US Defence Needs New Software at the Centre of its Operations

Cloud adoption, software modernisation, Artificial Intelligence and cyber security are paramount to all US Defense Department (DoD) missions. Now, the CIA's Chief Technology Officer Nand Mulchandanand the former head of the Air Force's Project Maven want to take the Pentagon out of the industrial age and into the digital age.

The offices of the chief information officer, the under-secretaries of defense for acquisition and sustainment and research and engineering, as well as the software modernisation senior steering group are involved in efforts to operationalise the strategy.

A paper published by the Center for Strategic and International Studies calls for the US military to modernise legacy warfighting systems in order to prepare for future conflicts. The Report basically says that The Department of Defense must adopt new approaches to software design and architecture to help the US military maintain an operational advantage over global its opponents. The report called Software-Defined Warfare says that the architecture needed to develop and maintain the most advanced warfighting systems “lies in software.”

“One of the greatest challenges the DoD and other USs federal agencies face is that they were built from the ground up as industrial-age, hardware-centric organisations... Making the transition to digital age, software-centric, more risk-tolerant organisations is exceedingly difficult. But it is also the only path to future success." the report says.

The paper says that this type of software-defined warfare, where software is at the core of DoD’s operating model, will allow today's military hardware and weapons to better handle “all of the complexity of decision making, targeting and resourcing.”

The report outlines a series of core concepts that DOD should adopt as it works to design and support weapons and accompanying hardware, including moving from vertically-scaled architecture to a horizontally-scaled model that can distribute computing workloads across smaller systems. It goes on to recommend that the DoD should acquire or design “a massive number of cheap, disposable and easy-to-manufacture endpoint systems that it can concentrate, distribute and scale up or down as the need arises,” but that it would require almost no maintenance and could be easily remedied if a system breaks down.

“At the heart of all these large networks of systems, whether autonomous or manually controlled, will be complex, Internet-scale, highly available software that pulls everything together. The underlying software systems will help bind all the DOD’s people, weapons, logistics and intelligence,’ says the Report.

During a recent CSIS Event discussing the report’s release, the paper’s authors, the CIA's Nand Mulchandani and retired Air Force Lt. Gen. John Shanahan, said that DOD’s ability to adopt and optimise updated software and technologies, including Artificial Intelligence models, will help the US maintain a competitive footing with other countries that are modernising their warfighting systems.  

CSIS:     DefenseOne:     NextGov:     US DoD:     US DoD

You Might Also Read: 

British Defence Ministry Gets A Quantum Computer:

 

« The Metaverse: A Reality Check
Hacktivist Group GhostSec Attack Israel »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

NRD Cyber Security

NRD Cyber Security

NRD Cyber Security create a secure digital environment for countries, governments, and organisations and implement cybersecurity resilience enhancement projects around the world.

Devel Group

Devel Group

Devel are a LATAM cybersecurity company specialized in providing services in the financial and enterprise sector.

Culinda

Culinda

Culinda secures medical IoT devices in hospitals with An Artificial Intelligence platform and security gateway.

United Biometrics

United Biometrics

United Biometrics is an anonymous and real-time authentication platform designed to stop the fraud for mobile payments, e-Commerce and applications.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

Cyberstarts

Cyberstarts

Cyberstarts’ vision is to become the leading platform for amazing teams of entrepreneurs to solve the next big problems of the cybersecurity world.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

Avint

Avint

Avint delivers transformational cybersecurity solutions that help both commercial and government entities achieve mission success.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Sacumen

Sacumen

Sacumen is a niche player in the cybersecurity market, solving critical problems for security product companies.

Vantor

Vantor

Vantor is a Managed Security Services Provider (MSSP) that specializes in providing outsourced, managed cybersecurity services.

Tanzania Industrial Research and Development Organization (TIRDO)

Tanzania Industrial Research and Development Organization (TIRDO)

TIRDO is a multi-disciplinary research and development organization.

Tria Federal

Tria Federal

Tria Federal is the premier middle-market Technology and Advisory services provider delivering digital transformation solutions to federal health and public safety agencies.