Back to news

March 8, 2021 | International, Aerospace

U.S. General Says Unmanned Aircraft Need Too Many People

U.S. Special Operations Command is looking at Reaper drones for the new Armed Overwatch role. But although the Reaper may be uncrewed, it takes a lot of people on the ground to keep it flying -- maybe too many to be viable.

https://www.forbes.com/sites/davidhambling/2021/03/05/us-general-says-unmanned-aircraft-need-too-many-people/

On the same subject

  • The Pentagon is handling cyber vulnerabilities inconsistently

    March 18, 2020 | International, C4ISR, Security

    The Pentagon is handling cyber vulnerabilities inconsistently

    Mark Pomerleau The Department of Defense has not consistently mitigated cyber vulnerabilities identified in a 2012 report, according to the department's inspector general. The DoD IG issued a follow-on report to its 2012 report, issued March 13 and made public March 17, that determined cyber red teams didn't report the results of assessments to organizations and components didn't effectively correct or mitigate the identified vulnerabilities. The new report discovered that components didn't consistently mitigate or include unmitigated vulnerabilities identified in the prior audit and during this audit by red teams during combatant command exercises, operational testing assessments and agency-specific assessments in plans of action and milestones. “Ensuring DoD Components mitigate vulnerabilities is essential to achieve a better return on investment,” the report stated. “In addition, we determined that the DoD did not establish a unified approach to support and prioritize DoD Cyber Red Team missions. Instead, the DoD Components implemented Component-specific approaches to staff, train and develop tools for DoD Cyber Red Teams, and prioritize DoD Cyber Red Team missions.” The report found that DoD didn't establish a unified approach because it didn't assign an organization with responsibility to oversee and synchronize red team activity based on priorities, it didn't assess the resources needed for each red team and identify requirements to train them to meet priorities and it didn't develop baseline tools to perform assessments. “Without an enterprisewide solution to staff, train and develop tools for DoD Cyber Red Teams and prioritize their missions, DoD Cyber Red Teams have not met current mission requests and will not meet future requests because of the increased demands for DoD Cyber Red Team services,” the report said. “Until the DoD assigns an organization to assess DoD Cyber Red Team resources, it will be unable to determine the number of DoD Cyber Red Teams and staffing of each team to support mission needs, which will impact the Do D's ability to identify vulnerabilities and take corrective actions that limit malicious actors from compromising DoD operations.” The DoD IG issued seven recommendations the secretary of defense assign an organization responsibility for. They include: Review and assess red team reports for systemic vulnerabilities and coordinate the development and implementation of enterprise solutions to mitigate them; Ensure components develop and implement a risk-based process to assess the impact of identified vulnerabilities and prioritize funding for corrective actions for high-risk vulnerabilities; Ensure components develop and implement processes for providing reports with red team findings and recommendations to organizations with responsibility for corrective actions; Develop processes and procedures to oversee red team activities, including synchronizing and prioritizing red team missions, to ensure activities align with priorities; Perform a joint DoD-wide mission-impact analysis to determine the number of red teams, minimum staffing levels of each team, the composition of the staffing levels needed to meet current and future mission requests; Assess and identify a baseline of core and specialized training standards, based on the three red team roles that team staff must meet for the team to be certified and accredited; and Identify and develop baseline tools needed by red teams to perform missions. https://www.fifthdomain.com/dod/2020/03/17/the-pentagon-is-handling-cyber-vulnerabilities-inconsistently/

