Back to news

July 14, 2024 | International, C4ISR, Security

AT&T Confirms Data Breach Affecting Nearly All Wireless Customers

AT&T confirms major data breach affecting wireless customers. Hackers accessed call records and text interactions. Learn about the impact and security

https://thehackernews.com/2024/07/at-confirms-data-breach-affecting.html

On the same subject

  • What’s the best way for the Army to demonstrate force via electronic warfare?

    June 18, 2019 | International, C4ISR, Other Defence

    What’s the best way for the Army to demonstrate force via electronic warfare?

    By: Mark Pomerleau When the Russian military attacked Ukraine, it prevented units from communicating with each other by turning to powerful electronic jamming tools. The U.S. Army, however, is not interested in the same raw demonstration of force. Instead, U.S. officials are following a philosophy that relies on “surgical” attacks. This could include creating an image on enemy's radar, projecting an aircraft at one location when enemies think it is at another, or impairing the command and control links of adversaries' unmanned aerial systems. “When the Russians emit like that, they're letting the entire world know where they are,” Col. Mark Dotson, the Army's capabilities manager for electronic warfare said on a media call with two reporters June 14. “What we're looking at in the future ... [is] surgical electronic attack, electronic intrusion or 21st century electron attack. We're looking for much more discrete ways of conducting electronic attack. Using low power to affect the signal and to affect it in such a way that it may not even be detectable that you're interfering with what they're doing.” Dotson said instead of sheer power, future capabilities should focus on the end result, such as whether it's hurting an enemy's ability to communicate or to use radar. “There's a variety of different approaches that can be taken to create the effect necessary without having to do what we refer to as traditional jamming, which is just increasing the signal to noise ratio,” Dave May, senior cyber intelligence advisor at the Cyber Center of Excellence, said. Finding materiel solutions The officials spoke at the conclusion of Cyber Quest, a week-long technology experimentation that took place at Fort Gordon. Cyber Quest is a prototyping event that allows the Army to test technologies and concepts from industry to help solve future problems. This year, Army leaders focused on several areas. They include: Improving the requirements for the Terrestrial Layer System, an integrated electronic warfare and signals intelligence system that will provide a much-needed jamming capability to formations; Identifying candidates for rapid acquisition, and Conducting risk reduction against current programs and identifying candidates for electronic warfare capabilities to outfit the Intelligence, Information, Cyber, Electronic Warfare and Space detachment or I2CEWS, a battalion-sized unit described as the “brain” of the Army's multidomain task force. “Cyber Quest helps ... in that we are able to take these difficult challenges to industry, walk them through what we're trying to accomplish and let industry come back to us with novel approaches,” May said. “This pre-prototyping philosophy allows us to work through concepts, [tactics, techniques and procedures], and actually start the concept for doctrine.” At Cyber Quest, Army officials focused on the overall TLS system and two subsets: the Tactical Electronic Warfare System (TEWS) and the Tactical Signals Intelligence Vehicle. Both are integrated platforms the Army is using to experiment with different technologies that would allow for sensing, signals intelligence, electronic warfare and RF-enabled cyberattacks. May said these subsystems are in the pre-prototype phase. Army leaders also tested a spectrum analyzer tool that will notify commanders of the health of their systems within the electromagnetic spectrum. Such a tool would provide details on the footprint of blue force electromagnetic spectrum. The Army's current spectrum management program of record, Electronic Warfare Planning and Management Tool, only offers details on red force's in the spectrum relying on sensors in the field. By contrast, the spectrum analyzer tool the Army looked at during Cyber Quest is a handheld system that doesn't need to rely on the sensors that belong to tactical operational tools. There's been a focus across all the services in recent years to better understand their own electromagnetic spectrum as a way to prevent themselves from being detected and jammed or detected and killed. The details for when these capabilities would reach soldiers, however, is still in flux. If the Army has approved a requirement, a new product can be fielded to certain units under what the Army refers to as a buy, try, decide model. Capabilities can be fielded faster if they are funneled through the Rapid Equipping Force, though, they wouldn't become a program of record, but could be fielded to operational units that need it between 90 days and six months. If a capability goes through the Rapid Capabilities Office, it could take six to 18 months to get to units, Dotson said. May said the goal for TLS is to deliver a “validated requirement” to the program manager by third quarter of fiscal year 2020. That puts fielding in the 2022 or 2023 timeframe. Officials were a bit more circumspect on the Multi-Functional Electronic Warfare Air Large program, a first of its kind brigade-organic aerial electronic attack pod that will be mounted on unmanned systems. Lockheed Martin was awarded was awarded two sequential 18-month contracts valued at $18 million in January. Officials said it should be flying within the next 12 months but added that they want to see the product that ends up flying before forecasting a timeline for when it would reach units. https://www.c4isrnet.com/electronic-warfare/2019/06/17/whats-the-best-way-for-the-army-to-demonstrate-force-via-electronic-warfare/

