Back to news

August 19, 2020 | International, Naval, C4ISR

Navy information warfare project received $400 million funding boost

WASHINGTON — An information warfare project run by Naval Information Warfare Systems Command (NAVWAR) recently received hundreds of millions of dollars in new funds after a successful first 18 months, NAVWAR announced Aug. 17.

NAVWAR's Information Warfare Research Project (IWRP), which uses an agile acquisition tool known as an Other Transaction Authority to quickly contract for and deliver IW tools, recently received a $400 million funding increase and two-year performance period extension after hitting its $100 million funding ceiling a year before the project was set to expire next summer.

The massive bump was approved by Assistant Secretary of the Navy for Research, Development and Acquisition James Geurts. The project, which kicked off in October 2018, now has a $500 million ceiling and a five-year performance period.

“IWRP has proven its effectiveness and successfulness as a streamlined approach to rapid prototyping,” said Jee Youn Fickling, IWRP program manager at Naval Information Warfare Center (NIWC) Atlantic, in a statement. “As interest increases to do more prototyping in order to keep up with the pace of technology, IWRP OTA offers the flexibility and speed within 14 technology areas. The growth in interest from IWRP users across many Navy and Marine Corps commands and program offices and the growth in the size of the consortium, speaks volumes to the need to quickly make awards for prototypes.”

The project focuses on technology areas that include tools for cyber warfare, autonomous systems, cloud computing and data analytics.

IWRP partners with industry and academia through a consortium managed by Advanced Technology International, a non-profit that builds research and development partnerships. In the last 18 months, the IWRP has released more than 800 prototyping opportunities, according to the NAVWAR press release. The consortium has more than 580 partners.

IWRP users include NAVWAR, NIWC Atlantic, NIWC Pacific, Naval Sea Systems Command Logistics, Maintenance and Industrial Operations, Program Executive Office (PEO) for Digital Enterprise Services, PEO for Manpower, Logistics and Business Solutions, PEO Command, Control, Communications, Computers and Intelligence Space Systems, PEO Integrated Warfare Systems, Marine Corps Systems Command, Naval Analytics Office and Office of Naval Research.

“IWRP has been a game changer and has proven to be a key enabler in rapid delivery of IW capability to the warfighter,” said Nicole Stone, director of rapid prototyping – information warfare at NIWC Pacific, in a statement. “Collaboration with our partners in industry, small business and academia, with the flexibility necessary to adapt to evolving requirements, is critical to our success in winning the fight. IWRP provides that platform for us.”

https://www.c4isrnet.com/information-warfare/2020/08/18/navy-information-warfare-project-received-400-million-funding-boost/

