9 mai 2023 | International, Autre défense

Pentagon strategy urges faster tech transition, more collaboration

The 11-page strategy, which the department released May 9, also emphasizes the need for more investment in lab and test infrastructure.

https://www.c4isrnet.com/battlefield-tech/2023/05/09/pentagon-strategy-urges-faster-tech-transition-more-collaboration/

Sur le même sujet

  • Here’s what the battlefield tech industry predicts for 2019

    4 janvier 2019 | International, C4ISR

    Here’s what the battlefield tech industry predicts for 2019

    By: Mike Gruss The new year will likely bring a new secretary of defense, a renewed emphasis on changing how the Pentagon buys weapons systems and a continued focus on watching technological development by the Chinese government. C4ISRNET asked industry leaders what trends they expect to emerge in the battlefield landscape in 2019. Here's what they said: Accelerated acquisition “Right now, your toaster can tell your refrigerator that it needs to order more bread, but the world's most advanced military is still challenged to connect its huge array of systems. That's just not sustainable. Before the military can start tackling huge technological leaps like artificial intelligence, we have to change the way we develop weapon systems. I see 2019 as the point when the DoD really starts moving away from buying proprietary, stove-piped, closed hardware systems and instead looks to the commercial software world as a model for how we develop and integrate weapon systems. Focusing on commercial-style software development is how we'll be able to develop truly open, upgradeable, cyber-resilient systems quickly. And by quickly I'm saying weeks or months for a new system, not years or decades. The pace of technology is moving faster than ever before, especially in the software world. We need to accept that and move with it if we want to stay ahead.” — Todd Probert, vice president of mission support and modernization at Raytheon An increased need for a coordinated response “Today's environment is evolving to warfare coordinated across multiple domains driving our forces to be more adaptable and coordinated in our response. As this threat environment accelerates, we recognize that our customers require methods that will enable them to operate seamlessly and simultaneously across domains. We see C4ISR technologies as the foundation for managing and responding to these more complex missions on a shorter timeline. We will continue to invest in transformational technologies that will help make multidomain operations more predictive and more effective. This includes: Machine-to-machine communication across new and legacy datalinks; Fusion to enable information from several sources into one unified picture of the battlespace and reduce the data to decision timeline; Artificial intelligence to provide decision makers with the ability to react quickly to problems that demand fast-paced analysis and decision making. AI offers the technology to change the human role from “in-the-loop” controller to “on-the-loop” thinker who can focus on strategy versus the execution detail; ‘Algorithmic warfare' to support a partnership between humans and computer systems, exponentially increasing the pace of processing, exploitation, dissemination and C2 operations; and Advanced multi-level secure modeling and simulation to manage patterns of life and actionable changes. — Brent Upson, director of ISR Systems at Lockheed Martin A move to small form factor networking “In 2019 we expect the DoD to significantly increase its investment in small form factor networking, secure wireless and virtualization-enabled compute necessary to improve war-fighter mobility and situational awareness in tactical and expeditionary programs. Tactical communications programs have proven the efficacy of size weight and power (SWaP) reduction by moving to small form factor equipment, and the savings enable entirely new IT-enabled use cases at the network edge. In particular, tactical deployments of classified wireless using commercial technologies, data center services and storage, and defensive cybersecurity solutions will see sizable new adoption in 2019.” — Peggy Miller, chief executive officer at PacStar Audio for authentication “Audio will be the buzz word of 2019 for network solutions. Introducing audio as a security layer in IP video provides a new layer of overall security to physical security solutions. Audio technology allows security professionals to interact with people remotely, as well as provide an automated response to prevent situations from escalating to an incident by identifying aggressive voices, glass breaking and even gunshots. With this new audio technology and analytical capabilities, security professionals can proactively detect, interpret and respond to events and emergency situations.” — John Merlino, government business development manager at Axis Communications, Inc. Attacks on data in the cloud “In the past two years, enterprises have widely adopted the Software-as-a-Service model, such as Office 365, as well as Infrastructure- and Platform-as-a-Service cloud models, such as AWS and Azure. With this move, far more corporate data now resides in the cloud. In 2019, we expect a significant increase in attacks that follow the data to the cloud. With the increased adoption of Office 365, we have noticed a surge of attacks on the service — especially attempts to compromise email. One threat the McAfee cloud team uncovered was the botnet KnockKnock, which targeted system accounts that typically do not have multifactor authentication. We have also seen the emergence of exploits of the trust model in the Open Authorization standard. One was launched by Fancy Bear, the Russian cyber-espionage group, phishing users with a fake Google security app to gain access to user data. "Similarly, during the last couple of years we have seen many high-profile data breaches attributed to misconfigured Amazon S3 buckets. This is clearly not the fault of AWS. Based on the shared responsibility model, the customer is on the hook to properly configure IaaS/PaaS infrastructure and properly protect their enterprise data and user access. Complicating matters, many of these misconfigured buckets are owned by vendors in their supply chains, rather than by the target enterprises. With access to thousands of open buckets and credentials, bad actors are increasingly opting for these easy pickings.” — Sekhar Sarukkai, vice president of engineering, cloud at McAfee The expansion of technology to counter small drones "The ever-expanding proliferation of small UAS (sUAS) has resulted in a rapid rise in sUAS incidents, leaving security personnel starved for a holistic solution to this new and evolving threat. A hobbyist unwittingly flying near a flight line or a drone pilot with nefarious intentions present both risk and unmet challenges. Counter-sUAS (C-sUAS) technology is an essential tool for assessing airspace activity, understanding the severity of drone incursions, and informing new protocols to mitigate potential threats. With C-sUAS technology, security personnel can now observe a drone's behavior and deploy appropriate offensive or defensive countermeasures, which may include direct contact with the pilot or coordination with local law enforcement. In all cases, detection of sUAS activity is the critical foundation of any C-sUAS program. “2018 was a year of testing and evaluating. Rapid prototyping, experimental deployments, and government testing events validated that no single C-sUAS system is a one-size-fits-all solution. Moreover, C-sUAS technology must be flexible to meet the needs of each specific environment.” — Phil Pitsky, vice president of U.S. federal operations at Dedrone https://www.c4isrnet.com/industry/2019/01/02/heres-what-the-battlefield-tech-industry-predicts-for-2019/

