The Complex

Meet the U.S's new stealthy, ship-killing missile

This week has provided a couple of interesting clues as to how the U.S. Navy might deal with the proliferation of weapons meant to keep U.S. ships so far from an enemy's shore that its weapons would be useless.

On Wednesday, Lockheed Martin scored a $54 million contract to prepare its prototype next-generation anti-ship missile for a pair of test launches from a ship. DARPA gave the Bethesda-based defense giant the money to move ahead with its Long Range Anti-Ship Missile (LRASM) program, according to a DOD contract announcement.

"LRASM is a joint DARPA/Office of Naval Research effort to develop and demonstrate standoff anti-ship strike weapon technologies," reads the announcement.

In English, that means the missile is meant to allow U.S. ships and planes to hit enemy ships from outside the range of the adversary's weapons and air defenses.  The LRASM is supposed to use its own sensors to autonomously hunt for its targets once it is in the air, in case the enemy is jamming communications between the missile and the ship that fired it.

To keep costs and development time under control, DARPA is looking at basing the LRASM (under development since 2009) on the long-range version of Lockheed's stealthy Joint Air-to-Surface-Standoff Missile and packing it with additional sensors.

Today, Flight Global reported that the Navy is thinking about putting extra fuel tanks on its fleet of F/A-18E/F Super Hornets in an attempt to give them extra range -- something that would be helpful when fighting a nation with weapons aimed at keeping U.S. aircraft carriers at bay.

Remember, nations like China are developing radars and missiles aimed at keeping enemy ships and aircraft far from their shores in hopes of limiting the weapons that can be brought to bear against them -- a strategy the Pentagon calls anti-access/area denial, or A2AD.

U.S. defense officials want to overcome this by developing a new host of stealthy long-range carrier-based drones, a new fleet of stealth bombers and a variety of long-range missiles that can slip through radars screens, find targets, collect intelligence on them, and then destroy them. In addition, the U.S. is looking at ways to spread its forces among bare-bones bases throughout the Pacific in an effort to make them harder to target in case of a conflict.

DARPA

The Complex

Is Amazon providing CIA up to $600 million in cloud computing?

Web commerce giant Amazon is apparently building a cloud-computing network for the CIA. Trade publication Federal Computer Week has reported that the agency will pay the online retail pioneer up to $600 million to develop its own private cloud over the next decade.

This would make plenty of sense. Amazon is well-known for providing cloud-computing services to the private sector, and government agencies dealing with classified information are pushing to adopt cloud services as a way of consolidating thousands of network "enclaves" that are hard to defend. The Pentagon, for example, is building what it says will be a defendable, upgradable network, known as the Joint Information Environment.

While the CIA declined to comment to FCW about the project, an agency official revealed in a public forum that Langley is adopting commercial software in order to keep up with the pace of innovation in the private sector.

Speaking to the Northern Virginia Technology Council Board of Directors on March 12, Central Intelligence Agency Chief Information Officer Jeanne Tisinger told an audience of several dozen people how the CIA is leveraging the commercial sector's innovation cycle, looking for cost efficiencies in commodity IT, and using software-as-a-service for common solutions.

Two audience members who asked not to be named told FCW that Tisinger said the CIA was working "with companies like Amazon."

The piece goes on to cite CIA Chief Technology Officer Gus Hunt's February comments saying that Amazon had a software-as-a-service model that "really works." Remember, software-as-a-service (SaaS) means that businesses buy web/cloud-hosted software accounts rather than making a onetime purchase of software that is installed on their computers. Think of all the features your Google account gives you -- email, document creation and sharing, Web site analytics, etc. That's a very basic example of a mix of free and premium software-as-a-service.

"Think Amazon - that model really works," regarding the purchasing of software services on a "metered" basis for which Amazon is well-known for. Hunt has also spoken publicly in the past about the potential for leveraging public cloud infrastructure for non-classified information.

Historically, the CIA's cloud computing strategy centered on a number of smaller, highly specific private clouds. While the full scope of its current contract with Amazon is not yet clear, it is likely this contract essentially brings a public cloud computing environment inside the secure firewalls of the intelligence community, thereby negating concerns of classified data being hosted in any public environment.

Expect this trend to continue as the government moves to purchase technology -- especially in cloud and mobile tech -- that can keep up the extremely rapid pace of innovation at a time of declining military budgets. NSA and the Defense Information Systems Agency (DISA) -- the Pentagon's Internet service provider -- are working to field commercially-available smart phones and tablets that use secure cloud software to allow them to handle classified information. 

Keep in mind that all this commercially available tech will need to be tweaked to be extra secure against cyber attack

"We've got to be able to do this securely. We cannot give up the security, the confidentiality, the pedigree of our data at the unclassified level, because of [the need to protect personal information about users]. But at the classified levels, consistent themes are going to be not only security but identification and access management," said DISA's Chief Technology Officer, Dave Mihelcic, said while discussing the DOD's efforts to adopt such technology at an industry luncheon in February.

Click here and here to learn more about how DOD officials want to defend against intruders in their cloud networks and mobile devices.

 

Wikimedia Commons