On the same subject

  • The key to securing the defense industrial base is collaboration

    July 16, 2020 | International, C4ISR, Security

    The key to securing the defense industrial base is collaboration

    Teresa Shea With cyber threats constantly evolving and increasing in sophistication, a strong national cybersecurity posture has never been more important. COVID-19 is causing an uncertainty across industry sectors, and criminals as well as adversaries are increasing their cyber-attacks and taking advantage of our increased digital work from home dependence. It is especially important to protect the organizations that comprise the U.S. Defense Industrial Base. Defined as the “worldwide industrial complex that enables research and development, as well as design, production, delivery, and maintenance of military weapons systems, subsystems, and components or parts, to meet U.S. military requirements,” Defense industrial base networks host mission-critical information and operational assets vital to national security. If infiltrated, the ramifications could plague the U.S. national security strategy, hamper our warfighting edge, create chaos within the critical infrastructure and ultimately undermine adversary deterrence. To effectively protect the Defense Industrial Base, the government and private sector must both work to secure the U.S. critical infrastructure. Organizations should prioritize collaboration to bolster the nation's cyber resiliency and collectively defend against malicious cyber actors' intent on doing us harm. Proactively defend networks It's widely known that, in an ideal world, organizations should stop threats before they reach their targets. However, to deter effectively, organizations need to have real-time situational awareness of their network infrastructure and supply chain, which can be a difficult undertaking. Threat intelligence information sharing between the government and the private sector companies that comprise the Defense Industrial Base is essential to achieving a strategic view of an advanced threat actor. Today, targets can only know what is happening to their own assets without insight into the attacker's intent. The Defense Industrial Base Cybersecurity Program allows both the DoD and private companies to share cyber threat information, mitigation and remediation strategies, which helps key players in both sectors increase cyber situational awareness and be more proactive in their security efforts. However, this program is currently voluntary, meaning that the crucial information uncovered within the program is only available to those who proactively join the program. Moving forward, both the public and private sectors must work to enact policies that require collaboration. It is no longer acceptable to rely on incident response protocols, performance assessments of existing systems and one-off reactions to threats without coordination. Increased information sharing is key to staying one step ahead of our adversaries. Follow government-suggested guidelines The U.S. government has dedicated time and resources to help secure the Defense Industrial Base, and organizations must act upon the recommendations provided. Earlier this year, the Cyberspace Solarium Commission released a report on the U.S. government's cyber readiness, which found that “the U.S. is currently not designed to act with the speed and agility necessary to defend the country in cyberspace.” The commission's findings place an emphasis on protecting the Defense Industrial Base's intellectual property, and called on Congress to require that these firms share threat data with the DoD and conduct threat hunting on their networks. Both sharing threat data and conducting threat hunting are proven to result in increased defense of our networks. A secure future As noted in a recent LawFare blog, “Cyber-enabled intellectual property theft from the DIB and adversary penetration of DIB networks and systems pose an existential threat to U.S. national security.” Given the abundance of cyber-attacks focused on Defense Industrial Base networks, penetrating them is high on our adversaries' target list. They're currently zeroing in on the U.S. critical infrastructure, attempting to poach the intellectual property that secures our very nation. Until we are willing to come together across sectors to share threat data, and commit to hiring strong talent, we will remain at a disadvantage. Fundamentally, it is about trust and our ability to put the greater defense above individual interests. If accomplished, the U.S. cybersecurity posture and resiliency will remain strong, deterring malicious cyberattacks against our Defense Industrial Base. https://www.c4isrnet.com/opinion/2020/07/15/the-key-to-securing-the-defense-industrial-base-is-collaboration/

  • Carderock Uses High-Fidelity Signature Simulation to Train Surface Combat Systems

    August 5, 2019 | International, C4ISR

    Carderock Uses High-Fidelity Signature Simulation to Train Surface Combat Systems

