22 août 2024 | International, Aérospatial

North Korea slams US sale of Apache helicopters to South Korea as 'provocative'

Sur le même sujet

  • The new ways the military is fighting against information warfare tactics

    22 juillet 2020 | International, C4ISR

    The new ways the military is fighting against information warfare tactics

    Mark Pomerleau One of the clearest examples of how the military wants to defeat adversaries using information warfare is by publicly disclosing what those enemies have been doing and what capabilities they have. Information warfare can be abstract, combining cyber, intelligence, electronic warfare, information operations, psychological operations or military deception as a way to influence the information environment or change the way an adversary think. “At our level, the most important thing we can do is to be able to expose what an adversary is doing that we consider to be malign activity, in a way that allows that to be put in the information environment so that now more scrutiny can be applied to it,” Lt. Gen. Timothy Haugh, commander 16th Air Force, the Air Force's newly established information warfare organization, told reporters during a media round table in late February. One of the first ways the Department of Defense has sought to test this is through U.S. Cyber Command's posting of malware samples to the public resource VirusTotal. Malware samples discovered in the course of operations by the Cyber National Mission Force are posted to the site to inform network owners. It also helps antivirus organizations of the strains build patches against that code and helps identify the enemies' tools being used in ongoing campaigns. Haugh, who most recently led the Cyber National Mission Force, explained how these cyber teams, conducting what Cyber Command calls hunt forward operations, were able to expose Russian tactics. U.S. military teams deploy to other nations to help them defend against malign cyber activity inside their networks. “Those defensive teams then were able to identify tools that were on networks and publicly disclose them, [and] industry later attributed to being Russian tools,” he said. “That was a means for us to use our unique authorities outside the United States to be able to then identify adversary activity and publicly disclose it.” Officials have said this approach changes the calculus of adversaries while also taking their tools off the battlefield. “Disclosure is more than just revealing adversary intent and capabilities. From a cyberspace perspective, disclosure is cost imposing as it removes adversary weapons from the ‘battlefield' and forces them to expend resources to create new weapons,” Col. Brian Russell, the commander of II Marine Expeditionary Force Information Group, told C4ISRNET in June. “Disclosure forces the adversary to ask: ‘How were those capabilities discovered?' It causes them to investigate the cause of the disclosure, forcing them to spend time on something other than attacking us. If I can plant a seed of doubt (messaging) that the disclosure might have been caused by someone working on the inside, it makes them question the system's very nature, perhaps spending more time and resources to fix the system.” The NSA has demonstrated a similar tactic when it created its cybersecurity directorate in late 2019. The entity was formed in part, due to the fact that adversaries were using cyberspace to achieve strategic objectives below the threshold of armed conflict. Now, the directorate uses its intelligence and cyber expertise to issue advisories to the network owners of cybersecurity threats so they can take the necessary steps to defend themselves. One recent advisory had direct bearing on a nation state's malicious activity, according to a senior intelligence official. In late May, the agency issued an advisory regarding a vulnerability in Exim mail transfer agent, which was being widely exploited by a potent entity of Russia's military intelligence arm the GRU called Sandworm. “Quickly thereafter, we saw five cybersecurity companies jumped on it and really used that to deepen and expand and publish information about the GRU's infrastructure that they use to conduct their cyberattacks and further information as well,” the official told reporters in early July. “That was terrific because we felt that that had a direct impact on a major nation state in terms of exposing their infrastructure ... and we saw significant patch rates go up on a vulnerability that we knew they were using. That's the kind of thing that we're looking for.” The military has had to think differently to combat for how adversaries are operating. “A central challenge today is that our adversaries compete below the threshold of armed conflict, without triggering the hostilities for which DoD has traditionally prepared,” Gen. Paul Nakasone, commander of Cyber Command, wrote in prepared testimony before the House Armed Services Committee in early March. “That short-of-war competition features cyber and information operations employed by nations in ways that bypass America's conventional military strengths.” These disclosures or efforts to call out malign behavior have also taken the forms of media interviews and press releases. For example, Gen. Jay Raymond, the head of U.S. Space Command and the commandant of Space Force, said in a February interview in which he detailed what he deemed unacceptable behavior by Russia in space, a surprising charge given how tight lipped the U.S. government typically is about its satellites. “We view this behavior as unusual and disturbing,” he said of Russian satellites creeping up to American ones. “It has the potential to create a dangerous situation in space.” Or consider that leaders from Africa Command on July 15 issued a press release detailing the activities of the Wagner Group, a Russian security company, as acting on behalf of the Russian state to undermine the security situation in Libya. “U.S. Africa Command (AFRICOM) has clear evidence that Russian employed, state-sponsored Wagner Group laid landmines and improvised explosive devices (IEDs) in and around Tripoli, further violating the United Nations arms embargo and endangering the lives of innocent Libyans,” the release said. “Verified photographic evidence shows indiscriminately placed booby-traps and minefields around the outskirts of Tripoli down to Sirte since mid-June. These weapons are assessed to have been introduced into Libya by the Wagner Group.” Moreover, Africa Command's director of operations called out Russia, noting that country's leaders have the power to stop the Wagner Group, but not the will. Sixteenth Air Force, at the request of C4ISRNET, provided a vignette of such behavior from Russia in the form of how it covered up the explosion of a radioactive rocket, dubbed Skyfall. According to the service, Russia took extreme steps to curb monitoring of the site where the explosion took place and sought to conceal the true nature of the explosion potentially hindering surrounding civilian populations from receiving adequate medical treatment and guidance. With new forces integrated under a single commander, using unique authorities to collect intelligence and authorities to disclose, 16th Air Force is now better postured to expose this type of malign activity, which previously the U.S. government just didn't do. Top Pentagon leaders have explained that the dynamic information warfare space requires a new way of thinking. “We've got to think differently. We've got to be proactive and not reactive with messaging,” Lt. Gen. Lori Reynolds, the Marine Corps' deputy commandant for information, told C4ISRNET in an interview in March. “We have been very risk averse with regard to the information that we have. You can't deter anybody if you're the only one who knows that you have a capability.” https://www.c4isrnet.com/information-warfare/2020/07/20/the-new-ways-the-military-is-fighting-against-information-warfare-tactics/

