Back to news

August 10, 2023 | International, Land

Three strategies for managing the US Army’s consolidated network

After the Army establishes the appropriate user permissions, it will need a way to monitor and enforce them with minimal manual effort.

https://www.c4isrnet.com/opinion/2023/08/10/three-strategies-for-managing-the-us-armys-consolidated-network/

On the same subject

  • New Pentagon research chief is working on lasers, AI, hypersonic munitions and more

    April 26, 2018 | International, Aerospace, Naval, Land, C4ISR, Security

    New Pentagon research chief is working on lasers, AI, hypersonic munitions and more

    By: Todd South The new chief for research in the Pentagon is building an artificial intelligence center, pushing for self-driving vehicles in combat zones and more powerful lasers, and says solving the hypersonic gap means updating testing facilities. Defense Undersecretary for Research and Engineering Michael Griffin testified before the House Armed Services Committee last week, answering questions on a range of gear and procurement questions. But those most relevant to service members included weapons systems on the horizon that troops could see in combat with near peer adversaries. More rapid development will include the use of unmanned ground vehicles in formations. The Army recently announced the 10th Mountain Division and the 101st Airborne Division will have a robotic combat vehicle called the Squad Multipurpose Equipment Transport in the ranks this year for testing, which will develop the likely full-fielding gear mule-type robot. Simple tasks, such as delivering food, mail, water and fuel, could be automated sooner than some think, Griffin said. “I think, frankly, we're going to have self-driving vehicles in theater for the Army before we'll have self-driving cars on the streets,” Griffin said. “If that can be done by an automated unmanned vehicle with a relatively simple AI driving algorithm where I don't have to worry about pedestrians and road signs and all of that, why wouldn't I do that?” Griffin pointed to Chinese systems that have been fielded or can be soon fielded that can launch a strike and reach out “thousands of kilometers” from the Chinese shore and “hold our carrier battle groups or forward deployed forces on land” at risk. “We, today, do not have systems which can hold them at risk in a corresponding manner, and we don't have defenses against those systems,” Griffin told the House Armed Services Committee members on April 18. Another Chinese technology threat includes the nation's development of swarm drone technologies to counter U.S. airpower and other strengths. That means getting powerful laser systems up to snuff. But it won't happen tomorrow. “We need to have 100-kilowatt-class weapons on Army theater vehicles. We need to have 300-kilowatt-class weapons on Air Force tankers,” Griffin said. “We need to have megawatt-class directed energy weapons in space for space defense. These are things we can do over the next decade if we can maintain our focus.” Scientists he's been talking with have told him that level of laser power is five to six years away and a “megawatt laser” is within a decade with persistent investment. ‘An unacceptable situation' Sen. Martin Heinrich, D-N.M., pointed out that the testing facilities, such as White Sands Missile Range in his state, have scarcely seen any upgrades or improvements in the past two decades, despite leaps in technology for missiles, lasers and other items. Griffin agreed, saying at a low estimate at least 20 such testing facilities across the nation are in the same situation. He said the Defense Advanced Research Projects Agency does most of the leading-edge work on hypersonic missile systems and they have exactly one testing facility, a NASA wind tunnel near Langley, Virginia. “This is an unacceptable situation,” Griffin said. He promised to return with budget requests to renovate those facilities to improve testing. Sen. Gary Peters, D-Mich., asked about a new area of focus that has broad-reaching effects: artificial intelligence. Griffin oversees the creation of a Joint Artificial Intelligence Center that would create AI solutions for all the service branches. He deferred on the details but told members that he expected to return with a plan within two months. “We owe the Congress a report, I think, about two months from now on what our A.I. strategy will be. And the JAIC, the Joint Artificial Intelligence Center, will be a part of that overall strategy,” Griffin said. The plan must consider the 592 projects across the Defense Department that have AI as part of their development. https://www.defensenews.com/news/your-military/2018/04/24/new-pentagon-research-chief-is-working-on-lasers-ai-hypersonic-munitions-and-more/

  • After huge hack, Biden security picks want more cyber coordination with industry

