15 octobre 2023 | International, Terrestre

These new Army formations can reach across Europe to strike a target

This was the first time that the 2nd Multi-Domain Task Force did a multi-service, multi-partner targeting data hand-off at these ranges.

https://www.defensenews.com/news/2023/10/13/these-new-army-formations-can-reach-across-europe-to-strike-a-target/

Sur le même sujet

  • The rising importance of data as a weapon of war

    4 septembre 2018 | International, C4ISR

    The rising importance of data as a weapon of war

    By: Adam Stone As Navy Cyber Security Division director, Rear Adm. Danelle Barrett casts a wary eye over the rising importance of data as a weapon of war. Data is an ever-more-critical battlefield asset, given the rising internet of things, including a rapidly growing inventory of unmanned intelligence, surveillance and reconnaissance assets across the Navy. Protecting all that data from enemy exploitation represents a potentially massive cyber challenge. This spring, the Navy announced “Compile to Combat in 24 Hours,” a pilot project to leverage web services and a new cloud architecture in the service of data security. C4ISRNET's Adam Stone spoke to Barrett about the potential there, and about the emerging IT security landscape in a data-centric military. C4ISRNET: Data has become increasingly valuable, especially in terms of intelligence, surveillance and reconnaissance. How valuable is it? How do you describe the significance of data these days? REAR ADM. DANELLE BARRETT: If you look at what goes on in industry and how they use big data for decision making, to be predictive and proactive: that's exactly the kind of environment that we want to get to. Being able to trust those data, to access the data, expose the data, reuse the data — that becomes actually the hardest part. C4ISRNET: Let's talk about that. Sharing data involves risk. Talk about that risk landscape. BARRETT: The more data that you have out there and the more places you have it, obviously you have an increased attack surface. Adversaries will go after your data to try to get an advantage. So, you want to protect data down to the lowest layer and you want to make sure that you have defense in depth built in, and resiliency to be able to work through any kind of attack or interruption in your data flow. We build our architectures around being resilient using the NIST [National Institute of Standards and Technology] model of “detect, react and restore.” You build in as much resiliency as you can. C4ISRNET: Can you say, specifically, how that's done? BARRETT: I'll give you an example of something that we're testing in our architecture to try to improve the data down to the data element layer. We have an effort called “Compile to Combat in 24 Hours.” We're looking at modernizing our afloat architecture and, as we do that, we're decomposing big monolithic applications, if you will, into web services similar to what you'd get on an iPhone: smaller capabilities, smaller web services as opposed to these big monolithic applications. As you do that, you can ensure that you're using standard ports and protocols, so you don't have applications on the ship that are reaching back over nonstandard ports, which would present an increased attack surface. If you can standardize on your ports, you can sense those better and monitor those better. Then you then go down to the data element layer. Say you standardize on extensible markup language, XML, you can then apply the SAML protocol that is inherent to that to protect your data at that lowest layer. We're testing that concept in an architecture now. Full article: https://www.c4isrnet.com/it-networks/2018/08/31/the-rising-importance-of-data-as-a-weapon-of-war/

  • Amentum Awarded $818M Contract to Modernize U.S. Navy F-16 Adversary Fleet

    9 août 2023 | International, Aérospatial

    Amentum Awarded $818M Contract to Modernize U.S. Navy F-16 Adversary Fleet

    Chantilly, Va., August 2, 2023 – Amentum was awarded an $818 million contract for adversary aircraft sustainment and modernization of the U.S. Navy F-16 fleet. Amentum will manage all aspects...

