29 février 2024 | International, Terrestre

GDIT Awarded $493 Million Task Order to Provide Technical Support Services to U.S. Special Operations Command

Under the task order, GDIT will provide technical and mission support services to USSOCOM and its partners

https://www.epicos.com/article/791332/gdit-awarded-493-million-task-order-provide-technical-support-services-us-special

Sur le même sujet

  • Spain’s military still has eyes for the F-35 despite European fighter push

    13 juin 2019 | International, Aérospatial

    Spain’s military still has eyes for the F-35 despite European fighter push

    By: Sebastian Sprenger MADRID – The Spanish navy and air force are still interested in the American F-35 fighter jet, even though the government is about to join a Franco-German program to develop a new European plane. The two services are in the beginning stages of an analysis in which the Lockheed Martin-made aircraft is emerging as a key contender, officials told reporters on the sidelines of the FEINDEF defense expo here in late May. For the navy, the choice for the short-takeoff-and-landing variant of the jet, dubbed the F-35B, appears to be more clear-cut than for the air force. The Spanish navy wants to replace its 12 Harrier jets, which are launched from the LPH Juan Carlos I. That ship's short, ski-jump deck makes the F-35B the only option on the market, according to Cdr. Antonio Estevan, a staff officer at the service's plans and policy division. “From a technical point of view, it's a very interesting option for us,” Estevan said. “The problem is the cost. The version for us would be, as far as I know, $100 million; the air force version $80 million. We are talking about high prices. Even the American president was surprised when he realized the cost.” Air force officials, meanwhile, are keeping their options more open when it comes to replacing the service's 84 Boeing-made F-18s. Twenty planes of the “A” variant, stationed on the Canary Islands, need to be replaced first, by 2025, according to Brig Gen. Juan Pablo Sanchez de Lara, chief of the Spanish Air Force's plans division. Airbus has its eyes on that business and is offering to outfit the squadron with the Eurofighter. While that outcome is also the air force's expectation, a replacement for the rest of the F-18 fleet, 64 planes of the “M” designation, is still up for grabs, according to Sanchez de Lara. The two services cooperating on the requirements of a potentially joint program means the F-35 is on the table in some form or another, though it's unclear how compatible the branches' needs will be in the end. “For the navy, it's a very simple solution because they need an aircraft for vertical, short takeoff,” Sanchez de Lara said. “For us, it's different.” Both services want new aircraft by around 2030. That would be ten years before the Future Combat Air System program, led by Airbus and Dassault, is scheduled to field a new combat aircraft. The situation in Spain is reminiscent of the choice Germany faced about the F-35, and the government's decision earlier this year to ditch the plane as a contender to replace the Tornado. The Luftwaffe, the German air force, was reportedly in favor of the American fifth-generation plane, while the defense ministry's civilian leadership preferred an upgraded version of the Eurofighter Typhoon. Airbus had lobbied hard against the F-35, arguing that the pick of a new U.S. aircraft at this stage would effectively sink the entire FCAS project. Meanwhile, two F-35s arrived at Llanos Air Base near Albacete, Spain, earlier this week for training with other NATO air forces, according to announcements from the U.S. Air Force and NATO. During the Tactical Leadership Program officials practiced integrating the aircraft into a search-and-rescue drill to extract friendly forces from enemy territory, a June 11 alliance statement reads. https://www.defensenews.com/global/europe/2019/06/12/spains-military-still-has-eyes-for-the-f-35-despite-european-fighter-push/

  • Northrop Grumman to Develop Advanced Air-to-Air Missile Engagement Concept

    12 février 2021 | International, Aérospatial

    Northrop Grumman to Develop Advanced Air-to-Air Missile Engagement Concept

    Posted on February 11, 2021 by Seapower Staff REDONDO BEACH, Calif. — Northrop Grumman Corp. has been awarded a contract by the U.S. Defense Advanced Research Project Agency (DARPA) Tactical Technology Office to develop an advanced technology weapon concept designed to significantly increase engagement range and weapon effectiveness of U.S. forces against adversary air threats, the company said in a Feb. 10 release. “Our collaboration with DARPA is the critical first step in the development of innovative operational concepts and solutions that will enhance our warfighter's combat capability against a rapidly growing threat,” said Jaime Engdahl, program director, kinetic weapons and emerging capabilities, Northrop Grumman. “The LongShot program enables us to combine our digital engineering skillset with our extensive knowledge in advanced technology weapons, autonomous systems and strike platforms to increase weapon range and effectiveness.” Spurred by rapid technological advancements and an ever more dangerous and disruptive battlefield, DARPA's LongShot program will explore new lethal engagement concepts by leveraging multi-modal propulsion, weapon systems that can be operationally deployed from existing fighters or bombers. DARPA's advanced aerospace systems activities are focused on utilizing high pay-off opportunities to provide revolutionary new system capabilities, as opposed to incremental or evolutionary advancements, in order to achieve undeterrable air presence at dramatically reduced costs. The LongShot program enables Northrop Grumman to combine its expertise in weapon system design, survivability, autonomy, advanced mission systems and rapid prototyping to deliver advanced solutions that help to maintain a competitive military advantage in highly contested environments. https://seapowermagazine.org/northrop-grumman-to-develop-advanced-air-to-air-missile-engagement-concept/

