21 septembre 2021 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

New vaccine mandate raises questions for defense contractors

The new federal vaccine requirement announced by President Joe Biden has fueled questions from employers, including defense contractors, about how the mandate will work and whether they could lose employees as a result.

https://www.defensenews.com/industry/2021/09/20/new-vaccine-mandate-raises-questions-for-defense-contractors/

Sur le même sujet

  • Contracts for May 21, 2021

    25 mai 2021 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    Contracts for May 21, 2021

    Today

  • DARPA Seeks to Make Scalable On-Chip Security Pervasive

    29 mars 2019 | International, C4ISR, Sécurité, Autre défense

    DARPA Seeks to Make Scalable On-Chip Security Pervasive

    For the past decade, cybersecurity threats have moved from high in the software stack to progressively lower levels of the computational hierarchy, working their way towards the underlying hardware. The rise of the Internet of Things (IoT) has driven the creation of a rapidly growing number of accessible devices and a multitude of complex chip designs needed to enable them. With this rapid growth comes increased opportunity for economic and nation-state adversaries alike to shift their attention to chips that enable complex capabilities across commercial and defense applications. The consequences of a hardware cyberattack are significant as a compromise could potentially impact not millions, but billions of devices. Despite growing recognition of the issue, there are no common tools, methods, or solutions for chip-level security currently in wide use. This is largely driven by the economic hurdles and technical trade-offs often associated with secure chip design. Incorporating security into chips is a manual, expensive, and cumbersome task that requires significant time and a level of expertise that is not readily available in most chip and system companies. The inclusion of security also often requires certain trade-offs with the typical design objectives, such as size, performance, and power dissipation. Further, modern chip design methods are unforgiving – once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible. “Today, it can take six to nine months to design a modern chip, and twice as long if you want to make that same design secure,” said Serge Leef, a program manager in DARPA's Microsystems Technology Office (MTO). “While large merchant semiconductor companies are investing in in-house personnel to manually incorporate security into their high-volume silicon, mid-size chip companies, system houses, and start-ups with small design teams who create lower volume chips lack the resources and economic drivers to support the necessary investment in scalable security mechanisms, leaving a majority of today's chips largely unprotected.” To ease the burden of developing secure chips, DARPA developed the Automatic Implementation of Secure Silicon (AISS) program. AISS aims to automate the process of incorporating scalable defense mechanisms into chip designs, while allowing designers to explore economics versus security trade-offs and maximize design productivity. The objective of the program is to develop a design tool and IP ecosystem – which includes tool vendors, chip developers, IP licensers, and the open source community – that will allow security to be inexpensively incorporated into chip designs with minimal effort and expertise, ultimately making scalable on-chip security pervasive. Leef continued, “The security, design, and economic objectives of a chip can vary based on its intended application. As an example, a chip design with extreme security requirements may have to accept certain tradeoffs. Achieving the required security level may cause the chip to become larger, consume more power, or deliver slower performance. Depending on the application, some or all of these tradeoffs may be acceptable, but with today's manual processes it's hard to determine where tradeoffs can be made.” AISS seeks to create a novel, automated chip design flow that will allow the security mechanisms to scale consistently with the goals of the design. The design flow will provide a means of rapidly evaluating architectural alternatives that best address the required design and security metrics, as well as varying cost models to optimize the economics versus security tradeoff. The target AISS system – or system on chip (SoC) – will be automatically generated, integrated, and optimized to meet the objectives of the application and security intent. These systems will consist of two partitions – an application specific processor partition and a security partition implementing the on-chip security features. This approach is novel in that most systems today do not include a security partition due to its design complexity and cost of integration. By bringing greater automation to the chip design process, the burden of security inclusion can be profoundly decreased. While the threat landscape is ever evolving and expansive, AISS seeks to address four specific attack surfaces that are most relevant to digital ASICs and SoCs. These include side channel attacks, reverse engineering attacks, supply chain attacks, and malicious hardware attacks. “Strategies for resisting threats vary widely in cost, complexity, and invasiveness. As such, AISS will help designers assess which defense mechanisms are most appropriate based on the potential attack surface and the likelihood of a compromise,” said Leef. In addition to incorporating scalable defense mechanisms, AISS seeks to ensure that the IP blocks that make up the chip remain secure throughout the design process and are not compromised as they move through the ecosystem. As such, the program will also aim to move forward provenance and integrity validation techniques for preexisting design components by advancing current methods or inventing novel technical approaches. These techniques may include IP watermarking and threat detection to help validate the chip's integrity and IP provenance throughout its lifetime. AISS is part of the second phase of DARPA's Electronics Resurgence Initiative (ERI) – a five-year, upwards of $1.5 billion investment in the future of domestic, U.S. government, and defense electronics systems. Under ERI Phase II, DARPA is exploring the development of trusted electronics components, including the advancement of electronics that can enforce security and privacy protections. AISS will help address this mission through its efforts to enable scalable on-chip security. DARPA will hold a Proposers Day on April 10, 2019 at the DARPA Conference Center, located at 675 North Randolph Street, Arlington, Virginia 22203, to provide more information about AISS and answer questions from potential proposers. For details about the event, including registration requirements, please visit: https://www.fbo.gov/index?s=opportunity&mode=form&id=6770487d820ee13f33af67b0980a7d73&tab=core&_cview=0 Additional information will be available in the forthcoming Broad Agency Announcement, which will be posted to www.fbo.gov. https://www.darpa.mil/news-events/2019-03-25

