Filter Results:

All sectors

All categories

    4141 news articles

    You can refine the results using the filters above.

  • High-cost satellites remain vulnerable to low-cost threats

    April 24, 2018 | International, Aerospace, C4ISR

    High-cost satellites remain vulnerable to low-cost threats

    By: Daniel Cebul WASHINGTON ― Despite advances in satellite technology, many of the U.S. military's most expensive and necessary assets remain vulnerable to jamming from inexpensive tools, according to a new report from the CSIS Aerospace Security Project. “The technology needed to jam many types of satellite signals is commercially available and relatively inexpensive,” the report reads. Other electronic threats such as spoofing, which attempts to trick receivers into believing manipulated data from an attacker is real, also offer low cost options to adversaries who hope to interfere with satellite connectivity. These kinds of attacks can disrupt communications or position, navigation and timing techniques. The report, released April 12 and titled “Space Threat Assessment 2018,” notes that while United States near-peer adversaries have made strides in more advanced kinetic weapons, such as direct ascent anti-satellite weapons, jamming technology also is seen as critical. For example, “China has made the development and deployment of satellite jamming systems a high priority,” according to the authors, Todd Harrison, Kaitlyn Johnson and Thomas Roberts. Another near-peer, Russia, has displayed jamming and spoofing capabilities in the ongoing conflicts in Ukraine and Syria in the last several years. The report said the use of Russian technology in these conflicts “demonstrate[s] that Russia retains advanced electronic attack capabilities, despite some analysts' claims that Russia's ability to jam and spoof satellites has declined since 1991.” But the threat from jamming and spoofing attacks goes beyond near-peers. Iran and North Korea, so-called rogue states, also have demonstrated the capability and willingness to interfere with satellite communications and GPS signals, according to the report. And the ability to jam and spoof signals is likely to spread. The report notes once a jammer or spoofer is developed, “it is relatively inexpensive to produce and deploy in large numbers and can be proliferated to other state and non-state actors.” But the United States is not sitting by idly. The Air Force's Advanced Energy High Frequency satellites, reserved for secure communication, “incorporate a high degree of protection against jamming, spoofing, and other forms of electronic attack,” according to the report. The U.S. is also preparing troops to operate in GPS-denied environments. In January, the Defense Department jammed GPS-signals in western states so pilots could train in environments that will likely come to characterize combat in the age of electronic warfare. https://www.defensenews.com/digital-show-dailies/space-symposium/2018/04/16/high-cost-satellites-remain-vulnerable-to-low-cost-threats/

