The US Military Want 5G Fast

Defence contractor Lockheed Martin and Microsoft are working together on 5G technologies to significantly improve US military communications. 

The two companies will test how to effectively expand and manage 5G networking technology for Joint-All Domain Operations defence applications using Microsoft’s 5G and Microsoft Azure services for Lockheed Martin’s Hybrid Base Station, a military-grade ruggedised “multi-network gateway and cell tower in a box.”

The project is intended to improve reliable connections for the US Department of Defense (DOD) systems that are used for spanning air, land, sea, space and cyber domains and securing critical military networks is vital to ensure the resilience and reliability required by combatants. 

“Microsoft’s expertise in cloud computing and scaling complement our vision to enable secure communications and run critical mission applications at the edge,” said Dan Rice, vice president of 5G.MIL Programs at Lockheed Martin.  “Innovative commercial partnerships like this help us accelerate and deploy the transformative capabilities that can best help our customers address a rapidly evolving threat landscape.... Today’s announcement brings together Lockheed Martin’s transformative base station technology and the power of Microsoft’s cloud capabilities to deliver mission-critical solutions at the tactical edge,” Tom Keane, a Microsoft corporate vice president, said in a statement. 

Current armed forces are challenged by rapidly evolving adversaries that aim to deny, degrade or infiltrate communications networks. 

Modern integrated warfare doctrine attempts to address the challenge presented by rapidly evolving adversaries with the capabilities meant to deny, degrade or infiltrate communications networks. Effective management of secure networks offers the resilience and reliability required by the 21st century battlefield and 5G technology enables the accelerated transfer of large quantities of data and rapid communications. 

The companies recently had a successful demonstration of these advanced communications capabilities at Lockheed Martin Space’s 5G test range in Colorado. “We essentially simulated four different air platforms doing ISR missions and close air support, to support a simulated special operations force on the ground that was pursuing a high value target,” said Dan Rice, Lockheed’s vice president for 5G.MIL, the term Lockheed uses to describe its 5G efforts.

The new 5G connectivity is expected to give the US military forces decision-making advantages in complex and contested environments. 

Fifth Generation (5G) communication systems bring more reliable, higher throughput and ultra low-latency connectivity required for edge devices and platforms, like autonomous systems, to fully harness the power of artificial intelligence. 

By integrating 5G with existing military communications and datalinks, combatants can achieve more effective operations in communications-contested and denied environments and have access to data to perform their missions anywhere in the world.

Lockheed Martin:    I-HLS:    Breaking Defense:   Defense News:    Army Technology

Real Clear Defense:    Lockheed Martin

You Might Also Read: 

The US Has A New 5G Security Strategy:

 

« What Goes On In The Dark Web?
The Limits Of Social Media Soft Power »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Sirama Consulting

Sirama Consulting

Sirama is an IT consulting firm which caters to small businesses. Services include Network Security, Backup & Disaster Recovery, Mobile Device Management.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

ISMG Summits are must-attend events for any executive tasked with protecting an organization from today's evolving information security threats.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

Comtact

Comtact

Comtact is a government-approved Cyber Security and IT Managed Service Provider, supporting clients 24x7x365 from our ISO27001-accredited UK Network & Security Operations Centre (NOC/SOC).

Revelock (Bugaroo)

Revelock (Bugaroo)

Revelock (formerly buguroo) enables financial services and fintech companies to reveal and respond to online identity impersonation & manipulation attacks without hindering the customer experience.

Sequitur Labs

Sequitur Labs

Sequitur Labs is developing seminal technologies and solutions to secure and manage connected devices of today and in the future.

Serverless Computing

Serverless Computing

Serverless Computing London will help architects, developers and CIOs decide on the best path to a more efficient, scalable and secure computing future.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

Cyber Police of Ukraine

Cyber Police of Ukraine

Cyber Police of Ukraine is a law enforcement agency within the the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime.

Alpine Cyber Solutions

Alpine Cyber Solutions

Alpine Cyber is a Managed IT Service Provider focused on cybersecurity and cloud services.

IP Twins

IP Twins

IP Twins offer a wide range of services related to domain names and online brand protection.

Quantum Cybersecurity

Quantum Cybersecurity

Quantum's objectives are to assist and help our clients with RMF Controls, Accreditation packages, FISCAM controls, ISSM Duties and Responsibilities, ISSO Duties and Responsibilities and more.

Epiphany Systems

Epiphany Systems

Epiphany enhances your defensive security controls by providing you with an offensive perspective. We expose the most likely attack paths to your most critical IT assets and users.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.