Back to news

August 13, 2020 | International, Aerospace

Rafale jets won’t save India’s air force

The first five of India's new Rafale fighter aircraft touched down in country on July 29. According to the terms of a 2016 contract with the French manufacturer Dassault, 31 more will follow. They will go some way toward filling India's larger requirement of 126 such jets. The Indian Air Force has long needed refurbishing, but it has been perennially delayed both by New Delhi's infamous bureaucratic red tape and by budgetary issues. Now, the arrival of the new fighters—the first in over 20 years—in the middle of an unprecedented border face-off against China, will be a boost for Indian military capability as well as morale. But it won't do much to change the hard reality that, as an air power, India is falling far behind, foreign media report.

The Indian Air Force has historically been one of the best-equipped air forces in the region, but it has seen its advantage, both qualitative and quantitative, against China and Pakistan narrow dramatically over the past two decades. Even worse, it now faces the challenge of mustering enough aircraft to tackle any possible collusion between the Pakistani and Chinese air forces. Related to tensions in Ladakh, China seems to be activating air platforms in its Tibetan airfields. And along the border with Pakistan, the Pakistan Air Force recently conducted an air exercise out of the Skardu base in Gilgit-Baltistan. Taken together, those are tough challenges for an underequipped air force to take on.

The Rafale may help somewhat. After decades of fielding upgraded legacy fighters and struggling to develop contemporary jets, the Rafale finally provides the Indian Air Force with a comprehensive combat craft that requires very little further tinkering. Unlike any previous procurements, the Rafale fighters' capabilities are already up to par, and small enhancements will be relatively easy and cheap via the so-called India-specific enhancements.

These India-specific changes are being carried out under a concurrent design, modification, testing, and certification program carried out by Dassault. The modifications involve a mix of hardware and software changes, including an improved infrared search-and-track capability, the addition of an Israeli helmet-mounted display and sight system, changes to the electronically scanned radar, a new device for jamming low-band radio frequencies, integration of an Israeli-created decoy system, an upgraded radar altimeter, expanded navigation aids, and a more robust cold start system for the engines to make them suitable for winter operations from the Air Force's Himalayan bases. Once all changes are tested and certified in 2021, the entire Indian Rafale fleet will be updated. This allows Dassault to keep producing fighters at an economical rate and the Air Force to induct jets and train personnel in an organized manner, while still ensuring that the final aircraft does not compromise on the original capability requirements.