  • Air Force launches experiment to boost satellite communications

    April 24, 2018 | Aerospace, C4ISR

    Air Force launches experiment to boost satellite communications

    United Launch Alliance successfully launched two Air Force satellites aboard an Atlas 5 rocket from a launch complex at Cape Canaveral in Florida April 14. The Air Force's dual-payload mission included an experimental satellite bus, known by the acronym EAGLE, and a secretive communications satellite, the Continuous Broadband Augmented SATCOM spacecraft (CBAS). The Air Force had kept the identity of CBAS (pronounced “sea bass) under wraps until April 6. Even after acknowledging its existence, the service declined to identify the the contractor who built CBAS and only released a short description dressing the spacecraft's mission. “The mission of CBAS is to augment existing military satellite communications capabilities and broadcast military data continuously through space-based, satellite communications relay links,” the Air Force's Space and Missile Systems Center said in a release. In the lower position of the payload shroud, attached to aft of the CBAS, sat the Evolved Expendable Launch Vehicle (EELV) Secondary Payload Adapter (ESPA) Augmented Geosynchronous Laboratory Experiment satellite, dubbed EAGLE. Developed by Orbital ATK for the Air Force Research Laboratory, EAGLE is both a satellite and bus platform hosting a suite of other experiential payloads for the Department of Defense. EAGLE's primary mission is to demonstrate a maneuverable vehicle design which can transport up to six payloads to GEO, according to a ULA release. One payloads on board the EAGLE is the Mycroft satellite. Named after the older brother of Sherlock Holmes, the Mycroft is a mini satellite designed to deploy away from the EAGLE only to return within one kilometer of its parent spacecraft. From there it will evaluate the EAGLE's surroundings using an space situational awareness camera and sensors to perform guidance, navigation and control functions on the EAGLE, according to an Air Force fact sheet. “Together, EAGLE and Mycroft help train operators and development of tactics, techniques and procedures during exercises or experiments to improve space warfighting,” the fact sheet reads. “Other experiments hosted on the EAGLE will detect, identify and analyze system threats such as man-made disturbances, space weather events or collisions with small meteorites.” Mycroft is a follow-up to the ANGLES satellite which was launched in 2014 and ended its mission in November. ANGLES was used by the Air Force to evaluate space-based threats and to expand techniques used to maneuver closer to specific objects on orbit. The satellites launched Saturday were part of the Air Force's multi-manifested mission called Air Force Space Command (AFSPC)-11. The Air Force declared the launch a success shortly after 2 a.m. EDT on Sunday in a press release. Raytheon's Infrared Imaging Space Experiment (IRISX), was also included in the launch. The IRISX is an electro-optical instrument placed in geostationary orbit, to test new concepts for persistent Earth viewing, the company said. “IRISX will explore the applicability of advanced imaging and data processing techniques for Department of Defense remote sensing applications,” according to a release. “The results will be used to verify, validate, and update physics-based phenomenology models in order to advance the scientific knowledge underlying imaging techniques.” https://www.c4isrnet.com/c2-comms/satellites/2018/04/16/air-force-launches-experiment-to-boost-satellite-communications/

  • Turkey provides tax breaks, loans to attract investment in local defense programs

    April 24, 2018 | International, Aerospace, Land, C4ISR

    Turkey provides tax breaks, loans to attract investment in local defense programs

    By: Burak Ege Bekdil ANKARA, Turkey — In an effort to boost indigenous defense programs, Turkey is providing incentives, which include generous tax breaks, tax reductions and exemptions from import duties. The incentives include additional levies and soft loans. In just the first two months of 2018, the government incorporated 13 defense investment projects submitted by 12 companies into its incentives program. These investments are worth $350 million. The largest investment program benefiting from the incentives during the January/February time frame was Roketsan's new production line. The state-controlled missile maker's investment plan is worth $217 million. Military electronics specialist Aselsan, Turkey's largest defense company, has won incentives support for its new $35 million investment in electronic systems and new $40 million investment in aerial and missile systems. Official figures show a boom in private defense investment, too. According to the Ministry of Economy, $1.9 billion of defense investment by private companies will be subsidized by government incentives this year. These investment plans include a total of $220 million for armored vehicles, a laser gun and unmanned land vehicles; and $125 million in diesel tank engines by armored vehicle producer BMC, a Turkish-Qatari private joint venture. Private firm Most Makina will receive government incentives for its planned $385 million investment in steel equipment for defense systems. Turkish Aerospace Industries, or TAI, will invest $1.2 billion in its TF-X program, an ambitious plan for the design, development and production of Turkey's first indigenous fighter jet. TAI is developing the TF-X with BAE Systems. https://www.defensenews.com/industry/2018/04/16/turkey-provides-tax-breaks-loans-to-attract-investment-in-local-defense-programs/