  • FAA Limits Pentagon Link 16 Access Over Interference Concerns

    February 1, 2022 | International, Aerospace

    FAA Limits Pentagon Link 16 Access Over Interference Concerns

  • DoD and Australia ink first-ever cyber training partnership

    December 9, 2020 | International, C4ISR, Security

    DoD and Australia ink first-ever cyber training partnership

    Mark Pomerleau WASHINGTON — The U.S. military and Australia announced a first-of-its-kind agreement to develop a virtual cyber training range together. U.S. Cyber Command will incorporate Australian Defence Force feedback into the Persistent Cyber Training Environment (PCTE), per a Cyber Training Capabilities Project Arrangement signed Nov. 3. This agreement is valued at $215.19 million over six years and provides the flexibility to develop cyber training capabilities for the future, Cyber Command said in a release Dec. 4. PCTE is an online client that allows Cyber Command's warriors to log on from anywhere in the world to conduct individual or collective cyber training and mission rehearsal. In the physical world, military forces regularly go to a training facility, such as the National Training Center at Fort Irwin, to work on particular concepts or rehearse before deploying. But a robust environment has not existed for the Department of Defense's cyber warriors, creating readiness gaps. The program is run by the Army on behalf of the joint cyber force. “Australia and the U.S. have a strong history of working together to develop our cyber capabilities and train our people to fight and win in cyberspace,” said Australian Army Maj. Gen. Marcus Thompson, the Australian signatory and head of Information Warfare for the Australian Defence Force. “This arrangement will be an important part of the ADF's training program, and we look forward to the mutual benefits it will bring.” In the past, the two countries created cyber training ranges separately, which could take months and stymied cooperation efforts, Cyber Command noted. U.S. officials have long held that the military will never fight alone, and this extends to cyberspace. “This project arrangement is a milestone for U.S.-Australian cooperation. It is the first cyber-only arrangement established between the U.S. Army and an allied nation, which highlights the value of Australia's partnership in the simulated training domain,” said Elizabeth Wilson, U.S. signatory and Deputy Assistant Secretary of the Army for Defense Exports and Cooperation. “To counter known and potential adversarial threats, the Army has recalibrated our strategic thinking; we've made smart decisions to refocus our efforts to invest in the new, emerging and smart technologies that will strengthen our ability to fight and win our nation's wars.” Gen. Paul Nakasone, head of Cyber Command and the National Security Agency, has made partnerships — with other nations, private sector actors and academia — a key pillar of his tenure. Cyber Command has deployed personnel to other nations to conduct what it calls hunt forward missions, which serve the dual role of helping shore up defenses of partners while allowing U.S. cyber personnel to potentially uncover tools used by adversaries to better understand their techniques. Congress, in the annual defense policy bill for fiscal 2021, also authorized a pilot program with Vietnam — which many cyber experts assert is rapidly growing its cyber capabilities — Thailand and Indonesia to enhance their cybersecurity, resilience and readiness of military forces. https://www.c4isrnet.com/cyber/2020/12/04/dod-and-australia-ink-first-ever-cyber-training-partnership/

All news