14 décembre 2022 | International, C4ISR

Navy’s Digital Horizon exercise showcases power of ‘mesh networks,’ AI

The unmanned exercise has prompted innovation and tech improvements at a pace the Task Force 59 commodore said he's never seen before.

https://www.c4isrnet.com/naval/2022/12/14/navys-digital-horizon-exercise-showcases-power-of-mesh-networks-ai/

Sur le même sujet

  • Air Force awards $20M contract for new common ground system

    3 juin 2019 | International, C4ISR

    Air Force awards $20M contract for new common ground system

    By: Nathan Strout The Air Force is one step closer to the creation of a new common platform for satellite command and control. The Air Force's Space and Missile Systems Center Braxton Technologies of Colorado Springs a $20 million contract May 17 to begin prototyping and integrating the new Enterprise Ground Services (EGS). The Air Force announced the deal in a May 31 press release. The purpose of EGS is to develop a common ground system and end user experience for all of the Air Force's upcoming satellite programs. Today, most military satellites have custom-built ground systems. Not only can that be expensive, it also makes it difficult for end users to adapt to new systems and for ground systems to communicate with each other. The new architecture will still allow for flexibility among the various space systems, as individual systems will need to be tailored to their specific mission requirements. The goal of EGS is to ensure all those space systems are built on a common base with similar end user experiences. “We are excited to embark on this partnership which will enhance our ability to drive speed in our processes, to deliver capabilities to support the warfighters, and develop innovative solutions that add resiliency to fight and win in a war that extends into space,” Joshua Sullivan, material leader for EGS, said in a release. “This contract will allow SMC and Air Force Space Command to concentrate resources to provide the most secure, effective, and interoperable tactical command and control experience to mission partners across the Air Force space enterprise.” The $19 million Small Business Innovative Research contract awarded to Braxton Technologies has a ceiling of $100 million. The work is expected to be completed by May 10, 2024. The Braxton Technologies award follows up on a $655,000,000 contract awarded to Engility Corp. in January to provide engineering, development, integration and sustainment services supporting the Ground System Enterprise and the eventual transition to Enterprise Ground Services. That work is expected to be completed January 31, 2026. https://www.c4isrnet.com/c2-comms/satellites/2019/06/02/air-force-awards-20m-contract-for-new-common-ground-system

  • 3-D Scanning Technology Makes Splash at NNSY Thanks to Partnership with Puget Sound

    1 août 2019 | International, Naval

    3-D Scanning Technology Makes Splash at NNSY Thanks to Partnership with Puget Sound

