15 juillet 2019 | International, Autre défense

Army to Receive 7.62mm Squad Marksman Rifles as Early as Next Year

By Matthew Cox

Heckler & Koch Defense Inc. will soon begin delivering thousands of 7.62mm squad-designated marksman rifles to the Army to give infantry and other close-combat units a better chance of penetrating enemy body armor.

H&K will deliver "between 5,000 and 6,000" variants of the G28 rifle, which the Army plans to issue as its new squad designated marksman rifle (SDMR), according to a July 12 H&K news release.

Under the agreement, the rifles will be manufactured by H&K in Oberndorf, Germany, and will begin to arrive in the H&K-USA facility in Columbus, Georgia, early next year, according to the release. Once there, H&K-USA workers will install scopes and mounts purchased by the Army under a separate agreement.

"This is a significant achievement for Heckler & Koch," H&K-USA's chief operating officer, Michael Holley, said in the release. "The HK SDMR system will add much-needed capabilities to virtually every squad in the Army. We are honored by this opportunity."

The new SDMRs are part of an interim effort to make squads more lethal ahead of the Army's fielding of the Next-Generation Squad Weapon system sometime in 2022, service officials have said.

In May 2017, Army Chief of Staff Gen. Mark Milley told Senate Armed Services Committee members that the service's current M855A1 Enhanced Performance Round will not defeat enemy body armor plates similar to the U.S. military-issue rifle plates such as the Enhanced Small Arms Protective Insert, or ESAPI.

As a short-term fix, the Army selected the G28 as its M110A1 Compact Semi-Automatic Sniper System in 2016, to be used with the service's new 7.62mm enhanced performance round to give squads more penetrating power.

In the past, the Army relied on the Enhanced Battle Rifle, or EBR, 14 -- a modernized M14 equipped with an adjustable aluminum stock with pistol grip, scope and bipod legs -- to fill the growing need by infantry squads operating in Afghanistan to engage enemy fighters at longer ranges.

But the EBR is heavy, weighing just under 15 pounds unloaded. The M110A1 weighs about 11 pounds.

In the long term, the Army is working with gunmakers to develop the new Next Generation Squad Weapon (NGSW) that is slated to fire a special, government-produced 6.8mm projectile that promises higher velocities at greater ranges, service officials say.

The program is being designed to produce an automatic rifle version to replace the M249 squad automatic weapon and a carbine version to replace the M4 carbine.

Army officials said recently that they expect to begin receiving prototypes of the NGSW in July and August and that the weapon could be fielded to units beginning in late fiscal 2020.

https://www.military.com/daily-news/2019/07/12/army-receive-762mm-squad-marksman-rifles-early-next-year.html

