Back to news

October 23, 2023 | International, Land, C4ISR, Security

US State Department approves potential missiles sales to UK, Finland, Lithuania -Pentagon | Reuters

The U.S. State Department approved three potential arms sales to the United Kingdom, Finland and Lithuania, the Pentagon said on Monday as Ukraine's European allies continue to stock up on munitions after flooding Kyiv with donations.

https://www.reuters.com/business/aerospace-defense/us-state-department-approves-potential-missiles-sales-uk-finland-lithuania-2023-10-23/

On the same subject

  • UK: Modernising Defence Programme - Update

    December 19, 2018 | International, Aerospace, Naval, Land, C4ISR, Security

    UK: Modernising Defence Programme - Update

    Defence Secretary Gavin Williamson has provided a final update on the Modernising Defence Programme to the House of Commons. In July, I made a statement setting out headline conclusions from six months of work on the Modernising Defence Programme (MDP). Since then, work has continued apace. Firstly, I would like to welcome the extra £1.8 billion of funding for Defence, including the additional £1 billion that was in last month's Budget. Today, I want to provide an update on the MDP, and set out the work that will be ongoing. I have placed a full report on the MDP in the library of the House. First, I should put the MDP into context. The 2015 Strategic Defence and Security Review was the right plan for Defence at that time. The Government put the Defence budget on a firmer footing, increasing throughout the life of the Parliament. Defence is much stronger as a result of that. NATO is growing in strength and the UK is a leader. More allies are meeting the 2 per cent spending guideline, or have developed plans to do so. We are the second largest defence spender in NATO, one of only a small number of allies to spend 2 per cent of our GDP on defence, and invest 20 per cent of that in upgrading equipment. We can be proud of what we have achieved since 2015. But we have to also be vigilant. National security challenges have become more complex, intertwined and dangerous since 2015 and these threats are moving much faster than anticipated. Persistent, aggressive state competition now characterises the international security context. In response to the growing threats the MDP was launched in January. And, in the last year, our Armed Forces have demonstrated their growing capability, engaged globally, and supported the prosperity of the UK. The Royal Navy has increased its mass and points of presence around the world. We have taken steps to forward base the Army, enhancing our global posture. The Royal Air Force has continued to innovate, and has celebrated a proud past its RAF100 years since its creation. Progress has also made in cyber and space, as the changing character of warfare makes both domains increasingly important. We have reinforced the UK's position as a leading voice in NATO and on European security. And, our Armed Forces have led the way for Global Britain, tackling our adversaries abroad to protect our security at home and nurturing enduring relationships with our allies and partners. Through the work over the past year the MDP has identified three broad priorities, supported by the additional £1.8 billion invested in Defence. Firstly, we will mobilise, making more of what we already have to make our current force more lethal and better able to protect our security. The UK already has a world-leading array of capabilities. We will make the most effective use of them. We will improve the readiness and availability of a range of key Defence platforms: major warships, attack submarines, helicopters and a range of ISTAR platforms. We are adjusting our overseas training and deployments to increase our global points of presence, better to support allies and influence adversaries. To improve the combat effectiveness of our Force, we will re-prioritise the current Defence programme to increase weapon stockpiles. And we are accelerating work to assure the resilience of our Defence systems and capabilities. We can mobilise a full spectrum of military, economic and soft power capabilities. And, where necessary and appropriate we will make sure we are able to act independently. We