Back to news

October 2, 2018 | International, Land

China building bridging systems for heavy vehicles

Christopher F Foss, London - Jane's International Defence Review

China's NORINCO and its partners are producing and offering for export a range of bridging systems - including the new HZ21 - that must handle the newer, heavier armoured platforms replacing older Chinese systems.

NORINCO markets a range of mobile bridging systems on tracked and wheeled platforms, but the prime contractor for some of these bridging systems is the China Harzone Industry Corporation (CHIC), which is a subsidiary of the China Shipbuilding Industry Corporation (CSIC).

CHIC confirmed that it has two major production facilities and one research and development facility, with sales of commercial and military bridging systems to more than 40 countries.

The HZ21 military bridging system is deployed by China and referred to by CHIC as a 'fast bridge'. It is transported and launched over the rear of a forward control 8×8 cross-country truck.

Prior to launching the two-part bridge, a stabiliser is lowered on either side at the rear of the platform. The lower part of the bridge is then extended over the gap, followed by the upper part - the complete bridge is then lowered into position.

When fully extended, the 10.5-tonne (11.6 ton) two-part bridge is 21 m (69 ft) long and has a roadway width of 3.3 m; it can bridge a wet or dry gap of up to 19 m. According to CHIC, it can be deployed in fewer than 10 minutes and retracted in a similar time.

The HZ21 can handle tracked vehicles with a gross vehicle weight (GVW) of up to 60 tonnes, or wheeled platforms with a maximum axle load of up to 17 tonnes.

In many respects, the HZ21 is similar in concept and operation to the General Dynamics European Land Systems - Germany (GDELS-G) Rapidly Emplaced Bridge System (REBS) deployed by the US Army, which is transported and launched from a Common Bridge Transporter (CBT).

https://www.janes.com/article/83472/china-building-bridging-systems-for-heavy-vehicles

On the same subject

  • Navy Announces Commissioning Date for the Future USS Cincinnati

    July 25, 2019 | International, Naval

    Navy Announces Commissioning Date for the Future USS Cincinnati

    From Commander, Naval Surface Force, U.S. Pacific Fleet Public Affairs CINCINNATI, Ohio (NNS) -- The U.S. Navy has approved the commissioning date for the future littoral combat ship USS Cincinnati (LCS 20). The Navy will commission Cincinnati, Oct. 5, 2019 in Gulfport, Mississippi. The commissioning ceremony signifies the acceptance for service and the entrance of a ship into the active fleet of the U. S. Navy. Former U.S. Secretary of Commerce Penny Pritzker is the ship's sponsor. As the sponsor, Pritzker leads the time-honored Navy tradition of giving the order during the ceremony to “man our ship and bring her to life!” At that moment, the commissioning pennant is hoisted and Cincinnati becomes a proud ship of the fleet. Indianapolis, Indiana native Cmdr. Kurt Braeckel is the commanding officer of the littoral combat ship. Former Secretary of the Navy Ray Mabus announced LCS 20 would be named for Cincinnati at the Cincinnati Reds baseball game, July 19, 2015. LCS 20 will be the fifth ship in naval history to be named Cincinnati. The first played an integral part in the Civil War; the second enforced neutrality laws during the Cuban Revolution and saw service during the Spanish-American War; the third acted as a patrol and flagship during World War II; and the fourth, a Los Angeles class submarine, was commissioned in 1978 and served during the Cold War. LCS is a highly maneuverable, lethal and adaptable ship designed to support focused mine countermeasures, anti-submarine warfare and surface warfare missions. The LCS class consists of two variants: the Freedom variant and the Independence variant. Indianapolis is a Freedom variant. The future Cincinnati will be homeported in Naval Base San Diego upon her commissioning. A fast, agile surface combatant, the LCS provides the required war fighting capabilities and operational flexibility to execute a variety of missions; areas such as mine warfare, anti-submarine warfare and surface warfare. https://www.navy.mil/submit/display.asp?story_id=110349&utm_source=phplist3030&utm_medium=email&utm_content=HTML&utm_campaign=Headlines

