20 janvier 2022 | International, Aérospatial

Safran équipera les hélicoptères H160M Guépard de l’armée française et les H160 de la Gendarmerie nationale

Dans le cadre de la commande par l'Etat français de 169 hélicoptères militaires H160M Guépard et de 10 hélicoptères H160 pour la Gendarmerie nationale, Safran fournira, notamment, la motorisation, avec l'Arrano, un moteur de nouvelle génération d'une puissance de 1300 cv qui intègre « le meilleur de la technologie en matière de moteurs aéronautiques », souligne le groupe. L'Arrano offre une consommation en carburant réduite d'environ 20% par rapport aux moteurs des hélicoptères qu'il va remplacer dans les forces françaises, et peut incorporer jusqu'à 50% de carburant d'aviation durable (SAF), précise Safran. Autre équipement majeur, le système optronique Euroflir 410, qui apportera « des performances d'observation inégalées aux hélicoptères », gr'ce à un champ de vision large et une observation très longue portée. Safran équipera également les hélicoptères de systèmes performants nécessaires au pilotage et à la stabilité de l'aéronef, dont les actionneurs électromécaniques TRIM et SEMA (Smart Electro Mechanical Actuator) ainsi que des éléments de cockpit et les systèmes d'essuie-glace, et la distribution électrique. Il fournira également les systèmes de sécurité (systèmes de flottabilités, radeaux de sauvetage), de gestion du carburant et de refroidissement.

Aerobuzz du 15 janvier

Sur le même sujet

  • US Air Force chief of staff: Our military must harness the potential of multidomain operations

    14 décembre 2018 | International, Aérospatial

    US Air Force chief of staff: Our military must harness the potential of multidomain operations

    By: Gen. David Goldfein Faced with the seemingly impossible task of solving the puzzle of the German military coding machine commonly known as “Enigma” during World War II, British mathematician Alan Turing and his team used a new kind of technology. They built a computing machine that foreshadowed the age of software and algorithms, breaking a code that the Germans changed every 24 hours. Turing's legacy is profound, in war and peace. Today, anyone who has spent time on the internet or social media can't help but have noticed the speed by which algorithms help companies direct targeted advertisements to us — in seconds and minutes — based on their ability to track online interests and behaviors. It is no overstatement to say that the same kind of intuitive speed in understanding and directing information is what our military needs in order to win future wars. This new kind of warfare will require us to defend against and attack foes on land and sea as well as in the air, space and cyberspace. In military parlance, the term for this is “multidomain operations,” an ungainly phrase that has nonetheless become a major focus for each of the military services, including my own, the U.S. Air Force. The term is in vogue now for good reason: Whoever figures out how to quickly gather information in various “domains” and just as quickly direct military actions will have the decisive advantage in battle. Figuring out how to master multidomain warfare will be difficult, but do it we must. History has many lessons here. One analogy I like dates to the American Revolution. As British military forces were preparing to attack Lexington and Concord, patriots devised a simple system to alert Colonial troops. They hung lanterns in the Old North Church in Boston — one if by land, and two if by sea. But how many lanterns would the patriots have hung if the British decided to conduct multidomain operations and attack from both the land and the sea? This would have created a dilemma because they would have to choose to either divide their force and defend both approaches or choose one to defend. However, the patriots had no need to worry about this because the British did not have the ability to control a split force using both land and sea approaches. Without a suitable command-and-control system, a military force cannot effectively take advantage of multidomain operations. Fast forward to today. Having the ability to credibly attack enemies independently by land, sea, air, space or cyberspace — or all at once — creates untenable dilemmas. I'd like our adversaries to always be in the lantern-buying business. Developing the systems, training and methods by which to practice this new brand of warfare will require extraordinary focus from our military. We will have to master and apply quantum computing, artificial intelligence, hypersonic flight, and new concepts for command-and-control that will need to span the globe. In order to build this capability, we will have to develop a new ethos that allows for experimental failure, just as the private sector has done in order to bring us smartphones, robotics and many other cutting-edge technologies that define the speed and precision of modern life. America's new National Defense Strategy correctly focuses the bulk of our nation's efforts on what is called great power conflict, the potential for war with formidable foes like Russian and China. We have known for some time that both are building militaries that harness AI, quantum computers, hypersonic flight and the ubiquitous threat from cyberattacks. To build a military capable of defending and deterring against such threats, it is imperative that the United States learn to fight and defend from beneath the ocean to the outer reaches of space, and everywhere in between. Last month the Air Force kicked off the inaugural Doolittle Wargame, named for the World War II hero Jimmy Doolittle, who led the daring air raid on Tokyo in 1942 that helped turn the tide of war in the Pacific. That mission personified multidomain warfare in that it was launched from an aircraft carrier hauling heavy bombers, something the Japanese were not expecting and were not prepared for. The Doolittle Wargame is the start of our efforts to learn how to harness the potential for extremely fast, unpredictable warfare from the heights of air and space to the expanses of cyberspace. If we can pull this off, it may redefine conventional deterrence in the 21st century. Gen. David Goldfein is the chief of staff for the U.S. Air Force. https://www.defensenews.com/outlook/2018/12/10/us-air-force-chief-of-staff-our-military-must-harness-the-potential-of-multidomain-operations/

