9 août 2018 | International, Aérospatial, Naval, Terrestre, C4ISR

DoD Announces DESI Awards for University-Industry Collaborations

WASHINGTON --

Five university-industry teams have been selected for the Defense Enterprise Science Initiative, known as DESI, Defense Department officials announced today.

DESI is a pilot program supporting university-industry research collaboration focused on accelerating the impact of basic research on defense capabilities.

DESI's goals are twofold, officials said. First, it seeks to foster sustainable university-industry partnerships to identify and apply new discoveries and knowledge on existing capabilities and address technological gaps. DESI also aims to charter a new pathway to accelerate the transfer of basic research to innovative technologies and complement the department's other basic research programs such as the Vannevar Bush Faculty Fellowship, the Multidisciplinary University Research Initiative and the Defense University Research Instrumentation Program.

“Programs like DESI are vital to foster collaboration in the research ecosystem and accelerate the transition of ground-breaking basic science to transformative capabilities,” said Dr. Bindu Nair, deputy director for basic research. “I look forward to seeing how these teams can help us address our unique and challenging defense problem sets.”

Each team will receive up to $1.5 million over two years to further fundamental knowledge and understanding in the context of end-use applications.

Full Article: https://www.defense.gov/News/Article/Article/1595382/dod-announces-desi-awards-for-university-industry-collaborations/

Sur le même sujet

  • After huge hack, Biden security picks want more cyber coordination with industry

