Back to news

September 20, 2018 | International, Aerospace

MBDA unveils Spectre combat UAV concept

Robin Hughes, London - IHS Jane's Missiles & Rockets

MBDA in the United Kingdom has unveiled a new combat unmanned aerial vehicle (UAV) concept designed to provide on-call, low-cost organic precision effects close air support for forward-deployed land forces.

Spectre is a tilt wing, electric vertical take-off and landing (eVTOL) combat air system concept capable of quickly transitioning to forward flight mode for rapid traversal over complex terrain at low altitude.

Designed with an integrated modular payload bay capable of incorporating systems up to 25 kg, Spectre can be equipped with either two MBDA Enforcers or a single Missile Moyenne Portee (MMP) multirole weapons system to address light armoured, soft-skinned and unmanned threats, or heavier armoured threats.

The Spectre system can ‘find and fix' beyond line-of-sight threats in complex operational environments to assist deployed ground forces. It also incorporates a ‘watch and wait' mode with a top attack capability effectively giving the Spectre an overwatch/loitering munition utility.

Other mission module options include re-supply payloads, improved sensors, or electronic warfare payloads. The latter payload can be combined with kinetic effects to disrupt adversary operations.

Spectre's various mission modules can be replaced by the operator in-theatre, and the system design provides for the integration of new and upgraded modules and technologies and requirements evolve.

As currently envisaged, Spectre will have a cruise speed of 180 km/h, a cruising altitude of less than 100 m, and combat range in excess of 10 km with a flight endurance of more than 60 minutes. The Spectre design provides for two (front and aft) 2 m tilt wings, with four rotor assemblies: one on each wing. The all-up weight of the concept system has not been disclosed. Other features include automatic navigation, operator-over-the-loop command and control (but with firing authority always with the human operator), and anti-jam GPS navigation. Spectre can be used as a single system, or as a scalable co-operative swarming capability.

https://www.janes.com/article/83133/mbda-unveils-spectre-combat-uav-concept

On the same subject

  • Audit finds cyber vulnerabilities in US missile defense system

    December 17, 2018 | International, C4ISR

    Audit finds cyber vulnerabilities in US missile defense system

    By: Geoff Ziezulewicz The Army, Navy and Missile Defense Agency are failing to take basic cybersecurity steps to ensure that information on America's ballistic missile defense system won't fall into nefarious hands, according to a Defense Department Inspector General audit released Friday. Investigators visited five sites that manage ballistic missile defense elements and technical information, but the names of the commands were redacted in the publicly released report. “The Army, Navy and MDA did not protect networks and systems that process, store, and transmit (missile defense) technical information from unauthorized access and use,” the declassified report states. Such inadequacies “may allow U.S. adversaries to circumvent (missile defense) capabilities, leaving the United States vulnerable to missile attacks,” the report states. They found officials failed to employ safeguards familiar to most people online in 2018, the latest development to raise questions about the U.S. military's cybersecurity vulnerabilities. Among the shortcomings: Administrators for classified networks had no intrusion detection and prevention systems in place to watch for cyberattacks, much less stop them, according to the report. At one site, officials said they had requested to purchase those cyber safeguards in December 2017 but nine months later it still hadn't been approved. “Without intrusion detection and prevention capabilities, (the site) cannot detect malicious attempts to access its networks and prevent cyberattacks designed to obtain unauthorized access and exfiltrate sensitive (missile defense) technical information,” the report states. Officials also failed to patch system flaws after receiving vulnerability alerts, one of which had first been identified in 1990 and had still not been fixed by April. Another vulnerability that could be exploited by an attacker was first identified in 2013 but also was never pathced, according to the report. “Countless cyber incident reports show that the overwhelming majority of incidents are preventable by implementing basic cyber hygiene and data safeguards, which include regularly patching known vulnerabilities,” the IG report states. “(Missile defense) technical information that is critical to national security could be compromised through cyberattacks that are designed to exploit these weaknesses.” Some facilities failed to force employees to use common access cards, or CAC, when accessing the classified system, a basic cybersecurity practice known as multi-factor identification. Instead, officials were able to access the sensitive information using just a username and password, the report states. Hackers use phishing and other tactics to exploit passwords and gain access to such systems. New hires are supposed to be allowed network access without a card for only their first two weeks on the job. But IG investigators found users on the systems without CAC cards for up to seven years. At one site, a domain administrator never configured the network to allow only CAC holder access. “Allowing users to access networks using single factor authentication increases the potential that cyber attackers could exploit passwords and gain access to sensitive (missile defense) technical information,” the report states. Investigators also found unlocked server racks at some locations, another key vulnerability to insider snoopers. “The insider threat risk necessitates that organizations implement controls...to reduce the risk of malicious personnel manipulating a server's ability to function as intended and compromising sensitive and classified data,” the report states. External storage devices held unencrypted data and some sites failed to track who was accessing data, and why. Other administrators told investigators that they lacked the ability to record or monitor data downloaded from the network onto these devices. Unless these officials enforce the encryption of such removed data and monitor its downloading and transferring, “they will be at increased risk of not protecting sensitive and classified (missile defense) technical information from malicious users,” the report states. Investigators also found that some supposedly secure sites were failing to even lock their doors. One location had a security door that hadn't worked for years. “Although security officials were aware of the problem, they did not take appropriate actions to prevent unauthorized personnel from gaining unauthorized access to the facility,” the report states. Other sites featured no security cameras to monitor personnel movement and security officers failed to conduct badge checks. While the report makes recommendations to fix the documented problems, officials for the inspected agencies offered no comments on the non-classified draft report of the audit. Friday's scathing IG audit marked the latest in a string of reports detailing shoddy cybersecurity throughout the armed forces and defense contractors. During the same week, the Wall St. Journal reported that Chinese hackers are targeting military systems and those of defense contractors working on Navy projects. Beijing-linked cyber raids have attempted to steal everything from missile plans to ship-maintenance data in a series of hacks over the past 18 months, the Journal reports. As a result, Navy Secretary Richard Spencer has ordered a “comprehensive cybersecurity review” to assess if the Navy's cyber efforts “are optimally focused, organized, and resourced to prevent serious breaches,” spokesman Capt. Greg Hicks said. The review will also look at authorities, accountability and if the efforts reflect and incorporate government and industry best practices, he said. “Secretary Spencer's decision to direct a review reflects the serious to which the DoN prioritizes cybersecurity in this era of renewed great power competition,” Hicks said. https://www.navytimes.com/news/your-navy/2018/12/14/audit-finds-cyber-vulnerabilities-in-us-missile-defense-system

