Back to news

January 23, 2019 | International, Aerospace

Why the F-22 Raptor and F-35 Stealth Fighters Will Revolutionize War

by Sebastien Roblin

To recap: stealth technology is more effective at a distance. Although there are a number of methods to detect stealth fighters at long range, they generally don't permit weapons to lock on to them.

In Len Deighton's book Fighter, he describes the tactics used by the outnumbered English fighter pilots defending against German Luftwaffe bombers in the Battle of Britain:

The professional fighter pilot gained height as quickly as he was permitted, and treasured possession of that benefit. He hoped always to spot the enemy before they spotted him and hurried to the sun side of them to keep himself invisible. He needed superior speed, so he positioned himself for a diving attack, and he would choose a victim at the very rear of the enemy formation so that he did not have to fly through their gunfire. He would hope to kill on that first dive. If he failed, the dedicated professional would flee rather than face an alerted enemy.

Full article: https://nationalinterest.org/blog/buzz/why-f-22-raptor-and-f-35-stealth-fighters-will-revolutionize-war-42322

On the same subject

  • Avec SpaceHub, la région bordelaise veut tenir son rang dans la mobilité spatiale

    September 18, 2020 | International, Aerospace, C4ISR

    Avec SpaceHub, la région bordelaise veut tenir son rang dans la mobilité spatiale

    Pierre Cheminade Défendre et promouvoir la position de la région bordelaise dans la compétition mondiale de la mobilité spatiale, c'est l'ambition du SpaceHub lancé conjointement par des acteurs publics et privés dont la Région Nouvelle-Aquitaine, Bordeaux Métropole, ArianeGroup et Dassault Aviation. Malgré la vente d'avions Rafale à la Grèce, qui bénéficiera directement à l'usine Dassault de Mérignac, la filière régionale de l'aéronautique-spatial-défense (ASD) a bien besoin de signaux positifs dans un contexte compliqué, tout particulièrement pour les avionneurs civils et leurs sous-traitants. Alors que Technowest vient de lancer un appel à projets pour repérer et accompagner trois nouvelles startups de l'ASD, le conseil régional de Nouvelle-Aquitaine, Bordeaux Métropole, Saint-Médard-en-Jalles, ArianeGroup et Dassault Aviation se mobilisent pour fédérer les énergies en matière spatiale. Une nouvelle initiative après que la présidence bordelaise de la Communauté des villes Ariane en 2020 a subi le confinement et la crise sanitaire de plein fouet tout comme le festival Big Bang. La démarche SpaceHub, présentée le 7 septembre en présence d'une myriade de partenaires publics et privés (*), vise à ainsi à démontrer que le territoire tient son rang en matière de mobilités spatiales dans un contexte plus concurrentiel que jamais avec les progrès à marche forcée réalisés par les acteurs du New Space. Deux activités seront développées de concert pour mêler étroitement recherche fondamentale et applications concrètes : un centre d'analyse prospective dédié à la mobilité spatiale travaillant avec les universités et grandes écoles françaises et internationales ainsi qu'avec les agences spatiales, civiles et de défense ; un centre d'exploration et d'accélération des concepts spatiaux "pour aboutir rapidement aux meilleures solutions, obtenir des financements associés à ses projets innovants et générer de nouvelles opportunités d'affaires." Le tout dans une logique d'ouverture et de collaboration. Une démarche qui s'inscrit également dans une logique de relance économique à moyen terme tant les innovations et technologies développées initialement pour le spatial se traduisent, dans un second temps, dans l'économie et les usages plus grand public, de la communication à la santé en passant par l'environnement et la mobilité. (*) Les partenaires industriels du projet (ArianeGroup et Dassault Aviation), le CEA, les représentants de l'écosystème de la recherche (Université de Bordeaux, CNRS, Inria, Chaire défense & aérospatial de Sciences Po Bordeaux, etc.), des acteurs majeurs soutenant le projet (Thales, Cnes, Nouvelle-Aquitaine Academic Space Center, l'association Hyfar-Ara et la Fondation Bordeaux Université). https://objectifaquitaine.latribune.fr/business/aeronautique-et-defense/2020-09-17/avec-spacehub-la-region-bordelaise-veut-tenir-son-rang-dans-la-mobilite-spatiale

