Back to news

October 17, 2024 | International, Aerospace

Romania scrambles jets after drone breaches airspace

On the same subject

  • Pentagon clears 100 MHz of spectrum for 5G development

    August 11, 2020 | International, C4ISR, Security

    Pentagon clears 100 MHz of spectrum for 5G development

    Nathan Strout The Pentagon has cleared 100 megahertz (MHz) of contiguous mid-band spectrum to be used for commercial 5G following a 15-week review, determining that they can share that bandwidth while minimizing impact on military radars. While that 3450-3550 MHz mid-band spectrum is highly desired by commercial 5G developers, it's been historically used by the military for critical radar operations for air defense, missile and gunfire control, counter-mortar, bomb scoring, battlefield weapon locations, air traffic control, and range safety. But now, leaders from the Department of Defense say the Pentagon can continue using the spectrum for those purposes while making it available for commercial development. DoD Chief Information Officer Dana Deasy said the department will move toward sharing most of that spectrum without limits while setting up a Spectrum Relocation Fund Transition Plan to minimize risks. “DoD is proud of the success of the [America's Mid-Band Initiative Teams (AMBIT)] and is committed to working closely with industry after the FCC auction to ensure timely access to the band while protecting national security,” Deasy told reporters Aug. 10. The White House and Department of Defense established AMBIT to free up spectrum for 5G development quickly back in April. Over a 15-week period, the working group was able to bring together 180 subject matter experts, and ultimately were able to identify 100 MHZ of spectrum used by the military that could be safely shared with commercial 5G efforts.The decision expands the amount of connected mid-band spectrum open for 5G development to 530 MHz. The Federal Communications Commission will auction off the spectrum. One government official said action was expected by the end of this fiscal year. https://www.c4isrnet.com/industry/2020/08/10/pentagon-clears-100-mhz-of-spectrum-for-5g-development

  • DARPA program blending robots in the squad to find and destroy threats

    December 31, 2018 | International, C4ISR

    DARPA program blending robots in the squad to find and destroy threats

    By: Todd South The agency that invented stealth technology, the internet, and the M16 has its sights focused on enhancing how the infantry squad works on the battlefield with robots, and advanced targeting and sensing gear. The Squad X program saw its first week-long series of tests at Twentynine Palms, California, this past year. At that event, Marine squads used air and ground vehicles to detect physical, electromagnetic and cyber threats, according to the Defense Advanced Research Projects Agency. The agency's program manager for their Tactical Technology Office, Army Lt. Col. Phil Root said that the first experiment in the program demonstrated “the ability for the squad to communicate and collaborate, even while ‘dancing on the edge of connectivity.'” Squad X Core Technologies program, or SXCT, is an ongoing effort to develop novel technologies that would “extend squad awareness and engagement capabilities without imposing physical and cognitive burdens,” according to a DARPA press release. They aim to speed the development of new, lightweight, integrated systems that provide infantry squads awareness, adaptability and flexibility in complex environments. That effort is to enable dismounted soldiers and Marines to more intuitively understand and control their complex mission environments, according to Root. Those efforts fit within wider work being done by the Close Combat Lethality Task Force, a group set up this past year to enhance close combat capabilities for infantry, special operations, scouts and some engineers. Root is also the program manager for Squad X Core Technologies. He laid out four key technical areas that the program is exploring: Precision Engagement: Precisely engage threats while maintaining compatibility with infantry weapon systems and without imposing weight or operational burdens that would negatively affect mission effectiveness. Capabilities of interest include distributed, non-line-of-sight targeting and guided munitions. Non-Kinetic Engagement: Disrupt enemy command and control, communications and use of drones. Capabilities of interest include disaggregated electronic surveillance and coordinated effects from distributed platforms. Squad Sensing: Detect potential threats at a squad-relevant operational pace. Capabilities of interest include multi-source data fusion and autonomous threat detection. Squad Autonomy: Increase squad members' real-time knowledge of their own and teammates' locations in GPS-denied environments using embedded unmanned air and ground systems. Capabilities of interest include robust collaboration between humans and unmanned systems. Some of those areas were previously explored in 2015 with DARPA's squad technology integration efforts. The tools used to detect threats in the experiments were newer, lighter, versions of previous capabilities. But the release did not provide detailed examples of the gear that Marines tested. “Each run, they learned a bit more on the systems and how they could support the operation,” said Root. “By the end, they were using the unmanned ground and aerial systems to maximize the squad's combat power and allow a squad to complete a mission that normally would take a platoon to execute.” The August event at the Marine Corps Air Ground Combat Center was one of a number of experiments in communications, cyber, EW, loitering munitions and targeting that was conducted over the past year. Both Lockheed Martin Missiles and Fire Control, and CACI's BIT Systems are working for ways to enhance infantry capabilities using manned-unmanned teaming, according to the release. Marines testing Lockheed Martin's Augmented Spectral Situational Awareness, and Unaided Localization for Transformative Squads, known as the ASSAULTS system, used autonomous robots with sensor systems to detect enemy locations, allowing the Marines to target the enemy with a precision 40mm grenade before the enemy could detect their movement, according to the release. Small units using CACI's BITS Electronic Attack Module were able to detect, locate, and attack specific threats in the radio frequency and cyber domains. This is all part of larger efforts to put more detection and fires at lower echelons in both the Army and Marine Corps. https://www.militarytimes.com/news/your-army/2018/12/30/darpa-program-blending-robots-in-the-squad-to-find-and-destroy-threats

  • Really old computer viruses are still infecting new machines

    September 14, 2018 | International, C4ISR

    Really old computer viruses are still infecting new machines

    By: Justin Lynch The biggest cyber threats governments and businesses face may not be the cutting edge hack from China, but a 10-year-old virus that infects a little-used computer. Some of the most well-known viruses from the past decade are still infecting machines despite their well-documented nature, according to cyber research firms. Some viruses, such as WannaCry and Conficker, are still spreading, Sean Sullivan, a security adviser at F-Secure told Fifth Domain. “It costs hackers nothing to keep using them,” Sullivan said. These known vulnerabilities are still effective because older machines do not receive patches for updates, which can then infect an entire network. Hackers often bundle known hacks together because it increases their success rate with no downside, Sullivan said. “Nothing is going to be 100 percent patched across organizations,” Sullivan, said. He described a network administrator's role as “triage.” The 2017 WannaCry hack infected users in more than 150 countries and had an economic impact of anywhere from $4 billion to $8 billion. Although progress has been made to patch computers, WannaCry is still a top malware threat for customers, F-Stream said in a September report. The Conficker hack targeted Windows systems and was first launched in 2008. It is reported to have cost as much as $9 billion in damage. But much work remains. More than two-billion devices have not been patched to defend against BlueBorne, a Bluetooth vulnerability that allows an attacker to take over devices, according to the cyber protection company Armis. The devices are still vulnerable because they have not been updated or because an update does not exist, according to the company. “Whether they're brought in by employees and contractors, or by guests using enterprise networks for temporary connectivity, these devices can expose enterprises to significant risks,” wrote Ben Seri, the vice president of research at Armis. A previous version of this article said that two million devices have not been patched to defend against BlueBorne. It is two billion. https://www.fifthdomain.com/industry/2018/09/13/really-old-computer-viruses-are-still-infecting-new-machines

All news