C6ISRT has arrived

See how the Department of Defense's C5ISR framework enhances our Smart Citadel Service

We Are Available 24 Hours

(888) 4000-234

Bringing Firepower to the Fight with adaptive ISR

The Joint Operations Center’s Intelligence, Surveillance, and Reconnaissance team provides critical insights into potential threats and vulnerabilities in our Smart Citadels. By gathering and analyzing data about activities within a Smart Citadel, we can proactively identify and address security gaps. This ISR-driven cybersecurity posture allows us to prevent attacks before they occur.

unified leadership

Command and Control

In the face of a coordinated cyberattack or natural disaster, the Joint Operations Center issues an “order to engage” to the Multidisciplinary Chief Information Security Officer (MDC) associated with your business. As the supreme authority within the Metro Access Combatant Command (CCMD), the MDC wields both operational control (OPCON) and tactical control (TACON) throughout the threat. During active engagements, the MDC upholds the Unity of Command principle and serves as the intermediary between the Joint Operations Center and the business in question. This hierarchy is vital for the success of joint operations that are carried out by designated teams and attached specialists. By adopting a centralized approach, the MDC coordinates forces towards a common objective within a consolidated command structure. This method allows the MDC to assign some specialists to focus on business recovery, while assigning others to isolate and neutralize the threat.

stay connected

Communications

A multidisciplinary CISO (MDC) requires reliable and secure communication channels with the joint operations team to execute their missions effectively. The Joint Operations team operates over an independent infrastructure that includes a Private Automatic Branch Exchange (PABX) and a dedicated data network, guaranteeing continuous connectivity, even in the event of attacks.

processing performance

Computers

The HADDFA architecture provides a highly scalable platform with distributed computing capabilities designed for C5ISR specialists.  The processor’s high capacity and distributed architecture, along with memory and storage, enable the virtualization of workstations and servers across various operating systems. This supports containerization, which allows secure operations outside the company’s network and maintains team productivity, even amidst an attack. Providing specialists with a separate computing environment enables them to work discreetly within the corporate enterprise.

internet access

Cyber

The cyber component is crucial for C5ISR IT operations, facilitating communication, intelligence collection, and the protection of information systems. Providing your team with access to cyberspace via a secure, isolated environment separate from your corporate network enables the C5ISR IT Operations service to safeguard your data and networks against unauthorized access and cyber threats. As a Tier 2 Internet Service Provider, Metro Access provides a direct internet connection using our own IPv4 and IPv6 address space, circumventing the typical limitations set by business-class ISPs.

make decisions

Intelligence

Intelligence involves the analysis and interpretation of information obtained from surveillance and reconnaissance activities. It supports decision-making, operational planning, and the development of strategies and tactics. AI algorithms running in the HADDFA supercomputing platform enable your team to process information quickly and efficiently so you can make faster decisions.

maintain visibility

Surveillance

Surveillance involves persistent monitoring to gather data on an organization’s infrastructure, activities, movements, and associated individuals. The C5ISR IT Operations service employs a range of surveillance technologies, including cameras, bots, identity access management systems, and sensors, to track movements, evaluate circumstances, and deliver real-time data that aids in decision-making. Effective surveillance is vital for informed decision-making in joint operations and for improving situational awareness.

look ahead

Reconnaissance

Reconnaissance is mission-specific, aimed at collecting detailed information on specific targets or areas to support planning and operations. It is typically more targeted and time-constrained, often involving direct observation or information collection in particular locations or situations through robotic process automation, with the direct involvement of reconnaissance specialists or teams, conducting assessments or using specialized equipment to acquire detailed intelligence.

"Corporate IT must realize their new role as the first line of defense in cyber warfare."

THE C5ISR IT OPERATIONS sERVICE WILL keep your team UP AND running EVEN WHILE YOU ARE UNDER ATTACK

The best defense is a strong offense

A delayed decision-making process can result in missed opportunities to prevent threats and secure critical assets. Consequently, this hesitation can result in increased vulnerability and the potential loss of valuable resources. The inability to respond to rapidly changing situations puts personnel and operations at risk.

C5ISR IT Operations Service enhances tactical decision-making to protect against multidomain cyberattacks.

C6ISRT Software and Services Infrastructure (SSI)

SSI ensures that your team is able to see, sense, communicate, and move faster than your adversaries

Getting started

Onboarding Your IT Operations

Here are the first steps for deploying C5ISR IT Operations Service within your organization.

