6 août 2018 | International, Aérospatial

Bell Pushes V-280 Gunship, Shipboard Variants: Recon In Works

One variant, in Army colors, has missile racks sticking out of what was originally the passenger cabin — a conversion that units could potentially install or remove as needed in the field. The other, with Marine Corps markings, is a sleeker thoroughbred gunship with internal weapons bays, stealth features, and folding wings to fit in shipboard hangars.

By

ARLINGTON: How new is Bell Helicopter's shiny showroom — excuse me, Advanced Vertical Lift Center — minutes from the Pentagon and the Capitol? Between the time I arrived this morning and the time I headed out, they installed two huge mockups of their high-speed V-280 Valor tilrotor. But these aren't land-based troop transports like the prototype Bell's already flying for the Joint Multi-Role (JMR) demonstration program. They're heavily armed gunships.

One, in Army colors, has missile racks sticking out of what was originally the passenger cabin — a conversion that units could potentially install or remove as needed in the field. The other, with Marine Corps markings, is a sleeker thoroughbred gunship with internal weapons bays, stealth features, and folding wings to fit in shipboard hangars.

Bell showed off these mockups before, but there's almost no imagery available online, so when executives said I was free to take photos, I had my phone out at once. Equally interesting was what they said about another design they've still got under wraps: Bell's contender for the Army Future Attack Reconnaissance Aircraft(FARA), a scout light, small, and agile enough to avoid detection by flying down city streets.

https://breakingdefense.com/2018/08/bell-pushes-v-280-gunship-shipboard-variants-recon-in-works/

Sur le même sujet

  • Cyberattack risk poses biggest threat to airports, aviation

    12 septembre 2018 | International, C4ISR

    Cyberattack risk poses biggest threat to airports, aviation

    Ben Goldstein A senior official from Tampa International Airport (TPA) told US lawmakers the risk of cyberattack “without question represents the preeminent and persistent threat” to global aviation. The comments came during a Sept. 6 joint hearing of the House Homeland Security Committee's Cybersecurity and Transportation Security subcommittees, held to examine cyber threats to aviation. “In today's modern and technologically advanced airports, there are virtually no areas or functions that do not rely at some level on a digital network,” TPA EVP-IT and general counsel Michael Stephens said. “The operational importance of these systems ... makes airports immensely appealing targets and potentially vulnerable to malicious cyber threats, such as criminal organizations and state sponsored actors.” In his testimony, Stephens said US airports have reached a point “where voluntary compliance is no longer adequate,” and asked lawmakers to consider mandating the adoption of “uniform minimum cyber security standards and frameworks.” He also said the “human factor remains the most highly exploited vector” for breaching cyber defenses, and threat awareness and information security training programs for airport, airlines and aviation industry employees are “perhaps one of the most effective and cost-efficient ways of increasing airports' and airlines' cybersecurity readiness.” Lawmakers also heard from Christopher Porter, chief intelligence strategist at cybersecurity group FireEye, Inc., who testified that state-backed hackers are “routinely” targeting the US aviation industry through cyberespionage to steal industrial secrets from manufacturers, researchers and operators of military and civilian aircraft. Porter called cyberespionage the “most common cyber threat facing the aviation industry,” and said that hackers sponsored by China, Russia and more recently Iran have all “targeted the US or its close allies for theft of aviation secrets.” All three countries also routinely target ticketing and traveler data, shipping schedules and even partner industries like railways or hotels as part of their counterintelligence efforts, Porter added. However, Porter reminded lawmakers that, because cyber-espionage is routine, “it should not be viewed as destabilizing.” “When cyberespionage operators get a foothold on a system, they can often use that access for stealing information or to launch a disabling or destructive attack using the same technology,” Porter said. “But they rarely choose to do so, and in the US, there are significant redundancies in place to ensure safety. A crashed IT system does not mean a crashed plane, and it's important for the public to keep that in mind.” http://atwonline.com/security/cyberattack-risk-poses-biggest-threat-airports-aviation

  • No title found

    26 mai 2022 | International, Aérospatial

    No title found

    B-21’s loads calibration about half complete; rollout still expected this year.

