Back to news

May 24, 2019 | International, Aerospace

French Air Force introduces new UAV pilot training scheme

Frédéric Lert, Bordeaux - Jane's Defence Weekly

The French Air Force is ramping up the recruitment and training of unmanned aerial vehicle (UAV) crews to cope with the service's expanding air vehicle inventory.

While the 1/33 Belfort UAV squadron currently flies five GA-ASI MQ-9 Reaper medium-altitude long-endurance (MALE) UAVs using 20 qualified crews (with each crew consisting of a pilot, sensor operator, tactical co-ordinator and image analyst), the plan is to have 24 MALE UAVs operational by 2030, generating a requirement for 80 to 100 crews.

The greatest urgency is to train the pilots to cope with this expansion, so the air force is introducing a new course into its flying schools alongside those already existing for fighters, transport aircraft and helicopters.

The first phase of training will fall under the responsibility of the Centre d'excellence drone (CED) in Salon de Provence, southern France. The CED, which until now was more oriented towards research, thus sees its mission considerably evolve. During this phase the students will fly Cirrus light aircraft and receive some specific training, especially in relation to instrument flight rules (IFR).

The second phase will then take the student pilots to the air force flying school in Cognac, where they will improve their piloting skills on the Grob 120 basic trainer. They will then move on to the UAV Operational Conversion Squadron (Escadron de Transformation Opérationnelle Drone - ETOD) and the 1/33 Belfort to acquire the particular tactical know-how required to operate the Reapers.

https://www.janes.com/article/88729/french-air-force-introduces-new-uav-pilot-training-scheme