https://www.thenews.com.pk/print/699521-rafale-jets-won-t-save-india-s-air-force

On the same subject

  • Making DoD Security Operations Centers More Effective: Security Automation

    July 13, 2020 | International, C4ISR, Security

    Making DoD Security Operations Centers More Effective: Security Automation

    Security orchestration, automation, and response (SOAR) software frees DoD analysts to apply cognitive skills to actually fixing problems. By SPLUNKon July 10, 2020 at 6:39 PM The Defense Department's most recent National Defense Strategy (NDS) describes a complex military environment characterized by increased global disorder, a decline in the long-standing rules-based international order, myriad threats from rogue states like Iran and North Korea, great power peers like China and Russia, malicious hackers, and terrorists in places like Yemen. One of the military domains where this dynamic is most evident is cyberspace, where bad actors arguably have comparable or better cyber capabilities than us. “This increasingly complex security environment is defined by rapid technological change, challenges from adversaries in every operating domain, and the impact on current readiness from the longest continuous stretch of armed conflict in our nation's history,” the NDS states. “In this environment, there can be no complacency—we must make difficult choices and prioritize what is most important...” More cybersecurity threats mean more cyberattacks on DoD networks. Essye Miller, former principal deputy for the DoD CIO, said recently that attacks on department networks are surging and that the attack surface is expanding as adversaries target DoD employees working from home during the coronavirus pandemic. This surge in cyberattacks means that analysts working in DoD information security operations centers (SOCs) are being bombarded with security alerts. With so many events, it's hard for them to differentiate true alerts from false ones, and to determine which events are priorities to address immediately. Through no fault of their own, they end up chasing their tail when their time could be better spent on mission-critical activities that directly support warfighters. The solution for this domain is automation. While popular in commercial software segments for years—including SalesForce automation, marketing automation, human resources automation, and IT automation—DoD security teams are just beginning to realize the benefits of what's known as security orchestration, automation, and response. The Value of Security Automation “Automation is nothing new to the military. The Defense Department is making great inroads into DevSecOps, for example,” explained Drew Church, senior security advisor at Splunk, referring to an agile software development process where software is quickly developed, tested, and improved over weeks and months rather than years. “A key, fundamental concept of DevSecOps is automation. The point of automation in DevSecOps is to bring together different technologies, tools, people, and processes to develop code and get it out to the war fighter more rapidly. “Automation provides that same capability inside IT operations procedures, security operations procedures, and other business processes,” said church. “It does this in a reliable and repeatable fashion every time, and at speed and scale.” Splunk's SOAR solution is called Phantom. It helps security teams work to identify, analyze, and mitigate threats facing their organizations. It can be used to improve efficiency, shorten incident response times and reduce the growing backlog of security incidents, even when there's a shortfall of DoD security personnel to analyze the volume of daily security alerts. Phantom does so by integrating teams, processes, and tools, and by automating tasks, orchestrating workflows, and supporting a range of SOC functions to include event and case management, collaboration, and reporting. In essence, it frees SOC analysts of the usual Tier I-type activities of gathering data from the security information and event management (SIEM) platform, prioritizing these alerts, performing triage to determine if an alert is real or a false alarm, configuring and managing security monitoring tools, and generating trouble tickets. Instead, Splunk Phantom lets them spend more time on the value-added work of Tier II SOC analysts. This includes actually investigating the trouble tickets, responding to incidents, and leveraging threat intelligence to better understand the threat and be proactive rather than reactive. “Focusing on the bureaucracy of security rather than the actual doing of security limits the effectiveness of security analysts,” said Church. “Better to free them of the tasks that can be easily automated like reviewing IP addresses, domain names, and URLs so that they can be force multipliers in conducting the thoughtful work needed to protect DoD networks. “That automation is done for them in Phantom. It let's analysts focus on investigating and taking remediation or mitigation steps as appropriate. Where humans excel is in actually thinking through a problem. Copying and pasting from websites, emails, and reports is not the most effective use of a highly paid, resource-limited talent pool.” Integration With Existing SOC Tools SOC analysts make their decisions by gathering information. They sometimes review classified military intelligence, but usually they look at a lot of open-source information and data from commercial off-the-shelf products from myriad providers of cybersecurity threat intelligence products. Some of the common ones that are relevant to the Defense Department include: McAfee's ePolicy Orchestrator, which the DoD refers to as Host Based Security Systems (HBSS); and Tenable's Security Center, which is known inside the DoD as Assured Compliance Assessment Solution (ACAS). Splunk Phantom has more than 300 out-of-the-box integrations with products like HBSS and ACAS. “Being integrated with each of those products permits the analyst to get the information they need without having to go to another browser window, or another tab, or a different computer,” said Church. “Phantom automatically brings all that data to the analyst. That takes somebody who spends most of their time copying information from page A into system B and lets them make more rapid and accurate determinations about the threat.” Through the use of APIs (application programming interface), that same integration is also found with government off-the-shelf (GOTs) solutions that haven't before been integrated with Splunk Phantom because there was never a request to do so. The same goes for a custom app created by a DevSecOps shop like the Air Force's Kessel Run project in Boston, for example. Automating these vital but drudgerous processes also pays dividends during both staffing shortfalls and times of surge, and brings consistency to SOC activities. Military service members are constantly rotating and changing duty stations; senior leadership turns over regularly. Contractors have to be relied upon to provide continuity from tour to tour. That means that SOC processes that were well oiled on a Monday may no longer be operating smoothly on Friday because of a change of command. Or maybe there is a compelling event that grabs everyone's attention. Or possibly there are legal or policy requirements that need to be addressed, and though they don't add mission value they still must be completed. Automation by Splunk Phantom smooths out the bumps associated with those all-to-common scenarios by keeping the flow of vital data moving to where it can be acted upon best. “The computer's running the marathon for you so that you are free to sprint and swarm on the problems that need the most resources at any particular time,” said Church. The Takeaway For security analysts, incident handlers/responders, IT operations managers, security operations managers, and forward-leaning business process experts, Splunk Phantom is all about removing barriers so people can get back to accomplishing the mission, maximizing productivity of skilled personnel and organizations. “For anybody that has a business process, a mission process, an IT operations process, or a security process and wants to free those skilled workers to get back to what you brought them onboard to do, we can help you with that,” said Church. “We do that through orchestration, we do that through automation. We bring in collaboration, and we're able to do that at scale because of the value that a company like Splunk brings to the table. By being able to have a rich ecosystem of partners and support across the board, we're able to do that even with differences from organization to organization.” Splunk Phantom addresses technology-based processes, and orchestrates and automates those processes to get people back to doing what they do best. https://breakingdefense.com/2020/07/making-dod-security-operations-centers-more-effective-security-automation/

