24 mai 2023 | International, Naval

Poland to launch submarine purchase programme soon - minister

Polish Defence Minister Mariusz Blaszczak said on Wednesday that Poland plans to launch a submarine purchase programme in 2023.

https://www.reuters.com/world/europe/poland-launch-submarine-purchase-programme-soon-minister-2023-05-24/

Sur le même sujet

  • Space Force acquisitions and architecture | C4ISRNET Exclusive

    26 avril 2021 | International, Aérospatial

    Space Force acquisitions and architecture | C4ISRNET Exclusive

    C4ISRNET's Nathan Strout gets the latest on Space Force's acquisitions process as the new force gets stood up, and talks to the director of the Space Development Agency on how the Department of Defense plans to move data safely through space. More from the annual C4ISRNET Conference.

  • Soldiers to get a say in light tank competition

    15 octobre 2019 | International, Terrestre

    Soldiers to get a say in light tank competition

    By: Jen Judson WASHINGTON — Two companies are competing to build the Army's new light tank for Infantry Brigade Combat Teams and, in order to win, their prototypes will be judged by the users themselves. Those tests will be part of an extensive evaluation beginning roughly a year from now, Maj. Gen. Brian Cummings, Army program executive officer for ground combat systems, told Defense News. BAE Systems and General Dynamics Land Systems were chosen in December 2018 to build 12 prototypes each of the Army's future Mobile Protected Firepower vehicle identified in the Army's ground combat vehicle strategy, released in 2015, as much needed capability the service lacked. GDLS will build a vehicle that takes the United Kingdom's AJAX chassis and combines it with an Abrams turret. BAE Systems will bring an M8 Buford Armored Gun System with new capabilities and components. The MPF is going to be critical for the infantry, according to Brig. Gen. Ross Coffman, who is in charge of combat vehicle modernization. “Looking in every war movie ever watched, the infantry has been pinned down and they have a machine gun nest or another enemy vehicle that's preventing them to get their objective,” Coffman said. “It takes an Audie Murphy-like character to go up and sneak around and take it out from the rear.” MPF is going to take care of those impediments to forward progression, he said, and is a “vital piece of equipment for our Army. Right now we are doing that with Humvees and Javelin.” The soldier vehicle assessment will take place at Fort Bragg, North Carolina, and Fort Stewart, Georgia, and will include live-fire tests and operating in IBCT formations, Cummings said. The assessment will not just cover how the vehicles perform operationally, but how they hold up when assessed against warfighting doctrine, organization, training, maintenance in the field, logistics and sustainment. “This will be different, even though we've done it in history,” Cummings said. A team will look at doctrine in terms of having a light tank in the formation as well as having mechanics, fuel and the ability to recover vehicles as part of the operational assessment. “It's important we learn that early on,” in the prototyping process rather than after choosing a winning vehicle, Cummings noted. The Army is now reviewing design maturity of the vehicles and is making sure that everything stays on track to meet the soldier vehicle assessment requirements. These prototypes have to be ready for prime time when they get into an operational environment toward the end of next year, according to Cummings. Cummings also has two groups working with each vendor that are firewalled from one another. Those groups will be working with vendors through the SVA and to eventual down-select to one vehicle around the second or third quarter of fiscal year 2022 to go into production. The prototypes are expected in the third quarter of fiscal 2021. The first units will get MPF by FY25. The Army plans build 26 vehicles initially with an option to build 28 more and retrofit eight prototypes. https://www.defensenews.com/digital-show-dailies/ausa/2019/10/15/soldiers-to-get-a-say-in-light-tank-competition

