The budget proposal for 2025 by the United States Department of Defense highlights their focus on technology investment, specifically in fields such as artificial intelligence, space surveillance, and cybersecurity. This funding is aimed at further improving and modernizing defense capabilities to address evolving threats and challenges. #Defense #DefenseTech
Pamela Powers’ Post
More Relevant Posts
-
2025 is shaping up to be a pivotal year for #AI and #quantum technology. The recently released National Defense Authorization Act prioritizes these areas, aiming to leverage them for enhanced #cybersecurity, national security, and operational efficiency. The United States Department of Defense is poised to invest heavily in research and development, collaborate with industry and academia, and establish new centers of excellence to drive #innovation and ensure responsible deployment of these transformative technologies. https://lnkd.in/efvi-kQG
FY2025 NDAA angles to enhance DOD’s AI and quantum sciences capabilities
nextgov.com
To view or add a comment, sign in
-
This video is a bit old (6 years), but it provides a nice simple overview showing how quantum entanglement will eventually lead us towards a space based quantum internet - which is inherently more secure because when a hacker accesses it, we know! When someone ‘looks at’ or measures a quantum particle (a photon), it collapses from superposition (a state of being everywhere) into a definite 1 or 0 state and so an alarm is triggered. We wouldn’t need an entangled network connection for everything, so we could continue to use our existing fibre optic internet infrastructure for most things, but we could use the quantum internet for sending through our encryption keys. This is known as Quantum Key Distribution or QKD. New research has shown that both systems could exist side by side. Quantum communication technologies are advancing rapidly and pose both our greatest ever cybersecurity threat… and a future that is fundamentally more cyber secure. Interested in learning more?… Or in a career in quantum cybersecurity? Then join us on Friday 19th April for the Tasmanian Quantum Summit 2024! Register through the Australian Women in Security Network AWSN website - https://www.awsn.org.au/ - Events - Tasmania. This event is hybrid so you can join us from across the globe! See you there!
Quantum satellite achieves 'spooky action' at record distance
https://www.youtube.com/
To view or add a comment, sign in
-
The most typical way that people think about is transitioning into a program of record. Right. So that’s the one pathway. However, it could be a piece of software that we’re delivering capability to upgrade a capability that’s already been fielded. So that’s a different way of fielding a new capability. The other way could very well be, we have developed a technology, the technology is being utilized by a DOD prime or commercial company, [and] we then end up procuring that technology. And the fourth way is we’ve transitioned technology for the DOD [and] it could be used by another government agency,” Hon Heidi Shyu explained.
The Department of Defense is requesting $17.2 billion for science and technology projects in fiscal 2025, and most of it would be dedicated to three capability areas — AI and autonomy, space, and integrated sensing and cyber — according to a presentation by the Pentagon’s CTO. https://lnkd.in/ghdtTC7Z
AI, space, integrated sensing and cyber dominate Pentagon's S&T funding plans
https://defensescoop.com
To view or add a comment, sign in
-
As part of European Space Agency’s Advanced Research in Telecommunications Systems Partnership Project programme, the project with Honeywell, called QKDSat, represents a novel approach to securing our most confidential information from increasingly sophisticated #cyberthreats. QKDSat is leveraging #quantum key distribution (QKD), where photons are used to generate truly random encryption keys only known between shared parties. If someone attempts to intercept the data, the system detects the interference and shuts down the distribution of the keys before they are compromised – making it impossible for hackers to obtain the encryption keys. As terrestrial QKD networks are limited over long distances, the use of satellites expands the reach and enhances security further. Information is shared directly from a ground terminal to the satellite and back to the target terminal, bridging any distance. This technology has wide-ranging applications, especially benefiting organisations that handle vast amounts of confidential #data, such as government agencies, financial institutions, telecommunications providers and critical infrastructure operators. The QKDSat Project, led by Honeywell with support from the UK Space Agency, brings together companies from ESA Member States, including Belgium, Austria, Canada, Czechia and the UK. https://lnkd.in/dFz8Uc_P #worlddatasummit #datainnovation #dataarchitecture #dataprivacy #dataanalytics #datascience #dataprotection #databreach
ESA and Honeywell join forces for ultra-secure data protection with quantum-enabled satellites
esa.int
To view or add a comment, sign in
-
The European Union has launched an ambitious program to develop a robust Quantum Communication Infrastructure (QCI) as part of its strategy to harness quantum technologies. Discover the importance of this initiative, its political significance, and its necessity for the defense and security of the EU. #QuantumCommunication #EU #QuantumTechnology #Security #Defense #EuropeanUnion #Innovation #Technology #QCI #CyberSecurity #Research #TechAdvancements https://lnkd.in/dtmmhPur
Understanding the Quantum Communication Infrastructure of the EU
https://www.toolsoftech.eu
To view or add a comment, sign in
-
Dive into how innovations in satellite networks, reshaping command and control operations, are amplifying multi-domain operations and fortifying national security. A must-read for defense and tech enthusiasts: https://ow.ly/T43V50RbChA #SatelliteTech #CommandAndControl #MultiDomainOperations Intelsat
Optimizing Command and Control in Multi-Domain Operations - Satellite World
https://satelliteworldtoday.com
To view or add a comment, sign in
-