Sur le même sujet

  • The largest cyber exercise you’ve never heard of

    25 février 2020 | International, Aérospatial, C4ISR, Sécurité

    The largest cyber exercise you’ve never heard of

    For years, the first time the Department of Defense's cyber forces faced high-end digital attacks was not in practice or in a classroom, but in actual operations. For the cyber teams that focused on offense, a playbook developed from years of National Security Agency operations guided their work. But on the defensive side, standards and processes needed to be created from scratch meaning, in part, there was a lack of uniformity and little tradecraft to follow. Because cyber leaders had focused on staffing, training opportunities for defensive cyber operators had been sparse. To help solve that problem, the Department of Defense is expected to award a contract worth roughly $1 billion later this year for a global cyber training environment. But in the meantime, some units across the joint force have gone so far as to create their own small-scale training events and exercises to keep their forces' skill sets sharp. Perhaps the best example of these efforts are the 567th Cyberspace Operations Group's “Hunt Event,” which has quickly grown to become one of the largest cyber exercises across the department. The bi-monthly exercise pits teams against each other in a competition for the coveted Goblet of Cyber trophy and bragging rights. The group aims to better train defensive hunters, improve defensive tactics, techniques and procedures and develop defensive tradecraft. “The point of this was that we didn't really have a good range space to play on that had an active and live adversary so we could, in theory, replay traffic and we could go in and generate some easy kill, low hanging fruit signatures for detection,” Capt. Reid Hottel, training flight commander at the 837th Cyber Operations Squadron, told Fifth Domain. “If we are supposed to be the primary counter to advanced persistent threats, the way that we were training was not like how we were fighting.” The exercises started roughly a year ago to teach operators how to hunt on networks. It's now evolved to where participants also work on leadership skills and build custom exploits on a large range with multiple stakeholders. In addition to the Air Force CPTs — the defensive cyber teams each service provides to U.S. Cyber Command — members from the Air Force Office of Special Investigations and Mission Defense Teams, specialized defensive cyber teams that will protect critical Air Force missions and local installations, also take part. At the most recent exercise in January, a representative from NASA participated. Now, the exercises have become so popular Hottel said other services are interested in participating in the future. This includes a Marine Corps CPT at Scott Air Force Base. Building better leaders and hunters To be the best, cyber leaders recognized their teams would have to beat the best and that meant training against the world's most advanced cyber threats. Some other forms of training — such as the popular capture the flag game, which involve teams trying to find “flags” such as files or scripts inside a network — are not always the most realistic form of training. “When we were fighting, we're up against advanced adversaries. We're up against adversaries that are using tactics, techniques and procedures that are just above and beyond what simple little [scripts] ... we were using in the past,” Hottel said. “This hunt exercise allows us to do that, whereas in the past, particularly in other flag exercises, we are not training at the APT level. We [were] training at the script kiddie kind of level and here we're training at a much higher difficulty, which stretches and grows our operators into being true hunters.” He added that the exercises are also helping develop tradecraft. “That's one thing that nobody really teaches, there's no commercial course that you can go buy that teaches tradecraft, that teaches the military away, that teaches the way that we use to find the APT, which in theory, should be ever evolving because our adversary is as well,” Hottel said. “These exercises have been really eye-opening to provide tradecraft development, to become hunters, to understand what it means to be a cyber protection team.” The exercise has evolved to include custom exploits, custom root kits, custom attacks and zero-day exploits within a real-world mission where in some cases hunters don't have any indictors of compromise that exist in the public domain. This means that there is no public reporting available on the exploits or tactics the adversary is using. Participants can hone their skills, by actively hunting on a network in order to find anomalies that could lead to trouble. “As hunters,” he said, “we don't necessarily have singular methodology, we don't necessarily have a unique way that we can go about finding advanced threats mostly because we haven't really been training like that.” The training is also helpful for new mission defense teams, which are just being officially resourced within the Air Force around local installations. By having those teams sit next to CPTs, who are using generally the same tools, they can learn about tradecraft and what to look for at the local level. During the most recent exercise, officials said it was the first time they intentionally tried to trip up participants. Organizers created fake attack chains to see how the players scoped an investigation into a network and deducted points for the amount of time they wasted following that lead. This technique helps teach teams how to scope investigations without going down “rabbit holes,” and not adequately planning, Lt. Christopher Trusnik, chief of training at the 835th Cyberspace Operations Squadron, told Fifth Domain. Beyond the technical hunting, this approach helped team leader to flex leadership muscles. “It was more of teaching that leadership technique of you plan for this, how do you investigate quickly and how do you triage your investigation,” Trusnik, whose unit ran the January exercise, said. Hottel explained that following this most recent event, teams focused on leadership and organization. At one point, someone on his team previously had been coached on what they needed to include such as specific indictors that might be valuable to their mission partners to understand. At this exercise, they included those indicators. In another instance, one team member who had never run a hunt mission struggled at first. Hottel stepped in and with just a little guidance, the leader became more disciplined and was able to find things much better in the last three days. Benefits of cyberspace in training Training in cyberspace has benefits that other domains don't offer. For one, forces don't need a dedicated battlespace such as the Army's National Training Center or the range used at Nellis Air Force Base for the Air Force's Red Flag. With cyber, a custom range can be built and forces from all across the world can come in and participate. The range used for the hunt exercises stays up weeks after the formal event so individuals or teams can try their hand, though they obviously won't be eligible for the Goblet of Cyber trophy. All of this could change with the Persistent Cyber Training Environment (PCTE). PCTE is a major program being run by the Army on behalf of Cyber Command and the joint force to provide a web-based cyber training environment where cyber warriors can remotely plug in around the world and conduct individual training, collective team training or even mission rehearsal — all of which does not exist on a large scale currently. Hottel said that his forces haven't been limited thus far without PCTE. Though, once the platform is online, they can upload the range they used for a competition and it can be accessed by anyone across the joint cyber mission force. Testing new concepts But in the meantime, smaller, unit level exercises like those run by the 567th allow forces to test concepts and learn from others. Unlike larger exercises that have requirements and stated objectives, smaller exercises can serve as a proving ground for staying sharp and pushing the envelope. This allows local units more control over what their personnel do but can also allow teams to test new concepts in a relatively risk-free environment. “Let's say that a national [cyber protection] team wants to test out ... whatever they're currently using because they feel like it would provide them an advantage so they want to test out something,” Hottel said. “We can throw that on the range as well and they can utilize an entirely defensive tool set. We're not trying to make people tool experts, we're trying to make them tradecraft, defensive hunters.” Hottel also said that personnel playing on the archived range can bring new ideas, which can then be tested during the next exercise. In some cases, they may come up with an idea on their own and bring it to the next exercise to see if it actually works. Ultimately, the event is designed to create better cyber warriors. “We're not trying to make people tool experts, we're trying to make them tradecraft, defensive hunters,” Hottel said. https://www.fifthdomain.com/dod/air-force/2020/02/21/the-largest-cyber-exercise-youve-never-heard-of/

