US Defence Needs New Software at the Centre of its Operations

Cloud adoption, software modernisation, Artificial Intelligence and cyber security are paramount to all US Defense Department (DoD) missions. Now, the CIA's Chief Technology Officer Nand Mulchandanand the former head of the Air Force's Project Maven want to take the Pentagon out of the industrial age and into the digital age.

The offices of the chief information officer, the under-secretaries of defense for acquisition and sustainment and research and engineering, as well as the software modernisation senior steering group are involved in efforts to operationalise the strategy.

A paper published by the Center for Strategic and International Studies calls for the US military to modernise legacy warfighting systems in order to prepare for future conflicts. The Report basically says that The Department of Defense must adopt new approaches to software design and architecture to help the US military maintain an operational advantage over global its opponents. The report called Software-Defined Warfare says that the architecture needed to develop and maintain the most advanced warfighting systems “lies in software.”

“One of the greatest challenges the DoD and other USs federal agencies face is that they were built from the ground up as industrial-age, hardware-centric organisations... Making the transition to digital age, software-centric, more risk-tolerant organisations is exceedingly difficult. But it is also the only path to future success." the report says.

The paper says that this type of software-defined warfare, where software is at the core of DoD’s operating model, will allow today's military hardware and weapons to better handle “all of the complexity of decision making, targeting and resourcing.”

The report outlines a series of core concepts that DOD should adopt as it works to design and support weapons and accompanying hardware, including moving from vertically-scaled architecture to a horizontally-scaled model that can distribute computing workloads across smaller systems. It goes on to recommend that the DoD should acquire or design “a massive number of cheap, disposable and easy-to-manufacture endpoint systems that it can concentrate, distribute and scale up or down as the need arises,” but that it would require almost no maintenance and could be easily remedied if a system breaks down.

“At the heart of all these large networks of systems, whether autonomous or manually controlled, will be complex, Internet-scale, highly available software that pulls everything together. The underlying software systems will help bind all the DOD’s people, weapons, logistics and intelligence,’ says the Report.

During a recent CSIS Event discussing the report’s release, the paper’s authors, the CIA's Nand Mulchandani and retired Air Force Lt. Gen. John Shanahan, said that DOD’s ability to adopt and optimise updated software and technologies, including Artificial Intelligence models, will help the US maintain a competitive footing with other countries that are modernising their warfighting systems.  

CSIS:     DefenseOne:     NextGov:     US DoD:     US DoD

You Might Also Read: 

British Defence Ministry Gets A Quantum Computer:

 

« The Metaverse: A Reality Check
Hacktivist Group GhostSec Attack Israel »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

Karlsruhe Institute of Technology (KIT)

Karlsruhe Institute of Technology (KIT)

KIT is a leading research and education institutions with strong capabilities in information systems and security.

Critifence

Critifence

Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF) of Armenia is one of the largest technology business incubators and IT development agencies in the region.

Adaptive Shield

Adaptive Shield

Addaptive Shield - Complete Control For Your SaaS Security. Proactively find and fix weaknesses across your SaaS platforms.

Netsurion

Netsurion

Netsurion powers secure and agile networks for highly distributed and small-to-medium enterprises and the IT providers that serve them.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.

Suffescom Solutions

Suffescom Solutions

Suffescom Solutions is a leading blockchain development company, assisting businesses in harnessing the true potential of blockchain technology.

Apura Cybersecurity Intelligence

Apura Cybersecurity Intelligence

Apura is a Brazilian company that develops advanced products and provides specialized services in information security and cyber defense.

Cyviation

Cyviation

Cyviation's mission is to mitigate ever-growing and menacing Cyber Security threats, focusing on aircraft, airlines and airports.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.