19 mai 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

A $17 Billion Pot of National-Security Stimulus Aid Goes Begging

By

and

There's a $17 billion pot of money in the pandemic aid package for companies vital to national security -- and no one seems to want it.

The $2 trillion rescue package Congress adopted in late March includes loans and loan guarantees specifically for companies “critical to maintaining national security.” The funds at first were seen as largely directed at Boeing Co., which at the time had been pleading for a government bailout. But after selling $25 billion in bonds to investors, the aircraft maker turned down the aid, which would have come with strings attached that it didn't like.

With the $17 billion up for grabs, the U.S. defense industry is asking the Trump administration to change the criteria for getting some of it, arguing that the terms are too strict.

The Treasury Department, which has sole authority over the $17 billion, has limited the companies that qualify to those whose work is designated DX, which means it ranks highest on the military's list of national priorities, or to companies that have facilities with top-secret security clearances.

Only about 20 companies applied by the May 1 deadline, according to the Defense Department. There are about 300,000 companies in the Pentagon's contractor supply chain.

Earlier: Defense Firms to Vie for Virus Aid With Boeing Weighing Options

“What we're hearing across the board is that the restrictions and requirements on the money are pretty onerous, and a majority of companies just can't apply for the money,” said Hawk Carlisle, president of the National Defense Industrial Association, which represents defense contractors.

It's another example of the Trump administration's struggle to help businesses that have been decimated by the pandemic. The initial round of $349 billion aimed at small businesses sparked outrage after large restaurant chains, a professional basketball franchise and numerous publicly traded companies were able to get money while mom-and-pop businesses were shut out.

Treasury has approved about $25 billion out of the $35 billion that Congress allocated for payroll assistance to airlines and cargo carriers.

Earlier: American Gets Most as Biggest Airlines Win Bulk of U.S. Aid

On Tuesday, Democratic Senator Maria Cantwell of Washington asked Treasury Secretary Steven Mnuchin to broaden the criteria for qualifying for loans and reopen the application process.

“Treasury's implementation of the loan program has not adequately addressed the needs of the aerospace supply chain and its workforce, which is fundamental to America's industrial base,” she wrote.

It's not just the defense industry raising concerns. Ellen Lord, the Defense Department's top acquisition official, told reporters last month that Treasury's criteria may have prevented companies with the greatest need from qualifying.

“We have talked with them several times; they have reached out to us,” Lord said. “I am not sure companies with DX-rated contracts are perhaps the ones that have the most critical needs.” She said suppliers already have been giving DX programs priority, which they are required to do under Pentagon rules.

The Treasury Department didn't respond to requests for comment.

Congress stipulated that companies receiving the national-security loans must provide the government with warrants, equity or senior debt securities and agree to limits on dividends, stock buybacks and executive pay.

But it's Treasury's additional criteria that defense firms say are too narrow. It restricted loans to two groups: those with a contract with the DX rating or those with facilities that have top-secret security clearances.

Eric Fanning, president of the Aerospace Industries Association, whose members include Lockheed Martin Corp. and BAE Systems Plc, said the criteria should be broadened to cover more companies.

A Pentagon spokesman, Air Force Lieutenant Colonel Mike Andrews, said in an email that the Defense Department has determined that only a few programs required a DX rating, but opted to stop releasing their names as of December 2018.

Before that, the Pentagon had said there are about a dozen DX programs, including those for the Minuteman III ICBM program, the B-2 bomber, presidential aircraft, missile warning satellites and nuclear-missile submarines. Some of the major companies involved are Boeing, Lockheed Martin, Northrop Grumman Corp. and General Dynamics Corp.

The Pentagon doesn't track the number of companies that possess top-secret clearances, but only the number of facilities cleared at that level, spokeswoman Cynthia McGovern said in an email.

Like Boeing, the large companies that might qualify for the Treasury loans are able to tap the capital markets to meet their financing needs, especially now that the Federal Reserve is pumping hundreds of billions of dollars into debt markets by buying corporate bonds and bond funds.

Earlier: Here's Where $881 Billion in U.S. Aid Went in Month of Spending

The Pentagon is helping by increasing progress payments by $3 billion and speeding up those payments to contractors, which range from the biggest makers of weapons systems to the more numerous, lower-tier suppliers of everything from software to uniforms.

But many contractors also rely on commercial deals to supplement their government work. With the airline industry facing a sharp and lengthy contraction, aviation suppliers could see a greater need for rescue financing in the near future, said Fanning of the aerospace industry group.

Boeing, for example, in late April said it's shrinking its workforce by about 10%, or about 16,000 jobs, to conserve cash. General Electric Co. is cutting about 13,000 jobs in its jet-engine operation. Spirit AeroSystems Holdings Inc., a supplier to Airbus and Boeing, is also cutting jobs.

“We don't have a sense yet of where the stress points are in the industrial base,” Fanning said. “The health of supply chains can take a while to sort out and show where there are problems.”

https://www.bloomberg.com/news/articles/2020-05-14/a-17-billion-pot-of-national-security-stimulus-aid-goes-begging

