11 mars 2022 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

L’Australie augmente significativement les effectifs de son armée

L'Australie va renforcer les effectifs de son armée d'environ 30 % d'ici à 2040, a annoncé, jeudi 10 mars, son Premier ministre, Scott Morrison. Les forces de défense australiennes atteindront 80 000 personnes, soit un renfort de 18 500 soldats, pour un coût de quelque 38 Md$ australiens (25 Md€ environ), a-t-il déclaré lors d'une conférence de presse dans une caserne de l'armée, à Brisbane. Selon M. Morrison, il s'agit de « la plus forte augmentation » des effectifs des forces de défense « en temps de paix dans l'histoire de l'Australie ». Ce renforcement militaire marque, selon lui, la reconnaissance par son gouvernement des « menaces et de l'environnement auxquels nous sommes confrontés en tant que pays, en tant que démocratie libérale dans l'Indo-Pacifique ».

Les Echos du 10 mars

Sur le même sujet

  • DARPA: In the Sky and on the Ground, Collaboration Vital to DARPA’s CODE for Success

    29 mars 2019 | International, Aérospatial

    DARPA: In the Sky and on the Ground, Collaboration Vital to DARPA’s CODE for Success

    On a brisk February morning in the Yuma, Arizona, desert, a swarm of unmanned aerial vehicles equipped with DARPA's Collaborative Operations in Denied Environment system, or CODE, successfully carried out mission objectives, even when communications were offline and GPS was unavailable. One-by-one, six RQ-23 Tigersharks lifted off, fitted with an array of sensors onboard. Next to the runway at the U.S. Army's Yuma Proving Ground, the mission team inside a small operations center tracked the aircraft and as many as 14 additional virtual planes on an aerial map. The capstone demonstration paired program performer Raytheon's software and autonomy algorithms and Johns Hopkins University Applied Physics Laboratory's White Force Network to create a realistic, live/virtual/constructive test environment. During four demonstration runs, the team activated a variety of virtual targets, threats, and countermeasures to see how well the Tigersharks could complete their objectives in suboptimal conditions. “Exactly how the aircraft continue to work together in degraded conditions is the most challenging aspect of this program,” said Scott Wierzbanowski, the DARPA program manager for CODE in the Tactical Technology Office. “Current procedures require at least one operator per UAV in the field. Equipped with CODE, one operator can command multiple aircraft; and in a denied environment, the aircraft continue toward mission objectives, collaborating and adapting for deficiencies.” Before, if operators lost communications with a UAV, the system would revert to its last programmed mission. Now, under the CODE paradigm, teams of systems can autonomously share information and collaborate to adapt and respond to different targets or threats as they pop up. “CODE can port into existing UAV systems and conduct collaborative operations,” said Wierzbanowski. “CODE is a government-owned system, and we are working closely with our partners at the Air Force Research Laboratory and Naval Air Systems Command to keep each other informed of successes and challenges, and making sure we don't replicate work. In the end, our service partners will leverage what we've done and add on what they need.” The Tigersharks employed in the demonstration are surrogate assets for CODE. Each has about one-tenth the speed and performance of the aircraft planned for integration, but shows traceability to larger platforms. Constructive and virtual threats and effects presented by the White Force Network are appropriately scaled to the Tigersharks' capabilities. “It's easy to take the CODE software and move it from platform to platform, both from a computer and vehicle perspective. It could be a manned aircraft, unmanned aircraft, or a ground vehicle,” said J.C. Ledé, technical advisor for autonomy with the Air Force Research Laboratory. “The concept for CODE is play-based tactics, so you can create new tactics relatively easily to go from mission to mission.” The Naval Air Systems Command (NAVAIR) will take ownership of CODE after DARPA closes out the agency's role in the program this year. It already has built a repository of algorithms tested throughout the development process. “What we're doing with the laboratory we set up is not just for the Navy or NAVAIR. We're trying to make our capabilities available throughout the entire DoD community,” said Stephen Kracinovich, director of autonomy strategy for the Naval Air Warfare Center Aircraft Division (NAWCAD). “If the Army wanted to leverage the DARPA prototype, we'd provide them not just with the software, but an open development environment with all the security protocols already taken care of.” Kracinovich says NAWCAD has a cadre of people with hands-on knowledge of the system, and is ready to help port the capability to any other DoD entity. That ease of transition puts CODE technologies on a clear path to assist deployed service members by enabling collaborative autonomous systems to operate in contested and denied environments with minimal human supervision. https://www.darpa.mil/news-events/2019-03-22

