Home Digitalisation Arqit joins UK MOD’s connectivity of disparate remote autonomous systems framework

Arqit joins UK MOD’s connectivity of disparate remote autonomous systems framework


Arqit has signed a contract with MOD to join its Framework for Connectivity of Disparate Remote Autonomous Systems (the “MDIS Project”).

Arqit Quantum, a global leader in quantum encryption technology, is pleased to announce that it has been selected by the UK Ministry of Defence to join its Multi-Domain Integrated Systems (MDIS) Project.

The MOD has a developing requirement for the creation or adoption of a set of common standards and/or architecture for interfaces, data transfer and data management that can be used both for upgrades to legacy systems and future procurement to enable swift and simple interoperation of systems. The work will involve demonstrations of multi-domain integrated systems which may include autonomous and swarming technologies.

In particular Arqit will focus on areas of Data Management and Fusion, and Communications Bearers, Network Architecture and Services.

Arqit Founder, Chairman and CEO, David Williams, added: “We are delighted to sign this contract with the MOD. Given recent progress announced with other Five-Eyes partners, interoperability is a significant advantage for us and crucial to the success of any MDI (known as JADC2 in USA) initiative to support future joint operations. Military Data systems need to be automated, interconnected, and interoperable across multiple domains globally. They require machine-to-machine as well as human-to-human and human-to-machine interfaces of unprecedented scale and connectivity and need a modern security architecture to match.”

MDIS Project Manager, Future Capabilities Group, MOD said: “An MDIS capability relies on the collection, aggregation, and dissemination of a large amount of data. MDIS will be Secure by design: Security shall be embedded in thinking throughout all architectures, designs and implementations and shall follow a set of security principles such as zero-trust, encryption, least privilege and need-to-know by default. This ensures that any connectivity capability is secure, without requiring later rework to consider security.”

Previous articleHFW launches China Cybersecurity and Data Law Practice with hire from Chinese Law Firm
Next articleThome Group streamlines maritime operations with integrated BASSnet Fleet Management software