28 avril 2024 | International, Aérospatial

Defense Innovation Unit moves to ease commercial drone certifications

DIU wants to improve its process for vetting commercial drones, with the goal of making it easier for companies to sell their systems to the U.S. military.

https://www.defensenews.com/unmanned/2024/04/26/defense-innovation-unit-moves-to-ease-commercial-drone-certifications/

Sur le même sujet

  • The field narrows in US Army’s light robotic combat vehicle competition

    22 octobre 2019 | International, Terrestre

    The field narrows in US Army’s light robotic combat vehicle competition

    By: Jen Judson WASHINGTON — The Army has invited four teams to compete to build prototypes for its future light Robotic Combat Vehicle, according to an announcement on the National Advanced Mobility Consortium's website. Out of a large pool of white paper submissions, a Textron and Howe & Howe team, a team of Qinetiq North America and Pratt & Miller, HDT Global and Oshkosh were each issued a request for prototype proposal. The Army plans to procure a light, medium and heavy RCV as part of an effort to bring next-generation combat vehicle capability to the force by 2028. The RCV-Light competition is being managed by the NAMC. While the Army is the decision maker, the consortium is tasked to execute the competition and is also running the RCV-Medium effort. The Army is expected to award up to two contracts toward the end of the second quarter of this fiscal year to deliver four non-developmental RCV-L surrogate vehicles for government evaluation, testing and manned-unmanned teaming experimentation over the course of a year. The RCV-M effort is not far behind the RCV-L as white paper submissions are currently being evaluated for down-select. NAMC also executed a week-long RCV market research demonstration with the Army at Texas A&M's RELLIS campus in May in order to better inform requirements. Out of the companies chosen to move forward, only Oshkosh was not present at the event. At the Association of the U.S. Army's annual conference, Textron and Howe & Howe dramatically unveiled their RCV Ripsaw M5, which is based on Howe & Howe's deep history of building unmanned ground vehicles, but adds technology like scalable armor and suspension and drive options to cope with the challenges expected in the future fight. FLIR Systems is also part of the team, contributing advanced sensors. “Bringing together Howe & Howe, Textron Systems and FLIR Systems really represents a dream team,” Textron's CEO Lisa Atherton, said in a statement released at the show. “We formed this team based on our shared focus to serve this customer with disruptive ideas and proven experience, and we are dedicated to meeting and exceeding their requirements through the RCV program.” The team told Defense News before AUSA that it planned to submit a version of Ripsaw both for the light and medium variant of the Army's RCV. HDT brought its Hunter WOLF to AUSA, and Qinetiq North America announced its partnership with Pratt & Miller at the show. Qinetiq and Pratt & Miller plan to submit a variant of the Expeditionary Modular Autonomous Vehicle (EMAV) tailored for the Army's needs. The offering combines Qinetiq's modular open-architecture control systems with Pratt & Miller's advanced mobility platform. https://www.defensenews.com/digital-show-dailies/ausa/2019/10/21/the-field-narrows-in-light-robotic-combat-vehicle-competition/

  • Northrop CEO forecasts ‘more consolidation’ for defense sector

    11 février 2021 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    Northrop CEO forecasts ‘more consolidation’ for defense sector