will also enhance efforts with our allies and partners, aligning our plans more closely with them, acting as part of combined formations, developing combined capabilities, and burden-sharing. And we continue to invest in, and grow, our global network of Defence personnel and the education and training we offer in the UK and overseas. Secondly, we will modernise, embracing new technologies to assure our competitive edge Our adversaries and competitors are accelerating the development of new capabilities and strategies. We must keep pace, and conceive of our joint force as consisting of five domains, air, land, sea, cyber and space, rather than the traditional three. We must modernise, targeting priority areas. A major new step will involve improved Joint Forces Command that will be in a better position so that defence can play a major role in preventing conflict in the future and improve our cyber operations and capabilities across the armed forces but also across government as well. This year Defence's Innovation Fund put £20 million towards projects in areas including unmanned air systems, virtual reality training, and enhanced digital communications for the Future Commando Force. The fund will grow to £50 million next financial year, increasing the scope, ambition and value of the projects it can support. We will launch new ‘Spearhead' innovation programmes that will apply cutting-edge technologies to areas including sub-surface threats to our submarines, our intelligence, surveillance and reconnaissance capability, and command and control in the Land Environment as well. And to drive innovation and change through the Department I am launching a Transformation Fund. Next year, I will ring-fence £160 million of MOD's budget to create this fund available for innovative new military capabilities. I will look to make a further £340 million available as part of the Spending Review. This fund will be available for new innovative military capabilities which allows us to stay one step ahead of our adversaries. Together these and other steps will enable the acceleration of our modernisation plans. Thirdly, we will transform, radically changing the way we do business in Defence. We need to improve markedly the way we run Defence. To sustain strategic advantage in a fast-changing world, we must be able and capable of continuous and timely adaptation. We will embrace modern business practices and establish a culture that nurtures transformation and innovation. We also need to create financial headroom for modernisation. Based on our work to date, we expect to achieve over the next decade the very demanding efficiency targets we were set in 2015, including through investment in a programme of digital transformation. We will develop a comprehensive strategy to improve recruitment and retention of talent, better reflecting the expectations of the modern workforce. We will access more effectively the talents of our ‘Whole Force' across all three Services, Regulars, Reserves, Civil Service and industrial partners. Looking ahead, dealing effectively with persistent conflict and competition will increasingly hinge on smarter, better informed long-range strategy. To help achieve these goals we will establish a permanent Net Assessment Unit, as well as a Defence Policy Board of external experts, to bring challenge to Defence policy and to Defence strategy. Our achievements under the MDP have made Defence stronger. The capability investments and policy approaches set out, with the £1.8 billion worth of Defence funding, will help us keep on track to deliver the right UK Defence for the challenging decade ahead. Without a shadow of a doubt, there is more work to be done as we move towards next year's Spending Review. We must sustain this momentum if we are to realise our long-term goals of increasing the lethality, reach and mass of our Armed Forces. I will do everything within my power to make sure that the UK remains a Tier-One military power in the decade ahead, and that we continue to deliver the strong defence and security that has been the hallmark of the government. I commend this statement to the House. The Modernising Defence Programme https://www.gov.uk/government/speeches/modernising-defence-programme-update

