27 janvier 2023 | International, C4ISR
L3Harris delivers experimental navigation satellite
The delivery brings the lab closer to conducting the first U.S. positioning, navigation and timing experiment in almost 50 years.
16 novembre 2022 | International, Aérospatial
Goodbye, T-1 Jayhawk. Hello, simulators.
27 janvier 2023 | International, C4ISR
The delivery brings the lab closer to conducting the first U.S. positioning, navigation and timing experiment in almost 50 years.
14 septembre 2020 | International, C4ISR
Andrew Eversden WASHINGTON — The Pentagon's artificial intelligence hub is working on tools to help in joint, all-domain operations as department leaders seek to use data to gain an advantage on the battlefield. This year, the Joint Artificial Intelligence Center kicked off its joint war-fighting initiative, under which it is developing algorithms to provide armed services and combatant commands with AI tools to accelerate decision-making. Nand Mulchandani, acting director of the JAIC, said the center, for example, is “heavily” involved in the Air Force's Advanced Battle Management System, the service's primary lever to enable the Joint All-Domain Command and Control concept. The system underwent a major test last week. The center is “specifically focused” on working to harness AI to link together systems involved in the intelligence-gathering phase to the operations and effects piece of all-domain operations, Mulchandani added. “It's how do we actually connect these platforms together end to end to build sort of a system that allows a commander to actually have that level of both visibility on the intel side but able to action it on the other side,” Mulchandani said on a call with reporters Thursday. The JAIC is also working on an operations cognitive assistant tool to support commanders and “drive faster and more efficient decision-making through AI-enabled predictive analytics,” Department of Defense Chief Information Officer Dana Deasy said Thursday at the DoD AI Symposium. “Our goal is to nest these capabilities under the Joint All-Domain Command and Control concept ... to provide a more cohesive and synchronized operational framework for the joint force,” Deasy said. Earlier in the summer, a JAIC official said the war-fighting team was trying to aim a laser on an enemy vehicle to inflict damage. But to enable all these tools, one thing is paramount: data. The DoD CIO's office is set to release its data strategy later this year, with the department's new chief data officer, Dave Spirk, saying at the symposium that the he worked to reorient a draft of the strategy to ensure the use of data to enable joint war fighting is the top priority. “We're in a place now where we want to put joint war fighting at the top of the pile of things we're working on,” Spirk said at the symposium Sept. 9. Deasy also emphasized the importance of data in war fighting during a session at the Billington Cybersecurity Conference that same day. “When we do the exercises, the experiments and things maybe don't go right — I can guarantee you what they're going to write down on the whiteboard at the end of that is ‘data.' Did we have the right data today? Why couldn't we connect those data across our weapons systems, our various assets?” Deasy said. Critical to the development of artificial intelligence are adequate data storage and development platforms. The JAIC recently awarded a contract worth more than $100 million to Deloitte for the development of the Joint Common Foundation platform, an enterprisewide, cloud-based platform that the center will use to develop AI tools. Meanwhile, DoD components such as the JAIC are also awaiting the deployment of the DoD's embattled enterprise cloud, the Joint Enterprise Defense Infrastructure. Department officials have continuously pointed to the JEDI cloud as a critical piece of the JAIC's ability to develop artificial intelligence, as the new technology it is expected to store 80 percent of DoD systems across classification levels and provide massive amounts of data. Deasy said Sept. 9 that JADC2 will require the services to collect and share data with each other in a way that they have never done before, and that may require changes to how they operate. But in order to enable JADC2, he added, a cultural shift in how the services treat their data is needed; if the services want to link sensors to shooters, interoperability of services' systems and data is imperative. “Historically, each service could gather up their data, send it up their command to focus on. But in this new world ... the services are going to have to come together, which means the data's going to have to come together in a very different way,” Deasy said at the Billington Cybersecurity Conference. The DoD is in the "early days of how we're going to do that,” he added. https://www.c4isrnet.com/artificial-intelligence/2020/09/10/how-does-the-pentagons-ai-center-plan-to-give-the-military-a-battlefield-advantage/
10 janvier 2020 | International, C4ISR, Sécurité
Mark Pomerleau In 2018, the Department of Defense began following a new philosophy for cyber operations to better protect U.S. networks and infrastructure. Known as “defend forward,” the approach allows U.S. cyber forces to be active in foreign network outside the United States to either act against adversaries or warn allies of impending cyber activity that they've observed on foreign networks. After the U.S. military killed an Iranian general in a Jan. 2 drone strike and after national security experts said they expect Iran might take some retaliatory action through cyber operations, the specter of increased cyber attacks against U.S. networks puts Cyber Command and its new approach front and center. “This Iran situation today is a big test of the ‘defend forward' approach of this administration,” James Miller, senior fellow at Johns Hopkins Applied Physics Laboratory and former undersecretary of defense for policy, said at a Jan. 7 event hosted by the Council on Foreign Relations. “Will [Cyber Command] take preventative action? Will they do it in a way that our allies and partners support and that can be explained to the public?” While Iran fired several missiles Jan. 7 at a base in Iraq where U.S. troops lived as an initial response to the drone strike, many national security experts expect Iran could continue cyber actions as further retaliation for the strike. Iran could also ratchet up its cyber operations in the United States following the collapse of portions of the 2015 nuclear deal between the United States, Iran and five other nations to curb Iran's nuclear weapons capability in return for sanctions relief. Over the past 12 months, the White House and Congress streamlined many of the authorities used to conduct cyber operations to help cyber forces to get ahead of threats in networks around the world. One such provision in last year's annual defense policy bill provides the Pentagon with the authority to act in foreign networks if Iran, among other named nations, is conducting active, systematic and ongoing campaigns of attacks against the U.S. government or people. Cyber Command declined to comment on what, if anything, they were doing differently since the drone strike. Some experts, however, have expressed caution when assessing how well this defend forward approach has worked thus far given it is still relatively new. “The jury is very much still out here,” Ben Buchanan, assistant professor and senor faculty fellow at Georgetown University, said at the same event. “We don't have a lot of data, there's been a lot of hand-wringing ... about these authorities and about how Cyber Command may or may not be using them. I just don't think we've seen enough to judge whether or not ... [it is] meaningfully changing adversary behavior.” Others have also expressed reservations about how effective Iran can even be in cyberspace toward U.S. networks. “Iran is a capable cyber actor, Iran is a wiling cyber actor. That means Iran will conduct cyberattacks,” said Jacquelyn Schneider, Hoover fellow at the Hoover Institution at Stanford University. “It's not like they have this capability and they've been deterred in the past and maybe now they're going to turn it on. I think they've been trying this entire time.” Complicating matters further could be other actors trying to take advantage of U.S.-Iran imbroglio for their own interests. Priscilla Moriuchi, senior principal researcher and head of nation-state research at threat intelligence firm Recorded Future, said over the past several months, there have been reports of Russian state-affiliated actors hijacking Iranian cyber infrastructure to conduct operations masquerading as Iranians. “That creates its own uncertainty,” she said at the same event. “Another level of potential what we call inadvertent escalation if a country perceives that they are attacked by Iran but in reality, it” wasn't. https://www.fifthdomain.com/dod/2020/01/09/how-tensions-with-iran-could-test-a-new-cyber-strategy/