US Tries To Keep Up with Terrorists Tech

Unmanned systems may now be in by terrorists as well as nation-states are striving to employ these systems, especially airborne platforms, to deploy new types of improvised threats against US and coalition forces.

Many elements of the US Defense Department are working on ways to counter enemy UAVs, and the Joint Improvised-Threat Defeat Organization (JIDO) has joined the fight because the vehicles now are being used to deliver improvised explosive devices (IEDs).

Among the many tools JIDO is counting on to combat the UAV-IED threat is advanced information system technology. Better sensors for detection and tracking, coupled with new ways of data processing, could be key to defeating growing and emerging dangers in the battlespace.

JIDO is examining different ways unmanned systems are being used today as well as how they might be used in the future. The organisation’s team is viewing several different unmanned technologies as burgeoning and potential threats. “We anticipated this threat, as did many in the Defense community a few years ago,” said Lt. Gen. Michael H. Shields, USA, JIDO’s director. “What we have done is organise in a way to both understand the threat and then be able to react and respond to it.”

JIDO is addressing the new threat holistically, as it does with most improvised threats, he continues. This entails understanding adversarial networks that are leveraging the capability and technology; detecting, tracking and identifying; and assessing and exploiting the threat.

“Our adversaries are innovating,” he stated.

According to afcea.org, the Defense Department and political leadership continue to fund JIDO, especially through the Overseas Contingency Operations budget, with sufficient money to move rapidly as a quick reaction capability within the department. Shields added that, as JIDO’s director, he has the authorities to act quickly to counter emerging threats. The organisation also has modified its contract framework to provide greater flexibility and agility, along with cost savings, which the general describes as huge for JIDO.

Given the holistic take on its mission, JIDO is pursuing innovations in several areas. Computing and advanced analytics are high on the list, Gen. Shields offers. Deep machine learning, artificial intelligence and natural language processing are targets of opportunity in industry and academia, he says. JIDO is performing secure integrated development of operations, security and quality assurance on its own classified networks.

Data processing is critical to JIDO’s mission as well, the general points out. “With the amount of data that our analysts are trying to make sense of, we have to find a way that they spend two-thirds of their time querying data and 30 percent thinking about the information,” he offers.

The goal is to flip the equation so analysts spend 30 percent of their time querying data streams and 70 percent thinking about problems. The number of JIDO analysts has declined as the risks and requirements of the job have grown. Technology must compensate for that reduction, Gen. Shields says.

Information systems represent a prime example of how JIDO has evolved and continues to evolve, the general offers. The organisation’s computing and advanced analytics architectures keep progressing, and JIDO is “posturing itself for the future” so it can bring in deep machine learning and artificial intelligence, he continues, describing this process as detailed and well thought out.

JIDO is heavily engaged in outreach to industry to tap technology that supports its mission. Gen. Shields said that he spent a week meeting with Silicon Valley startups and big businesses to identify capabilities that could provide advantages to US forces. “We have a large number of mission partners,” he says. “The speed at which the commercial sector is developing these products is unbelievable.”

The organisation’s traditional mission partners include national laboratories, and nontraditional partners include several new programs such as Hacking for Defense, which allows college students to solve complex technology problems critical to national security.

Academic institutions such as Carnegie Mellon, Georgetown, James Madison and Princeton universities are another group of partners, the general offers. This variety of partners could help JIDO stay up to date on emergent disruptive technologies.

I-HLS:

You Might Also Read:

Drones, Satellites And Cyber Warfare:

Application Of Unmanned Military Systems:

 

« Microsoft Cloud Earnings Beat Expectations
N. Korea Threatens The World With Cyberwarfare - Not Nuclear Missiles »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

edgescan

edgescan

edgescan is a cloud-based continuous vulnerability management and penetration testing solution.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence Service (CSIS)

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Cologix

Cologix

Cologix provides reliable, secure, scalable data center and interconnection solutions from 24 prime interconnection locations across 9 strategic North American edge markets.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

Garrison Technology

Garrison Technology

Garrison SAVI® is a unique technology for secure remote browsing that can dramatically change the risk profile for enterprise cyber security.

OGiTiX

OGiTiX

OGiTiX Software AG is a German software manufacturer specializing in Identity and Access Management.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

Navaio IT Security

Navaio IT Security

Navaio helps clients with IT Security related challenges with a primary focus on Identity and Access Management, Data Governance, User Awareness and Cyber Resilience Services.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

Paubox

Paubox

Paubox offers secure, HIPAA compliant email and marketing solutions to fit the needs of modern healthcare organizations of every size.

Cyber News Live

Cyber News Live

Welcome to Cyber News Live (CNL), we are dedicated to keeping everyone safe online. We provide vital information.

ITRM

ITRM

ITRM are one of the UK’s top managed service providers and offer a range of award-winning IT solutions, from ad-hoc consultancy to cyber security.

Network Coverage

Network Coverage

Network Coverage align, maintain, and integrate technology and cloud solutions with business operations to improve productivity and security with as few issues and disruptions as possible.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.