Back to news

October 25, 2019 | International, Aerospace

Deux premiers Dassault ATL2 pour la Marine

La ministre des Armées, Florence Parly, a salué la livraison des deux premiers avions de surveillance Dassault Aviation ATL2 mis au standard 6 et arrivés sur la base de Lann-Bihoué en juillet et août derniers.

Florence Parly, ministre des Armées, s'est vue présenter les nouvelles capacités des avions de surveillance maritime Dassault Aviation ATL2 mis au standard 6 lors d'un vol de deux heures. Les deux premiers ATL2, le prototype et le premier de série, respectivement arrivés à Lann-Bihoué les 18 juillet et 27 août dans leur version logicielle finale, "ont été minutieusement testés par une équipe intégrée associant le centre d'expertise et d'essais DGA Essais en vol, le centre d'expérimentations pratiques et de réception de l'aéronautique navale (CEPA/10S) de la Marine nationale et Dassault Aviation". "L'expérimentation opérationnelle de la Marine, débutée à Istres en parallèle des dernières phases d'essais, se poursuit à Lorient pendant les dernières vérifications contractuelles effectuées par la DGA en vue de la qualification. Elle a pour but d'élaborer les tactiques d'emploi permettant d'utiliser au mieux les nouvelles capacités de l'aéronef", indique le ministère des Armées qui poursuit :" La mise en service opérationnel du standard 6 est prévue fin 2021, après la formation des équipages, la transformation d'un premier lot d'aéronefs, et la livraison du simulateur à terre pour l'entraînement tactique de nouvelle génération (SIMTAC NG), en cours de réalisation sous la conduite de la DGA". Les chantiers de mise à hauteur au standard 6 s'effectuent en parallèle par Dassault Aviation (6 chantiers en plus de l'avion prototype) et le Service industriel de l'aéronautique (SIAé) du ministère des Armées (11 chantiers).

"Au-delà du traitement des obsolescences d'un avion conçu dans les années 1980, la rénovation porte principalement sur le remplacement de certains matériels par des équipements numériques issus des meilleures technologies actuellement disponibles : calculateur tactique, systèmes de renseignement optronique et acoustique, consoles des opérateurs, radar. En particulier, le nouveau radar Searchmaster bénéficie de la technologie d'antenne active développée par Thales pour le Rafale. Naval Group est également impliqué avec le logiciel de traitement de l'information, ainsi que le SIAé pour la rénovation des consoles de visualisation", souligne le ministère des Armées qui rappelle que si les ATL2 sont "prioritairement destinés à la maîtrise du milieu aéromaritime via la lutte contre les sous-marins et les navires de surface, de la zone littorale jusqu'au grand large", ils peuvent aussi "constituer un appui aux opérations aéroterrestres gr'ce à leur capacité à mener des actions de renseignement et de frappes au sol".

https://www.air-cosmos.com/article/deux-premiers-dassault-atl2-pour-la-marine-21912

