18 février 2024 | International, Aérospatial

Before Russia satellite threat, there was Starfish Prime, ‘Project K’

Reports of the new anti-satellite weapon build on longstanding worries about space threats from Russia and China.

https://www.c4isrnet.com/battlefield-tech/space/2024/02/16/before-russia-satellite-threat-there-was-starfish-prime-project-k/

Sur le même sujet

  • Cyber Command will get a new version of its training platform this fall

    9 juillet 2020 | International, C4ISR, Sécurité

    Cyber Command will get a new version of its training platform this fall

    Mark Pomerleau U.S. Cyber Command's new training platform is slated to deliver the second iteration this fall providing additional capabilities and user capacity, program officials said. The Persistent Cyber Training Environment (PCTE) is an online client that allows Cyber Command's warriors to log on from anywhere in the world to conduct individual or collective cyber training as well as mission rehearsal. The program is being run by the Army on behalf of the joint cyber force and Cyber Command. Officials delivered the first version of the program to Cyber Command in February and the environment was used for the first time in Cyber Command's premier annual tier 1 exercise Cyber Flag in June. The second version is expected to include additional capabilities, including allowing more users to conduct team or individual training. “Things like to be able to schedule, have a calendar to be able to auto-schedule things, to be able to allocate resources because right now it's you can get in and you can do it but how do you deconflict? If you're running a team based event across x number of services how does somebody else come in and do an individual training,” Amit Kapadia, chief engineer for the program, told C4ISRNET in an interview. “Do you have the right infrastructure underneath?” Kapadia added that during the COVID-19 pandemic, there was a surge in platform use due to the remote working, thus, by the end of this year, the program seeks to push additional compute and network capabilities. Leaders are targeting final testing in September and then a roll out in late fall for version 2.0. The program has also sought to deliver incremental capability along the way through what it calls cyber innovation challenges. These are competitions to awards and layer new technologies onto the platform. There was a notice informing industry of the fourth such innovation challenge released recently. Officials told C4ISRNET they expect to release a formal solicitation around August, with plans to award contracts by the end of the year or early next year. The officials noted that just like with the previous innovation challenges, there could be multiple vendors awarded and specifically non-traditional defense vendors. Moreover, they also anticipate to continue these challenges for the foreseeable future even when a vendor is selected to be the integrator for PCTE through what's known as the Cyber Training, Readiness, Integration, Delivery and Enterprise Technology (TRIDENT), a contract vehicle to offer a more streamlined approach for procuring the military's cyber training capabilities. The contract is valued at up to $957 million. This approach, officials said, prevents vendor lock and ensures the program is at the tip of the technological spear. The fourth cyber innovation challenge seeks to ask industry for assistance in traffic generation – which means emulating fake internet traffic on the platform – and assessment, which was a key requirement directly from Cyber Command. “I would say what we've been driven towards right now are high priorities coming down from [Cyber Command commander] Gen. [Paul] Nakasone and Cyber Command for things like CMF assessment,” Kapadia said. “They want to be able now ... all these reps and sets that are happening within PCTE, how am I assessing the performance of the individuals in my teams.” An integrated and agile approach Since the platform was delivered to Cyber Command in February, command leaders have officially taken the burden of running training exercises from the program office, freeing it up to focus on pursuing new technologies and fixes as well as the overall acquisition. In the past, the program office worked with specific units to conduct training events in order to stress the platform and gain valuable feedback. Now, Cyber Command has created what is called the Joint Cyber Training Enterprise, which is the non-material companion to the PCTE platform and seeks to operate and synchronize training hosted by PCTE for the joint force. “The JCTE is a lot like the combat training center ops group where they are managing the platform, they are running the platform, they are running the training,” Lt. Col. Thomas Monaghan, product manager of cyber resiliency and training at Program Executive Office Simulation, Training and Instrumentation, told C4ISRNET. “So we delivered the platform to them and they're using it I would probably say on a weekly basis. They're doing cyber training events that we don't manage that anymore. We don't stand them up. The platform is being used, we're able to concentrate on specific capability, platform enhancements.” JCTE has formalized the cyber training and use of the environment while also coordinating which cyber mission force units need to conduct which types of training, something the program office wasn't equipped to do. Monaghan said his office is in almost hourly, or at least daily, contact with JCTE to better understand what users like, don't like or needs to be fixed. “We've got the program office, we've got the user community, we've got the operational arm of the user community, which is JCTE, we've got the Army capability manager codifying the requirements all working together. We literally talk to each other at least daily,” Monaghan said. “That direct feedback loop is one continuous circle of information. That's the only way a program this robust can be successful.” Program officials said they gained valuable insights from the recently concluded Cyber Flag, which created roughly six months worth of data. They explained that while not every element worked exactly as planned, the nature of the program allows for incremental and ongoing adjustments to be made. By leveraging specific flexible acquisition tools, the program is not as rigid as other typical military platforms, such as tanks. “It's a perfect one for PCTE because it created that box basically saying in laymen's terms we have no idea what this specifically looks like but we have some eye level things that it should do,” Liz Bledsoe, deputy product manager, told C4SIRNET, regarding the types of acquisition mechanisms PCTE is being run under. Monaghan added: “That's the way the platform and the program were structured when the requirements were written, some of them were listed as evolving or threat based or capability ... They're ever evolving, ever enhancing based off the needs of the cyber mission force.” https://www.c4isrnet.com/cyber/2020/07/07/cyber-command-will-get-a-new-version-of-its-training-platform-this-fall/

