US Tries To Keep Up with Terrorists Tech

Unmanned systems may now be in by terrorists as well as nation-states are striving to employ these systems, especially airborne platforms, to deploy new types of improvised threats against US and coalition forces.

Many elements of the US Defense Department are working on ways to counter enemy UAVs, and the Joint Improvised-Threat Defeat Organization (JIDO) has joined the fight because the vehicles now are being used to deliver improvised explosive devices (IEDs).

Among the many tools JIDO is counting on to combat the UAV-IED threat is advanced information system technology. Better sensors for detection and tracking, coupled with new ways of data processing, could be key to defeating growing and emerging dangers in the battlespace.

JIDO is examining different ways unmanned systems are being used today as well as how they might be used in the future. The organisation’s team is viewing several different unmanned technologies as burgeoning and potential threats. “We anticipated this threat, as did many in the Defense community a few years ago,” said Lt. Gen. Michael H. Shields, USA, JIDO’s director. “What we have done is organise in a way to both understand the threat and then be able to react and respond to it.”

JIDO is addressing the new threat holistically, as it does with most improvised threats, he continues. This entails understanding adversarial networks that are leveraging the capability and technology; detecting, tracking and identifying; and assessing and exploiting the threat.

“Our adversaries are innovating,” he stated.

According to afcea.org, the Defense Department and political leadership continue to fund JIDO, especially through the Overseas Contingency Operations budget, with sufficient money to move rapidly as a quick reaction capability within the department. Shields added that, as JIDO’s director, he has the authorities to act quickly to counter emerging threats. The organisation also has modified its contract framework to provide greater flexibility and agility, along with cost savings, which the general describes as huge for JIDO.

Given the holistic take on its mission, JIDO is pursuing innovations in several areas. Computing and advanced analytics are high on the list, Gen. Shields offers. Deep machine learning, artificial intelligence and natural language processing are targets of opportunity in industry and academia, he says. JIDO is performing secure integrated development of operations, security and quality assurance on its own classified networks.

Data processing is critical to JIDO’s mission as well, the general points out. “With the amount of data that our analysts are trying to make sense of, we have to find a way that they spend two-thirds of their time querying data and 30 percent thinking about the information,” he offers.

The goal is to flip the equation so analysts spend 30 percent of their time querying data streams and 70 percent thinking about problems. The number of JIDO analysts has declined as the risks and requirements of the job have grown. Technology must compensate for that reduction, Gen. Shields says.

Information systems represent a prime example of how JIDO has evolved and continues to evolve, the general offers. The organisation’s computing and advanced analytics architectures keep progressing, and JIDO is “posturing itself for the future” so it can bring in deep machine learning and artificial intelligence, he continues, describing this process as detailed and well thought out.

JIDO is heavily engaged in outreach to industry to tap technology that supports its mission. Gen. Shields said that he spent a week meeting with Silicon Valley startups and big businesses to identify capabilities that could provide advantages to US forces. “We have a large number of mission partners,” he says. “The speed at which the commercial sector is developing these products is unbelievable.”

The organisation’s traditional mission partners include national laboratories, and nontraditional partners include several new programs such as Hacking for Defense, which allows college students to solve complex technology problems critical to national security.

Academic institutions such as Carnegie Mellon, Georgetown, James Madison and Princeton universities are another group of partners, the general offers. This variety of partners could help JIDO stay up to date on emergent disruptive technologies.

I-HLS:

You Might Also Read:

Drones, Satellites And Cyber Warfare:

Application Of Unmanned Military Systems:

 

« Microsoft Cloud Earnings Beat Expectations
N. Korea Threatens The World With Cyberwarfare - Not Nuclear Missiles »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

Information Security Forum (ISF)

Information Security Forum (ISF)

The ISF is a leading authority on information security and risk management.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

Cyberwatch

Cyberwatch

Cyberwatch is a Vulnerability Scanner & Fixer software that helps you to detect and fix the vulnerabilities of your Information System.

ICS2

ICS2

ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants.

Innovative Solutions (IS)

Innovative Solutions (IS)

Innovative Solutions is a specialized professional services company delivering Information Security products and solutions for Saudi Arabia and the Gulf region.

6point6

6point6

6point6 is a technology consultancy with strong expertise in digital transformation, emerging technology and cyber security.

MOXFIVE

MOXFIVE

MOXFIVE is a specialized technical advisory firm founded to bring clarity to the complexity of cyber attacks.

SyferLock Technology Corp.

SyferLock Technology Corp.

SyferLock is an innovative provider of next-generation authentication and security solutions.

Trianz

Trianz

Trianz Cybersecurity Services are Powered by One of the World’s Largest Databases on Digital Transformation. We Understand Evolving Risks, Technologies and Best Practices.

US Coast Guard Cyber Command

US Coast Guard Cyber Command

US Coast Guard Cyber Command’s focus is to ensure the security of our cyberspace, maintain superiority over our adversaries,and safeguard our Nation’s critical maritime infrastructure.

Torq

Torq

Torq's no-code automation modernizes how security & operations teams work with easy workflow building, limitless integrations and numerous pre-built templates.

In-Q-Tel (IQT)

In-Q-Tel (IQT)

IQT is the non-profit strategic investor that accelerates the development and delivery of cutting-edge technologies to U.S. government agencies that keep our nation safe.

Softwerx

Softwerx

Softwerx is the UK’s leading Microsoft cloud security practice. We’ve been helping forward-thinking companies better secure their businesses for nearly twenty years.

Unisys

Unisys

Unisys is a global information technology company providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.