6 mai 2024 | International, Terrestre

Russia will have to increase its missile arsenal to deter the West, diplomat says

Sur le même sujet

  • From the lab to the battlefield: Soldiers put new network tools to the test

    31 juillet 2020 | International, C4ISR

    From the lab to the battlefield: Soldiers put new network tools to the test

    Andrew Eversden The Army's new network tools, set to be deployed to units in 2021, were heavily influenced by a new factor: soldiers. Through exercises and training events, the Army's Network Cross-Functional Team received feedback on its design decisions for Capability Set '21, the set of new network tools set to be delivered to soldiers next year as part of the service's network modernization efforts. “This is the first time really in recent history that the network has really focused on soldier feedback. And it's important and it played a huge role in that,” said Col. Garth Winterle, project manager for tactical radios at the Army's Program Executive Office Command, Control, Communication-Tactical. The Army recently completed its critical design review of Capability Set '21 and is in the beginning stages of procuring network pieces for delivery. In the lead-up to making purchases, feedback from units helped show the differences between how the new network tools perform in the field versus in a lab. “Soldier ingenuity, leader know-how, the skill craft that our soldiers bring and the tradecraft they utilize in the field is a lot different than how we conceptualize it back here,” Col. Rob Ryan, deputy director of the Network CFT at Army Futures Command, said at a C4ISRNET event in June. Testing for the capability set has been ongoing in lab-run experiments and with limited field tests in the last few months. Through the field experiments, the Army modernization team received feedback from units on what volume of various capabilities the soldiers needed, what capabilities were usable and what “attributes” of each capability soldiers found to be more important than others, said Winterle. Disruptions caused by both the coronavirus pandemic and a deployment of the 82nd Airborne Division to the Middle East at the end of December forced the modernization team adjust its testing plans. Defender 2020, a massive exercise scheduled to take place in June with European allies, was altered. Army leaders had planned to use the event to test network equipment with allies. However, network tests are “back on the calendar” in the fourth quarter of fiscal 2020, Winterle said. “The design decisions that were made at critical design review are still up on the table for revision or reassessing after continual soldier feedback,” Winterle said. “This is a continual evaluation, continual process.” Maj. Gen. Peter Gallagher, director of the Network CFT, said in a June 9 webinar with industry that several testing events, like a Joint Warfighting Assessment and Defender 2020, were altered, as were combat training center rotations and other exercises. Those “are always great venues for us getting feedback from soldiers and leaders on improving the network design,” Gallagher said. Ryan said that the network team received feedback from soldiers during the development, build and delivery phases of network design. In forthcoming testing events, the Army wants to figure out how many radios are needed and where they need to be located, Winterle said. The service also plans to evaluate if it undervalued and overvalued certain capabilities. https://www.c4isrnet.com/yahoo-syndication/2020/07/30/from-the-lab-to-the-battlefield-soldiers-put-new-network-tools-to-the-test/

  • The Pentagon’s supply chain faces an economy under siege

    8 avril 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    The Pentagon’s supply chain faces an economy under siege

