24 avril 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

UK defense plans could take major hit from coronavirus fallout

By: Andrew Chuter

LONDON — Britain is facing some “distasteful medicine “ in an upcoming defense review, with question marks around money, allies, the industrial base, Defence Secretary Ben Wallace has warned.

Giving evidence in a virtual session of the Parliamentary Defence Committee April 22, Wallace said there were some difficult issues to be addressed by a post COVID-19 Britain.

“We will have to take some pretty distasteful medicine," he told committee members spread across the country in the first ever virtual session of the committee. "It's not just about sums of money. It is about cultural change — our relationship with our allies, what Britain's ambitions are going to be. Do we want to do everything? Do we want to do less? Do we want to let go of something? Do we want to bank on international consortia every time, or do we want to invest in our industrial base? All those are difficult questions.

The defense secretary, who only recently recovered from COVID-19, said changing the culture is going to be as important as the sums of money made available to the Ministry of Defence in the integrated review.

The government refers to it as an ‘integrated review' as it involves, defense, security, foreign policy and international development departments.

Wallace said that whether the review is uncomfortable or not, his hope is the defense ministry will have a realistic amount of money available to undertake what it recommends.

That's rarely been the case in previous reviews over the last 30 years or so, and few people here are expecting much different this time round.

The issue is already complicated by the never-ending budget pressure at the MoD. According to the National Audit Office, the government's financial watchdog, the MoD already has a financial black hole for its equipment program of between £3 and £13 billion, or as much as $16 billion.

John Louth, an independent defense analyst in the U.K., said one of the big challenges facing the MoD will be putting the procurement roadmap back together post COVID-19.

“One of the real challenges will be re-profiling a schedule for procurement," Louth said. Everything is slipping to the right, and re-profiling is going to be difficult, particuarly as many of the programs are interdependent on other programs. That poses a large and difficult challenge within a restricted budget."

The economic impact of the COVID-19 pandemic is likely to make more difficult allocation of cash to its various departments and ministeries in the next comprehensive spending review.

That's not withstanding the fact that MoD personnel — nearly 3,000 at the last count — have been lauded for their excellent performance assisting the National Health Service and others, carrying out tasks ranging from delivering oxygen to hospitals to setting up and running command and control centers.

In particular the MoD has been widely praised for rapidly constructing several field hospitals for COVID-19 sufferers, including a 4,000 bed facility at the Excel Centre in London. The site is well known to defense contractors, as it's the venue for the DSEI exhibition.

The government announced last week it was pausing the integrated review to focus resources on the COVID-19 fight, without saying when the work would recommence.

Wallace answered that question — twice. First he said the review would recommence next year; later he said the correct date was the end of this year, but he was seeking clarity on the exact timing.

That decision will be taken by the Cabinet Office who are leading the review. They had previously ordered the review, which was initiated after Prime Minister Boris Johnson won the general election last December, be completed by July.

That was a date many analysts and politicians, including the defense committee, thought was risky.

“This [the delay] is welcome news. I want a longer period for the integrated review. I want us to examine our place in the world, especially post COVID. It's going to be a different world,” he said.

Wallace, an ex-British Army officer, said the number one threat is lack of resilience. "I suspect it will be higher up the agenda as a result of the virus,” he said.

The defense secretary said that unlike countries such as France, Britain wasn't bringing forward a number of programs to protect the industrial base.

“We are though speaking to industry to ensure their cash flow is continuing. There is a lot of work on the books that we would like to keep going,” he told the committee.

One industry executive who asked not to be named said, “cash is not an issue yet, but I'm prepared for that to happen. I'm bracing for extended credit being taken by our customers, but I haven't seen it yet.”

The virus has had an impact on a number of major defense programs in the U.K., as people have been ordered to work at home or, if that's not possible, adopt social distancing requirements in the workplace.

The impact that might have on defense suppliers ability to meet their contractual obligations, and subsequently their financial viability and and that of the supply chain, has been recognized by the government .