  • Brazilian Army boosts capabilities with 420 “Guaicurus” vehicles

    16 juillet 2024 | International, Terrestre

    Brazilian Army boosts capabilities with 420 “Guaicurus” vehicles

    The Brazilian Army has collaborated with IDV to bolster national defence capabilities by utilising 420 LMV-BR 2 vehicles.

  • After huge hack, Biden security picks want more cyber coordination with industry

    21 janvier 2021 | International, C4ISR, Sécurité

    After huge hack, Biden security picks want more cyber coordination with industry

    Andrew Eversden WASHINGTON — Two top national security nominees advocated Tuesday for stronger federal cybersecurity and increased collaboration with contractors in the aftermath of a supply chain breach that infiltrated numerous federal agencies. If confirmed, retired Army Gen. Lloyd Austin and Avril Haines, President-elect Joe Biden's nominees for defense secretary and director of national intelligence, respectively, would start their jobs in the middle of the national security community's assessment of damage from a cybersecurity breach pinned on Russian hackers. They gained access through software from SolarWinds, a major government contractor. “We must elevate cybersecurity as an imperative across the government in order to defend the American people and U.S. critical infrastructure,” Austin told the Senate Armed Services Committee in his answers to the lawmaker's advance policy questions. “Additionally, the government must continue to strengthen its partnership with the private sector to foster greater information sharing and collaboration.” So far, federal investigators have discovered breaches at “fewer than 10” federal agencies, though the Pentagon and intelligence community haven't confirmed whether their offices were among the victims. Haines, who served as deputy CIA director and deputy national security adviser to President Barack Obama, found it concerning that the breach first came to light through cybersecurity company FireEye, instead of through U.S. government cybersecurity operators. “[I] absolutely share ... concern that we're actually able to detect these because that's obviously absolutely critical to us protecting against them,” Haines said before the Senate Select Committee on Intelligence. “I think ... it was pretty alarming that we found out about it through a private company as opposed to our being able to detect it ourselves to begin with.” In response to the breach, Austin committed to reviewing the DoD's cyber posture and emphasized that Russia must be punished for infiltrating federal networks. In the advance questions, Austin stopped short of calling the breach an act of war, arguing that designation “requires a case-by-case and fact-specific determination.” “For example, malicious cyber activities could result in injury, death or significant property destruction,” Austin wrote. “These activities would need to be considered in their totality.” An early January announcement from several federal investigators, including the NSA and Office of the Director of National Intelligence, stated that the breach was believed to be an espionage campaign and “likely Russian in origin.” “If that's the case, I think Russia should be held accountable,” Austin said at the hearing. “That's my personal belief.” Sen. Jack Reed, D-R.I., who sits on both SASC and SSCI, called the breach “the greatest cyber intrusion in the history, I think, perhaps, of the world” and said that the stovepiped nature of the U.S. national security apparatus needed to be addressed. Reed said one challenge for Haines will be developing a “more coherent, cohesive, integrated approach” to dealing with cybersecurity threats, particularly from advanced nation-state actors. Under questioning from senators, Haines said the SolarWinds supply chain hack was a “grave threat,” and the government needs new to improve its defenses against such attacks, though she noted that she hasn't received a classified briefing on the intrusion. In 2019, a report from ODNI warned of growing software supply chain hacks that provide an “efficient way to bypass traditional defenses and compromise a large number of computers.” “To prevent a recurrence of this kind of attack, we need to close the gap between where our capabilities are now and where they need to be in order to deter, detect, disrupt and respond to such intrusions far more effectively in the future,” Haines wrote in her questionnaire. “If confirmed as DNI, I will review the expert conclusions from the SolarWinds incident and the current intelligence about supply chain