Back to news

August 21, 2020 | International, Land

Northrop Grumman Armament Systems advances M-ACE development

by Andrew White

Northrop Grumman Armament Systems is moving to verify the design and upgrade its Mobile Acquisition Cueing and Effector (M-ACE) system following a test event completed in July.

Conducted at the company's private proving grounds, northwest of Armament Systems' headquarters near Minneapolis, the event was aimed at demonstrating advanced predictive cueing integration between the M-ACE vehicle – which is equipped with radar, electro-optical/infrared (EO/IR), radio frequency (RF) sensors, and a command and control (C2) suite – and several Scorpion air defence (AD) vehicles fitted with 30 mm M230LF Bushmaster cannons.

M-ACE comprises a multi-mission ground and air security which can be tasked with counter-unmanned aircraft system (C-UAS) operations, company officials told Janes .

Northrop Grumman's Business Development Director, Armament Systems C-UAS, Robert Menti, said the event successfully proved a fully “networked, integrated, full kill chain” capable of detecting ground and UAS threats at extended ranges.

“The advanced predictive cueing capability enables shortening the kill chain decision cycle (target identification, classification, and prioritisation) at near machine speed,” Menti explained. “This is accomplished through the fusion of sensors and autonomous/artificial intelligence capabilities of the system.”

The next test event is scheduled to be conducted at Big Sandy Range in Arizona in October which will see the Scorpion AD vehicles firing proximity fused ammunition from the M230LF to destroy UASs that are initially identified, tracked, and targeted by M-ACE.

https://www.janes.com/defence-news/news-detail/northrop-grumman-armament-systems-advances-m-ace-development

On the same subject

  • Thales lance Iven, une marketplace pour fédérer les achats des acteurs défense et civil

    September 25, 2020 | International, Aerospace, Naval, Land, C4ISR

    Thales lance Iven, une marketplace pour fédérer les achats des acteurs défense et civil

