Pentagon innovates new weapons to ‘fight through’ next-gen cyberattacks

Tech

The flight trajectory of ICBMs, targeting accuracy of an Abrams tank 120mm cannon, sharing of enemy location intelligence in real-time or the decreasing of critical sensor-to-shooter times for small arms, missile attacks, bomber strikes and other weapons systems … increasingly rely … on computer systems.

Therefore, the scope of impacts potentially delivered through cyberattacks continues to multiply in an exponential fashion, thus helping to explain the Pentagon’s current massive push to innovate new cyber resiliency tactics, techniques and technologies.

Part of the equation pertains to a recognition that cyber defenses must continue, if not even accelerate and increase in intensity after an attacker succeeds in gaining some kind of access or privilege on a system. This dynamic forms the key premise of cyber resilience which, unlike a pure cybersecurity approach, looks at cyberdefense beyond the perimeter or initial points of entry and boundaries of protection. The two are intertwined, yet cybersecurity and cyber resiliency are also somewhat distinct for this reason.

“A lot of technologies are focused on preventing attacks. We have put together technologies to recover files or recover critical memory. If an attack were to be detected, we want to fight through that attack and recover a system’s critical functions. Our R&D pushes the envelope in that direction,” Jacob Noffke, principal cyber engineer, Raytheon Intelligence and Space, told Warrior in an interview.

Given these realities, cyber resiliency needs to be multipronged, meaning protections need to involve various aspects of the system, such as hardware, software, operating system functionality and methods, and networks in a coordinated manner.

Noffke explained that Raytheon is now working internally on some new innovations aimed at securing both access to data through a cryptographically oriented hardware device called Boot Shield and an operating system information verification system called Countervail. The plan is to further refine these systems and collaborate with or offer them to the US military services.

“Cyber resiliency involves many emerging requirements and is more than just hardening a system. Advanced adversaries will eventually find a way to gain access to a system, so it is critical for components of computing ecosystems to determine information they receive is authentic,” Noffke said.

While to a certain extent it seems self-evident or even obvious, yet securing data flow between systems, platforms and combat “nodes” continues to take on new levels of urgency, given that AI-empowered technologies, unmanned systems and advanced networking are exponentially improving sensor to shooter time. Data itself is, not surprisingly, increasingly becoming a cherished weapon of war. Intelligence information has of course always been of indescribable value, yet the current ability to change the “speed,” efficiency and precision of the combat-sensitive data transmission is fast evolving as a uniquely modern technical phenomenon.

The Army’s recent Project Convergence at Yuma Proving Grounds, Ariz., showed that the service now has the capacity to decrease sensor to shooter time from minutes … down to seconds. The breakthrough developments in Arizona could easily be characterized as contributing to a large portion of the Army’s involvement in the Pentagon’s Joint All Domain Command and Control (JADC2) effort.

Army program managers say the intent is “to integrate data management capability to better enable data flow across our networks, which will be critical as sensor to shooter data increases as part of CJADC2. Technology being explored includes AI/ML (Artificial Intelligence/Machine Learning) capability, cloud data storage at the edge, advanced tactical servers and processors and cross domain solutions,” Paul Mehney, director of communications, PEO C3T (Program Executive Office Command Control Communications-Tactical) told Warrior.

Accomplishing these tasks not only relies upon the secure “transmission” of data but must also enable strong protection of the data systems and computer processing mechanisms themselves. Many weapons developers now recognizing the growing complexity with which cyber defense technologies have been forced to embrace, a circumstance which continues to drive new industry innovators to find new generations of protection technologies.

SOURCE