  • What to look for in the upcoming Missile Defense Review

    14 janvier 2019 | International, Terrestre, C4ISR

    What to look for in the upcoming Missile Defense Review

    By: Aaron Mehta WASHINGTON — The Pentagon's Missile Defense Review is in the final stages of pre-release, sources tell Defense News, after more than a year of release delays. The review, a congressionally mandated document looking at the status of America's missile defense capabilities, could be unveiled as soon as the next week, although it has yet to be briefed to Congress, sources say. And while there appears to be significant momentum to actually releasing the document soon, the release has seemed imminent in the past, only to be pulled back at the last minute. The document has been the focus of intense speculation from both the missile defense and nonproliferation communities, with a wide expectation that the document will call for investments in new missile defense technologies and, potentially, a notable change in America's missile defense posture toward Russia and China. For years, America has maintained that missile defense systems capable of defeating major strategic systems are being designed and deployed not at another great power, but only at rogue actors — chiefly Iran and North Korea — who might seek to strike at the U.S. or its allies. The National Security Strategy — the overall security guidance released by the Trump administration in late 2017 — underlines this thinking, stating that “the United States is deploying a layered missile defense system focused on North Korea and Iran to defend our homeland against missile attacks. This system will include the ability to defeat missile threats prior to launch. Enhanced missile defense is not intended to undermine strategic stability or disrupt longstanding strategic relationships with Russia or China.” But analysts, such as Thomas Karako of the Center for Strategic and International Studies, have argued that in an era of great power competition, as illustrated in the National Defense Strategy, it's foolish to lack a plan for defending American assets and allies against China and Russia. “For so many decades we've been standing there like Samson, pushing apart Russia and China on the one hand and missile defenses on the other, saying they're not related,” Karako said. “So in some ways, that implicit connection [from previous reviews] could become much more explicit and pursued more aggressively, and really it should be.” Citing a need to defend against Russian and Chinese weapons is simply stating a need to defend against a major challenger. But China particularly seems to grow as a concern year over year for the U.S. government; it's notable that acting Secretary of Defense Patrick Shanahan's message to his staff upon taking over the top job at the Pentagon was to focus on “China, China, China.” Members of the nonproliferation community, such as Laura Grego of the Union of Concerned Scientists, argue that the technology needed to ensure America can defeat a major nation's use of strategic weapons is so expensive and technically challenging that getting to that point will divert funding from better projects. That spending decision would also encourage potential adversaries to invest more, not less, in nuclear weapons to counter America's perceived missile defense improvements, the argument goes. “Even absent a specific policy to take on Russia and China more explicitly, planned missile defense plans continue to be made in patterns that Russia and particularly China will not be able to ignore,” she said. “Trying to counter China and Russia's strategic deterrent with missile defense is of course a fool's errand and gets us further from reducing nuclear weapons, not closer. I hope that wiser heads prevail.” It is important to differentiate between regional missile defense systems being placed to defend allies against Russia or China, and the bigger homeland defense mission, said Kingston Reif of the Arms Control Association. For example, based on congressional guidance, it is expected the review will include ideas for countering hypersonic weapons, a threat currently originating from only Russia and China. “If the review goes so far as to broaden the role of missile defense to defend the U.S. homeland against Russian and Chinese missile