US Defence Needs New Software at the Centre of its Operations

Cloud adoption, software modernisation, Artificial Intelligence and cyber security are paramount to all US Defense Department (DoD) missions. Now, the CIA's Chief Technology Officer Nand Mulchandanand the former head of the Air Force's Project Maven want to take the Pentagon out of the industrial age and into the digital age.

The offices of the chief information officer, the under-secretaries of defense for acquisition and sustainment and research and engineering, as well as the software modernisation senior steering group are involved in efforts to operationalise the strategy.

A paper published by the Center for Strategic and International Studies calls for the US military to modernise legacy warfighting systems in order to prepare for future conflicts. The Report basically says that The Department of Defense must adopt new approaches to software design and architecture to help the US military maintain an operational advantage over global its opponents. The report called Software-Defined Warfare says that the architecture needed to develop and maintain the most advanced warfighting systems “lies in software.”

“One of the greatest challenges the DoD and other USs federal agencies face is that they were built from the ground up as industrial-age, hardware-centric organisations... Making the transition to digital age, software-centric, more risk-tolerant organisations is exceedingly difficult. But it is also the only path to future success." the report says.

The paper says that this type of software-defined warfare, where software is at the core of DoD’s operating model, will allow today's military hardware and weapons to better handle “all of the complexity of decision making, targeting and resourcing.”

The report outlines a series of core concepts that DOD should adopt as it works to design and support weapons and accompanying hardware, including moving from vertically-scaled architecture to a horizontally-scaled model that can distribute computing workloads across smaller systems. It goes on to recommend that the DoD should acquire or design “a massive number of cheap, disposable and easy-to-manufacture endpoint systems that it can concentrate, distribute and scale up or down as the need arises,” but that it would require almost no maintenance and could be easily remedied if a system breaks down.

“At the heart of all these large networks of systems, whether autonomous or manually controlled, will be complex, Internet-scale, highly available software that pulls everything together. The underlying software systems will help bind all the DOD’s people, weapons, logistics and intelligence,’ says the Report.

During a recent CSIS Event discussing the report’s release, the paper’s authors, the CIA's Nand Mulchandani and retired Air Force Lt. Gen. John Shanahan, said that DOD’s ability to adopt and optimise updated software and technologies, including Artificial Intelligence models, will help the US maintain a competitive footing with other countries that are modernising their warfighting systems.  

CSIS:     DefenseOne:     NextGov:     US DoD:     US DoD

You Might Also Read: 

British Defence Ministry Gets A Quantum Computer:

 

« The Metaverse: A Reality Check
Hacktivist Group GhostSec Attack Israel »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

iboss Network Security

iboss Network Security

The iboss cloud is designed to deliver Network Security as a Service, in the cloud, using the best malware engines, threat feeds and log analytics engines.

CyberPilot

CyberPilot

CyberPilot ApS is a Danish cybersecurity company. We work with all types of companies and organisations, both large and small, who want to achieve effective cybersecurity.

Backup112

Backup112

Backup112 has been delivering professional cloud backup services since 2004.

Flashpoint

Flashpoint

Flashpoint is a globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet.

Cyber Security Specialists

Cyber Security Specialists

Cyber Security Specialists Limited provide Security services across a wide range of markets, from multi-national Corporate Organisations and Government Agencies, through to smaller Businesses.

Atlantic Council Digital Forensic Research Lab (DFRLab)

Atlantic Council Digital Forensic Research Lab (DFRLab)

The Atlantic Council’s DFRLab has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

4Securitas

4Securitas

4Securitas is an innovative cyber security firm focused on protecting critical data at the core of every organisation.

Oman Technology Fund (OTF)

Oman Technology Fund (OTF)

Oman Technology Fund aims to make Oman the preferred destination for emerging tech companies in the region, and an attractive and stimulating destination for venture capital.

EasyDMARC

EasyDMARC

EasyDMARC deliver the most comprehensive product for anyone who strives to build the most secure possible defence system for their email ecosystem.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

Munio

Munio

Munio is a leading Fortified IT Support and Cyber Security companies in the south east of the UK.

AUCloud

AUCloud

AUCloud is a leading Australian cyber security and secure cloud provider, specialising in supporting businesses and Governments with the latest cloud infrastructure.