Back to news

December 24, 2023 | International, Security

US unveils international force to defend Red Sea. Here’s what we know.

Several nations have announced their contributions to Operation Prosperity Guardian, a new multinational security initiative in the Middle East.

https://www.c4isrnet.com/naval/2023/12/19/us-unveils-international-force-to-defend-red-sea-heres-what-we-know/

On the same subject

  • Homeland Security announces new first response cyber center

    August 1, 2018 | International, C4ISR

    Homeland Security announces new first response cyber center

    By: Justin Lynch In the face of increasing cyberattacks, the Department of Homeland Security is creating a new center to share threat information with private companies and kicking off a 90 day sprint to identify the country's digital “crown jewels" that may be especially vulnerable, the agency's secretary said July 31. The National Risk Management Center is expected to provide a centralized home where firms and local agencies can turn for cybersecurity solutions. “The next major attack is more likely to reach us online than on an airplane,” said Homeland Security Secretary Kirstjen Nielsen. She added that “intruders are in our systems” and “everyone and everything is now a target.” The announcement came during a cybersecurity summit that the Department of Homeland Security hosted in New York City. The event aimed to bridge the gap between the government and some of the top companies in the United States that make up the critical parts of American digital life. It was envisioned as the start of a new relationship between the private and public sector. Nielsen said that the threat center is “driven by industry needs” and is spurred by a ”re-emergence of the nation state threat” and the “hyperconnected environment” of the United States. She said that previously some local governments have called 911 during a cyberattack. In the future, they would call the new cyber center. “Nation-state actors attempt to infiltrate critical infrastructure operations across multiple sectors,” a Homeland Security fact sheet on the new center read. It added there is a “need for an agreed-upon playbook to integrate government and industry response efforts.” The center also provides a playbook for risk management and identifying critical cyber supply chain elements. Although there are already government-backed risk-sharing initiatives, DHS leaders hope that the private sector will be more willing to share their challenges and expertise. Jeanette Manfra, the assistant secretary for the Office of Cybersecurity and Communications at Homeland Security, told reporters that the new center is "going to start small, we don't want to sign up for all sorts of things and then fail.” The hope is for the national counterterrorism center to be able to focus on incident response, and the center announced on Tuesday will focus on identifying national risk. The risk center will pull staff from other parts of government, Manfra said. A leader has not been named, and it has not received an increased budget. Throughout the conference, government officials were eager to entice the private sector to work with the new risk center. It appears that business participation is a necessary condition for the centers' success. The announcement comes just one week after Homeland Security warned that the Russian government is conducting cyberattacks against critical infrastructure sectors that include energy, nuclear, water, aviation and critical manufacturing. “The warning lights are blinking red," Coats said during a July 13 event at the Hudson Institute. Current threat sharing portals have been described as ineffective. The Cybersecurity Information Sharing Act of 2015 already attempted to spur collaboration between the public and private sector. Some experts told Fifth Domain that they did not expect the new portal to be groundbreaking. Only six companies are currently sharing cyberthreats with government, according to Chris Krebs, head of the national protection and programs directorate at Homeland Security. “We have to age to establish a value proposition for an organization to share into the system,” said Krebs. He highlighted better supply chain risk management as an incentive that would set the new center apart from previous intelligence-sharing schemes. Companies can write into their contracts that their vendors must use the threat-sharing portal so they know that contractors are managing third-party risks, Krebs said. At the event in New York City, some of the largest corporations praised the new program while speaking onstage with top government officials. “This was an obvious thing to do for a decade but it didn't happen,” said John Donovan, the chief executive of AT&T. https://www.fifthdomain.com/critical-infrastructure/2018/07/31/homeland-security-announces-new-risk-management-center/