    By: Joe Gould WASHINGTON ― The drive to rapidly develop defense technologies will spur more industry mergers and acquisition activity over the next two decades, and create new entrants in the realm of cyber and artificial intelligence, Northrop Grumman CEO Kathy Warden said Tuesday. “As a result, I believe the industry will look different in terms of its composition. There'll be more consolidation,” Warden said in a wide-ranging interview through the Center for Strategic and International Studies. She also foresaw increased government-industry collaboration. “There will also be more new entrants, and so it's hard to say there will be fewer players, but the ones that exist today will likely continue to consolidate as we have seen in recent years and we've seen in other cycles,” she added. New firms will adapt commercial AI and machine-learning applications for military surveillance as well as command and control, Warden predicted. The executive's comments came after the new deputy defense secretary, Kathleen Hicks, said at her confirmation hearing this month that she is concerned by consolidation in the defense-industrial base and that competition is needed for the U.S. military to maintain an edge over China and Russia. Hicks' office will review deals that involve national security issues. “Extreme consolidation does create challenges for innovation,” Hicks said. “We need to have a lot of different, good ideas out there. That's our competitive advantage over authoritarian states like China, and Russia. And so if we move all competition out, obviously that's a challenge for the taxpayer, but it's also a challenge in terms of the innovation piece.” The U.S. faces a new space race, and the Biden administration should continue work to compete in that domain, said Warden, whose firm saw sales growth last year driven by its space division. Her comments also come in the wake of the Biden administration's affirmed support for Space Force, the military service created under the Trump administration. “Many nations are demonstrating the capability to both operate in space but also have anti-satellite capability, so what we need to focus on is putting in place the norms and technologies that allow us to have freedom of operation in the space domain,” Warden said. Last month, Northrop reported that its Space Systems segment led the company in sales for both the fourth quarter of 2020 and for the full year. The segment was driven by a higher volume on classified programs as well as the Next-Generation Overhead Persistent Infrared and NASA Artemis programs. A ramp-up for the Ground Based Strategic Deterrent, launch vehicles and hypersonics programs drove the company's Launch & Strategic Missiles sales. Northrop won a $13.3 billion contract in September from the U.S. Air Force to build the GBSD, which replaces the aging Minuteman III intercontinental ballistic missile system. President Joe Biden is expected to launch a review of the nation's expensive nuclear modernization portfolio. Reportedly, the GBSD program could cost U.S. taxpayers as much as $110.6 billion. Warden defended the country's current track on nuclear modernization and said America's triad of nuclear weapons is “very important to keeping the peace.” More broadly, Warden offered a message that seemed calibrated to the new administration, saying the aerospace and defense industry provides platforms like the F-35 fighter as “an aid to diplomacy” and interoperability among allies. “It's hard for anyone to say what would have happened had we not had ICBMs over the last 50 years,” she said, “but lots of very smart statesman, military personnel and civilians alike have studied this through multiple nuclear posture reviews and come out believing that the best posture for our nation is continuing to move forward with the modernization of all three legs of our triad.” https://www.defensenews.com/2021/02/09/northrop-ceo-sees-more-consolidation-for-defense-sector/

