13 juin 2024 | International, Terrestre

FAA, EASA vow to boost collaboration on new airplane certification

Sur le même sujet

  • Audit finds cyber vulnerabilities in US missile defense system

    17 décembre 2018 | International, C4ISR

    Audit finds cyber vulnerabilities in US missile defense system

    By: Geoff Ziezulewicz The Army, Navy and Missile Defense Agency are failing to take basic cybersecurity steps to ensure that information on America's ballistic missile defense system won't fall into nefarious hands, according to a Defense Department Inspector General audit released Friday. Investigators visited five sites that manage ballistic missile defense elements and technical information, but the names of the commands were redacted in the publicly released report. “The Army, Navy and MDA did not protect networks and systems that process, store, and transmit (missile defense) technical information from unauthorized access and use,” the declassified report states. Such inadequacies “may allow U.S. adversaries to circumvent (missile defense) capabilities, leaving the United States vulnerable to missile attacks,” the report states. They found officials failed to employ safeguards familiar to most people online in 2018, the latest development to raise questions about the U.S. military's cybersecurity vulnerabilities. Among the shortcomings: Administrators for classified networks had no intrusion detection and prevention systems in place to watch for cyberattacks, much less stop them, according to the report. At one site, officials said they had requested to purchase those cyber safeguards in December 2017 but nine months later it still hadn't been approved. “Without intrusion detection and prevention capabilities, (the site) cannot detect malicious attempts to access its networks and prevent cyberattacks designed to obtain unauthorized access and exfiltrate sensitive (missile defense) technical information,” the report states. Officials also failed to patch system flaws after receiving vulnerability alerts, one of which had first been identified in 1990 and had still not been fixed by April. Another vulnerability that could be exploited by an attacker was first identified in 2013 but also was never pathced, according to the report. “Countless cyber incident reports show that the overwhelming majority of incidents are preventable by implementing basic cyber hygiene and data safeguards, which include regularly patching known vulnerabilities,” the IG report states. “(Missile defense) technical information that is critical to national security could be compromised through cyberattacks that are designed to exploit these weaknesses.” Some facilities failed to force employees to use common access cards, or CAC, when accessing the classified system, a basic cybersecurity practice known as multi-factor identification. Instead, officials were able to access the sensitive information using just a username and password, the report states. Hackers use phishing and other tactics to exploit passwords and gain access to such systems. New hires are supposed to be allowed network access without a card for only their first two weeks on the job. But IG investigators found users on the systems without CAC cards for up to seven years. At one site, a domain administrator never configured the network to allow only CAC holder access. “Allowing users to access networks using single factor authentication increases the potential that cyber attackers could exploit passwords and gain access to sensitive (missile defense) technical information,” the report states. Investigators also found unlocked server racks at some locations, another key vulnerability to insider snoopers. “The insider threat risk necessitates that organizations implement controls...to reduce the risk of malicious personnel manipulating a server's ability to function as intended and compromising sensitive and classified data,” the report states. External storage devices held unencrypted data and some sites failed to track who was accessing data, and why. Other administrators told investigators that they lacked the ability to record or monitor data downloaded from the network onto these devices. Unless these officials enforce the encryption of such removed data and monitor its downloading and transferring, “they will be at increased risk of not protecting sensitive and classified (missile defense) technical information from malicious users,” the report states. Investigators also found that some supposedly secure sites were failing to even lock their doors. One location had a security door that hadn't worked for years. “Although security officials were aware of the problem, they did not take appropriate actions to prevent unauthorized personnel from gaining unauthorized access to the facility,” the report states. Other sites featured no security cameras to monitor personnel movement and security officers failed to conduct badge checks. While the report makes recommendations to fix the documented problems, officials for the inspected agencies offered no comments on the non-classified draft report of the audit. Friday's scathing IG audit marked the latest in a string of reports detailing shoddy cybersecurity throughout the armed forces and defense contractors. During the same week, the Wall St. Journal reported that Chinese hackers are targeting military systems and those of defense contractors working on Navy projects. Beijing-linked cyber raids have attempted to steal everything from missile plans to ship-maintenance data in a series of hacks over the past 18 months, the Journal reports. As a result, Navy Secretary Richard Spencer has ordered a “comprehensive cybersecurity review” to assess if the Navy's cyber efforts “are optimally focused, organized, and resourced to prevent serious breaches,” spokesman Capt. Greg Hicks said. The review will also look at authorities, accountability and if the efforts reflect and incorporate government and industry best practices, he said. “Secretary Spencer's decision to direct a review reflects the serious to which the DoN prioritizes cybersecurity in this era of renewed great power competition,” Hicks said. https://www.navytimes.com/news/your-navy/2018/12/14/audit-finds-cyber-vulnerabilities-in-us-missile-defense-system

