26 avril 2023 | International, Aérospatial

Army evaluating future of heavy-lift helicopters

The US Army is taking a look at possible avenues to pursue a future heavy-lift aircraft.

https://www.defensenews.com/digital-show-dailies/aaaa/2023/04/26/army-evaluating-future-of-heavy-lift-helicopters/

Sur le même sujet

  • Private-equity firm acquires aviation firm Kaman for $1.8 billion

    21 janvier 2024 | International, Aérospatial

    Private-equity firm acquires aviation firm Kaman for $1.8 billion

    Kaman, known for its K-MAX helicopter and KARGO UAS, will become a privately held company upon its sale to a private-equity firm.

  • U.S. Military Turns To Remote Pilot Training

    15 juin 2020 | International, Aérospatial

    U.S. Military Turns To Remote Pilot Training

    Lee Hudson June 11, 2020 Once the global coronavirus pandemic hit the U.S., the military moved to ramp up remote pilot training options. But it is unclear if the trend will continue after the contagion passes. Before COVID-19, the Air Force was developing immersive training devices that would help instruct students remotely as part of Air Education and Training Command's Pilot Training Next program, says Lt. Col. Ryan Riley, commander of Detachment 24. Instead of the pupil coming into the office, receiving an in-person brief, locating a training device and executing a mission, Riley's team was looking at how to conduct those events with both the student and instructor at separate locations. Army pauses to assess training options Air Force and Navy immediately pivot to remote instruction “What we wanted to see, prior to COVID-19, was how far [we could] push the bounds of remote instruction,” Riley says. The pandemic turned that desire into a need to provide students the same level of instruction remotely as they would in person. The Air Force and training companies were already working to develop virtual training systems when COVID-19 struck, and the pandemic seems to have accelerated adoption. “There are only so many places to train,” says Todd Probert, defense and security group president at CAE. Though the military was once reluctant to fully tap into distance training, the question has become: “Is there a way to centralize that instruction?” he says. Pilots more than 100 mi. from a training base would be required to quarantine for two weeks once they arrived. The technology, however, was “very glitchy,” Riley says. The main problem was latency. So the team got to work, disassembling hardware and issuing the newest equipment to students and some of the instructor corps. Another issue was the fact that the detachment's home-use devices were running off a laptop. The team discovered that various software programs such as remote screen-sharing were taxing the central processing unit (CPU) heavily, overwhelming laptops, says Lt. Col. Robert Knapp, Detachment 24 operations officer. “No matter how good a laptop you buy, they're just never going to run at the same speed as a desktop computer,” Knapp says. “We took some of our older desktop computers that were in the building and sent those home with students to replace the laptops, which opened up a lot more CPU bandwidth.” The students also were asked to plug their devices into their routers instead of using wireless home internet, which reduced latency and resulted in a more streamlined, less glitchy process. Meanwhile, the Army was tackling similar challenges at Fort Rucker in Dale County, Alabama, where the service produces pilots to fly the Boeing AH-64 Apache and CH-47 Chinook and Sikorsky UH-60 Black Hawk. In addition to training its own pilots at Fort Rucker, the service also assists with the training of foreign military aviators from as many as 47 countries annually at the base. The Army established a virtual instructor's course so that the instructor pilots could learn how to teach using a digital platform, says Maj. Gen. David Francis, U.S. Army Aviation Center of Excellence and Fort Rucker commanding general. “COVID-19 has enabled us to really take a look at ourselves and how we're delivering training,” he says. Francis envisions a blend of in-person and virtual training once the crisis passes. As the pandemic took hold, the Navy, too, set up remote instruction with unprecedented speed. With 45 students per class, the service would not have been able to comply with social distancing guidance from the Centers for Disease Control and Prevention, according to Lt. Tim Benoit, aviation preflight indoctrination instructor at Naval Aviation Schools Command located in Pensacola, Florida. So in just five days, the Navy created a digital classroom and launched classes for its student Coast Guard, Marine Corps and Navy pilots. Benoit had selected flight instructors to test the new digital system, and the next day he prepared a presentation to train the rest of the instructors. “We were able to adapt to this without missing any productivity targets,” Benoit says. The Navy does not plan to employ remote instruction after the COVID-19 crisis but views the technology as an alternative when a natural disaster such as a hurricane hits. The service is recognizing the advantages of remote learning, however, which include saving time and money. Students have access to each session's recording and associated course materials, and the technology would allow students not in Pensacola to take the courses. “It can also be used in conjunction with in-person training to prep students . . . and it's been used to enable guest speakers” in another city, Benoit says. “Those are some things that I think may persist beyond the pandemic.” https://aviationweek.com/defense-space/budget-policy-operations/us-military-turns-remote-pilot-training