  • Comment l'armée française tisse des liens avec les startups de cybersécurité

    June 10, 2022 | International, C4ISR, Security

    Comment l'armée française tisse des liens avec les startups de cybersécurité

    DÉFENSE Comment l'armée française tisse des liens avec les startups de cybersécurité Face à l'évolution de la conflictualité qui se joue désormais dans le champ cyber aussi bien que dans les milieux traditionnels (Terre, Mer, Air, Espace), l'armée multiplie les initiatives pour travailler avec les sociétés qui peuvent l'aider à riposter aux menaces. La France a ainsi créé le commandement de la cyberdéfense (COMCYBER), placé sous l'autorité directe du chef d'Etat-major des Armées et qui doit assurer la protection des systèmes d'information des armées, ainsi que la conception, la planification et la conduite des opérations militaires dans le cyberespace. Outre la collaboration avec les grands groupes, tels que Thales ou Atos, l'armée cherche également à se rapprocher des startups de la cybersécurité les plus innovantes. En témoigne la création à Rennes de la Cyber Défense Factory, un incubateur piloté par la Direction générale de l'Armement (DGA), ou la création, en 2018, de l'Agence de l'innovation de défense (AID). Enfin, le ministère des Armées a signé une convention avec ACE Capital Partners, filiale de Tikehau Capital, qui est le fonds privé le plus actif dans la cybersécurité en France. ACE Capital Partners a investi dans onze jeunes pousses dans la cybersécurité, dont Glimps, Thetris, et plus récemment Vade. Les Echos du 9 juin

  • 3 ways the Navy wants to protect its weapons from cyberattacks

    January 8, 2019 | International, Naval, C4ISR

    3 ways the Navy wants to protect its weapons from cyberattacks

    By: Justin Lynch They have been hacked, tricked and stolen from. Now the message is clear -- no more. The Navy is looking to support research in 36 areas that can help protect weapons systems from cyberattacks, Naval Air Systems Command said in a Jan. 7 update to a broad agency announcement. “It's not necessarily cutting edge research, but it is the first step in cybersecurity quality control that should have already been done,” said Bryson Bort, the founder and chief executive officer of Scythe, a cybersecurity platform. The Navy had admitted as much. Research into protecting the department's weapons comes amid reports that the American military suffers from sustained cyberattacks. In December, an Inspector General report found that some in the Pentagon were not taking basic cybersecurity steps to protect its ballistic missile system. Although the Pentagon's weapons are worth roughly $1.66 trillion, an October report from the Government Accountability Office found that “nearly all” American missiles, jets, ships and lethal equipment in development are vulnerable to cyberattacks. The announcement comes after Congress has mandated the Pentagon address its cyber vulnerabilities. Three of the research areas the Navy is interested are commonly described as the pillars of strong cybersecurity, no matter the institution. They include: Dynamic reconfiguration In an effort to confuse attackers, the Navy wants to research “dynamic reconfiguration.” The National Institute of Standards and Technology defines the term as “changes to router rules, access control lists, intrusion detection/prevention system parameters, and filter rules for firewalls and gateways.” "Organizations perform dynamic reconfiguration of information systems, for example, to stop attacks, to misdirect attackers, and to isolate components of systems, thus limiting the extent of the damage from breaches or compromises,” NIST officials wrote. Research by the University of Maryland's Christian Johnson found that pairing predictive analytics with dynamic reconfiguration tactics, the new approach can lead to the "successful development of learning models that identify specific classes of malware such as ransomware,” Johnson wrote in a paper for the RSA conference. Deception tactics Experts have long used strategies of physical war in digital battles, including with the use of denial and deception tactics. The Navy wants to boost understanding of this area to better secure its weapons systems. In 2015, researchers at MITRE, which conducts federally funded research, advocated for a 10-step process for planning and executing deception operations. “Leveraging classical denial and deception techniques to understand the specifics of adversary attacks enables an organization to build an active, threat-based cyber defense,” a team of researchers wrote. But the Intelligence Advanced Research Project Activity, the intelligence community's research arm, says that the use of deceptive software and hardware in cybersecurity is still in its infancy. “Many techniques lack rigorous experimental measures of effectiveness,” the organization said, adding that “information is insufficient to determine how defensive deception changes attacker behavior.” Artificial intelligence If there was a common denominator of the federal government's investment in cybersecurity it is the use or artificial intelligence. The Navy has embraced artificial intelligence since its Task Force Cyber Awakening project in 2015. “We see that the more we automate our networks and the more we use machines to do the heavy lifting, the better. Our brains do not have the intellectual capacity to process all of that information,” Rear Adm. Danelle Barrett, Navy Cyber Security Division Director,told Defense Systems, a trade publication, in a 2017 interview. More than half of the challenges and research opportunities announced by IARPA in 2018 involved machine learning, according to an analysis by Fifth Domain. Cyber Command has embraced the technology in a short time period, Capt. Ed Devinney, director of corporate partnerships at the body, said during the November Cyber Con conference hosted by Fifth Domain. “If you talked to anyone at the command two or three years ago about a system that would be all autonomous, you probably wouldn't get much traction. But I think there is a growing understanding and consensus that we need to operate at machine speed, especially when talking about active defense of the network,” Devinney said. He said that everyone likes to use the phrases “artificial intelligence” and “machine learning,” however “there aren't that many people who do AI very well.” https://www.fifthdomain.com/dod/2019/01/07/3-ways-the-navy-wants-to-protect-its-weapons-from-cyberattacks

All news