Back to news

July 29, 2021 | International, Land

Lawmakers want answers on US Army plans to protect vehicles from drones

Will the Army's combat vehicles be able to actively defend against drones? A House subpanel wants to know.

https://www.defensenews.com/land/2021/07/28/lawmakers-want-answers-on-us-army-plans-to-outfit-vehicles-with-drone-protection/

On the same subject

  • Disruptive technologies show why government needs data security standards now

    November 21, 2018 | International, C4ISR

    Disruptive technologies show why government needs data security standards now

    By: Justin Lynch Telepathy. Data uploading to the brain. Even humanoid sex robots. These are among the ideas that exist on a periodic table of disruptive technologies, a new visual guide that predicts what will alter human existence in the coming years. Created by Imperial College London, the table identifies what is set to change societies in the short term (smart controls and appliances), as well as fringe ideas that are decades away from existence, if they will exist at all (think force fields.) Yet the disruption could turn disastrous without proper data-security standards, according to one of the chart's creators, Richard Watson, the futurist in residence at Imperial College London. “There is very little here that is not in some way digital and connected, which makes it vulnerable,” Watson said. “Any kind of internet-of-everything device doesn't really work if you haven't got common standards — if Apple isn't sharing with Google and the French aren't sharing with the Germans.” Experts have long expressed concern about the lack of data standards for internet-connected devices. There is no international standard for data security. And U.S. government oversight of internet-connected devices is spread across at least 11 different federal agencies, according to a 2017 Government Accountability Office report. “As new and more ‘things' become connected, they increase not only the opportunities for security and privacy breaches, but also the scale and scope of any resulting consequences,” the report said. And there has been a flurry of cyberattacks using internet-connected devices. Some hackers are exploiting smart devices as an intermediary to attack computer networks, the FBI warned Aug. 2. Ninety-three percent of respondents told Armis, a security platform, in an August survey that they expected governments to exploit connected devices during a cyberattack. The Imperial College London chart offers a further glimpse at how important it may be to create these common regulations by imagining a wealth of potential breach points. Watson listed some of the table's future technologies that could be hacked. “Smart controls and appliances.” Hackable. “Autonomous robotic surgery.” Hackable. “Autonomous ships and submarines.” Hackable. “One of the issues with the stuff on here is that it relies on extremely good data security,” Watson said. The problem with having a developing ecosystem without global standards is that a single vulnerability could allow access to more than one network, and government officials and businesses are currently taking a strategy of letting the private sector debate how, or if, to regulate itself when it comes to internet-connected devices. One piece of bipartisan federal legislation, the 2017 Internet of Things Cybersecurity Improvement Act, mandates that “devices purchased by the U.S. government meet certain minimum security requirements," but it has stalled in Congress. As a first step, manufacturers should collaborate to establish device security baselines, Jing de Jong-Chen, general manager for global cybersecurity at Microsoft, said during a June conference hosted by the Woodrow Wilson Center, a Washington, D.C.-based think tank. One private solution is a set of common guidelines developed by the IEEE Standards Association, an industry trade organization. The trade association's voluntary standards is evidence of a fear of government regulation that the private sector is openly hostile to. During the June event, the idea of government regulation of smart devices was laughed at by private sector officials in the room. But that laughter may have been premature. In September 2018, California Governor Jerry Brown approved a bill that requires companies to install connected devices with “a reasonable security feature” protecting it against unauthorized access. The bill means that the periodic table of disruptive technologies may eventually be impacted by a modicum of public regulation, although it is not clear if that will be effective. Not making it any easier is that no amount of planning can compensate for every technological innovation. For example, when it comes to the most disruptive future technology, the chart is secretive. In position 100, predicted to be the most innovative idea, the chart says it is too dangerous to publish. “We can't talk about this one,” it reads. In this instance, however, a potential security risk is averted. When asked if this technology is the one that will literally “break the internet,” Watson is forced to make a confession: “It's a joke. It's just us dodging the ball because we couldn't think of what to put there.” https://www.fifthdomain.com/industry/2018/11/20/disruptive-technologies-show-why-government-needs-data-security-standards-now/

