3 décembre 2019 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

SASC chairman: We must build the national security innovation base our defense strategy requires

By: Sen. Jim Inhofe

Since World War II, the American people have believed our military has had the best of everything, but the technological superiority that kept us 20 years ahead of our competitors has rapidly diminished. In some cases, we're already behind. By 2030, unless we pursue “urgent change at significant scale,” as former Defense Secretary Gen. James Mattis put it, it's likely the U.S. will face an enemy with superior weapons, superior equipment and superior capabilities.

Nowhere is this better illustrated than in our strategic competition with China. China used to just steal our technology. Now, through heavy investment, they are improving it. The result? China is outpacing the U.S. in key areas like hypersonic weapons, artificial intelligence and biotechnologies — not to mention conventional capabilities.

China isn't the only one. Technological development is accelerating across the globe, expanding to more actors and changing the very nature of war.

We can't afford to let our advantage erode further. It is up to the Department of Defense and Congress to make sure that the defense-industrial base becomes, as the National Defense Strategy demands, an “unmatched 21st century National Security Innovation Base.” If we want to “sustain security and solvency,” we need to consider wholesale change to industry culture and its interface with the Department of Defense, shed outdated management processes, and reimagine a resilient supply chain that mitigates 21st century risks.

This begins with software, which is foundational to military capability. The DoD and its traditional hardware-dominant industry partners have been behind on software in almost every way — talent, tools, development and delivery processes. Software innovation has failed in countless DoD programs, including the Ford-class carrier, the F-35′s Autonomic Logistics Information System and the GPS next-generation operational control system. Instead of taking the Pentagon for granted as an endless source of cash flow, partners must refocus their attention on delivering secure capability that actually works.

Next, the Department of Defense needs to continue to expand capacity — prioritizing speed of delivery and adapting its systems to maximize value and output. For too long we have been slow to expand our stockpiles of fifth-generation weapons required to fight peer adversaries. The second production line for JASSM-ER cruise missiles is a good start toward building the capacity needed to retain advantages that will make any enemy think twice before attacking. We must do the same for other fifth-generation weapons, including air-to-air missiles.

Shipbuilding, including aircraft carriers, surface ships, submarines and our logistics fleet, is another area where our capacity is severely limited. The Chinese People's Liberation Army Navy, which recently surpassed ours in size, is on track to reach 400 ships in 2025 and is nearly self-sufficient for all components.

Size of the fleet isn't a sole consideration. We've focused on ensuring the capability of our fleet remains unmatched and bolstering suppliers of critical components, but we must also improve the construction performance of lead ships in new classes to maintain and build upon our capability advantage. The last thing we want is a fair fight. Innovation is best done at the subsystem level through a rigorous engineering-based process centered on building knowledge through full-scale prototypes, which can then inform ship design. We are eager to work with the Navy to identify and fund more of these prototypes, which will serve as the building blocks of the future fleet.

We also must accelerate innovation. Recent defense authorization legislation encourages the DoD to streamline acquisition, take a business-minded approach to contracting, and tap into nontraditional suppliers and public-private partnerships. This must continue. Dilapidated testing infrastructure is holding us back from catching up to our enemies. Just look at hypersonic weapons: Beijing is parading around dozens of its newest weapons, and we have yet to build one. The DoD has looked to Silicon Valley, but we are competing with Chinese influence there as well, and the Pentagon has often proven an impossible customer due to its antiquated bureaucracy.

Any technological improvements will be meaningless if vulnerable to being infiltrated or stolen. Recent legislation continues support for the DoD as it assesses and mitigates risks to its supply chains posed by adversaries. Both the government and contractors need to cooperate on and use modern verification tools to identify trusted suppliers and manufacturers, as well as fix vulnerabilities. To make these tools useful, the DoD must first establish a working digital model of its suppliers.

Lastly, while we must continue to invest in the domestic, organic industrial base, it's important to remember that we can't take on China and Russia alone — which is why the National Defense Strategy emphasizes our network of allies and partners. We must remove unnecessary barriers to industrial cooperation that degrade our collective competitive edge.