    By Benjamin McNight III, Naval Surface Warfare Center, Carderock Division Public Affairs WEST BETHESDA, Md. (NNS) -- In the world of simulations, getting a system to act as close to authentic as the real-world situations it represents is always the main goal. Naval Surface Warfare Center (NSWC), Carderock Division develops high-fidelity acoustic simulation and training systems, giving naval personnel the ability to practice combat scenarios virtually. The Combined Integrated Air and Missile Defense (IAMD) and Anti-Submarine Warfare (ASW) Trainer, better known as CIAT, made its official debut in December 2018 at Naval Base San Diego. In June, Naval Station Norfolk became the site for another CIAT installation. Motions to create this trainer began in 2014, according to Rich Loeffler, Carderock's senior scientific technical manager, director for signatures, tactical decision aids and training systems (Code 705). “CIAT is what we refer to as a Combat Systems Team Trainer,” Loeffler said. “Meaning that your goal is to bring in the whole portion of the crew that would be operating the combat system and train them in a shore site how they can best utilize the system when they are at sea.” Carderock shares CIAT responsibilities with NSWC Dahlgren Division. Dahlgren is responsible for the overall system integration and manages the IAMD aspect of the trainer, while Carderock leads the development of the acoustic and ASW capabilities. Carderock also has capabilities that contribute to the IAMD training. Using the periscope simulation that creates a real-time visual simulation of what one could see through the periscope of a submarine, Loeffler said they were able to utilize that technology for the surface ship trainer in the CIAT. “In this case, they have deck cameras if they want to be able to see when a missile launches from the forward or aft launchers. We basically provide the visuals for that,” he said. By modeling the threats and the ocean environment and then stimulating the actual tactical combat system software, the CIAT system is highly flexible in the ability to train real-world scenarios. With the many possibilities of training situations that can be created within the CIAT comes the need to use multiple sources of knowledge to create effective training situations that will benefit the fleet. “We'll work with people like the Office of Naval Intelligence to get threat intelligence data, we'll work with folks like the Naval Oceanographic Office to get the latest environmental models and databases, and then we'll work with the tactical programs themselves to get the tactical software,” Loeffler said. “Our role here at Carderock has been to leverage signature simulation capabilities we have developed over the years across submarine, surface and surveillance ASW trainers and provide the system design, development, integration and testing support to implement the CIAT requirement to support the fleet's training needs,” he said. Before the CIAT existed, the Surface ASW Synthetic Trainer (SAST) was developed by Carderock as an on-board embedded training system within the AN/SQQ-89 A(V)15 Sonar system. Loeffler said beginning in 2008, they went through a series of large analyses to compare and contrast what the simulation produced with what operators saw at sea. The data from that testing helped further develop the SAST and subsequently create the CIAT. Now, they are able to represent all components of the operations they run from the physics modeling perspective, such as what sounds are generated and how they propagate through the water, interactions with interfering objects and sea-state effects on these variables. “Since we're acoustically stimulating the actual tactical software of the sonar system, the users are operating the systems just as they would at sea,” he said. Loeffler believes that there is not anything off limits for what the CIAT can do, but adapting with new threats will require the right development within the trainer to represent the real-world situation. Although the system is relatively new, discussions on the next steps in the development of the trainer are already taking place with the help of Center for Surface Combat Systems (CSCS) defining and prioritizing fleet training requirements “CSCS is basically the primary stakeholder that owns the surface-ship training schoolhouses, and they've done their requirements review to see what additional capabilities they'd like to see in the next version of CIAT,” Loeffler said. “So, we're going through that process, assessing those requirements and looking for what would go into the next version to further improve training and also address training of the new combat system capabilities as they are being introduced into the fleet.” https://www.navy.mil/submit/display.asp?story_id=110471

  • New Model Standardizes Measurement Of Cybersecurity In Critical DoD Assets

    August 13, 2019 | International, Security

    New Model Standardizes Measurement Of Cybersecurity In Critical DoD Assets

    ARLINGTON, Va., Aug. 13, 2019 /PRNewswire/ -- Cyber experts from Lockheed Martin [NYSE: LMT] developed and piloted a first-of-its-kind model that standardizes how to measure the cyber resiliency maturity of a weapon, mission, and/or training system anywhere in its lifecycle – the Cyber Resiliency Level™ model (CRL®). The U.S. government defines "cyber resiliency" as the ability to anticipate, withstand, recover from, and adapt to changing conditions in order to maintain the functions necessary for mission effective capability. Until now, the aerospace and defense industry lacked a simple, common method to discuss cyber resiliency of a military system. "Today's software-based military systems and a global supply chain make securing military systems a complex problem to solve," said Jim Keffer, director of Cyber, Lockheed Martin Government Affairs. "With the CRL, we can now leverage existing risk management frameworks to effectively measure and communicate resiliency across six categories we know are important to our customers. The release of this model builds on Lockheed Martin's enduring commitment to mission assurance and will ultimately help the warfighter operate in cyber-contested environments." To use the model, engineers work with U.S. and allied military program stakeholders to conduct a series of risk and engineering assessments. The process provides increased visibility into the current state of risk and produces a customized, risk-mitigation roadmap that shows how to increase a system's CRL to a more desirable level. "In an era of scarce resources, the CRL model can help stakeholders make informed decisions and prioritize cyber spending on the most impactful solutions," said Keffer. To date, Lockheed Martin has used model-based assessments on several of its own systems across multiple domains and plans to conduct at least 10 CRL assessments by the end of 2019. To learn more about CRL and how to apply it to your systems, visit: http://lockheedmartin.com/en-us/capabilities/cyber/crl.html About Lockheed Martin Headquartered in Bethesda, Maryland, Lockheed Martin is a global security and aerospace company that employs approximately 105,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services. SOURCE Lockheed Martin https://news.lockheedmartin.com/2019-08-13-New-Model-Standardizes-Measurement-of-Cybersecurity-in-Critical-DoD-Assets

All news