6 février 2020 | International, Aérospatial, Naval, C4ISR

The Navy's Surprise Unmanned Fighter Is a Glimpse of War's Near Future

In a surprise announcement, the U.S. Navy revealed on Tuesday that it had successfully flown tests involving unmanned versions of the EA-18G Growler electronic attack fighter. The tests involved a single manned EA-18G controlling two unmanned versions of the same aircraft, opening up the possibility that the U.S. Navy could fly armed unmanned aircraft sooner than originally thought.

The test, conducted by the U.S. Navy and Boeing, was undertaken by the U.S. Navy's flight test wing at Naval Air Station Patuxent River, Maryland. According to a C4ISRNET, a single EA-18G Growler controlled two unmanned Growlers in the air.

The test is notable for several reasons. One, the Navy was not known to be working on unmanned systems other than the MQ-25 Stingray, a future drone tanker set to join the fleet in the mid-2020s. Second, the ability to convert a manned fighter such as the EA-18G Growler into an unmanned aircraft was also previously unknown.

The EA-18G Growler is an electronic attack airplane. The EA-18 is based on the F/A-18F Super Hornet, has a crew of two, and is designed to escort Super Hornets on high risk air strikes. The Growler carries both a jamming pod designed to interfere with enemy radars and communications, preventing enemy air defenses from acquiring inbound aircraft and coordinating their attacks. The Growler also carries HARM anti-radar missiles, which detect the probing beams of enemy air defense radars and follow them to their source, destroying them. Without radars to guide them, many types of air defense missiles become unusable in combat.

The Growler's electronic warfare mission is particularly high risk, placing the jet and its crew between the strike fighters it escorts and enemy missiles. That makes it a good candidate for the unmanned mission, where the loss of an aircraft won't result in the loss of a crew.

The Growler and the Navy's main strike fighter, the Super Hornet, share 90 percent of their parts and systems. This makes it simpler to maintain both aircraft and allows the Growler to keep up with Super Hornets on missions. It also likely means that the Super Hornet can be unmanned, and possibly controlled by other Super Hornets.

This test also reinforces the Navy's seriousness about unmanned aviation. The service caught considerable flak in the 2010s after testing the X-47B unmanned aerial vehicle—and then promptly shelved it. The service greenlighted the new MQ-25 Stingray carrier-based drone, but made it a tanker instead of a fighter or strike aircraft. Now we know that there's been an interest in unmanned aviation all along. But instead of building new unmanned aircraft, the Navy decided to leverage its fleet of hundreds of manned aircraft, devoting resources into converting them into unmanned platforms.

Now it seems unmanned aircraft will almost certainly be an important weapon in the Navy's arsenal for future missions. Although drones can be controlled by crews on the ground on the other side of the planet, enemy electronic attack forces will be doing their best to interfere with U.S. forces, attempting to jam communications between a drone and its controllers. A manned aircraft could control multiple drones, providing instructions through unjammable short range communications.

For now, it's still important to have a human around.

https://www.popularmechanics.com/military/aviation/a30771030/growler-unmanned-navy/

Sur le même sujet

  • Podcast: Could Military Sustainment Shifts Impact Broader Aftermarket?

    21 août 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    Podcast: Could Military Sustainment Shifts Impact Broader Aftermarket?

    Lee Ann Shay August 21, 2020 Changes in military sustainment--including the push for agile development and the use of cloud-based software—could hint at broader shifts in the overall aftermarket. Listen as Aviation Week speaks to Accenture's aerospace team talks about these developments. https://aviationweek.com/mro/podcast-could-military-sustainment-shifts-impact-broader-aftermarket

  • Florence Parly, ministre des Armées, lance la fabrication d’une série de nouvelles frégates à Lorient

    25 octobre 2019 | International, Naval

    Florence Parly, ministre des Armées, lance la fabrication d’une série de nouvelles frégates à Lorient

