Back to news

January 4, 2019 | International, Aerospace

New in 2019: Air Force looks for new bomb designs to fight Russia and China

By:

A growing cohort of Air Force researchers are arguing that the service needs to undergo a munitions revolution if it is to take on a peer-level adversary in open conflict.

“We're developing a range of technologies to enable next-generation and improve precision effects on the battlefield,” Col. Garry Haase, who helms the Air Force Research Lab Munitions Directorate, told an audience at the Air Force Association Annual Conference this fall.

In some instances, that will mean more powerful munitions to breach and destroy Russian and Chinese structures in the event of war.

“There is now a shift in emphasis away from minimizing to maximizing effects in a high-end fight,” said John Wilcox, vice president of advanced programs and technology at Northrop Grumman, at the conference.

“Requirements from our missions directorate say we continue to have to deal with the whole spectrum of threats as we shift to more of a near-peer threat focus,” Wilcox added. “We are looking at larger munitions with bigger effects.”

And while neither members of the AFA panel named Russia or China specifically, a recent study by the Mitchell Institute, which is aligned with the Air Force Association, certainly did.

In the document, titled “The Munition Effects Revolution," several retired senior Air Force officers argue that the U.S. munitions arsenal is overdue for a shakeup.

“The bomb body, a steel shell filled with explosive material, is relatively unchanged across the past 100 years," the study reads. "But some elements of modern munitions have significantly evolved—particularly guidance elements. Munition effects—the destructive envelope of heat, blast, and fragmentation—remain essentially unchanged.”

High demand for combat aircraft is a key driver behind the need for enhanced munitions options, according to the Mitchell Institute.

“The Air Force is currently operating the smallest and oldest aircraft force in its history,” the study reads. “Additionally, current mission capable rates are low and pilots are in increasingly short supply. To best meet combatant command requirements amidst these constraints, it is crucial to ensure each sortie flown and every bomb dropped yields maximum potential.”

https://www.airforcetimes.com/news/your-air-force/2019/01/03/new-in-2019-air-force-looks-for-new-bomb-designs-to-fight-russia-and-china

On the same subject

  • US lawmaker links small defense firms in Maryland

    January 15, 2019 | International, Aerospace, Naval, Land, C4ISR, Security

    US lawmaker links small defense firms in Maryland

    By: Joe Gould WASHINGTON — A Maryland congressman is launching a local consortium on Tuesday to link small and large aerospace and defense firms and educational institutions in the Pentagon's backyard — so the companies can solve common problems like workforce shortages. The Pentagon has identified the aging workforce as a challenge to country's defense industry, and it's playing out in Rep. Anthony Brown's district, which is near NASA Goddard Space Flight Center, a major space research laboratory, and Fort Meade, the home of U.S. Cyber Command. “When I think about the workforce shortages, it's not just the computer science engineer in high demand at Northrop's Linthicum facility, it's the welder down at Huntington Ingalls,” said Brown, D-Md., and a House Armed Services Committee member, told Defense News. “There has to be a public-private partnership.” After months of meeting with representatives of the defense industry, local economic development corporations, local school systems and institutions of higher education, Brown is launching the Maryland Defense and Aerospace Consortium as a means of spurring academia and industry collaborate — and to burnish the National Capitol Region's reputation as an A&D hub. The panel, made up of representatives from the Defense Department, industry, career and technical education organizations, and local universities, is meant to start a conversation and ultimately solve national security problems. The inaugural meeting of Maryland Defense and Aerospace Consortium, set for Tuesday on Capitol Hill, is due to host Army Undersecretary Ryan McCarthy. Full article: https://www.defensenews.com/news/pentagon-congress/2019/01/14/us-lawmaker-links-small-defense-firms-in-maryland

