What's new

US military news, discussions and history

Long double fighter F-82F Twin Mustang from the 449-th all-weather fighter squadron of US Air Force airbase Ladd, Alaska; 1952 Year
0_1424fc_2b987e2c_XL.jpg

0_1424f9_1cdc6f76_XL.jpg

0_1424fb_6863cfaf_XL.jpg

0_1424ff_31010bf1_XL.jpg

0_142500_3798114c_XL.jpg

477768 - "Спарки на службе"
 
.
How DoD is making cyberattacks more costly, less successful
How DoD is making cyberattacks more costly, less successful

One of the best ways to reduce the cyber threat is to make it harder and more costly for adversaries to initiate attacks, says Defense Department CIO Terry Halvorsen. Powerful and innovative security measures such as multifactor authentication and biometrics, along with strategic security planning and training, could make launching attacks on DoD resources time-consuming and futile.

“The approach to cyber defense is expanding from its original roots, which was to defend the network technically at the point of entry from the public Internet using firewalls and malware signature recognition,” said Mark Testoni, president and CEO of SAP National Security Services. “Instead, cyber is now being understood as a warfare domain, much like the other domains of air, sea, land and space.”

Cyber changes rapidly, according to Henry Muller, director of the U.S. Army Communications-Electronics Research, Development and Engineering Center (CERDEC). “In less than two decades, cyberspace has radically transformed how the Army operates and wages war,” he said. “Unlike the physical domains, cyberspace will continue to grow and is projected to reach over 100 billion connected devices within just the next 10 years.”

Bharat Doshi, CERDEC’s senior cybersecurity research scientist, noted that many different processes, policies and technologies can be used to make it costlier for adversaries to mount a successful attack. “Since the operational discipline and hygiene are critical first lines of defense, basic but persistent improvements in these areas will make it more expensive for an adversary to succeed,” he said.

CERDEC is currently researching several promising technologies, Doshi said. “One general class of technologies involves obfuscation, which prevents the adversary from getting valuable information even if they are able to observe our systems. Encryption of data at rest, data in transit and data in processing provides one way of obfuscation.”

Another approach designed to enhance cybersecurity is the “moving target defense,” in which several key network and processing system aspects change either periodically or randomly, preventing snoopers from developing a detailed understanding of operations. “Changes may also be executed after detection of a cyberattack ... to prevent the successful intruder from causing further damage,” Doshi said.


MFA and biometrics

The DoD and other agencies should be looking at multifactor authentication (MFA) to help reduce exposure caused by phishing campaigns and login compromise, said Steve Orrin, federal chief technologist for Intel. Orrin also recommended that agencies consider augmenting MFA with contextual security controls such as location, device identity, device trust attestation and network access point.

“Adding these controls to existing or new MFA-based approaches will provide better security posture and allow for more granular controls and policy enforcement,” he said.

An expansion of the use of MFA has been on DoD’s road map for a number of years and is slated to eventually become universally adopted across the department, said Adam Firestone, president and general manager of Kaspersky Government Security Solutions. He also said biometric authentication technologies are advancing and gaining operational traction.

CERDEC recognizes the advantages of biometrics for identification and authentication and believes its use will increase, Doshi said.

“CERDEC also recognizes challenges in using biometrics at the tactical edge in the middle of active fighting,” he added. “In this environment, soldiers may be required to operate in various levels of stress and mission-oriented protective postures, which hinder the use of biometrics.”

A combination of strong MFA along with an attribute-based access control forces an adversary to devote significantly greater resources to penetrating and effecting lateral movement within a network, Firestone said. “Encrypting everything reduces or eliminates the payoff for an attack,” he said. “Continuous monitoring reduces the amount of time an adversary has to exploit a breach, and a trap, or honeypot, causes the attacker to expend resources on a useless and potentially dangerous — to them — target.”

Promising innovations

Security innovations exist at both the platform layer and for the data center and security operations center, Orrin said. “New features in hardware and software allow for inline memory protection and containerization that provide security to applications and data in hostile environments subject to malware and other exfiltration attacks,” he said. “New models for software-defined networking and network function virtualization can allow a network to be more dynamic, resilient and can automate threat responses, mitigations and forensics/honeypotting.”