We do not have to make a false choice between investing domestically and in our allies — we can do both. Under our National Technology and Industrial Base partnership with Canada, Australia and the United Kingdom, we can develop a more diverse, resilient industrial base, secure our supply chains, and become a “five eyes for defense procurement.” It's in our best interest to ensure our allies can leverage our technological advantages and we can leverage theirs.

Without a strong national security innovation base, the Pentagon cannot implement the National Defense Strategy. Congress' job is to put the appropriate, tailored policy in place and provide sufficient, predictable resources to help the industrial base meet these challenges. Together, we can harness the power of American innovation to ensure that we are able to win the wars of the future.

Sen. Jim Inhofe, R-Okla., is the chairman of the Senate Armed Services Committee.

https://www.defensenews.com/outlook/2019/12/02/sasc-chairman-we-must-build-the-national-security-innovation-base-our-defense-strategy-requires/

Sur le même sujet

  • Navy to Showcase Innovative Information Warfare Capabilities at the Navy Information Warfare Pavilion at Sea-Air-Space 2019

    1 mai 2019 | International, Naval, C4ISR

    Navy to Showcase Innovative Information Warfare Capabilities at the Navy Information Warfare Pavilion at Sea-Air-Space 2019

    By Elisha Gamboa, SPAWAR Public Affairs NATIONAL HARBOR, Md. (NNS) -- Eleven commands from across the Navy's Information Warfare (IW) community will come together to demonstrate the Navy's commitment to the information domain at the Sea-Air-Space (SAS) Exposition at the Gaylord National Convention Center in National Harbor, Maryland May 6-8. The IW Pavilion is designed to educate conference attendees on facets of Navy information warfare, including the key commands that lead, acquire, prepare and fight to secure the information domain. “Our Defense and Navy Strategies, as well as ‘A Design for Maintaining Maritime Superiority v2.0' all emphasize that we are in an era of Great Power Competition, with a return to a maritime warfare focus,” said Vice. Adm. Matthew Kohler, deputy chief of naval operations for information warfare (OPNAV N2N6) and director of naval intelligence (DNI). “They also note that ‘information' is key to warfighting across all domains – sea, air, space, and cyberspace – and is a warfare area in itself.” Representatives from the following commands will make up the Information Warfare Pavilion located at booth #2746 in the SAS exhibit hall: - The Office of the Deputy Chief of Naval Operations for Information Warfare (OPNAV N2N6) - Naval Information Forces Command (NAVIFOR) - U.S. Fleet Cyber Command/U.S. TENTH Fleet (FCC/C10F) - Space and Naval Warfare Systems Command (SPAWAR) - Naval Information Warfare Center Atlantic (NIWC Atlantic) - Naval Information Warfare Center Pacific (NIWC Pacific) - Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) - Program Executive Office Space Systems (PEO SS) - Program Executive Office Enterprise Information Systems (PEO EIS) - Naval Meteorology and Oceanography Command (NMOC) - U.S. Naval Observatory (USNO) Together these commands will provide a glimpse into the Navy's information warfare community through the Navy IW theater speaking series, the Navy IW engagement zone and Navy IW technology demonstrations. Navy IW Theater The theater in the IW Pavilion will hold a speaker series all three-days of the conference and exposition. Topics range from digitizing the Navy, to enabling ‘compile to combat in 24 hours,' to increasing cybersecurity resiliency, to providing insight into the IW community status and mission areas. The IW Pavilion speaker's series schedule: Monday, May 6 1:45 pm – 2:30 pm: Vice Adm. Matthew Kohler, OPNAV N2N6/DNI and Vice Admiral Brian Brown, NAVIFOR 2:45 pm – 3:30 pm: Rear Adm. John Okon, NMOC Tuesday, May 7 10:00 am – 10:45 am: Rear Adm. Christian Becker, SPAWAR 1:45 pm – 2:30 pm: Rear Adm. Michael Vernazza, FCC/C10F Wednesday, May 8 11:00 am – 11:45 am: Rear Adm. Danelle Barrett, OPNAV N2N6 Navy Information Warfare Engagement Zone Situated in the middle of the IW Pavilion, the engagement zone will allow attendees to informally meet program managers and subject matter experts from multiple IW commands for short blocks of time. No appointments are necessary. Navy Information Warfare Pavilion Technology Demonstrations The IW pavilion will also feature 12 technology demonstrations spotlighting systems and capabilities that facilitate information warfare, from seafloor to space. This includes swarm modeling and control technologies, position, navigation and timing technologies, military satellite and nanosatellite communication systems, advanced military mobile applications and more. "Today, our Navy and our nation are experiencing an unprecedented degree of competition in the information warfare domain," said Rear Adm. Christian Becker, SPAWAR commander. "It's vital that our Navy adapts to this reality and responds with urgency and creativity to increase naval agility and sustainability. The IW Pavilion provides a platform for our community to engage with the best and brightest to discuss how to equip our warfighters with the most advanced technologies possible, to give them an unfair advantage today and for decades to come." Throughout the IW community's evolution over the last 10 years, it remains organized under three core pillars - battlespace awareness, assured command and control and integrated fires. Each of these areas aims to take advantage of information-related capabilities in an integrated fashion, to make decisions faster than the adversary throughout the full spectrum of Navy missions, from peacetime to conflict. The Navy League's Sea-Air-Space Exposition was founded in 1965 as a means to bring the U.S. defense industrial base, private-sector U.S. companies and key military decision makers together for an annual innovative, educational, professional and maritime based event located in the heart of Washington, DC. Sea-Air-Space is now the largest maritime exposition in the U.S. and continues as an invaluable extension of the Navy League's mission of maritime policy education and sea service support. For information about the event, visit http://www.seaairspace.org/welcome. https://www.navy.mil/submit/display.asp?story_id=109428

