9 juillet 2021 | International, Aérospatial

Les Armées face au défi des drones

Faisant suite aux deux rapports parlementaires à l'Assemblée nationale et au Sénat, Le Figaro consacre une double page aux drones militaires. Pour la ministre des Armées, la menace des drones « s'accroît et s'accélère », a-t-elle déclaré en assistant, à Biscarrosse, à un premier tir antidrone par laser. « C'est un véritable enjeu technologique, car il s'agit de faire face à une menace qui ne peut pas toujours être prise en compte par notre défense aérienne classique : elle est trop petite, trop lente, trop basse et avec une signature radar trop faible » poursuit la ministre. Pour y répondre, les systèmes Milad ou Bassalt conçus avec le groupe ADP ont déjà été utilisés à l'occasion de la fête nationale ou du sommet du G7 à Biarritz. En outre, le système Arlad est capable de détecter un objet volant entre 700 mètres et 1 kilomètre et d'orienter un tir de destruction automatique. Toutefois, la « chaîne détection-identification-neutralisation n'est pas encore consolidée » reconnaissent les armées. Les régiments vont donc aussi s'équiper de fusils brouilleurs Nerod. Dans le domaine offensif, la France cherche à rattraper son retard. « Nous allons multiplier le nombre d'aéronefs au sein de l'armée de terre par plus de 10 pour passer de 250 en 2017 à 3 000 en 2023 », explique le lieutenant-colonel Pierre-Yves. Par ailleurs, s'agissant des munitions rôdeuses, le général François Lecointre, chef d'état-major des armées, s'est montré clair : « l'emploi de munitions rôdeuses n'est pas acceptable d'un point de vue éthique. Les drones que nous utilisons permettent de contrôler la munition tirée sur la cible qui est identifiée précisément jusqu'au moment du déclenchement du tir ».

Sur le même sujet

  • Exclusive: Qatar makes formal request for F-35 jets - sources

    8 octobre 2020 | International, Aérospatial

    Exclusive: Qatar makes formal request for F-35 jets - sources

    Mike Stone WASHINGTON (Reuters) - Qatar has submitted a formal request to the United States to buy stealthy F-35 fighter jets, three people familiar with the deal said, in a deal that if pursued could strain U.S. ties with Saudi Arabia and Israel. The request for the Lockheed Martin Co jets was submitted by the Persian Gulf state in recent weeks, the people said. A U.S. State Department spokesman said, “As a matter of policy, the United States does not confirm or comment on proposed defense sales or transfers until they are formally notified to Congress.” The Qatari embassy in Washington, D.C. did not immediately respond to a request for comment. Keen to counter Iran in the region, the U.S. helps to arm allies including Qatar, host to the largest U.S. military facility in the Middle East, and home to 8,000 U.S. service members and Department of Defense civilian employees. The request follows an August deal between the U.S. and the United Arab Emirates in which Washington agreed to consider giving the Gulf state approval to buy F-35s in a side deal to a U.S.-brokered agreement called the Abraham Accord to normalize diplomatic ties with Israel. Israel has signaled stiff opposition to a UAE sale and would likely be just as resistant to one with Qatar, fearing it could undercut its military advantage in the Middle East. In Washington, a fourth person familiar with the matter said concern about Qatar's links to Hamas have frequently surfaced over arms sales to the Gulf state. But in the case of an advanced warplane like the F-35, it could be a deal breaker. One of the people said Qatar's letter of request for the jets, the first formal step in the legal process of foreign military sale, was not directly linked to its adoption of the Abraham Accord. Nor has Qatar shown any sign it will normalize ties with Israel. U.S. and Qatar have close ties. In September Secretary of State Mike Pompeo and Qatar Foreign Minister Sheikh Mohammed bin Abdulrahman al-Thani met in Washington as the U.S. hopes to move forward with naming Qatar as a major non-NATO ally. Despite being U.S. allies, both the potential Qatari and UAE F-35 deals must satisfy a decades-old agreement with Israel that states any U.S. weapons sold to the region must not impair Israel's “qualitative military edge,” guaranteeing U.S. weapons furnished to Israel are “superior in capability” to those sold to its neighbors. Saudi Arabia, Washington's most powerful and closest partner among the Gulf Arab states, is also likely to oppose the United States supplying F-35s to Qatar. Saudi Arabia, the United Arab Emirates, Bahrain and Egypt remain locked in a three-year standoff with Qatar that the Trump administration has tried to end, so far without success. A formal letter of request typically contains specifications that would be used to furnish pricing data to a customer, but currently the F-35A, a fifth generation stealthy fighter jet, costs around $80 million. Any F-35 sale could take years to negotiate and deliver, giving a new U.S. presidential administration ample time to halt the deals. Any sale would also need congressional approval. Poland, the most recent F-35 customer, purchased 32 of the jets, but will not receive its first delivery until 2024. Reporting by Mike Stone in Washington D.C., additional reporting by Matt Spetalnick; Editing by Chris Sanders and Edward Tobin https://www.reuters.com/article/us-qatar-israel-jets-exclusive/exclusive-qatar-makes-formal-request-for-f-35-jets-sources-idUSKBN26S37Q