  • Audit finds cyber vulnerabilities in US missile defense system

    17 décembre 2018 | International, C4ISR

    Audit finds cyber vulnerabilities in US missile defense system

    By: Geoff Ziezulewicz The Army, Navy and Missile Defense Agency are failing to take basic cybersecurity steps to ensure that information on America's ballistic missile defense system won't fall into nefarious hands, according to a Defense Department Inspector General audit released Friday. Investigators visited five sites that manage ballistic missile defense elements and technical information, but the names of the commands were redacted in the publicly released report. “The Army, Navy and MDA did not protect networks and systems that process, store, and transmit (missile defense) technical information from unauthorized access and use,” the declassified report states. Such inadequacies “may allow U.S. adversaries to circumvent (missile defense) capabilities, leaving the United States vulnerable to missile attacks,” the report states. They found officials failed to employ safeguards familiar to most people online in 2018, the latest development to raise questions about the U.S. military's cybersecurity vulnerabilities. Among the shortcomings: Administrators for classified networks had no intrusion detection and prevention systems in place to watch for cyberattacks, much less stop them, according to the report. At one site, officials said they had requested to purchase those cyber safeguards in December 2017 but nine months later it still hadn't been approved. “Without intrusion detection and prevention capabilities, (the site) cannot detect malicious attempts to access its networks and prevent cyberattacks designed to obtain unauthorized access and exfiltrate sensitive (missile defense) technical information,” the report states. Officials also failed to patch system flaws after receiving vulnerability alerts, one of which had first been identified in 1990 and had still not been fixed by April. Another vulnerability that could be exploited by an attacker was first identified in 2013 but also was never pathced, according to the report. “Countless cyber incident reports show that the overwhelming majority of incidents are preventable by implementing basic cyber hygiene and data safeguards, which include regularly patching known vulnerabilities,” the IG report states. “(Missile defense) technical information that is critical to national security could be compromised through cyberattacks that are designed to exploit these weaknesses.” Some facilities failed to force employees to use common access cards, or CAC, when accessing the classified system, a basic cybersecurity practice known as multi-factor identification. Instead, officials were able to access the sensitive information using just a username and password, the report states. Hackers use phishing and other tactics to exploit passwords and gain access to such systems. New hires are supposed to be allowed network access without a card for only their first two weeks on the job. But IG investigators found users on the systems without CAC cards for up to seven years. At one site, a domain administrator never configured the network to allow only CAC holder access. “Allowing users to access networks using single factor authentication increases the potential that cyber attackers could exploit passwords and gain access to sensitive (missile defense) technical information,” the report states. Investigators also found unlocked server racks at some locations, another key vulnerability to insider snoopers. “The insider threat risk necessitates that organizations implement controls...to reduce the risk of malicious personnel manipulating a server's ability to function as intended and compromising sensitive and classified data,” the report states. External storage devices held unencrypted data and some sites failed to track who was accessing data, and why. Other administrators told investigators that they lacked the ability to record or monitor data downloaded from the network onto these devices. Unless these officials enforce the encryption of such removed data and monitor its downloading and transferring, “they will be at increased risk of not protecting sensitive and classified (missile defense) technical information from malicious users,” the report states. Investigators also found that some supposedly secure sites were failing to even lock their doors. One location had a security door that hadn't worked for years. “Although security officials were aware of the problem, they did not take appropriate actions to prevent unauthorized personnel from gaining unauthorized access to the facility,” the report states. Other sites featured no security cameras to monitor personnel movement and security officers failed to conduct badge checks. While the report makes recommendations to fix the documented problems, officials for the inspected agencies offered no comments on the non-classified draft report of the audit. Friday's scathing IG audit marked the latest in a string of reports detailing shoddy cybersecurity throughout the armed forces and defense contractors. During the same week, the Wall St. Journal reported that Chinese hackers are targeting military systems and those of defense contractors working on Navy projects. Beijing-linked cyber raids have attempted to steal everything from missile plans to ship-maintenance data in a series of hacks over the past 18 months, the Journal reports. As a result, Navy Secretary Richard Spencer has ordered a “comprehensive cybersecurity review” to assess if the Navy's cyber efforts “are optimally focused, organized, and resourced to prevent serious breaches,” spokesman Capt. Greg Hicks said. The review will also look at authorities, accountability and if the efforts reflect and incorporate government and industry best practices, he said. “Secretary Spencer's decision to direct a review reflects the serious to which the DoN prioritizes cybersecurity in this era of renewed great power competition,” Hicks said. https://www.navytimes.com/news/your-navy/2018/12/14/audit-finds-cyber-vulnerabilities-in-us-missile-defense-system

Toutes les nouvelles