8 mars 2021 | International, Aérospatial
Dassault boss Trappier floats ‘Plan B’ considerations for the troubled FCAS warplane
French industry could go it alone, the executive hinted in a call with reporters.
11 juin 2018 | International, C4ISR
A Eurosatory 2018, Thales lance la première solution globale d'infrastructure de cloud privé dédié aux forces armées pour une efficacité accrue dans la conduite des opérations. Avec Nexium Defence Cloud, Thales est au cœur de la transformation numérique de ses clients et s'adapte aux besoins spécifiques des armées qui évoluent dans un environnement contraint et sécurisé.
Points clés
Depuis quelques années, les services de cloud ont changé le quotidien de la société civile et généré un développement considérable d'applications amenant de nouveaux usages chez des clients connectés en permanence, depuis n'importe quel type de terminal et ayant un fort besoin de partage des contenus. Ces nouveaux besoins sont également ceux des forces armées.
Les solutions de cloud déjà utilisées pour des applications civiles ne sont pas adaptées aux besoins des forces armées. Elles exigent une bande passante illimitée dont les forces armées ne disposent pas sur le terrain. Le Cloud de défense Thales est une solution souveraine qui peut fonctionner dans un contexte contraint leur offrant une totale autonomie sur les thé'tres d'opérations.
L'hyper-connectivité du champ de bataille est porteuse d'une révolution technologique pour les armées engendrant de nouveaux besoins de collecte, d'échange et de traitement de grands volumes de données en temps réel. Face aux nouvelles menaces que les conflits futurs sont susceptibles d'engendrer, les forces armées doivent pouvoir réagir immédiatement à n'importe quel scénario, parfois de façon simultanée. Avec son offre de Cloud de défense et ses solutions de connectivité associées, Thales propose une solution globale fondée sur une maîtrise de bout-en-bout de l'hébergement des données et des applications pour permettre un accès entièrement privé aux données dans un environnement dédié et cyber-sécurisé de la métropole aux thé'tres d'opérations.
Nexium Defence Cloud est une solution à la fois globale et modulaire. Elle propose une vaste palette de configurations : depuis des infrastructures de très haute capacité pour les quartiers généraux, facilement extensibles, jusqu'à des box tout-en-un, pour transformer en quelques heures un camp projeté en nouveau nœud du cloud. Cette interconnexion effectuée facilement au sein d'organismes et d'états-majors ad hoc renforce l'efficacité des missions en toute sécurité.
Le déploiement, la configuration et la mise à jour des équipements et des applicatifs peuvent être préparés et mis en œuvre à distance pour permettre aux forces armées de se concentrer sur la conduite des opérations.
8 mars 2021 | International, Aérospatial
French industry could go it alone, the executive hinted in a call with reporters.
1 novembre 2021 | International, Naval
Task Force 59 integrated MANTAS T-12 unmanned surface vessels with manned U.S. patrol craft and Bahrain Defense Force maritime assets during its New Horizon exercise this week.
28 juillet 2020 | International, C4ISR
Andrew Eversden WASHINGTON — The U.S. Army's combat capabilities development team kicked off a monthslong experiment last week to test emerging technologies that could be added into the service's tactical network. The third annual Network Modernization Experiment at Joint Base McGuire-Dix-Lakehurst in New Jersey started July 20 and ends Oct. 2. NetModX provides an opportunity for the Combat Capabilities Development Command's C5ISR Center — or Command, Control, Communication, Computers, Cyber, Intelligence, Surveillance, and Reconnaissance Center — to perform field tests with emerging capabilities that have largely been tested in the lab. Field tests with simulated threat environments, as opposed to lab tests, are important because technologies react in unexpected ways due to realities like different types of trees or terrain. This year's theme for NetModX is mission command and command-post survivability, which means participants will focus on technologies that could be fielded in the Army's Integrated Tactical Network Capability Set '23 and Capability Set '25 — future iterations of network tools that the Army plans to deliver to soldiers every two years. In this year's test, the C5ISR Center is testing communications capabilities that allow for distributed mission command systems across the battlefield “and wider area,” said Michael Brownfield, chief of the future capabilities office at the C5ISR Center. “We've learned by watching our enemies fight, and we know that to survive on the battlefield, No. 1, they can't be able to see us,” Brownfield told C4ISRNET in an interview. “And No. 2, we have to distribute our systems across the battlefield to give them multiple targets and multiple dilemmas in order to survive.” NetModX is also testing network resiliency capabilities that could be delivered as part of Capability Set '23. Preliminary design review for the capability set is scheduled for April next year. To test the effectiveness of the resiliency projects the center developed in the lab, the C5ISR Center created a “state-of-the-art red cell” that attacks the network using enemy's tactics, techniques and procedures, according to Brownfield. The goal is to make sure the technology can withstand electronic attacks and allow for continuous operations in contested environments when in the hands of deployed soldiers. “What resiliency means to us is the network bends, it doesn't break,” Brownfield said. “And the commanders have the information they need and the coordination that they need to fight the battle.” A modular radio frequency system of systems is undergoing tests, and Brownfield says it will “revolutionize” the fight on the battlefield. The system automatically switches between primary, alternate, contingency and emergency, or PACE, radios by sensing if radio frequencies are being jammed. The system then responds by automatically switching radio channels to allow for seamless communications in a contested environment. Currently, “it's kind of hard to switch to alternate comms when the person you're talking to is on their primary, not their alternative comms,” Brownfield said. “And the process is very slow. It's human-driven.” Now, the automatic PACE system senses the environment in milliseconds, he said. At last year's experiment, which focused on network transport capabilities to support precision fires for multidomain operations, the center experimented with radios that could flip to new channels on their own, while launching brute force and other more sophisticated attacks against the radios to see how much stress they could handle before passing data became impossible. This year will be a little different. “This year, we're pairing different radios together and see how they can work to actually change the type of modulation schemes that we use to maneuver in cyberspace around for continuous operations while under enemy attack and under contested electronic warfare conditions,” Brownfield said. One of the top priorities for this year's experiment is allowing for projects leaders to bring their technology into to the field, no matter what stage of development they are in, to be tested in an “operationally relevant environment,” Brownfield said. The team then collects data on how the technology performs and puts it into a database where it can be queried to answer specific performance questions. “So we can ... ask the database questions like, ‘What was my latency with these two radios at this point in time,' and start to understand the true metrics of how the systems performed in the field,” Joshua Fischer, acting chief of systems engineering, architecture, modeling and simulation at the C5ISR Center, told C4ISRNET. He added that those involved are also looking at network throughput. https://www.c4isrnet.com/yahoo-syndication/2020/07/24/us-army-begins-experimenting-with-new-network-tools/