  • Air Force to get a head start on GPS, target tracking efforts

    16 avril 2024 | International, Aérospatial

    Air Force to get a head start on GPS, target tracking efforts

    The service's first two Quick Start efforts involve boosting GPS resilience and advancing moving target indication capabilities.

  • The DoD needs data-centric security, and here’s why

    30 septembre 2020 | International, C4ISR, Sécurité

    The DoD needs data-centric security, and here’s why

    Drew Schnabel The U.S. Department of Defense is set to adopt an initial zero-trust architecture by the end of the calendar year, transitioning from a network-centric to a data-centric modern security model. Zero trust means an organization does not inherently trust any user. Trust must be continually assessed and granted in a granular fashion. This allows defense agencies to create policies that provide secure access for users connecting from any device, in any location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. How does the Pentagon's AI center plan to give the military a battlefield advantage? The Pentagon's artificial intelligence hub is working on tools to help in joint, all-domain operations as department leaders seek to use data to gain an advantage on the battlefield. Andrew Eversden To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. Initially, the JIE was an innovative concept that took the DoD from a highly fragmented architecture, in which each agency managed its own cybersecurity strategy, to an architecture in which there is a unified SSA. However, one of the early challenges identified for the JIE was managing cloud cybersecurity as part of the SSA. The components in the JIE — the Joint Regional Security Stacks family's internet access points and cloud access points — have traditionally focused on securing the network, rather than the data or user. As more DoD employees and contractors work remotely and data volumes increase, hardware cannot scale to support them. This has created ongoing concerns with performance, reliability, latency and cost. A cloud-first approach In response, the DoD leverages authorized solutions from the Federal Risk and Authorization Management Program, and it references the Secure Cloud Computing Architecture guidance for a standard approach for boundary and application-level security for impact Level 4 and 5 data hosted in commercial cloud environments. The purpose of the SCCA is to provide a barrier of protection between the DoD Information Services Network and the commercial cloud services that the DoD uses while optimizing the cost-performance trade in cybersecurity. Defense agencies are now exploring enterprise-IT-as-a-service options to move to cloud, and reduce the need for constant updates and management of hardware. Through enterprise-IT-as-a-service models, defense agencies will be able to scale easily, reduce management costs and achieve a more competitive edge over their adversaries. Before the pandemic hit, defense agencies were already moving to support a more mobile workforce, where employees can access data from anywhere on any device. However, a cyber-centric military requires security to be more deeply ingrained into employee culture rather than physical protection of the perimeter. The next evolution to secure DISA and DoD networks is to embrace a secure access edge model with zero-trust capabilities. The SASE model moves essential security functions — such as web gateway firewalls, zero-trust capabilities, data loss prevention and secure network connectivity — all to the cloud. Then, federal employees have direct access to the cloud, while security is pushed as close to the user/data/device as possible. SP 800-27, zero-trust guidance from the National Institute of Standards and Technology, provides a road map to migrate and deploy zero trust across the enterprise environment. This guidance outlines the necessary tenants of zero trust, including securing all communication regardless of network location, and granting access on a per-session basis. This creates a least-privilege-access model to ensure the right person, device and service have access to the data they need while protecting high-value assets. As the DoD transforms the JIE architecture to an as-a-service model with zero-trust capabilities, defense agencies will experience cost savings, greater scalability, better performance for the end user and war fighter, improved visibility, and control across DoD networks — and ultimately a stronger and more holistic cybersecurity capability moving forward. https://www.c4isrnet.com/opinion/2020/09/29/the-dod-needs-data-centric-security-and-heres-why/

Toutes les nouvelles