9 janvier 2024 | International, Aérospatial

RCAF pilot flies U.S. Air Force C-17 in exchange program - Skies Mag

A seasoned air mobility pilot, Captain Jeremie Burney is learning new techniques to master the C-17 Globemaster III on an exchange with the U.S. Air Force.

https://skiesmag.com/features/rcaf-today-a-rewarding-military-pilot-exchange/

Sur le même sujet

  • Why China axed the Strategic Support Force and reshuffled the military

    28 avril 2024 | International, Aérospatial

    Why China axed the Strategic Support Force and reshuffled the military

    Its successor, the Information Support Force, will now handle network information systems and communications support, and possibly network defense.

  • US Air Force turns to data analytics to solve B-1, C-5 maintenance challenges

    26 septembre 2018 | International, Aérospatial

    US Air Force turns to data analytics to solve B-1, C-5 maintenance challenges

    By: Valerie Insinna WASHINGTON — The U.S. Air Force is making changes to the way it sustains the B-1B Lancer bomber and C-5 Super Galaxy cargo plane, moving to a maintenance approach that will allow it to use data analytics to predict problems, the acting head of Air Force Materiel Command said. Both the B-1 and C-5 fleets transitioned to a conditions-based maintenance model last month, Lt. Gen. Robert McMurry, commander of the Air Force Life Cycle Management Center, told Defense News in a Sept. 18 interview. “Given the aging fleet situation that we have, we probably need to be using data better to take care of it — which is a drive toward what most everyone right now is saying is the right way to manage fleet sustainment, which is through condition-based maintenance and data analytics,” he said. “So we're trying to bring that on.” The approach — which involves using algorithms to predict the need for repairs rather than waiting for a part to break — is a standard practice in the commercial airline industry to help reduce maintenance-related delays or cancellations, but has been less common in the Air Force. AFMC determined it needed to make a greater push toward conditions-based maintenance as a result of servicewide reviews triggered by rising concerns about the number of aviation-related mishaps. The first review, directed by Air Force Chief of Staff Gen. Dave Goldfein, involved a one-day standdown that would give flying and maintenance units a chance to communicate potential safety concerns up the chain of command. Gen. Ellen Pawlikowski, then the head of AFMC, also directed the organizations under her command, like the Air Force Sustaiment Center, to evaluate its own data. The reviews have since concluded, with the Air Force finding “two systems ... where high risk was accepted,” said McMurry, noting that “operational security does not allow us to identify them.” “Our process is dealing with those responsibly,” he added. The B-1 and C-5 were chosen as pilot programs for the conditions-based maintenance approach because they are sustained by airmen and have older, relatively small inventories, making for a more manageable data set. But the planes have something else in common — a recent history of well-publicized mishaps. The C-5 has sustained a number of nose landing gear malfunctions that led to a standdown and maintenance assessment in 2017. But despite a fix being put in place, there have still been problems with the gear, such as a March 2018 event where one C-5 landed on its nose at Joint Base San Antonio-Lackland, Texas. Meanwhile, the B-1 fleet was temporarily grounded in June after a safety investigation board found problems with ejection seat components while investigating a May 1 emergency landingwhere the ejection seats did not deploy. Full article: https://www.defensenews.com/digital-show-dailies/air-force-association/2018/09/25/air-force-looks-to-data-analytics-to-help-solve-b-1-c-5-maintenance-challenges/

  • Pentagon needs access to defense companies’ networks to hunt cyberthreats, says commission

    31 juillet 2020 | International, C4ISR, Sécurité

    Pentagon needs access to defense companies’ networks to hunt cyberthreats, says commission

    Mark Pomerleau WASHINGTON — The Pentagon must be able to hunt cyberthreats on the private networks of defense companies in order to strengthen national cybersecurity, according to one of the leaders of the Cyber Solarium Commission. Rep. Mike Gallagher, R-Wis., who co-chairs the commission, said in testimony before the House Armed Services Subcommittee on Intelligence and Emerging Threats and Capabilities that there must be greater visibility of these networks, in which much sensitive and classified information is kept. “I think one of our biggest findings in the report was that while we are getting a better awareness of our own systems, we still — down to the level of some of our DoD contractors, subcontractors, all the small companies that work with the big defense primes — don't have the level of visibility on the threat picture and the security of their networks that we need,” he said July 30. “I just would argue that we need to figure that piece out because we just can't be in the process of reacting to cyber intrusions after the fact. We have to identify those threats at a quicker timeline at which our adversaries can break out on networks.” The Cyber Solarium Commission is a bipartisan organization created in the 2019 to develop a multipronged U.S. cyber strategy. The commission's report, released in March, recommended Congress require the defense industrial base participate in threat intelligence sharing programs and threat hunting on their networks. “Improving the detection and mitigation of adversary cyber threats to the DIB [defense industrial base] is imperative to ensuring that key military systems and functions are resilient and can be employed during times of crisis and conflict,” the report stated. China has been accused of pilfering reams of data from the networks of defense companies, including plans for the F-35 fighter jet and sensitive data on U.S. Navy programs that, while not classified by themselves, can collectively provide vast strategic insight into Navy plans and operations, officials claim. The commission's report recommended that a threat-hunting program include Department of Defense threat assessment programs on DIB networks; incentives for companies to feed data collected from threat hunting to the DoD and the National Security Agency's cybersecurity directorate; and coordination of DoD efforts with the Department of Homeland Security and the FBI. Congress is calling for the creation of a threat-sharing model in this year's defense authorization bill. The Senate's version includes a provision to direct the defense secretary to establish a threat intelligence program “to share threat intelligence with, and obtain threat intelligence from, the defense industrial base.” https://www.c4isrnet.com/cyber/2020/07/30/pentagon-needs-access-to-defense-companies-networks-to-hunt-cyberthreats-says-commission/

Toutes les nouvelles