US Tries To Keep Up with Terrorists Tech

Unmanned systems may now be in by terrorists as well as nation-states are striving to employ these systems, especially airborne platforms, to deploy new types of improvised threats against US and coalition forces.

Many elements of the US Defense Department are working on ways to counter enemy UAVs, and the Joint Improvised-Threat Defeat Organization (JIDO) has joined the fight because the vehicles now are being used to deliver improvised explosive devices (IEDs).

Among the many tools JIDO is counting on to combat the UAV-IED threat is advanced information system technology. Better sensors for detection and tracking, coupled with new ways of data processing, could be key to defeating growing and emerging dangers in the battlespace.

JIDO is examining different ways unmanned systems are being used today as well as how they might be used in the future. The organisation’s team is viewing several different unmanned technologies as burgeoning and potential threats. “We anticipated this threat, as did many in the Defense community a few years ago,” said Lt. Gen. Michael H. Shields, USA, JIDO’s director. “What we have done is organise in a way to both understand the threat and then be able to react and respond to it.”

JIDO is addressing the new threat holistically, as it does with most improvised threats, he continues. This entails understanding adversarial networks that are leveraging the capability and technology; detecting, tracking and identifying; and assessing and exploiting the threat.

“Our adversaries are innovating,” he stated.

According to afcea.org, the Defense Department and political leadership continue to fund JIDO, especially through the Overseas Contingency Operations budget, with sufficient money to move rapidly as a quick reaction capability within the department. Shields added that, as JIDO’s director, he has the authorities to act quickly to counter emerging threats. The organisation also has modified its contract framework to provide greater flexibility and agility, along with cost savings, which the general describes as huge for JIDO.

Given the holistic take on its mission, JIDO is pursuing innovations in several areas. Computing and advanced analytics are high on the list, Gen. Shields offers. Deep machine learning, artificial intelligence and natural language processing are targets of opportunity in industry and academia, he says. JIDO is performing secure integrated development of operations, security and quality assurance on its own classified networks.

Data processing is critical to JIDO’s mission as well, the general points out. “With the amount of data that our analysts are trying to make sense of, we have to find a way that they spend two-thirds of their time querying data and 30 percent thinking about the information,” he offers.

The goal is to flip the equation so analysts spend 30 percent of their time querying data streams and 70 percent thinking about problems. The number of JIDO analysts has declined as the risks and requirements of the job have grown. Technology must compensate for that reduction, Gen. Shields says.

Information systems represent a prime example of how JIDO has evolved and continues to evolve, the general offers. The organisation’s computing and advanced analytics architectures keep progressing, and JIDO is “posturing itself for the future” so it can bring in deep machine learning and artificial intelligence, he continues, describing this process as detailed and well thought out.

JIDO is heavily engaged in outreach to industry to tap technology that supports its mission. Gen. Shields said that he spent a week meeting with Silicon Valley startups and big businesses to identify capabilities that could provide advantages to US forces. “We have a large number of mission partners,” he says. “The speed at which the commercial sector is developing these products is unbelievable.”

The organisation’s traditional mission partners include national laboratories, and nontraditional partners include several new programs such as Hacking for Defense, which allows college students to solve complex technology problems critical to national security.

Academic institutions such as Carnegie Mellon, Georgetown, James Madison and Princeton universities are another group of partners, the general offers. This variety of partners could help JIDO stay up to date on emergent disruptive technologies.

I-HLS:

You Might Also Read:

Drones, Satellites And Cyber Warfare:

Application Of Unmanned Military Systems:

 

« Microsoft Cloud Earnings Beat Expectations
N. Korea Threatens The World With Cyberwarfare - Not Nuclear Missiles »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

Cybertekpro

Cybertekpro

Cybertekpro is a specialist insurance broker providing Cyber Liability insurance and cyber risk assessment services.

Rogue Wave Software

Rogue Wave Software

At Rogue Wave, our mission is to simplify your hardest problems, improve software quality and security, and shorten the time it takes to deliver value.

Flexential

Flexential

Flexential helps organizations optimize their journey of IT transformation while simultaneously balancing cost, scalability, compliance and security.

UKAS

UKAS

UKAS is the national accreditation body for the UK. The directory of members provides details of organisations offering certification services for ISO 27001.

Red Alert Labs

Red Alert Labs

Red Alert Labs is an IoT security provider. We created an independent security lab with a disruptive business offer to solve the technical and commercial challenges in IoT.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

Field Effect Software

Field Effect Software

Field Effect Software build sophisticated and integrated IT security, threat surface reduction, training and simulation capabilities for enterprises and small businesses.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.

Depth Security

Depth Security

Depth Security assessment services provide organizations with real-world visibility into threats facing their infrastructure and applications.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

Quantum Security Solutions (QSec)

Quantum Security Solutions (QSec)

QSec is an innovative information security consultancy based in Ghana. We can provide your organisation with information security products and services that assure against information risk.

RiskOptics

RiskOptics

RiskOptics (formerly Reciprocity) equips organizations with one of the most intuitive and powerful information security and cyber risk management solutions in the market.

Piiano

Piiano

Piiano offers developer-friendly privacy and security products. Reduce risk and protect your data by using our specialized security and privacy SaaS tools.

Clear Ridge Defense

Clear Ridge Defense

Clear Ridge was founded in April 2015 with the mission and vision to support Joint, Service Cyber Components, and commercial clients in specialized cyber support.