  • How the Army plans to improve its friendly force tracking

    April 24, 2018 | International, Land, C4ISR

    How the Army plans to improve its friendly force tracking

    By: Mark Pomerleau The Army is upgrading how it tracks friendly forces to increase readiness. During the fiscal 2019 budget roll out in February, Army officials at the Pentagon indicated that the service would be accelerating its Joint Battle Command-Platform, which provides friendly forces awareness information known as blue force tracking, as well as encrypted data and faster satellite network connectivity. The change is intended to solve mounted mission command problems across all formations. The new budget request shows the service is serious about the issue. The Army asked for $431 million for the program in FY2019. That's up from a total of $283 million during the FY2018 budget. Moreover, the Army plans to procure 26,355 systems as opposed to 16,552 from the FY2018 budget. However, officials in the program office were careful to note this was not a “plus-up, so to speak,” but an effort to accelerate the fielding of the tracking systems. C4ISRNET's Mark Pomerleau recently spoke about the program's modernization efforts with Col. Troy Crosby, project manager for Mission Command, alongside Lt. Col. Shane Sims, product manager for JBC-P, assigned to Project Mission Command. C4ISRNET: How should we interpret the FY2019 budget request for this program? COL. TROY CROSBY: It's important to understand that there wasn't necessarily a plus-up. Really what happened is we shifted already approved authorizations to the left. We're just expediting sooner. The Army asked us what we could do to modernize faster ... essentially, we went back to them and said give us the funding and the resources to move a lot of those units to the left because every year the G-3/5/7 comes out with this priority list and we weren't able to get down to that priority list because of funding. That's really what you're seeing with that movement of money from the out years closer in to the left. C4ISRNET: What led to the decision to baseline the program across formations? CROSBY: The Army's looking to standardize their baselines not only on the platforms like JBC-P, but also a similar effort in the command post with software baseline reduction. Moving to the standard baseline on the platform-side helps with training, readiness and the physical constraints as we can depreciate the older versions of FBCB2/BFT [Force XXI Battle Command Brigade and Below/Blue Force Tracking] out of sustainment. C4ISRNET: How does standardization help the Army? CROSBY: Any time you're greatly standardized in a organization the size of the Army, you're going to get easier interoperability down at the tactical level. If Lt. Col. Sims is Sgt. Sims and he is in a unit at Fort Stewart and we were trained on the current systems in the force and then he gets [a permanent change of station] out to Fort Riley, he already has a base of knowledge when he hits the ground on what those systems are because they're the same across the force. So, the training burden for his new units greatly reduced. I think it also helps in readiness as units and soldiers move around the battlespace. The other reason the Army really wants to standardize on JBC-P is, like with all systems in the tactical network, we're always looking to improve cyber posture, and there were multiple improvements in our cyber posturing that the department felt were relevant to try to accelerate so we could get that capability to the entire force as quickly as possible. C4ISRNET: In terms of cyber, what are some modernization efforts you're undertaking to help this platform perform in the more dynamic environments? CROSBY: I think the best way that we can characterize it is looking to ... achieve a cyber posture that allows us to operate both in a counter-insurgency/counterterrorism role and a near-peer adversary role. We're looking to answer both sides of that coin. Yes, current fight, but we're also looking to make sure we're cyber postured for a near-peer. LT. COL. SHANE SIMS: You can probably draw some conclusions from what you know on the commercial side. Imagine having a computer that's over 20 years old — that's where some of our platforms are right now when you're talking about the FBCB2 that was fielded almost two decades ago. C4ISRNET: In terms of your FY19 funding, could it be characterized as investing in standards to help increase readiness and lethality? CROSBY: Very much so. The plus-up kind of touched a couple of areas. On the research and development side, the plus-up helps us in looking at ways to modernize and bring new capability for the blue force tracking network side. We're really looking to expedite that fielding for better cyber posture. C4ISRNET: It sounds like standardization is very important from an Army readiness and lethality perspective. SIMS: When talking JBC-P, there are really three components: the software, the hardware and then the network. Really, what we're doing on a couple fronts [is] we're expediting the fielding to get the hardware out there but that's going to set the conditions for what we're doing in the command post with the infrastructure. That same infrastructure is going to reside on our hardware that's in the platform. The commanders are in environments where they experience something completely different in the command post than you experience on the platforms. You hear repeatedly from the commanders, “Can I have the same type of user experience?” Data's really what we're addressing with the modernization of the command post and the mounted computing environment. That user experience is going to be one and the same for the commander when he or she is in the command post and then when they get in the vehicle. That is really what we're doing with modernization for JBC-P. C4ISRNET: The National Defense Strategy has stressed prioritization on great power competition. How does JBC-P modernization and standardization fit into that strategy? CROSBY: The first one is looking to modernize JBC-P mission command on the move at the platform level. How we continue to modernize and field as fast as we can so that we can maintain both that counter-insurgency/counterterrorism fight and near-peer adversaries is one piece of this. https://www.c4isrnet.com/thought-leadership/2018/04/13/how-the-army-plans-to-improve-its-friendly-force-tracking/

