6 novembre 2024 | International, Terrestre, C4ISR, Sécurité

Statement from CISA Director Easterly on the Security of the 2024 Elections | CISA

Sur le même sujet

  • Royal Australian Air Force to speak at UAV Technology 2020

    16 juin 2020 | International, Aérospatial

    Royal Australian Air Force to speak at UAV Technology 2020

    This year, at UAV Technology, SMi Group has announced the Royal Australian Air Force's Deputy Director RPAS, Lieutenant Colonel Keirin Joyce, as a speaker on the last day of the two-day event. Initially starting off his career in engineering and helicopters, Lieutenant Colonel Keirin Joyce found himself getting involved on the new drone program for the Australian Army, eventually progressing onto being one of the key assets for the organisation as the Australian Army Unmanned Aerial Systems (UAS) Sub-Program Manager responsible for all Australian Army UAS activities 13 years later.* (Source: Flight Safety Australia). Interested parties will be able to save £200 off the conference price by 30th June: http://www.uav-technology.org/robtommPR4 The 5th annual UAV Technology will reconvene in London, UK on the 28th - 29th September 2020. The meeting will provide delegates with an opportunity to meet with high profile military and government personnel and hear their key insights as they present their exclusive briefings and exhibit their new technologies at the conference. Following his extensive background in the UAS sector, Lieutenant Colonel Keirin Joyce, Deputy Director RPAS, Royal Australian Air Force will provide an exclusive presentation on: ‘Royal Australian Air Force Armed RPAS Procurement' • Shift towards armed RPAS: why the RAAF is acquiring the MQ-9B Sky Guardian and how this fit into wider defence modernisation - "Jericho Edge" • Acquisition programme progress and lessons learned from working with industry • How the RAAF is preparing its manpower and infrastructure to support the MQ-9B and further opportunities for industry to engage • Where the RAAF is going future force development with UAVs, both UCAV and ISR For the full speaker list and the programme, visit: http://www.uav-technology.org/robtommPR4 UAV Technology 28th - 29th September 2020 London, UK Sponsored by: AeroVironment, Fizoptika, Leonardo and Mynaric For sponsorship and exhibition queries please contact Justin Predescu jpredescu@smi-online.co.uk or call +44 (0) 20 7827 6130 For delegate queries please contact Sadia Malick smalick@smi-online.co.uk or call +44(0)207 827 6748 For media queries please contact Carina Gozo at CGozo@smi-online.co.uk. *'Drone Flyer Diaries - LTCOL Keirin Joyce' (Source: Flight Safety Australia, Dec 2019) https://www.flightsafetyaustralia.com/2019/12/drone-flyer-diaries-ltcol-keirin-joyce/ https://www.roboticstomorrow.com/news/2020/06/15/royal-australian-air-force-to-speak-at-uav-technology-2020-/15355/

  • Army’s Rapid Tech Office Set To Deliver Initial Hypersonics Capability In FY ’23, 50KW Laser Weapon In FY ’22

    24 juillet 2019 | International, Terrestre

    Army’s Rapid Tech Office Set To Deliver Initial Hypersonics Capability In FY ’23, 50KW Laser Weapon In FY ’22

    The Army's retooled rapid capabilities office has received approval to move ahead with its programs to deliver an initial combat capability for a hypersonic weapon in fiscal year 2023, with plans to announce a prototype award in August, and a Stryker-mounted... https://www.defensedaily.com/armys-rapid-tech-office-set-deliver-initial-hypersonics-capability-fy23-50kw-laser-weapon-fy22/army/

  • For DoD cyber, 2019 is the year of doing

    31 janvier 2019 | International, C4ISR

    For DoD cyber, 2019 is the year of doing

    By: Mark Pomerleau Following a year of cyberspace strategizing, 2019 will be all about implementing rules and tools, according to the Department of Defense's top uniformed cyber policy adviser. Appearing Jan. 29 before the Senate Armed Services Subcommittee on Cybersecurity, Brig. Gen. Dennis Crall said the department knows where it needs to head following last year's DoD cyber strategy (the first in three years) and now is the time to show results. “This is the year of outcomes and that's what we're focused on — delivering the capabilities and improvements that we've discussed for some time,” he told the committee, adding that the strategy process allowed them to take a look at some departmental gaps and get after them. The strategy actually has actionable lines of effort and there are things they can do to measure progress, he said. The document lays out five objectives and five areas of interest under its strategic approach. The five objectives include: Ensuring the joint force can achieve its missions in a contested cyberspace environment; Strengthening the joint force by conducting cyberspace operations that enhance U.S. military advantages; Defending U.S. critical infrastructure from malicious cyber activity that alone, or as part of a campaign, could cause a significant cyber incident; Securing DoD information and systems against malicious cyber activity, including DoD information on non-DoD-owned networks; and Expanding DoD cyber cooperation with interagency, industry, and international partners. The five areas of interest under the guise of its strategic approach include building a more lethal joint force; competing and deterring in cyberspace; strengthening alliances and attracting new partners; reforming the department; and cultivating talent. The strategy also notes DoD must take action in cyberspace during day-to-day competition to preserve U.S. military advantages and defend U.S. interests. The focus will be on nation states that can pose strategic threats to the United States, namely China and Russia. “We will conduct cyberspace operations to collect intelligence and prepare military cyber capabilities to be used in the event of crisis or conflict,” the document says. Dana Deasy, the department's chief information officer, told the same committee that the threat from Russia and China is so acute he is briefed weekly from U.S. Cyber Command and the National Security Agency on them. This allows him to understand their offensive and defensive posture relative to the DoD. “Suffice to say that these are very strong, capable adversaries, but at the same time we have some strong, capable abilities ourselves,” he said. Cyber Command has now assembled a full force of cyberwarriors and received limited acquisition authority to start equipping them. However, there is much more work to be done. In fact, aside from individual tools, the force is still in need of a training range where cyberwarriors can do individual and collective training, as well as mission rehearsal, similar to rifle ranges or national training centers in the physical world. The Persistent Cyber Training Environment, being run by the Army for the joint force, will get after this; however, it is still in the prototype phase with a limited capability delivered to users. Additionally, the force needs a large-scale command-and-control platform that will house tools, provide commanders global situational awareness of forces and enable forces to plug into operations from remote locations. This is the goal of Unified Platform, which is also still in the prototype phase, though officials have said a limited product could be delivered as early as the spring. https://www.fifthdomain.com/dod/2019/01/30/for-dod-cyber-2019-is-the-year-of-doing

Toutes les nouvelles