    AUDE CHARDENON Thales a lancé début septembre une place de marché baptisée Iven. Destinée à mettre en relation vendeurs et acheteurs de l'environnement Défense et Civil, elle implique un nouveau métier pour le géant français. Les détails de Pascal Geoffroy, directeur enhanced customer operations services. Thales devient un commerçant. Le géant industriel français a lancé début septembre une plateforme B2B qui met en relation les clients et les principaux fournisseurs d'articles dédiés à l'environnement Défense et Civil quel que soit le milieu : aérospatial, terrestre ou naval. Fonctionnant selon un modèle de marketplace, Iven – pour Intermediation vendor entreprise – a nécessité deux ans de travail. Lancée le 1er septembre, Iven est un service en ligne dédié aux Industriels souhaitant optimiser leurs approvisionnements. La plateforme compte à date 150 000 références. On y trouve notamment des consommables industriels (pièces détachées), et actualité oblige, des produits liés à la situation sanitaire. DIGITALISER LA SUPPLY CHAIN DE BOUT EN BOUT Iven n'est pas née par hasard. En 2018, l'entreprise se retrouve face à un constat. "Nous avons gagné un gros contrat de supply chain, et nous nous sommes rendus compte que nous devions être plus fluides et plus rapides. Très rapidement, la marketplace nous a paru être la solution pour mettre en relation acheteurs et vendeurs pour de futurs contrats de même nature", explique en préambule Pascal Geoffroy, Directeur Enhanced Customer Operations Services chez Thales. Vient alors l'idée de transformer la supply chain de bout en bout et de "digitaliser les achats pour être compétitif", avec la mise en ligne des catalogues des marchands et par conséquent l'abandon des canaux offline (devis, contrats, téléphone/mail...), la fin de la logique transactionnelle impliquant une négociation pour chaque commande, et la digitalisation du workflow, permettant un gain de temps pour le traitement administratif. THALES, TIERS DE CONFIANCE Iven fonctionne comme une plateforme e-commerce classique. Les marchands y mettent en visibilité leurs produits et leurs offres (prix, disponibilité, conditions de vente...). L'acheteur consulte et compare les différentes offres répondant à son besoin, puis il passe sa commande. Le règlement est effectué par virement à Iven, l'encaissement se déroulant via un intermédiaire financier indépendant. Iven supervise la transaction. La commande est ensuite expédiée et livrée directement par le marchand sur le site client. L'ensemble du parcours est digitalisé, du sourcing jusqu'à la livraison. La solution s'appuie sur l'expertise de différents sous-traitants, dont Mirakl. L'enjeu pour Thales est de se positionner "en tiers de confiance" pour les grands comptes ainsi que pour des organismes d'Etat. Dans un écosystème où intervient parfois le secret-défense, Iven ne peut être, et ne sera pas, une place de marché comme les autres. "Thales se positionne comme un tiers de confiance notamment en matière de cybersécurité, où la fiabilisation des échanges est essentielle", rappelle Pascal Geoffroy. Pour ce faire, l'équipe va "sélectionner les vendeurs et les acheteurs. Il en va de la crédibilité de cette marketplace", insiste-t-il. DES MARKETPLACES PRIVÉES POUR LES GRANDS FOURNISSEURS Fournisseurs qualifiés par Thales, articles certifiés, crédibilité financière... Le paiement est conditionné à la réception, et des technologies de cybersécurité sont garanties pour assurer l'intégrité et la confidentialité des données. Iven jouera d'ailleurs un rôle d'intermédiation en cas de litige. Outre le cas d'usage classique évoqué plus haut, Iven propose aux fournisseurs de construire leur propre marketplace via un système d'onboarding du catalogue privé et des marchands spécifiques. Le lancement d'Iven n'était pas forcément acquis pour une société comme Thales. "C'est un nouveau métier pour Thales, et un nouveau métier de la supply chain", reconnaît Pascal Geoffroy. Pourtant, le rôle fédérateur du groupe, à la croisée du monde militaire et civil, en fait l'interlocuteur privilégié de nombreux acteurs, y compris des PME-ETI. "Le tissu industriel est très fragmenté, il est composé de beaucoup de petites structures, analyse Pascal Geoffroy. Et je suis très attaché à développer cet écosystème dont font partie les PME, qui n'ont pas toujours la puissance de se développer en ligne, y compris à l'international". Iven va en effet être déployée dans cinq pays européens limitrophes à la France, avec des ambitions ultérieures bien plus vastes. Iven s'enrichira d'outils de monitoring de la performance fournisseur ainsi que de fonctionnalités algorithmiques dédiées à l'optimisation des achats. La plateforme pourra se connecter d'ici quelques mois aux ERP des grands comptes. A moyen terme, Iven vise 100 marchands. "Le secteur de la défense est un monde fermé, en retard en matière de transformation digitale par rapport au civil. Cela va secouer certains acteurs", prévient Pascal Geoffroy. https://www.usine-digitale.fr/article/thales-lance-iven-une-marketplace-pour-federer-les-achats-des-acteurs-defense-et-civil.N1008689

  • A friendly reminder from the Department of National Defence and the Canadian Armed Forces: NORAD is ready to track Santa’s flight

    December 24, 2023 | International, Security

    A friendly reminder from the Department of National Defence and the Canadian Armed Forces: NORAD is ready to track Santa’s flight

    The Department of National Defence and the Canadian Armed Forces remind you that North American Aerospace Defense Command is ready to track Santa on Dec. 24, for the program’s 68th year.

