21 août 2024 | International, C4ISR

DISA eyes more vendors, faster contracts for joint cloud successor

The director of the Defense Information Systems Agency said Tuesday the department is in the early phases of planning for JWCC Next.

https://www.defensenews.com/pentagon/2024/08/21/disa-eyes-more-vendors-faster-contracts-for-joint-cloud-successor/

Sur le même sujet

  • Memes, the pandemic and the new tactics of information warfare

    27 juillet 2020 | International, C4ISR

    Memes, the pandemic and the new tactics of information warfare

    Mark Pomerleau WASHINGTON — The COVID-19 pandemic is evidence that Russia and China have accelerated adoption of their age-old influence and disinformation tactics to the modern era, national security experts and military leaders said. Those countries are leveraging U.S. laws, social media platforms and divisions within society to their larger strategic advantage and as a way to weaken the United States. “This pandemic crisis has made it very, very clear that Russia, China and others intend to strategically use cyber-enable information operations against the U.S.,” Lt. Gen. Mary O'Brien, deputy chief of staff for intelligence, surveillance, reconnaissance and cyber effects operations, said during a Joint Service Academy Cybersecurity Conference webinar June 11. “They're injecting disinformation, which is not a new concept in itself, but now by incorporating cyber means, they're reaching millions of people to exacerbate existing tensions within the U.S. and between us, our allies and partners.” She said these efforts include spreading conspiracy theories and confusing messages about the virus such as its origins and risks. Such tactics are here to stay. “Our adversaries have made it very clear that this aspect of strategic competition will be enduring,” O'Brien added. These tactics, which include waging influence campaigns below the threshold of armed conflict, have forced the military, and U.S. government more broadly, to rethink its strategies and views toward conflict. Traditionally, the United States government has taken a binary view of war and peace, while adversaries such as Russia in particular have viewed conflict on a perpetual continuum. “In many ways, we have trained ourselves as a service at every Red Flag we've gone to that conflict begins when two fighters engage or we find a target on the battlespace. So we've really trained ourselves that conflict begins at that moment,” Lt. Gen. Timothy Haugh, commander of 16th Air Force, the service's first information warfare command, said at a July 15 Mitchell Institute webcast. Red Flag is the Air Force's premier tactical training event. “Was the first element really when we got into conflict in the information environment ... the first day that one of our companies was hacked that the intellectual property theft of one of our weapon systems stole?” he said. “Was that really when conflict began? Was it the day that Russian hackers hacked into the DNC? Was that really the day that conflict began for our nation and how we should be thinking about it when the adversaries went to another level of using some level of malign activity that is outside of things that we would consider norms.” As such, the military is looking at ways to expose this activity abroad when it can. “Sixteenth Air Force units are focused on developing tactics, techniques and procedures and they're looking to identify, expose and when directed, countering the threat from the state sponsored disinformation campaigns,” O'Brien said. “This is continuing, I think we'll see it again as we address the racial discrimination.” Adversaries have exploited U.S. laws and principles, such as the freedom of speech with online platforms, which makes outright banning accounts difficult. They've also targeted existing divisions within society such as protests over police tactics and racial equality. “[Adversaries] also are in a position where they can take advantage of a lot of the disinformation/misinformation that's created right here at home in the United States by actual Americans who understand the language in a way Moscow couldn't at a native level,” Cindy Otis, vice president of analysis at Alethea Group, a start-up that counters disinformation and social media manipulation. told C4ISRNET. Experts explained that adversaries in many cases don't have to create content, although many choose to. “At the end of the day they're really just amplifying our existing social divisions. We suspect, especially