    By Kristi Britt, Public Affairs Specialist, PORTSMOUTH, Va (NNS) -- Although they have only worked at Norfolk Naval Shipyard (NNSY) for less than 10 months, two employees are already involved in the future of innovative technologies in America's Shipyard. Code 268 Engineering Technician Jason Ewick and Code 2340 Assist Shift Test Engineer (ASTE) Joey Hoellerich were brought into the NNSY Technology and Innovation (T&I) Lab, a group dedicated to bringing the real ideas and technologies of the shipyard to the forefront. With their arrival to the team, both were given the unique opportunity to share knowledge with Puget Sound Naval Shipyard and Intermediate Maintenance Facility (PSNS&IMF), using laser scanning to provide accurate measurements for shipboard work. “The USS Dwight D. Eisenhower (CVN 69) was at NNSY in years past, Naval Air Systems Command (NAVAIR) brought Puget Sound representatives to our shipyard to use their laser scanning technology to cut off all added material from four sponsons onboard the vessel,” said NNSY T&I Lab Lead Dan Adams. Sponsons are the projections extending from both sides of the watercraft to provide protection, stability, mounting locations, etc. “During the time, we observed the process and wanted to learn what we could from our sister shipyard team.” The team from PSNS&IMF returned to NNSY to give guidance on the process, with Code 290 representative Dan Hager, and Shop 11 Mold Loft representatives Jason Anderson and Jeremiah Swain taking charge in sharing what they knew to Ewick and Hoellerich. “The team from Puget was absolutely amazing and shared the ins and outs of the 3-D scanning technology with us,” said Ewick. “I had done laser scanning work in the private industry but it was my first time tackling something like this. Hager, Anderson, and Swain guided us through each step, sharing as much knowledge as they could with us about two different processes we could use to get the results we needed.” The first process is photogrammetry, where you place targets an inch apart on a desired object or space for scanning. Once complete, you take multiple photographs which are then compiled into a software to build the 3-D model. The second process is the 3-D laser scanning, which requires more space for a larger read. The targets would be placed and then someone would operate the laser tracker and scanner from the pier to get the scan needed. Once completed, the 3-D model would be compiled in the software for use. With the knowledge provided by PSNS&IMF and USS George H.W. Bush (CVN 77) in drydock, Ewick and Hoellerich were ready to tackle the process for NNSY. “We began at Colonna's Shipyard in Norfolk where the sponsons are being produced,” said Ewick. “We use the scanning technology to analyze where the sponson would meet the shell of the ship. It helps provide an accurate measurement for our workers when it comes to installation and repair.” Next up was scanning after the pieces were installed. At this time three of the four sponsons have been installed onboard the Bush. “The two forward sponsons were scanned using photogrammetry,” said Ewick. “It was a first for us and required coordination across various shops and codes throughout the shipyard.” The Pipefitter Shop (Shop 56), The Optical Diesel Mechanics (Shop 38), the Shipfitter Shop (Shop 11), the Shipyard Operations Department (Code 300), and partners at Puget all played a part in this evolution. “It was a collaborative effort and we were able to be successful thanks to our shipyard family coming together to make it happen.” This process was a first for NNSY and a first for using the software directly in the drydock instead from piers and barges. “It's amazing to see something come together like this, especially when you think that we were two blank slates coming into the project,” said Hoellerich who had no prior experience working with 3-D scanning and metrology before joining the lab. “We were able to partner with our sister shipyard and work with shops and codes that I never thought I'd be able to do when I first joined the ranks of NNSY. Being able to gain that knowledge from our shipyard family and utilize what we've learned in the field is something those of us working in innovation live for.” The team will be completing the rear scans for the Bush in the future and hope to continue to perfect the process. In addition, they hope to continue to work with other shipyard entities to further expand on the technologies of the future. “This partnership has been a major success for us and we hope to continue to build those relationships with the other shipyards and beyond,” said Hoellerich. “We can all learn from each other and build from each other's experiences. We all share a mission and together we can succeed.” Ewick added, “we've also begun expanding more ways we can use the scanning technology at our shipyard. For example, we are looking into a future project where we scan inside the ship and build a path for extracting heavy equipment from within as to avoid interferences. We've seen more interest from others within the shipyard since we began to do work with this technology, seeing what ways it could help improve what we do here. That's what innovation is all about, taking those first steps in seeing what works. Even if what you try doesn't pan out, at least you gave it a shot. But you'll never know if it works or not unless you take that step. Don't be scared to try out something new.” For more information regarding innovation, contact the NNSY T&I Lab at 757-396-7180 or email the REAL Ideas program at NNSY_REALIdeas@navy.mil. https://www.navy.mil/submit/display.asp?story_id=110422

