28 juin 2021 | International, Aérospatial

Bell V-280 Valor tech demonstrator retires from flight

The V-280 Valor first flew in December 2017 and is now retiring from flight as Bell prepares to compete to build the Army's future long-range assault aircraft.

https://www.defensenews.com/land/2021/06/24/bell-v-280-valor-tech-demonstrator-retires-from-flight

Sur le même sujet

  • German cyberwarriors assert right to ‘hack back’ when attacked

    8 août 2018 | International, C4ISR

    German cyberwarriors assert right to ‘hack back’ when attacked

    By: Sebastian Sprenger COLOGNE, Germany – German authorities believe they are on firm legal footing to retaliate against cyber attacks by unleashing digital or conventional counterattacks, according to a series of recent written responses by government officials to lawmakers. The documents shed light on some of the legal considerations of cyber-warfare mulled in Berlin, just as the Bundeswehr moves toward full operational capability of a new command devoted to cyber operations. Some of the assertions outlined in a missive last month are surprisingly hawkish for a country reflexively averse to the use of military force. While acknowledging certain gray areas in responding to potentially crippling cyber attacks, officials also made clear that defending the country would afford the security services broad leeway under international law. “Just as in the land, air and naval domains, the Bundeswehr possesses 'active and reactive' capabilities that can be used for lawful operations,” Peter Tauber, the parliamentary deputy defense secretary, wrote to a collection of lawmakers from the opposition Green Party. So-called hack backs, or the retaliatory targeting of an attacker's information infrastructure, fall into that category, according to Tauber. As such, no new legal authorities for cyber defense would be required, he argued. At the same time, officials noted that such counterattacks would be permitted only as a counter-strike, not as an unprovoked act. Full Article: https://www.fifthdomain.com/global/europe/2018/08/07/german-cyberwarriors-assert-right-to-hack-back-when-attacked/

  • Oshkosh, Saudi Arabia’s Al Tadrea launch joint venture to make armored vehicles

    19 mai 2020 | International, Terrestre

    Oshkosh, Saudi Arabia’s Al Tadrea launch joint venture to make armored vehicles

    By: Agnes Helou BEIRUT — American firm Oshkosh Defense and Saudi Arabia's Al Tadrea Manufacturing Company have established a joint venture to manufacture armed vehicles in the kingdom. The two companies formed Oshkosh Al-Tadrea Manufacturing, creating “the largest partnership in the history of Saudi armored vehicles,” according to a message on Al Tadrea's official Twitter account. Defense News reported in 2017 that Al Tadrea was in talks with Oshkosh to manufacture armored vehicles in Saudi Arabia. Al Tadrea CEO Fawzi Bin Ayoub Sabri confirmed during an interview that year at the Bahrain International Defence Exhibition and Conference that his company was “"discussing partnerships with many international companies, particularly negotiating with Oshkosh Defense to produce armored vehicles.” Wednesday's online signing ceremony was held between officials and senior executives of the two companies. The joint venture, also known as OTM, will be based in Saudi Arabia, and the kingdom will hold the largest property share, according to a May 14 report by the Saudi Press Agency. “The joint venture will design and provide its first vehicles to be built based on the model of the Oshkosh Defense vehicle in the medium-sized 4×4 Tactical Vehicle (FMTV) category,” the press agency reported. OTM will “develop manufacturing expertise to become a major partner for wheeled tactical vehicle services, [and] it will also provide the necessary services to its customers in the security and military sectors in the Kingdom, through an integrated and sustainable support fleet, as well as activating the supply chains more broadly and more efficiently,” the report read. In a speech during the virtual ceremony, the head of Al Tadrea said: "The current efforts made by the kingdom in the field of industries, especially military industries, demand from us to move forward and follow the government's directions to achieve everything related to homeland security, and to raise the efficiency of military industries and the support of Saudi talents and human capabilities that we rely on by providing job opportunities to the Saudis.” For his part, John Bryant, the president of Oshkosh Defense and the executive vice president of its parent company, Oshkosh Corporation, said that “both Oshkosh Defense and Al Tadrea Manufacturing have worked closely for more than two years to establish this joint venture, by transferring its technology and capabilities. We are very excited to cooperate with this Saudi company with a solid history.” The two firms prepared for this joint venture by providing training opportunities and accreditation certificates to future OTM employees. The training sessions covered manufacturing, repairing and joint maintenance of M-ATVs, which are mine-resistant, ambush-protected vehicles made by Oshkosh and currently in service within the Royal Saudi Land Forces. https://www.defensenews.com/industry/2020/05/14/oshkosh-saudi-arabias-al-tadrea-launch-joint-venture-to-make-armored-vehicles/