lately, that they've really done enough amplification that they're just kind of allowing things to snowball now ...There's enough existing division that it really only requires tiny nudges at this point to amplify,” Maj. Jessica Dawson, research lead for information warfare and an assistant professor at the Army Cyber Institute, told C4ISRNET. One way they do this is called memetic warfare, which involves sharing memes on various social media platforms to stoke a particular reaction from various groups. “When we think about memetic warfare, what's really happening is we're taking these sort of deep seeded emotional stories and we're collapsing them down into a picture, usually it's something that has a very, very quick emotional punch,” she said. “They're collapsing these narratives down into images that are often not attributed, that's one of the things about memes is they really aren't, someone usually isn't signing them, going ‘I'm the artist.' There [are] these really emotional punches that are shared very, very quickly, they're self replicating in a lot of ways because you see it, you react and then you immediately pass it on.” While many experts noted that these tactics are nothing new, the difference is the internet. “The major change throughout history is today they're able to spread and amplify and reach people where they are all over the world in a way that was never possible before,” Otis, who previously was a CIA analyst, said. Previously, nations such as the Soviet Union had to prop up media outlets and place stories in newspapers around the world hoping they'd be picked up in English language outlets. Now, they just have to tweet. In some cases, they are overt social media channels and actors might not even hide their origin, but other more covert cases, states might use certain influencers or cut outs to do their bidding. What's the point? The goal of these operations varies slightly, but experts said they serve the ultimate purpose of put down the United States compared to their own nations. “For Russia it all goes back to the desire to undermine United States' global credibility but also show their own population ‘hey, you know that democracy you want, it's actually not a great thing ... look how it's turning out for the United States,‘” Otis said. She added that Russia tries to undermine the credibility of the United States on issues such as human rights, something the United States is active in promoting on the world stage, by highlighting social divisions such as potential police brutality and racial injustice. Dawson noted this can also distract from what Russia is doing abroad. Russia also wants to discourage citizens from voting, Otis said by making large swaths of the population feel disenfranchised. Often times, these actors will play both sides of an issue to maximize reach and discord. When it comes to China, Dawson noted that they are trying to appear more benevolent on the world stage to present itself as a world power, which is much harder. They are also good at making information disappear online, she said, citing information on the Tiananmen Square massacre. Otis pointed to Chinese benevolent efforts such as providing medical aid to nations such as Italy during the ongoing pandemic. Combating these efforts, including those focused internally at domestic populations and undermining government, can be difficult given the existing divisions within society and the broad speech freedoms guaranteed. Otis explained that the government can sometimes be mired in its own bureaucratic processes, noting it can be its own worst enemy. She provided the example of Taliban forces in Afghanistan publishing in their media channels that the United States and NATO forces bombed a school killing scores of children. Those stories would go viral in their circles and sometimes make their way to mainstream outlets. When questioned about those claims by reporters, U.S. officials would explain they have to conduct an investigation, which could take months. By the time the investigation is concluded and the claim is found to hold no truth, the damage is already done and the Taliban have successfully recruited against it. Dawson noted that one way to begin combating disinformation is building trust from the local to the national level while also addressing the underlying domestic problems adversaries are exploiting from abroad. https://www.c4isrnet.com/smr/information-warfare/2020/07/23/memes-the-pandemic-and-the-new-tactics-of-information-warfare/