Analytics applied to threat intelligence represents the next wave for gaining better insight and faster detection of threats and attacks, he said.

Earl Matthews, a retired Air Force major general and vice president of enterprise security solutions for Hewlett-Packard, advocates the adoption of active hunting for pending attacks, encryption and using a diversified technology base.

“This is controversial, because a homogenous network is less costly to manage, patch and maintain in compliance,” Matthews said. “But static networks enable the adversary to perform long-term targeting operations and homogeneity actually narrows their attack solution.”

Under a diversified technology architecture, it is possible to decrease the technical vulnerability risk across the enterprise and reduce supply-chain risk while making the adversary spread their resources more thinly, he said.

“To strengthen our security posture, it’s time to think beyond the traditional perimeter,” Testoni said. Cybersecurity needs to be less about walls and moats and more about analyzing behavioral anomalies in networks and systems.

“In our current threat landscape, we have to assume that the wall has been breached in network defenses,” he said. “This is because the weakest link in cyber defense is the behavior of users and the effectiveness of social engineering methods, such as phishing, or even willful breaches by insiders.”

Testoni believes that behavioral analysis of network devices and users, utilizing machine-learning algorithms and other techniques, will be necessary to give commanders situational awareness and, ultimately, complete command and control over the cyber domain.

Training the weakest link

Humans are the weakest link in network security, so end-user training is critical, Doshi said.

“They are the first line of defense,” he said. “Lack of discipline and operational hygiene will provide an easy access for an adversary.”

Yet people can also serve as security sentinels. “End users reporting anomalies will help the system operators to identify intruders faster and more accurately,” he said. “Training could be very useful in leveraging these ‘human sensors.’ ”

Training programs must be geared toward specific user roles, said William Senich, global cyber solutions director for Alion Science and Technology.

“While there are basic security rules by which everyone must abide, people in certain jobs may require specialized training that teaches them how to recognize threats unique to their positions,” he said.

A technical specialist with high-level access privileges, for example, may require specialized training that differs greatly from the training needed by colleagues with limited system access.

“Of course, people in either role are vulnerable to the same commonly observed threats, from one-off penetration attempts to, in some instances, sustained persistent attacks,” Senich noted.

Approaches and tactics

The DoD and other agencies need to improve contextual security by integrating security products and technologies across security solutions and security domains, while also taking an end-to-end view of how to protect data and systems, Orrin said.

The best way to secure massive amounts of information in the shortest length of time is to follow a strategic, layered approach, Matthews said. The goal “is to ensure that the most valuable data has the most protection, and security resources are allocated accordingly,” he said.

Matthews also advocated taking the cyberwar directly to the adversaries. “Perform counter-intelligence operations to disrupt the adversary’s development, deployment, doctrine and dogma,” he said.
 
. .
US Navy railgun research and progress
Next Big Future: US Navy railgun research and progress

http://www.onr.navy.mil/en/Conferen...r-Warfare-Electromagnetic-Railgun-Lasers.ashx

The Navy is already working on a railgun that would allow for 10 shots per minute. This “rep rate” version, despite challenges including thermal management in the barrel, is expected to go to sea by FY 2019.

There will be railgun tests in 2016, where about 20 shots will be fired at targets 25-50 miles away.

Once the Navy reaches the higher-powered laser gun and the more operationally useful “rep rate” railgun, the service will have to figure out how to deploy them. Fuller said the Navy just wrapped up a feasibility study on the Zumwalt-class DDG-1000 destroyers, and leadership will be briefed on the results soon. Other studies, including one on the Arleigh Burke-class DDG-51 destroyers, are ongoing.











 
.
image.jpg
image.jpg
image.jpg
image.jpg
image.jpg
image.jpg


Lockheed receives $431M to support F-35 production ramp up
Lockheed receives $431M to support F-35 production ramp up - 8/5/2015 - Flight Global

Lockheed Martin has received $431 million for special tooling and test equipment to support the ramp up of F-35production over the coming years.

The hefty sum was awarded as a modification to the current Lot 8 production contract, and comes as Lockheed and the Pentagon negotiate the purchase of approximately 150 domestic and international aircraft in Lots 9 and 10.

The current contract bought 43 aircraft with deliveries starting in 2016, whereas Lot 9 buys 57 aircraft and Lot 10 would secure just shy of 100 fighters, of which about 40% will be for international customers.