    By: Valerie Insinna and Aaron Mehta WASHINGTON — On the morning of April 2, companies up and down the Pentagon's supply chain got an email from Eaton Aerospace, a mid-tier supplier that provides parts such as fuel pumps and hydraulics to defense primes for aircraft like the KC-46 tanker and F-35 Joint Strike Fighter. “The truly unprecedented situation with [the coronavirus] COVID-19 is jointly affecting our business, families and communities we live in,” said one such email, which was obtained by Defense News. “While the health and safety of our employees and those of our supply partners remains paramount, our industry is significantly impacted. ... As a result, our Eaton Grand Rapids, [Michigan], plant will [be] closed starting April 4, 2020 and will reopen on April 13, 2020." Similar emails for other locations followed. In a statement, Eaton Corp. spokeswoman Margaret Hagan acknowledged that the company was temporarily implementing closures “at a few sites,” but maintained that there would be no impact to the “critical support” provided to the U.S. military. “We've made the important decision to maintain operations during the COVID-19 crisis because Eaton products are critical to our global infrastructure,” she said. “As a strategic supplier of aerospace fuel, hydraulic, motion control, electrical and engine solutions for the aerospace and defense sector globally, Eaton's aerospace products and support services are vital not only to the military, but to the transport of passengers and goods around the world.” Although perhaps not a household name in the defense sector, Eaton is far from a small business, bringing in more than $21 billion in sales in 2019. However, the quiet closure of its production lines illustrates how widespread the impacts of COVID-19 have reached — past the major prime contractors like Boeing, or even its major subcontractors like Spirit AeroSystems, and to the large and small companies that populate the middle and lower tiers of its supply chain. “The whole supply chain is a mess right now,” said an employee of one electronics manufacturer that provides components for both commercial and defense products. The source, whose name and company affiliation Defense News is withholding to protect the individual from reprisal, described challenges with working from home and retaining workers on the production line. Some colleagues, the source said, are choosing to take paid leave or voluntary layoffs rather than risk exposure to COVID-19. “We are at 20 percent capability,” the source said. According to Jeremy Bash, a former Pentagon official now with Beacon Global, “there is deep concern among industry and department leaders that the second- and third-tier suppliers need to be protected." “There's a sense DoD [the Department of Defense] needs better visibility into the supply chain, mapping out how a part makes its way into a plane or ship," Bash added. “There is a growing number of tech companies providing software to illuminate supply chains, and since COVID, the phones of those companies have been ringing off the hook because the department now realizes supply chain concentration is a huge risk.” ndustrial shock waves But one doesn't have to dive down the supply chain toward Eaton to see that the defense market is taking a beating, particularly the companies that also have a strong exposure to the commercial market. Up until last month, financial analysts would have seen commercial sales as a major boon to the overall health of a defense supplier, but that has changed, as the economy has taken a nosedive, said Richard Aboulafia, a defense and aerospace analyst with the Teal Group. “The commercial market is under siege, which means of course there is excess inventory, slumping revenue, major challenges on many levels,” he said. "On top of that, everybody faces the immediate impact of social distancing and workforce concerns. And on top of that, if you're heavily exposed to commercial, the harder time you might have getting credit. All of these are big issues. "The defense-industrial base, if it could somehow be removed from commercial aviation, we'd be in pretty good shape by the standards of the world economy. But we can't. They're intertwined.” Bloomberg reported Monday that Airbus sent a letter to employees over the weekend, warning that gaps in the supply chain, among other issues, will impact the company's ability to resume normal operations. Also on Monday, simulation firm CAE announced it was temporarily laying off 2,600 of its 10,500 global employees, while placing another 900 employees on a reduced work week. The company also instituted salary freezes and reductions for remaining staff, ranging from 50 percent for the CEO and executive team down to 10 percent for regular employees. Roughly 40 percent of CAE's overall revenue comes from defense contracts, according to the Defense News Top 100 list. Boeing, meanwhile, extended a shutdown of its Puget Sound, Washington, facilities, while also stopping work at its rotorcraft production line in Philadelphia, Pennsylvania. As a result of the Puget Sound shutdown, Spirit AeroSystems announced last week that it is halting work at a number of locations. Small businesses that form a core of the Pentagon's future technological development may be particularly vulnerable, according to government data and analytics firm Govini. In a new data sheet, the company noted there are roughly 50,000 small businesses that provide innovation support for the DoD, all of which is vulnerable to economic upheaval. “If this ecosystem suffers widespread failure due to COVID-19, the resulting impact will stretch well beyond short-term disruptions,” Govini said. “These vendors are not just critical links in the DoD supply chain important for immediate purposes. They are also vital for the development of both next-generation systems in the midterm and revolutionary capabilities that will shape the competitive landscape for decades into the future.” Between fiscal 2015 and fiscal 2019, roughly 28 percent of defense spending on underwater unmanned vehicles — a key part of the U.S. Navy's plan to build a fleet of the future — went to small businesses, according to Govini numbers. Small business contracts also