A series of actions relating to paying suppliers has been in place since late March, with MoD procurement authorities advised to support suppliers in a range of ways to maintain cash flow. This includes forward ordering, payment in advance, interim payments and payment on order rather than receipt.

The scheme has been well received by industry here.

The executive said he applauded the government for its swift action, but acknowledged the challenge remains for protecting employment and cash flow.

The executive did say though that more clarity was needed from the government over the availability of initiatives like the Corona Business Interruption Loan scheme for defense exporters.

Wallace named BAE's F-35 and nuclear submarine activities as programs where the balance between COVID restrictions to keep workers safe and keeping production and cash flow moving were vital.

“It's really important that we continue some work that's absolutely key. We also need to help these firms to get through the process, because cash flow is really important to their survival,” said Wallace.

But it's not easy keeping your distance from colleagues if you are trying to build something like a nuclear submarine. As such, Wallace said submarine building activities in the U.K. had some of the highest absentee rates in the sector.

BAE employs around 9,000 people at its nuclear submarine yard at Barrow in northwest England where it is building Astute-class attack submarines and working on the Dreadnought class of Trident nuclear missile boats.

About 4,000 of the staff are working from home with over 1,100 employees now working on site – up from 800-900 last week.

A BAE spokesperson said the employees were supporting critical work at the yard.

Last week the company reported that HMS Audacious, its latest attack submarine to be built for the Royal Navy, had left the yard and was heading to the submarine base on the Clyde in Scotland.

https://www.defensenews.com/global/europe/2020/04/23/uk-defense-plans-could-take-major-hit-from-coronavirus-fallout/

