4 mars 2021 | International, Aérospatial
Top USAF general urges support for Next-Gen fighter - Skies Mag
Air Combat Command chief talks NGAD, Tacair study, and acknowledges current F-35 problems.
13 septembre 2021 | International, Terrestre
MRZR Alpha gets global debut at London-based defense exhibition DSEI kicking off Sept. 14 as European countries seek capability to enhance light infantry forces.
4 mars 2021 | International, Aérospatial
Air Combat Command chief talks NGAD, Tacair study, and acknowledges current F-35 problems.
24 septembre 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité, Autre défense
Aaron Mehta WASHINGTON — While the phrase “tsunami of data” seems to have exited everyday use by Defense Department officials, the problem remains the same: The Pentagon simply cannot exploit the sheer amount of information that comes in every day to its fullest. It's a challenge that will only get worse as more sources of information come online, with each branch having its own data sets, which often don't talk to each other. At the same time, the lack of ability to properly sort, catalog and exploit the data means the department cannot fully achieve its goals of using artificial intelligence to its fullest. After almost a decade of talking about the problem, military leaders appear to have a target date for when the department will get its arms around the problem, according to Gen. John Hyten, the vice chairman of the Joint Chiefs of Staff. By 2030, the Pentagon expects handling data will no longer be an overwhelming challenge, Hyten said Monday during an event organized by the Defense Innovation Unit. But, he added, the department is looking at any way to move that date closer, including by reworking how requirements are developed in the Joint Requirements Oversight Council, or JROC, a group chaired by Hyten, which serves as an oversight body on the development of new capabilities and acquisition efforts. Currently, “a service develops the capability, it comes up through the various coordination boards in the JROC, eventually getting to the JROC where we validate a service concept and make sure it meets the joint interoperability requirement,” Hyten explained. “But what was intended is the JROC would develop joint requirements and push those out to the services and tell the services ‘you have to meet those joint requirements.'” To get back to that top-down model, Hyten plans to push out a list of joint requirements for two major department priorities in all domain command and control and logistics for joint fires, which will have specific requirements for data and software. “They're not going to be the traditional requirements that you've looked at for years, capability description documents and capability production documents. They're going to capabilities and attributes that programs have to have,” he said. “And if you don't meet these, you don't meet the joint requirements and therefore you don't get through the gate, you don't get money. That's how we're going to hold it.” Hyten added that the goal is to have those data requirements out to the services around the end of the year, shortly after the expected publication of the new joint warfighting concept. That concept — which Hyten has previously described as essentially eliminating lines between units and services on the battlefield — inherently relies on the ability to combine data to be successful, he noted. https://www.defensenews.com/pentagon/2020/09/23/hyten-to-issue-new-joint-requirements-on-handling-data/
17 mai 2018 | International, C4ISR
By: Martin Banks NATO Secretary General Jens Stoltenberg says “it is time we all woke up to the potential dangers of cyber threats.” Speaking at a conference on cyber crime in Paris May 15, Stoltenberg said, “In the Second World War there was a popular saying, ‘Loose lips sink ships.' Today, it is weak passwords, failing to add software updates, or opening unfamiliar emails. Simple things. But if we get them right, we go a long way to protecting ourselves.” Stoltenberg was speaking at the Ecole Militaire in the French capital on a major conference on NATO's so-called “Cyber Defence Pledge” which, he said, had helped nations to look at their cyber-defences in a more holistic way. NATO countries have faced a series of attacks in recent years. In France, TV-Cinq Monde was taken off air by hackers while Fancy Bear, a group associated with the Kremlin, hacked the main political parties in the United States in what Stoltenberg called “a brazen attempt to influence the 2016 election.” Last year's WannaCry attack forced Renault to halt production at several of its factories and a cyberattack brought hospitals in the UK to a standstill. “The very nature of these attacks is a challenge,” Stoltenberg said. “It is often difficult to know who has attacked you or even if you have been attacked at all. There are many different actors. “Governments, but also criminal gangs, terrorist groups and lone individuals. Nowhere is the ‘Fog of War' thicker than it is in cyberspace,” he said. “If these were hard attacks, using bombs or missiles instead of computer code, they could be considered an act of war. But instead, some are using software to wage a soft-war - a soft-war with very real, and potentially deadly consequences.” In 2014, NATO leaders agreed that a cyberattack could trigger Article 5, meaning that an attack on one ally is treated as an attack on all allies. He added, “I am often asked, ‘under what circumstances would NATO trigger Article 5 in the case of a cyber-attack?' My answer is: we will see. The level of cyberattack that would provoke a response must remain purposefully vague as will the nature of our response. “But it could include diplomatic and economic sanctions, cyber-responses, or even conventional forces, depending on the nature and consequences of the attack.But whatever the response, NATO will continue to follow the principle of restraint. And act in accordance with international law.” In less than two years, almost every ally had upgraded their cyber defences with France leading the way, investing €1.6 billion and employing thousands more cyber experts. He also pointed to Nato's new Command Structure and Cyber Rapid Reaction teams. https://www.fifthdomain.com/international/2018/05/16/how-would-nato-respond-to-a-cyber-attack-well-see/