  • Lockheed Martin claims both USAF hypersonic programmes

    8 août 2018 | International, Aérospatial

    Lockheed Martin claims both USAF hypersonic programmes

    BY: STEPHEN TRIMBLE The US Air Force has selected Lockheed Martin to rapidly develop and field both new hypersonic missiles launched as a response to surprise developments in high-speed weapons by China and Russia, newly-released acquisition documents confirm. The service already announced a $928 million award in April deal for Lockheed's Missiles and Space company to develop the Hypersonic Conventional Strike Weapon (HCSW, pronounced “Hacksaw”). But a new document reveals that the USAF awarded a separate deal to Lockheed's Missiles and Fire Control division in July 2017 to rapidly develop and field the Air-launched Rapid Response Weapon (ARRW, pronounced “Arrow”). The ARRW, now assigned the designation AGM-183A, evolves from the Tactical Boost Glide (TBG) programme launched in 2014 by the Defense Advanced Research Projects Agency (DARPA). By using a rocket to boost the missile to very high altitudes, the unpowered ARRW then glides down to lower altitudes at speeds up to Mach 20. Full Article: https://www.flightglobal.com/news/articles/lockheed-martin-claims-both-usaf-hypersonic-programm-450968/

  • USAF Sees Five-Year Window To Invent A New Fighter Aircraft Industry

    4 novembre 2019 | International, Aérospatial

    USAF Sees Five-Year Window To Invent A New Fighter Aircraft Industry

    By Steve Trimble and Lee Hudson The U.S. Air Force's vision to rapidly produce multiple fleets of advanced fighters the way Apple makes iPhones begins with an important change in plans for the secretive Next-Generation Air Dominance (NGAD) program. For three years, the Air Force analyzed how to replace the Lockheed Martin F-22 by 2030. The original plan—defined as the Penetrating Counter-Air capability in the Air Superiority Flight Plan released in 2017—called for developing a conventional replacement for the F-22, with a next-generation F-X fighter featuring a dazzling array of new technologies, ranging from adaptive cycle propulsion to advanced weapons and new sensors. As an extended, two-year-long analysis of alternatives neared a conclusion in mid-2018, the Air Force decided to shift to a new approach. The new strategy led Air Force leaders to drain about half of the $13.2 billion budget previously allocated to the NGAD program through fiscal 2024 in the Defense Department's five-year spending plan sent to Congress in March. Instead of launching full development of the F-X within that five-year window, the Air Force is developing a radical new aircraft design process—even as spending continues on deliveries of Lockheed F-35As, Boeing F-15EXs and a host of fighter upgrade programs. “We're at a good point to attempt something new because we have hot production lines for fifth [generation fighters]. [And] fourth-gen fighters [are] going through major multibillion dollar modernizations,” says Will Roper, the assistant secretary of the U.S. Air Force for acquisition, technology and logistics. “So it's a good time to try something new for a five-year window and see if we can create a new way to build airplanes for us that [is] between the building of one or two X-planes and the building of 1,000 units in a major defense acquisition program,” Roper, who is leading the new NGAD strategy, tells Aviation Week in an interview. Roper's comments on the sidelines of Aviation Week's DefenseChain Conference on Oct. 22, help clarify the dramatic shifts within the classified NGAD program over the last year. The U.S. Air Force essentially has delayed F-X development beyond the five-year spending plan to provide a window of time to invent a new business model for the combat aircraft industry, one ideally suited for a new era of air warfare with peer adversaries. The initiative will be supported by the new Program Executive Office for Advanced Aircraft that was established on Oct. 2. The office will be led by Col. Dale White, formerly the senior program director for the Northrop Grumman B-21 bomber development program at the Rapid Capabilities Office. Roper's vision for NGAD calls for a sharp break from the conventional acquisition approach adopted for the B-21, with a single prime contractor responsible for the full aircraft lifecycle, including at least a 10- to 15-year period between an initial contract award and delivering an operational capability. To Roper, the ideal model for NGAD is not another Western fighter program, but rather a consumer electronic device. Apple's customers buy an iPhone model that is designed to become obsolete within a few years, and replace it with a more advanced device, he says. The equivalent in the fighter business are aircraft designed to last perhaps 3,500 flight hours, which the U.S. Air Force buys in batches of hundreds and replaces in intervals of 10 years or less. “We want to retire airplanes when the next one is ready to be brought out—very similar to the iPhone model. So there's no reason to keep that old iPhone once you have the new one,” Roper says. Over the next five years, the Air Force wants to define the digital engineering-based approach to the hardware and common operating system approach to the software for the NGAD aircraft family. The goal is to attract new companies besides traditional defense firms to be involved in production, along with the specialized design units of the prime contractors such as Lockheed's Skunk Works, Boeing's Phantom Works and Northrop Grumman's Scaled Composites. “I could imagine companies that could build a few airplanes per month eventually breaking in and wanting to do it because there's an opportunity to do it frequently. And let's face it, design and cutting-edge airplanes [are] just wicked cool,” Roper says. https://aviationweek.com/defense/usaf-sees-five-year-window-invent-new-fighter-aircraft-industry

Toutes les nouvelles