31 décembre 2018 | International, Aérospatial

The Corps’ HIMARS are going airborne as Marines bring them to targets via KC-130s

By:

The same innovative rocket artillery unit that fired HIMARS from a ship is once again mixing things up, but this time they're doing it with aircraft.

The tactic is called HI-RAIN, which is short for HIMARS Rapid Infiltration, where the Corps takes its precision-guided rocket artillery system, stuffs it in a KC-130 and flies it to a location to destroy a target.

Once on the ground, the HIMARS crew offloads the system and strikes a target and then rapidly exfils from the target site.

The Corps says HI-RAIN is the progression of an aerial artillery raid capability they already have, which can be done with sling loaded M777 howitzers hauled by the Corps' heavy lift helicopters like the CH-53. The MV-22 Osprey is also capable of lifting the M777.

Aerial artillery raids provide battlefield commanders flexibility by inserting a long-range fire capability beyond a captured beachhead or behind enemy lines to quickly destroy a target.

But the HIMARS will greatly extend the Corps' range of that existing raid capability, which should prove useful should the Corps find itself stretched thinly across the vast expanse of the Pacific Ocean in a fight with a sophisticated adversary like China.

A Marine HIMARS unit known as 5th Battalion, 11th Marines, recently executed a HI-RAIN mission on Dec. 7 as part of an annual exercise with the 1st Marine Division dubbed Steel Knight.

For the exercise, Marines with 5/11 loaded two HIMARS systems onto two KC-130 aircraft at Marine Corps Air Station, Camp Pendleton, California, and flew to Dugway Proving Grounds, Utah.

Once on the ground, the a HIMARS unit fired one M31A1 GMLRS – Unitary precision rocket, striking a target approximately 15 km away. The GMLRS round is short for Guided Multiple Launch Rocket System.

HIMARS are capable of striking targets several hundred kilometers out, the short range was due to range limitations, Marine officials said.

The Corps says 5/11 began aerial embarkation testing with KC-130s in 2014, and since then have carried out many HI-RAIN missions across the U.S. from Alaska to Arizona, all during training exercises.

Other Marine HIMARS units are honing the same skill.

The Corps is also capable of carrying out artillery raids inserting howitzers via helicopter.

In August, 3rd Battalion, 11th Marines, carried out the first lift in an austere environment in Australia of an M777 howitzer using an MV-22 Osprey.

The Marines of 5/11 are known for their innovative experimentation firing HIMARS from the deck of the amphibious transport dock Anchorage in fall 2017.

https://www.marinecorpstimes.com/news/your-marine-corps/2018/12/28/the-corps-himars-are-going-airborne-as-marines-bring-them-to-targets-via-kc-130s

Sur le même sujet

  • CENTCOM chief: The future of warfare demands more cyber authorities

    19 décembre 2018 | International, C4ISR

    CENTCOM chief: The future of warfare demands more cyber authorities

    By: Justin Lynch The Pentagon has received more power to conduct cyber operations in the past 18 months. But for the top Army commander in the Middle East and Central Asia, the new authority is not enough. The head of U.S. Central Command, Gen. Joseph Votel, wrote in a Dec. 18 paper that the Pentagon must “normalize” electronic warfare and cyberattacks and incorporate them into daily operations. “Normalizing the cyberspace domain means broader authorities that are more responsive than current bureaucratic processes,” Votel wrote in the Army's Cyber Defense Review. “It also means we need simple and streamlined organizations and processes to increase lethality and enhance performance.” The paper was coauthored by Votel, Maj. Gen. Julazadeh and Maj. Weilun Lin. “Our failure to operationalize and normalize the cyberspace domain effectively cedes it to our adversaries, gives them a competitive advantage and, ultimately, creates an increased attack vector against our objectives,” the authors said. President Trump gave the Pentagon new authorities to conduct cyber operations in August and minimized the process where other agencies can object to cyberattacks, known as “deconfliction.” Secretary of Defense Jim Mattis can conduct hacking operations without approval from the White House so long as they do not interfere with the American “national interest,” according to four current and former White House and intelligence officials who were either part of internal deliberations or briefed on the changes. Yet some current and former U.S. officials are skeptical that the new authorities will mean more effective hacking operations for the Pentagon, because it does not solve the nuances of cyberattacks. But the new mandates do not go far enough for the three officer authors, who argued that cyberwarfare should be under the same authorities as other types of operations. “We must not see cyberspace as drastically different and separate from other domains that we create new processes to prepare, plan and fight in this new domain. We continue to seek processes that smooth and simplify operations, reducing friendly friction and accelerating decision-making.” Current and former Pentagon officials have pointed to conducting cyberattacks against enemies that use networks of neutral or partner nations as an area where the Pentagon has changed its decision-making process in recent years. Those officials also pointed to how the Pentagon was able to use hybrid warfare tactics during the 2016 liberation of Mosul, Iraq, as a textbook example of future hybrid operations. Votel, Julazadeh and Lin echoed the sentiment of other Pentagon officials who have advocated for cyberattacks, electronic warfare and other information operations to be integrated earlier in military operations. “We need to proactively execute cyberspace and information operations early in 'Phase 0 / steady state' of the planning process — well before operation execution. Only then can we shape the [information environment], hold our adversaries' capabilities at risk and execute at the speed of war,” the three wrote. For example, Pentagon officials say they closely monitored Russia's 2014 hybrid war in Ukraine and learned from Moscow's tactics. Votel, Julazadeh and Lin shed light on the changes, writing that information operations were previously “integrated as an afterthought.” Yet over the last two years, Central Command has incorporated cyberattacks, electronic warfare and military deception at the “strategic level.” And this hybrid warfare has driven new acquisition demands in the Pentagon. “We need technology and capabilities to keep pace with the operational environment and continue to build the partnerships to do so,” the three officers wrote. In recent years, Central Command has bolstered its hybrid warfare through new contracts. The centerpiece of that effort is a July 2017 contract worth $621 million to Science Applications International Corporation for IT support to Central Command that could last seven years. In August 2018, Vistra communications was also awarded a $22 million contract to support offensive and defensive cyber operations for Central Command. https://www.fifthdomain.com/dod/2018/12/18/centcom-chief-the-future-of-warfare-demands-more-cyber-authorities