  • DARPA Seeks Secure Microchip Supply Chain

    1 juin 2020 | International, C4ISR

    DARPA Seeks Secure Microchip Supply Chain

    "Once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible," explains a DARPA spokesperson. By THERESA HITCHENSon May 29, 2020 at 2:46 PM WASHINGTON: DARPA has launched a four-year project to find ways to design security features into microchips as they are being made to help ensure the future supply chain. While the name of the project is daunting — Automatic Implementation of Secure Silicon (AISS) — and the technical requirements are a serious challenge, the concept is pretty simple. “AISS aims to automate the process of incorporating security into chip designs, making it easier and potentially more cost effective for any organization with even a small design team (start-ups, mid-size companies, etc.) to build security measures into their designs,” a DARPA spokesperson told Breaking D today. “Overall, with AISS DARPA aims to bring greater automation to the chip design process to profoundly decrease the burden of including security measures,” the spokesperson said. The two winning teams, according to a May 27 DARPA press release, are: The two AISS research teams are: Synopsys, Arm, Boeing, Florida Institute for Cybersecurity Research at the University of Florida, Texas A&M University, UltraSoC, and the University of California, San Diego Northrop Grumman, IBM, University of Arkansas, and University of Florida “Research and development on the $75 million program was commenced two weeks ago and incremental capabilities are expected to roll out to the chip design community over the next four years,” the spokesperson said in an email. “Our hope is that many of the capabilities will start appearing as features in commercial design automation software before the program completion.” Digital integrated circuits are the engines that drive modern computers, and everyday digital devices such as smart phones. They are critical to the evolution of the Internet of Things (IoT). As such, they increasingly have become a key target of hacking by US adversaries and cyber criminals alike, DARPA explains. “Threats to IC chips are well known, and despite various measures designed to mitigate them, hardware developers have largely been slow to implement security solutions due to limited expertise, high cost and complexity,” the DARPA release says. “Further, when unsecure circuits are used in critical systems, the lack of embedded countermeasures exposes them to exploitation.” Indeed, the Department of Commerce on May 15 took another swipe at Chinese telecoms behemoth Huawei and tightened its earlier efforts to block it from exporting its semiconductors and products to the US and allies. The Trump administration alleges that Huawei's hardware and software, in particular that related to 5G wireless technology, are full of deliberate security holes in order to enable Chinese government spying. The ruling by Commerce's Bureau of Industry and Security, which will take effect in September, seeks to prevent companies around the world from using American-made software and machinery develop chips for Huawei or its subsidiary firms. The problem for device-makers, particularly in the IoT world where the market is largely for commercial products (think smart refrigerators), is that fixing potential security holes often isn't seen as worth the time, effort and most importantly, money. “The inclusion of security also often requires certain trade-offs with the typical design objectives, such as size, performance, and power dissipation,” the DARPA spokesperson said. “For example, something like a sprinkler isn't likely to require the highest level of security protections. Investing in security mechanisms that take up a lot of space on the underlying chip, or significantly impact chip performance likely doesn't make sense based on the sprinkler's expected use and application.” And yet, that future IoT sprinkler also will be other IoT devices and computer networks in operation by an individual, a company or a facility, such as a weapons depot. Even more unfortunately, the spokesperson explained, “modern chip design methods are unforgiving – once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible.” Thus, the AISS program is aimed at spurring research into two areas that can address four types of microchip vulnerability, the release says: “side channel attacks, hardware Trojans, reverse engineering, and supply chain attacks, such as counterfeiting, recycling, re-marking, cloning, and over-production.” The first area of research will be focusing on “development of a ‘security engine' that combines the latest academic research and commercial technology into an upgradable platform that can be used to defend chips against attacks, and provide an infrastructure to manage these hardened chips as they progress through their lifecycle,” DARPA said. The second area, led by software specialists Synopsys, “involves integrating the security engine technology developed in the first research area into system-on-chip (SOC) platforms in a highly automated way,” the DARPA release said. The Synopsys team also will be working on how to integrate new security designs and manufacturing tools with currently available off-the-shelf products. Nicholas Paraskevopoulous, sector VP for emerging capabilities development at Northrop Grumman, said in a May 27 press release that the firm's “design tools will enable the development of secure and trusted integrated circuits with reduced costs.” Northrop Grumman is involved in the first AISS research area. Synopsis could not be reached for comment by press time. https://breakingdefense.com/2020/05/darpa-seeks-secure-microchip-supply-chain/

Toutes les nouvelles