8 mars 2021 | International, Aérospatial

U.S. General Says Unmanned Aircraft Need Too Many People

U.S. Special Operations Command is looking at Reaper drones for the new Armed Overwatch role. But although the Reaper may be uncrewed, it takes a lot of people on the ground to keep it flying -- maybe too many to be viable.

https://www.forbes.com/sites/davidhambling/2021/03/05/us-general-says-unmanned-aircraft-need-too-many-people/

Sur le même sujet

  • Audit finds cyber vulnerabilities in US missile defense system

    17 décembre 2018 | International, C4ISR

    Audit finds cyber vulnerabilities in US missile defense system

    By: Geoff Ziezulewicz The Army, Navy and Missile Defense Agency are failing to take basic cybersecurity steps to ensure that information on America's ballistic missile defense system won't fall into nefarious hands, according to a Defense Department Inspector General audit released Friday. Investigators visited five sites that manage ballistic missile defense elements and technical information, but the names of the commands were redacted in the publicly released report. “The Army, Navy and MDA did not protect networks and systems that process, store, and transmit (missile defense) technical information from unauthorized access and use,” the declassified report states. Such inadequacies “may allow U.S. adversaries to circumvent (missile defense) capabilities, leaving the United States vulnerable to missile attacks,” the report states. They found officials failed to employ safeguards familiar to most people online in 2018, the latest development to raise questions about the U.S. military's cybersecurity vulnerabilities. Among the shortcomings: Administrators for classified networks had no intrusion detection and prevention systems in place to watch for cyberattacks, much less stop them, according to the report. At one site, officials said they had requested to purchase those cyber safeguards in December 2017 but nine months later it still hadn't been approved. “Without intrusion detection and prevention capabilities, (the site) cannot detect malicious attempts to access its networks and prevent cyberattacks designed to obtain unauthorized access and exfiltrate sensitive (missile defense) technical information,” the report states. Officials also failed to patch system flaws after receiving vulnerability alerts, one of which had first been identified in 1990 and had still not been fixed by April. Another vulnerability that could be exploited by an attacker was first identified in 2013 but also was never pathced, according to the report. “Countless cyber incident reports show that the overwhelming majority of incidents are preventable by implementing basic cyber hygiene and data safeguards, which include regularly patching known vulnerabilities,” the IG report states. “(Missile defense) technical information that is critical to national security could be compromised through cyberattacks that are designed to exploit these weaknesses.” Some facilities failed to force employees to use common access cards, or CAC, when accessing the classified system, a basic cybersecurity practice known as multi-factor identification. Instead, officials were able to access the sensitive information using just a username and password, the report states. Hackers use phishing and other tactics to exploit passwords and gain access to such systems. New hires are supposed to be allowed network access without a card for only their first two weeks on the job. But IG investigators found users on the systems without CAC cards for up to seven years. At one site, a domain administrator never configured the network to allow only CAC holder access. “Allowing users to access networks using single factor authentication increases the potential that cyber attackers could exploit passwords and gain access to sensitive (missile defense) technical information,” the report states. Investigators also found unlocked server racks at some locations, another key vulnerability to insider snoopers. “The insider threat risk necessitates that organizations implement controls...to reduce the risk of malicious personnel manipulating a server's ability to function as intended and compromising sensitive and classified data,” the report states. External storage devices held unencrypted data and some sites failed to track who was accessing data, and why. Other administrators told investigators that they lacked the ability to record or monitor data downloaded from the network onto these devices. Unless these officials enforce the encryption of such removed data and monitor its downloading and transferring, “they will be at increased risk of not protecting sensitive and classified (missile defense) technical information from malicious users,” the report states. Investigators also found that some supposedly secure sites were failing to even lock their doors. One location had a security door that hadn't worked for years. “Although security officials were aware of the problem, they did not take appropriate actions to prevent unauthorized personnel from gaining unauthorized access to the facility,” the report states. Other sites featured no security cameras to monitor personnel movement and security officers failed to conduct badge checks. While the report makes recommendations to fix the documented problems, officials for the inspected agencies offered no comments on the non-classified draft report of the audit. Friday's scathing IG audit marked the latest in a string of reports detailing shoddy cybersecurity throughout the armed forces and defense contractors. During the same week, the Wall St. Journal reported that Chinese hackers are targeting military systems and those of defense contractors working on Navy projects. Beijing-linked cyber raids have attempted to steal everything from missile plans to ship-maintenance data in a series of hacks over the past 18 months, the Journal reports. As a result, Navy Secretary Richard Spencer has ordered a “comprehensive cybersecurity review” to assess if the Navy's cyber efforts “are optimally focused, organized, and resourced to prevent serious breaches,” spokesman Capt. Greg Hicks said. The review will also look at authorities, accountability and if the efforts reflect and incorporate government and industry best practices, he said. “Secretary Spencer's decision to direct a review reflects the serious to which the DoN prioritizes cybersecurity in this era of renewed great power competition,” Hicks said. https://www.navytimes.com/news/your-navy/2018/12/14/audit-finds-cyber-vulnerabilities-in-us-missile-defense-system

  • Statement From Acting Secretary of Defense Patrick M. Shanahan

    2 janvier 2019 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    Statement From Acting Secretary of Defense Patrick M. Shanahan