attack[s], that would mark a major and radical change in U.S. policy,” Reif said. “The United States, Russia and China aren't taking into account the concerns the others have about their offensive and defensive developments sufficiently seriously to avoid increased risks of instability.” Technical capabilities While the great power competition may be a key driver, it is unlikely to be the only new aspect of the report. Karako hopes to see a layout for how missile defense capabilities fit into America's overall deterrence strategy, noting: “All capabilities are finite. So how is it that finite active missile defenses can contribute to deterring a Russia or China?" “Everyone knows if they want to, they could overwhelm a given defense. But it really comes down to how do certain capabilities deter aggression, opportunism, limited strikes, all these kind of things,” he said. “So I'll be looking for the articulation of how it contributes to overall deterrence for ourselves and our allies.” He's also keeping an eye out for how the document defines “integrated” missile defense systems, and whether planners can avoid stovepiping capabilities. Reif, for his part, is looking to see if there are increases in the Ground-Based Interceptor force in Alaska and California, or the creation of an East Coast missile defense site. Technologically, the report is expected to push for so-called left-of-launch technologies — capabilities that can take out a potential missile threat before it even leaves the launcher. “If you can see it early, you can kill it early,” Gen. John Hyten, the head of U.S. Strategic Command, said in August. “Driving that equation to the left has huge operational advantages because to actually shoot down a missile that somebody launched that comes back down on their head, do you think they are going to shoot another one? I don't think so. They are not going to shoot another one because it's just going to come right back down on their head, and so they stop shooting. Isn't that the whole point?” It's also expected the MDR will call for investment in laser systems, with Michael Griffin, the Pentagon's research and engineering head, saying in November that “you're going to see in upcoming budgets for missile defense a renewed emphasis on laser scaling across several” technology areas. In addition, expect talk of a space-based layer for missile defense, although that may be primarily focused on sensors rather than intercept capabilities — at least for now. Asked about space-based interceptors, Reif said: “Like a zombie that can't be killed, the idea keeps coming back. Pursuing space-based interceptors would be unaffordable, technically dubious and highly destabilizing.” The document, as ordered by Congress, must include milestone targets for developing new capabilities. It requires statements of five- and 10-year programmatic goals for developing capabilities, “as well as desired end states and milestones for integration and interoperability with allies, and a statement on the role of international cooperation,” per congressional guidance. Getting the MDR published has proven to be a nearly Sisyphean task for the Trump administration. Pentagon officials originally said the document would be released in late 2017 — then February, then mid-May and then late in the summer. In September, John Rood, who as undersecretary of defense for policy is the point man for the MDR, indicated the report could come out in a matter of weeks. And in October, Shanahan, then the deputy secretary of defense, said the document had been done “for some time.” There is also widespread speculation in the missile defense community that the review has been delayed, at least in part because of the warmed relations between the Trump administration and North Korea. Notably, the mid-May time frame for release, which was floated by Shanahan in April, lined up President Donald Trump's planned meeting in Singapore with North Korean leader Kim Jong Un. While that meeting was canceled and then eventually happened in June, there was a sense the Pentagon did not want to do anything that could jeopardize those talks, such as releasing a report discussing how the U.S. could counter North Korean capabilities. https://www.defensenews.com/pentagon/2019/01/11/what-to-look-for-in-the-upcoming-missile-defense-review

Toutes les nouvelles