  • Qatari research center chooses Leonardo for cyber range

    4 février 2021 | International, C4ISR, Sécurité

    Qatari research center chooses Leonardo for cyber range

    Agnes Helou BEIRUT — A Qatari cyber research center has selected Leonardo to provide a cyber range and training system to support security operations, the Italian firm announced Feb. 3. The Qatar Computing Research Institute, or QCRI, was established by the Qatar Foundation for Education, Science and Community Development. The training platform ordered by the QCRI is capable of simulating cyberattacks so users can assess the resilience of digital infrastructure. “The training is completely to be performed in Qatar, and it is expected, through an approach oriented to ‘train the trainers,' to provide courses to a significant number of operators involved in the cybersecurity framework,” Tommaso Profeta, managing director of Leonardo's Cyber Security Division, told Defense News. He noted that training and exercise scenarios can be customized using a drag-and-drop graphical interface. The platform can also analyze and classify the results of simulated attacks based on data collected during real-world offensive campaigns. Scenarios can be used for individual training or classroom experiences, and they provide practice for security operations centers and incident response activities. This training tool “will allow the QCRI to deliver a complete cyber training process, from the design of the learning path to specific training sessions. Users will be able to practice their skills in simulated attack and defense scenarios, employing both information technology (IT) and operational technology (OT). The training will produce qualified teams of operators equipped with up-to-date knowledge and techniques, ready to face ever-evolving cyber threats,” according to a company statement. “The best cyber training/testing environments are in theory real production systems. But in practice for such environments, institutions, enterprises and organizations cannot easily experience critical situations without paying high, sometime unaffordable prices,” Profeta said. “Training and testing are therefore the two essential, human-driven processes that can effectively support the overall cyber ‘protection' loop, but only if they can cope with real threats and highly realistic systems in highly realistic situations.” Cyber ranges provide a controlled environment where cybersecurity experts can practice their technical and soft skills in emulated complex networks and infrastructures to learn how to respond to real-world cyberattacks. In these environments, cyber tools can be stressed to reveal their limits and vulnerabilities before deployment into cyberspace. Leonardo's platform challenges such assets and provides digital twin environments for predeployment testing. Asked whether other Gulf countries have expressed interest in this training system, Profeta said it “has already been presented to other high-level Middle East stakeholders, and a significant level of interest has been registered for the platform.” What scenarios are available? Those using the cyber range will try to defend against simulated but realistic cyberattacks. According to Profeta, these include: Man-in-the-middle attacks. Botnets. Exploitation of client and server vulnerabilities with lateral movements in search of sensitive data. Distributed denial-of-service attacks (HTTP flooding or domain name system reflection) designed to disrupt connections to a targeted server. Ransomware via multiple vectors, such as spear-phishing via email or drive-by downloads, relying on DNS-based covert channels. Data exfiltration of personally identifiable information and intellectual property. Though it's difficult to measure the potential effectiveness of this platform for Qatar, the company official predicted the system will reduce the cost of and improve the user experience in cyber training. Leonardo also supplies the NATO Computer Incident Response Capability, a cyber defense product. https://www.c4isrnet.com/cyber/2021/02/03/qatari-research-center-chooses-leonardo-for-cyber-range

  • US nuclear bases to get security networking upgrade from Persistent

    6 mars 2023 | International, C4ISR

    US nuclear bases to get security networking upgrade from Persistent

    The contract, involving the Persistent Systems Infrastructure-based Regional Operation Network, or IRON, is valued at $75.5 million.

Toutes les nouvelles