    Under the direction of President Trump, the Department of Defense remains focused on safeguarding our nation. We have deep respect for Secretary Mattis' lifetime of service, and it has been a privilege to serve as his deputy secretary. As acting secretary of defense, I now look forward to working with President Trump to carry out his vision alongside strong leaders including the service secretaries, the Joint Chiefs of Staff, the combatant commanders, and senior personnel in the Office of the Secretary of Defense. The Department of Defense continues to be one of our nation's bedrock institutions. Our foundational strength lies in the remarkable men and women who volunteer to serve our country and protect our freedoms, while making immense personal sacrifice. It is an honor to work with such a dedicated team committed to the greatness of our nation. https://dod.defense.gov/News/News-Releases/News-Release-View/Article/1722850/statement-from-acting-secretary-of-defense-patrick-m-shanahan/

  • Daily Memo: Powering Down

    22 avril 2020 | International, Aérospatial

    Daily Memo: Powering Down

    Guy Norris As the airframers go, so goes the aircraft engine industry. After spending most of the past decade accelerating production to keep pace with unprecedented airliner delivery rates the engine makers have spent the past month in reverse thrust. But as production lines slow, and in some cases come to a full stop, the grim guessing game about the industry's post-COVID-19 pandemic future can begin. For every engine company, anchored midway between their own supply chains and Airbus, Boeing and Embraer in particular, all scenarios paint a bleak picture and the potential impact of the virus-triggered crisis is alarming on at least three key levels. Near term, all must weather the storm and rapidly shrink capacity by 40% or even more to match the new realities of the slower airframe production rates now expected for the next couple of years. Second, having long since focused the core of their business models on the aftermarket, they must adjust to significantly lower revenues from a near term reduction in demand for maintenance, repair and overhaul (MRO) services. Third, with nearly all their resources dedicated to survival, reduced revenues and spending trimmed, development of new engines and propulsion technology is expected to slow significantly—at least in the near term. However, all the manufacturers know that in the mid-to-longer term the environmental pressures on performance will return and so will the relentless demand for lower emissions and greater innovation. Already committed programs will therefore continue, albeit potentially stretched over longer test and development schedules. From a volume perspective, GE Aviation and Safran's CFM joint venture is expected to see the greatest change. Having delivered 1,736 LEAP-1s and 391 CFM56-5/7s in 2019, output from the combined French and U.S. operations will decline significantly in 2020 in lockstep with urgent reductions in production at Airbus and Boeing. CFM, which was previously on track towards a planned annual production rate of more than 2,000 LEAP-1s by the end of 2020, cannot comment on numbers while its parent companies remain in a dark period prior to earnings calls at the end of April, but is expected to slash this target by around half. GE Aviation, which was already expecting a leaner 2020 before the COVID-19 pandemic because of delays to the GE9X-powered Boeing 777-9 and slow-downs to the GE90-115/GEnx-1 powered 777-200LR/300ER and 787 programs, is eyeing the even more troubling impact of the crisis on its aftermarket business. Although around a quarter of GE Aviation's revenues come from its military and other businesses, just 30% comes from commercial engine sales. A much larger portion of its revenue—approximately 45%—comes from MRO services. While some programs, like the CFM56 for the P-8 maritime patrol aircraft as well as military fighter engine efforts, will continue much as before, the company has already taken drastic action to stem losses by furloughing half of its engine manufacturing workers for four weeks. This move, taken in early April, followed an announcement in late March that it was reducing its workforce by 10% (around 2,500 employees), in direct response to the collapse of its MRO workload which the company estimates will be down by around 50% through mid-year at least. However, given the exodus of around two-thirds of the world's airline fleets into storage (almost 17,000 aircraft), the short to medium outlook for engine MRO would be described as dire at best. Compounding the issue for many of the OEMs is that the higher value aftermarket engines powering the widebody fleet, particularly the older generation Airbus and Boeing models, now look increasingly unlikely to ever return to service—at least in their existing guise. For Rolls-Royce, this problem is particularly acute as the UK engine maker focused increasingly on the widebody market over the past decade, widening its exposure to reliance on the support revenue from aftermarket work on older fleets of 747 and 777s as well as older A330s. With full-time premature retirement a possibility, including the previously unthinkable sunsetting of relatively young Trent 900-powered A380s as well as the rapid decline of the RB211-535 powered 757 and Trent 500-powered A340-600 fleets, the company can no longer bank on the expected rebound in deferred maintenance coming out of the crisis. Rolls has also rushed to mitigate losses by enacting measures aimed at saving at least £750 million ($937 million) in cash this year. These include a 10% salary cut for the global workforce and canceling dividend payments. Further moves are expected as the company adjusts to rate reductions announced by Airbus involving the Trent-powered A330no and A350-900/1000, as well as yet-to-be announced rate cuts for the Trent 1000-powered 787 which will shortly be revealed in detail by Boeing. Pratt & Whitney, now part of Raytheon Technologies, is similarly impacted across the board with production of the PW1000G geared turbofan reduced for the A220/A320neo families and commercial revenues hit by falling aftermarket revenues for the PW2000/PW4000 and V2500. Measures such as 10% pay cuts through year-end, as well as furloughs, are being introduced while research and development spending is being frozen. Deliveries of military engines, in particular the F135 for the F-35 fighter and PW4000 for the KC-45A tanker remain unaffected. The early retirements of the PW4000, as well as some CF6-powered fleets, is also significantly impacting revenues for German engine maker MTU. https://aviationweek.com/air-transport/aircraft-propulsion/daily-memo-powering-down

Toutes les nouvelles