Back to news

November 27, 2023 | International, Aerospace

L3Harris to sell commercial aviation unit to private-equity affiliate

L3Harris chief executive Christopher Kubasik said the sale is part of its plan "to optimize our national security, technology-focused portfolio."

https://www.defensenews.com/air/2023/11/27/l3harris-to-sell-commercial-aviation-unit-to-private-equity-affiliate/

On the same subject

  • Pentagon's JADC2 strategy focuses on 'approach'

    March 18, 2022 | International, C4ISR

    Pentagon's JADC2 strategy focuses on 'approach'

    The new unclassified summary document comes nearly a year after the Secretary of Defense approved the Joint All-Domain Command and Control strategy.

  • Qatari research center chooses Leonardo for cyber range

    February 4, 2021 | International, C4ISR, Security

    Qatari research center chooses Leonardo for cyber range

    Agnes Helou BEIRUT — A Qatari cyber research center has selected Leonardo to provide a cyber range and training system to support security operations, the Italian firm announced Feb. 3. The Qatar Computing Research Institute, or QCRI, was established by the Qatar Foundation for Education, Science and Community Development. The training platform ordered by the QCRI is capable of simulating cyberattacks so users can assess the resilience of digital infrastructure. “The training is completely to be performed in Qatar, and it is expected, through an approach oriented to ‘train the trainers,' to provide courses to a significant number of operators involved in the cybersecurity framework,” Tommaso Profeta, managing director of Leonardo's Cyber Security Division, told Defense News. He noted that training and exercise scenarios can be customized using a drag-and-drop graphical interface. The platform can also analyze and classify the results of simulated attacks based on data collected during real-world offensive campaigns. Scenarios can be used for individual training or classroom experiences, and they provide practice for security operations centers and incident response activities. This training tool “will allow the QCRI to deliver a complete cyber training process, from the design of the learning path to specific training sessions. Users will be able to practice their skills in simulated attack and defense scenarios, employing both information technology (IT) and operational technology (OT). The training will produce qualified teams of operators equipped with up-to-date knowledge and techniques, ready to face ever-evolving cyber threats,” according to a company statement. “The best cyber training/testing environments are in theory real production systems. But in practice for such environments, institutions, enterprises and organizations cannot easily experience critical situations without paying high, sometime unaffordable prices,” Profeta said. “Training and testing are therefore the two essential, human-driven processes that can effectively support the overall cyber ‘protection' loop, but only if they can cope with real threats and highly realistic systems in highly realistic situations.” Cyber ranges provide a controlled environment where cybersecurity experts can practice their technical and soft skills in emulated complex networks and infrastructures to learn how to respond to real-world cyberattacks. In these environments, cyber tools can be stressed to reveal their limits and vulnerabilities before deployment into cyberspace. Leonardo's platform challenges such assets and provides digital twin environments for predeployment testing. Asked whether other Gulf countries have expressed interest in this training system, Profeta said it “has already been presented to other high-level Middle East stakeholders, and a significant level of interest has been registered for the platform.” What scenarios are available? Those using the cyber range will try to defend against simulated but realistic cyberattacks. According to Profeta, these include: Man-in-the-middle attacks. Botnets. Exploitation of client and server vulnerabilities with lateral movements in search of sensitive data. Distributed denial-of-service attacks (HTTP flooding or domain name system reflection) designed to disrupt connections to a targeted server. Ransomware via multiple vectors, such as spear-phishing via email or drive-by downloads, relying on DNS-based covert channels. Data exfiltration of personally identifiable information and intellectual property. Though it's difficult to measure the potential effectiveness of this platform for Qatar, the company official predicted the system will reduce the cost of and improve the user experience in cyber training. Leonardo also supplies the NATO Computer Incident Response Capability, a cyber defense product. https://www.c4isrnet.com/cyber/2021/02/03/qatari-research-center-chooses-leonardo-for-cyber-range

