18 octobre 2022 | International, Aérospatial

Lockheed sees progress in drone 'wingman' development for US Air Force

Company teased the release of more details on its drone wingman program in the next earnings call in January.

https://www.c4isrnet.com/newsletters/unmanned-systems/2022/10/18/lockheed-reports-progress-in-drone-wingman-development-for-air-force/

Sur le même sujet

  • Lithuania enlists EMSA’s RPAS services to monitor ship emissions

    8 avril 2021 | International, Aérospatial, Naval

    Lithuania enlists EMSA’s RPAS services to monitor ship emissions

    In response to a request from the Environmental Protection Department of Lithuania's Ministry of the Environment, EMSA is providing the country with Remotely Piloted Aircraft System (RPAS) services to assist in monitoring ship emissions, protect the marine environment and improve maritime safety. The services which began on 23 March will run for three months and will see EMSA RPAS being used to calculate the sulphur content of the fuel being used by the passing ships. Sensors on board the RPAS will measure the emissions from the exhaust plumes of vessels travelling in the main shipping lanes and when at anchorage around the Lithuanian port of Klaipeda. The sulphur content of marine fuel in this Sulphur Emission Control Area (SECA) should be no greater than 0.1%. While great interest has been shown in the emissions monitoring capability of EMSA's RPAS service, the Environmental Protection Department will also be working in collaboration with other Lithuanian authorities - including the Navy, MRCC and fisheries control services – to conduct other types of maritime surveillance missions. The aircraft being used for this service is the Schiebel CAMCOPTER® S100 and it is under contract to EMSA via a consortium led by Nordic Unmanned AS. The model is a vertical take-off and landing drone and is fitted with gas sensors and cameras covering optical and infrared spectral ranges to better detect vessel plumes and conduct maritime surveillance as required. All the information is transmitted in real-time to trained users through EMSA's RPAS Data Centre. Records of the emission measurements are encoded automatically into the THETIS-EU information sharing system. This system is operated by EMSA to assist in the enforcement of the EU sulphur directive as well as to support port inspectors when targeting vessels to be inspected. ABOUT RPAS RPAS services, offered free to all EU Member States by EMSA, have been developed to assist in ship emission monitoring and maritime surveillance operations and can operate in all seas surrounding the European Union. RPAS services can provide support to traditional coast guard functions, including search and rescue and pollution prevention and response. The services are offered to Member States individually and as part of EMSA's regional RPAS strategy, which allows multiple coast guard functions in several EU Member States to be supported by one or more RPAS services. Further expansion of RPAS regionally is planned in 2021 and 2022. ABOUT EMSA The European Maritime Safety Agency (EMSA) is a decentralised agency of the EU, based in Lisbon, Portugal. EMSA serves the EU's maritime interests for a safe, secure, green and competitive maritime sector through support for pollution prevention and response, maritime surveillance, safety and security, digitalisation and the provision of integrated maritime services, and technical assistance. Any requests for further information can be sent to: information@emsa.europa.eu

  • SAIC Strikes Out On Mobile Protected Firepower, Plans To Remain In Combat Vehicle Market

    2 janvier 2019 | International, Terrestre

    SAIC Strikes Out On Mobile Protected Firepower, Plans To Remain In Combat Vehicle Market

    Even though SAIC [SAIC] was eliminated from the Army's new light tank program, the company's second major vehicle loss in the last year, the company will continue exploring combat vehicle opportunities, according to a company spokeswoman.Lauren Presti said... http://www.defensedaily.com/saic-strikes-mobile-protected-firepower-plans-remain-combat-vehicle-market

  • How tensions with Iran could test a new cyber strategy

    10 janvier 2020 | International, C4ISR, Sécurité

    How tensions with Iran could test a new cyber strategy

    Mark Pomerleau In 2018, the Department of Defense began following a new philosophy for cyber operations to better protect U.S. networks and infrastructure. Known as “defend forward,” the approach allows U.S. cyber forces to be active in foreign network outside the United States to either act against adversaries or warn allies of impending cyber activity that they've observed on foreign networks. After the U.S. military killed an Iranian general in a Jan. 2 drone strike and after national security experts said they expect Iran might take some retaliatory action through cyber operations, the specter of increased cyber attacks against U.S. networks puts Cyber Command and its new approach front and center. “This Iran situation today is a big test of the ‘defend forward' approach of this administration,” James Miller, senior fellow at Johns Hopkins Applied Physics Laboratory and former undersecretary of defense for policy, said at a Jan. 7 event hosted by the Council on Foreign Relations. “Will [Cyber Command] take preventative action? Will they do it in a way that our allies and partners support and that can be explained to the public?” While Iran fired several missiles Jan. 7 at a base in Iraq where U.S. troops lived as an initial response to the drone strike, many national security experts expect Iran could continue cyber actions as further retaliation for the strike. Iran could also ratchet up its cyber operations in the United States following the collapse of portions of the 2015 nuclear deal between the United States, Iran and five other nations to curb Iran's nuclear weapons capability in return for sanctions relief. Over the past 12 months, the White House and Congress streamlined many of the authorities used to conduct cyber operations to help cyber forces to get ahead of threats in networks around the world. One such provision in last year's annual defense policy bill provides the Pentagon with the authority to act in foreign networks if Iran, among other named nations, is conducting active, systematic and ongoing campaigns of attacks against the U.S. government or people. Cyber Command declined to comment on what, if anything, they were doing differently since the drone strike. Some experts, however, have expressed caution when assessing how well this defend forward approach has worked thus far given it is still relatively new. “The jury is very much still out here,” Ben Buchanan, assistant professor and senor faculty fellow at Georgetown University, said at the same event. “We don't have a lot of data, there's been a lot of hand-wringing ... about these authorities and about how Cyber Command may or may not be using them. I just don't think we've seen enough to judge whether or not ... [it is] meaningfully changing adversary behavior.” Others have also expressed reservations about how effective Iran can even be in cyberspace toward U.S. networks. “Iran is a capable cyber actor, Iran is a wiling cyber actor. That means Iran will conduct cyberattacks,” said Jacquelyn Schneider, Hoover fellow at the Hoover Institution at Stanford University. “It's not like they have this capability and they've been deterred in the past and maybe now they're going to turn it on. I think they've been trying this entire time.” Complicating matters further could be other actors trying to take advantage of U.S.-Iran imbroglio for their own interests. Priscilla Moriuchi, senior principal researcher and head of nation-state research at threat intelligence firm Recorded Future, said over the past several months, there have been reports of Russian state-affiliated actors hijacking Iranian cyber infrastructure to conduct operations masquerading as Iranians. “That creates its own uncertainty,” she said at the same event. “Another level of potential what we call inadvertent escalation if a country perceives that they are attacked by Iran but in reality, it” wasn't. https://www.fifthdomain.com/dod/2020/01/09/how-tensions-with-iran-could-test-a-new-cyber-strategy/

Toutes les nouvelles