25 juin 2019 | International, Aérospatial

Telefónica Combines Drones with IoT Sensors for Wildfire Warning System

Posted By: Malek Murison

The combination of drones and wildfires isn't usually a productive one. Emergency teams tasked with fighting them are often disrupted by opportunistic aerial photographers.

But the technology has also proved to be a useful situational awareness for fire crews. Drones can cover ground quickly and provide an indication of a fire's scale and threat, reducing the need to put emergency teams in danger.

Full article: https://dronelife.com/2019/06/20/telefonica-combines-drones-with-iot-sensors-for-early-fire-detection/

Sur le même sujet

  • Avio confirme son rôle dans la défense italienne

    17 février 2021 | International, Terrestre

    Avio confirme son rôle dans la défense italienne

    Avio et l'école Polytechnique de Milan (Politecnico di Milano) ont signé un contrat avec la NAVARM (Direzione armamenti navali) et la Direction Nationale des Armements du Ministère italien de la Défense. Dans le cadre du programme PRIBES, un partenariat qui s'inscrit dans le Plan national de recherche militaire 2020, Avio et le Politecnico di Milano vont concevoir et développer un nouveau système pour les forces armées italiennes afin de tester les capacités opérationnelles de la défense et en particulier les missiles tactiques. Avio, sous contrat MBDA, fait partie de deux programmes de systèmes sol-air de la défense italienne : le CAMM-ER (Common Anti-Air Modular Missile Extended Range) et l'Aster-30. Air & Cosmos du 17 février

  • Future Missile War Needs New Kind Of Command: CSIS

    7 juillet 2020 | International, Aérospatial

    Future Missile War Needs New Kind Of Command: CSIS

    Integrating missile defense – shooting down incoming missiles – with missile offense – destroying the launchers before they fire again – requires major changes in how the military fights. By SYDNEY J. FREEDBERG JR.on July 07, 2020 at 4:00 AM WASHINGTON: Don't try to shoot down each arrow as it comes; shoot the archer. That's a time-honored military principle that US forces would struggle to implement in an actual war with China, Russia, North Korea, or Iran, warns a new report from thinktank CSIS. New technology, like the Army's IBCS command network – now entering a major field test — can be part of the solution, but it's only part, writes Brian Green, a veteran of 30 years in the Pentagon, Capitol Hill, and the aerospace industry. Equally important and problematic are the command-and-control arrangements that determine who makes the decision to fire what, at what, and when. Today, the military has completely different units, command systems, doctrines, and legal/regulatory authorities for missile defense – which tries to shoot down threats the enemy has already launched – and for long range offensive strikes – which could keep the enemy from launching in the first place, or at least from getting off a second salvo, by destroying launchers, command posts, and targeting systems. While generals and doctrine-writers have talked about “offense-defense integration” for almost two decades, Green says, the concept remains shallow and incomplete. “A thorough implementation of ODI would touch almost every aspect of the US military, including policy, doctrine, organization, training, materiel, and personnel,” Green writes. “It would require a fundamental rethinking of terms such as ‘offense' and ‘defense' and of how the joint force fights.” Indeed, it easily blurs into the even larger problem of coordinating all the services across all five domains of warfare – land, sea, air, space, and cyberspace – in what's known as Joint All-Domain Operations. The bifurcation between offense and defense runs from the loftiest strategic level down to tactical: At the highest level, US Strategic Command commands both the nation's nuclear deterrent and homeland missile defense. But these functions are split between three different subcommands within STRATCOM, one for Air Force ICBMs and bombers (offense), one for Navy ballistic missile submarines (also offense), and one for Integrated Missile Defense. In forward theaters, the Army provides ground-based missile defense, but those units – Patriot batteries, THAAD, Sentinel radars – belong to separate brigades from the Army's own long-range missile artillery, and they're even less connected to offensive airstrikes from the Air Force, Navy, and Marine Corps. The Navy's AEGIS system arguably does the best job of integrating offense and defense in near-real-time, Green says, but even there, “different capabilities onboard a given ship can come under different commanders,” one with the authority to unleash Standard Missile interceptors against incoming threats and the other with the authority to fire Tomahawk missiles at the enemy launchers. This division of labor might have worked when warfare was slower. But China and Russia have invested massively in their arsenals of long-range, precision-guided missiles, along with the sensors and command networks to direct them to their targets. So, on a lesser scale, have North Korea and Iran. The former deputy secretary of defense, Bob Work, warned of future conflicts in which “salvo exchanges” of hundreds of missiles – hopefully not nuclear ones – might rocket across the war zone within hours. It's been obvious for over a decade that current missile defense systems simply can't cope with the sheer number of incoming threats involved, which led the chiefs of the Army and Navy to sign a famous “eight-star memo” in late 2014 that called, among other things, for stopping enemy missiles “left of launch.” But that approach would require real-time coordination between the offensive weapons, responsible for destroying enemy launchers, command posts, and targeting systems, and the defensive ones, responsible for shooting down whatever missiles made it into the air. While Navy Aegis and Army IBCS show some promise, Green writes, neither is yet capable of moving the data required among all the users who would need it: Indeed, IBCS is still years away from connecting all the Army's defensive systems, while Aegis only recently gained an offensive anti-ship option, a modified SM-6, alongside its defensive missiles. As two Army generals cautioned in a recent interview with Breaking Defense, missile defense and offense have distinctly different technical requirements that limit the potential of using a single system to run both. There are different legal restrictions as well: Even self-defense systems operate under strict limits, lest they accidentally shoot down friendly aircraft or civilian airliners, and offensive strikes can easily escalate a conflict. Green's 35-page paper doesn't solve these problems. But it's useful examination of how complex they can become. https://breakingdefense.com/2020/07/future-missile-war-needs-new-kind-of-command-csis/