  • The Cybersecurity 202: Hackers just found serious vulnerabilities in a U.S. military fighter jet

    August 19, 2019 | International, Aerospace

    The Cybersecurity 202: Hackers just found serious vulnerabilities in a U.S. military fighter jet

    By Joseph Marks LAS VEGAS — In a Cosmopolitan hotel suite 16 stories above the Def Con cybersecurity conference this weekend, a team of highly vetted hackers tried to sabotage a vital flight system for a U.S. military fighter jet. And they succeeded. It was the first time outside researchers were allowed physical access to the critical F-15 system to search for weaknesses. And after two long days, the seven hackers found a mother lode of vulnerabilities that — if exploited in real life — could have completely shut down the Trusted Aircraft Information Download Station, which collects reams of data from video cameras and sensors while the jet is in flight. They even found bugs that the Air Force had tried but failed to fix after the same group of hackers performed similar tests in November without actually touching the device. “They were able to get back in through the back doors they already knew were open,” Will Roper, the Air Force's top acquisition official, told me in an exclusive briefing of the results. The hackers lobbed a variety of attacks — including injecting the system with malware and even going at it with pliers and screwdrivers. When I saw it, the metal box that's usually secure on the aircraft had wires hanging out the front. The hackers briefed Roper on the findings on Saturday afternoon. He was surrounded by discarded pizza boxes, iced coffee drinks — and the hotel's drinking glasses filled with screws, nuts and bolts removed from five fully dismantled TADS devices, which run about $20,000 a pop. He'd expected the results to be about this bad, Roper told me on a private tour of the hacking event. He pinned the weaknesses on decades of neglect of cybersecurity as a key issue in developing its products, as the Air Force prioritized time, cost and efficiency. He's trying to turn that around, and is hopeful about the results of the U.S. government's newfound openness to ethical hackers. He'd come straight from Def Con's first-ever Aviation Village, which the Air Force helped establish, and was wearing a gray T-shirt with the words “No, Mr. Bond, I expect you to hack,” emblazoned on the front — a riff on a classic line from the 1964 James Bond film “Goldfinger.” This is a drastic change from previous years, when the military would not allow hackers to try to search for vulnerabilities in extremely sensitive equipment, let alone take a literal whack at it. But the Air Force is convinced that unless it allows America's best hackers to search out all the digital vulnerabilities in its planes and weapons systems, then the best hackers from adversaries such as Russia, Iran and North Korea will find and exploit those vulnerabilities first, Roper told me. “There are millions of lines of code that are in all of our aircraft and if there's one of them that's flawed, then a country that can't build a fighter to shoot down that aircraft might take it out with just a few keystrokes,” he said. Roper wants to put his military hardware where his mouth is. During next year's Def Con conference, he wants to bring vetted hackers to Nellis or Creech Air Force bases near Las Vegas where they can probe for bugs on every digital system in a military plane, including for ways that bugs in one system can allow hackers to exploit other systems until they've gained effective control of the entire plane. He also wants to open up the ground control system for an operational military satellite for hacker testing, he said. “We want to bring this community to bear on real weapons systems and real airplanes,” Roper told me. “And if they have vulnerabilities, it would be best to find them before we go into conflict.” Those hacking challenges will also be useful for the private sector because military planes and satellites share many of their computer systems with the commercial versions of those products, Roper said, and the Air Force can share its findings. The seven hackers probing the TADS devices were all brought to Vegas by the cybersecurity company Synack, which sells the Pentagon third-party vulnerability testing services, under a contract with the Defense Digital Service, a team of mostly private-sector technology stars who try to solve some of the Pentagon's thorniest technology problems during short-term tours. The Defense Digital Service started by organizing large-scale hacking competitions in 2016, with names such as “Hack the Pentagon” and, eventually, “Hack the Air Force.” These were open to almost anybody — but included only public-facing hacking targets such as military service websites and apps. Shortly after, they also began opening more sensitive systems to a smaller number of vetted hackers who sign nondisclosure agreements. DDS has run about a dozen of those more sensitive hacking competitions so far, but this is the first time it has offered up the same system for hacking twice, said Brett Goldstein, DDS's director, who earned a reputation in technology as Open Table's IT director and chief data officer for the city of Chicago. “That's important because security is a continuous process,” he told me. “You can't do an exercise and say, ‘Oh, we found everything' and check the box. You need to constantly go back and reevaluate.” They also allowed the hackers to be more aggressive this time and to physically disassemble the TADS systems to get a better idea of what kinds of digital attacks might be effective, Goldstein said. That meant the hackers could simulate a cyberattack from adversaries that had infiltrated the vast network of suppliers that make TADS components and had sophisticated knowledge about how to compromise those elements. They could also advise the Air Force about flaws in how the TADS hardware was built that make it more susceptible to digital attacks. Moving forward, Roper told me, he wants to start using that knowledge to mandate that Air Force vendors build better software and hardware security controls into their planes and weapons systems upfront so the Air Force doesn't have to do so much cybersecurity work on the back end. He's up against an arcane and byzantine military contracting process, however, that's going to make those sorts of fundamental reforms extremely difficult, he acknowledged. In some cases, the company that built an Air Force system owns the software embedded in that system and won't let the Air Force open it up for outside testing, he says. In other cases, the Air Force is stuck with legacy IT systems that are so out of date that it's difficult for even the best technologists to make them more secure. “It's difficult to do this going backward, but we're doing our best,” Roper told me. “I can't underscore enough, we just got into the batter's box for what's going to be a long baseball game.” https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/08/14/the-cybersecurity-202-hackers-just-found-serious-vulnerabilities-in-a-u-s-military-fighter-jet/5d53111988e0fa79e5481f68/