    L'événement s'est déroulé en présence du délégué général pour l'armement, Joël Barre, du chef d'état-major de la marine nationale, l'amiral Christophe Prazuck, de son homologue grec, le vice-amiral Nikolaos Tsounis , et de Hervé Guillou, PDG de Naval Group. Les FDI sont des navires de combat de la classe 4 500 tonnes avec un équipage de 125 marins. Aptes à intervenir dans tous les domaines de la lutte en haute mer, elles intègrent de nombreuses innovations, parmi lesquelles le premier radar à panneaux fixes entièrement numérique au monde. Le programme FDI a été lancé en 2017. La loi de programmation militaire 2019-2025 prévoit que les deux premières FDI seront livrées à la Marine nationale d'ici à 2025. Cinq FDI seront en service au sein de la Marinenationale en 2030. Sur proposition de l'amiral Prazuck, la ministre des Armées a décidé que l'une d'entre elles portera le nom de l'amiral Louzeau, décédé récemment. Le programme FDI participe au renouvellement et au renforcement de la flotte de surface de la Marine nationale, conformément aux conclusions de la revue stratégique de 2017 qui prévoit 15 frégates de premier rang en 2030 : 8 frégates multi-missions (FREMM), 2 frégates de défense aérienne (FDA Horizon) et 5 frégates de défense et d'intervention (FDI). La première FDI a été commandée en avril 2017 par la Direction générale de l'armement (DGA) à l'industriel Naval Group associé à Thales et MBDA. Sa livraison à la Marine nationale est prévue fin 2023. Complémentaires des FREMM, les FDI sont des navires de combat d'un déplacement de la classe 4 500 tonnes, polyvalents, endurants, embarquant un équipage de 125 marins. Les FDI intègrent dès leur conception un concentré d'innovations : Elles peuvent intervenir dans tous les domaines de la lutte en haute mer: antinavire, antiaérien, anti-sous-marin. Aptes au contrôle de vastes espaces aéro-maritimes, elles sont aussi capables de se défendre contre les menaces asymétriques et de projeter un détachement des forces spéciales. Pour évoluer dans un monde de plus en plus digital, les FDI disposent nativement d'une protection contre la menace cyber et de deux centres numériques (Data Centers) qui regroupent les capacités de calculs de tous les senseurs et armements du bord. Parmi les équipements de nouvelle génération installés à bord on trouve un radar à quatre panneaux fixes permettant une veille permanente sur 360 degrés, fixés sur une m'ture unique, et des lanceurs capables de tirer plusieurs types de missiles antiaériens en fonction de la menace. Ce sont également les premières frégates à pouvoir embarquer simultanément un hélicoptère et un drone de la classe 700 kg. Conçues pour être évolutives, les FDI évolueront en standards de manière à s'adapter à l'évolution de la menace. Depuis la notification du marché par la DGA au printemps 2017, chaque jalon technique a été franchi dans les temps que ce soit pour la conception du navire ou pour le développement des innovations embarquées, gr'ce à un travail collaboratif en plateau réunissant la DGA, l'industrie et la Marine. *L'amiral Pierre Alexis Ronarc'h, connu pour avoir été à la tête de la « brigade Ronarc'h », brigade de fusiliers marins ayant participé à la défense héroïque de Dixmude en 1914, commandant supérieur de la Marine pour la zone des armées du Nord de 1916 à 1918, un des pères de la lutte anti-sous-marine, puis chef d'état-major de la Marine entre 1919 et 1920. https://www.defense.gouv.fr/dga/actualite/florence-parly-ministre-des-armees-lance-la-fabrication-d-une-serie-de-nouvelles-fregates-a-lorient

  • After huge hack, Biden security picks want more cyber coordination with industry