  • Watchdog says Pentagon needs better planning for IP update 17 years after first attempt

    4 juin 2020 | International, C4ISR, Sécurité

    Watchdog says Pentagon needs better planning for IP update 17 years after first attempt

    Andrew Eversden A federal watchdog found that poor planning by the Department of Defense has blurred the department's understanding of the risks and costs associated with upgrading the system that routes internet traffic across the globe, known as Internet Protocol version 6 (IPv6). According to a June 1 report from the Government Accountability Office, the Pentagon needs to improve its transition planning for the most recent effort, which began in April 2017. The DoD has tried twice previously to implement IPv6 in 2003 and 2010, but stopped those transitions after identifying security risks and lacking adequately trained personnel. The problem for the DoD is that IPv4, the IP management system the DoD uses, is running out of address space. IPv4 only has room for 4.3 billion addresses. In contrast, IPv6, created in the 1990s, provides about 340,000,000,000,000,000,000,000,000,000,000,000,000 (undecillion) IP addresses. The Defense Department owns approximately 300 million IP addresses with about 59.8 million unused and planned for use by future DoD components. The department estimates it will run out of its unused IP addresses by 2030. The department's IPv6 implementation plan from early 2019 listed 35 actions needed to switch over from IPv4. Eighteen of those steps were scheduled to be completed by March 2020. The report said six of the 18 tasks were completed on time. Upgrading to IPv6 would increase connectivity, add security, improve the warfighter's connection and communications on the battlefield, and preserve interoperability with allied systems, the GAO wrote. The watchdog found that the department was not compliant with several IPv6 transition requirements from the White House's Office of Management and Budget. The DoD hasn't completed a cost estimate, developed a risk analysis or finished an inventory of IP compliant devices, the report said. Pentagon officials told the GAO that they knew their time frame for the transition was “optimistic," adding that they thought the pace was reasonable "until they started performing the work,” the GAO wrote. “Without an inventory, a cost estimate, or a risk analysis, DOD significantly reduced the probability that it could have developed a realistic transition schedule,” the GAO wrote. “Addressing these basic planning requirements would supply DOD with needed information that would enable the department to develop realistic, detailed, and informed transition plans and time frames.” The Department did meet OMB's requirement to name an official to lead and coordinate the agency planning. But because the Pentagon failed to complete the other three OMB requirements. the move is at risk. “Without an inventory, a cost estimate, or a risk analysis, DOD's plans have a high degree of uncertainty about the magnitude of work involved, the level of resources required, and the extent and nature of threats, including cybersecurity risks,” the GAO wrote. Among the DoD's goals it did complete are several IPv6 training programs, information sharing opportunities and a program management office. The GAO recommended that Defense Secretary Mark Esper direct the DoD chief information officer to complete an inventory of IP-compliant devices, develop a cost estimate and perform a risk analysis. The DoD agreed that it needed to develop a cost estimate and risk analysis but didn't concur that it needed to inventory devices, citing new guidance from OMB and calling an inventory “impractical” because of the department's size. “The lack of an inventory is problematic due to the role that it should play in developing transition requirements,” the GAO wrote. https://www.c4isrnet.com/it-networks/2020/06/02/watchdog-says-pentagon-needs-better-planning-for-ip-update-17-years-after-first-attempt/

Toutes les nouvelles