Back to news

May 9, 2024 | International, Aerospace

Capella Space automates vessel classification in satellite imagery

“There might be a lot of different locations you’d be monitoring that you’re not really interested in — until a warship shows up.”

https://www.defensenews.com/industry/2024/05/09/capella-space-automates-vessel-classification-in-satellite-imagery/

On the same subject

  • Navy Receives Production Approval for Next-Generation Air Combat Training System - Seapower

    May 4, 2021 | International, Aerospace, Naval

    Navy Receives Production Approval for Next-Generation Air Combat Training System - Seapower

    PATUXENT RIVER, Md. — The Naval Aviation Training Systems and Ranges program office (PMA-205) received Milestone C approval for its next-generation air combat training system, the Tactical Combat Training System Increment II (TCTS II) on April 27, the Naval Air...

  • USAF Scoping Out Upgrades to Counter-UAS Weapons

    October 21, 2020 | International, Aerospace, C4ISR

    USAF Scoping Out Upgrades to Counter-UAS Weapons

    Rachel S. Cohen The Air Force is in the market for upgrades to its counter-drone technologies, according to an Oct. 16 request for information posted on a federal contracting website. The service is in the early stages of deploying lasers, microwaves, and other weapons more advanced than a shotgun to deal with potentially threatening drones loitering around bases. In particular, the RFI is looking for ideas to fend off the smallest unmanned aerial systems like quadcopters. “These threats may have characteristics such as small size, low radar cross-sections, low infrared or radio frequency signatures (or no RF signatures), ability to hover, and low-altitude flight capability, which may render them difficult to detect and/or defeat,” the Air Force stated. “These UAS are typically either controlled remotely from a ground control station or capable of flying pre-planned routes.” Cheap aircraft can be turned into battlefield weapons when modified to drop hand grenades, and they can spy on military installations or heavily damage jets if sucked into an engine. American military officials have warned for years that small drones pose a pervasive threat to troops in the Middle East. Over the next year, the Air Force wants to pursue updates to counter-drone command-and-control, radar, and electronic warfare systems related to directed-energy weapons. It's soliciting concepts in 12 areas from lethality to crunching weather data. Responses are due Nov. 17. For instance, the service suggests automating the process of targeting, tracking, and shooting at an incoming drone instead of relying as heavily on a human operator. “At a minimum, the ideal configuration is for [a high-energy laser] system to have its beam director/optics automate all steps between acquisition, tracking, aimpoint selection, and only requires a human to interact with it through final approval to fire from operator/battle commander,” the RFI said. The service also considers being able to compile and send reports with the details of drone threats and conflicts to other units, which could give the military a better understanding of an enemy in a particular area. Pentagon researchers are looking into several different counter-UAS system designs spanning the weapons themselves to the subsystems that point and shoot them. The Air Force is currently testing high-powered lasers and microwaves overseas while it takes less-destructive approaches—like using gun-fired nets to trap quadcopters—in the continental U.S. https://www.airforcemag.com/usaf-scoping-out-upgrades-to-counter-uas-weapons/

  • How would NATO respond to a cyberattack?

    May 17, 2018 | International, C4ISR

    How would NATO respond to a cyberattack?

    By: Martin Banks NATO Secretary General Jens Stoltenberg says “it is time we all woke up to the potential dangers of cyber threats.” Speaking at a conference on cyber crime in Paris May 15, Stoltenberg said, “In the Second World War there was a popular saying, ‘Loose lips sink ships.' Today, it is weak passwords, failing to add software updates, or opening unfamiliar emails. Simple things. But if we get them right, we go a long way to protecting ourselves.” Stoltenberg was speaking at the Ecole Militaire in the French capital on a major conference on NATO's so-called “Cyber Defence Pledge” which, he said, had helped nations to look at their cyber-defences in a more holistic way. NATO countries have faced a series of attacks in recent years. In France, TV-Cinq Monde was taken off air by hackers while Fancy Bear, a group associated with the Kremlin, hacked the main political parties in the United States in what Stoltenberg called “a brazen attempt to influence the 2016 election.” Last year's WannaCry attack forced Renault to halt production at several of its factories and a cyberattack brought hospitals in the UK to a standstill. “The very nature of these attacks is a challenge,” Stoltenberg said. “It is often difficult to know who has attacked you or even if you have been attacked at all. There are many different actors. “Governments, but also criminal gangs, terrorist groups and lone individuals. Nowhere is the ‘Fog of War' thicker than it is in cyberspace,” he said. “If these were hard attacks, using bombs or missiles instead of computer code, they could be considered an act of war. But instead, some are using software to wage a soft-war - a soft-war with very real, and potentially deadly consequences.” In 2014, NATO leaders agreed that a cyberattack could trigger Article 5, meaning that an attack on one ally is treated as an attack on all allies. He added, “I am often asked, ‘under what circumstances would NATO trigger Article 5 in the case of a cyber-attack?' My answer is: we will see. The level of cyberattack that would provoke a response must remain purposefully vague as will the nature of our response. “But it could include diplomatic and economic sanctions, cyber-responses, or even conventional forces, depending on the nature and consequences of the attack.But whatever the response, NATO will continue to follow the principle of restraint. And act in accordance with international law.” In less than two years, almost every ally had upgraded their cyber defences with France leading the way, investing €1.6 billion and employing thousands more cyber experts. He also pointed to Nato's new Command Structure and Cyber Rapid Reaction teams. https://www.fifthdomain.com/international/2018/05/16/how-would-nato-respond-to-a-cyber-attack-well-see/

All news