  • Pentagon creates new position to help guide software acquisition, F-35 development

    April 24, 2018 | International, Aerospace, C4ISR

    Pentagon creates new position to help guide software acquisition, F-35 development

    By: Valerie Insinna WASHINGTON — The U.S. Defense Department is creating a new position to help formulate its software strategy and ensure it keeps pace with commercial advancements — and the most important resposiblity will be overseeing the F-35 joint strike fighter's agile software strategy. During a Friday roundtable with reporters, Ellen Lord, the undersecretary of defense for acquisition and sustainment, announced that she has tapped Jeff Boleng to the newly created position of special assistant for software acquisition. Boleng, currently the acting chief technology officer at Carnegie Mellon University Software Engineering Institute, will start April 16 as a member of Lord's team. “Jeff Boleng will spend over 90 percent of his time on F-35. He is going to be the individual who is working amongst all of the groups to enable us to bring the right talent onboard,” Lord said. “We have a challenge, I think both within the JPO [F-35 joint program office] as well as Lockheed Martin, in terms of getting a critical mass of contemporary software skill sets to begin to move in the direction we want to.” As the F-35 joint program office embarks on a new strategy called Continuous Capability Development and Delivery, or C2D2, which involves introducing agile software development, Lord wants to ensure that both the JPO and Lockheed have employees with the right training to execute the effort and that they can attract new professionals with additional software expertise. “This is something that [Lockheed CEO] Marillyn Hewson and I have talked about,” she said. “Lockheed Martin has some excellent software capability throughout the corporation. My expectation is that they're going to leverage that on the F-35. And as we within the Department of Defense really increase our capability for software development focused on C2D2, our expectation is that Lockheed Martin will do the exact same thing. “So they have the capability. I'm very energized about the leadership focus that I have seen in the last four to eight weeks, so I have great expectations that that will continue and that Lockheed Martin will keep pace or outpace DoD in terms of modernization for F-35 software development.” Boleng, a former cyberspace operations officer and software engineer who served more than 20 years with the Air Force, last held the position of teaching computer science at the Air Force Academy before moving to the private sector. At Carnegie Mellon, he is responsible for spearheading the institutes research and development portfolio, which includes software development, data analytics and cyber security activities in support of the Defense Department. As the special assistant for software acquisition, he will help develop department-wide software development standards and policies and “advise department leadership on latest best practices in commercial software development.” Boleng will also interface with Pentagon organizations charged with ramping up the department's software prowess such as Defense Digital Services, a small group of former private-sector tech professionals who led the department's “Hack the Pentagon” events and have conducted a few assessments of F-35 software. That starts with a meeting today between Lord, Boleng and a Defense Innovation Board group centered on software acquisition, which has been embedded both with the joint program office and Lockheed Martin, Lord said. https://www.defensenews.com/pentagon/2018/04/13/pentagon-creates-new-position-to-help-guide-software-acqusition-f-35-development/

