Back to news

June 5, 2024 | International, Aerospace

DARPA project uses AI to flag space weapons, spy satellites

Through the DARPA project, Slingshot Aerospace created an AI tool to spot nefarious satellites that could be hiding in large constellations.

https://www.c4isrnet.com/battlefield-tech/space/2024/06/05/darpa-project-uses-ai-to-flag-space-weapons-spy-satellites/

On the same subject

  • See the ultralight cardboard drone donated to Ukraine

    September 13, 2023 | International, C4ISR

    See the ultralight cardboard drone donated to Ukraine

    Made with cardboard, wooden dowels and rubber bands, this disposable drone adds another flexible option to militaries around the world — including Ukraine.

  • ‘Red Air’ providers prep for a big year of war games

    January 14, 2020 | International, Aerospace

    ‘Red Air’ providers prep for a big year of war games

    By: Valerie Insinna WASHINGTON — Last year, the Air Force tapped seven defense companies for a $6.4 billion opportunity for “Red Air” training where contracted pilots pose as aggressors in air-to-air combat. With the fiscal 2020 budget finally approved, those firms are hungry to hear for more information about when and where they start flying. The companies — Air USA Inc., Airborne Tactical Advantage Company (ATAC), Blue Air Training, Coastal Defense, Draken International, Tactical Air Support and Top Aces Corp. — currently find themselves waiting for the next phase of the competition, when the Air Force will issue individual work orders for a total of 22 bases that will allow contractors to begin flying this year. “I think we've all watched the Air Force program develop over the last two years kind of in awe at the size of it and the ambition, the commitment they're making to have enough adversaries out there to challenge their pilots,” said Russ Bartlett, CEO of Textron Airborne Solutions, which is the parent company of ATAC. “That's great for industry, because the Air Force knows they need to do that.” Unlike major programs for weapon systems, which have a dedicated line item in the budget, the work orders for adversary air services will be paid out of the operations and maintenance account, which is more flexible. While the Air Force's FY20 budget request flags a $151 million increase for “contract air training,” it's unclear how much of that amount will ultimately be set aside for that adversary air services. It will be up to Air Combat Command “to decide how much money they're going to put against the adversary air budget. So we're really just waiting to figure out how that all works,” said Russ Quinn, president of Top Aces. “We and the program office are looking very forward to hearing how Air Combat Command is planning on funding the contract.” Draken International is already conducting aggressor flights at Nellis Air Force Base, Nev., as part of a five-year contract awarded in 2018. That work is helping the company keep its Red Air planes ready ahead of work at other bases, said Sean Gustafson, Draken's vice president of business development. "We're flying 6,000 to 7,000 hours a year out there right now,” he said. “We're excited for the task orders to come out shortly, looking to expand and set up operations on the East Coast and then supporting those bases.” The Draken pilots, who currently fly the Aero Vodochody L-159E Honey Badger and Douglas A-4 Skyhawk, regularly deploy from Nellis AFB and visit other installations, including Hill AFB in Utah, Eglin AFB in Fla., and Holloman AFB in N.M. The company will begin adding Mirage F1s to the mix next month, Gustafson said. “We're very excited about that, because that will be the first radar-equipped, supersonic aircraft in the industry. We have the first three [of 24 total] going out there in February,” he said. The company has also purchased 12 radar- equipped, supersonic Atlas Cheetah fighters that will help cover Air Force requirements outside of Nellis. Meanwhile, the other companies are doing training and modifications necessary to get their aggressor fleets ready to fly whenever the U.S. Air Force decides it needs those planes. Top Aces has purchased 29 used F-16s from an undisclosed user specifically for the Air Force's adversary air contract. Those aircraft are not yet in the United States, but Quinn is confident that the company will have the aircraft in hand in early spring, he said. After that, Top Aces will begin modifying each jet with an open architecture system that will allow the company to more easily outfit the aircraft with a range of radar, sensors, electronic warfare pods or other technologies that increase the capability of Red Air forces, he said. Depending on whether the company wins a contract with Germany for adversary air services, it may also have excess capacity with its Douglas A-4N Skyhawk fleet, which it could also offer to help supplement the U.S. Air Force's needs, Quinn said. ATAC plans to use its new fleet of Mirage F1 jets to meet the Air Force's requirements. So far, the company has fully trained one F1 pilot, who flew the first ATAC Mirage in August. Another two pilots were set to begin training in December, Bartlett said late last year. “On the airplane side, we're in really good shape. Sixty-three airplanes is a huge win for us. There are a lot of economies of scale that we intend to capitalize on,” he said. “The challenge is going to be — of course — hiring and retaining pilots. The services are trying keep their pilots and grow their pilot cadres; the airlines are hiring aggressively and paying lucrative salaries, and this industry is growing by leaps and bounds with just this Air Force program.” So far, recruiting pilots has not been a problem for Draken, Gustafson said. The company has employed 52 aggressor pilots to meet the demands of its contract with Nellis, and has a “stack of resumes” from pilots that jobs as the company expands to other bases. “We're doing well on [hiring],” he said. “Some folks, they don't want to go to the airlines. They recently retired from the military and they want to keep flying fighters.” The company is looking to grow its fleet with new aircraft, as well, he added. “We should have some pretty exciting news about five to six months from now,” he said. https://www.defensenews.com/air/2020/01/13/red-air-providers-prep-for-a-big-year

