September 25, 2024 | International, C4ISR, Security
Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool
Unit 42 reveals the discovery of Splinter, a new Rust-based post-exploitation tool posing cybersecurity risks.
July 30, 2020 | International, C4ISR
A critical piece of the U.S. Army's network modernization push is ensuring its systems work with allies. In future battles, the Army will not fight alone; it will be joined by coalition partners, as well as other U.S. services. As the Army moves to improve its integrated tactical network, it must ensure that its network tools work with coalition and service partners
The Army recently completed a critical design review of Capability Set '21 a set of new network tools that will be delivered to soldiers next year. The service is in the first phase of procuring the new capabilities.
A “key factor” involved in delivery to soldiers at the battalion level and below is a move to a 75 percent “secure but unclassified” network that provides improved communication between coalition partners, said Col. Garth Winterle, project manager for tactical radios at the Army's Program Executive Office Command, Control, Communications-Tactical.
“We're moving off of an all-secret network to one that's a lot more flexible and actually encourages coalition interoperability,” Winterle said.
One opportunity to test interoperability was Defender Europe 2020, which was meant to be one of the largest European exercises involving both the U.S. Army and NATO allies, but had to be scaled down due to the coronavirus pandemic. Still, the Army was able to test interoperability.
There were a series of pre-Defender Europe exercises to assess capabilities “to inform future network design,” according to Justine Ruggio, director of communications for the Network Cross-Functional Team at Army Futures Command.
These assessments included several pieces of Capability Set '21, including communications exercises and validation exercises with the Army's fielded Command Post Computing Environment software, Tactical Server Infrastructure and Commercial Coalition Equipment “to enable the use of the Mission Partner Environment, which allowed all participants to share classified information during the exercise, including the Polish and U.K.,” Ruggio said.
During the pre-Defender Europe tests, “we were able to bridge the Polish and U.K. unit into an integrated command structure using our secret releasable network and create that common command-and-control picture,” Col. Lesley Kipling, the mission command lead and Army National Guard liaison officer to the Network CFT, said in an interview with C4ISRNET.
Secret but releasable information is classified at the secret level and can be released to certain coalition partners who have sufficient clearance from their home country.
An exercise scheduled for next year, called Warfighter 21-4, will allow for additional interoperability assessments with U.K. and French forces. According to Ruggio, one focus area will be on interoperability using the Network CFT's DevOps model to iterate the Command Post Computing Environment, continue to assess Commercial Coalition Equipment and evaluate the Mission Partner Environment. The event will be aligned with Capability Set '23, the next iteration of network tools.
Kipling added that the cross-functional team and its partners are “continuing” to work on policies and training for properly connecting to a coalition network “so that it's not learning on the fly, but that these procedures and policies are codified in a way that they can be standardized and any user can execute whenever they're put in a situation,” she said.
Brig. Gen. Joseph Papenfus, chief Information officer and deputy chief of staff of the G6 of U.S. Army Europe, said that the scaled-back nature of Defender Europe did affect network interoperability testing because soldiers were unable to come over from the United States. That means that U.S. Army Europe will focus heavily on European partners during the smaller exercises, Papenfus said, including validating network integration and establishing a secret but releasable network with NATO.
“Every opportunity that we have to see how a piece of equipment works within the larger set of the network, we take advantage of that,” Ruggio said.
September 25, 2024 | International, C4ISR, Security
Unit 42 reveals the discovery of Splinter, a new Rust-based post-exploitation tool posing cybersecurity risks.
June 12, 2019 | International, Aerospace, Naval
By: David B. Larter and Valerie Insinna WASHINGTON — The U.S. Navy wants more from the F-35 jet's radar, which in sea-search mode is limited to what is directly in front of the aircraft, according to documents exclusively obtained by Defense News. According to the documents, the radar, Northrop Grumman's AN/APG-81 active electronically scanned array radar, can either hone in on a sector based on a specific point on the ground, or work in what is commonly known as “snowplow mode,” which, as the name suggests, searches everything in front of the aircraft. The Navy wants to be able to scan a wider area when in sea-search mode, something that the radar is currently not set up for, according to officials who spoke to Defense News. Officials also said the problem is on track for a solution, but may not be implemented until as late as 2024 with the Block 4 upgrades, notably adding that a solution will not be in place before a full-rate production decision on the F-35 this year. Ultimately, giving the Navy what it wants will be a matter of boosting computing power and upgrading software, officials explained. The issue is listed as a category 1 deficiency, according to the documents, which further define the limitation as something that means “adequate performance [is] not attainable to accomplish the primary or alternate mission(s).” The issue dates back to 2012, according to the documents. In this scale, category 1 represents the most serious type of deficiency. It's unclear why the issue is listed as a deficiency. The system is working in accordance with design specifications, according to both the documents and a statement from a Lockheed Martin executive. “The F-35's current radar sea search function meets the enterprises' expressed required specification," said Greg Ulmer, Lockheed Martin's general manager of the company's F-35 program. “As we modernize the F-35, we are bringing enhanced search capabilities, which represent an increase from the original requirements, and we stand ready to integrate the upgrade in the future, based on customer priorities and direction.” In an interview with Defense News, the head of the Pentagon's F-35 program office, Vice Adm. Mat Winter, said the issue was being resolved by software and computing upgrades, and there would be no requirement for a new radar. “We're not mechanically scanning, we're electronically scanning,” Winter said. “And being able to accurately scan the maritime environment, it just takes increased computing power, and that's what we're doing. ... It's a software fix, and then an allocation of computing power.” Winter may be referring to a planned bundle of computer upgrades called Tech Refresh 3, where the jet will get more modern computing systems that will increase the jet's processing power and memory. According to one document obtained by Defense News, TR3 is a prerequisite for a future radar fix. Those TR3-equipped jets won't roll off the production line until 2023. Defense News submitted written questions to the Defense Department's F-35 program office concerning these and other deficiencies, but it did not respond by press time, despite multiple follow-ups over a period of months. A retired fighter pilot, who reviewed the documents for Defense News and agreed to speak on condition of anonymity, agreed with Winter's assessment that the fix was likely software-based. Early on in the F/A-18's APG-79 AESA radar, there were glitches in the operation, but software updates smoothed out the system. Fixing the APG-81 should follow a similar track as the aircraft progresses, the pilot explained. “As long as the array itself is technically sound, I suspect over time they'll be able to find ways to continue to build out capability through software updates,” the retired fighter pilot said. https://www.defensenews.com/smr/hidden-troubles-f35/2019/06/12/the-us-navy-is-seeking-upgrades-for-the-f-35-radars-sea-search-mode/
April 2, 2024 | International, Naval
L3Harris is taking early steps to create a maritime version of its Vampire counter-drone system that could deploy on a small unmanned surface vessel.