15 septembre 2021 | International, C4ISR

British military taking steps to make multidomain integration a reality

Although the concept of operations still needs to be fleshed out, the MoD has identified several capability themes to be developed '€œover this autumn period to Christmas,'€ to be culminated in a new management strategy and implementation plan.

https://www.defensenews.com/2021/09/14/british-military-taking-steps-to-make-multidomain-integration-a-reality/

Sur le même sujet

  • Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials

    22 septembre 2024 | International, C4ISR, Sécurité

    Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials

    Global authorities dismantle iServer phishing platform, responsible for unlocking 1.2M stolen phones, impacting 483,000 victims.

  • Kongsberg has signed CROWS contract worth MUSD 48

    18 septembre 2019 | International, Terrestre

    Kongsberg has signed CROWS contract worth MUSD 48

    Kongsberg Defence & Aerospace AS (KONGSBERG) has signed a new contract for new remote weapon stations (RWS) to the American CROWS-program, worth MUSD 48. The order intake from the CROWS-program has been good in the third quarter, and with this contract the total order income during the quarter from the CROWS-program amounts to MUSD 89. These orders are related to CROWS framework agreement (Indefinite Delivery/Indefinite Quantity - IDIQ), which was announced 14 September 2018 with a total scope up to MUSD 498. With these latest contracts, KONGSBERG has signed contracts worth MUSD 340, equivalent to 68% of the total framework agreement. “These orders show the importance of the framework agreement and our position as a supplier of remote weapon stations to the USA”, says Eirik Lie, President Kongsberg Defence & Aerospace AS. https://www.kongsberg.com/news-and-media/news-archive/2019/kongsberg-has-signed-crows-contract-worth-musd-48/

  • New England guardsmen test their skills in Cyber Yankee 2020

    6 août 2020 | International, C4ISR, Sécurité

    New England guardsmen test their skills in Cyber Yankee 2020

    Mark Pomerleau Members of the National Guard from New England states concluded a two-week cyber exercise that sought to test the cyber skills of guardsmen and critical infrastructure operators. Cyber Yankee 2020, which took place July 21-31 in New Hampshire, involved more than 200 National Guard members and their civilian counterparts from across New England states, along with some active-duty partners and participants from local, state and federal agencies. In its sixth year, there was less attendance than previous years due to the coronavirus pandemic, but several were able to participate remotely. “Cyber Yankee is primarily a hands-on keyboard cyber incident response exercise for National Guard soldiers and airmen in FEMA Region 1, which are the six New England states,” said Lt. Col. Woody Groton, a member of the New Hampshire National Guard and the director for Cyber Yankee, according to a Facebook post by the New Hampshire Air National Guard. Groton said in a video that the exercise is primarily focused on the electrical and water sector. The exercise is “a great training opportunity for us to work with those people who would actually own the network that we would potentially respond on and for our soldiers and airmen to get that experience and for the engineers from those various entities, they get the training in working with us,” he said. The Guard units within the various states are a critical resource to defend against cyberattacks when they overwhelm localities. “If a large-scale attack happened against a power company, water company, or any other critical department around the state, we would be able to get activated and help them mitigate the threat,” Capt. Frederick Bond, 103rd Air Control Squadron cyberspace operator and exercise Team 3 lead from the Connecticut National Guard, said in a release. “It's similar to when a storm comes and we help remove fallen trees or shovel snow from roofs to help get critical infrastructure going again.” The friendly blue team had to deal with simulated attacks from an opposing red team. Social media posts were used to simulate a real internet environment, where forces must sift through the noise and discern what information is needed to make decisions and identify threat actors. In one case, these actors defaced a public website. “We found some discrepancies including website, it looks like it may have been defaced. The team is digging into finding the source of that defacement and then making steps to correct it,” Master Sgt. Eric Lewis, a blue team member in the New Hampshire Air National Guard, said in a video. Other actions tested included protecting computer files from being stolen or manipulated. “We received intel that potential threat actors may be using a certain capability to transfer files,” said Senior Airman Stephen LaLuna, 103rd Communications Flight cyber systems operations specialist with the Connecticut National Guard. “We see the traffic that's using it, that sets off a flag on our end to look deeper into that. If we determine it is malicious, we send it up the chain with our findings and recommendations to block it.” Officials explained that one of the most critical aspects of these training events is the partnerships built between Guard units, critical infrastructure operators and government entities so that when a crisis breaks out, everyone is acquainted. “We have built enduring partnerships with state government and the critical infrastructure sector. Something that if we did have a major cyberattack against one of those, we would be ready to respond and already know each other,” Groton said. Correction: An earlier version of this story misidentified Lt. Col. Woody Groton. He is with the Army National Guard. https://www.c4isrnet.com/cyber/2020/08/03/new-england-guardsmen-test-their-skills-in-cyber-yankee-2020

Toutes les nouvelles