US Defence Needs New Software at the Centre of its Operations

Cloud adoption, software modernisation, Artificial Intelligence and cyber security are paramount to all US Defense Department (DoD) missions. Now, the CIA's Chief Technology Officer Nand Mulchandanand the former head of the Air Force's Project Maven want to take the Pentagon out of the industrial age and into the digital age.

The offices of the chief information officer, the under-secretaries of defense for acquisition and sustainment and research and engineering, as well as the software modernisation senior steering group are involved in efforts to operationalise the strategy.

A paper published by the Center for Strategic and International Studies calls for the US military to modernise legacy warfighting systems in order to prepare for future conflicts. The Report basically says that The Department of Defense must adopt new approaches to software design and architecture to help the US military maintain an operational advantage over global its opponents. The report called Software-Defined Warfare says that the architecture needed to develop and maintain the most advanced warfighting systems “lies in software.”

“One of the greatest challenges the DoD and other USs federal agencies face is that they were built from the ground up as industrial-age, hardware-centric organisations... Making the transition to digital age, software-centric, more risk-tolerant organisations is exceedingly difficult. But it is also the only path to future success." the report says.

The paper says that this type of software-defined warfare, where software is at the core of DoD’s operating model, will allow today's military hardware and weapons to better handle “all of the complexity of decision making, targeting and resourcing.”

The report outlines a series of core concepts that DOD should adopt as it works to design and support weapons and accompanying hardware, including moving from vertically-scaled architecture to a horizontally-scaled model that can distribute computing workloads across smaller systems. It goes on to recommend that the DoD should acquire or design “a massive number of cheap, disposable and easy-to-manufacture endpoint systems that it can concentrate, distribute and scale up or down as the need arises,” but that it would require almost no maintenance and could be easily remedied if a system breaks down.

“At the heart of all these large networks of systems, whether autonomous or manually controlled, will be complex, Internet-scale, highly available software that pulls everything together. The underlying software systems will help bind all the DOD’s people, weapons, logistics and intelligence,’ says the Report.

During a recent CSIS Event discussing the report’s release, the paper’s authors, the CIA's Nand Mulchandani and retired Air Force Lt. Gen. John Shanahan, said that DOD’s ability to adopt and optimise updated software and technologies, including Artificial Intelligence models, will help the US maintain a competitive footing with other countries that are modernising their warfighting systems.  

CSIS:     DefenseOne:     NextGov:     US DoD:     US DoD

You Might Also Read: 

British Defence Ministry Gets A Quantum Computer:

 

« The Metaverse: A Reality Check
Hacktivist Group GhostSec Attack Israel »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Assure Technical

Assure Technical

Assure Technical offers a holistic approach to Technical Security. Our expertise and services span across the Physical, Cyber and Counter Surveillance domains.

Government Communications Headquarters (GCHQ) - UK

Government Communications Headquarters (GCHQ) - UK

GCHQ defends Government systems from cyber threat, provide support to the Armed Forces and strive to keep the public safe, in real life and online.

World Wide Technology (WWT)

World Wide Technology (WWT)

WWT is a technology solution provider in the areas of big data, collaboration, computing and cloud, mobility, networking, security and storage.

Gate 15

Gate 15

Gate 15 provide risk management services focusing primarily on information, intelligence and threat analysis, operational support and preparedness.

Approach

Approach

Approach is a leading provider of cyber security consulting and secure application development services in Belgium.

Ziroh Labs

Ziroh Labs

Ziroh Labs leverages advanced cryptography to keep your highly sensitive, private data safe throughout the lifecycle of data.

Invest Ottawa

Invest Ottawa

The IO Accelerator Program is designed to rapidly and systematically accelerate the development and commercial success of high growth technology firms.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

OurCrowd

OurCrowd

OurCrowd is a leading equity crowdfunding platform for investing in global startups.

CYOSS

CYOSS

CYOSS, an ESG Group company, is a specialist in Cyber Security and Data Analytics. We focus on the opportunities of a networked world and make security risks manageable.

ACSG Corp

ACSG Corp

ACSG Corp is a Critical Infrastructure Protection Company with a multi-disciplinary focus on building analytics software for various industry sectors.

HORNE

HORNE

HORNE is a professional services firm supporting clients in public, private & government sectors nationwide.

Sec-Ops

Sec-Ops

Sec-Ops is a forward thinking cyber security company, formed by a group of security enthusiasts with years of experience and backgrounds in the technology and the government industries.

METCLOUD

METCLOUD

METCLOUD is driving a cloud evolution. A cloud that promises relentless cybersecurity, performance, resilience and sustainability.

Sectricity

Sectricity

As independent ethical hackers, Sectricity go beyond traditional security, uncovering every vulnerability - testing both systems and employees to eliminate weak spots.

Charm Security

Charm Security

Charm Security is an AI-powered customer security platform that protects organizations and their customers from scams, social engineering, and human-centric fraud.