  • Naval Group pitches autonomous systems as key to underwater operations

    25 janvier 2024 | International, Naval

    Naval Group pitches autonomous systems as key to underwater operations

    But for high-end operations, "you need to have both manned and unmanned assets complement each other."

  • THE DOD’S APP STORE DOES THIS ONE CRUCIAL THING TO STAY SECURE

    5 juillet 2018 | International, C4ISR

    THE DOD’S APP STORE DOES THIS ONE CRUCIAL THING TO STAY SECURE

    Lily Hay Newman EVERY DAY, COMPANIES like Google and Apple wage a constant battle to keep malicious apps out of their marketplaces and off people's phones. And while they do catch a lot of malware before it does any damage, there are always a few nasty infiltrators that manage to sneak by and end up getting downloaded by thousands of consumers. No one wants these mistakes to happen, but when you're a crucial app store for the Department of Defense, these mistakes can't happen. That was the problem facing the National Geospatial-Intelligence Agency as it set about creating a flexible yet ultrasecure app store in 2012. NGA is a combat support organization that primarily assesses and distributes geospatial intelligence. The agency wanted to provide sensitive and mission-critical apps to groups across the DOD through a platform that had the security and resilience of a government defense product, while also offering a streamlined, up-to-date user experience similar to ubiquitous commercial app stores. "We recognized that we did not know everything when it came to apps, and we wanted to be using the innovation that was happening in the commercial sector," says Joedy Saffel, division chief and source director of NGA who has worked on the GEOINT App Store from the beginning. "But how do we do that in a safe, secure manner? How do we do that from a contractual perspective? And how do we do that in a way that nontraditional vendors will trust doing business with the government? It was a great challenge." The key, Saffel says, is getting developers to agree to hand over the source code of their apps for in-depth analysis and review. Whether an app is a simple time/speed/distance calculator for a pilot or a hyper-specialized classified tool, sharing source code is a big risk for developers, because it means trusting third parties with the core intellectual property they have built their businesses on. But NGA soon realized that full access was the only way its project could work. So NGA's GEOINT App Store runs its security protections and screening processes in a way a commercial platform never could. Need To Know You can browse through the GEOINT App Store yourself today and see many of the mapping, aeronautical, weather-forecasting, location-sharing, and travel-alert services that it hosts for Android, iOS, desktop, and web. But that's just the public unclassified section—one crucial aspect of designing the platform was building segmentation controls so DOD employees with different levels of clearance, or simply different needs, could have gated access to different apps. "We built the App Store to be a completely unclassified environment that's open to the public," says Ben Foster, a technical director at NGA who is the product manager for the app store. "But it also has identity management that uses a federated approach to authentication. It's even flexible enough to integrate with other identity-management platforms across DOD. If a user is a helicopter pilot, they might see and get different apps then someone who is a tactical operator in the Army." This system also works with the platform's pricing variations: Some apps are free to everyone, some downloads come with a fee that needs to be taken out of a particular department's budget, and some apps are licensed by NGA or another agency. The most radical part of the GEOINT App Store from a government perspective is the speed with which NGA can process apps and get them live in the store. In general, government acquisition processes take many months or years, a clear problem when it comes to constantly evolving software. So NGA worked with its chief information officer, IT Directorate, legal team, international affairs division, and contracting office to establish a streamlined app-vetting process that would be acceptable under federal acquisition regulations. The agency also contracted with a private firm called Engility to directly manage the outreach, acquisition, and development environment for customizing prospective apps to NGA's requirements. The process, known as the Innovative GEOINT Application Provider Program, or IGAPP, minimizes bureaucratic hurdles and guides developers who want to submit an app through a pipeline that vets, modifies, and generally grooms apps for NGA's store. "What we focused on early