accounted for 30 percent of the DoD's research on artificial intelligence during that same time period. Martijn Rasser, a senior fellow at the Center for a New American Security, warned Defense News last month that “for small business, a shutdown would be extremely difficult to get through because even with bailouts and economic stimulus, once those businesses close up, its really hard to get those started again.” “If an airline goes out of business, the planes don't disappear — you can start over. If it's a highly specialized manufacturing company, those employees are going to disperse and try to find other work. So I think that's something to be very cognizant of because of all the consolidation in the defense industry,” he added. “If they have to curtail operations for an extended period of time, it's extremely difficult to get it going again.” What's the Pentagon's response? Starting March 20, the Pentagon began issuing guidance on how to support industry. But a three-day span last week showed how those efforts remain a moving target, particularly in relation to the smallest suppliers. On March 30, the department's acting director of defense pricing and contracting, Kim Herrington, issued guidance to contracting officers that essentially said industry should not be penalized for missing performance targets as a result of the ongoing pandemic. “We must do our utmost to ensure that both the Department and the vital industrial base that support us remain healthy for the duration of this emergency and emerge as strong as ever from the challenges of this pandemic,” Herrington wrote. But some in Congress feel the department is still not doing enough to clarify policy changes for contracting officers and defense companies. On April 1, a group of Ohio lawmakers wrote to Defense Secretary Mark Esper and Under Secretary of Defense for Acquisition and Sustainment Ellen Lord, warning that “we are concerned that guidance to the defense contractor workforce remains ambiguous and lacks uniformity in application,” particularly in terms of communication from department contracting officers to small companies. Over the past several years, the Pentagon has worked to delegate decision-making authorities to low-level contracting officers. But while that may work to empower contracting officers to find creative solutions to problems under normal circumstances, during a pandemic, these officials are ill-prepared to decipher “uncertain, often conflicting guidance,” the lawmakers said. The lawmakers asked that contracting officers be directed to ensure that contractors are allowed to work remotely to the maximum extent possible; that contractors be given “maximum flexibility to meet their contractual obligations”; that efforts be made to not have “avoidable reductions” in the workforce; and that companies involved in research and development work be clearly labeled as essential personnel. And on April 2, two trade groups — the National Defense Industrial Association and the Professional Services Council — asked Congress to instate a six-month delay for a legal requirement included in the 2019 National Defense Authorization Act that prohibits the government from doing business with companies that work with vendors Huawei and ZTE. That language “will impose significant financial and operational costs on medium- and small-sized firms at a moment of substantial uncertainty and hardship,” at a time when they are dealing with the economic impact of the coronavirus pandemic, the letter stated. Later in the day, the DoD released a statement providing clarification on previous announcements. The department confirmed that higher progress payment rates — which had been jumped the previous week — will apply to already completed work, and not just future production. The new cash-flow rules should result in more than $3 billion in new cash moving into industry, according to department estimates. But that prediction came with a warning: The Pentagon “has high expectations that that prime companies are ensuring cash flow is moving to small businesses in their respective supply chains who need it most.” So far, the Defense Contract Management Agency has modified approximately 1,400 contracts with increased rates, the announcement noted. Contracting officials are working to ensure invoices at the higher progress payment rate keep arriving on time, with the department claiming there have been “no reported delays on contractor submitted invoices.” The announcement also stated that any delay related to COVID-19 issues will result in “an equitable adjustment of the contract schedule and cost,” meaning the department will adjust the contracts so that the vendor does not take an economic hit. The steps taken by the department are important, said Bash, the former Pentagon official. “The most powerful force the government can bring to help these companies is to say to industry: ‘We have money,' ” he said. A wildcard, Bash noted, is the $17 billion in national security-focused funding made available under the most recent stimulus package passed by Congress. However, Byron Callan, an industry analyst with Capital Alpha Partners, warns that more money doesn't necessarily mean less problems. “The DoD faces the same issues as any other branch of the government or the Fed that is providing more cash to address the crisis — if people aren't at work because of COVID-19, that cash won't help much in keeping a factory or office open and all projects on schedule," Callan said. For Aboulafia, increasing the value of progress payments is a good first step for increasing the flow of cash to suppliers. “In times like this, it really is about access to cash because of the risk of credit markets freezing up for commercial companies. Accelerated payments, maybe loan guarantees should be considered," Aboulafia said. But he's realistic that the defense industry isn't the only issue on the table for the Trump administration. “I think there's a lot that government can do,” Aboulafia said. "Unfortunately there's a lot that government has to do because the entire economy has been put into a medically induced coma.” https://www.defensenews.com/coronavirus/2020/04/08/the-pentagons-supply-chain-faces-an-economy-under-siege