    21 janvier 2021 | International, C4ISR, Sécurité

    After huge hack, Biden security picks want more cyber coordination with industry

    Andrew Eversden WASHINGTON — Two top national security nominees advocated Tuesday for stronger federal cybersecurity and increased collaboration with contractors in the aftermath of a supply chain breach that infiltrated numerous federal agencies. If confirmed, retired Army Gen. Lloyd Austin and Avril Haines, President-elect Joe Biden's nominees for defense secretary and director of national intelligence, respectively, would start their jobs in the middle of the national security community's assessment of damage from a cybersecurity breach pinned on Russian hackers. They gained access through software from SolarWinds, a major government contractor. “We must elevate cybersecurity as an imperative across the government in order to defend the American people and U.S. critical infrastructure,” Austin told the Senate Armed Services Committee in his answers to the lawmaker's advance policy questions. “Additionally, the government must continue to strengthen its partnership with the private sector to foster greater information sharing and collaboration.” So far, federal investigators have discovered breaches at “fewer than 10” federal agencies, though the Pentagon and intelligence community haven't confirmed whether their offices were among the victims. Haines, who served as deputy CIA director and deputy national security adviser to President Barack Obama, found it concerning that the breach first came to light through cybersecurity company FireEye, instead of through U.S. government cybersecurity operators. “[I] absolutely share ... concern that we're actually able to detect these because that's obviously absolutely critical to us protecting against them,” Haines said before the Senate Select Committee on Intelligence. “I think ... it was pretty alarming that we found out about it through a private company as opposed to our being able to detect it ourselves to begin with.” In response to the breach, Austin committed to reviewing the DoD's cyber posture and emphasized that Russia must be punished for infiltrating federal networks. In the advance questions, Austin stopped short of calling the breach an act of war, arguing that designation “requires a case-by-case and fact-specific determination.” “For example, malicious cyber activities could result in injury, death or significant property destruction,” Austin wrote. “These activities would need to be considered in their totality.” An early January announcement from several federal investigators, including the NSA and Office of the Director of National Intelligence, stated that the breach was believed to be an espionage campaign and “likely Russian in origin.” “If that's the case, I think Russia should be held accountable,” Austin said at the hearing. “That's my personal belief.” Sen. Jack Reed, D-R.I., who sits on both SASC and SSCI, called the breach “the greatest cyber intrusion in the history, I think, perhaps, of the world” and said that the stovepiped nature of the U.S. national security apparatus needed to be addressed. Reed said one challenge for Haines will be developing a “more coherent, cohesive, integrated approach” to dealing with cybersecurity threats, particularly from advanced nation-state actors. Under questioning from senators, Haines said the SolarWinds supply chain hack was a “grave threat,” and the government needs new to improve its defenses against such attacks, though she noted that she hasn't received a classified briefing on the intrusion. In 2019, a report from ODNI warned of growing software supply chain hacks that provide an “efficient way to bypass traditional defenses and compromise a large number of computers.” “To prevent a recurrence of this kind of attack, we need to close the gap between where our capabilities are now and where they need to be in order to deter, detect, disrupt and respond to such intrusions far more effectively in the future,” Haines wrote in her questionnaire. “If confirmed as DNI, I will review the expert conclusions from the SolarWinds incident and the current intelligence about supply chain vulnerabilities and what steps may be taken to address any vulnerabilities.” Haines told senators that she would assess how the intelligence community can improve its cybersecurity partnerships with industry and the whole federal government. “I believe that the IC plays an integral role in detecting and warning against nation-state targeting of U.S. networks and infrastructure,” she wrote. “If confirmed, I will examine how better collaboration between the IC and the rest of the U.S. government, coupled with closer partnerships with the private sector and our international allies, can enhance our ability to deter, detect, and mitigate cyberattacks.” Haines will review whether the intelligence community is allocating resources properly to face advanced cyber threats and will examine the adequacy of the IC's existing authorities to protect the digital infrastructure of the United States, she said. Austin pointed to a cyber-threat sharing partnership the department has with the defense industrial base and stated that the department should “continue to look for ways to better integrate with interagency partners and the private sector.” In light of the SolarWinds breach, the senators on SSCI wrote that they are worried about a “lack of mandatory threat information sharing between the private sector and government,” adding that any information sharing from the private sector after the breach is voluntary. Haines would review the relationship. “Information sharing between the IC and the private sector is increasingly important to ensure that our data systems and networks are secure,” she wrote. “If confirmed as DNI, I look forward to reviewing the Intelligence Community's data sharing and information exchange relationship with the private sector, to engaging with IC experts and private sector leaders on what information is currently being shared, and to examining the efficacy of the current framework for sharing threat information.” The incoming Biden administration has signaled that it will prioritize cybersecurity in the aftermath of the SolarWinds breach. The Biden team named Anne Neuberger, the NSA's cybersecurity director who worked to improve information sharing with the private sector, to National Security Council as deputy national security adviser for cyber and emerging technology. Haines wrote that she will “ensure” that the intelligence community has a “robust data sharing and information exchange relationship” with private companies and said that she will be “studying current information sharing to determine how it can be improved and what types of information can be shared to enhance cybersecurity protections.” “The private sector has unique insight and expertise on malicious activity occurring within its networks,” Haines said. “Real-time integration of private sector and government data could lead to more effective prevention and mitigation outcomes.” Cyber norms and deterrence For the last few years, the U.S. government wrestled with the concept of deterrence in the cyber domain, a complex challenge that including resilient defenses, risk management and strong international partnerships. As the SolarWinds breach demonstrated, deterring adversaries from hacking, which is seen as below the threshold of an armed response, is difficult. In response to a question from Sen. John Cornyn, R-Texas, about how to approach cyber deterrence, Haines pointed to many of the same tenets of current U.S. cyber deterrence, including imposition of costs for malicious actors' behavior, bringing foreign allies together to impose those costs, building resilient systems that are hard to hack, developing norms and creating strong relationship with the private sector. Haines wrote that setting norms should include outlining sanctionable behavior with the agreement from allies. A cornerstone to sanctioning is attributing cyberattacks to actors, a challenging undertaking in the cyber realm. Sen. Mark Warner, D-Va., said he wanted Haines to be more forthcoming with attribution of cyberattacks, stating that he found it “extraordinarily concerning” that the “[Trump] White House underplay[ed] attribution on Russia.” Attribution, Haines said, would be a major piece of the ODNI's role in deterrence. “Something we [ODNI] can do is promote the ability to detect when adversaries are engaging in such activity so as then to provide information about attribution, for example. And then hold adversaries to account through that.” https://www.c4isrnet.com/cyber/2021/01/20/after-huge-hack-biden-security-picks-want-more-cyber-coordination-with-industry

Toutes les nouvelles