US Tries To Keep Up with Terrorists Tech

Unmanned systems may now be in by terrorists as well as nation-states are striving to employ these systems, especially airborne platforms, to deploy new types of improvised threats against US and coalition forces.

Many elements of the US Defense Department are working on ways to counter enemy UAVs, and the Joint Improvised-Threat Defeat Organization (JIDO) has joined the fight because the vehicles now are being used to deliver improvised explosive devices (IEDs).

Among the many tools JIDO is counting on to combat the UAV-IED threat is advanced information system technology. Better sensors for detection and tracking, coupled with new ways of data processing, could be key to defeating growing and emerging dangers in the battlespace.

JIDO is examining different ways unmanned systems are being used today as well as how they might be used in the future. The organisation’s team is viewing several different unmanned technologies as burgeoning and potential threats. “We anticipated this threat, as did many in the Defense community a few years ago,” said Lt. Gen. Michael H. Shields, USA, JIDO’s director. “What we have done is organise in a way to both understand the threat and then be able to react and respond to it.”

JIDO is addressing the new threat holistically, as it does with most improvised threats, he continues. This entails understanding adversarial networks that are leveraging the capability and technology; detecting, tracking and identifying; and assessing and exploiting the threat.

“Our adversaries are innovating,” he stated.

According to afcea.org, the Defense Department and political leadership continue to fund JIDO, especially through the Overseas Contingency Operations budget, with sufficient money to move rapidly as a quick reaction capability within the department. Shields added that, as JIDO’s director, he has the authorities to act quickly to counter emerging threats. The organisation also has modified its contract framework to provide greater flexibility and agility, along with cost savings, which the general describes as huge for JIDO.

Given the holistic take on its mission, JIDO is pursuing innovations in several areas. Computing and advanced analytics are high on the list, Gen. Shields offers. Deep machine learning, artificial intelligence and natural language processing are targets of opportunity in industry and academia, he says. JIDO is performing secure integrated development of operations, security and quality assurance on its own classified networks.

Data processing is critical to JIDO’s mission as well, the general points out. “With the amount of data that our analysts are trying to make sense of, we have to find a way that they spend two-thirds of their time querying data and 30 percent thinking about the information,” he offers.

The goal is to flip the equation so analysts spend 30 percent of their time querying data streams and 70 percent thinking about problems. The number of JIDO analysts has declined as the risks and requirements of the job have grown. Technology must compensate for that reduction, Gen. Shields says.

Information systems represent a prime example of how JIDO has evolved and continues to evolve, the general offers. The organisation’s computing and advanced analytics architectures keep progressing, and JIDO is “posturing itself for the future” so it can bring in deep machine learning and artificial intelligence, he continues, describing this process as detailed and well thought out.

JIDO is heavily engaged in outreach to industry to tap technology that supports its mission. Gen. Shields said that he spent a week meeting with Silicon Valley startups and big businesses to identify capabilities that could provide advantages to US forces. “We have a large number of mission partners,” he says. “The speed at which the commercial sector is developing these products is unbelievable.”

The organisation’s traditional mission partners include national laboratories, and nontraditional partners include several new programs such as Hacking for Defense, which allows college students to solve complex technology problems critical to national security.

Academic institutions such as Carnegie Mellon, Georgetown, James Madison and Princeton universities are another group of partners, the general offers. This variety of partners could help JIDO stay up to date on emergent disruptive technologies.

I-HLS:

You Might Also Read:

Drones, Satellites And Cyber Warfare:

Application Of Unmanned Military Systems:

 

« Microsoft Cloud Earnings Beat Expectations
N. Korea Threatens The World With Cyberwarfare - Not Nuclear Missiles »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI) is recognized as Thailand’s leader in cyber investigations and digital forensics.

Salviol Global Analytics

Salviol Global Analytics

Salviol Global Analytics is a leading provider of Fraud, Risk and Operational Performance Solutions to a number of vertical markets including Insurance, Banking, Utilities, Telco’s and Government.

TruNarrative

TruNarrative

TruNarrative provides a unified solution for Identity Verification, Fraud Detection, eKYC, Risk Assessment, AML Compliance and Account Monitoring.

Corsa Security

Corsa Security

Corsa Security is leading the transformation of network security with a private cloud approach that helps scale network security services with unwavering performance and flexibility.

GlobalPlatform

GlobalPlatform

GlobalPlatform’s specifications are highly regarded as the international standard for enabling digital services and devices to be trusted and securely managed throughout their lifecycle.

Bitfury Group

Bitfury Group

Bitfury Group is the largest full-service blockchain technology company in the world.

Adyta

Adyta

Adyta specializes in cybersecurity solutions adapted to the needs of sovereign institutions, business groups and other organizations that handle information and sensitive or classified data.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

HB-Technologies

HB-Technologies

HB-Technologies is pioneer in Africa, in digital security, embedded electronic and IT solutions based on highly secure smart cards that comply with international standards and norms.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Proximity

Proximity

Proximity is a leading professional services organisation providing consulting, legal and commercial advisory solutions with a focus on government and regulated industries.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Archon Secure

Archon Secure

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet.