20 février 2023 | International, Terrestre

Armée américaine | Près d’un milliard de dollars débloqués pour se réapprovisionner en munitions

L’armée américaine a annoncé un contrat de près d’un milliard de dollars pour augmenter la production de munitions d’artillerie de calibre 155 mm, utilisées en grande quantité par l’Ukraine.

https://www.lapresse.ca/international/etats-unis/2023-02-17/armee-americaine/pres-d-un-milliard-de-dollars-debloques-pour-se-reapprovisionner-en-munitions.php

Sur le même sujet

  • The unlikely way to improve Air Force information warfare: forums

    24 juillet 2020 | International, Aérospatial

    The unlikely way to improve Air Force information warfare: forums

    Mark Pomerleau One way the Air Force's new information warfare command is trying to bring together the disparate parts of the organization is through forums where leaders put representatives from different components in the same room. Sixteenth Air Force/Air Forces Cyber, created in October, combined what was previously known as 24th and 25th Air Force. The move placed cyber, intelligence, surveillance and reconnaissance, electronic warfare and weather capabilities under one commander, serving as the Air Force's first information warfare entity. With all these new wings and capabilities now under a single unit, they need to understand what everyone is doing and how it can feed together. “How do we bring forums together where all of our wings that are focused on a problem can be in the same room and we start to build out what things are they all contributing,” Lt. Gen. Timothy Haugh, 16th Air Force's commander, told a webcast hosted by the Mitchell Institute. “Then taking it to the next layer, so all the weapons and tactics teams are talking. That simple act of creating a forum was built largely on our component responsibilities. We have very good forums ... for how do we support and produce cyber outcomes. We expanded that forum into an information warfare environment.” Some of this integration is already taking hold. Haugh explained he received a positive update earlier this month about how one meeting had led to fewer stovepipes and more data sharing. In addition, he said he'd like to see more components share intelligence as a way to enable others within the enterprise. For example, if a portion of the ISR enterprise, be it analysis or exploitation, in support of Air Forces Africa, discovers a Russian private military corporation conducting malign activities in Africa, they can pass that to the cyber enterprise to potentially pursue the adversary. Then the cyber element can feed their information or operation back to the ISR enterprise to produce better intelligence for the air component. “This is where for us, that art is starting to come together. Right now, it's very manual, and we're seeing the processes and the data flows start to fall in place that that will become a more automated and routine function that now becomes mutually supportive across our enterprise,” Haugh said. https://www.c4isrnet.com/smr/information-warfare/2020/07/22/the-unlikely-way-to-improve-air-force-information-warfare-forums/

  • Army approves next phase for augmented reality device

    7 septembre 2023 | International, C4ISR

    Army approves next phase for augmented reality device

    Over the next 18 months, the Army will add in cloud technology and review a feasible, affordable production plan for the device.

  • Here’s what US Cyber Command wants next for its training platform

    21 août 2020 | International, C4ISR, Sécurité

    Here’s what US Cyber Command wants next for its training platform

    Mark Pomerleau WASHINGTON — As the U.S. Defense Department matures its cyber force and training, it wants greater visibility over the readiness of its teams and a more realistic training environment that replicates the entirety of the internet, including social media. These two areas were the focus of the latest industry day for the Persistent Cyber Training Environment, or PCTE, which is U.S. Cyber Command's online client that allows worldwide cyber mission force teams to connect and conduct individual and team training as well as mission rehearsal. The Army is running the program on behalf of Cyber Command and the joint cyber force. The Aug. 19 industry day specifically focused on what the PCTE program office is calling Cyber Innovation Challenge 4. Officials have said that Cyber Innovation Challenge 4 differs from its predecessors, partly because how the program office has matured and better integrated with the operational force at Cyber Command and the service cyber components. The challenges are ways to deliver incremental capability to the training platform. They also serve as competitions to award contracts and layer new technologies onto the platform, oftentimes involving smaller, nontraditional defense companies. There were 78 companies registered to the industry day — 25 percent of which were new to PCTE competitions and cyber innovation challenges. “What do I need from you? The two major areas we're focused on today are cyber mission force assessment, which is improving our ability to assess our training of the force, and two, traffic generation. Increasing the realism of operating [in] the internet,” Lt. Gen. Stephen Fogarty, commander of Army Cyber Command, told the industry audience during the remote event. These two focus areas emerged from multiple discussions with Cyber Command and the service cyber components, officials said. Part of what is driving the greater need to assess the force and understand its readiness is new reporting requirements from Congress. “The assessment functionally must be able to incorporate defined training standards which will enable USCYBERCOM to accurately measure and maintain team and mission readiness, which has become even more critical with the 2020 National Defense Authorization Act directing quarterly reviews of the cyber mission force's readiness,” said Col. Tanya Trout, the outgoing director of the Joint Cyber Training Enterprise, which is the nonmaterial component to PCTE at Cyber Command. “Being able to demonstrate how we're impacting readiness is the gamechanger.” A staffer for the House Armed Services Committee said the quarterly assessment is set to be delivered along with the quarterly briefing on cyber operations, as mandated in a previous NDAA. However, due to the ongoing pandemic, the committee has been unable to schedule the briefing. The staffer added that despite not having the report in hand, the committee is encouraged to see the Pentagon has made progress in creating metrics to evaluate the cyber mission force. Commanders also want a better way to see how their forces perform during training so they can review scenarios and modify it as needed. Specific requests to industry include planning tools, a scoring engine, an assessment repository and data collection, analytics dashboards and aggregation, and external reporting. “These capabilities will give commanders better tools to assess their force. Commanders will be able to look at data and assess individual ... and unit readiness. These capabilities will also give training managers planning tools to meet commander's goals,” Fogarty said. Regarding traffic generation, Fogarty said there's a need for forces to be able to operate across the continuum of the information environment, not just within a certain set of networks. These include friendly space, gray space — which refers to the neutral area of the broader internet — and adversarial networks (known as red space). “The environment that PCTE replicates has to actually replicate the real-world environment,” he said. “We need a way to define, shape and record realistic traffic emulation capabilities that mirror real-world activities and terrain across the cyber domain. But also, very importantly, in the information environment, that includes social media because it would be very simple for us if all we had to do was worry about just the network. What we have to worry about is the entire information environment.” The program office is now looking for host/user-based traffic activities, cyber traffic terrain, network traffic layers, information operations and social media layers, and traffic command-and-control dashboards. https://www.c4isrnet.com/cyber/2020/08/20/heres-what-us-cyber-command-wants-next-for-its-training-platform/

Toutes les nouvelles