    January 21, 2021 | International, C4ISR, Security

    After huge hack, Biden security picks want more cyber coordination with industry

    Andrew Eversden WASHINGTON — Two top national security nominees advocated Tuesday for stronger federal cybersecurity and increased collaboration with contractors in the aftermath of a supply chain breach that infiltrated numerous federal agencies. If confirmed, retired Army Gen. Lloyd Austin and Avril Haines, President-elect Joe Biden's nominees for defense secretary and director of national intelligence, respectively, would start their jobs in the middle of the national security community's assessment of damage from a cybersecurity breach pinned on Russian hackers. They gained access through software from SolarWinds, a major government contractor. “We must elevate cybersecurity as an imperative across the government in order to defend the American people and U.S. critical infrastructure,” Austin told the Senate Armed Services Committee in his answers to the lawmaker's advance policy questions. “Additionally, the government must continue to strengthen its partnership with the private sector to foster greater information sharing and collaboration.” So far, federal investigators have discovered breaches at “fewer than 10” federal agencies, though the Pentagon and intelligence community haven't confirmed whether their offices were among the victims. Haines, who served as deputy CIA director and deputy national security adviser to President Barack Obama, found it concerning that the breach first came to light through cybersecurity company FireEye, instead of through U.S. government cybersecurity operators. “[I] absolutely share ... concern that we're actually able to detect these because that's obviously absolutely critical to us protecting against them,” Haines said before the Senate Select Committee on Intelligence. “I think ... it was pretty alarming that we found out about it through a private company as opposed to our being able to detect it ourselves to begin with.” In response to the breach, Austin committed to reviewing the DoD's cyber posture and emphasized that Russia must be punished for infiltrating federal networks. In the advance questions, Austin stopped short of calling the breach an act of war, arguing that designation “requires a case-by-case and fact-specific determination.” “For example, malicious cyber activities could result in injury, death or significant property destruction,” Austin wrote. “These activities would need to be considered in their totality.” An early January announcement from several federal investigators, including the NSA and Office of the Director of National Intelligence, stated that the breach was believed to be an espionage campaign and “likely Russian in origin.” “If that's the case, I think Russia should be held accountable,” Austin said at the hearing. “That's my personal belief.” Sen. Jack Reed, D-R.I., who sits on both SASC and SSCI, called the breach “the greatest cyber intrusion in the history, I think, perhaps, of the world” and said that the stovepiped nature of the U.S. national security apparatus needed to be addressed. Reed said one challenge for Haines will be developing a “more coherent, cohesive, integrated approach” to dealing with cybersecurity threats, particularly from advanced nation-state actors. Under questioning from senators, Haines said the SolarWinds supply chain hack was a “grave threat,” and the government needs new to improve its defenses against such attacks, though she noted that she hasn't received a classified briefing on the intrusion. In 2019, a report from ODNI warned of growing software supply chain hacks that provide an “efficient way to bypass traditional defenses and compromise a large number of computers.” “To prevent a recurrence of this kind of attack, we need to close the gap between where our capabilities are now and where they need to be in order to deter, detect, disrupt and respond to such intrusions far more effectively in the future,” Haines wrote in her questionnaire. “If confirmed as DNI, I will review the expert conclusions from the SolarWinds incident and the current intelligence about supply chain vulnerabilities and what steps may be taken to address any vulnerabilities.” Haines told senators that she would assess how the intelligence community can improve its cybersecurity partnerships with industry and the whole federal government. “I believe that the IC plays an integral role in detecting and warning against nation-state targeting of U.S. networks and infrastructure,” she wrote. “If confirmed, I will examine how better collaboration between the IC and the rest of the U.S. government, coupled with closer partnerships with the private sector and our international allies, can enhance our ability to deter, detect, and mitigate cyberattacks.” Haines will review whether the intelligence community is allocating resources properly to face advanced cyber threats and will examine the adequacy of the IC's existing authorities to protect the digital infrastructure of the United States, she said. Austin pointed to a cyber-threat sharing partnership the department has with the defense industrial base and stated that the department should “continue to look for ways to better integrate with interagency partners and the private sector.” In light of the SolarWinds breach, the senators on SSCI wrote that they are worried about a “lack of mandatory threat information sharing between the private sector and government,” adding that any information sharing from the private sector after the breach is voluntary. Haines would review the relationship. “Information sharing between the IC and the private sector is increasingly important to ensure that our data systems and networks are secure,” she wrote. “If confirmed as DNI, I look forward to reviewing the Intelligence Community's data sharing and information exchange relationship with the private sector, to engaging with IC experts and private sector leaders on what information is currently being shared, and to examining the efficacy of the current framework for sharing threat information.” The incoming Biden administration has signaled that it will prioritize cybersecurity in the aftermath of the SolarWinds breach. The Biden team named Anne Neuberger, the NSA's cybersecurity director who worked to improve information sharing with the private sector, to National Security Council as deputy national security adviser for cyber and emerging technology. Haines wrote that she will “ensure” that the intelligence community has a “robust data sharing and information exchange relationship” with private companies and said that she will be “studying current information sharing to determine how it can be improved and what types of information can be shared to enhance cybersecurity protections.” “The private sector has unique insight and expertise on malicious activity occurring within its networks,” Haines said. “Real-time integration of private sector and government data could lead to more effective prevention and mitigation outcomes.” Cyber norms and deterrence For the last few years, the U.S. government wrestled with the concept of deterrence in the cyber domain, a complex challenge that including resilient defenses, risk management and strong international partnerships. As the SolarWinds breach demonstrated, deterring adversaries from hacking, which is seen as below the threshold of an armed response, is difficult. In response to a question from Sen. John Cornyn, R-Texas, about how to approach cyber deterrence, Haines pointed to many of the same tenets of current U.S. cyber deterrence, including imposition of costs for malicious actors' behavior, bringing foreign allies together to impose those costs, building resilient systems that are hard to hack, developing norms and creating strong relationship with the private sector. Haines wrote that setting norms should include outlining sanctionable behavior with the agreement from allies. A cornerstone to sanctioning is attributing cyberattacks to actors, a challenging undertaking in the cyber realm. Sen. Mark Warner, D-Va., said he wanted Haines to be more forthcoming with attribution of cyberattacks, stating that he found it “extraordinarily concerning” that the “[Trump] White House underplay[ed] attribution on Russia.” Attribution, Haines said, would be a major piece of the ODNI's role in deterrence. “Something we [ODNI] can do is promote the ability to detect when adversaries are engaging in such activity so as then to provide information about attribution, for example. And then hold adversaries to account through that.” https://www.c4isrnet.com/cyber/2021/01/20/after-huge-hack-biden-security-picks-want-more-cyber-coordination-with-industry