Of this latest award, the US Defense Department will pick up 70% of the tab ($300 million) and the international partners and foreign military sales customers will contribute $75 million and $56 million respectively.

“These items include special tooling and special test equipment items that are critical to meeting current and future production rates,” the August 4 contract announcement says.

Production is expected to peak at upwards of 160 aircraft per year after 2018, according a Lockheed chart.
 
.
US Navy About To Double Its LCS Fleet
US Navy About To Double Its LCS Fleet

MARINETTE, Wis. — The launch of a new littoral combat ship on July 18 was another festive occasion here at Fincantieri Marinette Marine, marking the fifth time this heartland shipyard has put an LCS in the water.

But the Little Rock (LCS 9) will also become a milestone departure of sorts for the US Navy's LCS program when, after she's delivered to the fleet next year, the warship will be the first East Coast-based LCS, operating from Mayport, Florida. The first eight LCSs — half of which already are in service —– are based at San Diego.

"All of the odd-numbered hulls starting with 9 won't have to go through the Panama Canal," noted Rear Adm. Brian Antonio, program executive officer for LCS and the Navy's top official on the program. "The Mayport basin is smaller, so [they] get the monohull versus the trimaran."

Antonio spoke in July at Marinette, taking a break from a program review held just prior to the Little Rock's launch.

Freedom-class ships — the ones built at this shipyard under contract to Lockheed Martin — are 387-foot-long monohulls with a 58-foot beam, all with odd numbers in the Navy's LCS designation system. The trimaran-hulled Independence class, built by Austal USA in Mobile, Alabama, and carrying even hull numbers, are 418 feet long with a beam of 104 feet. The smaller Freedom class is easier to handle in the relatively confined Mayport basin, enclosed on three sides, while the California base sits along much wider San Diego Bay.

Another consideration for placing Freedom-class LCSs in Mayport, Antonio noted, is the experience already gained operating the surface warfare mission module, deployed aboard the Freedom during its 2013 deployment to Singapore and currently operated in the southwest Pacific by the Fort Worth. While the Mayport-based ships are expected to conduct deployments operating out of Bahrain in the Arabian Gulf, they'll also be called upon for more operations closer to home.

"If they are not going to Bahrain and you deploy them to the Fourth Fleet [around Central and Latin America] and you are doing counter-drug operations, a surface warfare mission package would be more appropriate to use as opposed to mine countermeasures or anti-submarine warfare" package, Antonio noted.

The ships of the Independence class have yet to officially operate a surface warfare package, although a module using most of the available components was shipped on the Independence last summer when the Navy made a late decision to send the LCS to RIMPAC, a major fleet exercise held every two years off Hawaii. But the Coronado (LCS 4), now coming out of a yard period in San Diego, will soon carry out the first formal tests of the package on the class.

"This is the first full-up [surface package] test, with the 30mm guns, the VBSS [visit, board, search and seizure team], the 11-meter boat as part of the complete package," Antonio said. "She will go into her tech evaluation period, take a short break to look at the data and make sure that the systems are ready." By the end of September, he added, "I've got high confidence" the testing will be complete.

In 2017, Antonio said, the Coronado will become the first Independence-class ship to deploy to Singapore. By then, she's expected to join with one of the Freedom-class ships as the Navy tries operating both LCS variants simultaneously while forward-deployed.

"I don't like to use the word challenge, I like to use the word opportunity," said Antonio. "It was pretty easy to be focused on one ship and make sure it is going to be successful."

Program officials have been eager to point out how much better the Fort Worth's current deployment has gone compared with the earlier Freedom cruise.

"We have gotten a lot better with LCS 3 not only in the part support but understanding the command and control, how to contract for work getting done, the whole concept of the expeditionary maintenance," Antonio said. "We will use those concepts and those lessons-learned that were non-hull specific and we will apply them to LCS 4 when she comes over."

Comparative data made available by the LCS program illustrated the dramatic improvement of the Fort Worth over the Freedom cruise at the 180-day mark. Some examples: Fort Worth has been underway for 96 days out of 89 planned, while Freedom was underway for 51 days with 72 planned. The Fort Worth lost no days to maintenance, Freedom lost 21. Overall, the Fort Worth needed 8,100 fewer maintenance man hours than Freedom.