  • DoD releases first new cyber strategy in three years

    20 septembre 2018 | International, C4ISR

    DoD releases first new cyber strategy in three years

    By: Mark Pomerleau In its first formal cyber strategy document in three years, the Department of Defense said it would focus its cyber efforts on China and Russia and use the Pentagon's cyber capabilities to collect intelligence as well as to prepare for future conflicts. According to an unclassified summary and fact sheet released Sept. 18, the documents lay out a vision for addressing cyber threats and addresses the priorities of the department's National Security Strategy and National Defense Strategy, which focused on a new era of strategic great power competition. “The United States cannot afford inaction,” the summary reads. It notes that China and Russia are conducting persistent campaigns in cyberspace that pose long term risk. The documents also say that China is eroding the U.S. military's ability to overmatch opponents and that Russia is using cyber-enabled information operations to influence the U.S. population and challenge democratic processes. The DoD's strategy comes on the heels of other major movements in cyberspace from the department. These include the elevation of U.S. Cyber Command to a full unified combatant command — which affords new and exquisite authorities — the full staffing of Cyber Command's cyber teams, an update to DoD's cyber doctrine and new authorities delegating certain responsibilities from the president to DoD to conduct cyber operations abroad. The summary's lists five objectives for DoD's cyberspace strategy: - Ensuring the joint force can achieve its missions in a contested cyberspace environment; - Strengthening the joint force by conducting cyberspace operations that enhance U.S. military advantages; - Defending U.S. critical infrastructure from malicious cyber activity that alone, or as part of a campaign, could cause a significant cyber incident; - Securing DoD information and systems against malicious cyber activity, including DoD information on non-DoD-owned networks; and - Expanding DoD cyber cooperation with interagency, industry, and international partners. The strategy also describes the need to remain consistently engaged with this persistent adversary and to “defend forward” as a means of disrupting or halting malicious cyber activity at its source, including activity that falls below the level of armed conflict. While academics have criticized the U.S. response to Russian election interference, the strategy notes that the United States tends to view conflicts through the binary lens of war or peace while competitors such as Russia see themselves constantly engaged in a state of war. U.S. Cyber Command's new leader is taking a different tact. “We've got to act forward outside of our boundaries, something that we do very, very well at Cyber Command in terms of getting into our adversary's networks. That's this idea of persistent engagement, the idea that the adversary never rests, so why would we ever rest,” Gen. Paul Nakasone said during an August dinner hosted by the Intelligence and National Security Alliance. Nakasone also has described the notion of defending forward as enabling forces to act outside the boundaries of the U.S. to understand what adversaries are doing in order to better defend against them. https://www.fifthdomain.com/dod/2018/09/19/department-of-defense-unveils-new-cyber-strategy

Toutes les nouvelles