  • Army mints new cyber research and development agreement with Estonia

    September 22, 2020 | International, C4ISR

    Army mints new cyber research and development agreement with Estonia

    Mark Pomerleau WASHINGTON — The Army has signed a cooperative research and development deal with Estonia focused on cyber defense and other technologies. The Sept. 14th agreement, signed by the Army Futures Command's Combat Capabilities Development Command's Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center and the ministry of defense, will establish a working group to identify new technologies mutually beneficial to each nation, mostly in the multidomain operations sphere. “This is part of Army Futures Command's' mission: to discover and deliver technology. We're reaching out to pretty much any source that we can find something innovative, whether it's innovative thoughts and ways of doing business or if it's potentially altering a product or modifying it for use by government and by the military,” Brian Lyttle, division chief for cybersecurity at the C5ISR Center, told C4ISRNET in an interview. Under the agreement, the two nations will identify technological areas of mutual interest and share researchers to develop them, Robert Kimball, senior research scientist for cybersecurity at the C5ISR Center, told C4ISRNET. He noted the agreement is in preliminary stages and researchers haven't identified specific projects yet. Andri Rebane, director of the Cyber Defense Department at the Estonian Ministry of Defense, also told C4SIRNET in an emailed response that the joint working group will hold regular meetings to identify those technologies and explore experimentation on those they both agree to. “The ambition is to develop long term research and development projects in cyber defense to encounter the threats from disruptive technologies,” he said. Estonia is considered one of the most digitally connected nations in the world and has continued to up its game in the digital realm following a 2007 cyberattack, largely attributed to Russia. The Army's research and development community wants to chase new technology that can better serve soldiers. “Our mission in the R&D area is to identify those technologies that will benefit the Army as a whole. Our ability to identify those technologies extends far beyond what's available in our own government labs, in research institutions in the United States,” Kimball said. “We're interested in new cyber technologies from wherever they exist. The Estonians have deep capabilities because of their past that they've spent a lot of time working on.” Rebane explained this agreement is part of a larger partnership between the two NATO nations. “In a more practical view the two parties can leverage their vast experience to invest into new research and development to mitigate cyber threats across the spectrum of conflict. In the long term this agreement will benefit also our other allies countering the threats emerging from the shared cyberspace,” he said. Lyttle noted that the Army – and Department of Defense – will never fight alone and thus agreements like this help to foster greater interoperability with coalition partners. https://www.c4isrnet.com/cyber/2020/09/21/army-mints-new-cyber-research-and-development-agreement-with-estonia/

  • US Air Force looks to accelerate artificial intelligence contracts

    July 18, 2018 | International, Aerospace, C4ISR

    US Air Force looks to accelerate artificial intelligence contracts

    FARNBOROUGH, England — The Air Force is still not moving fast enough to recruit the software talent that it needs to harness emerging technologies like artificial intelligence, its acquisition head said Tuesday. "I don't think we're attracting enough people. Whether they're the right people or not, I think that's a separate question. I'm not sure that we'll be able to answer that until we're working with a broader set of the industry base that's working AI,” Will Roper, the Air Force's undersecretary for acquisition, technology and logstics, told reporters at Farnborough Airshow. “I contend that the companies driving AI are a different breed of company than those who drive evolution in hardware, especially companies that drove hardware that have gotten us to today's military. The paces are faster, turnovers are quicker. Software is done in month cycles not year cycles.” Over the past year, the Air Force has charted some successes and some failures in its attempts to integrate tech like AI and big data analytics with legacy hardware systems like fighter jets or air operations center. It has established the Kessel Run Experimentation Lab, a group of industry and airmen in Boston that are iterating new capabilities for air operations centers. Instead of rolling out a large software package, the coders focus on app-like updates that can more rapidly insert new functionality into the AOC. But it's also suffered setbacks — most notably, Google's stated intention to withdraw from future Defense Department projects after some employees objected to the company's work on Project Maven, a program would allow the Pentagon to use AI to review footage from drones. Some have worried that could have a chilling effect on future efforts. Roper said that a big focus of his job is changing how the Air Force approaches software. In the past, software was a product that could be bought in cycles, just like a physical product like a missile or aircraft. Now, it's a service that must be reworked constantly, he said. “You get a good set of coders in, they can push out so much code per month. You put them with the user that's going to use the code and together they're able to collaborate to make sure that the developer is creating something that the operator is using,” he said. “That's working very well for us in Boston, and we're looking to expand that. That's the basic mechanism to move towards AI. We're going to need people that are working with us that are software people that are working, tweaking algorithms with the users that use them, and it's probably a different company than have worked with us over the past 10 years.” The Air Force has to get those companies under contract faster, in weeks instead of months, Roper said. It's looking for opportunities to use contract vehicles specifically delegated for small businesses and to use AFWERX — its outreach arm to nontraditional contractors who are creating promising commercial technologies — to introduce startups to the service. But Roper acknowledged there was no easy answer to the problem. One possible way to inject AI into Air Force programs — although a mundane one — is to use it for predictive maintenance technologies that use sensors to forecast when a component will break, said Air Force Under Secretary Matt Donovan. “It's very exciting for us and I think it holds a lot of potential to reduce our sustainment costs,” he said, noting that sustainment makes up a whopping 70 percent of the life-cycle cost of any given product. Roper agreed that sustainment was a great area to begin employing AI, and that experience could help the Air Force begin to figure out how to use the technology for classified applications. https://www.defensenews.com/digital-show-dailies/farnborough/2018/07/17/air-force-looks-to-accelerate-artificial-intelligence-contracts

All news