Back to news

August 17, 2020 | International, C4ISR

Silvus Technologies develops toughened waveform for US Army

WASHINGTON — Silvus Technologies developed a new radio waveform that will make it more difficult for adversaries to intercept and detect communications signals of the U.S. Army, the company announced Aug. 13.

Silvus has worked with the Army Combat Capabilities Development Command's C5ISR Center — or the Command, Control, Communication, Computers, Cyber, Intelligence, Surveillance, and Reconnaissance Center — since last August on developing a low-probability intercept/low-probability detect (LPI/LPD) waveform.

Silvus and the C5ISR Center are now exercising a six-month option period, bringing the total award to $2 million.

The funding for research and development will specifically go toward work the C5ISR Center is performing on a project called “Protected Communications for Manned/Unmanned Teams.” During the option period, Silvus is integrating several new capabilities with the LPI/LPD waveform, including the ability to shift operating frequency when communications are degraded, a capability to filter out interference and a technology that allows radios to control transmission power “to enable more discreet communications.”

The secure communications for the manned-unmanned teaming project is focused on “high-throughput, secure, and low observable communications capabilities for manned/unmanned teaming operations,” the Silvus news release said.

The new capability “brings together a powerful suite of anti-jam and LPI/LPD functions to enable robust, secure communications for the warfighter in congested and contested environments,” said Babak Daneshrad, founder and CEO of Silvus Technologies.

The new waveforms will be tested in lab evaluations starting this winter into spring 2021, according to Edric Thompson, spokesperson for the C5ISR Center. He added that field demonstrations will take place during the center's ongoing Network Modernization Experiment in 2021 and Project Convergence 2021. For fiscal 2021, it has planned soldier touchpoint events at NetModX-22 and PC22.

In May, Silvus was awarded nearly $4 million to provide 1,000 of its tactical Mobile Ad Hoc radios for the Army's Integrated Visual Augmentation System program.

https://www.c4isrnet.com/battlefield-tech/c2-comms/2020/08/14/silvus-technologies-develops-toughened-waveform-for-us-army/

On the same subject

  • Opinion: Aviation’s Cybersecurity Imperative

    May 22, 2020 | International, C4ISR, Security

    Opinion: Aviation’s Cybersecurity Imperative

    Remzi Seker May 22, 2020 With the expansion across the aviation industry of connectivity and computing services, cybersecurity has become ever more important. Connecting people, processes and assets creates new vulnerabilities and multiple attack points—from flight-critical avionics to passenger inflight entertainment networks and airline backend operations. Information about systems, protocols and technologies such as software-defined radio are now readily available well beyond the industry. Demand for greater efficiency meanwhile continues to increase connectivity and accelerate computerization within aviation infrastructure, including aircraft. Fortunately, ongoing efforts to protect aircraft, airlines and passengers from cybersecurity threats have been largely unaffected by the global pandemic, suggesting an opportunity for the industry to ramp up cybersafety programs and training amid the current slowdown. The comprehensive, coordinated nature of aviation cybersecurity initiatives means committees have long carried out their work primarily through virtual meetings, so those efforts are able to continue in full swing. With slowdowns taking place in other areas, the industry can address cybersafety at a more rapid pace. The aviation industry and its stakeholders have been working hard to tackle cybersecurity challenges comprehensively—from the supply chain and the maintenance of aircraft to operations. Such efforts remain essential so that cyberthreats affecting safety can be mitigated before they materialize, whether that happens during flight through physical access to a bus, by interfering with equipment through Wi-Fi or remotely disrupting operations. The need to weigh cyberthreats according to their safety impact, a practice referred to as “cybersafety,” requires a different perspective than that of IT cybersecurity. Cybersafety differs from traditional IT cybersecurity because of the need for safety certification, which relies on guaranteeing a system's behavior, or “determinism.” This unique characteristic of aviation cybersafety means that solutions widely used across traditional computing systems may pose serious certification challenges. Imagine rolling out security patches for every avionics component on a commercial aircraft. Tackling cybersafety challenges requires a coordinated, comprehensive, global effort. Multiple agencies are cooperating to establish much-needed standards. For example, the U.S. FAA and the European Union Aviation Safety Agency have been working with the RTCA and the European Organization for Civil Aviation Equipment to set harmonized cybersecurity standards. Efforts to secure the aviation ecosystem also include dedicated committees such as the FAA's Aviation Rulemaking Advisory Committee Aircraft System Information Security/Protection working group. Similarly, the Aerospace Industries Association has established the Civil Aviation Cybersecurity Subcommittee. In the U.S., the Aviation Cyber Initiative (ACI) is led by the Defense Department, Department of Homeland Security and FAA. The ACI includes experts representing government, defense, industry and academia who collaborate to tackle aviation cybersecurity threats. The Aviation Information Sharing and Analysis Center shares global threat intelligence among aviation companies. Globally, the International Civil Aviation Organization (ICAO) leads this work. Its Trust Framework Study Group (TFSG) includes experts from the FAA, EASA, commercial industry and academia and has established three important working groups. Academic institutions play a critical role in advancing cybersecurity research and training, too. Embry-Riddle Aeronautical University, for example, develops engineering solutions and provides degree, certification and training programs in aviation cybsersecurity. Faculty researchers contribute expertise to cyberdefense and preparedness efforts by serving on national and international committees and working groups and by organizing the annual Aero-Cybersecurity Symposium. Aviation's impeccable safety culture positions it well to combat and defeat cybersafety risks. In the years ahead, the industry will need to invest in expanded education and training as well as research to secure high-assurance systems that can be updated with minimal impact on certification. Computerization and Cyberphysical Systems As computing becomes ever more affordable, functions that were traditionally implemented through hardware are now being realized through software, and inclusion of software has supported increased customization. Cyberphysical systems are designed to perform a set of functions with limited impact on the physical environment, such as temperature control, welding and parts assembly. One feature of cyberphysical systems is a failsafe property that involves shutting down—an approach that is clearly not desirable midflight. Connectivity Inexpensive and ubiquitously available computing, combined with advancements in networking, have accelerated the networking of devices. The Internet of Things concept does not require any form of certification or service-quality assurance, let alone any safety requirement or oversight. Rather than leveraging the Internet of Things, the aviation industry might consider using “networked wings” to underscore its safety commitment. Remzi Seker is the associate provost for research at Embry-Riddle Aeronautical University. The views expressed are not necessarily those of Aviation Week. https://aviationweek.com/air-transport/safety-ops-regulation/opinion-aviations-cybersecurity-imperative