  • CENTCOM chief: The future of warfare demands more cyber authorities

    19 décembre 2018 | International, C4ISR

    CENTCOM chief: The future of warfare demands more cyber authorities

    By: Justin Lynch The Pentagon has received more power to conduct cyber operations in the past 18 months. But for the top Army commander in the Middle East and Central Asia, the new authority is not enough. The head of U.S. Central Command, Gen. Joseph Votel, wrote in a Dec. 18 paper that the Pentagon must “normalize” electronic warfare and cyberattacks and incorporate them into daily operations. “Normalizing the cyberspace domain means broader authorities that are more responsive than current bureaucratic processes,” Votel wrote in the Army's Cyber Defense Review. “It also means we need simple and streamlined organizations and processes to increase lethality and enhance performance.” The paper was coauthored by Votel, Maj. Gen. Julazadeh and Maj. Weilun Lin. “Our failure to operationalize and normalize the cyberspace domain effectively cedes it to our adversaries, gives them a competitive advantage and, ultimately, creates an increased attack vector against our objectives,” the authors said. President Trump gave the Pentagon new authorities to conduct cyber operations in August and minimized the process where other agencies can object to cyberattacks, known as “deconfliction.” Secretary of Defense Jim Mattis can conduct hacking operations without approval from the White House so long as they do not interfere with the American “national interest,” according to four current and former White House and intelligence officials who were either part of internal deliberations or briefed on the changes. Yet some current and former U.S. officials are skeptical that the new authorities will mean more effective hacking operations for the Pentagon, because it does not solve the nuances of cyberattacks. But the new mandates do not go far enough for the three officer authors, who argued that cyberwarfare should be under the same authorities as other types of operations. “We must not see cyberspace as drastically different and separate from other domains that we create new processes to prepare, plan and fight in this new domain. We continue to seek processes that smooth and simplify operations, reducing friendly friction and accelerating decision-making.” Current and former Pentagon officials have pointed to conducting cyberattacks against enemies that use networks of neutral or partner nations as an area where the Pentagon has changed its decision-making process in recent years. Those officials also pointed to how the Pentagon was able to use hybrid warfare tactics during the 2016 liberation of Mosul, Iraq, as a textbook example of future hybrid operations. Votel, Julazadeh and Lin echoed the sentiment of other Pentagon officials who have advocated for cyberattacks, electronic warfare and other information operations to be integrated earlier in military operations. “We need to proactively execute cyberspace and information operations early in 'Phase 0 / steady state' of the planning process — well before operation execution. Only then can we shape the [information environment], hold our adversaries' capabilities at risk and execute at the speed of war,” the three wrote. For example, Pentagon officials say they closely monitored Russia's 2014 hybrid war in Ukraine and learned from Moscow's tactics. Votel, Julazadeh and Lin shed light on the changes, writing that information operations were previously “integrated as an afterthought.” Yet over the last two years, Central Command has incorporated cyberattacks, electronic warfare and military deception at the “strategic level.” And this hybrid warfare has driven new acquisition demands in the Pentagon. “We need technology and capabilities to keep pace with the operational environment and continue to build the partnerships to do so,” the three officers wrote. In recent years, Central Command has bolstered its hybrid warfare through new contracts. The centerpiece of that effort is a July 2017 contract worth $621 million to Science Applications International Corporation for IT support to Central Command that could last seven years. In August 2018, Vistra communications was also awarded a $22 million contract to support offensive and defensive cyber operations for Central Command. https://www.fifthdomain.com/dod/2018/12/18/centcom-chief-the-future-of-warfare-demands-more-cyber-authorities

  • BAE Systems to develop filter technology to improve radar, communications, and electronic warfare capabilities

    23 septembre 2022 | International, C4ISR

    BAE Systems to develop filter technology to improve radar, communications, and electronic warfare capabilities

    The COFFEE program aims to provide elemental-level protection for these systems against interferers that could adversely impact the operation in congested environments

Toutes les nouvelles