15 septembre 2021 | International, Aérospatial
Head of UK's Space Directorate warns of space terrorism
UK officials says the low cost of getting payloads on orbit could open up potential for new threats in space.
6 juillet 2018 | International, C4ISR
By: Sorin Ducaru
As NATO prepares for its annual summit, to be held July 11-12 in Brussels, media attention has been focused on whether member states will boost their defense spending and readiness across the traditional operational domains of land, air and sea. This reflects a needed focus on important, but frankly longstanding alliance priorities. What many NATO-watchers are missing, however, is NATO's full embrace of its newest operational domain: cyberspace.
Just two years ago, at the Warsaw Summit, allied nations recognized cyberspace as a new “operational domain in which NATO must defend itself as effectively as it does in the air, on land and at sea.”
Since the Warsaw Summit, NATO has developed an ambitious roadmap to implement the cyber operational domain approach, with profound implications along lines of effort, such as: training, capability development, organizational construct, operational planning, training, exercises and strategic communications.
Work in these areas is conducted with the aim to augment the cyber resilience and achieve mission success, in a cyber environment that is increasingly contested by adversaries. This is in line with the alliance's cyber pledge to prioritize investment in cyber skills and capabilities.
Furthermore, the recognition of cyberspace as an operational domain opens the way for the integration of voluntary sovereign national cyber contributions into NATO operations and missions. Keeping in line with the other operational domains, NATO itself will not acquire offensive capabilities, but will rely on the contributions of its member nations. Already, the United Kingdom has led the efforts. In a Chatham House address last year, Sir Michael Fallon, former U.K. defense secretary, announced publicly that “the United Kingdom is ready to become one of the first NATO members to publicly offer such support to NATO operations as and when required.”
At the NATO defense ministers' meeting last November, allies agreed on a framework of political and legal principles to guide the integration of voluntary cyber contributions from member nations. The framework ensures that any allied engagement in cyberspace will abide by NATO's defensive mandate, political oversight and compliance with international law. This is also in line with allies' support for the development of norms and confidence building measures, for security and stability in cyberspace.
This year, allies' defense ministers agreed to establish a Cyber Operations Centre as part of the new NATO command structure, the first cyber-dedicated entity within NATO's command structure. This is the first step toward integrating cyber capabilities into NATO planning and operations, but specific considerations should be kept in mind.
In the physical domains of land, air and sea, operational planning refers to of the physical forces or capabilities provided. In the cyber domain, integration will focus on the effects generated by the voluntary national cyber contributions, rather than the capabilities themselves, given that most cyber tools are unique and discrete.
Within NATO, there has been a growing emphasis on developing the “digital IQ” of the allied military. In Portugal, a NATO Cyber and Communication-Information Systems Academy is being set-up, while cyber resilience is now featured in coordinated training curricula in every NATO member state. Cyber has been also streamlined across all NATO exercises.
The NATO Cyber Center of Excellence in Estonia organizes two annual cyber-dedicated exercises. The first, “Cyber Coalition,” is testing the alliances readiness and response procedures and policies in situations of wide-reaching, persistent cyberattacks. The second exercise, under the Locked Shields banner, tests the skills of cyber experts in red-team/blue-team war games scenarios. This year, NATO's blue team won the exercises, signaling the growing interest of member nations to strengthen NATO's new operational domain.
“All crises today have a cyber dimension,” noted Secretary General Jens Stoltenberg earlier this month. Soon after in London, Stoltenberg hinted that the July NATO summit will “take decisions on integrating national cyber capabilities into NATO operations.” This reflects a game-changing approach in terms of mainstreaming cyber across strategy and tactics, training and exercises, as well as military planning in all operational domains. This is consistent with the recent U.S. Department of Defense strategy, which aims to “invest in cyber defense, resilience and the continued integration of cyber capabilities into the full spectrum of military operations.”
It is no secret that, in cyberspace, we are under attack as we speak. As the threat landscape expands, so does NATO's commitment to the new cyber operational domain.
Ambassador Sorin Ducaru is a senior fellow at the Hudson Institute. Between September 2013 and November 2017, he was NATO assistant secretary general and chair of NATO's Cyber Defense Committee and Cyber Defense Management Board, having a leading role in NATO's cyber policy development and implementation. He is also a special advisor of the Global Commission on the Stability of Cyberspace.
15 septembre 2021 | International, Aérospatial
UK officials says the low cost of getting payloads on orbit could open up potential for new threats in space.
17 septembre 2024 | International, Aérospatial
Rome will also invest half a billion euros in 2024 on development of the Global Combat Air Programme sixth-generation fighter.
28 juillet 2020 | International, Aérospatial
By Harry Lye The US has eased rules governing the export of military unmanned aerial systems (UAS) making it easier for it to sell UAS internationally. Under the new rules, announced by US State Department Assistant Secretary for Political-Military Affairs René Clarke Cooper, UAS that fly under 800kph (497mph) will no longer be subject to “presumption of denial” that made approving their sale more difficult. The change affects the US's implementation of the Missile Technology Control Regime (MTCR). Under the new rules, possible UAS sales will be vetted using rules already in place for other exports. Commenting on the change during a telebriefing, Cooper said: “All proposed transfers affected by this change will continue to be subject to the same rigorous review criteria that we have outlined in our UAS Export Policy, our Conventional Arms Transfer Policy, and of course, the Arms Export Control Act, as well as the specific non-proliferation criteria that has been identified in the MTCR Guidelines. “The United States is going to continue conducting our robust review procedures for exporting UAS technology to support global non-proliferation objectives, and we encourage members of the MTCR, as well as non-members such as China, to do the same.” The new rule change applies to UAS but will not affect systems such as cruise missiles, hypersonic aerial vehicles and ‘advanced unmanned aerial combat vehicles'. Cooper added that the subset of UAS covered by the new regulations ‘poses no risk for weapons of mass destruction delivery'. Commenting on the move in a statement the White House said: “While the Missile Technology Control Regime (MTCR) is critical in slowing proliferation and promoting peace and security, it is in dire need of modernization as it applies to UAS. In a sector of rapidly-evolving technology, the MTCR's standards are more than three decades old. “Not only do these outdated standards give an unfair advantage to countries outside of the MTCR and hurt United States industry, they also hinder our deterrence capability abroad by handicapping our partners and allies with subpar technology. More than two years of discussion with MTCR partners were unable to produce consensus on this overdue reform.” The White House added that the move would bolster US National Security “by improving the capabilities of our partners and increase our economic security by opening the expanding UAS market to United States industry,” adding that it saw the decision as an example for other MTCR members to follow. https://www.airforce-technology.com/news/us-eases-military-uas-export-rules/