US Tries To Keep Up with Terrorists Tech

Unmanned systems may now be in by terrorists as well as nation-states are striving to employ these systems, especially airborne platforms, to deploy new types of improvised threats against US and coalition forces.

Many elements of the US Defense Department are working on ways to counter enemy UAVs, and the Joint Improvised-Threat Defeat Organization (JIDO) has joined the fight because the vehicles now are being used to deliver improvised explosive devices (IEDs).

Among the many tools JIDO is counting on to combat the UAV-IED threat is advanced information system technology. Better sensors for detection and tracking, coupled with new ways of data processing, could be key to defeating growing and emerging dangers in the battlespace.

JIDO is examining different ways unmanned systems are being used today as well as how they might be used in the future. The organisation’s team is viewing several different unmanned technologies as burgeoning and potential threats. “We anticipated this threat, as did many in the Defense community a few years ago,” said Lt. Gen. Michael H. Shields, USA, JIDO’s director. “What we have done is organise in a way to both understand the threat and then be able to react and respond to it.”

JIDO is addressing the new threat holistically, as it does with most improvised threats, he continues. This entails understanding adversarial networks that are leveraging the capability and technology; detecting, tracking and identifying; and assessing and exploiting the threat.

“Our adversaries are innovating,” he stated.

According to afcea.org, the Defense Department and political leadership continue to fund JIDO, especially through the Overseas Contingency Operations budget, with sufficient money to move rapidly as a quick reaction capability within the department. Shields added that, as JIDO’s director, he has the authorities to act quickly to counter emerging threats. The organisation also has modified its contract framework to provide greater flexibility and agility, along with cost savings, which the general describes as huge for JIDO.

Given the holistic take on its mission, JIDO is pursuing innovations in several areas. Computing and advanced analytics are high on the list, Gen. Shields offers. Deep machine learning, artificial intelligence and natural language processing are targets of opportunity in industry and academia, he says. JIDO is performing secure integrated development of operations, security and quality assurance on its own classified networks.

Data processing is critical to JIDO’s mission as well, the general points out. “With the amount of data that our analysts are trying to make sense of, we have to find a way that they spend two-thirds of their time querying data and 30 percent thinking about the information,” he offers.

The goal is to flip the equation so analysts spend 30 percent of their time querying data streams and 70 percent thinking about problems. The number of JIDO analysts has declined as the risks and requirements of the job have grown. Technology must compensate for that reduction, Gen. Shields says.

Information systems represent a prime example of how JIDO has evolved and continues to evolve, the general offers. The organisation’s computing and advanced analytics architectures keep progressing, and JIDO is “posturing itself for the future” so it can bring in deep machine learning and artificial intelligence, he continues, describing this process as detailed and well thought out.

JIDO is heavily engaged in outreach to industry to tap technology that supports its mission. Gen. Shields said that he spent a week meeting with Silicon Valley startups and big businesses to identify capabilities that could provide advantages to US forces. “We have a large number of mission partners,” he says. “The speed at which the commercial sector is developing these products is unbelievable.”

The organisation’s traditional mission partners include national laboratories, and nontraditional partners include several new programs such as Hacking for Defense, which allows college students to solve complex technology problems critical to national security.

Academic institutions such as Carnegie Mellon, Georgetown, James Madison and Princeton universities are another group of partners, the general offers. This variety of partners could help JIDO stay up to date on emergent disruptive technologies.

I-HLS:

You Might Also Read:

Drones, Satellites And Cyber Warfare:

Application Of Unmanned Military Systems:

 

« Microsoft Cloud Earnings Beat Expectations
N. Korea Threatens The World With Cyberwarfare - Not Nuclear Missiles »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

HUB International

HUB International

HUB is one of the largest insurance brokers in the world. HUB Risk Services provides the full range of expert consulting to identify risks, reduce exposure to loss and manage claims issues.

Indium Software

Indium Software

Indium Software is an Independent Software Testing Company offering software testing services (including security testing) and offshore Quality Assurance solutions.

Logically Secure

Logically Secure

Logically Secure provide penetration testing and security assessment services.

CERT-AM

CERT-AM

CERT-AM is the national Computer Emergency Response Team for Armenia.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

Ampyx Cyber

Ampyx Cyber

Ampyx Cyber (formerly Ampere Industrial Security) is an industrial security firm. We specialize in industrial control systems (ICS) and operational technology (OT) security.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

IT-Schulungen.com / New Elements GmbH

IT-Schulungen.com / New Elements GmbH

Under the name IT-Schulungen.com, the Nuremberg-based New Elements GmbH has been operating one of the largest training centres in the German-speaking world for over 20 years.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.

Socket

Socket

Socket protects software applications and critical services from malware and security threats originating in open source code.