    21 janvier 2021 | International, C4ISR, Sécurité

    After huge hack, Biden security picks want more cyber coordination with industry

    Andrew Eversden WASHINGTON — Two top national security nominees advocated Tuesday for stronger federal cybersecurity and increased collaboration with contractors in the aftermath of a supply chain breach that infiltrated numerous federal agencies. If confirmed, retired Army Gen. Lloyd Austin and Avril Haines, President-elect Joe Biden's nominees for defense secretary and director of national intelligence, respectively, would start their jobs in the middle of the national security community's assessment of damage from a cybersecurity breach pinned on Russian hackers. They gained access through software from SolarWinds, a major government contractor. “We must elevate cybersecurity as an imperative across the government in order to defend the American people and U.S. critical infrastructure,” Austin told the Senate Armed Services Committee in his answers to the lawmaker's advance policy questions. “Additionally, the government must continue to strengthen its partnership with the private sector to foster greater information sharing and collaboration.” So far, federal investigators have discovered breaches at “fewer than 10” federal agencies, though the Pentagon and intelligence community haven't confirmed whether their offices were among the victims. Haines, who served as deputy CIA director and deputy national security adviser to President Barack Obama, found it concerning that the breach first came to light through cybersecurity company FireEye, instead of through U.S. government cybersecurity operators. “[I] absolutely share ... concern that we're actually able to detect these because that's obviously absolutely critical to us protecting against them,” Haines said before the Senate Select Committee on Intelligence. “I think ... it was pretty alarming that we found out about it through a private company as opposed to our being able to detect it ourselves to begin with.” In response to the breach, Austin committed to reviewing the DoD's cyber posture and emphasized that Russia must be punished for infiltrating federal networks. In the advance questions, Austin stopped short of calling the breach an act of war, arguing that designation “requires a case-by-case and fact-specific determination.” “For example, malicious cyber activities could result in injury, death or significant property destruction,” Austin wrote. “These activities would need to be considered in their totality.” An early January announcement from several federal investigators, including the NSA and Office of the Director of National Intelligence, stated that the breach was believed to be an espionage campaign and “likely Russian in origin.” “If that's the case, I think Russia should be held accountable,” Austin said at the hearing. “That's my personal belief.” Sen. Jack Reed, D-R.I., who sits on both SASC and SSCI, called the breach “the greatest cyber intrusion in the history, I think, perhaps, of the world” and said that the stovepiped nature of the U.S. national security apparatus needed to be addressed. Reed said one challenge for Haines will be developing a “more coherent, cohesive, integrated approach” to dealing with cybersecurity threats, particularly from advanced nation-state actors. Under questioning from senators, Haines said the SolarWinds supply chain hack was a “grave threat,” and the government needs new to improve its defenses against such attacks, though she noted that she hasn't received a classified briefing on the intrusion. In 2019, a report from ODNI warned of growing software supply chain hacks that provide an “efficient way to bypass traditional defenses and compromise a large number of computers.” “To prevent a recurrence of this kind of attack, we need to close the gap between where our capabilities are now and where they need to be in order to deter, detect, disrupt and respond to such intrusions far more effectively in the future,” Haines wrote in her questionnaire. “If confirmed as DNI, I will review the expert conclusions from the SolarWinds incident and the current intelligence about supply chain vulnerabilities and what steps may be taken to address any vulnerabilities.” Haines told senators that she would assess how the intelligence community can improve its cybersecurity partnerships with industry and the whole federal government. “I believe that the IC plays an integral role in detecting and warning against nation-state targeting of U.S. networks and infrastructure,” she wrote. “If confirmed, I will examine how better collaboration between the IC and the rest of the U.S. government, coupled with closer partnerships with the private sector and our international allies, can enhance our ability to deter, detect, and mitigate cyberattacks.” Haines will review whether the intelligence community is allocating resources properly to face advanced cyber threats and will examine the adequacy of the IC's existing authorities to protect the digital infrastructure of the United States, she said. Austin pointed to a cyber-threat sharing partnership the department has with the defense industrial base and stated that the department should “continue to look for ways to better integrate with interagency partners and the private sector.” In light of the SolarWinds breach, the senators on SSCI wrote that they are worried about a “lack of mandatory threat information sharing between the private sector and government,” adding that any information sharing from the private sector after the breach is voluntary. Haines would review the relationship. “Information sharing between the IC and the private sector is increasingly important to ensure that our data systems and networks are secure,” she wrote. “If confirmed as DNI, I look forward to reviewing the Intelligence Community's data sharing and information exchange relationship with the private sector, to engaging with IC experts and private sector leaders on what information is currently being shared, and to examining the efficacy of the current framework for sharing threat information.” The incoming Biden administration has signaled that it will prioritize cybersecurity in the aftermath of the SolarWinds breach. The Biden team named Anne Neuberger, the NSA's cybersecurity director who worked to improve information sharing with the private sector, to National Security Council as deputy national security adviser for cyber and emerging technology. Haines wrote that she will “ensure” that the intelligence community has a “robust data sharing and information exchange relationship” with private companies and said that she will be “studying current information sharing to determine how it can be improved and what types of information can be shared to enhance cybersecurity protections.” “The private sector has unique insight and expertise on malicious activity occurring within its networks,” Haines said. “Real-time integration of private sector and government data could lead to more effective prevention and mitigation outcomes.” Cyber norms and deterrence For the last few years, the U.S. government wrestled with the concept of deterrence in the cyber domain, a complex challenge that including resilient defenses, risk management and strong international partnerships. As the SolarWinds breach demonstrated, deterring adversaries from hacking, which is seen as below the threshold of an armed response, is difficult. In response to a question from Sen. John Cornyn, R-Texas, about how to approach cyber deterrence, Haines pointed to many of the same tenets of current U.S. cyber deterrence, including imposition of costs for malicious actors' behavior, bringing foreign allies together to impose those costs, building resilient systems that are hard to hack, developing norms and creating strong relationship with the private sector. Haines wrote that setting norms should include outlining sanctionable behavior with the agreement from allies. A cornerstone to sanctioning is attributing cyberattacks to actors, a challenging undertaking in the cyber realm. Sen. Mark Warner, D-Va., said he wanted Haines to be more forthcoming with attribution of cyberattacks, stating that he found it “extraordinarily concerning” that the “[Trump] White House underplay[ed] attribution on Russia.” Attribution, Haines said, would be a major piece of the ODNI's role in deterrence. “Something we [ODNI] can do is promote the ability to detect when adversaries are engaging in such activity so as then to provide information about attribution, for example. And then hold adversaries to account through that.” https://www.c4isrnet.com/cyber/2021/01/20/after-huge-hack-biden-security-picks-want-more-cyber-coordination-with-industry

  • Is China already inside America’s hypersonic industrial base?

    10 juin 2020 | International, Aérospatial

    Is China already inside America’s hypersonic industrial base?