vulnerabilities and what steps may be taken to address any vulnerabilities.” Haines told senators that she would assess how the intelligence community can improve its cybersecurity partnerships with industry and the whole federal government. “I believe that the IC plays an integral role in detecting and warning against nation-state targeting of U.S. networks and infrastructure,” she wrote. “If confirmed, I will examine how better collaboration between the IC and the rest of the U.S. government, coupled with closer partnerships with the private sector and our international allies, can enhance our ability to deter, detect, and mitigate cyberattacks.” Haines will review whether the intelligence community is allocating resources properly to face advanced cyber threats and will examine the adequacy of the IC's existing authorities to protect the digital infrastructure of the United States, she said. Austin pointed to a cyber-threat sharing partnership the department has with the defense industrial base and stated that the department should “continue to look for ways to better integrate with interagency partners and the private sector.” In light of the SolarWinds breach, the senators on SSCI wrote that they are worried about a “lack of mandatory threat information sharing between the private sector and government,” adding that any information sharing from the private sector after the breach is voluntary. Haines would review the relationship. “Information sharing between the IC and the private sector is increasingly important to ensure that our data systems and networks are secure,” she wrote. “If confirmed as DNI, I look forward to reviewing the Intelligence Community's data sharing and information exchange relationship with the private sector, to engaging with IC experts and private sector leaders on what information is currently being shared, and to examining the efficacy of the current framework for sharing threat information.” The incoming Biden administration has signaled that it will prioritize cybersecurity in the aftermath of the SolarWinds breach. The Biden team named Anne Neuberger, the NSA's cybersecurity director who worked to improve information sharing with the private sector, to National Security Council as deputy national security adviser for cyber and emerging technology. Haines wrote that she will “ensure” that the intelligence community has a “robust data sharing and information exchange relationship” with private companies and said that she will be “studying current information sharing to determine how it can be improved and what types of information can be shared to enhance cybersecurity protections.” “The private sector has unique insight and expertise on malicious activity occurring within its networks,” Haines said. “Real-time integration of private sector and government data could lead to more effective prevention and mitigation outcomes.” Cyber norms and deterrence For the last few years, the U.S. government wrestled with the concept of deterrence in the cyber domain, a complex challenge that including resilient defenses, risk management and strong international partnerships. As the SolarWinds breach demonstrated, deterring adversaries from hacking, which is seen as below the threshold of an armed response, is difficult. In response to a question from Sen. John Cornyn, R-Texas, about how to approach cyber deterrence, Haines pointed to many of the same tenets of current U.S. cyber deterrence, including imposition of costs for malicious actors' behavior, bringing foreign allies together to impose those costs, building resilient systems that are hard to hack, developing norms and creating strong relationship with the private sector. Haines wrote that setting norms should include outlining sanctionable behavior with the agreement from allies. A cornerstone to sanctioning is attributing cyberattacks to actors, a challenging undertaking in the cyber realm. Sen. Mark Warner, D-Va., said he wanted Haines to be more forthcoming with attribution of cyberattacks, stating that he found it “extraordinarily concerning” that the “[Trump] White House underplay[ed] attribution on Russia.” Attribution, Haines said, would be a major piece of the ODNI's role in deterrence. “Something we [ODNI] can do is promote the ability to detect when adversaries are engaging in such activity so as then to provide information about attribution, for example. And then hold adversaries to account through that.” https://www.c4isrnet.com/cyber/2021/01/20/after-huge-hack-biden-security-picks-want-more-cyber-coordination-with-industry

Toutes les nouvelles