  • For the Navy’s hospital ships, networking is yet another challenge

    April 22, 2020 | International, Naval, C4ISR

    For the Navy’s hospital ships, networking is yet another challenge

    Andrew Eversden When the Navy hospital ship Comfort deployed to Haiti in 2010 following devastating earthquakes, media organizations broadcasting in the area ate up so much satellite bandwidth that the ship had to revert to paper processes and adjust its satellite communications for some ship-to-shore messaging. While the outages weren't a widespread issue, said Sean Kelley, who served as the ship's top IT officer at the time, the problem highlighted a challenge these ships face: broadband. Now, the hospital ships Mercy and Comfort are deployed to Los Angeles and New York, respectively, and are in the national spotlight as symbols of the coronavirus pandemic relief effort. But security and IT experts say the ships' mission presents the Navy with distinct networking problems, from cybersecurity to network connection for patients. Onboard devices When disaster strikes, the Navy's hospital ships deploy in a matter of days, mobilizing with a crew of about 100-1,200 personnel. But the influx of staff also leads to an incursion of devices, all of which must be secure and require bandwidth. “You have a lot of different people going to a lot of different places that now have to be acclimated to this environment,” said Kelley, now executive vice president at Unissant, an IT and cybersecurity company. “So that's really one of the biggest challenges, is getting all those things turned on, all those things activated, making sure that they are all compliant with the latest patches and fixes, and making sure they're good.” This process can be a “nightmare,” said retired Rear Adm. Danelle Barrett, former deputy chief information officer of the Navy and cybersecurity division director. “The challenging part is always in the first couple days whenever this happens,” said Barrett, who oversaw communications and cyberspace for Operation Unified Response, the U.S. military's mission in Haiti following the 2010 earthquake. “The team is coalescing about how they want to operate, and they're getting their feet wet, getting new accounts on networks ... [getting] their logins.” Cybersecurity aboard the ships is also complex. Both ships have 1,000 beds, 12 operating rooms, blood banks, labs, medical devices and a multitude of other “internet of things” devices connected to hospital beds. According to a 2018 survey by health care IoT security company Zingbox, each bed can have as many as 10-15 IoT devices. “They have to be cyber-ready, or the mission of the Mercy is considered [degraded],” said Dean Hullings, global defense solutions strategist at Forescout, which handles Comply to Connect — a Defense Department framework created to ensure the cybersecurity of new devices — for the USNS Mercy. Ensuring connectivity For the devices to function, they need connectivity. When the ships arrived in ports in late March, technology firm CenturyLink “donated” connectivity to the Mercy, while Verizon provided connectivity to the Comfort. Former and current Navy officials told C4ISRNET that adequate broadband is the most challenging IT consideration faced by these ships. “Obviously you're going to be transferring imagery of X-rays or things like that that are more dense and require a ... higher data rate, so that bandwidth in port is important,” Barrett said. And with the introduction of patients, bandwidth needs become more complex. “The greatest communications challenge we are going to face during this deployment is the increased need for patients to communicate off the ship during their stay,” Tom Van Leunen, a spokesman for Military Sealift Command, told C4ISRNET. “Our hospital ships are designed to support official communication for the ship's crew and embarked medical community to complete their job. Adding a capability for patients to reach loved ones increases the risk of saturating the bandwidth off the ship.” Aboard both ships, the Navy doubled the bandwidth, he said, adding that Navy personnel also set up separate networks for patients' communications. While this solves one networking problem, it can also create an increased cybersecurity risk. Securing the ships Cybersecurity on the hospital ships follows the same standard practices as the rest of the Navy fleet. Since those aboard are largely Navy medical staff and personnel, they know what activities are acceptable on the network, Barrett said. “You can't just go and plug anything into that network because of potential vulnerabilities that that system may bring that could affect not just the ship, but remember, the ship is then connected to the rest of the [Department of Defense Information Network],” Barrett said. “So risk by one is shared by all.” ForeScout's Hullings said a hospital environment “epitomizes” why the Comply to Connect program is necessary. The ship has desktops, servers, routers, printers and other networks equipment, as well as mobile devices, such as tablets, that health care providers use to track patient care. “The truly unique stuff is the mission systems of the hospital, like X-ray machines, MRI machines, the beds themselves in the post-operative recovery rooms, that are all sensors. And they are all passing data. They have to be protected,” Hullings said. A spokesperson for the Navy told C4ISRNET that the ships are prepared for the cybersecurity challenges associated with their missions, but declined to address what additional cybersecurity challenges are introduced with the addition of private citizens. “These ships have routinely deployed in humanitarian assistance missions such as Pacific Partnership (USNS Mercy) and Continuing Promise (USNS Comfort) that required them to operate in partner nation ports, with foreign national patients being brought to and from the ship,” said Cmdr. Dave Benham, a spokesman for the Navy's 10th Fleet. “In all operating locations, we take appropriate precautions to keep our networks secure, and we do not discuss specific measures in order to protect operational security.” Cybersecurity on the hospital ships follow the same protocols as any other Military Sealift Command ship, said Benham. “Protecting our networks is a continuous challenge, and the overarching concern is to ensure that the right information gets to the right place at the right time with the right level of protection,” he explained. Cybersecurity aboard the hospital ships follow similar efforts to those recommendations made by the Centers for Disease Control and Prevention: Wash your hands. “It's ‘wash your hands' with your computer, too,” Barrett said. “Do good hygiene with your computer.” https://www.c4isrnet.com/it-networks/2020/04/21/for-the-navys-hospital-ships-networking-is-yet-another-challenge/

All news