August 21, 2023 | International, Aerospace
Manned Marine helicopter refuels unmanned helo for 1st time
The hefty Super Stallion transferred approximately 700 pounds of fuel to the Fire Scout.
September 20, 2018 | International, C4ISR
By: Mark Pomerleau
In its first formal cyber strategy document in three years, the Department of Defense said it would focus its cyber efforts on China and Russia and use the Pentagon's cyber capabilities to collect intelligence as well as to prepare for future conflicts.
According to an unclassified summary and fact sheet released Sept. 18, the documents lay out a vision for addressing cyber threats and addresses the priorities of the department's National Security Strategy and National Defense Strategy, which focused on a new era of strategic great power competition.
“The United States cannot afford inaction,” the summary reads. It notes that China and Russia are conducting persistent campaigns in cyberspace that pose long term risk. The documents also say that China is eroding the U.S. military's ability to overmatch opponents and that Russia is using cyber-enabled information operations to influence the U.S. population and challenge democratic processes.
The DoD's strategy comes on the heels of other major movements in cyberspace from the department. These include the elevation of U.S. Cyber Command to a full unified combatant command — which affords new and exquisite authorities — the full staffing of Cyber Command's cyber teams, an update to DoD's cyber doctrine and new authorities delegating certain responsibilities from the president to DoD to conduct cyber operations abroad.
The summary's lists five objectives for DoD's cyberspace strategy:
- Ensuring the joint force can achieve its missions in a contested cyberspace environment;
- Strengthening the joint force by conducting cyberspace operations that enhance U.S. military advantages;
- Defending U.S. critical infrastructure from malicious cyber activity that alone, or as part of a campaign, could cause a significant cyber incident;
- Securing DoD information and systems against malicious cyber activity, including DoD information on non-DoD-owned networks; and
- Expanding DoD cyber cooperation with interagency, industry, and international partners.
The strategy also describes the need to remain consistently engaged with this persistent adversary and to “defend forward” as a means of disrupting or halting malicious cyber activity at its source, including activity that falls below the level of armed conflict.
While academics have criticized the U.S. response to Russian election interference, the strategy notes that the United States tends to view conflicts through the binary lens of war or peace while competitors such as Russia see themselves constantly engaged in a state of war. U.S. Cyber Command's new leader is taking a different tact.
“We've got to act forward outside of our boundaries, something that we do very, very well at Cyber Command in terms of getting into our adversary's networks. That's this idea of persistent engagement, the idea that the adversary never rests, so why would we ever rest,” Gen. Paul Nakasone said during an August dinner hosted by the Intelligence and National Security Alliance.
Nakasone also has described the notion of defending forward as enabling forces to act outside the boundaries of the U.S. to understand what adversaries are doing in order to better defend against them.
https://www.fifthdomain.com/dod/2018/09/19/department-of-defense-unveils-new-cyber-strategy
August 21, 2023 | International, Aerospace
The hefty Super Stallion transferred approximately 700 pounds of fuel to the Fire Scout.
March 13, 2020 | International, C4ISR, Security
Mark Pomerleau The Army released its draft proposal March 10 for a contract that could worth as much as $1 billion to provide cyber training for the Department of Defense. The Cyber Training, Readiness, Integration, Delivery and Enterprise Technology (TRIDENT) is a contract vehicle to offer a more streamlined approach for procuring the military's cyber training capabilities. The largest part of that contact will be the Persistent Cyber Training Environment (PCTE). PCTE is an online client in which members of U.S. Cyber Command's cyber mission force can log on from anywhere in the world for training and to rehearse missions. Cyber Command leaders have said the component is one of the organization's most critical needs. Currently, no integrated or robust cyber training environment exists. The procurement is being organized by the Army on behalf of the Defense Department. According to slides from a December industry day, a final solicitation is slated for the end of second quarter 2020 with an award expected at the beginning of 2021. “The objective of Cyber TRIDENT is to provide for the managed evolution of the PCTE Platform and to provide support across all facets of the Acquisition Life Cycle for PCTE,” the documents read. “The goal of Cyber TRIDENT is to continue development operations with the integration of software and hardware enhancements from third party vendors as technology insertion occurs while conducting testing, providing periodic system updates, and fielding technology upgrades of PCTE to the Cyber Mission Forces (CMF) through an agile cadence. The vision is to leverage the existing PCTE baseline and investment in cyber training software and related infrastructure through Associate Contractor Agreements (ACAs) or subcontracts with current platform vendors.” The notice also describes how the program manager envisions management, maintenance, and evolution of the PCTE platform. This includes platform architecture and product management, agile development and delivery systems engineering processes, development and automation, hardware and software infrastructure management, user event support, development operations (DevOps) environment management, PCTE infrastructure tool management, help desk support and onsite and remote support. Using what are known as Cyber Innovation Challenges to award smaller companies a piece of the program, the program office is already incrementally building a platform, which is in use and is helping to prove out the concept for PCTE, refine requirements for the final contract, and reduce risk. Officials and members of industry have indicated that the awardee of TRIDENT will inherit the final prototype version of PCTE, dubbed Version C, and advance that forward. Industry officials noted that the draft document doesn't include many surprises and that DoD leaders have been receptive to feedback, through the prototyping process and industry engagements. https://www.fifthdomain.com/dod/2020/03/12/the-army-roughs-out-its-1b-cyber-training-contract/
July 12, 2023 | International, Aerospace, C4ISR
With ~690 employees, of which ~190 engineers, the company operates across a well-invested footprint in France, South Africa, USA / Canada and Denmark. It is expected to generate ~US$200m revenues...