Sur le même sujet

  • The largest cyber exercise you’ve never heard of

    25 février 2020 | International, Aérospatial, C4ISR, Sécurité

    The largest cyber exercise you’ve never heard of

    For years, the first time the Department of Defense's cyber forces faced high-end digital attacks was not in practice or in a classroom, but in actual operations. For the cyber teams that focused on offense, a playbook developed from years of National Security Agency operations guided their work. But on the defensive side, standards and processes needed to be created from scratch meaning, in part, there was a lack of uniformity and little tradecraft to follow. Because cyber leaders had focused on staffing, training opportunities for defensive cyber operators had been sparse. To help solve that problem, the Department of Defense is expected to award a contract worth roughly $1 billion later this year for a global cyber training environment. But in the meantime, some units across the joint force have gone so far as to create their own small-scale training events and exercises to keep their forces' skill sets sharp. Perhaps the best example of these efforts are the 567th Cyberspace Operations Group's “Hunt Event,” which has quickly grown to become one of the largest cyber exercises across the department. The bi-monthly exercise pits teams against each other in a competition for the coveted Goblet of Cyber trophy and bragging rights. The group aims to better train defensive hunters, improve defensive tactics, techniques and procedures and develop defensive tradecraft. “The point of this was that we didn't really have a good range space to play on that had an active and live adversary so we could, in theory, replay traffic and we could go in and generate some easy kill, low hanging fruit signatures for detection,” Capt. Reid Hottel, training flight commander at the 837th Cyber Operations Squadron, told Fifth Domain. “If we are supposed to be the primary counter to advanced persistent threats, the way that we were training was not like how we were fighting.” The exercises started roughly a year ago to teach operators how to hunt on networks. It's now evolved to where participants also work on leadership skills and build custom exploits on a large range with multiple stakeholders. In addition to the Air Force CPTs — the defensive cyber teams each service provides to U.S. Cyber Command — members from the Air Force Office of Special Investigations and Mission Defense Teams, specialized defensive cyber teams that will protect critical Air Force missions and local installations, also take part. At the most recent exercise in January, a representative from NASA participated. Now, the exercises have become so popular Hottel said other services are interested in participating in the future. This includes a Marine Corps CPT at Scott Air Force Base. Building better leaders and hunters To be the best, cyber leaders recognized their teams would have to beat the best and that meant training against the world's most advanced cyber threats. Some other forms of training — such as the popular capture the flag game, which involve teams trying to find “flags” such as files or scripts inside a network — are not always the most realistic form of training. “When we were fighting, we're up against advanced adversaries. We're up against adversaries that are using tactics, techniques and procedures that are just above and beyond what simple little [scripts] ... we were using in the past,” Hottel said. “This hunt exercise allows us to do that, whereas in the past, particularly in other flag exercises, we are not training at the APT level. We [were] training at the script kiddie kind of level and here we're training at a much higher difficulty, which stretches and grows our operators into being true hunters.” He added that the exercises are also helping develop tradecraft. “That's one thing that nobody really teaches, there's no commercial course that you can go buy that teaches tradecraft, that teaches the military away, that teaches the way that we use to find the APT, which in theory, should be ever evolving because our adversary is as well,” Hottel said. “These exercises have been really eye-opening to provide tradecraft development, to become hunters, to understand what it means to be a cyber protection team.” The exercise has evolved to include custom exploits, custom root kits, custom attacks and zero-day exploits within a real-world mission where in some cases hunters don't have any indictors of compromise that exist in the public domain. This means that there is no public reporting available on the exploits or tactics the adversary is using. Participants can hone their skills, by actively hunting on a network in order to find anomalies that could lead to trouble. “As hunters,” he said, “we don't necessarily have singular methodology, we don't necessarily have a unique way that we can go about finding advanced threats mostly because we haven't really been training like that.” The training is also helpful for new mission defense teams, which are just being officially resourced within the Air Force around local installations. By having those teams sit next to CPTs, who are using generally the same tools, they can learn about tradecraft and what to look for at the local level. During the most recent exercise, officials said it was the first time they intentionally tried to trip up participants. Organizers created fake attack chains to see how the players scoped an investigation into a network and deducted points for the amount of time they wasted following that lead. This technique helps teach teams how to scope investigations without going down “rabbit holes,” and not adequately planning, Lt. Christopher Trusnik, chief of training at the 835th Cyberspace Operations Squadron, told Fifth Domain. Beyond the technical hunting, this approach helped team leader to flex leadership muscles. “It was more of teaching that leadership technique of you plan for this, how do you investigate quickly and how do you triage your investigation,” Trusnik, whose unit ran the January exercise, said. Hottel explained that following this most recent event, teams focused on leadership and organization. At one point, someone on his team previously had been coached on what they needed to include such as specific indictors that might be valuable to their mission partners to understand. At this exercise, they included those indicators. In another instance, one team member who had never run a hunt mission struggled at first. Hottel stepped in and with just a little guidance, the leader became more disciplined and was able to find things much better in the last three days. Benefits of cyberspace in training Training in cyberspace has benefits that other domains don't offer. For one, forces don't need a dedicated battlespace such as the Army's National Training Center or the range used at Nellis Air Force Base for the Air Force's Red Flag. With cyber, a custom range can be built and forces from all across the world can come in and participate. The range used for the hunt exercises stays up weeks after the formal event so individuals or teams can try their hand, though they obviously won't be eligible for the Goblet of Cyber trophy. All of this could change with the Persistent Cyber Training Environment (PCTE). PCTE is a major program being run by the Army on behalf of Cyber Command and the joint force to provide a web-based cyber training environment where cyber warriors can remotely plug in around the world and conduct individual training, collective team training or even mission rehearsal — all of which does not exist on a large scale currently. Hottel said that his forces haven't been limited thus far without PCTE. Though, once the platform is online, they can upload the range they used for a competition and it can be accessed by anyone across the joint cyber mission force. Testing new concepts But in the meantime, smaller, unit level exercises like those run by the 567th allow forces to test concepts and learn from others. Unlike larger exercises that have requirements and stated objectives, smaller exercises can serve as a proving ground for staying sharp and pushing the envelope. This allows local units more control over what their personnel do but can also allow teams to test new concepts in a relatively risk-free environment. “Let's say that a national [cyber protection] team wants to test out ... whatever they're currently using because they feel like it would provide them an advantage so they want to test out something,” Hottel said. “We can throw that on the range as well and they can utilize an entirely defensive tool set. We're not trying to make people tool experts, we're trying to make them tradecraft, defensive hunters.” Hottel also said that personnel playing on the archived range can bring new ideas, which can then be tested during the next exercise. In some cases, they may come up with an idea on their own and bring it to the next exercise to see if it actually works. Ultimately, the event is designed to create better cyber warriors. “We're not trying to make people tool experts, we're trying to make them tradecraft, defensive hunters,” Hottel said. https://www.fifthdomain.com/dod/air-force/2020/02/21/the-largest-cyber-exercise-youve-never-heard-of/