On the same subject

  • Making DoD Security Operations Centers More Effective: Security Automation

    July 13, 2020 | International, C4ISR, Security

    Making DoD Security Operations Centers More Effective: Security Automation

    Security orchestration, automation, and response (SOAR) software frees DoD analysts to apply cognitive skills to actually fixing problems. By SPLUNKon July 10, 2020 at 6:39 PM The Defense Department's most recent National Defense Strategy (NDS) describes a complex military environment characterized by increased global disorder, a decline in the long-standing rules-based international order, myriad threats from rogue states like Iran and North Korea, great power peers like China and Russia, malicious hackers, and terrorists in places like Yemen. One of the military domains where this dynamic is most evident is cyberspace, where bad actors arguably have comparable or better cyber capabilities than us. “This increasingly complex security environment is defined by rapid technological change, challenges from adversaries in every operating domain, and the impact on current readiness from the longest continuous stretch of armed conflict in our nation's history,” the NDS states. “In this environment, there can be no complacency—we must make difficult choices and prioritize what is most important...” More cybersecurity threats mean more cyberattacks on DoD networks. Essye Miller, former principal deputy for the DoD CIO, said recently that attacks on department networks are surging and that the attack surface is expanding as adversaries target DoD employees working from home during the coronavirus pandemic. This surge in cyberattacks means that analysts working in DoD information security operations centers (SOCs) are being bombarded with security alerts. With so many events, it's hard for them to differentiate true alerts from false ones, and to determine which events are priorities to address immediately. Through no fault of their own, they end up chasing their tail when their time could be better spent on mission-critical activities that directly support warfighters. The solution for this domain is automation. While popular in commercial software segments for years—including SalesForce automation, marketing automation, human resources automation, and IT automation—DoD security teams are just beginning to realize the benefits of what's known as security orchestration, automation, and response. The Value of Security Automation “Automation is nothing new to the military. The Defense Department is making great inroads into DevSecOps, for example,” explained Drew Church, senior security advisor at Splunk, referring to an agile software development process where software is quickly developed, tested, and improved over weeks and months rather than years. “A key, fundamental concept of DevSecOps is automation. The point of automation in DevSecOps is to bring together different technologies, tools, people, and processes to develop code and get it out to the war fighter more rapidly. “Automation provides that same capability inside IT operations procedures, security operations procedures, and other business processes,” said church. “It does this in a reliable and repeatable fashion every time, and at speed and scale.” Splunk's SOAR solution is called Phantom. It helps security teams work to identify, analyze, and mitigate threats facing their organizations. It can be used to improve efficiency, shorten incident response times and reduce the growing backlog of security incidents, even when there's a shortfall of DoD security personnel to analyze the volume of daily security alerts. Phantom does so by integrating teams, processes, and tools, and by automating tasks, orchestrating workflows, and supporting a range of SOC functions to include event and case management, collaboration, and reporting. In essence, it frees SOC analysts of the usual Tier I-type activities of gathering data from the security information and event management (SIEM) platform, prioritizing these alerts, performing triage to determine if an alert is real or a false alarm, configuring and managing security monitoring tools, and generating trouble tickets. Instead, Splunk Phantom lets them spend more time on the value-added work of Tier II SOC analysts. This includes actually investigating the trouble tickets, responding to incidents, and leveraging threat intelligence to better understand the threat and be proactive rather than reactive. “Focusing on the bureaucracy of security rather than the actual doing of security limits the effectiveness of security analysts,” said Church. “Better to free them of the tasks that can be easily automated like reviewing IP addresses, domain names, and URLs so that they can be force multipliers in conducting the thoughtful work needed to protect DoD networks. “That automation is done for them in Phantom. It let's analysts focus on investigating and taking remediation or mitigation steps as appropriate. Where humans excel is in actually thinking through a problem. Copying and pasting from websites, emails, and reports is not the most effective use of a highly paid, resource-limited talent pool.” Integration With Existing SOC Tools SOC analysts make their decisions by gathering information. They sometimes review classified military intelligence, but usually they look at a lot of open-source information and data from commercial off-the-shelf products from myriad providers of cybersecurity threat intelligence products. Some of the common ones that are relevant to the Defense Department include: McAfee's ePolicy Orchestrator, which the DoD refers to as Host Based Security Systems (HBSS); and Tenable's Security Center, which is known inside the DoD as Assured Compliance Assessment Solution (ACAS). Splunk Phantom has more than 300 out-of-the-box integrations with products like HBSS and ACAS. “Being integrated with each of those products permits the analyst to get the information they need without having to go to another browser window, or another tab, or a different computer,” said Church. “Phantom automatically brings all that data to the analyst. That takes somebody who spends most of their time copying information from page A into system B and lets them make more rapid and accurate determinations about the threat.” Through the use of APIs (application programming interface), that same integration is also found with government off-the-shelf (GOTs) solutions that haven't before been integrated with Splunk Phantom because there was never a request to do so. The same goes for a custom app created by a DevSecOps shop like the Air Force's Kessel Run project in Boston, for example. Automating these vital but drudgerous processes also pays dividends during both staffing shortfalls and times of surge, and brings consistency to SOC activities. Military service members are constantly rotating and changing duty stations; senior leadership turns over regularly. Contractors have to be relied upon to provide continuity from tour to tour. That means that SOC processes that were well oiled on a Monday may no longer be operating smoothly on Friday because of a change of command. Or maybe there is a compelling event that grabs everyone's attention. Or possibly there are legal or policy requirements that need to be addressed, and though they don't add mission value they still must be completed. Automation by Splunk Phantom smooths out the bumps associated with those all-to-common scenarios by keeping the flow of vital data moving to where it can be acted upon best. “The computer's running the marathon for you so that you are free to sprint and swarm on the problems that need the most resources at any particular time,” said Church. The Takeaway For security analysts, incident handlers/responders, IT operations managers, security operations managers, and forward-leaning business process experts, Splunk Phantom is all about removing barriers so people can get back to accomplishing the mission, maximizing productivity of skilled personnel and organizations. “For anybody that has a business process, a mission process, an IT operations process, or a security process and wants to free those skilled workers to get back to what you brought them onboard to do, we can help you with that,” said Church. “We do that through orchestration, we do that through automation. We bring in collaboration, and we're able to do that at scale because of the value that a company like Splunk brings to the table. By being able to have a rich ecosystem of partners and support across the board, we're able to do that even with differences from organization to organization.” Splunk Phantom addresses technology-based processes, and orchestrates and automates those processes to get people back to doing what they do best. https://breakingdefense.com/2020/07/making-dod-security-operations-centers-more-effective-security-automation/