The four LCSs now in service will soon be joined by four more as the long construction pipeline begins to deliver ships at a much faster rate. The Jackson (LCS 6) is expected to be delivered to the Navy this month. The Milwaukee (LCS 5) will follow in October, the Montgomery (LCS 8) in December and the Detroit (LCS 7) in February. At each shipyard right now, three ships are in the water with four others ashore in various stages of construction.

As more ships enter service, the LCS crewing plan will become more apparent. Ships are being paired, with three crews rotating among the two ships. So, for example, the Independence (LCS 2) will relieve the Coronado in Singapore, and those two hulls will remain paired together.

"One and 3 are paired and 2 and 4 are paired in the 3-2-1 [crewing] concept," Antonio explained. "When 3 gets back 1 will deploy for her notional 16 months, be relieved by 3, be relieved by 1. The three crews rotate between those.

"There is a way to work it out where the crew is on board for notionally four months. When they finish overseas they come back and are shoreside for four months — leave period, training period, time to do personnel turnover. I believe that would be the best time to bring new personnel in."

The LCS program is also developing a Flight 1 version referred to as a frigate. The program is still working to determine what specific components will be installed on the newer ships, scheduled to be included in the fiscal 2019 shipbuilding program.

"We are still in the system selection phase," Antonio said. "It will be happening throughout the summer and into the early fall. … The goal is in late 2017 to get to a technical data package that we can then turn into a request for proposal and give it to both the shipbuilders in time to inform a 2019 award."

Work is also moving ahead to determine what over-the-horizon missile system to use on the frigates. A request for information (RFI ) was issued in late June to gauge industry interest and capability in providing weapons, fire control systems, launch systems, software and electronics. The Navy, in the RFI posted on a government website, noted it is seeking a "non-developmental item solution."

Meanwhile, eight more LCSs need to be ordered between current contracts and the frigate variant, Antonio noted.

"We are not ready from a design perspective yet to go buy those frigates. We have to get the engineering work done," he said.
 
. . . . . . .
5 Things You Might Not Know About CVN 78/Ford Class
5 Things You Might Not Know About CVN 78/Ford Class | Navy Live

1) USS Gerald R. Ford (CVN 78) is the lead ship in the Ford-class of aircraft carrier, the first new class in more than 40 years. CVN 78 will be delivered in spring of 2016 as the fleet numerical replacement to CVN 65 (USS Enterprise). Follow on Ford class carriers will begin the phased replacement of Nimitz-class carriers.

131117-N-ZZ999-101.JPG

NORFOLK (Nov. 17, 2013) The aircraft carrier Pre-Commissioning Unit (PCU) Gerald R. Ford (CVN 78) is moved to Pier 3 at Newport News Shipbuilding. The ship will undergo additional outfitting and testing for the next 28 months. (U.S. Navy photo courtesy of Huntington Ingalls Industries by Chris Oxley/Released)

2) Because the island is smaller and farther aft than the Nimitz‐class, increasing space for flight deck operations and aircraft maintenance, CVN 78 is capable of generating 33 percent more sorties (flight missions) per day than Nimitz‐class carriers.

8414176488_a3910c3612_k.jpg

WASHINGTON (May 12, 2012) A design rendering of the nuclear-powered, aircraft carrier Gerald R. Ford (CVN 78). Gerald R. Ford is the first in a class of new carriers to be built by Huntington Ingalls Newport News Shipbuilding. (U.S. Navy photo illustration courtesy of Newport News Shipbuilding/Released) 100512-ZZ999-201

3) An Electromagnetic Aircraft Launch System (EMALS), similar to the system that powers many of today’s roller coasters, replaces steam catapults, enabling a smoother launch and capability to support the air wing of the future.


4) The Ford class design enables the Navy to operate the ship with less manpower, saving the Navy more than $4 billion in total ownership costs over each ship’s 50‐year life, when compared to today’s Nimitz class aircraft carriers.

5) CVN 78 is the first aircraft carrier to make a significant leap to electrical power, with three times the generating capacity of Nimitz class to allow replacing legacy steam‐powered systems and providing margins and ship weight allowance to incorporate future technologies.
 
. . .
Back
Top Bottom