Sur le même sujet

  • DARPA Seeks to Make Scalable On-Chip Security Pervasive

    29 mars 2019 | International, C4ISR, Sécurité, Autre défense

    DARPA Seeks to Make Scalable On-Chip Security Pervasive

    For the past decade, cybersecurity threats have moved from high in the software stack to progressively lower levels of the computational hierarchy, working their way towards the underlying hardware. The rise of the Internet of Things (IoT) has driven the creation of a rapidly growing number of accessible devices and a multitude of complex chip designs needed to enable them. With this rapid growth comes increased opportunity for economic and nation-state adversaries alike to shift their attention to chips that enable complex capabilities across commercial and defense applications. The consequences of a hardware cyberattack are significant as a compromise could potentially impact not millions, but billions of devices. Despite growing recognition of the issue, there are no common tools, methods, or solutions for chip-level security currently in wide use. This is largely driven by the economic hurdles and technical trade-offs often associated with secure chip design. Incorporating security into chips is a manual, expensive, and cumbersome task that requires significant time and a level of expertise that is not readily available in most chip and system companies. The inclusion of security also often requires certain trade-offs with the typical design objectives, such as size, performance, and power dissipation. Further, modern chip design methods are unforgiving – once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible. “Today, it can take six to nine months to design a modern chip, and twice as long if you want to make that same design secure,” said Serge Leef, a program manager in DARPA's Microsystems Technology Office (MTO). “While large merchant semiconductor companies are investing in in-house personnel to manually incorporate security into their high-volume silicon, mid-size chip companies, system houses, and start-ups with small design teams who create lower volume chips lack the resources and economic drivers to support the necessary investment in scalable security mechanisms, leaving a majority of today's chips largely unprotected.” To ease the burden of developing secure chips, DARPA developed the Automatic Implementation of Secure Silicon (AISS) program. AISS aims to automate the process of incorporating scalable defense mechanisms into chip designs, while allowing designers to explore economics versus security trade-offs and maximize design productivity. The objective of the program is to develop a design tool and IP ecosystem – which includes tool vendors, chip developers, IP licensers, and the open source community – that will allow security to be inexpensively incorporated into chip designs with minimal effort and expertise, ultimately making scalable on-chip security pervasive. Leef continued, “The security, design, and economic objectives of a chip can vary based on its intended application. As an example, a chip design with extreme security requirements may have to accept certain tradeoffs. Achieving the required security level may cause the chip to become larger, consume more power, or deliver slower performance. Depending on the application, some or all of these tradeoffs may be acceptable, but with today's manual processes it's hard to determine where tradeoffs can be made.” AISS seeks to create a novel, automated chip design flow that will allow the security mechanisms to scale consistently with the goals of the design. The design flow will provide a means of rapidly evaluating architectural alternatives that best address the required design and security metrics, as well as varying cost models to optimize the economics versus security tradeoff. The target AISS system – or system on chip (SoC) – will be automatically generated, integrated, and optimized to meet the objectives of the application and security intent. These systems will consist of two partitions – an application specific processor partition and a security partition implementing the on-chip security features. This approach is novel in that most systems today do not include a security partition due to its design complexity and cost of integration. By bringing greater automation to the chip design process, the burden of security inclusion can be profoundly decreased. While the threat landscape is ever evolving and expansive, AISS seeks to address four specific attack surfaces that are most relevant to digital ASICs and SoCs. These include side channel attacks, reverse engineering attacks, supply chain attacks, and malicious hardware attacks. “Strategies for resisting threats vary widely in cost, complexity, and invasiveness. As such, AISS will help designers assess which defense mechanisms are most appropriate based on the potential attack surface and the likelihood of a compromise,” said Leef. In addition to incorporating scalable defense mechanisms, AISS seeks to ensure that the IP blocks that make up the chip remain secure throughout the design process and are not compromised as they move through the ecosystem. As such, the program will also aim to move forward provenance and integrity validation techniques for preexisting design components by advancing current methods or inventing novel technical approaches. These techniques may include IP watermarking and threat detection to help validate the chip's integrity and IP provenance throughout its lifetime. AISS is part of the second phase of DARPA's Electronics Resurgence Initiative (ERI) – a five-year, upwards of $1.5 billion investment in the future of domestic, U.S. government, and defense electronics systems. Under ERI Phase II, DARPA is exploring the development of trusted electronics components, including the advancement of electronics that can enforce security and privacy protections. AISS will help address this mission through its efforts to enable scalable on-chip security. DARPA will hold a Proposers Day on April 10, 2019 at the DARPA Conference Center, located at 675 North Randolph Street, Arlington, Virginia 22203, to provide more information about AISS and answer questions from potential proposers. For details about the event, including registration requirements, please visit: https://www.fbo.gov/index?s=opportunity&mode=form&id=6770487d820ee13f33af67b0980a7d73&tab=core&_cview=0 Additional information will be available in the forthcoming Broad Agency Announcement, which will be posted to www.fbo.gov. https://www.darpa.mil/news-events/2019-03-25

  • Le français Parrot retenu par l’armée américaine pour construire des drones de reconnaissance

    31 mai 2019 | International, Aérospatial

    Le français Parrot retenu par l’armée américaine pour construire des drones de reconnaissance

    Sérieusement concurrencée par DJI sur le domaine des drones grand public, la marque française Parrot élargit son horizon. Elle travaille de plus en plus sur des engins destinés aux professionnels et pourrait bientôt décrocher un contrat de grande ampleur. La firme a en effet été retenue (avec cinq autres sociétés) par le département de la Défense des États-Unis pour un appel d'offres visant à développer et à prototyper une nouvelle génération de drones compacts, de courte portée et dédiée à la surveillance (« Short Range Reconnaissance drone » ou SRR). Il semblerait donc que la méfiance envers les acteurs chinois (majoritaires) du secteur fasse le bonheur des autres. Henri Seydoux, président et PDG de Parrot, a réagit à l'annonce de la sélection : « Parrot est fier d'avoir été sélectionné par l'U.S. Army pour travailler sur ce projet hautement stratégique [...] Nous comprenons parfaitement combien un drone ultra-compact, à l'instar de la plateforme de drone ANAFI, possède les atouts pour devenir un élément central de la défense. Nous sommes impatients de mettre à profit l'excellence de notre R&D pour répondre aux plus hautes exigences de l'U.S. Army afin d'intégrer l'efficacité offerte par les drones dans leurs opérations et d'accompagner la plus importante force armée et de défense au monde. » Ledit programme a en effet alloué 11 millions de dollars de dollars à ces six acteurs afin qu'il puisse rapidement mettre au point un drone capable d'être déployé rapidement sur le terrain par les soldats. Il permettra ainsi de disposer d'un meilleur champ de vision et d'une « compréhension immédiate et élargie » de l'environnement dans lequel ils évoluent. Évidemment, l'armée a défini plusieurs objectifs que l'appareil doit remplir pour être sélectionné. Il devra notamment bénéficier d'un temps de vol de 30 minutes et d'une portée allant jusqu'à 3 kilomètres. Son poids ne pourra excéder 1,3 kg/ Il faudra qu'il soit opérationnel en moins de 2 minutes et doit pouvoir être transporté dans les sacs à dos standards utilisés par les soldats. Rien qui ne paraisse impossible à réaliser pour la firme, qui joue très gros sur ce marché. https://www.journaldugeek.com/2019/05/30/le-francais-parrot-retenu-par-larmee-americaine-pour-construire-des-drones-de-reconnaissance/