  • DARPA Seeks Secure Microchip Supply Chain

    June 1, 2020 | International, C4ISR

    DARPA Seeks Secure Microchip Supply Chain

    "Once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible," explains a DARPA spokesperson. By THERESA HITCHENSon May 29, 2020 at 2:46 PM WASHINGTON: DARPA has launched a four-year project to find ways to design security features into microchips as they are being made to help ensure the future supply chain. While the name of the project is daunting — Automatic Implementation of Secure Silicon (AISS) — and the technical requirements are a serious challenge, the concept is pretty simple. “AISS aims to automate the process of incorporating security into chip designs, making it easier and potentially more cost effective for any organization with even a small design team (start-ups, mid-size companies, etc.) to build security measures into their designs,” a DARPA spokesperson told Breaking D today. “Overall, with AISS DARPA aims to bring greater automation to the chip design process to profoundly decrease the burden of including security measures,” the spokesperson said. The two winning teams, according to a May 27 DARPA press release, are: The two AISS research teams are: Synopsys, Arm, Boeing, Florida Institute for Cybersecurity Research at the University of Florida, Texas A&M University, UltraSoC, and the University of California, San Diego Northrop Grumman, IBM, University of Arkansas, and University of Florida “Research and development on the $75 million program was commenced two weeks ago and incremental capabilities are expected to roll out to the chip design community over the next four years,” the spokesperson said in an email. “Our hope is that many of the capabilities will start appearing as features in commercial design automation software before the program completion.” Digital integrated circuits are the engines that drive modern computers, and everyday digital devices such as smart phones. They are critical to the evolution of the Internet of Things (IoT). As such, they increasingly have become a key target of hacking by US adversaries and cyber criminals alike, DARPA explains. “Threats to IC chips are well known, and despite various measures designed to mitigate them, hardware developers have largely been slow to implement security solutions due to limited expertise, high cost and complexity,” the DARPA release says. “Further, when unsecure circuits are used in critical systems, the lack of embedded countermeasures exposes them to exploitation.” Indeed, the Department of Commerce on May 15 took another swipe at Chinese telecoms behemoth Huawei and tightened its earlier efforts to block it from exporting its semiconductors and products to the US and allies. The Trump administration alleges that Huawei's hardware and software, in particular that related to 5G wireless technology, are full of deliberate security holes in order to enable Chinese government spying. The ruling by Commerce's Bureau of Industry and Security, which will take effect in September, seeks to prevent companies around the world from using American-made software and machinery develop chips for Huawei or its subsidiary firms. The problem for device-makers, particularly in the IoT world where the market is largely for commercial products (think smart refrigerators), is that fixing potential security holes often isn't seen as worth the time, effort and most importantly, money. “The inclusion of security also often requires certain trade-offs with the typical design objectives, such as size, performance, and power dissipation,” the DARPA spokesperson said. “For example, something like a sprinkler isn't likely to require the highest level of security protections. Investing in security mechanisms that take up a lot of space on the underlying chip, or significantly impact chip performance likely doesn't make sense based on the sprinkler's expected use and application.” And yet, that future IoT sprinkler also will be other IoT devices and computer networks in operation by an individual, a company or a facility, such as a weapons depot. Even more unfortunately, the spokesperson explained, “modern chip design methods are unforgiving – once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible.” Thus, the AISS program is aimed at spurring research into two areas that can address four types of microchip vulnerability, the release says: “side channel attacks, hardware Trojans, reverse engineering, and supply chain attacks, such as counterfeiting, recycling, re-marking, cloning, and over-production.” The first area of research will be focusing on “development of a ‘security engine' that combines the latest academic research and commercial technology into an upgradable platform that can be used to defend chips against attacks, and provide an infrastructure to manage these hardened chips as they progress through their lifecycle,” DARPA said. The second area, led by software specialists Synopsys, “involves integrating the security engine technology developed in the first research area into system-on-chip (SOC) platforms in a highly automated way,” the DARPA release said. The Synopsys team also will be working on how to integrate new security designs and manufacturing tools with currently available off-the-shelf products. Nicholas Paraskevopoulous, sector VP for emerging capabilities development at Northrop Grumman, said in a May 27 press release that the firm's “design tools will enable the development of secure and trusted integrated circuits with reduced costs.” Northrop Grumman is involved in the first AISS research area. Synopsis could not be reached for comment by press time. https://breakingdefense.com/2020/05/darpa-seeks-secure-microchip-supply-chain/

All news