  • Les États-Unis accélèrent le développement des missiles hypersoniques

    22 novembre 2021 | International, Aérospatial

    Les États-Unis accélèrent le développement des missiles hypersoniques

    Les groupes Raytheon, Lockheed Martin et Northrop Grumman vont développer des missiles pour aider les États-Unis à mieux se défendre contre des attaques hypersoniques, a indiqué le Pentagone, vendredi 19 novembre. Les trois contrats, à hauteur de plus de 60 M$ au total, ont été conclus pour le développement de missiles intercepteurs. Les missiles hypersoniques sont plus manœuvrables que les missiles balistiques et peuvent évoluer à basse altitude, ce qui les rend plus difficilement détectables. Selon Washington, Pékin a testé en août dernier un missile hypersonique avec charge nucléaire très difficile à intercepter. Les États-Unis estiment que Pékin développe cette technologie beaucoup plus rapidement que prévu. Le Figaro du 20 novembre

  • L3Harris Technologies Selected by US Air Force for Artificial Intelligence Contract

    15 février 2020 | International, Aérospatial, C4ISR

    L3Harris Technologies Selected by US Air Force for Artificial Intelligence Contract

    Melbourne, FLA. February 12, 2020 - The Air Force Life Cycle Management Center has awarded L3Harris Technologies (NYSE:LHX) a multimillion-dollar contract to develop a software platform that will make it easier for analysts to use artificial intelligence (AI) to identify objects in large data sets. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20200212005069/en L3Harris Technologies will develop a software platform that will make it easier for analysts to use artificial intelligence (AI) to identify objects in large data sets. The U.S. military and intelligence community are inundated with massive amounts of data generated by remote sensing systems. Automated searches using algorithms that can identify pre-loaded images of objects makes pinpointing them easier. However, in order to train these algorithms, real images are often unavailable because they are either rare or do not exist. The L3Harris tool creates sample images used to train search algorithms to identify hard-to-find objects in the data, which will help make it easier for the military and intelligence community to adopt artificial intelligence. “L3Harris is a premier provider of modeling and simulation capabilities that provide risk reduction for our customers who rely on advanced geospatial systems and data,” said Ed Zoiss, President, Space and Airborne Systems, L3Harris. “Accelerating the use of AI will help automate analysis of large geospatial data sets so warfighters receive trusted data faster and more efficiently.” About L3Harris Technologies L3Harris Technologies is an agile global aerospace and defense technology innovator, delivering end-to-end solutions that meet customers' mission-critical needs. The company provides advanced defense and commercial technologies across air, land, sea, space and cyber domains. L3Harris has approximately $18 billion in annual revenue and 50,000 employees, with customers in 130 countries. L3Harris.com. Forward-Looking Statements This press release contains forward-looking statements that reflect management's current expectations, assumptions and estimates of future performance and economic conditions. Such statements are made in reliance upon the safe harbor provisions of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. The company cautions investors that any forward-looking statements are subject to risks and uncertainties that may cause actual results and future trends to differ materially from those matters expressed in or implied by such forward-looking statements. Statements about the value or expected value of orders, contracts or programs and about system capabilities are forward-looking and involve risks and uncertainties. L3Harris disclaims any intention or obligation to update or revise any forward-looking statements, whether as a result of new information, future events, or otherwise. View source version on businesswire.com: https://www.businesswire.com/news/home/20200212005069/en/

Toutes les nouvelles