  • Driving job creation and innovation in Canada through defence spending

    April 23, 2018 | Local, Aerospace, Naval, Land, C4ISR, Security

    Driving job creation and innovation in Canada through defence spending

    Canada positioned to lead globally in five emerging technology areas while building on its strengths April 23, 2018, Ottawa Canada has a strong and innovative defence industry with over 650 companies that employ more than 60,000 Canadians. One way the Government of Canada supports this industry is the Industrial and Technological Benefits (ITB) Policy, which requires that for every dollar it spends on big defence purchases, the winning contractor must put a dollar back into Canada's economy. In the past 30 years, the ITB Policy has generated investments of $30 billion in Canada's economy, and generates around 40,000 jobs annually. Through Canada's defence policy, Strong Secure, Engaged, defence purchases are being used to unlock billions of dollars in economic benefits and create middle-class jobs. To maximize these opportunities, the Honourable Navdeep Bains, Minister of Innovation, Science and Economic Development, today announced that the government will use the ITB Policy to motivate defence contractors to invest in Key Industrial Capabilities (KIC). These are five areas of Canadian industrial strength in emerging technologies, which have the potential to grow quickly, and 11 established industrial capabilities where Canada is globally competitive or where domestic capacity is essential to national security: Emerging technologies Advanced materials Artificial intelligence Cyber resilience Remotely piloted systems and autonomous technologies Space systems Leading competencies and critical industrial services Aerospace systems and components Armour Defence systems integration Electro-optical and infrared systems Ground vehicle solutions In-service support Marine ship-borne mission and platform systems Munitions Shipbuilding, design and engineering services Sonar and acoustic systems Training and simulation Key Industrial Capabilities align with the government's Innovation and Skills Plan by supporting the development of skills and fostering innovation in Canada's defence sector. Quotes “Our defence industry asked for a list of Key Industrial Capabilities, and we delivered. As a result of promoting investment in areas with potential for rapid growth, our armed forces will be better equipped, we will have a stronger economy and we will create thousands of middle-class jobs.” – The Honourable Navdeep Bains, Minister of Innovation, Science and Economic Development “Canada's defence industry welcomes Key Industrial Capabilities as an important policy tool to strengthen our government-industry partnership. KICs will incentivize strategic investments in existing and emerging defence and security capability where Canada has leading-edge and globally competitive technologies. The capabilities identified today demonstrate the world-class, innovation-led nature of the defence and security industry here in Canada.” – Christyn Cianfarani, President and CEO, Canadian Association of Defence and Security Industries “By defining its Key Industrial Capabilities, the government has provided another significant instrument for leveraging public procurements to increase investment in areas of Canadian industrial strength and opportunity. The strong aerospace presence in the KICs identified by the government today illustrates the strength of our industry, as well as its potential to continue building its competitive advantage in the years ahead. We are very pleased that the government has identified its KICs, and congratulate Minister Bains on the successful launch of this important procurement tool.” – Jim Quick, President and CEO, Aerospace Industries Association of Canada Quick facts The list of Key Industrial Capabilities will evolve over time to reflect technological advances and changing defence requirements and will be reviewed and updated on a regular basis. Adoption of these Key Industrial Capabilities was first recommended in the 2013 report, Canada First: Leveraging Defence Procurement Through Key Industrial Capabilities (also known as “The Jenkins Report”). The defence industry is both innovative, with an R&D intensity 4.5 times the Canadian manufacturing average, and export-oriented, with 60 percent of its sales in 2016 taking place in the global market. From 1986 to 2016, the overall portfolio of ITB obligations included 137 contracts valued at $41.5 billion, with $28.3 billion in business activities already completed, $9.4 billion of activities in progress and $3.8 billion in unidentified future work opportunities. Associated links Industrial and Technological Benefits Policy Key Industrial Capabilities Defence Acquisition Guide 2016 Strong Secure, Engaged Innovation and Skills Plan Canada First: Leveraging Defence Procurement Through Key Industrial Capabilities Contacts Follow the department on Twitter: @ISED_CA Karl W. Sasseville Press Secretary Office of the Minister of Innovation, Science and Economic Development 343-291-2500 Media Relations Innovation, Science and Economic Development Canada 343-291-1777 ic.mediarelations-mediasrelations.ic@canada.ca https://www.canada.ca/en/innovation-science-economic-development/news/2018/04/driving-job-creation-and-innovation-in-canada-through-defence-spending.html