  • DARPA Seeks Secure Microchip Supply Chain

    1 juin 2020 | International, C4ISR

    DARPA Seeks Secure Microchip Supply Chain

    "Once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible," explains a DARPA spokesperson. By THERESA HITCHENSon May 29, 2020 at 2:46 PM WASHINGTON: DARPA has launched a four-year project to find ways to design security features into microchips as they are being made to help ensure the future supply chain. While the name of the project is daunting — Automatic Implementation of Secure Silicon (AISS) — and the technical requirements are a serious challenge, the concept is pretty simple. “AISS aims to automate the process of incorporating security into chip designs, making it easier and potentially more cost effective for any organization with even a small design team (start-ups, mid-size companies, etc.) to build security measures into their designs,” a DARPA spokesperson told Breaking D today. “Overall, with AISS DARPA aims to bring greater automation to the chip design process to profoundly decrease the burden of including security measures,” the spokesperson said. The two winning teams, according to a May 27 DARPA press release, are: The two AISS research teams are: Synopsys, Arm, Boeing, Florida Institute for Cybersecurity Research at the University of Florida, Texas A&M University, UltraSoC, and the University of California, San Diego Northrop Grumman, IBM, University of Arkansas, and University of Florida “Research and development on the $75 million program was commenced two weeks ago and incremental capabilities are expected to roll out to the chip design community over the next four years,” the spokesperson said in an email. “Our hope is that many of the capabilities will start appearing as features in commercial design automation software before the program completion.” Digital integrated circuits are the engines that drive modern computers, and everyday digital devices such as smart phones. They are critical to the evolution of the Internet of Things (IoT). As such, they increasingly have become a key target of hacking by US adversaries and cyber criminals alike, DARPA explains. “Threats to IC chips are well known, and despite various measures designed to mitigate them, hardware developers have largely been slow to implement security solutions due to limited expertise, high cost and complexity,” the DARPA release says. “Further, when unsecure circuits are used in critical systems, the lack of embedded countermeasures exposes them to exploitation.” Indeed, the Department of Commerce on May 15 took another swipe at Chinese telecoms behemoth Huawei and tightened its earlier efforts to block it from exporting its semiconductors and products to the US and allies. The Trump administration alleges that Huawei's hardware and software, in particular that related to 5G wireless technology, are full of deliberate security holes in order to enable Chinese government spying. The ruling by Commerce's Bureau of Industry and Security, which will take effect in September, seeks to prevent companies around the world from using American-made software and machinery develop chips for Huawei or its subsidiary firms. The problem for device-makers, particularly in the IoT world where the market is largely for commercial products (think smart refrigerators), is that fixing potential security holes often isn't seen as worth the time, effort and most importantly, money. “The inclusion of security also often requires certain trade-offs with the typical design objectives, such as size, performance, and power dissipation,” the DARPA spokesperson said. “For example, something like a sprinkler isn't likely to require the highest level of security protections. Investing in security mechanisms that take up a lot of space on the underlying chip, or significantly impact chip performance likely doesn't make sense based on the sprinkler's expected use and application.” And yet, that future IoT sprinkler also will be other IoT devices and computer networks in operation by an individual, a company or a facility, such as a weapons depot. Even more unfortunately, the spokesperson explained, “modern chip design methods are unforgiving – once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible.” Thus, the AISS program is aimed at spurring research into two areas that can address four types of microchip vulnerability, the release says: “side channel attacks, hardware Trojans, reverse engineering, and supply chain attacks, such as counterfeiting, recycling, re-marking, cloning, and over-production.” The first area of research will be focusing on “development of a ‘security engine' that combines the latest academic research and commercial technology into an upgradable platform that can be used to defend chips against attacks, and provide an infrastructure to manage these hardened chips as they progress through their lifecycle,” DARPA said. The second area, led by software specialists Synopsys, “involves integrating the security engine technology developed in the first research area into system-on-chip (SOC) platforms in a highly automated way,” the DARPA release said. The Synopsys team also will be working on how to integrate new security designs and manufacturing tools with currently available off-the-shelf products. Nicholas Paraskevopoulous, sector VP for emerging capabilities development at Northrop Grumman, said in a May 27 press release that the firm's “design tools will enable the development of secure and trusted integrated circuits with reduced costs.” Northrop Grumman is involved in the first AISS research area. Synopsis could not be reached for comment by press time. https://breakingdefense.com/2020/05/darpa-seeks-secure-microchip-supply-chain/

Toutes les nouvelles