  • UK restarts frigate competition - but will anyone take part?

    August 20, 2018 | International, Naval

    UK restarts frigate competition - but will anyone take part?

    By: Andrew Chuter LONDON - Britain's Ministry of Defence is restarting its contest to build five general purpose frigates for the Royal Navy after it terminated the original competition due to insufficient interest from industry. The Defence Equipment & Support organisation, the MoD's procurement arm, has issued a “prior information notice” informing potential bidders it is moving forward with the Type 31e program, and plans a short period of market engagement with companies or consortia that have expressed interest starting on Aug 20. “We have relaunched discussions with industry for our new Type 31e fleet, and this week issued a Prior Information Notice to ensure we do not lose any momentum. We remain committed to a cutting-edge Royal Navy fleet of at least 19 frigates and destroyers, and the first batch of five new Type 31e ships will bolster our modern Navy,” said an MoD spokesperson. “The purpose of the market engagement is for the Authority [DE&S] to share key elements of the new procurement, including technical and commercial elements. The Authority intends to use the feedback from the market engagement to inform the further shaping of its requirements and commercial construct,” said the DE&S in its announcement it was relaunching the competition. DE&S said suppliers should “only respond if they are in a position to undertake the full Type 31e programme, meeting its full requirement including a £1.25billion cost and building the Type 31e in a UK shipyard.” The Type 31e is a key part of the government's 2017 national shipbuilding strategy which in part seeks to open up the sector to local competition, rather than contract via a non-competitive single source contract with U.K. giant BAE Systems, the world's third largest defense company according to the Defense News Top 100 list. The fast track schedule for the Type 31e calls for the initial vessel to be in service by 2023, replacing the first of 13 Type 23 class frigates due to be retired by the Royal Navy in the period up to the middle of the 2030's. The final Type 31e -- the e stands for export -- is due to be delivered in 2028. Eight of the Type 23's will be replaced by anti-submarine warfare Type 26's. The remainder of the Type 23's will be replaced by the Type 31e. DE&S and industry are up against a time crunch on getting the first Type 31e into service, one which some executives here see as daunting, if not unachieveable, thanks to the need to restart the competition. But despite the delay in getting to the competitive design phase contract announcements, DE&S says it remains committed to the 2023 service date. “A new streamlined procedure will present an opportunity to save time in the overall program. We will release more information about our plans when we have completed the market engagement - which we plan to start from Aug 20,” said a second MoD spokesperson. Full Article: https://www.defensenews.com/naval/2018/08/17/uk-restarts-frigate-competition-but-will-anyone-take-part/

