7 novembre 2024 | International, Terrestre

Germany approves new military service to recruit more reservists

Germany’s cabinet has approved plans for a new MSM to overhaul its depleted armed forces following Russia's invasion of Ukraine.

https://www.army-technology.com/news/germany-new-military-service/

Sur le même sujet

  • Invisible Interdiction: Air Force Awards Contract for Rail-Mounted Anti-Drone System

    14 juin 2019 | International, Autre défense

    Invisible Interdiction: Air Force Awards Contract for Rail-Mounted Anti-Drone System

    By: Harry McNabb While drone detection systems are proliferating recently, what to do when you've identified a rogue drone is still a problem. Solutions range from catcher drones equipped with nets to shoulder mounted “ray guns” and even drone hunting birds. In a recent press release (below), Invisible Interdiction announced the award of a U.S. Air Force contract to design and test a small lightweight rail-mounted drone jamming module: a device that can be attached to other weapons carried by military personnel. We reached out to Invisible Interdiction president, Clay Wild to learn more about the development of their technology: DRONELIFE: Congratulations on your award. Do you have a image that you could share with our readers? Clay Wild: “The system itself is still a rendering, but I've attached a couple of photos that might be useful. It will be an interesting capability.” DroneLife: Who is the Audience for your system? Whom is it designed for? Clay Wild: “The initial users will be US Air Force Security Forces personnel. The guys who guard Air Force bases. DRONELIFE: What is important about this award to Invisible Interdiction? Clay Wild: “This is our first major contract award. We are going to provide Security Forces Airmen the ability to stop drones interfering with their operations without the need to carry extra equipment. Attaching the countermeasure to the weapon provides them instant access to this device”. DRONELIFE: Tell us a little bit about Invisible Interdiction and how you got started. Clay Wild: “Invisible Interdiction was started only a year ago in March 2018 but we've been in the counter-drone business for almost four years now with other organizations. We are currently marketing to defense agencies in the U.S. but have a very active international representative network around the world introducing our capabilities to those military and police agencies that are allowed to deploy jamming capabilities. As you are aware, the RF jamming is a very sensitive technology around the world because of the potential for collateral effects. With most drones using the WIFI bands for control, jamming this part of the spectrum can impact everyday things like WIFI routers, Bluetooth devices, etc. We happen to design very directional and low-power jamming systems, but they can be temporarily impactful nonetheless. The use of this, and other types of countermeasures, is an interesting debate that is just starting.” DRONELIFE: How did you come up with the name of the company? Clay Wild: “The company name Invisible Interdiction refers to the use of ‘invisible' RF energy for interdiction of errant drones. This appeared to be an interesting play on what we do. Once folks think about it for a minute, the light goes on and..”oh yeah, I get it.” The following is an Invisible Interdiction press release. Invisible Interdiction Awarded Air Force Contract for Rail-mounted UAS Denial System. Melbourne, FL, May 30, 2019: Melbourne, Florida based Invisible Interdiction has been awarded a contract to design, test and qualify a very small, lightweight rail- mounted C-UAS jamming module. This Phase 3 contract is the result of a Special Topic SBIR award originally envisioned by the Air Force's Las Vegas-based innovation hub called AFWERX. Several barriers to working with the Air Force were removed including a shorter application process, an accelerated contract award and a shorter period of performance. This effort started in the fall of 2018 in response to the Air Force's pursuit of innovative counter-drone technologies. Invisible Interdiction submitted a concept that was selected and proven feasible late last year. This UAS denial system will be similar in size and weight to existing rail-mounted aiming lasers that are mounted on the Picatinny rail of issued shotguns or M4 rifles. Noted Invisible Interdiction CEO Bryan Sydnor, “We already have considerable experience designing small and lightweight hand-held and modular jamming systems. This weapon attachable jamming module will test our ability to design an effective capability that easily attaches to the service rifle or shotgun.” Prototype testing and qualification is scheduled for later this summer with production units available by the end of 2019. https://dronelife.com/2019/06/12/invisible-interdiction-air-force-awards-contract-for-rail-mounted-anti-drone-system/

  • US Army’s fresh look at watercraft includes unmanned options

    27 mars 2024 | International, Aérospatial

    US Army’s fresh look at watercraft includes unmanned options

    The Army's new plan for watercraft has a joint focus and will use autonomous and robotic technology.

