9 mars 2023 | International, Autre défense
Biden proposes Pentagon spending increase with industrial base focus
Biden is proposing a 3.2% increase in Defense Department spending with an eye on the Pacific and bolstering the naval industrial base.
17 décembre 2020 | International, Aérospatial
Munich, 09 December 2020 – Airbus has concluded a pilot phase of the “Innovations for FCAS” (I4 FCAS) initiative which aims at involving German non-traditional defence players -covering startups, small to medium enterprises (SMEs) and research institutes- in the development of Future Combat Air System (FCAS). This initiative which was launched in April 2020 was funded by the German Ministry of Defence.
“The initiative shows that FCAS does not compare with previous larger defence projects. By implementing young and innovative players, some of whom have never been in touch with the defence sector, we ensure to leverage all competencies available for a game-changing high-tech programme such as FCAS”, said Dirk Hoke, Chief Executive Officer of Airbus Defence and Space. “It will also foster technological spill-overs between the military and civil worlds. It is our ambition to continue the initiative in 2021 and beyond, and make it a cornerstone of our FCAS innovation strategy.”
During the pilot phase, 18 innovative players worked on 14 projects in different areas, covering the whole range of FCAS elements: combat cloud, connectivity, new generation fighter, remote carriers, system of systems, sensors. Among these 14 projects, Airbus engineers have worked closely with SMEs and startups to achieve concrete results such as:
· A first flight-test approved launcher of an Unmanned Aerial Vehicle (UAV) from of a transport aircraft. This project is the result of a cooperation between Airbus as A400M integrator, Geradts GmbH for the launcher and SFL GmbH from Stuttgart for UAV integration and supported by DLR simulations. An agile design and development approach allowed for rapid prototyping and flight readiness in only 6 months.
· A secure combat cloud demonstrator: a first time transfer of secured operating systems into a cloud environment. Kernkonzept GmbH from Dresden together with Airbus CyberSecurity have shown how IT security can be used for highest security requirements on a governmental cloud system.
· A demonstrator of applied artificial intelligence on radio frequency analysis. Hellsicht GmbH from Munich trained their algorithms on Airbus-provided datasets, allowing for a unique capability of real time fingerprinting of certain emitters, such as radars.
As Europe's largest defence programme in the coming decades, FCAS aims at pushing the innovation and technological boundaries. Its development will bring disruptive technologies such as artificial intelligence, manned-unmanned teaming, combat cloud or cybersecurity to the forefront.
9 mars 2023 | International, Autre défense
Biden is proposing a 3.2% increase in Defense Department spending with an eye on the Pacific and bolstering the naval industrial base.
8 janvier 2020 | International, C4ISR, Sécurité
Mark Pomerleau The U.S. Cyberspace Solarium Commission, a bipartisan organization created in 2019 to develop a multipronged U.S. cyber strategy, will recommend the Department of Defense add more cyberwarriors to its forces, the group's co-chair said Jan. 7. The cyber mission force was established in 2013 and includes 133 teams and roughly 6,200 individuals from across the services that feed up to U.S. Cyber Command. These forces reached a staffing milestone known as full operational capability in May 2018, however, some on the commission believe the cyber landscape has changed so that the force needs to adapt as well. In a final report that's expected in the coming months, the solarium will recommend adding more cyberwarriors. “It's fair to say that force posture today in cyber is probably not adequate," said Rep. Mike Gallagher, R-Wisc., co-chair of the U.S. Cyberspace Solarium Commission. Gallagher spoke at an event hosted by the Council on Foreign Relations in Washington Jan. 7. Within the last two years, Cyber Command has described a philosophy called persistent engagement, which is a means of constantly contesting adversary behavior in cyberspace before it can be disruptive. Persistent engagement is viewed as a means of meeting the 2018 DoD cyberspace strategy's direction to “defend forward.” That action seeks to position U.S. cyber forces outside of U.S. networks to either take action against observed adversary behavior or warn partners domestically or internationally of impending cyber activity observed in foreign networks. It is under this new approach that Gallagher and other commission members said the Pentagon must ensure its forces are capable of meeting the burgeoning challenges from bad actors. “We need to figure out what's the right size” of the force, Mark Montgomery, executive director of the commission, said at an event in November. “In my mind, the CMF probably needs to be reassessed. It might be that the assessment [says] that the size is the right size. I find that hard to believe with the growth in adversary.” The cyber mission force is made up of about 5,000 service members out of a full staff of about 6,200, Dave Luber, Cyber Command's executive director said in November. According to a defense official, it's normal that staffing will fall below 100 percent but leaders are confident in DoD's cyber forces' readiness and ability to defend the nation. During a February 2019 hearing before the Senate Armed Services