  • Making DoD Security Operations Centers More Effective: Security Automation

    13 juillet 2020 | International, C4ISR, Sécurité

    Making DoD Security Operations Centers More Effective: Security Automation

    Security orchestration, automation, and response (SOAR) software frees DoD analysts to apply cognitive skills to actually fixing problems. By SPLUNKon July 10, 2020 at 6:39 PM The Defense Department's most recent National Defense Strategy (NDS) describes a complex military environment characterized by increased global disorder, a decline in the long-standing rules-based international order, myriad threats from rogue states like Iran and North Korea, great power peers like China and Russia, malicious hackers, and terrorists in places like Yemen. One of the military domains where this dynamic is most evident is cyberspace, where bad actors arguably have comparable or better cyber capabilities than us. “This increasingly complex security environment is defined by rapid technological change, challenges from adversaries in every operating domain, and the impact on current readiness from the longest continuous stretch of armed conflict in our nation's history,” the NDS states. “In this environment, there can be no complacency—we must make difficult choices and prioritize what is most important...” More cybersecurity threats mean more cyberattacks on DoD networks. Essye Miller, former principal deputy for the DoD CIO, said recently that attacks on department networks are surging and that the attack surface is expanding as adversaries target DoD employees working from home during the coronavirus pandemic. This surge in cyberattacks means that analysts working in DoD information security operations centers (SOCs) are being bombarded with security alerts. With so many events, it's hard for them to differentiate true alerts from false ones, and to determine which events are priorities to address immediately. Through no fault of their own, they end up chasing their tail when their time could be better spent on mission-critical activities that directly support warfighters. The solution for this domain is automation. While popular in commercial software segments for years—including SalesForce automation, marketing automation, human resources automation, and IT automation—DoD security teams are just beginning to realize the benefits of what's known as security orchestration, automation, and response. The Value of Security Automation “Automation is nothing new to the military. The Defense Department is making great inroads into DevSecOps, for example,” explained Drew Church, senior security advisor at Splunk, referring to an agile software development process where software is quickly developed, tested, and improved over weeks and months rather than years. “A key, fundamental concept of DevSecOps is automation. The point of automation in DevSecOps is to bring together different technologies, tools, people, and processes to develop code and get it out to the war fighter more rapidly. “Automation provides that same capability inside IT operations procedures, security operations procedures, and other business processes,” said church. “It does this in a reliable and repeatable fashion every time, and at speed and scale.” Splunk's SOAR solution is called Phantom. It helps security teams work to identify, analyze, and mitigate threats facing their organizations. It can be used to improve efficiency, shorten incident response times and reduce the growing backlog of security incidents, even when there's a shortfall of DoD security personnel to analyze the volume of daily security alerts. Phantom does so by integrating teams, processes, and tools, and by automating tasks, orchestrating workflows, and supporting a range of SOC functions to include event and case management, collaboration, and reporting. In essence, it frees SOC analysts of the usual Tier I-type activities of gathering data from the security information and event management (SIEM) platform, prioritizing these alerts, performing triage to determine if an alert is real or a false alarm, configuring and managing security monitoring tools, and generating trouble tickets. Instead, Splunk Phantom lets them spend more time on the value-added work of Tier II SOC analysts. This includes actually investigating the trouble tickets, responding to incidents, and leveraging threat intelligence to better understand the threat and be proactive rather than reactive. “Focusing on the bureaucracy of security rather than the actual doing of security limits the effectiveness of security analysts,” said Church. “Better to free them of the tasks that can be easily automated like reviewing IP addresses, domain names, and URLs so that they can be force multipliers in conducting the thoughtful work needed to protect DoD networks. “That automation is done for them in Phantom. It let's analysts focus on investigating and taking remediation or mitigation steps as appropriate. Where humans excel is in actually thinking through a problem. Copying and pasting from websites, emails, and reports is not the most effective use of a highly paid, resource-limited talent pool.” Integration With Existing SOC Tools SOC analysts make their decisions by gathering information. They sometimes review classified military intelligence, but usually they look at a lot of open-source information and data from commercial off-the-shelf products from myriad providers of cybersecurity threat intelligence products. Some of the common ones that are relevant to the Defense Department include: McAfee's ePolicy Orchestrator, which the DoD refers to as Host Based Security Systems (HBSS); and Tenable's Security Center, which is known inside the DoD as Assured Compliance Assessment Solution (ACAS). Splunk Phantom has more than 300 out-of-the-box integrations with products like HBSS and ACAS. “Being integrated with each of those products permits the analyst to get the information they need without having to go to another browser window, or another tab, or a different computer,” said Church. “Phantom automatically brings all that data to the analyst. That takes somebody who spends most of their time copying information from page A into system B and lets them make more rapid and accurate determinations about the threat.” Through the use of APIs (application programming interface), that same integration is also found with government off-the-shelf (GOTs) solutions that haven't before been integrated with Splunk Phantom because there was never a request to do so. The same goes for a custom app created by a DevSecOps shop like the Air Force's Kessel Run project in Boston, for example. Automating these vital but drudgerous processes also pays dividends during both staffing shortfalls and times of surge, and brings consistency to SOC activities. Military service members are constantly rotating and changing duty stations; senior leadership turns over regularly. Contractors have to be relied upon to provide continuity from tour to tour. That means that SOC processes that were well oiled on a Monday may no longer be operating smoothly on Friday because of a change of command. Or maybe there is a compelling event that grabs everyone's attention. Or possibly there are legal or policy requirements that need to be addressed, and though they don't add mission value they still must be completed. Automation by Splunk Phantom smooths out the bumps associated with those all-to-common scenarios by keeping the flow of vital data moving to where it can be acted upon best. “The computer's running the marathon for you so that you are free to sprint and swarm on the problems that need the most resources at any particular time,” said Church. The Takeaway For security analysts, incident handlers/responders, IT operations managers, security operations managers, and forward-leaning business process experts, Splunk Phantom is all about removing barriers so people can get back to accomplishing the mission, maximizing productivity of skilled personnel and organizations. “For anybody that has a business process, a mission process, an IT operations process, or a security process and wants to free those skilled workers to get back to what you brought them onboard to do, we can help you with that,” said Church. “We do that through orchestration, we do that through automation. We bring in collaboration, and we're able to do that at scale because of the value that a company like Splunk brings to the table. By being able to have a rich ecosystem of partners and support across the board, we're able to do that even with differences from organization to organization.” Splunk Phantom addresses technology-based processes, and orchestrates and automates those processes to get people back to doing what they do best. https://breakingdefense.com/2020/07/making-dod-security-operations-centers-more-effective-security-automation/

Toutes les nouvelles