  • Navy Rushes To Get F-35s on USS JFK; Other Ford Carriers Wait Their Turn

    April 23, 2020 | International, Naval

    Navy Rushes To Get F-35s on USS JFK; Other Ford Carriers Wait Their Turn

    The service's aircraft carrier boss says the COVID economic slowdown hasn't effected building new carriers -- yet. By PAUL MCLEARY WASHINGTON: The Navy's rushed effort to retrofit its newest aircraft carrier to operate the F-35 will create a testbed for the service's other Ford carriers — which have not been built to fly the fifth generation aircraft — as the Navy juggles work on the remaining three big decks. The $11 billion USS John F. Kennedy (CVN 79) was designed and christened without the capability to fly the 5th generation fighter because of cost caps and the aircraft's infamously delayed development. Those schedule slippages forced the Navy to design and build the ships while the messy F-35 was still undergoing development. In the 2020 NDAA Congress indicated it had had it's fill of delays to the carrier and ordered the Navy to get to work refitting the Kennedy before it sets sail in 2024, forcing the Navy to improvise and refit the just-christened ship. Speaking with reporters today, Rear Adm. James Downey, head of the Navy's carrier programs, said those changes are forcing him to hold off on some early work on the forthcoming USS Enterprise (CVN 80), the third Ford-class carrier, and the USS Doris Miller (CVN 81) to ensure the Kennedy retrofits are done correctly before incorporating them on the other ships which have just started their build cycles. Downey said he's working to accelerate the integration of the F-35 on the JFK and prove out the upgrades in operational testing before doing similar work on the next Ford carrier to be built, the USS Enterprise. That way, all of the bugs will be ironed out on the JFK. The original plan to incorporate the F-35 on the four Ford-class ships was to phase the capability in after the ships were declared operational, and then to refit them as they came into port for overhaul. But Congress, frustrated that the nation's newest class of carrier couldn't operate the nation's newest fighter plane, told the Navy to speed things up. The namesake of the class, the $13.2 billion USS Gerald R. Ford, is currently acting as a training asset off the East Coast, where air wings get carrier certified as the ship continues to iron out remaining issues with its weapons elevators. Simply put, the Ford won't fly the F-35 for years to come. Those electromagnetic elevators have been one of the biggest issues plaguing the ship over the past two years, as the Navy installed them without first testing the new technology ashore, resulting in a ship that had no functioning weapons elevators. And what use is a warship without weapons? It's been slow progress to get them up and running, but the Navy recently certified that just the fifth of eleven elevators is now up and running. The working lifts have logged more than 8,000 cycles over the past several months of operational testing as the Ford acts as the Navy's East Coast training platform to certify pilots. The Ford has been operating one month at sea and one pierside for the last several months, and has launched 2,300 aircraft in that time. Downey said the Ford is keeping to its schedule, and that impending supply-chain issues the services are dealing with as the COVID-19 crisis shutters the global economy shouldn't have any near-term impact on the program overall. “We don't have any real significant concerns right now; we know where the suppliers are,” he said. “Prior to this, we had increased some of our procurements for spares and various materials so we had a pretty steady demand signal.” While the Ford class ships wait for the F-35 upgrades, the 36-year old USS Carl Vinson is undergoing a $34 million refit in Bremerton, Wash. so it can begin flying F-35s by 2021, making the veteran ship the first carrier in the Navy to fly the 5th generation aircraft even before the JFK. While both Nimitz and Ford-class aircraft carriers can operate with F-35Cs aboard, significant modifications are required for both classes to fly and sustain the aircraft for extended periods. Also, the ships will need the capability to push and fuse all the data the F-35s can generate, along with building additional classified spaces, new jet blast deflectors and other refits. Room also needs to be made for Osprey tiltrotor aircraft, which will replace the Navy's C-2A Greyhound fleet that are unable to haul the F-35's heavy engines out to the ship. The USS Enterprise is slated to deploy in 2028 and the USS Doris Miller will be ready to sail in 2032. In January, the Navy awarded Huntington Ingalls Industries' Newport News Shipbuilding a $24 billion contract for the two ships, compared to a predicted cost of $28 billion if the sea service had purchased them separately. https://breakingdefense.com/2020/04/navy-rushes-to-get-f-35s-on-uss-jfk-other-ford-carriers-will-wait

All news