  • Top intelligence officials fear U.S. behind in quantum computing, cyber

    June 22, 2018 | International, C4ISR

    Top intelligence officials fear U.S. behind in quantum computing, cyber

    By: Justin Lynch The universities and research institutions in the United States focusing on quantum computing are “sub-par,” a top National Security Agency official said June 21. The complaint is among a laundry list of examples, topped by cybersecurity, where American innovation in the intelligence field is struggling, said George Barnes, deputy director at the NSA. “We have to be better at playing the long game,” he said. Barnes added that the Chinese “can play the long game” and “they are taking steps that might not be realized for 20 years.” The warnings, made at the Capitol Hill National Security Forum in Washington, highlighted mistrust between the government and private sector, as well as the structural challenges of supporting innovation. Whether it is quantum computing, space or artificial intelligence, Robert Cardillo, Director of the National Geospatial-Intelligence Agency worried that “the moment will be too late” for American innovation. Experts say that when quantum computers are fully operational, they will upend the use of password-protected systems, artificial intelligence and other areas of information technology. “Whoever achieves quantum first, everything they are doing and have been doing is irrelevant,” Rep. Will Hurd, R-Texas, said. He added the United States needs to treat quantum the way it treated the Y2K crisis, where the government “spent billions of dollars and spent a decade preparing ... We need to be the leader.” Hurd said that he supports a recently proposed bill from Rep. Lamar Smith, R-Texas, that aims to “accelerate quantum research and development.” But the intelligence officials at the forum said that the very nature of American government that prioritizes short-term gains may harm innovation. With their centralized five-year plans, China does not have the potential sequesters and fluctuating budgets that are features of the U.S. government. Rob Joyce, the newly installed senior adviser at the NSA, said that government needs to give “more people the license to fail.” He said that while the agency doesn't want to squander taxpayer money, “oversight regulation” does not encourage innovation. Joyce said that the agency needs to boost partnerships with the banking industry, power companies and other areas of critical infrastructure because government has moved to a “support” role. “We are not the finishers now,” Joyce said. Asked what the most important emerging threat was for the NSA, Barnes answered with one word: “Cybersecurity.” “The attack surface is broad and the solution requires government and the public sector together,”Barnes added. Barnes said that that agency is not used to working with the private sector however, and it harms cybersecurity. “Trust is an issue.” https://www.fifthdomain.com/industry/2018/06/21/top-intelligence-officials-fear-us-behind-in-quantum-computing-cyber/

  • Leonardo AW139’s capabilities further enhanced with new avionics software release and kit certification

    July 22, 2020 | International, Aerospace

    Leonardo AW139’s capabilities further enhanced with new avionics software release and kit certification

    Rome, July 17, 2020 - Leonardo announced today further enhancements for the AW139 intermediate twin engine market leader with the recently obtained EASA (European Aviation Safety Agency) certifications for the Honeywell Primus Epic integrated avionics Phase 8 software and the EGPWS (Enhanced Ground Proximity Warning System) optional kit with offshore modes. The Phase 8 software release marks the introduction of an advanced Synthetic Vision System (SVS) specifically tailored for helicopter applications, improved 2D maps and wireless data loading delivering even greater all-weather capabilities and mission effectiveness for all commercial and government missions. This latest standard increases crew situational awareness and reduces workload for operations at night or in marginal weather. The advanced Synthetic Vision System assists with navigation and landing approaches when operating within challenging terrain, oil rigs, and other demanding scenarios, which is accomplished via 3D presentation of the external scenario, including surrounding terrain, obstacles, runways and helipads within the background of the Primary Flight Display. A user-friendly 2D Interactive Navigation (INAV) feature showing the helicopter position and flight plan on a map into the Multi-Functional Display (MFD) delivers unparalleled navigation system alignment and precision with the actual flight path taking into account environmental factors. Phase 8 has also wireless connectivity embedded, providing high speed data access for flight plans transfer and maintenance data gathering from the aircraft. Additionally, Custom Approach functionality provides the capability to design, set and fly an automated approach to any user-defined location, including oil rig helidecks. The introduction of the new EGPWS version -036, which is also available for Phase 7, perfectly complements the latest software release and enhanced navigation capabilities for safer offshore operations. This more sophisticated HTAWS (Helicopter Terrain Awareness and Warning System) introduces recommendations of CAA CAP 1519 for optimal use in offshore environments, and gives pilots more time margin and earlier notifications for warning of a potential collision. This will prove to be a key enabler for recognizing and responding to unsafe conditions. Orders for nearly 1200 units in over 70 countries have been placed by more than 280 commercial, para-military, and military customers worldwide and over 1050 helicopters are in service with more than 2.8 million flight hours logged in operations to date. With more than 1000 kits certified to date and continued capability growth, the AW139 remains unmatched in its' category as the world's most important helicopter programme in the last 15 years. The AW139 has a proven track record of outstanding mission accomplishment in the harshest conditions. View source version on Leonardo: https://www.leonardocompany.com/en/press-release-detail/-/detail/17-07-2020-leonardo-aw139-s-capabilities-further-enhanced-with-new-avionics-software-release-and-kit-certification

All news