**Protection of Submarine Cables: Securing Digital Infrastructure in an Era of Great Power Competition** 🌐 Submarine fiber optic cables, essential for information and communication technologies (ICT), carry more than 95% of international data. These infrastructures, which include around 600 cables spanning a total of 1.2 million kilometers worldwide, are at the heart of competition between the United States, China, and other actors like Russia. They are indispensable for cloud computing, 5G networks, video streaming, financial transactions, as well as diplomatic communications and essential intelligence. The rise of artificial intelligence will further increase the demand for these resources. **Ownership, Control, and Challenges** 🌍 Submarine cables are primarily built, owned, and maintained by private companies. Four companies dominate the global market: SubCom (United States), Alcatel Submarine Networks (France), Nippon Electric Company (Japan), and HMN Technologies (China). These companies often lease the capacity of their cables through indefeasible rights of use (IRUs). China, with its Digital Silk Road initiative, has become a key player, although recent security concerns have restricted its participation in some projects. **Vulnerabilities and Risks** 🚨 Submarine cables are vulnerable to various factors, ranging from accidental human interactions to extreme weather conditions. Damage from fishing equipment or anchors is frequent, with around 100 to 150 cables damaged each year. Additionally, these infrastructures are potential targets for sabotage or "gray zone" attacks. For instance, in 2023, Chinese ships were accused of cutting cables serving Taiwan's Matsu Islands. Incidents in the Baltic Sea and the Red Sea have also raised concerns. **Recommendations for Protecting Submarine Cables** 🛡️ 1. **Strengthen international cooperation**: The United States and its allies should use international financial institutions to support cable projects and compete with Chinese and Russian companies. 2. **Improve repair capabilities**: Increase funding for cable repair and streamline permit processes to enhance network resilience. 3. **Develop legal frameworks**: Establish a coherent international legal framework to protect submarine cables and prevent sabotage. 4. **Simplify authorization processes**: Reduce the complexity of permit processes to accelerate the installation and repair of cables. For more details, consult the full study: https://lnkd.in/e-JjNrYF #DigitalSecurity #SubmarineCables #Infrastructure #GeopoliticalCompetition #Protection #Technology #CyberSecurity
240816_Runde_Subsea_Cables.pdf
csis-website-prod.s3.amazonaws.com
To view or add a comment, sign in
-
🚀 Exploring the Power of MASINT in Modern Intelligence and Cybersecurity 🌐 In today’s complex threat landscape, Measurement and Signature Intelligence (MASINT) plays a pivotal role in intelligence gathering and threat detection. MASINT goes beyond traditional intelligence methods like HUMINT (Human Intelligence) or SIGINT (Signals Intelligence) by analyzing physical, chemical, and technical signatures to uncover hidden activities. 🔍 What is MASINT? MASINT is all about detecting unique "fingerprints" of physical phenomena. From tracking missile launches to monitoring underground nuclear tests or even detecting subtle electromagnetic emissions from malicious devices, MASINT provides critical, measurable data that drives actionable insights. Applications of MASINT ✅ Nuclear Test Monitoring: Detect seismic activity or radioactive particles to identify secret tests. ✅ Missile Tracking: Use thermal and radar sensors to track missile launches and predict their trajectory. ✅ Cyber-Physical Security: Detect anomalies like electromagnetic emissions near critical infrastructure. ✅ Submarine Detection: Use acoustic sensors to monitor underwater activity. ✅ Disaster Response: Map chemical spills and toxic emissions for efficient response planning. 💡 Why MASINT Matters in Cybersecurity and Intelligence: Provides early warning systems for critical events. Detects unusual patterns in physical and digital environments. Enhances multi-layered intelligence operations, especially for national security, military, and private organizations. 🔧 Tools Driving MASINT: Satellite-based thermal imaging 📡 Ground-based seismic sensors 🌍 Chemical and radiological detectors 🧪 Advanced radar and acoustic systems 🎯 ✨ Real-World Use Case: The SolarWinds cyberattack revealed the importance of detecting not just digital intrusions but also physical and electromagnetic indicators linked to such breaches. MASINT tools can complement cyber intelligence to strengthen proactive defenses. 💬 Looking Ahead: As a professional passionate about intelligence and cybersecurity, I believe MASINT is the future of actionable intelligence. Whether it’s safeguarding national infrastructure or protecting enterprises, MASINT empowers organizations with data-driven insights. 🌟 Connect and Share: If you're working in intelligence, cybersecurity, or defense, I’d love to hear your thoughts on how MASINT is shaping your industry! Let’s exchange insights and discuss its evolving role in modern threat landscapes. 🔗 #Cybersecurity #Intelligence #MASINT #ThreatDetection #JobSearch #Technology #Cybercrime #NationalSecurity #CareerGrowth
To view or add a comment, sign in
-
New Research: Censys finds more than 18,000 devices that are likely to control industrial systems in the U.S. and U.K. are exposed to the public Internet. Learn more about this breaking research and what it means for our critical infrastructure security https://lnkd.in/gMWvuPre
Research Report: Internet-Connected Industrial Control Systems (Part One)
censys.com
To view or add a comment, sign in
-
🔔 New on the IQT Blog: “Non-Terrestrial Networks: The Future of Global Connectivity and National Security” Non-Terrestrial Networks (NTNs) are set to transform economic and geopolitical landscapes over the next five years. The market for NTN technologies, driven by innovations from companies like Apple and Starlink, is expected to grow significantly, enhancing connectivity and operational efficiencies across various sectors. In the third and final part of our NTN blog series, we discuss how major global players — including China, Russia, and the EU — are developing their own satellite constellations, intensifying global competition and shifting power dynamics. To maintain U.S. national security, it is crucial to promote innovation and enhance space-based cybersecurity. Read the full blog to learn how the U.S. can strengthen its technological leadership and secure critical infrastructure in this evolving frontier: https://lnkd.in/ecNyMxcG #NTNs #Cybersecurity
Non-Terrestrial Networks: The Future of Global Connectivity and National Security
iqt.org
To view or add a comment, sign in