  • For DoD cyber, 2019 is the year of doing

    31 janvier 2019 | International, C4ISR

    For DoD cyber, 2019 is the year of doing

    By: Mark Pomerleau Following a year of cyberspace strategizing, 2019 will be all about implementing rules and tools, according to the Department of Defense's top uniformed cyber policy adviser. Appearing Jan. 29 before the Senate Armed Services Subcommittee on Cybersecurity, Brig. Gen. Dennis Crall said the department knows where it needs to head following last year's DoD cyber strategy (the first in three years) and now is the time to show results. “This is the year of outcomes and that's what we're focused on — delivering the capabilities and improvements that we've discussed for some time,” he told the committee, adding that the strategy process allowed them to take a look at some departmental gaps and get after them. The strategy actually has actionable lines of effort and there are things they can do to measure progress, he said. The document lays out five objectives and five areas of interest under its strategic approach. The five objectives include: Ensuring the joint force can achieve its missions in a contested cyberspace environment; Strengthening the joint force by conducting cyberspace operations that enhance U.S. military advantages; Defending U.S. critical infrastructure from malicious cyber activity that alone, or as part of a campaign, could cause a significant cyber incident; Securing DoD information and systems against malicious cyber activity, including DoD information on non-DoD-owned networks; and Expanding DoD cyber cooperation with interagency, industry, and international partners. The five areas of interest under the guise of its strategic approach include building a more lethal joint force; competing and deterring in cyberspace; strengthening alliances and attracting new partners; reforming the department; and cultivating talent. The strategy also notes DoD must take action in cyberspace during day-to-day competition to preserve U.S. military advantages and defend U.S. interests. The focus will be on nation states that can pose strategic threats to the United States, namely China and Russia. “We will conduct cyberspace operations to collect intelligence and prepare military cyber capabilities to be used in the event of crisis or conflict,” the document says. Dana Deasy, the department's chief information officer, told the same committee that the threat from Russia and China is so acute he is briefed weekly from U.S. Cyber Command and the National Security Agency on them. This allows him to understand their offensive and defensive posture relative to the DoD. “Suffice to say that these are very strong, capable adversaries, but at the same time we have some strong, capable abilities ourselves,” he said. Cyber Command has now assembled a full force of cyberwarriors and received limited acquisition authority to start equipping them. However, there is much more work to be done. In fact, aside from individual tools, the force is still in need of a training range where cyberwarriors can do individual and collective training, as well as mission rehearsal, similar to rifle ranges or national training centers in the physical world. The Persistent Cyber Training Environment, being run by the Army for the joint force, will get after this; however, it is still in the prototype phase with a limited capability delivered to users. Additionally, the force needs a large-scale command-and-control platform that will house tools, provide commanders global situational awareness of forces and enable forces to plug into operations from remote locations. This is the goal of Unified Platform, which is also still in the prototype phase, though officials have said a limited product could be delivered as early as the spring. https://www.fifthdomain.com/dod/2019/01/30/for-dod-cyber-2019-is-the-year-of-doing

Toutes les nouvelles