four companies have until August 2024 to provide the Army with their prototypes for testing
March 20, 2020 | International, Naval, C4ISR
By: Mike Gruss The Navy plans to test next year whether it can push new software — not just patches but new algorithms and battle-management aids — to its fleet without the assistance of in-person installation teams. Navy officials plan to send the first upgrades to the aircraft carrier Abraham Lincoln's C4I systems for a test in early 2021, officials said during a March 3 media roundtable at the West 2020 trade show in San Diego. Today, Navy teams frequently deliver security patches to ships, but that process does not allow for new capabilities. The reason is because service officials fear that one change to the ship's software could have unintended consequences, creating a cascading effect and inadvertently breaking other parts of the system. But in recent years, Navy officials have embraced the idea of digital twins, which are cloud-based replicas of the software running on a ship's systems. This setup allows Navy engineers to experiment with how new code will react with the existing system. It also helps software developers work on the same baseline and avoid redundancies. Ultimately, the setup offers Navy officials a higher degree of confidence that the software they're uploading will work without any surprises. The Navy completed its first digital twin, the Lincoln, in fall 2019 and has started building a digital twin of the aircraft carrier Theodore Roosevelt. Eventually Navy leaders expect to complete a digital twin of all the service's ships. However, only those in the fleet that have already been upgraded to a certain version of the Navy's tactical afloat network, known as the Consolidate Afloat Networks and Enterprise Services program, or CANES, would be eligible for the over-the-air updates. “In the Information Warfare community, software is a weapon,” Rear Adm. Kathleen M. Creighton, the Navy's cybersecurity division director in the Office of the Deputy Chief of Naval Operations for Information Warfare, told C4ISRNET in a March 17 statement. “If we were to ask a warfighter if it would be valuable to conceptualize, order and receive additional kinetic capability at sea, of course the answer would be yes. The same is true of software. “In an ever-dynamic warfighting environment, the ability to improve, add to, or build new capabilities quickly has extraordinary value. We believe our sailors on the front line are the best positioned to tell us what they need to win. That is what we are trying to accomplish. Put the warfighter's perspective at the center of the software we deliver and do it iteratively at speed.” In this case, think of a capability update for a ship much like downloading a new app on a smartphone. Today, some ships in the fleet can receive security updates for applications they've already downloaded, but they cannot download new applications. Navy officials expect that to change. The new capability would arrive as an automatic, over-the-air update or come pierside, but would not require an installation team as is the case today. “Anytime there's a new capability or a new change, we're just going to do it the same way that you get that done on your smartphone,” said Delores Washburn, chief engineer at the Naval Information Warfare Center Pacific, which is leading the change. “What we will be able to [do] now is do a rapid update to the ships.” Navy engineers hope to be able to push the updates as quickly as war fighters need them. “We're going to try to go slowly here because, again, we're having to tackle simultaneously cultural, technical and operational problems,” said Robert Parker, the deputy program executive officer for command, control, communications, computers and intelligence. The Navy plans to test this new arrangement by installing a set of software, performing an update and then fairly quickly pushing that update to the ship. https://www.c4isrnet.com/battlefield-tech/it-networks/2020/03/19/the-navy-will-test-pushing-new-software-to-ships-at-sea/
July 3, 2018 | International, C4ISR
By: Mark Pomerleau Cyber has been an official domain of warfare for nearly a decade, yet the Department of Defense is still learning how to integrate it with operations. And some members of Congress are concerned the traditional military intelligence organs to this day don't understand intel support to cyber ops. The House Armed Services Committee is directing that a briefing on the subject must take place by December 1, 2018. The briefing — delivered by the under secretary of defense for intelligence, in coordination with the Defense Intelligence Agency and the military services — is expected, according to a provision in the committee's annual defense policy bill, to address multiple issues, including: Efforts to standardize a common military doctrine for intelligence preparation of the battlefield for cyber operations; Efforts to develop all-source intelligence analysts with the capability to support cyber operations; and Efforts to resource intelligence analysis support elements at U.S. Cyber Command and the service cyber components. “The committee is concerned about the Defense Intelligence Enterprise's ability to provide the cyber community with all-source intelligence support, consistent with the support provided to operations in other domains,” the provision, called an “item of special interest,” says. In some cases, other intelligence disciplines, such as human intelligence or signals intelligence, might be needed to help enable a cyber operation. A committee aide noted that the goal is to get DoD to think about cyber operations just as operations in any domain and build the infrastructure to support that. According to Gus Hunt, Accenture Federal Services cyber strategy lead, cyber as a domain is really no different than the others from an intelligence support perspective. The objective of intelligence, he told Fifth Domain in a recent interview, is to ensure it provides timely information about the adversary, who they are, the status of their capabilities and any information about the threats that are there. “I think what you're seeing ... is that people are asking the question are we appropriately structured or resourced and focused to be as effective as we possibly can in this new realm of cyber and cyber operations,” Hunt, who previously served as the chief technology officer at the CIA, said. “Because they're asking the question, I think the obvious answer is ... we're not structured as effectively as we possibly can be ... [but] it's really good that people are sitting there asking.” The Army is experiencing similar problems, especially when it comes to experimenting with force structure changes and bringing cyber effects to the tactical edge, which currently don't exist. “We're not seeing a corresponding growth in the intel organizational structure with the cyber and” electronic warfare, Lt. Col. Chris Walls, deputy division chief for strategy and policy in the cyber directorate of the Department of the Army G-3/5/7, said at the C4ISRNET conference in May. “The existing intel force structure is really going to be stressed when we put this EW and cyber capability into the field unless they have a corresponding growth and capability as well,” Walls said of tactical cyber effects and teams. https://www.fifthdomain.com/congress/2018/07/02/does-dod-know-how-to-supply-intel-for-cyber-ops/