  • The largest cyber exercise you’ve never heard of

    25 février 2020 | International, Aérospatial, C4ISR, Sécurité

    The largest cyber exercise you’ve never heard of

    For years, the first time the Department of Defense's cyber forces faced high-end digital attacks was not in practice or in a classroom, but in actual operations. For the cyber teams that focused on offense, a playbook developed from years of National Security Agency operations guided their work. But on the defensive side, standards and processes needed to be created from scratch meaning, in part, there was a lack of uniformity and little tradecraft to follow. Because cyber leaders had focused on staffing, training opportunities for defensive cyber operators had been sparse. To help solve that problem, the Department of Defense is expected to award a contract worth roughly $1 billion later this year for a global cyber training environment. But in the meantime, some units across the joint force have gone so far as to create their own small-scale training events and exercises to keep their forces' skill sets sharp. Perhaps the best example of these efforts are the 567th Cyberspace Operations Group's “Hunt Event,” which has quickly grown to become one of the largest cyber exercises across the department. The bi-monthly exercise pits teams against each other in a competition for the coveted Goblet of Cyber trophy and bragging rights. The group aims to better train defensive hunters, improve defensive tactics, techniques and procedures and develop defensive tradecraft. “The point of this was that we didn't really have a good range space to play on that had an active and live adversary so we could, in theory, replay traffic and we could go in and generate some easy kill, low hanging fruit signatures for detection,” Capt. Reid Hottel, training flight commander at the 837th Cyber Operations Squadron, told Fifth Domain. “If we are supposed to be the primary counter to advanced persistent threats, the way that we were training was not like how we were fighting.” The exercises started roughly a year ago to teach operators how to hunt on networks. It's now evolved to where participants also work on leadership skills and build custom exploits on a large range with multiple stakeholders. In addition to the Air Force CPTs — the defensive cyber teams each service provides to U.S. Cyber Command — members from the Air Force Office of Special Investigations and Mission Defense Teams, specialized defensive cyber teams that will protect critical Air Force missions and local installations, also take part. At the most recent exercise in January, a representative from NASA participated. Now, the exercises have become so popular Hottel said other services are interested in participating in the future. This includes a Marine Corps CPT at Scott Air Force Base. Building better leaders and hunters To be the best, cyber leaders recognized their teams would have to beat the best and that meant training against the world's most advanced cyber threats. Some other forms of training — such as the popular capture the flag game, which involve teams trying to find “flags” such as files or scripts inside a network — are not always the most realistic form of training. “When we were fighting, we're up against advanced adversaries. We're up against adversaries that are using tactics, techniques and procedures that are just above and beyond what simple little [scripts] ... we were using in the past,” Hottel said. “This hunt exercise allows us to do that, whereas in the past, particularly in other flag exercises, we are not training at the APT level. We [were] training at the script kiddie kind of level and here we're training at a much higher difficulty, which stretches and grows our operators into being true hunters.” He added that the exercises are also helping develop tradecraft. “That's one thing that nobody really teaches, there's no commercial course that you can go buy that teaches tradecraft, that teaches the military away, that teaches the way that we use to find the APT, which in theory, should be ever evolving because our adversary is as well,” Hottel said. “These exercises have been really eye-opening to provide tradecraft development, to become hunters, to understand what it means to be a cyber protection team.” The exercise has evolved to include custom exploits, custom root kits, custom attacks and zero-day exploits within a real-world mission where in some cases hunters don't have any indictors of compromise that exist in the public domain. This means that there is no public reporting available on the exploits or tactics the adversary is using. Participants can hone their skills, by actively hunting on a network in order to find anomalies that could lead to trouble. “As hunters,” he said, “we don't necessarily have singular methodology, we don't necessarily have a unique way that we can go about finding advanced threats mostly because we haven't really been training like that.” The training is also helpful for new mission defense teams, which are just being officially resourced within the Air Force around local installations. By having those teams sit next to CPTs, who are using generally the same tools, they can learn about tradecraft and what to look for at the local level. During the most recent exercise, officials said it was the first time they intentionally tried to trip up participants. Organizers created fake attack chains to see how the players scoped an investigation into a network and deducted points for the amount of time they wasted following that lead. This technique helps teach teams how to scope investigations without going down “rabbit holes,” and not adequately planning, Lt. Christopher Trusnik, chief of training at the 835th Cyberspace Operations Squadron, told Fifth Domain. Beyond the technical hunting, this approach helped team leader to flex leadership muscles. “It was more of teaching that leadership technique of you plan for this, how do you investigate quickly and how do you triage your investigation,” Trusnik, whose unit ran the January exercise, said. Hottel explained that following this most recent event, teams focused on leadership and organization. At one point, someone on his team previously had been coached on what they needed to include such as specific indictors that might be valuable to their mission partners to understand. At this exercise, they included those indicators. In another instance, one team member who had never run a hunt mission struggled at first. Hottel stepped in and with just a little guidance, the leader became more disciplined and was able to find things much better in the last three days. Benefits of cyberspace in training Training in cyberspace has benefits that other domains don't offer. For one, forces don't need a dedicated battlespace such as the Army's National Training Center or the range used at Nellis Air Force Base for the Air Force's Red Flag. With cyber, a custom range can be built and forces from all across the world can come in and participate. The range used for the hunt exercises stays up weeks after the formal event so individuals or teams can try their hand, though they obviously won't be eligible for the Goblet of Cyber trophy. All of this could change with the Persistent Cyber Training Environment (PCTE). PCTE is a major program being run by the Army on behalf of Cyber Command and the joint force to provide a web-based cyber training environment where cyber warriors can remotely plug in around the world and conduct individual training, collective team training or even mission rehearsal — all of which does not exist on a large scale currently. Hottel said that his forces haven't been limited thus far without PCTE. Though, once the platform is online, they can upload the range they used for a competition and it can be accessed by anyone across the joint cyber mission force. Testing new concepts But in the meantime, smaller, unit level exercises like those run by the 567th allow forces to test concepts and learn from others. Unlike larger exercises that have requirements and stated objectives, smaller exercises can serve as a proving ground for staying sharp and pushing the envelope. This allows local units more control over what their personnel do but can also allow teams to test new concepts in a relatively risk-free environment. “Let's say that a national [cyber protection] team wants to test out ... whatever they're currently using because they feel like it would provide them an advantage so they want to test out something,” Hottel said. “We can throw that on the range as well and they can utilize an entirely defensive tool set. We're not trying to make people tool experts, we're trying to make them tradecraft, defensive hunters.” Hottel also said that personnel playing on the archived range can bring new ideas, which can then be tested during the next exercise. In some cases, they may come up with an idea on their own and bring it to the next exercise to see if it actually works. Ultimately, the event is designed to create better cyber warriors. “We're not trying to make people tool experts, we're trying to make them tradecraft, defensive hunters,” Hottel said. https://www.fifthdomain.com/dod/air-force/2020/02/21/the-largest-cyber-exercise-youve-never-heard-of/

Toutes les nouvelles