  • 5 technology trends driving an intelligent military

    July 6, 2018 | International, C4ISR

    5 technology trends driving an intelligent military

    By: Antti Kolehmainen The rise of non-traditional actors, cyberattacks and state-sponsored subversion is challenging democratic governance and creating an increasingly volatile operational and security environment for defense agencies. To address these threats, military organizations must be able to operate seamlessly and intelligently across a network of multinational partners. This year's Accenture Technology Vision identified five trends that are essential components of any intelligent defense organization: Citizen AI, extended reality, data veracity, frictionless business and Internet of Thinking. Private AI: training AI as an effective troop member Harnessing AI's potential is no longer just about training it to perform a specific task: AI will increasingly function alongside people as a full-fledged member of a team. In the high-stakes world of defense, it's especially important that AI systems act as trustworthy, responsible and efficient colleagues. AI could have a major impact for military organizations, including defense logistics and cybersecurity. An adversary equipped with advanced AI capabilities will not wait for its enemies to catch up technologically before launching an offensive. AI's ability to process and analyze vast amounts of data has significant implications across the Observe, Orient, Decide, Act (OODA) loop. From augmenting our ability to detect new threats to analyzing countless variables, AI could transform surveillance and situational awareness. Extended Reality: The end of distance Extended reality (XR), which includes virtual reality (VR) and augmented reality (AR), is the first technology to relocate people in both time and place—effectively eliminating distance. For the defense sector, the ability to simulate and share a common view of an operational theatre is immensely powerful. Recently, Accenture created a mixed reality proof of concept using Microsoft HoloLens and gaming engine Unity that provides military personnel with an interactive map showing real-time location and status data for troops and resources on the ground. With a simple command, a user can order reinforcements or supplies, or create and test different scenarios through a mixed reality interface. XR technology can also enhance operational command capabilities in the field. For example, AR goggles could provide dashboards and data visualizations where and when they are needed – such as at an operating base. XR also will have major implications for training, allowing soldiers and pilots to engage in highly realistic combat simulations. Data veracity: the importance of trust As defense organizations become increasingly data-driven, inaccurate and manipulated information is a persistent and serious threat. Agencies can address this vulnerability by building confidence in three key data-focused tenets: provenance, or verifying data from its origin throughout its life cycle; context, or considering the circumstances around its use; and integrity, or securing and maintaining data. The ability to trust and verify the data that flows between multinational partners is critically important. Organizations must be capable of delivering the right data to the right recipient, at the right time – which can only be accomplished by radically reorienting how data is shared across today's armed forces. Today's vertical approach involves passing information up and down the command stack of a nation's military. In contrast, multinational military operations demand that information is also shared horizontally across the forces of different nations and partners. This shift requires a profound change in technology, mindset and culture within agencies. Frictionless defense: built to partner at scale Our recent survey found that 36 percent of public service leaders report working with twice as many strategic partners than two years ago. And when partnerships between industry, academia and military organizations are horizontally integrated and technology-based, they can expand faster and further than ever before. But legacy systems weren't built to support this kind of expansion, and soon, outdated systems will be major hindrances to collaboration. With this in mind, defense organizations must develop new IT architectures to reduce complexity. Agile IT systems will allow innovation to flourish, unimpeded by internal politics and employee resistance. A modern IT architecture will push organizations to clearly define the services they offer and turn each service into a potential enabler of collaboration. The Internet of Thinking: intelligent distributed defense capabilities Today's technology infrastructures are designed around a few basic assumptions: enough bandwidth to support remote applications, an abundance of computing power in a remote cloud and nearly infinite storage. But the demand for immediate response times defies this approach. Recent projections suggest that by 2020, smart sensors and other Internet of Things devices will generate at least 507.5 zettabytes of data. Trying to manage the computational “heavy-lifting” offsite will become limiting. The need for real-time systems puts hardware back in focus: special-purpose and customizable hardware is making devices at the edge of networks more powerful and energy efficient than ever before. Public service organizations are taking note: our survey indicates 79 percent of leaders believe it will be very critical over the next two years to leverage custom hardware and accelerators to meet new computing demands. The next generation of military strategies ride on pushing intelligence into the physical world. Defense organizations have to embrace new operating models to enable high-speed data flows, harness the potential of distributed intelligence and successfully neutralize threats. The defense sector is challenged to respond to new types of threat, political volatility and even new combat arenas, and acquiring new technology capabilities is a strategic imperative. Delivering greater situational awareness and the ability to respond rapidly to unpredictable adversaries requires investments in AI, edge computing and other emerging technologies. Likewise, today's information architectures will need to be redesigned to collaborate quickly, effectively and securely. Antti Kolehmainen is managing director, defense business service global lead at Accenture. https://www.c4isrnet.com/opinion/2018/07/05/5-technology-trends-driving-an-intelligent-military

All news