This DEFTECH SCAN reports on and assesses occurrences in military technology and capability development taking place from late September through late November. This issue in particular reflects the increasing pace and progress of defence technology development and innovation efforts not just in the United States, China, and Russia, but especially in midsized and even small militaries throughout the world. The report includes updates from the Netherlands, the United Kingdom, New Zealand, Israel, Australia, France, Japan, and India in addition to the three large militaries mentioned above.
This volume includes a description of a separate demonstration of an energy capture and storage technology for drones that was also developed by Delft Technical University, signalling not just that this particular university is engaged in interesting and potentially impactful research, but more fundamentally the importance of academia and applied research institutes in the defence innovation ecosystem. Assessment of continued development of Russian exoskeletons and China’s drone swarms—both regularly touched on themes in these reports—also appear in this report.
Due to the Coronavirus pandemic, we switched to a hybrid mode, meaning that participants will also have the option to attend the conferences online at live.stcc.ch
Criminal hackers have a long history of sharing experiences, tools, and vulnerabilities; this has contributed to the success of major cyberattacks. The goal of this conference is to explore various measures to make cooperation, information sharing and collective intelligence also effective on the defender side.
As early as twenty years ago, the first Information Sharing and Analysis Centers (ISACs) were established as a central resource for sharing information on cyber threats to critical infrastructure. In the same vein, threat intelligence platforms help organizations aggregate, correlate, and analyze threat data from multiple sources in (almost) real-time to support defensive actions. Open source solutions have also been proposed as a counterweight to «black-hat» hackers successfully working together, for instance the Malware Information Sharing Platform (MISP) or the Open Threat Exchange (OTX), a crowd-sourced computer-security platform.
The Cyber Threat Intelligence (CTI) discipline, based on intelligence techniques and methods, aims to collect and filter all relevant information from the cyberspace, in order to draw up portraits of attackers, threats or technological trends (sectors of activity affected, methods used, etc.). CTI sources include open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. Thus, the tools used by large Security Operations Centers (SOCs), produce hundreds of millions of events per day, from endpoint and network alerts to log events, making it difficult to filter down to a manageable number of suspicious events for triage.
All in all, this profiling enables early detection of cyberattacks and better anticipation of cyber-risks. However, a proper threat intelligence approach should be complemented by technology intelligence, an activity that enables organizations to monitor and forecast the technological opportunities and threats that could affect the future growth and survival of their business. As emphasized by the National strategy for the protection of Switzerland against cyber risks (NCS, 2018-2022), an early identification of technological trends constitutes an important aspect for developing the Swiss cyber-defence. In that respect, the armasuisse CYD Campus cordially invites all stakeholders to bridge the gaps between academia, the industry, and governmental organizations working in the field of cyber-defence.
Registration Chair: Monia Khelifi
Program Chair: Dr. Alain Mermoud
Conference Fee: CHF 100.- one day, CHF 200.- both days, free of charge for students and government employees
Please note your will have to wear a mask except if you eat at a table (more information in the attached security concept).
This DEFTECH SCAN reports on and assesses key developments in military technology and capability development taking place from late July through mid-September. It includes developments from the United States—which saw an especially active reporting period—Russia, China, the United Kingdom, Germany, the Netherlands, and India among other countries involved in the discussion around the ethics and safety of defence and security applications of artificial intelligence.
The reporting period included at least three especially significant defence technology breakthroughs in the United States: 1) the shock announcement of the flying in the real world of a digitally designed sixth generation fighter jet; 2) the victory of an artificial intelligence algorithm over a human pilot in a virtual dogfight; and 3) the interception of a manoeuvrable cruise missile by a hypervelocity projective fired from a howitzer.