  • 3 ways the Navy wants to protect its weapons from cyberattacks

    8 janvier 2019 | International, Naval, C4ISR

    3 ways the Navy wants to protect its weapons from cyberattacks

    By: Justin Lynch They have been hacked, tricked and stolen from. Now the message is clear -- no more. The Navy is looking to support research in 36 areas that can help protect weapons systems from cyberattacks, Naval Air Systems Command said in a Jan. 7 update to a broad agency announcement. “It's not necessarily cutting edge research, but it is the first step in cybersecurity quality control that should have already been done,” said Bryson Bort, the founder and chief executive officer of Scythe, a cybersecurity platform. The Navy had admitted as much. Research into protecting the department's weapons comes amid reports that the American military suffers from sustained cyberattacks. In December, an Inspector General report found that some in the Pentagon were not taking basic cybersecurity steps to protect its ballistic missile system. Although the Pentagon's weapons are worth roughly $1.66 trillion, an October report from the Government Accountability Office found that “nearly all” American missiles, jets, ships and lethal equipment in development are vulnerable to cyberattacks. The announcement comes after Congress has mandated the Pentagon address its cyber vulnerabilities. Three of the research areas the Navy is interested are commonly described as the pillars of strong cybersecurity, no matter the institution. They include: Dynamic reconfiguration In an effort to confuse attackers, the Navy wants to research “dynamic reconfiguration.” The National Institute of Standards and Technology defines the term as “changes to router rules, access control lists, intrusion detection/prevention system parameters, and filter rules for firewalls and gateways.” "Organizations perform dynamic reconfiguration of information systems, for example, to stop attacks, to misdirect attackers, and to isolate components of systems, thus limiting the extent of the damage from breaches or compromises,” NIST officials wrote. Research by the University of Maryland's Christian Johnson found that pairing predictive analytics with dynamic reconfiguration tactics, the new approach can lead to the "successful development of learning models that identify specific classes of malware such as ransomware,” Johnson wrote in a paper for the RSA conference. Deception tactics Experts have long used strategies of physical war in digital battles, including with the use of denial and deception tactics. The Navy wants to boost understanding of this area to better secure its weapons systems. In 2015, researchers at MITRE, which conducts federally funded research, advocated for a 10-step process for planning and executing deception operations. “Leveraging classical denial and deception techniques to understand the specifics of adversary attacks enables an organization to build an active, threat-based cyber defense,” a team of researchers wrote. But the Intelligence Advanced Research Project Activity, the intelligence community's research arm, says that the use of deceptive software and hardware in cybersecurity is still in its infancy. “Many techniques lack rigorous experimental measures of effectiveness,” the organization said, adding that “information is insufficient to determine how defensive deception changes attacker behavior.” Artificial intelligence If there was a common denominator of the federal government's investment in cybersecurity it is the use or artificial intelligence. The Navy has embraced artificial intelligence since its Task Force Cyber Awakening project in 2015. “We see that the more we automate our networks and the more we use machines to do the heavy lifting, the better. Our brains do not have the intellectual capacity to process all of that information,” Rear Adm. Danelle Barrett, Navy Cyber Security Division Director,told Defense Systems, a trade publication, in a 2017 interview. More than half of the challenges and research opportunities announced by IARPA in 2018 involved machine learning, according to an analysis by Fifth Domain. Cyber Command has embraced the technology in a short time period, Capt. Ed Devinney, director of corporate partnerships at the body, said during the November Cyber Con conference hosted by Fifth Domain. “If you talked to anyone at the command two or three years ago about a system that would be all autonomous, you probably wouldn't get much traction. But I think there is a growing understanding and consensus that we need to operate at machine speed, especially when talking about active defense of the network,” Devinney said. He said that everyone likes to use the phrases “artificial intelligence” and “machine learning,” however “there aren't that many people who do AI very well.” https://www.fifthdomain.com/dod/2019/01/07/3-ways-the-navy-wants-to-protect-its-weapons-from-cyberattacks

Toutes les nouvelles