0 $
2,500 $
5,000 $
1,800 $
7 DAYS LEFT UNTIL THE END OF DECEMBER

IKE Cyber Warfare Tool Entered U.S. Cyber Command

Support SouthFront

IKE Cyber Warfare Tool Entered U.S. Cyber Command

Click to see full-size image

DEAR FRIENDS. IF YOU LIKE THIS TYPE OF CONTENT, SUPPORT SOUTHFRONT WORK:

Donation alertshttps://donationalerts.com/r/southfront

Gumroadhttps://gumroad.com/southfront

Or via: http://southfront.org/donate/ or via: https://www.patreon.com/southfront

A critical cyber tool – Project Ike was officially delivered to US Cyber Command, after initially being developed by DARPA.

Project Ike is a prototyping effort that got its start under the name Plan X in 2013. After DARPA, it was moved to the Pentagon’s Strategic Capabilities Office in July 2019 with an award to contractor Two Six Labs for $95 million dollars.

In early April 2021, the program finally moved under the Joint Cyber Command and Control (JCC2) program management office.

The JCC2 program seeks to integrate data from a variety of sources to help inform and support commanders’ decisions, measure readiness down to the individual level, visualize cyberspace and provide situational awareness of forces in operations at all echelons.

This is exactly what the Project Ike is aimed at. Two Six Labs coordinated its efforts with the Strategic Capabilities Office to improve the system.

The developer says that with Project Ike, standardized military processes are finally brought to the cyber warfare domain. Whether that’s for Cyber Command or other agencies and partners, Ike can identify risks, streamline responses and track the outcome.

When Project Ike was initially transitioned to the Strategic Capabilities Office, it was a specific tactical capability. The office sought to scale it to the highest strategic levels to drive the visualizations that come from tactical data.

JCC2 will leverage the Project Ike prototype as one of the baseline capabilities for battle management and continue to work toward an integrated joint cyber C2 solution.

Two Six Labs envisions Ike as an app-based model orchestration platform in which a user can access all types of information and data feeds from a single dashboard to provide better situational awareness and decision aids for commanders.

Currently, with today’s technology, this requires several systems, and Ike would combine them.

In future phases, the developer plans to use machine learning in order to train the system to make recommendations on a course of action for a particular commander or cyber team.

It also could recommend what a potential network could look like in several months from a bandwidth perspective or service interruptions.

Moreover, from a strategic level, Ike allows commanders to see both offensive and defensive teams operating in cyberspace as well as friendly and adversary forces.

Project Ike is being used by operational forces, thousands of them.

In essence, the system is aimed at making cyber warfighting as simplified and streamlined as possible for the US and its allies. Be it for defensive or offensive operations.

Currently, JCC2 is achieving its goal of developing new capabilities and creating a development environment and infrastructure and integrating situational awareness capabilities.

The entire scope of activities and efforts of JCC2 is unknown, as there’s very few details that are released, but it appears quite ambitious and facing any future potentiality.

MORE ON THE TOPIC:

Support SouthFront

SouthFront

Subscribe
Notify of
guest
9 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
johnny rotten

Too bad the Software Writing Services will be sub-contracted to the Indians for a few dollars per hour, the result will always be the same, many statements and several self-inflicted damage, you know like 737-max.

Liberal guy

More like Yankee video game

Иван

Yeah, situation awareness tool is probably useful but there is no ‘real time’ in cyber warfare. You get info after the fact. Both offensive and defensive.

Colleen Crouse

Not true. The real challenge is real-time source origin authentication.

Иван

You’re not going to get that with half descent hacker until it’s too late and source id will not do you much good. Damage will already be done.

Colleen Crouse

1:46 pm CST March 21, 2022

32 days left.

Colleen Crouse

I had asked a while ago if they were selling DARPA to Russia. This description sounds like that “command center” that Putin took to after the announcement of COVID-19.

There was a place called the “Beacon” House for the Blind in Chicago…I know what the entry requirements for this plat[y]form are…

If they do not address their CVE problem this is not going to be any better at “cyber security” than anything else they’ve done in the last 15 years.

What is due on May 1 from 2009?

Colleen Crouse

You are not allowed to touch my things.

I already know what you learned in German class. I still said no.

disTheeNot

sounds like a cyber version of the Maginot Line wall.

9
0
Would love your thoughts, please comment.x
()
x