12 juin 2018 | International, Aérospatial

New National Guard medical helicopter unit set to deploy

WINDSOR LOCKS, Conn. (AP) — The Connecticut National Guard's newest unit, which has spent the past two years training with new, specialized helicopters, will deploy soon to provide care and transport to the sick and wounded in support of military operations in southwest Asia.

"To receive your first medical evacuation aircraft in 2016 and be fully prepared for a deployment less than two years later is a testament to the hard work and dedication of those in our aviation community," Maj. Gen. Thaddeus J.Martin, adjutant general and commander of the Connecticut National Guard, said in a statement ahead of a sendoff ceremony last month for the aerial medical evacuation unit, officially known as Detachment 2, Charlie Company, 3rd Battalion, 126th Aviation Regiment.

The detachment, based in Windsor Locks and commanded by 1st Lt. Matthew Barringer of South Glastonbury, doesn't officially deploy until later this month.

It represents a new capability for the National Guard. It received the first of three Blackhawk helicopters specifically outfitted for medical evacuation in the spring of 2016, even before becoming a fully operational unit in the fall of 2016.

Thirty members of the detachment are deploying and will spend about a year providing aeromedical evacuation, en-route critical care and medical support while transporting patients. Five of the members deploying are women. The unit will join the 70 guardsmen from Connecticut already deployed in support of operations around the world.

While deployed, the unit will be on 24-hour standby, and operate in shifts. A crew of four — two pilots, a crew chief, and a flight paramedic — can transport up to six patients at a time on one of the Sikorsky-built HH-60M Blackhawk helicopters. The helicopters have been specially outfitted for aerial medical evacuation and will be stocked with medical supplies like ventilators and IVs. The crew also has the capability to do procedures on board such as put in a chest tube.

"We're almost a flying hospital," said Chief Warrant Officer Jonathan Behuniak, 28, of Unionville.

From the time a call comes in, they have less than 15 minutes to grab supplies, get to the aircraft and take off to aid a patient, who could be a member of the U.S. military or coalition forces, contractors, and even military working dogs, Behuniak said.

Through training, they've been able to get that number down to nine minutes.


"There are a lot of computers that need to start working, so as fast as the aircraft will let us take off, we can take off," Behuniak said.

The benefit of a medevac unit, he added, is the ability to get a critically wounded patient to a hospital within so the so-called "golden hour," which greatly increases a patient's chance of survival.

A 2015 study involving the Army, Texas A&M University and the University of Texas Medical School at Houston found that getting wounded troops to hospitals in less than an hour, along with improved care on the battlefield and in medical helicopters, saved hundreds of lives.

"There's a wide spectrum of care an injured person can receive on this aircraft," said Sgt. Ryan Will, 28, Manchester, a flight paramedic. "It's very comprehensive care as well."

Flight paramedics like Will and Staff Sgt. Trevor O'Neill, 27, of Greenwich, have gone through extensive training and are nationally registered paramedics. Both are also civilian paramedics.

Members of the unit underwent a range of training to prepare them for the conditions they'll encounter overseas. They trained at a facility in Rhode Island that can simulate desert conditions. Anticipating mountain peaks of 13,800 feet, some pilots went to Colorado for training to get an understanding of how air density affects a helicopter's rotor system and the ability to fly.


Last week, they trained with members of Air National Guard's 103rd Airlift Wing, practicing loading and unloading patients onto the helicopters, and simulating different missions where the two units would cross paths.

"There are a lot of gravity and effects that are placed on the patient that there aren't normally on the ground, whether that be from high maneuver turns or simply just taking off and landing. Things like vibrations can really make a patient uncomfortable and these are things they have to know when they're giving us patients," said O'Neill, one of the flight paramedics.

There was strong interest in joining the unit, which represents a new capability for the Connecticut National Guard. Second Lt. Brett Boissonneault, 25, of East Hampton, was handpicked out of flight school to be part of the unit.