  • HOW HACKED WATER HEATERS COULD TRIGGER MASS BLACKOUTS

    August 14, 2018 | International, C4ISR

    HOW HACKED WATER HEATERS COULD TRIGGER MASS BLACKOUTS

    WHEN THE CYBERSECURITY industry warns about the nightmare of hackers causing blackouts, the scenario they describe typically entails an elite team of hackers breaking into the inner sanctum of a power utility to start flipping switches. But one group of researchers has imagined how an entire power grid could be taken down by hacking a less centralized and protected class of targets: home air conditioners and water heaters. Lots of them. At the Usenix Security conference this week, a group of Princeton University security researchers will present a study that considers a little-examined question in power grid cybersecurity: What if hackers attacked not the supply side of the power grid, but the demand side? In a series of simulations, the researchers imagined what might happen if hackers controlled a botnet composed of thousands of silently hacked consumer internet of things devices, particularly power-hungry ones like air conditioners, water heaters, and space heaters. Then they ran a series of software simulations to see how many of those devices an attacker would need to simultaneously hijack to disrupt the stability of the power grid. Their answers point to a disturbing, if not quite yet practical scenario: In a power network large enough to serve an area of 38 million people—a population roughly equal to Canada or California—the researchers estimate that just a one percent bump in demand might be enough to take down the majority of the grid. That demand increase could be created by a botnet as small as a few tens of thousands of hacked electric water heaters or a couple hundred thousand air conditioners. "Power grids are stable as long as supply is equal to demand," says Saleh Soltan, a researcher in Princeton's Department of Electrical Engineering, who led the study. "If you have a very large botnet of IoT devices, you can really manipulate the demand, changing it abruptly, any time you want." The result of that botnet-induced imbalance, Soltan says, could be cascading blackouts. When demand in one part of the grid rapidly increases, it can overload the current on certain power lines, damaging them or more likely triggering devices called protective relays, which turn off the power when they sense dangerous conditions. Switching off those lines puts more load on the remaining ones, potentially leading to a chain reaction. "Fewer lines need to carry the same flows and they get overloaded, so then the next one will be disconnected and the next one," says Soltan. "In the worst case, most or all of them are disconnected, and you have a blackout in most of your grid." Power utility engineers, of course, expertly forecast fluctuations in electric demand on a daily basis. They plan for everything from heat waves that predictably cause spikes in air conditioner usage to the moment at the end of British soap opera episodes when hundreds of thousands of viewers all switch on their tea kettles. But the Princeton researchers' study suggests that hackers could make those demand spikes not only unpredictable, but maliciously timed. The researchers don't actually point to any vulnerabilities in specific household devices, or suggest how exactly they might be hacked. Instead, they start from the premise that a large number of those devices could somehow be compromised and silently controlled by a hacker. That's arguably a realistic assumption, given the myriad vulnerabilities other security researchers and hackers have found in the internet of things. One talk at the Kaspersky Analyst Summit in 2016 described security flaws in air conditioners that could be used to pull off the sort of grid disturbance that the Princeton researchers describe. And real-world malicious hackers have compromised everything from refrigerators to fish tanks. Given that assumption, the researchers ran simulations in power grid software MATPOWER and Power World to determine what sort of botnet would could disrupt what size grid. They ran most of their simulations on models of the Polish power grid from 2004 and 2008, a rare country-sized electrical system whose architecture is described in publicly available records. They found they could cause a cascading blackout of 86 percent of the power lines in the 2008 Poland grid model with just a one percent increase in demand. That would require the equivalent of 210,000 hacked air conditioners, or 42,000 electric water heaters. The notion of an internet of things botnet large enough to pull off one of those attacks isn't entirely farfetched. The Princeton researchers point to the Mirai botnet of 600,000 hacked IoT devices, including security cameras and home routers. That zombie horde hit DNS provider Dyn with an unprecedented denial of service attack in late 2016, taking down a broad collection of websites. Building a botnet of the same size out of more power-hungry IoT devices is probably impossible today, says Ben Miller, a former cybersecurity engineer at electric utility Constellation Energy and now the director of the threat operations center at industrial security firm Dragos. There simply aren't enough high-power smart devices in homes, he says, especially since the entire botnet would have to be within the geographic area of the target electrical grid, not distributed across the world like the Mirai botnet. But as internet-connected air conditioners, heaters, and the smart thermostats that control them increasingly show up in homes for convenience and efficiency, a demand-based attack like the one the Princeton researchers describes could become more practical than one that targets grid operators. "It's as simple as running a botnet. When a botnet is successful, it can scale by itself. That makes the attack easier," Miller says. "It's really hard to attack all the generation sites on a grid all at once. But with a botnet you could attack all these end user devices at once and have some sort of impact." The Princeton researchers modeled more devious techniques their imaginary IoT botnet might use to mess with power grids, too. They found it was possible to increase demand in one area while decreasing it in another, so that the total load on a system's generators remains constant while the attack overloads certain lines. That could make it even harder for utility operators to figure out the source of the disruption. If a botnet did succeed in taking down a grid, the researchers' models showed it would be even easier to keepit down as operators attempted to bring it back online, triggering smaller scale versions of their attack in the sections or "islands" of the grid that recover first. And smaller scale attacks could force utility operators to pay for expensive backup power supplies, even if they fall short of causing actual blackouts. And the researchers point out that since the source of the demand spikes would be largely hidden from utilities, attackers could simply try them again and again, experimenting until they had the desired effect. The owners of the actual air conditioners and water heaters might notice that their equipment was suddenly behaving strangely. But that still wouldn't immediately be apparent to the target energy utility. "Where do the consumers report it?" asks Princeton's Soltan. "They don't report it to Con Edison, they report it to the manufacturer of the smart device. But the real impact is on the power system that doesn't have any of this data." That disconnect represents the root of the security vulnerability that utility operators need to fix, Soltan argues. Just as utilities carefully model heat waves and British tea times and keep a stock of energy in reserve to cover those demands, they now need to account for the number of potentially hackable high-powered devices on their grids, too. As high-power smart-home gadgets multiply, the consequences of IoT insecurity could someday be more than just a haywire thermostat, but entire portions of a country going dark. https://www.wired.com/story/water-heaters-power-grid-hack-blackout/

