Back to news

April 1, 2020 | International, Aerospace, Naval, Land, C4ISR, Security

Coronavirus : retour au travail pour les industriels de la défense

L'arrêt de certaines usines a surpris nombre de militaires. Après un travail de concertation, tous les industriels ont rouvert afin d'assurer le soutien des armées.

Par Anne Bauer

Publié le 31 mars 2020 à 15h50Mis à jour le 31 mars 2020 à 16h06

C'est une des découvertes de la crise du coronavirus : la défense n'a pas d'obligations de production particulières par rapport à d'autres secteurs . De quoi surprendre les commandants militaires. Aussitôt le confinement déclaré, une entreprise comme Arquus (ex-Renault Trucks Defense), filiale de Volvo, annonçait la fermeture de ses sites industriels sans concertation avec ses partenaires, alors que l'entreprise fabrique avec Thales et Nexter les blindés de l'armée de terre. Après un certain flottement, les choses sont rentrées dans l'ordre et les sites industriels se remettent en marche depuis lundi.

Cartographier les besoins prioritaires

« Un dialogue s'est ouvert entre les industriels de la défense, la Direction générale de l'armement et le ministère des Armées pour faire une cartographie des activités les plus critiques pour la défense, donner des prévisions d'activité et bien mesurer tous les impacts sur les systèmes de soutien au profit des forces armées », explique-t-on au ministère des Armées.

Dès le 20 mars, la ministre Florence Parly envoyait un courrier aux industriels pour leur rappeler que « sans transiger sur les mesures barrières dont le respect strict est indispensable pour endiguer la propagation du virus, l'activité des entreprises de défense devait continuer ». Pas question de ne pas assurer l'entretien des hélicoptères au moment où ils sont plus que jamais engagés dans le transport des malades , de baisser la garde sur la dissuasion nucléaire, ou encore de ne pas pouvoir changer les pièces défaillantes des blindés utilisés au Sahel.

Renégociation prochaine des objectifs

Après une grosse semaine de fermeture, histoire de bien analyser les conditions de production et de nettoyer les sites de fond en comble, les industriels de la défense ont rouvert. Chez Nexter, les sites de production sont de nouveau actifs, même si la totalité des effectifs n'est évidemment pas appelée. Arquus, de son côté, explique avoir terminé la semaine dernière son inventaire, ce qui lui a permis de livrer à la Direction générale de l'armement nombre de blindés stockés et de rappeler ses salariés pour assurer les livraisons des pièces de rechange, notamment à l'heure où les camions de l'armée sont extrêmement sollicités dans l'opération « Résilience » de soutien à la lutte contre la pandémie.

Globalement, le soutien aux armées sur terre, mer et air est assuré, sachant qu'il y aura plus tard, au printemps, des négociations pour réviser les objectifs de livraison de matériel neuf, qui étaient inscrits dans la loi de programmation militaire. Il faudra tenir compte de la baisse de la mobilisation du personnel pour des raisons sanitaires - et sans doute, in fine, d'un recadrage des ressources budgétaires.

https://www.lesechos.fr/industrie-services/air-defense/coronavirus-retour-au-travail-pour-les-industriels-de-la-defense-1190687

On the same subject

  • Just Weeks After Saudi Trip, Biden Administration Greenlights $5B in Arms for Gulf Nations

    August 4, 2022 | International, Aerospace, Naval, Land, C4ISR, Security, Other Defence

    Just Weeks After Saudi Trip, Biden Administration Greenlights $5B in Arms for Gulf Nations

    Under the deal, Riyadh could spend $3 billion on Patriot interceptors; the UAE, $2.2 billion on THAAD interceptors.

  • Disruptive technologies show why government needs data security standards now

    November 21, 2018 | International, C4ISR

    Disruptive technologies show why government needs data security standards now

    By: Justin Lynch Telepathy. Data uploading to the brain. Even humanoid sex robots. These are among the ideas that exist on a periodic table of disruptive technologies, a new visual guide that predicts what will alter human existence in the coming years. Created by Imperial College London, the table identifies what is set to change societies in the short term (smart controls and appliances), as well as fringe ideas that are decades away from existence, if they will exist at all (think force fields.) Yet the disruption could turn disastrous without proper data-security standards, according to one of the chart's creators, Richard Watson, the futurist in residence at Imperial College London. “There is very little here that is not in some way digital and connected, which makes it vulnerable,” Watson said. “Any kind of internet-of-everything device doesn't really work if you haven't got common standards — if Apple isn't sharing with Google and the French aren't sharing with the Germans.” Experts have long expressed concern about the lack of data standards for internet-connected devices. There is no international standard for data security. And U.S. government oversight of internet-connected devices is spread across at least 11 different federal agencies, according to a 2017 Government Accountability Office report. “As new and more ‘things' become connected, they increase not only the opportunities for security and privacy breaches, but also the scale and scope of any resulting consequences,” the report said. And there has been a flurry of cyberattacks using internet-connected devices. Some hackers are exploiting smart devices as an intermediary to attack computer networks, the FBI warned Aug. 2. Ninety-three percent of respondents told Armis, a security platform, in an August survey that they expected governments to exploit connected devices during a cyberattack. The Imperial College London chart offers a further glimpse at how important it may be to create these common regulations by imagining a wealth of potential breach points. Watson listed some of the table's future technologies that could be hacked. “Smart controls and appliances.” Hackable. “Autonomous robotic surgery.” Hackable. “Autonomous ships and submarines.” Hackable. “One of the issues with the stuff on here is that it relies on extremely good data security,” Watson said. The problem with having a developing ecosystem without global standards is that a single vulnerability could allow access to more than one network, and government officials and businesses are currently taking a strategy of letting the private sector debate how, or if, to regulate itself when it comes to internet-connected devices. One piece of bipartisan federal legislation, the 2017 Internet of Things Cybersecurity Improvement Act, mandates that “devices purchased by the U.S. government meet certain minimum security requirements," but it has stalled in Congress. As a first step, manufacturers should collaborate to establish device security baselines, Jing de Jong-Chen, general manager for global cybersecurity at Microsoft, said during a June conference hosted by the Woodrow Wilson Center, a Washington, D.C.-based think tank. One private solution is a set of common guidelines developed by the IEEE Standards Association, an industry trade organization. The trade association's voluntary standards is evidence of a fear of government regulation that the private sector is openly hostile to. During the June event, the idea of government regulation of smart devices was laughed at by private sector officials in the room. But that laughter may have been premature. In September 2018, California Governor Jerry Brown approved a bill that requires companies to install connected devices with “a reasonable security feature” protecting it against unauthorized access. The bill means that the periodic table of disruptive technologies may eventually be impacted by a modicum of public regulation, although it is not clear if that will be effective. Not making it any easier is that no amount of planning can compensate for every technological innovation. For example, when it comes to the most disruptive future technology, the chart is secretive. In position 100, predicted to be the most innovative idea, the chart says it is too dangerous to publish. “We can't talk about this one,” it reads. In this instance, however, a potential security risk is averted. When asked if this technology is the one that will literally “break the internet,” Watson is forced to make a confession: “It's a joke. It's just us dodging the ball because we couldn't think of what to put there.” https://www.fifthdomain.com/industry/2018/11/20/disruptive-technologies-show-why-government-needs-data-security-standards-now/

  • State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage

    April 25, 2024 | International, Security

    State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage

    A new stealthy malware campaign leveraging two zero-day flaws in Cisco networking gear has been uncovered, allowing covert data collection and reconna

All news