16 octobre 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité, Autre défense

Ratier-Figeac résiste à la crise gr'ce à son activité militaire, explique son président Jean-François Chanut

Frappée par la crise aéronautique, Ratier-Figeac parvient à éviter un plan social et préserve l'emploi de ses CDI gr'ce à un accord sur l'activité partielle longue durée. Pour la Dépêche du Midi, le président Chanut fait le point sur l'état de l'entreprise. Entretien.

https://www.ladepeche.fr/2020/10/16/grace-a-son-activite-militaire-ratier-figeac-resiste-a-la-crise-9142872.php

Sur le même sujet

  • BAE Tempest : la possible participation japonaise

    29 octobre 2021 | International, Aérospatial

    BAE Tempest : la possible participation japonaise

    Le Japon pourrait devenir partenaire au sein du team Tempest, lequel devrait voir une évolution sous forme de contrats avec les principaux partenaires à savoir la Suède et l'Italie d'ici la fin de cette année. BAE Systems avait déjà proposé ses compétences dans le cadre de l'étude du F-X japonais, le successeur du F-2.

  • Why the British army tested robots in muddy fields

    14 janvier 2019 | International, Terrestre

    Why the British army tested robots in muddy fields

    By: Grant Turnbull Senior British army officers have signaled their intent to accelerate the fielding of several unmanned — and increasingly autonomous systems — following successful army trials at the end of 2018, but much like other forces around the world the United Kingdom faces challenges from how to modify archaic acquisition processes, to overcoming technical issues. In December, the British army concluded its landmark experimentation exercise known as Autonomous Warrior, in which the service evaluated more than 50 unmanned systems from industry over a month-long period in the south of England. The exercise, which put the robotic systems through grueling trials in muddy fields and a purpose-built facility for urban fighting, was the first attempt by the British army, as well as industry, to determine how the technology will work in a combat environment. Much like other forces around the world, the service hopes to use robots to carry out the dangerous, and often tedious, elements of combat. Over 200 troops — made up of infantry, marines, engineers, airmen as well as U.S. Army personnel — were equipped with a variety of robotic and autonomous systems with the aim of improving areas such as combat mass, soldier lethality and overall information gathering. For example, in one scenario, soldiers used robotic engineering vehicles to clear an obstacle, while a small quadcopter flew overhead to provide infrared imagery before armored infantry rolled in to take an enemy position. Robotic systems with varying levels of autonomy were a key part of the exercise, ranging from radar-equipped drones for detecting buried IEDs, to small two-wheeled robots that are thrown into buildings to search for enemy fighters. The head of the British army, Gen. Mark Carleton-Smith, has directed the Ministry of Defence (MoD) to speed up the fielding of technology used during the exercise. “His direction to me is very clear,” said Maj. Gen. Chris Tickell, director of capability for the British army. “He wants to see some of this kit in the hands of the field army in 12 to 18 months. “Success or failure will absolutely hinge on what happens after the experiment,” he added. “And that is about the exploitation and proving to industry that we are as good as our word and we are going to take some of these ideas and put them into the hands of the user.” For Tickell, an equipment budget of £22 billion ($28 billion) over the next decade will allow the MoD to purchase new unmanned technologies, but the “trick is to turn the ideas that you see here into tangible capability.” This may require the MoD “to adjust and even devise new acquisition processes to enable rapid acquisition”, said Trevor Taylor, an expert in defense acquisition at the Royal United Services Institute, a London-based think tank. “How will requirements, business cases, competitive tendering or ‘partnering,' testing and safety cases be addressed?” A related challenge continues to be the British army's lack of experience using unmanned and autonomous systems, with commanders using the Autonomous Warrior exercise to better understand capability enhancements as well as the inevitable shortfalls. The officer responsible for coordinating the exercise, Lt Col Nick Serle, told C4ISRNET that while the British army has worked with industry on new technologies it had not previously focused on robots and autonomous systems. “That's why this year we decided to spend a month on Salisbury Plain just focusing on robotics and autonomous systems,” Serle said. He also commands the British army's experimentation unit, known as the Infantry Trials and Development Unit. “This is a real opportunity to bring stuff into the field and really see if it does what industry thinks it's going to do, but also to see if military users will use it the way [industry] thinks they will use it,” Serle said. “There's no one single piece of kit that will solve all our problems, it's a combination of something in the air such as a surveillance asset, something on the ground, perhaps with a weapon on it or just doing logistics, but then it all links through an information system where you can pass that data and make better decisions to generate tempo.” An issue highlighted by Serle was an increasingly crowded radiofrequency spectrum, especially as several unmanned systems jostle for space to beam back high-resolution data from onboard sensors. “The problem is when they start cutting each other out, we are dealing with physics here, if we want to have great high definition video passing across the battlefield we need to trade somewhere else.” Taylor noted that not only will there be a need to ensure that the control systems do not interfere with each other, but also that army leaders “will have to be convinced that new systems are not simply too vulnerable to jamming and other disruptive techniques by an adversary.” A promising development from the exercise is the ability to optionally man a standard vehicle using applique kits that can be fitted within a few hours. Several examples were on display when we visited the exercise in December, including a remote-controlled Warrior infantry fighting vehicle and a lightweight MRZR tactical vehicle. As part of the experimentation, troops used the vehicles in unintended ways. One U.S. Army soldier noting that the MRZR had been a helpful surveillance tool because of its onboard camera. Squads were also keen to use the UGVs to help in entering buildings and also as modern-day pack horses to carry supplies or people. “What we have found is that when troops are using these [UGVs], naturally they just want to jump on the vehicle because it goes faster than they can, and you can move groups very quickly on them,” Serle said. He added that for safety reasons the soldiers were not allowed to hop on board during the exercise. “Optionally manned is good, but whether it needs to be optionally manned with a steering wheel and a seat I don't know, I think you could do it more like a Segway. But there's no doubt people want to get on them.” https://www.c4isrnet.com/unmanned/robotics/2019/01/11/why-the-british-army-tested-robots-in-muddy-fields/

