29 janvier 2024 | International, Terrestre

Rheinmetall Italia touts Ukraine deployment of Skynex air defense gun

The company hopes that the system's use in combat will lend it credibility in the competitive counter-drone and missile-defense market.

https://www.c4isrnet.com/global/europe/2024/01/26/rheinmetall-italia-touts-ukraine-deployment-of-skynex-air-defense-gun/

Sur le même sujet

  • Collins Aerospace Broadens Communication Capabilities for USAF U-2 Dragon Lady

    19 septembre 2019 | International, Aérospatial

    Collins Aerospace Broadens Communication Capabilities for USAF U-2 Dragon Lady

    Collins Aerospace Systems, a unit of United Technologies Corp. (NYSE: UTX), has been selected by the U.S. Air Force (USAF) to upgrade its fleet of U-2 Dragon Lady aircraft with HF-9087D High Frequency (HF) radios. With a primary mission of reconnaissance, the U-2 will gain the ability to securely transfer Command and Control (C2) data in real-time over HF while still maintaining reliable, clear voice communications beyond line of sight. “In contested environments, HF communications continue to be a reliable backbone to ensure mission success with a low operating cost,” said Troy Brunk, vice president and general manager, Communication, Navigation and Guidance Solutions for Collins Aerospace. “The U-2's upgraded HF will provide robust long-range digital communications capabilities to this platform.” Since 1933, Collins Aerospace has been a leader in HF technology. The company is a supplier of HF systems for the USAF's High Frequency Global Communications System (HFGCS) and provides HF communications on nearly all airlift, tanker and bomber assets used in the Department of Defense today. http://www.asdnews.com/news/defense/2019/09/17/collins-aerospace-broadens-communication-capabilities-usaf-u2-dragon-lady