  • To maintain tech edge, US seeks export controls on AI

    21 novembre 2018 | International, C4ISR

    To maintain tech edge, US seeks export controls on AI

    By: Kelsey D. Atherton In just two words, the phrase “artificial intelligence” captures a deep techno-utopian promise, the notion that through craftsmanship humans can create learning and thinking machines outside the processes of organic life. AI is typically the realm of technologists and science fiction writers. Now it is also in the world of export controls prohibitions and restrictions on technologies as overseen by the Department of Commerce. In a proposed rule announced Nov. 19, the Bureau of Industry and Security wants to set out guidelines establishing “criteria for identifying emerging technologies that are essential to U.S. national security.” The stated goals of such controls are tied to both security and protectionism for existing American industry, especially the science, technology, engineering and manufacturing sectors. The proposed rules encompass 14 technologies, covering brain-computer interfaces to advanced surveillance technology. Nestled in that list of technologies is “artificial intelligence (AI) and machine learning technology,” which is further broken into 11 related tools. Here is a list of all the kinds of AI that the new rules seek to put under Commerce export controls: Neural networks and deep learning (e.g., brain modelling, time series prediction, classification) Evolution and genetic computation (e.g., genetic algorithms, genetic programming) Reinforcement learning Computer vision (e.g., object recognition, image understanding) Expert systems (e.g., decision support systems, teaching systems) Speech and audio processing (e.g., speech recognition and production) Natural language processing ( e.g., machine translation) Planning (e.g., scheduling, game playing) Audio and video manipulation technologies (e.g., voice cloning, deepfakes) AI cloud technologies AI chipsets Several of these are as much mathematical concepts, or processes, as they are distinct, controllable technologies. Others, like AI cloud technologies, suggest always-online servers, which by the very nature of the internet, are difficult to control within borders. Tackling an entire technological field, especially one with as low a barrier to entry as coding, is a tricky proposition, even in the instances where the technology is clearly defined. Why might the White House go through all this trouble? “These revisions could compose an important element of a strategy of targeted countermeasures against the near-term threat posed by China's tactics for tech transfer and the long-term challenge of China's emergence as a powerhouse in innovation,” said Elsa B. Kania, adjunct fellow at the Center for New American Security. “However, the revision of this traditional mechanism for today's challenges is inherently challenging, particularly when development is driven by commercial technologies.” Unlike, say, controlling the components and designs of missiles in the Cold War, many of the technologies covered under these proposed rules have both commercial and military applications. We need not look abroad to find this. Project Maven, the tool Google created to process images collected from drones, was built on top of an open-source library. Identifying objects in images is hardly a military-specific task. Should companies within the United States be restricted in how they create, sell and share those same tools with researchers and commercial companies outside American borders? “China's national strategy of military-civil fusion, which seeks to create and leverage synergies among defense, academic, and commercial technological developments in dual-use technologies, increases the ambiguity and uncertainty of tech transfer and collaboration,” Kania said. “That is, the boundaries between defense and commercial technologies can become quite blurred as a result of the nature of these technologies and the Chinese government's strategy for their integrated development.” Putting in place controls to hinder the free flow of AI between American companies and businesses abroad may mitigate that risk somewhat, but countries set on acquiring the tools can pursue research by other means, including technology transfers, espionage, theft through hacking, or even straightforward investment and acquisition. Staying ahead in artificial intelligence likely cannot be done through commerce restrictions alone. “The U.S. must recognize that such controls may slow and hinder China's advances in these emerging technologies, but China's emergence as a powerhouse and would-be superpower in such emerging technologies will remain a critical long-term challenge,” Kania said. “We must not only pursue such defensive countermeasures, but also undertake a more offensive approach to ensuring future American competitiveness through investing in our own innovation ecosystem.” https://www.c4isrnet.com/it-networks/2018/11/20/to-maintain-tech-edge-us-seeks-export-controls-on-ai

  • Le soutien aux exportations d'armement risque de mettre les armées sous tension pour certaines missions - Zone Militaire

    13 mai 2022 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    Le soutien aux exportations d'armement risque de mettre les armées sous tension pour certaines missions - Zone Militaire

    Comme l'a souligné la Cour des comptes dans le rapport qu'elle a publié le 11 mai sur les capacités des forces françaises, la trajectoire financière

Toutes les nouvelles