on was providing tools so developers can bring their app and do a lot of the pre-testing and development with Engility," NGA's Saffel says. "We're able to be flexible with that because it's being done outside of the government footprint in a brokered environment. And then NGA has a governance board that meets every week, and the whole process has matured enough that by the time an app comes to NGA, we can review it and get that application into the app store and exposed within two weeks' time." Though the process might be even faster if NGA only did the minimum vetting required, Saffel says that the GEOINT team worked to find a balance where the apps go live quickly, but there's still time for the automated code analyses and human audits that commercial app stores can't do. Check It Out After a developer submits their app, Engility does extensive source code analysis and vulnerability scanning and produces an initial findings report. John Holcomb, the IGAPP program manager from Engility, notes that an initial vulnerability report can have as many as 1,000 items on it that a developer needs to address. "It's a little intimidating at first," Holcomb says. "But we walk them through it, and they go back and modify their code—it's their code, we don't modify it for them. We might go through four runs of that on a brand-new app, but by the time we're done, they will have remediated their code down to the level that the government needs. There are still going to be bureaucratic hurdles, but it's our job to break through those." In addition to digging deep into source code, IGAPP also tests how apps function in practice, to make sure that there aren't benign-looking aspects of the code that actually underlie a shady function. "We take the compiled application and we watch what it does," Holcomb says. "Who does it phone home to? Is it sending private information unencrypted?" After an app gets approved for inclusion in the GEOINT App Store, developers continue to work with IGAPP on developing and vetting software updates so that patches and improvements can be pushed out quickly. The brokered vetting process means that the government never holds developers' source code directly. The inspection is always mediated by Engility, which signs nondisclosure agreements with developers and isn't a software maker itself. Holcomb says that the company carefully guards app data while storing it, and once a project is done, Engility doesn't just do a soft data deletion; it hard-purges the information from its cloud servers within 30 days. NGA's Saffel and Holcomb both note that developers were apprehensive about the unusual workflow at first, but over the years the app store has gained credibility. Developers say they benefit from the IGAPP process both by securing lucrative government contracts and by integrating the improvements from the IGAPP development into their commercial products. The code audits and security vetting IGAPP offers are expensive, so developers generally don't do such extensive assessment on their own. "Everyone's dream is to sell to the government, but it normally takes years of effort to get to a position where you can. In our case, I was able to sell to the government in less than a month," says Bill DeWeese, CEO of the firm Aviation Mobile Apps, which has had six apps accepted into the GEOINT App Store. "You do feel a little anxiety about sharing source code, you worry about your IP leaking and someone getting ahold of it. But I haven't had any issues, and the benefit is the increased quality of your products at no cost—you get the analysis for free and you can put it in your commercial offerings." NGA's Saffel says the governance board that evaluates the apps at the end of the process is careful to stay vigilant so nothing goes into the store by accident. The board will still push back on apps or turn them away when warranted, but Saffel says the process has matured such that most of what the board sees these days is ready or very near ready to go live. And IGAPP prioritizes its patching process and infrastructure, to make it easy for developers to push bug fixes and improvements throughout the life of an app. All of this means a consumer-grade turnaround time for critical Department of Defense tools without the consumer-grade security concerns. "NGA is kind of a unique combat-support agency," Saffel says. "With the GEOINT App Store we chose to go into a very risky new frontier for DOD and the government in general, but I think we've demonstrated that we can do things differently and still be secure and still control access. We're supporting a lot of different mission sets, and I expect that the app store will keep growing." https://www.wired.com/story/dod-app-store-does-this-one-crucial-thing-to-stay-secure/

Toutes les nouvelles