"It's a great opportunity to be part of an important mission where we're saving people every day, helping people every day," he said.

https://www.sfchronicle.com/news/article/New-National-Guard-medical-helicopter-unit-set-to-12984985.php

Sur le même sujet

  • Audit finds cyber vulnerabilities in US missile defense system

    17 décembre 2018 | International, C4ISR

    Audit finds cyber vulnerabilities in US missile defense system

    By: Geoff Ziezulewicz The Army, Navy and Missile Defense Agency are failing to take basic cybersecurity steps to ensure that information on America's ballistic missile defense system won't fall into nefarious hands, according to a Defense Department Inspector General audit released Friday. Investigators visited five sites that manage ballistic missile defense elements and technical information, but the names of the commands were redacted in the publicly released report. “The Army, Navy and MDA did not protect networks and systems that process, store, and transmit (missile defense) technical information from unauthorized access and use,” the declassified report states. Such inadequacies “may allow U.S. adversaries to circumvent (missile defense) capabilities, leaving the United States vulnerable to missile attacks,” the report states. They found officials failed to employ safeguards familiar to most people online in 2018, the latest development to raise questions about the U.S. military's cybersecurity vulnerabilities. Among the shortcomings: Administrators for classified networks had no intrusion detection and prevention systems in place to watch for cyberattacks, much less stop them, according to the report. At one site, officials said they had requested to purchase those cyber safeguards in December 2017 but nine months later it still hadn't been approved. “Without intrusion detection and prevention capabilities, (the site) cannot detect malicious attempts to access its networks and prevent cyberattacks designed to obtain unauthorized access and exfiltrate sensitive (missile defense) technical information,” the report states. Officials also failed to patch system flaws after receiving vulnerability alerts, one of which had first been identified in 1990 and had still not been fixed by April. Another vulnerability that could be exploited by an attacker was first identified in 2013 but also was never pathced, according to the report. “Countless cyber incident reports show that the overwhelming majority of incidents are preventable by implementing basic cyber hygiene and data safeguards, which include regularly patching known vulnerabilities,” the IG report states. “(Missile defense) technical information that is critical to national security could be compromised through cyberattacks that are designed to exploit these weaknesses.” Some facilities failed to force employees to use common access cards, or CAC, when accessing the classified system, a basic cybersecurity practice known as multi-factor identification. Instead, officials were able to access the sensitive information using just a username and password, the report states. Hackers use phishing and other tactics to exploit passwords and gain access to such systems. New hires are supposed to be allowed network access without a card for only their first two weeks on the job. But IG investigators found users on the systems without CAC cards for up to seven years. At one site, a domain administrator never configured the network to allow only CAC holder access. “Allowing users to access networks using single factor authentication increases the potential that cyber attackers could exploit passwords and gain access to sensitive (missile defense) technical information,” the report states. Investigators also found unlocked server racks at some locations, another key vulnerability to insider snoopers. “The insider threat risk necessitates that organizations implement controls...to reduce the risk of malicious personnel manipulating a server's ability to function as intended and compromising sensitive and classified data,” the report states. External storage devices held unencrypted data and some sites failed to track who was accessing data, and why. Other administrators told investigators that they lacked the ability to record or monitor data downloaded from the network onto these devices. Unless these officials enforce the encryption of such removed data and monitor its downloading and transferring, “they will be at increased risk of not protecting sensitive and classified (missile defense) technical information from malicious users,” the report states. Investigators also found that some supposedly secure sites were failing to even lock their doors. One location had a security door that hadn't worked for years. “Although security officials were aware of the problem, they did not take appropriate actions to prevent unauthorized personnel from gaining unauthorized access to the facility,” the report states. Other sites featured no security cameras to monitor personnel movement and security officers failed to conduct badge checks. While the report makes recommendations to fix the documented problems, officials for the inspected agencies offered no comments on the non-classified draft report of the audit. Friday's scathing IG audit marked the latest in a string of reports detailing shoddy cybersecurity throughout the armed forces and defense contractors. During the same week, the Wall St. Journal reported that Chinese hackers are targeting military systems and those of defense contractors working on Navy projects. Beijing-linked cyber raids have attempted to steal everything from missile plans to ship-maintenance data in a series of hacks over the past 18 months, the Journal reports. As a result, Navy Secretary Richard Spencer has ordered a “comprehensive cybersecurity review” to assess if the Navy's cyber efforts “are optimally focused, organized, and resourced to prevent serious breaches,” spokesman Capt. Greg Hicks said. The review will also look at authorities, accountability and if the efforts reflect and incorporate government and industry best practices, he said. “Secretary Spencer's decision to direct a review reflects the serious to which the DoN prioritizes cybersecurity in this era of renewed great power competition,” Hicks said. https://www.navytimes.com/news/your-navy/2018/12/14/audit-finds-cyber-vulnerabilities-in-us-missile-defense-system

  • This Marine Corps unit now has a ship-killing missile in its toolkit

    5 décembre 2024 | International, Naval

    This Marine Corps unit now has a ship-killing missile in its toolkit

    The new tool gives Marines an offensive strike to clear the way for the Navy.