  • Defense Digital Service, Army Cyber Command expand partnership with workspace ‘Tatooine’

    26 octobre 2018 | International, C4ISR

    Defense Digital Service, Army Cyber Command expand partnership with workspace ‘Tatooine’

    by Samantha Ehlinger The Defense Digital Service and Army Cyber Command's growing partnership is getting its own workspace in downtown Augusta, Georgia, DDS announced Thursday. Dubbed Tatooine, the new workspace located at the state-owned Georgia Cyber Center is the expansion of the Jyn Erso pilot project launched last year to join DDS staff and Cyber Command soldiers to solve hard problems. The new space officially opened Thursday with a day-long hackathon “for cyber soldiers and the local tech community,” according to a press release. “Tatooine will be a beacon for technical talent across the military — a place to write code and solve problems of impact,” DDS Director Chris Lynch said in an announcement. “Through this partnership, we are setting our best technical warfighters against our toughest problems with support and training from our DDS software engineers and experts. Together, men and women in uniform and tech nerds are finding new ways to rapidly solve high-impact challenges.” The Army is gradually relocating its Cyber Command headquarters to nearby Fort Gordon. The state's CIO Calvin Rhodes said this week that the center will play host to the unclassified training sessions for personnel who are waiting for their security clearances to be completed, a process that can often take at least six months, sister publication StateScoop reported. The National Security Agency, which has an outpost at Fort Gordon, will also have a presence at the Georgia Cyber Center. Officials said the $100 million development is the single-largest investment by a state in a cybersecurity facility. Tatooine will join Army officers and soldiers with DDS technologists to tackle hard problems in unclassified “startup-like spaces” using private sector tools and methodologies, according to the Pentagon. “For instance, project teams are using concepts of continuous software iteration and user-centered design, which are common in the tech sector, but not in the military,” the department said. Tatooine is a way for DDS and Army Cyber Command to create more pilot teams without having to relocate Cyber Command personnel to Washington D.C. Other planned uses for Tatooine include supporting initiatives like the Hack the Army bug bounty program. Army's Cyber Command and Cyber Center of Excellence are providing the technical soldiers to staff teams and Professional Military Education credit for time spent in the program, according to the announcement. Senior Army officers from the center and the Army Cyber Institute will oversee day-to-day operations in the workspace and report to DDS. “To help the Army resolve its toughest talent management and technical challenges, DDS and U.S. Army Cyber Command (ARCYBER) have partnered to bring technically-gifted soldiers together with private sector civilian talent to rapidly develop immediate-need cyber capabilities,” Lt. Gen. Stephen Fogarty, head of the command, said in a statement. “This innovative partnership will solve tough problems and serve as a powerful retention and recruitment tool.” Through the Jyn Erso program, project teams have already tackled a few projects, such as a program to develop, produce and deploy a capability to combat commercial drones. “The team developed a low-cost software system that is flexible enough to adapt to newly identified targets and easy for operators to use and transport in austere conditions,” the announcement said. DDS and the Cyber Center of Excellence also launched a training pilot earlier this year as part of Jyn Erso to streamline cyber training courses. In its first iteration, DDS cut down the training time for a subset of Army soldiers from six months to just 12 weeks. We know what you're wondering, and yes, the names of the workspace and the pilot are Star Wars references. DDS, since its inception, has referred to itself as the Rebel Alliance ( a shoutout to the good guys in Star Wars), even naming the Pentagon's landmark $10 billion commercial cloud contract the Joint Enterprise Defense Infrastructure, or JEDI. https://www.fedscoop.com/defense-digital-service-army-cyber-command-expand-partnership-workspace-tatooine/

Toutes les nouvelles