Back to news

October 11, 2023 | International, Aerospace, Land, Security

General Atomics: New radar to turn Gray Eagles into anti-drone hunters

The first batch of Gray Eagle 25Ms are now being built with the Eagle Eye radar for delivery in 2026, and General Atomics said more are on the way.

https://www.c4isrnet.com/air/2023/10/09/general-atomics-new-radar-to-turn-gray-eagles-into-anti-drone-hunters/

On the same subject

  • The DoD needs data-centric security, and here’s why

    September 30, 2020 | International, C4ISR, Security

    The DoD needs data-centric security, and here’s why

    Drew Schnabel The U.S. Department of Defense is set to adopt an initial zero-trust architecture by the end of the calendar year, transitioning from a network-centric to a data-centric modern security model. Zero trust means an organization does not inherently trust any user. Trust must be continually assessed and granted in a granular fashion. This allows defense agencies to create policies that provide secure access for users connecting from any device, in any location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. How does the Pentagon's AI center plan to give the military a battlefield advantage? The Pentagon's artificial intelligence hub is working on tools to help in joint, all-domain operations as department leaders seek to use data to gain an advantage on the battlefield. Andrew Eversden To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. Initially, the JIE was an innovative concept that took the DoD from a highly fragmented architecture, in which each agency managed its own cybersecurity strategy, to an architecture in which there is a unified SSA. However, one of the early challenges identified for the JIE was managing cloud cybersecurity as part of the SSA. The components in the JIE — the Joint Regional Security Stacks family's internet access points and cloud access points — have traditionally focused on securing the network, rather than the data or user. As more DoD employees and contractors work remotely and data volumes increase, hardware cannot scale to support them. This has created ongoing concerns with performance, reliability, latency and cost. A cloud-first approach In response, the DoD leverages authorized solutions from the Federal Risk and Authorization Management Program, and it references the Secure Cloud Computing Architecture guidance for a standard approach for boundary and application-level security for impact Level 4 and 5 data hosted in commercial cloud environments. The purpose of the SCCA is to provide a barrier of protection between the DoD Information Services Network and the commercial cloud services that the DoD uses while optimizing the cost-performance trade in cybersecurity. Defense agencies are now exploring enterprise-IT-as-a-service options to move to cloud, and reduce the need for constant updates and management of hardware. Through enterprise-IT-as-a-service models, defense agencies will be able to scale easily, reduce management costs and achieve a more competitive edge over their adversaries. Before the pandemic hit, defense agencies were already moving to support a more mobile workforce, where employees can access data from anywhere on any device. However, a cyber-centric military requires security to be more deeply ingrained into employee culture rather than physical protection of the perimeter. The next evolution to secure DISA and DoD networks is to embrace a secure access edge model with zero-trust capabilities. The SASE model moves essential security functions — such as web gateway firewalls, zero-trust capabilities, data loss prevention and secure network connectivity — all to the cloud. Then, federal employees have direct access to the cloud, while security is pushed as close to the user/data/device as possible. SP 800-27, zero-trust guidance from the National Institute of Standards and Technology, provides a road map to migrate and deploy zero trust across the enterprise environment. This guidance outlines the necessary tenants of zero trust, including securing all communication regardless of network location, and granting access on a per-session basis. This creates a least-privilege-access model to ensure the right person, device and service have access to the data they need while protecting high-value assets. As the DoD transforms the JIE architecture to an as-a-service model with zero-trust capabilities, defense agencies will experience cost savings, greater scalability, better performance for the end user and war fighter, improved visibility, and control across DoD networks — and ultimately a stronger and more holistic cybersecurity capability moving forward. https://www.c4isrnet.com/opinion/2020/09/29/the-dod-needs-data-centric-security-and-heres-why/

  • Boeing preps for next test of US Navy’s future aerial tanker drone

    August 6, 2020 | International, Aerospace, Naval

    Boeing preps for next test of US Navy’s future aerial tanker drone

    By: David B. Larter WASHINGTON — The U.S. Navy's aircraft carrier-borne tanker drone, the MQ-25 Stingray, is preparing to head into the fall resuming test flights, this time with the crucial fuel store pod attached. The store pod — the same one integrated into the Navy's stalwart F/A-18 Super Hornet for aerial refueling — was recently integrated into the MQ-25 test article under the wing. “When we resume flight testing later this year, we'll have the opportunity to gather test points about the aerodynamics of that pod and the software commands that control it — all happening well before we deliver the Navy's first MQ-25 jet with the same pod,” MQ-25 program director Dave Bujold said in a statement from the aircraft's manufacturer, Boeing. “That early testing and early software development is a big part of supporting the Navy's goal to get MQ-25 to the fleet as quickly as possible,” he added. The engineers will primarily observe the aerodynamics of the pod mounted on the Stingray test article, then seeing how the hose and drogue behave while being dragged behind the airframe. Possible delays In June, Defense News reported that the MQ-25 could face a three-year testing delay if it doesn't get its designated test ships through the required modernizations on time, a possibility the Navy said was remote. Two carriers — Carl Vinson and George H.W. Bush — have limited windows to complete the installation of unmanned aircraft control stations, and if operational commitments intervene, the program could experience significant problems, according to Navy officials and a government watchdog report. “Program officials stated that, among other things, the Navy's potential inability to maintain its schedule commitments could require modifications to the contract that would impact the fixed-price terms,” the Government Accountability Office reported. “Specifically, the Navy faces limited flexibility to install MQ-25 control centers on aircraft carriers. “If the Navy misses any of its planned installation windows, the program would have to extend MQ-25 development testing by up to 3 years. According to officials, such a delay could necessitate a delay to initial capability and result in a cost increase.” The Navy's MQ-25 Stingray aerial refueling drone took its first flight Sept. 19, a historic step toward integrating an unmanned aircraft into the service's powerful strike arm. Navy officials say a three-year delay is “extremely unlikely”; however, the Navy has struggled in recent years to balance its modernization schedules with operational commitments, a problem that its “Optimized Fleet Response Plan” deployment rotation scheme was supposed to address. Ultimately, a delay would further push back the Navy's ability to extend its carrier air wing's range through unmanned tanking, critical to keeping the service's powerful strike arm relevant against long-range guided munitions. https://www.defensenews.com/naval/2020/07/24/boeing-preparing-for-the-next-big-step-testing-the-us-navys-new-aerial-tanker-drone

  • New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns

    November 12, 2024 | International, C4ISR, Security

    New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns

    GoIssue enables targeted phishing on GitHub users, risking data theft and developer breache

All news