Australian IT firms given $28M to aid DoD

Australia’s Department of Defence (DoD) has dished out AUS $28 million (£16M) worth of contracts to a chosen few IT companies in the hopes of improving the sector’s tech.

15 small business that builds “cutting edge technologies” were chosen to sign contracts with the DoD to develop specific tech that will aid the country’s defense division. Part of the winning criteria was having the ability to enable the Department of Defence to have “a capability edge”.

The organisations chosen

Just a few of these companies picked are; electronics and engineering company, Solinnov, tech development firm, Clearbox Systems and IT consultation and software testing organisation, Consunet.

The majority of companies involved in the backing are working on tech that uses satellites, radio and antenna systems.

Minister for Defence Industry Melissa Price said in the announcement, “This tranche of investments includes initial concept exploration and technology demonstration, through to prototyping and integrated capability demonstration and evaluation,”

Distribution of money

Solinnov is receiving $2.3 million (£1.2M), the highest amount of funding, hoping it will create a software-defined radio system. The aim of this project is that the end result can be used in electronic warfare. This is when electronic attacks are scrambled during combat.

$831,000 (£464,000) went to Clearbox solutions to grow its software tools and work on cryptographic keys. These are used to turn regular text into encrypted text using algorithms. By using this tech, it’s trusted the defense department will improve overall operations.

Whilst Consunet received $180,000 (£101,000) of subsidy to incorporate existing technology and create software which will allow “electromagnetic battle management”.

A pricey error

Australia’s DoD has recently faced the blame after spending $35 million on the “most lethal conventional submarines ever contemplated” in what experts are calling a “costly” mistake which has left the sector vulnerable to attacks.

 

Related Posts

Menu