  • How Lockheed Martin Is Trying To Link Everything on the Battlefield

    18 novembre 2019 | International, C4ISR

    How Lockheed Martin Is Trying To Link Everything on the Battlefield

    BY PATRICK TUCKER Experiment by experiment, the company is weaving aircraft, ground vehicles, satellites, and the rest into a network that will someday give commanders unprecedented decision-support options. The Pentagon's efforts to digitally connect everything on the battlefield is has a big challenge to overcome: getting disparate vehicles and weapons to share data. “The interoperability of various, different systems, that's really where we are struggling. We don't have that machine to machine connection to begin with,” Air Force Brig. Gen. David Kumashiro recently told the audience at last week's Defense One Outlook 2020 conference. Over the past several years, Lockheed Martin officials say they've been working to build those connections, piece by piece and plane by plane. They started by asking, “How would we go fight in 2030, 2045?” and then working backwards, J.D. Hammond, vice president of C4ISR systems, told reporters at one of the company's offices. The company began by asking “How would we go fight in 2030, 2045?” They started with an idea of the state they wanted to reach and then worked backward. In 2013, the company launched a project, dubbed Missouri, to link the stealthy F-22 and F-35 combat jets. The Air Force has announced that they are to test a similar link next month, but the Air Force is establishing more complete linkages, including new forms of secure radio linkagages using software defined radio, and also including other assets such as Valkyrie drones. In 2015, they launched Project Iguana, extending the datalinks to the high-flying U-2 spy plane, fourth-generation combat aircraft such as the F-16, and satellites. In February 2018, they conducted an experiment under DARPA's SoSITE program that added other aircraft and a ground station. In April, their RIOT experiment connectngi jets to ground vehicles. Experiment by experiment, Lockheed tried to “systematically work” to build the components of a larger network of networks, said Hammond. There are four experiments projects planned for next year: Mayhem, focusing on links for satellites; Edison, datalinks for the Navy; Brennan, aircraft and Army units; and Project CASTL, satellites and a “space tactical layer”. Ultimately, Lockheed wants all this to add up to a “virtualized cloud-based architecture.” Think of it like the branches of a tree. A handful of ships and planes might form one network. That will, in turn, connect to a larger network that would, in turn, would be connected to the larger JEDI cloud. “You end up with virtual private clouds on the edge with a computing architecture you could have on an aircraft, on a ship, or any of the deployed nodes,” said John Clark, Lockheed's vice president of intelligence-surveillance-reconnaissance and unmanned aerial systems. Most of the linked aircraft and ships in these experiments carry an Enterprise Mission Computer 2.0 — dubbed “Einstein box” after its abbreviation, EMC2 — that translates each platform's data into a shared protocol that can go out to the larger wireless network. Lockheed officials hope that bringing all these pieces together will enable a new sort of operating system for warfare. They showed journalists a new experimental battle management display to illustrate the concept. The system presents the operator with a list of effects, from devastating explosions to a quiet disabling of some enemy system; a list of available assets, including planes or drones; a map of targets; and recommendations for the best way to deliver effects to targets. As circumstances change — fuel gets low, ammunition is depleted, targets are destroyed, new enemy forces arrive, etc. — the system can send out alerts that a new plan is needed — or automatically update the plan with new instructions for pilots and drone operators. It all depends on how high the operator wants to set the autonomy. That vision is very different from the way mission tasking works today. Preston Dunlap, the chief architect of the Air Force, said at the Defense One Outlook 2020 conference, “Right now, our commanders are very limited in who they can assign to do certain” things. “More often than not, you have to assign someone because they happen to be in front of a specific place in front of a specific computer,” he said. Of course, realtime data sharing across platforms isn't a simple or clear-cut affair, even after successful experimentation. The years-long problems with Lockheed's Autonomic Logistics Information System, or ALIS, for the F-35 show how hard it can be simply to share data between operators and just one platform. The challenges of sharing data between multiple platforms, in the middle of battle in a highly contested airspace, are far larger. But commanders say they must try. “In terms of where our adversaries are,” Kumashiro said, U.S. forces have “a need to have this joint all-domain command-and-control system.” https://www.defenseone.com/technology/2019/11/how-lockheed-martin-trying-link-everything-battlefield/161355

  • How many users were affected by the DISA breach?

    21 février 2020 | International, C4ISR, Sécurité

    How many users were affected by the DISA breach?

    Andrew Eversden A breach of a system hosted by the Defense Information Systems Agency, the Department of Defense's primary IT support agency, affected “approximately 200,000” users after a malicious actor may have gained access to names and Social Security numbers, according to a Pentagon spokesman. Chuck Prichard, a DoD spokesman, said there is “no evidence to suggest that any of the potentially compromised [personally identifiable information] was misused.” DISA is sending letters notifying potentially affected users, in line with agency policy. He added that affected individuals “will subsequently receive additional correspondence with information about actions that can be taken to mitigate possible negative impacts.” The news of the breach was first reported by Reuters. Prichard said the breach was discovered during summer 2019. According to Reuters, which viewed a copy of the letter sent out to DISA officials, the breach occurred between May and July 2019. Affected users will also receive free credit monitoring, Prichard said. Prichard declined to specify what network was breached, only that it was hosted by DISA. He also declined to comment on how long the actor was in the network. “DoD and DISA take the security of our people, information (or data) and operations very seriously and actively monitor potential threats," Prichard said. “For operational security reasons, the department does not comment on the actions taken to mitigate risks or vulnerabilities.” He did add that “DISA ... conducted a thorough investigation of this incident and taken appropriate measures to secure the network.” According to its website, DISA employs over 8,000 military and civilian employees. The agency's mission includes protecting the Department of Defense Information Network, a global DoD network used for sharing and storing information. DISA runs a variety of other systems, including combat support, DoD enterprise email and other communication networks. https://www.fifthdomain.com/dod/2020/02/20/how-many-users-were-affected-by-the-disa-breach/

Toutes les nouvelles