  • Hensel Phelps Construction nabs $54.3M for undersea training center

    16 avril 2020 | International, Naval

    Hensel Phelps Construction nabs $54.3M for undersea training center

    ByChristen McCurdy April 15 (UPI) -- The Navy has awarded Hensel Phelps Construction a $54.3 million contract for design and construction of an undersea operational facility, the Pentagon said Wednesday. According to the contract announcement, the training center will be constructed in Oahu, Hawaii, and will support a variety of functions, including operator and undersea vehicle training, applied instruction and laboratories and computer laboratories. The contract also includes a line item for furniture, repairs and equipment. The center will also include diver support spaces, administrative spaces, maintenance and repair spaces and operator's gear storage lockers and maintenance and support spaces. Construction is expected to be complete by April 2022. https://www.upi.com/Defense-News/2020/04/15/Hensel-Phelps-Construction-nabs-543M-for-undersea-training-center/4831586995292

  • L'intelligence artificielle fait évoluer le paysage de la défense

    16 avril 2020 | International, C4ISR

    L'intelligence artificielle fait évoluer le paysage de la défense

    Une étude vient mettre en avant l'impact de l'intelligence artificielle dans les armées, à la fois sur un plan opérationnel et industriel. L'IA, facteur d'innovation. La révolution et les évolutions apportées par l'intelligence artificielle ne sont plus à démontrer. Dans le monde civil comme militaire, algorithmes et IA viennent apporter un complément d'information et représentent une plus-value, d'autant plus incontestable dans le domaine militaire. L'ensemble des armées du monde ont bien compris la nécessité de se tourner vers le big data et l'IA afin d'innover et de parvenir à conserver une supériorité opérationnelle sur l'adversaire. Les stratégies d'IA appliquées à la défense se multiplient et s'accompagnent généralement de réflexions sur les questions éthiques, dans un contexte occidental où l'emploi de SALA est vivement critiqué. Compétition internationale. Market Forecast a consacré une étude à ce sujet, et est venu analyser les impacts de l'IA au domaine de la Défense. C'est-à-dire aussi bien les apports pour les armées que la façon dont les travaux sont menés par les industriels. Nommé « Artificial Intelligence will arm defense contractors for global growth », ce rapport met en avant la façon dont les Etats se sont tournés vers cette nouvelle technologie afin de venir compléter les moyens de leurs armées. « Des nations comme la Chine ou la Russie réalisent des investissements substantiels dans l'IA pour des applications militaires, venant parfois poser des questions au regard du droit international et des droits humains », peut-on lire dans le rapport de Market Forecast. Des investissements visant ainsi à concurrencer les pays membres de l'OTAN, qui se sont eux aussi tournés largement vers l'intelligence artificielle afin de renforcer les capacités de leurs plateformes. Volet industriel. Mais l'adoption de l'IA dans les technologies de défense vient également questionner le tissu industriel. Selon Market Forecast, dans une grande majorité des cas, les Etats devront se tourner vers de nouvelles entreprises, plus petites et souvent non issues du secteur de la Défense afin de pouvoir se doter d'algorithmes performants. « Par exemple, aux Etats-Unis, plus de 60% des contrats tournés vers l'IA, inscrits dans le budget présidentiel de l'année fiscale 2017, sont menés par des acteurs non traditionnels de la Défense et des petits fournisseurs », rapporte Market Forecast. S'il n'y a aucun doute sur le fait que les géants de la défense et fournisseurs historiques continueront à mener leur activité, beaucoup s'appuieront donc sur de plus petites structures, spécialisées, afin d'intégrer la brique IA. En France, on peut ainsi penser à la petite entreprise EarthCube, qui malgré sa taille réduite et son jeune 'ge fait fortement parler d'elle et est parvenue à décrocher d'importants contrats dans la défense. Elle en a même fait son cœur d'activité. A l'avenir, les géants de la défense devront donc marcher aux côtés des plus petits et apprendre à collaborer avec ces structures qui portent elles aussi l'innovation. Car en effet, le marché de l'IA pour la défense devrait connaître un taux de croissance annuel moyen de 10,29% entre 2020 et 2028, démontrant l'importance de cette technologie qui offre d'importants débouchés commerciaux. https://www.air-cosmos.com/article/lintelligence-artificielle-fait-voluer-le-paysage-de-la-dfense-22924

Toutes les nouvelles