  • Japan sends companies to Singapore Airshow with eyes on foreign market

    21 février 2024 | International, Aérospatial

    Japan sends companies to Singapore Airshow with eyes on foreign market

    This is the largest industrial contingent outside Japan after the government relaxed post-war arms exports in 2014.

  • Cyberattack risk poses biggest threat to airports, aviation

    12 septembre 2018 | International, C4ISR

    Cyberattack risk poses biggest threat to airports, aviation

    Ben Goldstein A senior official from Tampa International Airport (TPA) told US lawmakers the risk of cyberattack “without question represents the preeminent and persistent threat” to global aviation. The comments came during a Sept. 6 joint hearing of the House Homeland Security Committee's Cybersecurity and Transportation Security subcommittees, held to examine cyber threats to aviation. “In today's modern and technologically advanced airports, there are virtually no areas or functions that do not rely at some level on a digital network,” TPA EVP-IT and general counsel Michael Stephens said. “The operational importance of these systems ... makes airports immensely appealing targets and potentially vulnerable to malicious cyber threats, such as criminal organizations and state sponsored actors.” In his testimony, Stephens said US airports have reached a point “where voluntary compliance is no longer adequate,” and asked lawmakers to consider mandating the adoption of “uniform minimum cyber security standards and frameworks.” He also said the “human factor remains the most highly exploited vector” for breaching cyber defenses, and threat awareness and information security training programs for airport, airlines and aviation industry employees are “perhaps one of the most effective and cost-efficient ways of increasing airports' and airlines' cybersecurity readiness.” Lawmakers also heard from Christopher Porter, chief intelligence strategist at cybersecurity group FireEye, Inc., who testified that state-backed hackers are “routinely” targeting the US aviation industry through cyberespionage to steal industrial secrets from manufacturers, researchers and operators of military and civilian aircraft. Porter called cyberespionage the “most common cyber threat facing the aviation industry,” and said that hackers sponsored by China, Russia and more recently Iran have all “targeted the US or its close allies for theft of aviation secrets.” All three countries also routinely target ticketing and traveler data, shipping schedules and even partner industries like railways or hotels as part of their counterintelligence efforts, Porter added. However, Porter reminded lawmakers that, because cyber-espionage is routine, “it should not be viewed as destabilizing.” “When cyberespionage operators get a foothold on a system, they can often use that access for stealing information or to launch a disabling or destructive attack using the same technology,” Porter said. “But they rarely choose to do so, and in the US, there are significant redundancies in place to ensure safety. A crashed IT system does not mean a crashed plane, and it's important for the public to keep that in mind.” http://atwonline.com/security/cyberattack-risk-poses-biggest-threat-airports-aviation

Toutes les nouvelles