Committee, Cyber Command's leader, Gen. Paul Nakasone, said the force is the right size for the threats they currently face, but as it continues to operate and adversaries improve, it will need to grow beyond the 133 teams. However, Nakasone told a defense conference in California in December that the force has been built to execute the persistent engagement strategy. “Within U.S. Cyber Command, the National Security Agency, it's about persistent engagement; this idea that we will enable our partners with information and intelligence and we will act when authorized,” he said. “This is the way forward for us ... This is the way that we've structured our force. This is the way that we developed our doctrine. This is the way that we engage our adversaries ... this is our method upon which we look at the future and say this is how we have an impact on our adversaries.” Aside from the Cyberspace Solarium Commission, Congress now requires the Department of Defense to provide quarterly readiness briefings on the cyber mission force. In the annual defense policy bill, signed into law in December, Pentagon officials must brief members of Congress on the abilities of the force to conduct cyber operations based on capability, capacity of personnel, equipment, training and equipment condition. The secretary of defense must also establish metrics for assessing the readiness of the cyber mission force, under the provision. https://www.fifthdomain.com/dod/2020/01/07/congressional-commission-wants-more-cyberwarriors-for-the-military/
4 février 2021 | International, C4ISR, Sécurité
Agnes Helou BEIRUT — A Qatari cyber research center has selected Leonardo to provide a cyber range and training system to support security operations, the Italian firm announced Feb. 3. The Qatar Computing Research Institute, or QCRI, was established by the Qatar Foundation for Education, Science and Community Development. The training platform ordered by the QCRI is capable of simulating cyberattacks so users can assess the resilience of digital infrastructure. “The training is completely to be performed in Qatar, and it is expected, through an approach oriented to ‘train the trainers,' to provide courses to a significant number of operators involved in the cybersecurity framework,” Tommaso Profeta, managing director of Leonardo's Cyber Security Division, told Defense News. He noted that training and exercise scenarios can be customized using a drag-and-drop graphical interface. The platform can also analyze and classify the results of simulated attacks based on data collected during real-world offensive campaigns. Scenarios can be used for individual training or classroom experiences, and they provide practice for security operations centers and incident response activities. This training tool “will allow the QCRI to deliver a complete cyber training process, from the design of the learning path to specific training sessions. Users will be able to practice their skills in simulated attack and defense scenarios, employing both information technology (IT) and operational technology (OT). The training will produce qualified teams of operators equipped with up-to-date knowledge and techniques, ready to face ever-evolving cyber threats,” according to a company statement. “The best cyber training/testing environments are in theory real production systems. But in practice for such environments, institutions, enterprises and organizations cannot easily experience critical situations without paying high, sometime unaffordable prices,” Profeta said. “Training and testing are therefore the two essential, human-driven processes that can effectively support the overall cyber ‘protection' loop, but only if they can cope with real threats and highly realistic systems in highly realistic situations.” Cyber ranges provide a controlled environment where cybersecurity experts can practice their technical and soft skills in emulated complex networks and infrastructures to learn how to respond to real-world cyberattacks. In these environments, cyber tools can be stressed to reveal their limits and vulnerabilities before deployment into cyberspace. Leonardo's platform challenges such assets and provides digital twin environments for predeployment testing. Asked whether other Gulf countries have expressed interest in this training system, Profeta said it “has already been presented to other high-level Middle East stakeholders, and a significant level of interest has been registered for the platform.” What scenarios are available? Those using the cyber range will try to defend against simulated but realistic cyberattacks. According to Profeta, these include: Man-in-the-middle attacks. Botnets. Exploitation of client and server vulnerabilities with lateral movements in search of sensitive data. Distributed denial-of-service attacks (HTTP flooding or domain name system reflection) designed to disrupt connections to a targeted server. Ransomware via multiple vectors, such as spear-phishing via email or drive-by downloads, relying on DNS-based covert channels. Data exfiltration of personally identifiable information and intellectual property. Though it's difficult to measure the potential effectiveness of this platform for Qatar, the company official predicted the system will reduce the cost of and improve the user experience in cyber training. Leonardo also supplies the NATO Computer Incident Response Capability, a cyber defense product. https://www.c4isrnet.com/cyber/2021/02/03/qatari-research-center-chooses-leonardo-for-cyber-range