  • DoD Taps Sea Machines for Autonomous VTOL Replenishment Vessels

    October 7, 2020 | International, Naval, C4ISR, Security

    DoD Taps Sea Machines for Autonomous VTOL Replenishment Vessels

    Seapower Staff BOSTON — Sea Machines Robotics, a Boston-based developer of autonomous command and control systems for surface vessels, has been awarded a multi-year Other Transaction agreement by the U.S. Department of Defense (DoD)'s Defense Innovation Unit (DIU), the company announced in an Oct. 5 release. The primary purpose of the agreement is to initiate a prototype that will enable commercial ocean-service barges as autonomous Forward Arming and Refueling Point (FARP) units for an Amphibious Maritime Projection Platform (AMPP). Under this OT agreement, Sea Machines will engineer, build and demonstrate ready-to-deploy system kits that enable autonomous, self-propelled operation of opportunistically available barges to land and replenish military aircraft. The kits will include Sea Machines' SM300 autonomous-command and control systems, barge propulsion, sensing, positioning, communications and refueling equipment, as well as items required for global deployment. Each modular kit will meet U.S. Navy criteria and will be in compliance with classifications and regulations from the DoD's aviation bodies. The contract includes a concept demonstration phase, with an option for following phases to deploy SM300 Operational Kits. The live concept demonstration is scheduled for the fourth quarter of 2020, in Washington state, for which Sea Machines has teamed with FOSS Maritime, a leading maritime transportation and logistics provider based in Seattle. FOSS will provide naval architecture, support engineering and operations management to outfit a remotely commanded deck barge to land helicopters and host a scaled fueling station for aircraft, surface vessels and shore replenishment. Using the SM300, shoreside operators will have remote situational awareness and will be able to demonstrate the capabilities of remote command and control of the vessel, her operating systems and flight deck. Sea Machines is the prime contractor for the multi-year contract and is working closely alongside FOSS Maritime and other significant industry leaders, including Huntington Ingalls, America's largest military shipbuilding company and a provider of professional services, based in Newport News, Virginia, and Bell Flight, a producer of commercial and military, vertical-lift aircraft, based in Fort Worth, Texas, to ensure a successful demonstration. “The AMPP autonomous replenishment systems will solve critical logistics challenges of expeditionary missions. We are pleased to enable this innovative capability, which will increase the effectiveness and flexibility for the U.S. military,” said Sea Machines' Phil Bourque, director, sales. “With Sea Machines systems already working off the waters of four continents, this project is well suited for us and one that we look forward to delivering on for the U.S. government.” “Foss is excited about this new opportunity with Sea Machines.This contract has led to discussions with Sea Machines in a number of other areas where their expertise can help Foss, including bringing more technology to our tug fleet. What they are doing in automation is very interesting and that technology could help our mariners and our vessels safety,” said FOSS's Will Roberts, chief operating officer. DIU's work is part of the DoD's Resilient Expeditionary Agile Littoral Logistics (REALL) Joint Capability Technology Demonstration (JCTD) project. Funded by the Office of the Secretary of Defense Research & Engineering, the JCTD Program addresses Combatant Command and Joint warfighting gaps through prototyping and demonstration of innovative and game-changing technologies. The following offices are involved with defining performance requirements and developing capabilities for REALL: U.S. Central Command, U.S. Transportation Command, U.S. Marine Corps Warfighting Laboratory, Naval Facilities Engineering and Expeditionary Warfare Center, Army Engineer Research and Development Center, and the Naval Aviation Warfare Center – Lakehurst. https://seapowermagazine.org/dod-taps-sea-machines-for-autonomous-vtol-replenishment-vessels/

All news