Back to news

March 8, 2022 | International, Land

BAE Systems buys military simulations firm for $200 million

In the statement, BAE Systems said it expects the global market for military training and simulations environments to eventually surpass $11 billion annually.

https://www.c4isrnet.com/industry/2022/03/07/bae-systems-buys-military-simulations-firm-for-200-million

On the same subject

  • High-cost satellites remain vulnerable to low-cost threats

    April 24, 2018 | International, Aerospace, C4ISR

    High-cost satellites remain vulnerable to low-cost threats

    By: Daniel Cebul WASHINGTON ― Despite advances in satellite technology, many of the U.S. military's most expensive and necessary assets remain vulnerable to jamming from inexpensive tools, according to a new report from the CSIS Aerospace Security Project. “The technology needed to jam many types of satellite signals is commercially available and relatively inexpensive,” the report reads. Other electronic threats such as spoofing, which attempts to trick receivers into believing manipulated data from an attacker is real, also offer low cost options to adversaries who hope to interfere with satellite connectivity. These kinds of attacks can disrupt communications or position, navigation and timing techniques. The report, released April 12 and titled “Space Threat Assessment 2018,” notes that while United States near-peer adversaries have made strides in more advanced kinetic weapons, such as direct ascent anti-satellite weapons, jamming technology also is seen as critical. For example, “China has made the development and deployment of satellite jamming systems a high priority,” according to the authors, Todd Harrison, Kaitlyn Johnson and Thomas Roberts. Another near-peer, Russia, has displayed jamming and spoofing capabilities in the ongoing conflicts in Ukraine and Syria in the last several years. The report said the use of Russian technology in these conflicts “demonstrate[s] that Russia retains advanced electronic attack capabilities, despite some analysts' claims that Russia's ability to jam and spoof satellites has declined since 1991.” But the threat from jamming and spoofing attacks goes beyond near-peers. Iran and North Korea, so-called rogue states, also have demonstrated the capability and willingness to interfere with satellite communications and GPS signals, according to the report. And the ability to jam and spoof signals is likely to spread. The report notes once a jammer or spoofer is developed, “it is relatively inexpensive to produce and deploy in large numbers and can be proliferated to other state and non-state actors.” But the United States is not sitting by idly. The Air Force's Advanced Energy High Frequency satellites, reserved for secure communication, “incorporate a high degree of protection against jamming, spoofing, and other forms of electronic attack,” according to the report. The U.S. is also preparing troops to operate in GPS-denied environments. In January, the Defense Department jammed GPS-signals in western states so pilots could train in environments that will likely come to characterize combat in the age of electronic warfare. https://www.defensenews.com/digital-show-dailies/space-symposium/2018/04/16/high-cost-satellites-remain-vulnerable-to-low-cost-threats/

  • General Atomics, Raytheon contracted for Reaper drone support

    December 26, 2018 | International, Aerospace

    General Atomics, Raytheon contracted for Reaper drone support

    By Stephen Feller Dec. 24 (UPI) -- General Atomics and Raytheon have each been awarded contracts for support of the MQ-9 Reaper, one for sensors and the other for overall program support, that come to a total of more than $350 million. The contracts, announced Friday by the Department of Defense, cover separate areas of sustainment for the unmanned aerial system used for surveillance and support of ground troops, though they have also been used for emergency search and rescue and other missions. Full article: https://www.upi.com/Defense-News/2018/12/24/General-Atomics-Raytheon-contracted-for-Reaper-drone-support/8251545664925/

  • The Army looks to build up its cyber arsenal

    May 8, 2019 | International, Land, C4ISR

    The Army looks to build up its cyber arsenal

    By: Mark Pomerleau The Army is building a new tactical cyber force and it's going to need an arsenal. Immediately stocking one is another story, however, because “offensive cyber” tools are currently developed and owned by U.S. Cyber Command for the joint mission, so the Army is working on how to best equip its teams' specific needs. The Army's 915th Cyber Warfare Support Battalion (CWSB) will be capable of conducting localized cyber effects through the electromagnetic spectrum, rather than the IP-based operations conducted by Cyber Command, though it might have a tie-in with these forces and capabilities. The CWSB will operate as an Army Cyber Command asset. It will live at the division level with 12 expeditionary cyber teams, each consisting of 45-person detachment-sized elements that will be in support of brigade combat teams and arrayed over that brigade's battlespace on the ground. They will likely operate alongside companies. In order to prepare these new cyber teams, the Army will have to work through the Joint Cyber Warfighter Architecture (JCWA), a singular approach to tools and platforms for high-end, remote cyber operators established by Cyber Command. “By defining that architecture, then Cyber Command encourages the service cyber components with their acquisition entities to propose capabilities that would meet that architecture,” Ronald Pontius, deputy to the commanding general at Army Cyber Command, told Fifth Domain on the sidelines of an industry conference May 1. “Cyber Command should lead the architecture and standards, then they should be looking to the services to actually build the capability.” The JCWA is intended to guide capability development across all the services, as Cyber Command doesn't want capabilities designed and used by one service. How that translates into equipping these Army-specific entities requires working out “synergies” between that tactical force and the larger force, so determining what common and custom tools the CWSB uses will be in concert with the joint Cyber Command forces. “It all has to be integrated from top to bottom,” Kenneth Strayer, deputy program manager for electronic warfare and cyber at Program Executive Office-Intelligence, Electronic Warfare and Sensors, told Fifth Domain. “All the way from sanctuary through developing capabilities to delivering capabilities. This all has to be integrated and it's all nested on Cyber Command and ARCYBER, [which] is a component, and the tactical units are all nested under ARCYBER.” Strayer added that he wouldn't separate them, but obviously the needed capabilities will be different depending on the placement of units, either in the close fight on the ground or in remote sanctuary. Questions Army Cyber Command leaders will have to wrestle with regarding using tools from the joint force at the tactical level include what infrastructure forces will operate on, and whether the tool will be attributable or not. Pontius said generally tools should be 100-percent attributable in the tactical space [letting victims know the United States is attacking them as a deterrent of further action], while that is not always the case in the joint environment. Having the CWSB in Army Cyber Command and not distributed throughout the service, he added, aids in answering these questions, optimizing tool development, and keeping the force trained and certified much more efficiently than if members of this force were spread out across different Army entities. One way the Army is potentially benefiting the CWSB separate from the joint mission is a recent $1 billion contract for research and development work in support of the cyber mission. Contractors awarded are tasked with providing research into cyber and electromagnetic activities (CEMA) capabilities. The contract currently is not asking for any materiel development. https://www.fifthdomain.com/dod/army/2019/05/06/the-army-looks-to-build-up-its-cyber-arsenal/

All news