  • Pentagon, Defense Contractors Are Out Of Step On Tech Innovation, GAO Finds

    4 septembre 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité, Autre défense

    Pentagon, Defense Contractors Are Out Of Step On Tech Innovation, GAO Finds

    PATRICK TUCKER Two years after the Pentagon set out to spend billions on 10 breakthrough research and engineering efforts, defense contractors instead are putting most of their money in less ambitious research projects. The development gap between the military and its suppliers troubled investigators at the Government Accountability Office, or GAO, who determined in a report released Thursday that the Defense Department isn't keeping good watch over those private efforts and doesn't know how much of it would fit into the military's tech goals. The Pentagon's undersecretary for research and engineering in 2018 laid out several big idea research areas that would be most relevant to maintaining an edge on China or Russia. Many are in the very early stages of maturation; the biggest breakthroughs are expected in the second half of the coming decade. They are: artificial intelligence, autonomy, biotechnology, directed energy, space, cyber, microelectronics, hypersonics, networked command and control, and quantum science. These areas of the future will go on to determine technology superiority in 2030, and the Department of Defense is eager to invest . It plans to spend $7.5 billion on artificial intelligence, autonomy, hypersonics, and directed energy this year, according to the report. But GAO found that defense contractors in the past four years have been putting only 40 percent of their independent research dollars, sometimes called IR&D, against those priorities. Coincidently, “our analysis also showed that the majority (67 percent) of IR&D projects completed between 2014 and 2018 focused on incremental, rather than disruptive, innovation.” In other words, while defense contractors are spending some of their money on big ambitious goals, they prefer to spend more on low-hanging fruit, in little improvements to existing technologies that they can sell to the government more easily. Part of the reason for the apparent spending priority gap may be that the Defense Department doesn't track contractors' research and development spending very well. “Neither DOD nor the military departments review industry IR&D projects as part of their science and technology strategic planning processes. DOD is not reviewing IR&D projects because DOD's IR&D instruction does not require such consideration of the projects,” notes GAO. The Defense Department maintains a database to track the projects where contractors are spending research money. But individuals within the department make very little use of it. “For example... the Air Force accounted for more than 55 percent of all searches in 2019, primarily, from users with the Air Force Research Laboratory (AFRL).” The Pentagon's own lack of awareness could result in components, offices, or other parts of the military investing in research projects without knowing that a private company has a similar project underway. GAO recommends a few simple things to put the Pentagon and contractors more on the same page. First, make it mandatory for personnel in the office undersecretary of research and development to actually review defense industry IR&D; and, second, make the database more useful by asking the contractors to submit more data, like whether the projects they are undertaking are disruptive or just incremental, and the estimated cost when completed. https://www.defenseone.com/technology/2020/09/pentagon-defense-contractors-are-out-step-tech-innovation-gao-finds/168237/

  • The Army needs a near-term strategy for the 2020s

    12 octobre 2023 | International, C4ISR

    The Army needs a near-term strategy for the 2020s

    The U.S. Army must close the munitions gap, improve the survivability of tanks and strengthen competencies within the electromagnetic spectrum.

Toutes les nouvelles