  • The unlikely tool that’s improving physical security at military bases

    23 avril 2018 | International, Sécurité

    The unlikely tool that’s improving physical security at military bases

    By: Adam Stone From their perch in the operations center at the Navy Yard in Washington, D.C., security analysts peer down like hawks over the Naval Research Lab, Walter Reed National Military Medical Center Joint Base Anacostia-Bolling and a half-dozen other major military installations scattered around the national capital region. It takes just 10 people to maintain constant surveillance over all those disparate sites, “but you need machines to help you,” said Robert Baker, command information officer for the Naval Facilities Engineering Command. Those machines include a complex network of cameras and sensors, supported by analytics software. When the software spots a suspect event – traffic headed in the wrong direction, for example – that video feed gets pushed to the foreground for human analysis. This is just one example of how the military looks to technology to improve physical security. The real-world influence of technology is evident across the military: Everything from targeting systems to logistics to intelligence, surveillance and reconnaissance has been enhanced in some way by IT. Physical security represents an emerging frontier, where artificial intelligence, machine learning, autonomous technologies and other advances could give the military an edge. Force multiplier At Edwards Air Force Base in California last summer, a security team installed a ground-based radar system to monitor a wide landscape using electro-optical and infrared sensors. The team turned to technology to give them insight across a massive 308,000-acre facility. “The driving need for this system is to proactively defend Edwards AFB. Given the mission of Edwards, and how much terrain we have, we need a system that can overcome the difficulties of patrolling the vast amount of land Edwards presents to our patrols,” Staff Sgt. Alexander Deguzman, an installation security technician with the 412th security forces squadron said in a news release. As at the Navy Yard, the effort at Edwards is all about using some combination of remote sensing, networked surveillance and machine intelligence to create a force multiplier in physical security. Analysts say such initiatives could make bases and installations markedly safer at a lower cost and with less labor required. The rise of artificial intelligence is a critical technology moving forward. Security often involves the constant observation of multiple video and data feeds for prolonged periods of time. Human analysts get tired. They look away for a moment. In short, they miss stuff. “A human can look at things once or twice, but after 100 times they start to lose their edge,” said retired Air Force Lt. Gen. Bob Elder, chair of the cyber and emerging technologies division at the National Defense Industrial Association. “AI goes beyond what a human can do, because it doesn't get tired.” Elder envisions a future in the near-term in which routine surveillance can be carried out by software-supported machines, with computers scanning for anomalies and alerting human analysts to potential threats. That saves on labor. In addition, such as approach also would allow the military to use less highly-skilled operators, relying instead on the machine's expertise and accuracy. Eyes in the sky Industry's interest in this subject has helped bring AI and autonomy to the fore as potential security assets. With the rise of the drones and the imminent arrival of driverless cars, some experts are looking to autonomy as the next logical step in military security. Drones alone don't offer a security fix: Their batteries run down too fast. The military might however consider the use of tethered drones, autonomous ISR assets that can hover in place and remain attached to a power source for ongoing operations. Put one at each corner of a base camp and leaders can put together a big-picture view of any approaching hazard. “This kind of solution is really smart, because you can constantly feed it power, you don't have to worry about it flying away, and if someone tries to damage it or take control of it, you know about it right away,” said Steve Surfaro, chairman of the Security Industry Association public safety working group. Another key industry trend, biometrics, may also point the way forward on physical security. “Investing in facial recognition software ... can improve perimeter security by automating aspects of it to speed up entry to bases for those authorized and focus screening attention on those that represent a risk,” according to a Deloitte report on smart military bases titled “Byting the Bullet.” The networking needs To make the most of the technological imperative around security, experts say, the military will have to give serious thought to issues of infrastructure. Security is becoming a data function: Sensor streams, video feeds, drone surveillance and other methodologies all will require robust network support and substantial compute resources. The data will need to flow freely, even in great quantities, with ample processing available to put it to use. Much of the processing will be done in the cloud, “but you still need to have a reliable connection to that cloud, which means you want diversity and redundancy. At a minimum you want two connections and ideally you want three ways of doing it – wires, line of sight wireless, and satellite,” Elder said. “You need a reliable way to get to your cloud services.” Such an implementation will require, at the least, a significant amount of bandwidth. At the Navy Yard, Baker said he is able to overcome that hurdle through thoughtful network design. In other words: Rather than pushing all the information back to the operations center for processing, new video and sensor analytics takes place on the edge, shrinking the overall networking demand. “The more processing you can do at the edge of the network, the less robust your network needs to be,” he said. Efficient network design weeds out routine activity “and then the really interesting information is being sent for human analysis.” While emerging technologies can enhance the military's security operations, some argue that IT capabilities are not, in themselves, a rationale for upgrading systems that may already be meeting mission. Budgetary constraints apply. “You could make processing faster, but what is the threat that we are trying to counter? If we are seeing zero incidents, why we would gold-plate that area? We want to be good stewards of the taxpayer dollars,” Baker said. “At the same time, if there was some high-risk area where we needed to do that better, we would absolutely want to put resources against that.” https://www.c4isrnet.com/it-networks/2018/04/12/the-unlikely-tool-thats-improving-physical-security-at-military-bases/

Toutes les nouvelles