  • As mission-capable rates languish, Pentagon should embrace digital engineering

    February 4, 2021 | International, Aerospace, Naval, Land, C4ISR, Security

    As mission-capable rates languish, Pentagon should embrace digital engineering

    Ben Kassel and Bruce Kaplan While many Pentagon initiatives face a change of course under new Defense Secretary Lloyd Austin, its digital engineering strategy deserves a push forward. The strategy, issued in 2018 by then-Under Secretary of Defense for Research and Engineering Michael Griffin, aimed to help military services harness modern sustainment methods like additive manufacturing, digital twin and augmented reality. For the Department of Defense, enterprisewide implementation of these techniques would lower costs, increase weapon systems' mission-capable rates and afford flexibility in fleet modernization. But digital engineering requires digital, 3D data — and the DoD doesn't have enough. Modern sustainment practices hinge on the availability of what's known as the model-based definition, 3D models and digitized descriptive information for a system or component. Using computer-aided design programs, engineers can manipulate the data to enable practices like condition-based maintenance, eliminating weapon systems' unnecessary downtime. Digital data can facilitate seamless transit from original equipment manufacturers, or OEM, to procurers and sustainers in the field and at maintenance depots worldwide. However, the technical data for most weapons systems remains elusive to the services and their program management offices, or PMO, or the datasets are available only in 2D documentation, such as blueprints. Meanwhile, readiness suffers. Of 46 weapons systems reviewed by the Government Accountability Office, only three achieved annual mission-capable targets at least five times between 2011 and 2019. More than half (24) failed to meet their goal even once, according to GAO's November 2020 report. The KC-13OJ Super Hercules air refueler and the MV-22B Osprey tiltrotor were among the programs to miss their target all nine years. GAO cited inaccessible technical data as a contributing factor for both programs. Of the Super Hercules, the report says: “The Navy and Marine Corps were unable to obtain the technical data of the aircraft ... the lack of the technical data compromises [their] ability to analyze and resolve sustainment issues.” Similar concerns were raised about the P-8A Poseidon anti-submarine aircraft, saying “technical data needed for maintenance has not been readily available to the Navy.” Dozens of systems, including the F-35 fighter jet, face similar obstacles. Notably, the GAO report referred not to 3D, model-based data but rather legacy incarnations: blueprints and documents that may have been converted “digitally” into PDFs. This is a far cry from the machine-readable formats required to use digital engineering technologies across the enterprise. The GAO cited the production of 170 “structural repair manuals” as a means of narrowing the Osprey's technical data gaps. The labor-intensive replication of physical documents — the PMO projected five years to deliver all of them — is a piecemeal solution, at best. Troublingly, modern sustainment methods seem beyond the reasonable expectation of not just PMOs but even forward-looking organizations like the GAO. To foster its DoD-wide implementation, the digital engineering strategy needs reinforcement, which could take the following forms: Champion the availability of model-based technical data in policy. Modern sustainment requires a shift from decadesold practices. Paper data that supports secondhand manuals and haphazard 2D-to-3D conversion should no longer be the norm. Services cannot lead this transition on their own, however. Federal guidance on the acquisition, creation, use and management of authentic, model-based technical data would jump-start the movement toward digital sustainment. Educate PMOs to acquire technical data rights strategically. Policy must be partnered by the right mindset. One reason PMOs don't have technical data is that sometimes they never asked for it. An afterthought at the time of procurement, technical data is often overlooked until maintenance is needed. Then it's too late — or too expensive — to acquire the needed rights. Leadership can encourage PMOs to identify potential sustainment solutions — and the technical data rights needed to execute them — at the time of acquisition. Assert the government's rights to model-based technical data. A sea change in sustainment depends on building unprecedented trust between OEMs and PMOs. OEMs understandably need to protect intellectual property, but their grip on model-based technical data must loosen for digital sustainment to flourish at scale. This can be accomplished without OEMs surrendering their competitive advantage. In many cases, OEMs need not transfer custody of the data itself for sustainment activities. Limited-rights agreements and trusted third-party arrangements can be tailored to enable data availability only when needed or to execute specific solutions. Giving OEMs confidence in these approaches will entail extensive dialogue and commitment by DoD leaders. Given the GAO's assessment, seeking a breakthrough is worth the attempt. Operationalizing the DoD strategy requires work in other areas as well, particularly in removing intra- and inter-organizational stovepipes, and securing the data's transmission and storage. But the first step toward a model-based sustainment enterprise is ensuring the availability of modern technical data. This need will only grow more crucial. Today's sustainment practices too closely resemble those of 30 years ago, not what they should be 30 years from now. We're already playing catch up. It's time to view sustainment with 3D glasses. Ben Kassel is a senior consultant at LMI. He previously worked with the U.S. government on defining and exchanging technical data used for naval architecture, marine and mechanical engineering, and manufacturing. Bruce Kaplan is a fellow at LMI. He previously served as technical director of logistics for research and development at the Defense Logistics Agency. https://www.c4isrnet.com/opinion/2021/02/03/as-mission-capable-rates-languish-pentagon-should-embrace-digital-engineering/

  • Saab eyes Colombia, Peru as potential Gripen clients amid Latam push

    April 12, 2023 | International, Aerospace

    Saab eyes Colombia, Peru as potential Gripen clients amid Latam push

    Sweden's Saab AB is looking to boost sales of its Gripen fighter in Latin America, eyeing potential purchases by Colombia and Peru as it prepares to start producing the aircraft in Brazil in partnership with Embraer SA .

All news