    By: Aaron Mehta WASHINGTON — As the Pentagon focuses on developing new technologies such as artificial intelligence and directed energy, department officials have declared the need to ensure foreign nations are not buying their way into the defense-industrial base. But a new report warns China may already have ownership over a key focus: hypersonic weapons. Hypersonic missiles, which are capable of going faster than five times the speed of sound, are expected to become a backbone of the U.S. military in the coming decades. As part of its annual Federal Scorecard, data and analytics firm Govini found that tier one suppliers in the hypersonic supply chain — seven major companies that are working most closely with the Department of Defense on the technology development — has done a good job of keeping Chinese-owned companies out of the process. But at the tier three level, where companies provide smaller but still critical components, the exposure to Chinese suppliers jumps to nearly 10 percent. And that exposure grows slightly by the time it reaches tier five suppliers, with Govini seeing signs of overlap among companies at those lower levels. “This does not necessarily mean that Chinese parts are ending up in DoD'a hypersonics,” explained Jim Mitre, Govini's senior vice president for strategy and analysis. “However, China may have opportunities to jeopardize the development [of] hypersonics through engagement in the supply chain, and it's critically important for DoD and industry to ensure that's not the case.” That is “an area that we're regularly working with the department on exploring and unpacking” to understand the challenges in the supply chain, Mitre added. A series of Pentagon reports in the last two years have raised concerns about the defense-industrial base, particularly when it comes to high-end materials and design knowledge for missiles. In some cases, the only supplier for critical materials come from China, the exact country the U.S. is looking to counter by investing in hypersonic weapons. In March, the Pentagon announced it was launching a deep dive into the hypersonic industrial base specifically to understand the vulnerabilities at the lower-tier suppliers. That study is ongoing. Meanwhile, officials have acknowledged that smaller suppliers have been impacted by the COVID-19 pandemic. Govini also found that the U.S. is under investing compared to China in the realm of quantum technologies, with the Pentagon's fiscal 2021 research, development, testing and evaluation budget for quantum-related programs decreasing by nearly 10 percent from the previous year. The department has requested $3.2 billion for RDT&E funds related to hypersonic weapons in FY21. https://www.defensenews.com/pentagon/2020/06/09/is-china-already-inside-americas-hypersonic-industrial-base/

  • Beyond Chinook: Army Secretary Challenges Industry To Revolutionize Heavy Lift

    1 mai 2019 | International, Aérospatial

    Beyond Chinook: Army Secretary Challenges Industry To Revolutionize Heavy Lift

    By SYDNEY J. FREEDBERG JR. A light scout and a mid-size transport remain Army aviation's top two priorities, Secretary Mark Esper said, but industry needs to start thinking about the next heavy-lift aircraft and stop fighting against cuts to the venerable CH-47. WASHINGTON: “I'm asking industry is to think about heavy future vertical lift,” Army Secretary Mark Esper told reporters today. “Where I need their heads to be is thinking about future heavy vertical lift, not about how do we maintain what we have now and make upgrades here or there.” Translation: Boeing and Pennsylvania legislators, stop fighting me to restore funding for the latest upgrade to the venerable CH-47 Chinook — built outside Philadelphia — and join me in brainstorming a radically better aircraft for future great-power wars with Russia or China. “I really want to think aggressively, boldly about what the future may hold, how it can be different,” Esper said. Is that just your advice to industry, I asked, or is there some kind of preliminary study planned that companies could actually get government money for? It's premature to talk dollars, Esper replied. “Whether we help fund that at some point, I don't know, I'm not going to talk about that right now,” he said. “My comment was only we need aircraft in the future that can do that heavy vertical lift movement, but can ... survive in a very contested airspace and keep up with the FARAs and FLRAAs.” That's the Future Attack Reconnaissance Aircraft — a light scout to fill the gap left by the retired OH-58 Kiowa — and the Future Long-Range Assault Aircraft — a mid-size transport to replace the UH-60 Black Hawk. Both are intended to be high-speed, long-range aircraft.The solution probably will be turboprop/helicopter hybrids, rather than conventional helicopters, that can operate on fast-paced, far-flung future battlefields where precision-guided missiles can kill the forward fuel depots and maintenance bases on which today's shorter-ranged helicopters rely. FARA is the Army's top-priority aircraft program, Esper reiterated here at the Brookings Institution today, and FLRAA is No. 2. But once the light scout and the mid-size transport programs are further along, Esper said for the first time today, his no. 3 priority will be a new heavy hauler. “We're not there yet, right, obviously we need to get FARA and FLRAA moving,” Esper said. “No. 3 is I need to eventually think about what's the future of heavy vertical lift,” Esper told the audience at Brookings. “What's the future replacement for the Chinook” with the greater speed, range, payload, and survivability required for future battlefields? Full article: https://breakingdefense.com/2019/04/beyond-chinook-army-secretary-challenges-industry-to-revolutionize-heavy-lift

Toutes les nouvelles