Partage des données et des informations : Partager quoi, comment et avec qui ? Vers la diffusion d'une information « édulcorée ». Sur le volet LIO, aucune information ne sera partagée. Pour la BITD et donc sur le volet LID, les échanges pourraient porter sur : les attaques (et les tentatives), les indicateurs de compromission, les codes malveillants et les modes opératoires.

defense.gouv.fr/comcyber/actua

« We are realizing we have to build essentially an EW arsenal across the landscape to be able to go at these different types of threats » ( Brig. Gen. Ed Barker, PEO IEW&S )

c4isrnet.com/battlefield-tech/

« On ne créera le secteur naval de défense européen que s'il y a volonté politique de partage de souveraineté. » ( Alain Bovis )

cercle-k2.fr/etudes/l-industri

Cybersecurity Investment Priorities - FY 2025 Budget

Guidance on cybersecurity research and development priorities « will be » released in a separate memorandum.

5 pillars of the NCS :

Defend critical infrastructure

Disrupt and dismantle threat actors

Shape market forces to drive security and resilience

Invest in a resilient future

Forge international partnerships to pursue shared goals

whitehouse.gov/wp-content/uplo

The changes are part of a congressional mandate in the 2023 NDA Act.

About 300 officers focusing on offensive and defensive cyberspace operations.

The U.S Navy will replace its Cryptologic Technician-Networks (CTN), rating with that of « cyber warfare technician ». But though the name is changing, job duties will stay the same.

Our cryptologists historically have been focused on signals intelligence, electronic warfare, maneuver and the electromagnetic spectrum, information operations. And when we first expanded into the cyber role, we aligned a lot of cyber responsibility with them because of their electronic and signal savvy ( Vice Adm. Kelly Aeschbach )

By the year 2040, Next-Generation AI-enabled systems will radically obfuscate the battlefield, disrupt traditional ideas of power, and fundamentally alter war. AI is the primordial technology guiding this change during the information age.

The CNAS Artificial Intelligence and Global Security Initiative explores how the artificial intelligence (AI) revolution could lead to changes in global power, the character of conflict, and crisis stability.

The accelerating maturation of artificial intelligence will shatter current notions of the character of war.

mwi.usma.edu/introducing-the-a

Guerre en : « La va s'engager plus franchement sur des domaines comme le , le spatial, le renseignement, la défense sol-air de nouvelle génération et les »

defense.gouv.fr/actualites/lpm

Plus anciens
nanao

Comme le soleil, les machines ne se couchent jamais.