  • How DoD is getting serious about artificial intelligence

    December 20, 2018 | International, C4ISR

    How DoD is getting serious about artificial intelligence

    By: Mark Pomerleau Pentagon leaders have tapped Air Force Lt. Gen. Jack Shanahan to serve as the head of a new center that will focus on the use of artificial intelligence in the Department of Defense, multiple officials confirmed to C4ISRNET. Shanahan's move to JAIC was first reported by Defense One. The appointment is part of a series of moves by the Department of Defense to get serious about the broader adoption of artificial intelligence as competitors make significant investments in the technology. Despite several efforts to use advanced algorithms and AI throughout the department, the Pentagon is creating the Joint Artificial Intelligence Center (JAIC) to synchronize these efforts and accelerate the delivery of AI capabilities. “Other nations, particularly China and Russia, are making significant investments in AI for military purposes,” Dana Deasy, the Defense Department's chief information officer, wrote in testimony to Congress Dec. 11. “These investments threaten to erode our technological and operational advantages and destabilize the free and open international order. The Department of Defense, together with our allies and partners, must adopt AI to maintain its strategic position, prevail on future battlefields, and safeguard this order.” Deasy, to date, has led JAIC and spearheaded the Pentagon's AI efforts. But Shanahan is expected to assume that mantle. Shanahan has been leading Project Maven, which sought to use AI and machine learning to more quickly process full motion video in the fight against ISIS. “Lt. Gen. Shanahan's appointment to run the Joint AI Center is a clear sign that DoD is taking artificial intelligence seriously,” Paul Scharre, senior fellow and director of the Technology and National Security Program at the Center for a New American Security, told C4ISRNET. “Shanahan has a proven track record of delivering success as head of DoD's Project Maven. The institutionalization and expansion of these early efforts into the new Joint AI Center, under Shanahan's lead, will help ensure that DoD is well-positioned to capitalize on the advantages of the AI revolution.” Deasy wrote in testimony that the department's AI approach has been directly influencing by Project Maven, which “has been successful in identifying and beginning to address key challenges with integrating AI into operations and has put in place an initial set of data, tools, and infrastructure for AI delivery, as well as initial templates for acquisition, testing and evaluation, operational assessment, and more.” The center will work to develop capabilities in the near-term while also complementing the efforts of the undersecretary for research and engineering in longer-term efforts, Deasy said. Deasy added that these efforts fall into two categories: national mission initiatives (NMI) and component mission initiatives (CMI). National initiatives are pressing operational or business reform challenges identified either from the national defense strategy's key operational problems or those identified by a specific military leader. These initiatives are completed by cross functional teams, made up of JAIC personnel and subject matter experts from across DoD on a rotational basis, Deasy said. CMIs are component level challenges, as opposed to larger national and strategic issues, that can be solved through AI. While the components will be responsible for identifying and implementing organizational structures to complete their projects, Deasy wrote that the AI center will help them identify, shape, and accelerate their AI deployments through the use of common tools, libraries, the cloud, best practices and partnerships with industry and academia. Currently, JAIC has about 35 staff members working on designing the initiatives, Rory Kinney, principal director for deputy chief information officer, information enterprise at DoD, said at an AFCEA-hosted event Dec. 4. Kinney added that the behind-the-scenes infrastructure for AI requires a software factory and equipment that allow these algorithms to learn. “There's got to be machine learning environment as well as a development environment together,” he said. “The intent is to take that secure DevOps solution set, embed it in JAIC, make it standardized within JAIC and generate that factory and that development.” Personnel in the CMIs and NMIs will be able to use the factories with the intent to standardize on it making it more interoperable and scalable, he added. As DoD moves to a production environment, this standardization will allow personnel to take that AI where they want. https://www.c4isrnet.com/c2-comms/2018/12/19/how-dod-is-getting-serious-about-artificial-intelligence

  • Pentagon: We’re Buying Boeing F-15s to Keep 2 Fighter Makers in Business

    March 26, 2019 | International, Aerospace

    Pentagon: We’re Buying Boeing F-15s to Keep 2 Fighter Makers in Business

    BY MARCUS WEISGERBER The acting defense secretary's ties to the company had nothing to do with the decision, a senior defense official said Friday. The decision to buy new Boeing F-15s reflects the Pentagon's desire to keep two American companies making fighter jets into the next decade — and not the acting defense secretary's ties to the company, a senior defense official said Friday. The 2020 budget request contains $1.1 billion to buy eight F-15X jets, a new variant of an aircraft the Air Force last bought nearly a decade ago. The twin-tailed plane was chosen over Lockheed's cheaper single-engine F-16 in part to keep a second U.S. manufacturer in the tactical-jet business as the Pentagon begins exploring new technologies for a new generation of warplanes, the official said. “One of the considerations was the diversity of the industrial base,” the official said. “If we look at something as important as the tactical aircraft industrial base and we look forward into sixth-generation [fighter] production and competition and that kind of stuff,...gaining diversity in that industrial base is going to be critical.” The senior defense official emphasized that Acting Defense Secretary Patrick Shanahan, who formerly worked as a Boeing executive, was not involved in the decision to buy the F-15X. Full article: https://www.defenseone.com/business/2019/03/pentagon-were-buying-f-15s-keep-2-fighter-makers-business/155773

All news