  • States Turn To National Guard To Help Protect Future Elections From Hackers

    April 23, 2018 | International, C4ISR, Security

    States Turn To National Guard To Help Protect Future Elections From Hackers

    DAVE MISTICH In elections past, the integrity of the vote was protected by poll workers and election officials. But in 2018 and likely beyond, elections are being protected by people like the anonymous man who works in the basement of the West Virginia Capitol. He's member of the West Virginia National Guard who is a cybersecurity specialist responsible for monitoring any computer-related threats to the state's elections. Since August of last year, he's been attached full time to the office of Secretary of State Mac Warner. After Russian-backed hackers probed election-related systems in at least 21 states in 2016, election officials, whose focus has traditionally been on making sure that polling places run smoothly and that results are speedily reported, now have to focus on protecting their computer systems. Oftentimes lacking those resources in-house, National Guard specialists have been called in to monitor vital election systems in a handful of additional states, including Colorado, Ohio and South Carolina. Neither the West Virginia National Guard nor Warner's office would permit the soldier to speak on the record, but Warner emphasized how crucial the role is. "We, just like every other government entity and people in business, are getting pinged all the time. Somebody is checking to see are there any open doors [or] open windows for targets of opportunity," Warner said. Warner's current use of the National Guard builds upon his predecessor, Natalie Tennant, who enlisted their cybersecurity expertise to scan the state's election systems for vulnerabilities and patch them in the final stretch of the 2016 election. In January 2017, the outgoing Obama administration designated elections as part of the country's critical infrastructure. That meant new federal resources and scrutiny. The Department of Homeland Security is working to give security clearances to state officials so they can receive intelligence briefings and assessments. Warner, like other state-level election officials, is in the middle of a months-long process of getting cleared. Using Guard soldiers who already have a high-level clearance, "is a way to bridge the gap without causing a problem in that security system process," said West Virginia National Guard Adjutant General James Hoyer. State officials are trying to figure out how to prepare for a threat they had never before anticipated, said Eric Rosenbach, a former Defense Department official who now directs a program on election security at Harvard's Belfer Center for Science and International Affairs. "These state election officials are the pointy tip of the spear for nation-state actors like the Russians trying to attack our democracy. That's never before been their job," said Rosenbach. "If part of [the National Guard's] responsibilities is to protect the things most precious to a state — it kind of makes sense that you would want them to support an effort like that." While the regular military can't be involved in domestic law enforcement due to a post-Civil War federal law known as Posse comitatus, National Guard soldiers are under the jurisdiction of the governor unless they're activated by the federal government. "The threat is new and we need to evolve with the times — as long as it still fits in the right legal framework and we're doing something that, you know, all Americans would agree are part of our democratic traditions," Rosenbach said. Moving forward, Warner sees his office's partnership with the National Guard continuing. "The cybersecurity arena is one of those where we as public officials have to get it right every time. The hackers only have to penetrate one time to do substantial damage," Warner said. "So, it's a foot race that we have to stay one step ahead and it never ends. It just goes on and on." So far, the National Guard has monitored a few small local elections in West Virginia and Warner's office says they have yet to receive a threat that has risen to a level of what they called "actionable." With the state's primary election slated for May 8, the Guard's first big election cybersecurity test is already underway. https://www.npr.org/2018/04/11/601201517/states-turn-to-national-guard-to-help-protect-future-elections-from-hackers

  • DARPA official: To build trust in AI, machines must explain themselves

    April 20, 2018 | International, C4ISR, Security

    DARPA official: To build trust in AI, machines must explain themselves

    By: Brandon Knapp Artificially intelligent systems must be able to explain themselves to operators if they are to be trusted, according to an expert from the Defense Advanced Research Agency, who voiced concern that methods used by current AI systems are often masked by mysterious algorithms. “A lot of the machine learning algorithms we're using today, I would tell you ‘good luck,” Fred Kennedy, the director of DARPA's Tactical Technology Office during a panel at Navy League's Sea-Air-Space on April 10. “We have no idea why they know the difference between a cat and a baboon.” “If you start diving down into the neural net that's controlling it,” Kennedy continued, “you quickly discover that the features these algorithms are picking out have very little to do with how humans identify things.” Kennedy's comments were in response to Deputy Assistant Secretary of the Navy for Unmanned Systems Frank Kelley, who described the leap of faith operators must make when dealing with artificially intelligent systems. “You're throwing a master switch on and just praying to God that [Naval Research Laboratory] and John's Hopkins knew what the hell that they were doing,” Kelley said of the process. The key to building trust, according to Kennedy, lies with the machines. “The system has to tell us what it's thinking,” Dr. Kennedy said. “That's where the trust gets built. That's how we start to use and understand them.” DARPA's Explainable Artificial Intelligence program seeks to teach AI how to do just that. The program envisions systems that will have the ability to explain the rationale behind their decisions, characterize their strengths and weaknesses, and describe how they will behave in the future. Such capabilities are designed to improve teamwork between man and machine by encouraging warfighters to trust artificially intelligent systems. “It's always going to be about human-unmanned teaming,” said Kennedy. “There is no doubt about that.” https://www.defensenews.com/home/2018/04/10/darpa-official-to-build-trust-in-ai-machines-must-explain-themselves/