  • To maintain tech edge, US seeks export controls on AI

    21 novembre 2018 | International, C4ISR

    To maintain tech edge, US seeks export controls on AI

    By: Kelsey D. Atherton In just two words, the phrase “artificial intelligence” captures a deep techno-utopian promise, the notion that through craftsmanship humans can create learning and thinking machines outside the processes of organic life. AI is typically the realm of technologists and science fiction writers. Now it is also in the world of export controls prohibitions and restrictions on technologies as overseen by the Department of Commerce. In a proposed rule announced Nov. 19, the Bureau of Industry and Security wants to set out guidelines establishing “criteria for identifying emerging technologies that are essential to U.S. national security.” The stated goals of such controls are tied to both security and protectionism for existing American industry, especially the science, technology, engineering and manufacturing sectors. The proposed rules encompass 14 technologies, covering brain-computer interfaces to advanced surveillance technology. Nestled in that list of technologies is “artificial intelligence (AI) and machine learning technology,” which is further broken into 11 related tools. Here is a list of all the kinds of AI that the new rules seek to put under Commerce export controls: Neural networks and deep learning (e.g., brain modelling, time series prediction, classification) Evolution and genetic computation (e.g., genetic algorithms, genetic programming) Reinforcement learning Computer vision (e.g., object recognition, image understanding) Expert systems (e.g., decision support systems, teaching systems) Speech and audio processing (e.g., speech recognition and production) Natural language processing ( e.g., machine translation) Planning (e.g., scheduling, game playing) Audio and video manipulation technologies (e.g., voice cloning, deepfakes) AI cloud technologies AI chipsets Several of these are as much mathematical concepts, or processes, as they are distinct, controllable technologies. Others, like AI cloud technologies, suggest always-online servers, which by the very nature of the internet, are difficult to control within borders. Tackling an entire technological field, especially one with as low a barrier to entry as coding, is a tricky proposition, even in the instances where the technology is clearly defined. Why might the White House go through all this trouble? “These revisions could compose an important element of a strategy of targeted countermeasures against the near-term threat posed by China's tactics for tech transfer and the long-term challenge of China's emergence as a powerhouse in innovation,” said Elsa B. Kania, adjunct fellow at the Center for New American Security. “However, the revision of this traditional mechanism for today's challenges is inherently challenging, particularly when development is driven by commercial technologies.” Unlike, say, controlling the components and designs of missiles in the Cold War, many of the technologies covered under these proposed rules have both commercial and military applications. We need not look abroad to find this. Project Maven, the tool Google created to process images collected from drones, was built on top of an open-source library. Identifying objects in images is hardly a military-specific task. Should companies within the United States be restricted in how they create, sell and share those same tools with researchers and commercial companies outside American borders? “China's national strategy of military-civil fusion, which seeks to create and leverage synergies among defense, academic, and commercial technological developments in dual-use technologies, increases the ambiguity and uncertainty of tech transfer and collaboration,” Kania said. “That is, the boundaries between defense and commercial technologies can become quite blurred as a result of the nature of these technologies and the Chinese government's strategy for their integrated development.” Putting in place controls to hinder the free flow of AI between American companies and businesses abroad may mitigate that risk somewhat, but countries set on acquiring the tools can pursue research by other means, including technology transfers, espionage, theft through hacking, or even straightforward investment and acquisition. Staying ahead in artificial intelligence likely cannot be done through commerce restrictions alone. “The U.S. must recognize that such controls may slow and hinder China's advances in these emerging technologies, but China's emergence as a powerhouse and would-be superpower in such emerging technologies will remain a critical long-term challenge,” Kania said. “We must not only pursue such defensive countermeasures, but also undertake a more offensive approach to ensuring future American competitiveness through investing in our own innovation ecosystem.” https://www.c4isrnet.com/it-networks/2018/11/20/to-maintain-tech-edge-us-seeks-export-controls-on-ai

Toutes les nouvelles