  • Lockheed: New Demand for F-16s Could Push Type Past 5,000 Mark

    September 14, 2020 | International, Aerospace

    Lockheed: New Demand for F-16s Could Push Type Past 5,000 Mark

    Sept. 11, 2020 | By John A. Tirpak After nearly shutting down production several times, Lockheed Martin is getting a surge of orders for the F-16. With a current backlog of 130 jets, and several countries on the cusp of making orders, the company sees a possibility of surpassing the 5,000th airplane of the type, Lockheed Martin Executive Vice President of Aeronautic Michele A. Evans said Sept. 9. “We're seeing a ... resurgence of the F-16 business,” Evans said in an interview with Air Force Magazine. The company is producing Block 70 Falcons for Bahrain, Bulgaria, and Slovakia at its Greenville, S.C., plant, where it moved the F-16 line last year, freeing up space at its Fort Worth, Texas, plant for the F-35 production line. “We're up to about 4,600 aircraft delivered and can see possibly getting up to 5,000,” Evans said. Production is ramping up to four aircraft a month at Greenville, which has increased its workforce to 400 employees, she noted. It is also operating under an indefinite delivery/indefinite quantity Air Force contract to supply F-16s to Morocco and Taiwan and potential future or repeat customers. The IDIQ vehicle will streamline and speed up contracting so there is a “base configuration” of aircraft to be built, “and then we propose only the unique capabilities for each country,” in the form of specific sensors or capabilities, she said. “We then just negotiate that contract with those countries.” The backlog does not include India, where Lockheed is seeking a contract for an advanced version of the F-16 to be called the F-21. Along with partner Tata, Lockheed would build 114 airplanes in India, under license, if it wins the competition. The F-16 sales could also create future F-35 customers, Evans said. “For a lot of these countries, ... as we get them capable with the F-16, we believe the next step for many ... is future procurement of the F-35.” Evans said the U.S. Air Force is seeking more operational flight program and software updates for its own F-16s, and may be interested in other improvements as well. The Air Force is “looking to advance the capability” of its Falcons, she said. The current backlog will keep the F-16 in production through 2025, Evans noted, but Lockheed would consider increasing the rate of production if demand increases. Hitting 5,000 Falcons delivered would likely take more than seven years of sustained work, she said. However, “We don't see any issues in terms of being able to meet customer demand,” she added. Editor's Note: This story was updated at 9:41 a.m. Sept. 12 to include the correct number in the F-16 backlog. https://www.airforcemag.com/lockheed-new-demand-for-f-16s-could-push-type-past-5000-mark

  • Lockheed bests General Dynamics for Army long-range jammer contract

    June 27, 2023 | International, C4ISR

    Lockheed bests General Dynamics for Army long-range jammer contract

    Under the new arrangement, Lockheed will build a prototype of the Terrestrial Layer System-Echelons Above Brigade at its facility in Syracuse, New York.

All news