  • National Defence launches IDEaS Program to solve Defence and Security challenges through Innovation

    April 9, 2018 | Local, Aerospace, Naval, Land, C4ISR, Security

    National Defence launches IDEaS Program to solve Defence and Security challenges through Innovation

    News release From: National Defence April 9, 2018 – Ottawa, Ontario – National Defence / Canadian Armed Forces Problem solving, creativity and knowledge are critical to meet and mitigate evolving defence and security threats. Through innovation we will develop and maintain capabilities that address the challenges of today's global security environment. To transform the way we generate solutions to complex defence and security challenges, today, Defence Minister Harjit Sajjan launched the new Innovation for Defence Excellence and Security (IDEaS) program. Originally announced in June 2017 with the release of Canada's defence policy Strong, Secure, Engaged, IDEaS will invest $1.6 billion into Canada's innovation community over the next 20 years. Through IDEaS, DND will reach out to Canada's most innovative and creative minds, whether they are inventors, academics in university labs, or scientists in small and major corporations. These innovative thinkers will provide the Canadian Armed Forces (CAF) and Canada's safety and security communities with unique solutions to today's challenges. IDEaS will stimulate innovation through a range of activities including competitions, networks, and sandboxes to field test concepts. Today, Minister Sajjan announced the first call for proposals under the IDEaS Competitive Projects element, in which sixteen defence and security challenges have been identified. Interested parties have six weeks to submit their proposed solutions, which must be received by May 24, 2018. This call for proposals addresses challenges in domains such as surveillance, cyber tools for defence, space, artificial intelligence, remotely pilot systems, data analytics, and human performance. Proposals will be reviewed and undergo a rigorous evaluation process. The first contracts are anticipated to be awarded in Fall 2018. Innovators are encouraged to consult the IDEaS website for more information on this and subsequent calls as the IDEaS program continues to take shape. Quotes “The IDEaS Program will provide unique opportunities for Canadians to put forward their best solutions on defence and security challenges, and will help put those solutions into the hands of the women and men of the Canadian Armed Forces. This investment will support the growth and expansion of Canada's innovation community for the next 20 years.” – Minister of National Defence, Harjit S. Sajjan Quick facts Through IDEaS, National Defence will: Create networks of innovators (academia, industry, individuals, and other partners) to conduct leading-edge research and development in areas critical to future defence and security needs; Hold competitions and invite innovators to present viable solutions to specific defence and security challenges; and Implement new procurement mechanisms that allow Defence to develop and test concepts and to follow through on the most promising ideas. IDEaS will help innovators by supporting analysis, funding research, and developing processes that facilitate access to knowledge. It will also support testing, integration, adoption, and acquisition of creative solutions for Canada's defence and security communities. Associated links Backgrounder –Innovation for Defence Excellence and Security (IDEaS) Program Backgrounder - Government of Canada calls on innovative thinkers to solve defence and security challenges IDEaS Strong, Secure, Engaged Contacts Byrne Furlough Press Secretary Office of the Minister of National Defence Phone: 613-996-3100 Email: Byrne.Furlong@forces.gc.ca Media Relations Department of National Defence Phone: 613-996-2353 Email: mlo-blm@forces.gc.ca

Shared by members

  • Share a news article with the community

    It’s very easy, simply copy/paste the link in the textbox below.

Subscribe to our newsletter

to not miss any news from the industry

You can customize your subscriptions in the confirmation email.