  • How tensions with Iran could test a new cyber strategy

    10 janvier 2020 | International, C4ISR, Sécurité

    How tensions with Iran could test a new cyber strategy

    Mark Pomerleau In 2018, the Department of Defense began following a new philosophy for cyber operations to better protect U.S. networks and infrastructure. Known as “defend forward,” the approach allows U.S. cyber forces to be active in foreign network outside the United States to either act against adversaries or warn allies of impending cyber activity that they've observed on foreign networks. After the U.S. military killed an Iranian general in a Jan. 2 drone strike and after national security experts said they expect Iran might take some retaliatory action through cyber operations, the specter of increased cyber attacks against U.S. networks puts Cyber Command and its new approach front and center. “This Iran situation today is a big test of the ‘defend forward' approach of this administration,” James Miller, senior fellow at Johns Hopkins Applied Physics Laboratory and former undersecretary of defense for policy, said at a Jan. 7 event hosted by the Council on Foreign Relations. “Will [Cyber Command] take preventative action? Will they do it in a way that our allies and partners support and that can be explained to the public?” While Iran fired several missiles Jan. 7 at a base in Iraq where U.S. troops lived as an initial response to the drone strike, many national security experts expect Iran could continue cyber actions as further retaliation for the strike. Iran could also ratchet up its cyber operations in the United States following the collapse of portions of the 2015 nuclear deal between the United States, Iran and five other nations to curb Iran's nuclear weapons capability in return for sanctions relief. Over the past 12 months, the White House and Congress streamlined many of the authorities used to conduct cyber operations to help cyber forces to get ahead of threats in networks around the world. One such provision in last year's annual defense policy bill provides the Pentagon with the authority to act in foreign networks if Iran, among other named nations, is conducting active, systematic and ongoing campaigns of attacks against the U.S. government or people. Cyber Command declined to comment on what, if anything, they were doing differently since the drone strike. Some experts, however, have expressed caution when assessing how well this defend forward approach has worked thus far given it is still relatively new. “The jury is very much still out here,” Ben Buchanan, assistant professor and senor faculty fellow at Georgetown University, said at the same event. “We don't have a lot of data, there's been a lot of hand-wringing ... about these authorities and about how Cyber Command may or may not be using them. I just don't think we've seen enough to judge whether or not ... [it is] meaningfully changing adversary behavior.” Others have also expressed reservations about how effective Iran can even be in cyberspace toward U.S. networks. “Iran is a capable cyber actor, Iran is a wiling cyber actor. That means Iran will conduct cyberattacks,” said Jacquelyn Schneider, Hoover fellow at the Hoover Institution at Stanford University. “It's not like they have this capability and they've been deterred in the past and maybe now they're going to turn it on. I think they've been trying this entire time.” Complicating matters further could be other actors trying to take advantage of U.S.-Iran imbroglio for their own interests. Priscilla Moriuchi, senior principal researcher and head of nation-state research at threat intelligence firm Recorded Future, said over the past several months, there have been reports of Russian state-affiliated actors hijacking Iranian cyber infrastructure to conduct operations masquerading as Iranians. “That creates its own uncertainty,” she said at the same event. “Another level of potential what we call inadvertent escalation if a country perceives that they are attacked by Iran but in reality, it” wasn't. https://www.fifthdomain.com/dod/2020/01/09/how-tensions-with-iran-could-test-a-new-cyber-strategy/

Toutes les nouvelles