  • How tensions with Iran could test a new cyber strategy

    10 janvier 2020 | International, C4ISR, Sécurité

    How tensions with Iran could test a new cyber strategy

    Mark Pomerleau In 2018, the Department of Defense began following a new philosophy for cyber operations to better protect U.S. networks and infrastructure. Known as “defend forward,” the approach allows U.S. cyber forces to be active in foreign network outside the United States to either act against adversaries or warn allies of impending cyber activity that they've observed on foreign networks. After the U.S. military killed an Iranian general in a Jan. 2 drone strike and after national security experts said they expect Iran might take some retaliatory action through cyber operations, the specter of increased cyber attacks against U.S. networks puts Cyber Command and its new approach front and center. “This Iran situation today is a big test of the ‘defend forward' approach of this administration,” James Miller, senior fellow at Johns Hopkins Applied Physics Laboratory and former undersecretary of defense for policy, said at a Jan. 7 event hosted by the Council on Foreign Relations. “Will [Cyber Command] take preventative action? Will they do it in a way that our allies and partners support and that can be explained to the public?” While Iran fired several missiles Jan. 7 at a base in Iraq where U.S. troops lived as an initial response to the drone strike, many national security experts expect Iran could continue cyber actions as further retaliation for the strike. Iran could also ratchet up its cyber operations in the United States following the collapse of portions of the 2015 nuclear deal between the United States, Iran and five other nations to curb Iran's nuclear weapons capability in return for sanctions relief. Over the past 12 months, the White House and Congress streamlined many of the authorities used to conduct cyber operations to help cyber forces to get ahead of threats in networks around the world. One such provision in last year's annual defense policy bill provides the Pentagon with the authority to act in foreign networks if Iran, among other named nations, is conducting active, systematic and ongoing campaigns of attacks against the U.S. government or people. Cyber Command declined to comment on what, if anything, they were doing differently since the drone strike. Some experts, however, have expressed caution when assessing how well this defend forward approach has worked thus far given it is still relatively new. “The jury is very much still out here,” Ben Buchanan, assistant professor and senor faculty fellow at Georgetown University, said at the same event. “We don't have a lot of data, there's been a lot of hand-wringing ... about these authorities and about how Cyber Command may or may not be using them. I just don't think we've seen enough to judge whether or not ... [it is] meaningfully changing adversary behavior.” Others have also expressed reservations about how effective Iran can even be in cyberspace toward U.S. networks. “Iran is a capable cyber actor, Iran is a wiling cyber actor. That means Iran will conduct cyberattacks,” said Jacquelyn Schneider, Hoover fellow at the Hoover Institution at Stanford University. “It's not like they have this capability and they've been deterred in the past and maybe now they're going to turn it on. I think they've been trying this entire time.” Complicating matters further could be other actors trying to take advantage of U.S.-Iran imbroglio for their own interests. Priscilla Moriuchi, senior principal researcher and head of nation-state research at threat intelligence firm Recorded Future, said over the past several months, there have been reports of Russian state-affiliated actors hijacking Iranian cyber infrastructure to conduct operations masquerading as Iranians. “That creates its own uncertainty,” she said at the same event. “Another level of potential what we call inadvertent escalation if a country perceives that they are attacked by Iran but in reality, it” wasn't. https://www.fifthdomain.com/dod/2020/01/09/how-tensions-with-iran-could-test-a-new-cyber-strategy/

Toutes les nouvelles