On the same subject

  • Audit finds cyber vulnerabilities in US missile defense system

    December 17, 2018 | International, C4ISR

    Audit finds cyber vulnerabilities in US missile defense system

    By: Geoff Ziezulewicz The Army, Navy and Missile Defense Agency are failing to take basic cybersecurity steps to ensure that information on America's ballistic missile defense system won't fall into nefarious hands, according to a Defense Department Inspector General audit released Friday. Investigators visited five sites that manage ballistic missile defense elements and technical information, but the names of the commands were redacted in the publicly released report. “The Army, Navy and MDA did not protect networks and systems that process, store, and transmit (missile defense) technical information from unauthorized access and use,” the declassified report states. Such inadequacies “may allow U.S. adversaries to circumvent (missile defense) capabilities, leaving the United States vulnerable to missile attacks,” the report states. They found officials failed to employ safeguards familiar to most people online in 2018, the latest development to raise questions about the U.S. military's cybersecurity vulnerabilities. Among the shortcomings: Administrators for classified networks had no intrusion detection and prevention systems in place to watch for cyberattacks, much less stop them, according to the report. At one site, officials said they had requested to purchase those cyber safeguards in December 2017 but nine months later it still hadn't been approved. “Without intrusion detection and prevention capabilities, (the site) cannot detect malicious attempts to access its networks and prevent cyberattacks designed to obtain unauthorized access and exfiltrate sensitive (missile defense) technical information,” the report states. Officials also failed to patch system flaws after receiving vulnerability alerts, one of which had first been identified in 1990 and had still not been fixed by April. Another vulnerability that could be exploited by an attacker was first identified in 2013 but also was never pathced, according to the report. “Countless cyber incident reports show that the overwhelming majority of incidents are preventable by implementing basic cyber hygiene and data safeguards, which include regularly patching known vulnerabilities,” the IG report states. “(Missile defense) technical information that is critical to national security could be compromised through cyberattacks that are designed to exploit these weaknesses.” Some facilities failed to force employees to use common access cards, or CAC, when accessing the classified system, a basic cybersecurity practice known as multi-factor identification. Instead, officials were able to access the sensitive information using just a username and password, the report states. Hackers use phishing and other tactics to exploit passwords and gain access to such systems. New hires are supposed to be allowed network access without a card for only their first two weeks on the job. But IG investigators found users on the systems without CAC cards for up to seven years. At one site, a domain administrator never configured the network to allow only CAC holder access. “Allowing users to access networks using single factor authentication increases the potential that cyber attackers could exploit passwords and gain access to sensitive (missile defense) technical information,” the report states. Investigators also found unlocked server racks at some locations, another key vulnerability to insider snoopers. “The insider threat risk necessitates that organizations implement controls...to reduce the risk of malicious personnel manipulating a server's ability to function as intended and compromising sensitive and classified data,” the report states. External storage devices held unencrypted data and some sites failed to track who was accessing data, and why. Other administrators told investigators that they lacked the ability to record or monitor data downloaded from the network onto these devices. Unless these officials enforce the encryption of such removed data and monitor its downloading and transferring, “they will be at increased risk of not protecting sensitive and classified (missile defense) technical information from malicious users,” the report states. Investigators also found that some supposedly secure sites were failing to even lock their doors. One location had a security door that hadn't worked for years. “Although security officials were aware of the problem, they did not take appropriate actions to prevent unauthorized personnel from gaining unauthorized access to the facility,” the report states. Other sites featured no security cameras to monitor personnel movement and security officers failed to conduct badge checks. While the report makes recommendations to fix the documented problems, officials for the inspected agencies offered no comments on the non-classified draft report of the audit. Friday's scathing IG audit marked the latest in a string of reports detailing shoddy cybersecurity throughout the armed forces and defense contractors. During the same week, the Wall St. Journal reported that Chinese hackers are targeting military systems and those of defense contractors working on Navy projects. Beijing-linked cyber raids have attempted to steal everything from missile plans to ship-maintenance data in a series of hacks over the past 18 months, the Journal reports. As a result, Navy Secretary Richard Spencer has ordered a “comprehensive cybersecurity review” to assess if the Navy's cyber efforts “are optimally focused, organized, and resourced to prevent serious breaches,” spokesman Capt. Greg Hicks said. The review will also look at authorities, accountability and if the efforts reflect and incorporate government and industry best practices, he said. “Secretary Spencer's decision to direct a review reflects the serious to which the DoN prioritizes cybersecurity in this era of renewed great power competition,” Hicks said. https://www.navytimes.com/news/your-navy/2018/12/14/audit-finds-cyber-vulnerabilities-in-us-missile-defense-system

  • US Army says Congress doubled funds for 155 artillery

    May 2, 2024 | International, Land

    US Army says Congress doubled funds for 155 artillery

  • US has accepted 36 upgraded F-35s since lifting delivery pause

    September 18, 2024 | International, Aerospace

    US has accepted 36 upgraded F-35s since lifting delivery pause

    The Pentagon is withholding $5 million per jet from its payments to Lockheed Martin until the new F-35s can fly in combat.

All news