  • Air Force awards $20M contract for new common ground system

    June 3, 2019 | International, C4ISR

    Air Force awards $20M contract for new common ground system

    By: Nathan Strout The Air Force is one step closer to the creation of a new common platform for satellite command and control. The Air Force's Space and Missile Systems Center Braxton Technologies of Colorado Springs a $20 million contract May 17 to begin prototyping and integrating the new Enterprise Ground Services (EGS). The Air Force announced the deal in a May 31 press release. The purpose of EGS is to develop a common ground system and end user experience for all of the Air Force's upcoming satellite programs. Today, most military satellites have custom-built ground systems. Not only can that be expensive, it also makes it difficult for end users to adapt to new systems and for ground systems to communicate with each other. The new architecture will still allow for flexibility among the various space systems, as individual systems will need to be tailored to their specific mission requirements. The goal of EGS is to ensure all those space systems are built on a common base with similar end user experiences. “We are excited to embark on this partnership which will enhance our ability to drive speed in our processes, to deliver capabilities to support the warfighters, and develop innovative solutions that add resiliency to fight and win in a war that extends into space,” Joshua Sullivan, material leader for EGS, said in a release. “This contract will allow SMC and Air Force Space Command to concentrate resources to provide the most secure, effective, and interoperable tactical command and control experience to mission partners across the Air Force space enterprise.” The $19 million Small Business Innovative Research contract awarded to Braxton Technologies has a ceiling of $100 million. The work is expected to be completed by May 10, 2024. The Braxton Technologies award follows up on a $655,000,000 contract awarded to Engility Corp. in January to provide engineering, development, integration and sustainment services supporting the Ground System Enterprise and the eventual transition to Enterprise Ground Services. That work is expected to be completed January 31, 2026. https://www.c4isrnet.com/c2-comms/satellites/2019/06/02/air-force-awards-20m-contract-for-new-common-ground-system

All news