  • The Key To All-Domain Warfare Is ‘Predictive Analysis:’ Gen. O’Shaughnessy

    May 6, 2020 | International, C4ISR

    The Key To All-Domain Warfare Is ‘Predictive Analysis:’ Gen. O’Shaughnessy

    By THERESA HITCHENS on May 05, 2020 at 3:23 PM WASHINGTON: Northern Command head Gen. Terrence O'Shaughnessy says the key to winning tomorrow's all-domain wars is predicting an adversary's actions — as well as the impacts of US military responses — hours and even days in advance. The capability to perform such “predictive analysis” will be enabled by the US military's Joint All-Domain Command and Control (JADC2) initiative for managing high-speed battle across the air, land, sea, space and cyber domains,” he told the Mitchell Institute yesterday evening in a webinar. “We see JADC2 is absolutely core to the way we're gonna defend the homeland,” O'Shaughnessy enthused. “And the part that I think is going to be so incredibly game-changing is the ability for us to really use predictive analysis and inform our decisions going into the future.” “That's, to me, what JADC2 is going to do: it's going to inform our decision-makers, it's going to help them make decisions that, like playing chess, are thinking about two or three moves downstream,” he added. “It's going to give the decision-makers, at the speed of relevance, the ability to make really complex decisions.” NORTHCOM was a key player in the Air Force's first “On Ramp” demonstration in December of technologies being developed under its Advanced Battle Management System effort, which the service sees as a foundation for JADC2. O'Shaughnessy said he is excited that NORTHCOM will be expanding its participation in the next demonstration, now slated for late August or early September having been pushed back from its original April data due to the COVID-19 coronavirus pandemic. O'Shaughnessy said JADC2 also will be critical for providing much-needed improvements to domain awareness in the Arctic. The US military has to “put together a bigger ecosystem for sensing” rather than relying on “traditional stovepiped systems” in the High North, he explained. That ecosystem needs to fuse information from as many systems as possible — from submarines patrolling beneath the icy waters to ground-based radar to long-endurance unmanned drones to future sensors based on large constellations of Low Earth Orbit satellites — which is exactly the goal of JADC2. “We have to continue to work on our ability to see the approaches to our homeland and understand what what is there and be able to react to it,” said O'Shaughnessy, who also is the commander of NORAD. As Breaking D readers know, the US military is turning an increasingly worried eye toward the Arctic where Russia and China both have begun to covet as a future zone of economic wealth as the Earth's climate opens shipping routes and expands access to undersea oil. O'Shaughnessy said he sees three areas where more investment is required to up the US military's game in the Arctic: communications, training, and infrastructure. Communications at northern latitudes is a particular struggle due to the difficulties of laying fiber optic cable in the harsh terrain, and the paucity of satellite coverage in the region. This, he said, is why NORTHCOM is extremely interested in the potential for so-called proliferated LEO satellite constellations. — both those currently being built by commercial firms and any future military networks. As Breaking D readers are well aware, DoD's Space Development Agency is planning a multi-tiered network of satellites in LEO that includes “data transport” satellites to allow faster communications between satellites and air-, land- and sea-based receivers that Director Derek Tournear sees as integral to JADC2. DARPA also is experimenting with proliferated LEO architectures under its Blackjack program, which plans 20 satellites using various buses and payloads to test their capabilities by the end of third-quarter 2022. DARPA late last month selected Lockheed Martin to undertake Phase 1 satellite integration of satellite buses with payloads and the central Pit Boss C2 system under a $5.8 million contract. SEAKR Engineering announced on April 28 that it had been granted a sole source Phase I, Option 2 contract (under a three-phased program plan) to develop a Pit Boss demonstrator, beating out two other teams led, respectively, by BAE and Scientific Systems. “One of the things we find is after you get above about 65 degrees or so north, some of our traditional means of communications really start breaking down,” he said, “and once you get closer to 70, almost all except for our most exquisite communications capability really starts to break down. And so we see a need to relook our ability to communicate in the Arctic” — with proliferated LEO “one of the best approaches.” “If you look at some of the companies out there doing incredible things, we see that as a solution set to allow us to communicate in the Arctic in the relatively near future, and that will be critical,” he added. https://breakingdefense.com/2020/05/the-key-to-all-domain-warfare-is-predictive-analysis-gen-oshaughnessy

All news