  • Advanced Air and Missile Defense, in the Hands of Soldiers

    29 mai 2020 | International, Aérospatial, Terrestre

    Advanced Air and Missile Defense, in the Hands of Soldiers

    May 27, 2020 - It's a cold December morning at White Sands Missile Range in New Mexico, and two surrogate cruise missile targets have just been launched, one after the other. They are flying separate courses among the jagged San Andres and Sacramento mountains toward soldiers in a U.S. Army Air and Missile Defense unit at a test site called TAC-2 – Tactical Command Post 2. These sophisticated targets precisely mimic real cruise missile threats and can take advantage of this terrain to hide from the radars and sensors commanders have positioned in the area. This can create gaps in tracking that make the job of interceptor missiles or other defensive weapons more difficult – you can't hit what you can't see. Today, though, their maneuvers won't enable them to evade detection. This is Flight Test 5 (FT-5), the most sophisticated and difficult development test yet for the Army's Integrated Air and Missile Defense (IAMD) Battle Command System (IBCS), developed by Northrop Grumman. High above the range, sensors aboard U.S. Air Force F-35 fighter aircraft see and acquire the two surrogate missiles. IBCS integrates the aircraft sensor data with that of available ground sensors, including Sentinel, Patriot weapon system and U.S. Marine Corps TPS-59 radars. All share information via the IBCS Integrated Fire Control Network (IFCN). As one sensor loses sight of the threats – and each will at some point – the targets are acquired by other sensors on the IFCN, enabling IBCS to create a precise, uninterrupted composite track of each missile's movements. With data from every sensor, IBCS produces a single integrated air picture on the screens of the air defense soldiers at TAC-2. They see every change in altitude and direction as the two surrogate missiles paint tracks across their screens. Because IBCS enables joint weapons as well as joint sensors, the defenders at the controls can select the best effector to use against these targets. Today, the soldiers are about to launch two Patriot Advanced Capability 2 (PAC-2) interceptor missiles. “Without IBCS, all those different sensors operate independently, creating opportunities for threats to avoid detection as they fly to a target,” explained Northrop Grumman IBCS Program Director Mark Rist. “Without being integrated onto a network, these sensors produce a more ambiguous, less-clear air picture, making engagements of threat systems more challenging.” He is monitoring FT-5 from miles away, in the test's mission control room. The soldiers at TAC-2 can be heard on the radio, calm but urgent voices reporting “target acquired” by airborne sensor, and talking of the “IP” or intercept point, and “kill box.” It's only been moments since the threats were launched, but now comes “Free to engage ... Missile away ... Missile away ...” One, then another PAC-2 interceptor missile is launched by the soldiers. IBCS is not only able to launch the missiles, but also plays a critical role in the engagement by actively closing the fire control loop and providing in-flight updates as the PAC-2s converge on their targets. The surrogate cruise missile targets are closing in and can now be seen on video in the control room – and then suddenly they can't: One, then the other disappears in a ball of fire as the PAC-2s destroy them. Cheers erupted in the control room, and those of Rist and his team may have been loudest among the many generals, colonels and visiting officials that day at White Sands. After years of effort, working closely and constantly with soldiers, FT-5 fully demonstrated IBCS's unprecedented capability to integrate sensors and effectors to detect, track and simultaneously engage multiple targets in flight. “Information is ammunition, and IBCS is providing soldiers with more,” Rist said. “We brought a lot of things together in this development test. It was the first including joint operations with the Air Force F-35 and Marine Corps radar systems, the first with Air Defense Artillery soldiers at the controls, and the first involving software developed using our Agile methodology.” FT-5 was the latest in a series of test successes, and further evidence of the program's maturity as soldiers train on IBCS equipment in preparation for an important Limited User Test (LUT) this spring. “I'm very proud of these soldiers and of the system's performance,” said Colonel Phil Rottenborn, Army IAMD project manager. “This was the first time soldiers conducted a live engagement using IBCS in a developmental test, and they showed we are ready to go into the operational test phase.” “Success!” said Col. Tony Behrens, Army Capability Manager for the Air and Missile Defense (AMD) Command, and a nearly 26-year career Air Defense Artillery (ADA) officer. “It showed me that an Army operator – not an engineer or software developer – can sit at that console and do his or her job. I am very comfortable and confident about the path we're on.” IBCS enables soldiers to be even more effective by integrating all the systems' data and providing a common command-and-control (C2). Soldiers will only need to learn to use the IBCS C2, instead of spending time becoming specialists on only one or two of a dozen different sensor and weapon systems. That enhances IBCS's already impressive battlefield survivability, because soldiers will be capable of using any of the available sensors with any available weapon systems at any command post connected to the self-connecting, self-healing IFCN. Also, less time will be spent in recurrent training, making more time available for teaching operators defense strategy and how to fight. The IBCS “every sensor; best effector” concept gives commanders greater flexibility in defense design, allowing them to position resources for greatest coverage in far less time essentially helping to change the way soldiers see and fight air battle. Northrop Grumman's open-architecture system-of-systems approach to IBCS eases the integration of any new or legacy sensor and effector systems, which is important for U.S. joint operations and to foreign governments. Poland has an agreement with the U.S. Army to purchase IBCS for modernization of the nation's WISLA medium-range air defense system, and other countries have expressed interest as well. With the success of FT-5, Northrop Grumman will now focus on the Army's Limited User Test planned for later this year, followed by the low-rate initial production and full-rate production phases of the system, to field IBCS to Army air defenders in fiscal year 2021. Behrens said the Army must have the IBCS capabilities to be effective and successful in future combat operations. “To me, it's beyond critical,” he said. “We're not just giving soldiers a new piece of equipment, a new piece of gear. We're going to give them an entirely new way of operating on the battlefield that is so much more efficient. But it has to start with the system that enables you to do that.” IBCS may also be the Army's first big step toward multi-domain convergence – the next level above integration. “Enabling multi-domain – or more accurately, all-domain – operations is vital to ensuring battlefield advantage and superiority,” said Brig. Gen. Brian Gibson, director of the Army's AMD Cross-Functional Team, at an Association of the U.S. Army event in early March. “When successfully fielded, IBCS will be one of the Army's pathfinder capabilities into what is becoming a top priority for our military leaders: joint, all-domain command and control.” Media Contact Kenneth Kesner 256-327-6889 Kenneth.Kesner@ngc.com View source version on Northrop Grumman: https://news.northropgrumman.com/news/features/advanced-air-and-missile-defense-in-the-hands-of-soldiers

  • Top USAF general urges support for Next-Gen fighter - Skies Mag

    4 mars 2021 | International, Aérospatial

    Top USAF general urges support for Next-Gen fighter - Skies Mag

    Air Combat Command chief talks NGAD, Tacair study, and acknowledges current F-35 problems.

Toutes les nouvelles