  • 10,000 made-in-Québec masks for manufacturing SMEs in the aerospace sector

    April 29, 2020 | International, Aerospace

    10,000 made-in-Québec masks for manufacturing SMEs in the aerospace sector

    MONTRÉAL, April 29, 2020 /CNW Telbec/ - Aéro Montréal proudly announced today the launch of a new, innovative initiative that will provide 10,000 reusable masks to manufacturing SMEs in the aerospace sector. This project aims to support the continuation or resumption of their activities in a safe work environment. This Montréal-made face mask will help protect thousands of qualified employees in the aerospace industry without jeopardizing supplies necessary for the proper functioning of health services. Companies in the aerospace industry have already deployed a wide range of health measures to ensure business continuity, and this new initiative by Aéro Montréal will complement what is already in place. The COVID-19 crisis is unprecedented and will require the maintenance of these safety protocols for many months to come. Numerous companies are preparing for the resumption of operations and will undoubtedly face procurement challenges to ensure that they provide personal protective equipment to their employees, including masks. Promoting a gradual and safe resumption by supporting local entrepreneurship Aéro Montréal will draw on the strength of its network to offer reusable masks free of charge. Our team will be contacting our many SMEs over the next few days so that they can take advantage of this offer. Inspired by the Panier Bleu program, this initiative also aims to support the local textile economy. This is why it is being implemented with the support of the Metropolitan Fashion Cluster mmode, and Quartz Co., a Montréal based coat supplier. The company Quartz Co. modified its production line to manufacture protective textile products. This inter-cluster collaboration will enable the supply of washable masks to be available in record time at very competitive costs. Once the 10,000 free masks have been distributed, aerospace SMEs wishing to purchase additional masks, will be able to do so by contacting Aéro Montréal. "Through this initiative, Aéro Montréal is reaffirming its support for small and medium-sized enterprises, which play a crucial role in the supply chain. By working with local players, Aéro Montréal will help ensure a safe and efficient resumption of activities for a key sector that represents more than 42,100 direct jobs in Québec," stated Suzanne M. Benoît, President, Aéro Montréal "Over the past months we have invested significantly in acquisitions of viable Quebec production plants. At Quartz Co., we believe in the importance of retaining and developing a local production force. Thanks to these efforts, we can contribute today to the fight against COVID-19, manufacturing masks among other items for our corporate clients," added Jean-Philippe Robert, President of Quartz Co. About Aéro Montréal Created in 2006, Aéro Montréal is a strategic think tank that groups all major decision makers in Québec's aerospace sector, including companies, educational and research institutions, as well as associations and unions. The activities of Aéro Montréal are made possible thanks to the participation of the governments of Québec and Canada, the Montréal Metropolitan Community, as well as company members of the cluster. SOURCE Aéro Montréal For further information: Léa Guicheteau, Project Manager, Communications and Media Relations, Aéro Montréal, 514 550-7494, lea.guicheteau@aeromontreal.ca; Kaven Delarosbil, Director of Communications, Aéro Montréal, 514-743-2728, kaven.delarosbil@aeromontreal.ca Related Links http://www.aeromontreal.ca/

  • The DoD needs data-centric security, and here’s why

    September 30, 2020 | International, C4ISR, Security

    The DoD needs data-centric security, and here’s why

    Drew Schnabel The U.S. Department of Defense is set to adopt an initial zero-trust architecture by the end of the calendar year, transitioning from a network-centric to a data-centric modern security model. Zero trust means an organization does not inherently trust any user. Trust must be continually assessed and granted in a granular fashion. This allows defense agencies to create policies that provide secure access for users connecting from any device, in any location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. How does the Pentagon's AI center plan to give the military a battlefield advantage? The Pentagon's artificial intelligence hub is working on tools to help in joint, all-domain operations as department leaders seek to use data to gain an advantage on the battlefield. Andrew Eversden To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. Initially, the JIE was an innovative concept that took the DoD from a highly fragmented architecture, in which each agency managed its own cybersecurity strategy, to an architecture in which there is a unified SSA. However, one of the early challenges identified for the JIE was managing cloud cybersecurity as part of the SSA. The components in the JIE — the Joint Regional Security Stacks family's internet access points and cloud access points — have traditionally focused on securing the network, rather than the data or user. As more DoD employees and contractors work remotely and data volumes increase, hardware cannot scale to support them. This has created ongoing concerns with performance, reliability, latency and cost. A cloud-first approach In response, the DoD leverages authorized solutions from the Federal Risk and Authorization Management Program, and it references the Secure Cloud Computing Architecture guidance for a standard approach for boundary and application-level security for impact Level 4 and 5 data hosted in commercial cloud environments. The purpose of the SCCA is to provide a barrier of protection between the DoD Information Services Network and the commercial cloud services that the DoD uses while optimizing the cost-performance trade in cybersecurity. Defense agencies are now exploring enterprise-IT-as-a-service options to move to cloud, and reduce the need for constant updates and management of hardware. Through enterprise-IT-as-a-service models, defense agencies will be able to scale easily, reduce management costs and achieve a more competitive edge over their adversaries. Before the pandemic hit, defense agencies were already moving to support a more mobile workforce, where employees can access data from anywhere on any device. However, a cyber-centric military requires security to be more deeply ingrained into employee culture rather than physical protection of the perimeter. The next evolution to secure DISA and DoD networks is to embrace a secure access edge model with zero-trust capabilities. The SASE model moves essential security functions — such as web gateway firewalls, zero-trust capabilities, data loss prevention and secure network connectivity — all to the cloud. Then, federal employees have direct access to the cloud, while security is pushed as close to the user/data/device as possible. SP 800-27, zero-trust guidance from the National Institute of Standards and Technology, provides a road map to migrate and deploy zero trust across the enterprise environment. This guidance outlines the necessary tenants of zero trust, including securing all communication regardless of network location, and granting access on a per-session basis. This creates a least-privilege-access model to ensure the right person, device and service have access to the data they need while protecting high-value assets. As the DoD transforms the JIE architecture to an as-a-service model with zero-trust capabilities, defense agencies will experience cost savings, greater scalability, better performance for the end user and war fighter, improved visibility, and control across DoD networks — and ultimately a stronger and more holistic cybersecurity capability moving forward. https://www.c4isrnet.com/opinion/2020/09/29/the-dod-needs-data-centric-security-and-heres-why/

All news