MDC Mobilization

A multidisciplinary Chief Information Security Officer (CISO) will be attached to your company.

Skills Assessment

Your IT specialists will undergo skills evaluation to identify their technical strengths and weaknesses.

Site Mapping

Your sites will be validated and assigned a private C5ISR vector from the Joint Operations Center.

Mesh Network

Your sites will be integrated into a private mesh network supported by C5ISR IT Operations service.

User Credentials

Your IT specialists will be assigned credentials so they can begin using their C5ISR resources.

Joint Operations Training

The Joint Operations Training Academy will enroll your in-house teams in C5ISR specialist courses.

C5ISR IT operations service

Frequently Asked Questions

Metro Access is a public telecommunications carrier that operates over a highly adaptive distributed dataflow architecture (HADDFA) based supercomputing network. Unlike other carriers who provide shared cloud services that are not completely dedicated to their individual customers, Metro Access’ Vector Arrays belong exclusively to each customers’ private domain that interconnect over a tandem access switching fabric.

C6ISRT is a Command and Control solution that supports networked warfighters to gain information dominance and decisive lethality on the battlefield. It was Initially designed as an architectural framework for the Department of Defense (DoDAF), and its concepts and applications have since developed into what is now referred to as C5ISR.

C5ISR stands for “command, control, communications, computers, cyber-defense (C5), intelligence, surveillance, and reconnaissance (ISR).” By integrating a broad spectrum of resources C5ISR connects warfighters, weaponry, and other assets with critical intelligence and tactical networks.

In 2020, L2Labs incorporated their DODAF-based L2 Command and Control System (L2C2S) with Metro Access’s Highly Adaptive Distributed Dataflow Architecture (HADDFA) supercomputing network. Following the integration of L2C2S and HADDFA, the “C5ISR IT Operations Service” has been established to ensure spectrum dominance for IT departments that are part of the Essential Critical Infrastructure Workforce, as identified by the Cybersecurity and Infrastructure Security Agency (CISA) of the Department of Homeland Security.

In a position paper addressing the detection and resolution of next-generation cyber-attacks, Chief Technology Officer James Hrubes emphasized the evolving nature of modern threats and the critical importance of incorporating MIL-SPEC C5ISR standards into cyber warfare operations within Corporate IT departments.

“Corporate IT must realize its new role as the first line of defense in cyber warfare.”

Hrubes also pointed out that nation-state actors, cybercriminals, and cyber terrorists are intensifying their focus on enterprise supply chains and critical infrastructure personnel with ransomware attacks, necessitating advanced detection and response mechanisms.

Today’s corporations need to shift their focus towards developing in-house C5ISR IT Operations specialists who are capable of working in teams to address issues proactively. When under attack, it is crucial that these specialists can deploy alongside mission-ready counterparts for joint operations, guided by a dedicated, multidisciplinary CISO. Advanced IT Ops training will ensure that your specialists are not only more effective in collaboration but also excel in teamwork and joint operational contexts.

IT Departments powered by C5ISR IT Operations Service that are guided by a dedicated Multidisciplinary CISO are set to evolve a conventional IT department into a formidable force adept at sustaining and protecting against diverse multidomain threats. Transforming IT operations can reduce operational expenses, enhance performance, and increase the efficiency and effectiveness of your IT organization.

No, in an active crisis, you need an Incident Response Team that can assess your situation quickly, contain the threat, and minimize damage. Having a skilled incident response team ensures a swift and effective resolution of the incident. Once the threat has been neutralized, you can work with a recovery team to evaluate compromised data and systems.

Yes, a “Straitbridge” is a hybrid CPE device that is engineered, furnished, and installed by a certified C5ISR network technician. The straitbridge securely connects your physical sites to the HADDFA supercomputing network and provides additional interfaces to a tandem LAN switching fabric at the Joint Operations Center.

A Chief Information Security Officer (CISO) trained and certified in all C5ISR disciplines is recognized as a Multidisciplinary CISO. This qualification enables them to lead missions and serve as a liaison between the IT Operations team and the Joint Operations Center.

In C5ISR IT operations, every IT staff member is trained and certified in one or more disciplines, earning the title of Specialist or Multidisciplinary Specialist. All C5ISR IT operations are carried out by either single-discipline specialists or multidisciplinary specialists, all under the command of a Multidisciplinary Chief Information Security Officer (CISO).

0 Shares