  • Watchdog says Pentagon needs better planning for IP update 17 years after first attempt

    June 4, 2020 | International, C4ISR, Security

    Watchdog says Pentagon needs better planning for IP update 17 years after first attempt

    Andrew Eversden A federal watchdog found that poor planning by the Department of Defense has blurred the department's understanding of the risks and costs associated with upgrading the system that routes internet traffic across the globe, known as Internet Protocol version 6 (IPv6). According to a June 1 report from the Government Accountability Office, the Pentagon needs to improve its transition planning for the most recent effort, which began in April 2017. The DoD has tried twice previously to implement IPv6 in 2003 and 2010, but stopped those transitions after identifying security risks and lacking adequately trained personnel. The problem for the DoD is that IPv4, the IP management system the DoD uses, is running out of address space. IPv4 only has room for 4.3 billion addresses. In contrast, IPv6, created in the 1990s, provides about 340,000,000,000,000,000,000,000,000,000,000,000,000 (undecillion) IP addresses. The Defense Department owns approximately 300 million IP addresses with about 59.8 million unused and planned for use by future DoD components. The department estimates it will run out of its unused IP addresses by 2030. The department's IPv6 implementation plan from early 2019 listed 35 actions needed to switch over from IPv4. Eighteen of those steps were scheduled to be completed by March 2020. The report said six of the 18 tasks were completed on time. Upgrading to IPv6 would increase connectivity, add security, improve the warfighter's connection and communications on the battlefield, and preserve interoperability with allied systems, the GAO wrote. The watchdog found that the department was not compliant with several IPv6 transition requirements from the White House's Office of Management and Budget. The DoD hasn't completed a cost estimate, developed a risk analysis or finished an inventory of IP compliant devices, the report said. Pentagon officials told the GAO that they knew their time frame for the transition was “optimistic," adding that they thought the pace was reasonable "until they started performing the work,” the GAO wrote. “Without an inventory, a cost estimate, or a risk analysis, DOD significantly reduced the probability that it could have developed a realistic transition schedule,” the GAO wrote. “Addressing these basic planning requirements would supply DOD with needed information that would enable the department to develop realistic, detailed, and informed transition plans and time frames.” The Department did meet OMB's requirement to name an official to lead and coordinate the agency planning. But because the Pentagon failed to complete the other three OMB requirements. the move is at risk. “Without an inventory, a cost estimate, or a risk analysis, DOD's plans have a high degree of uncertainty about the magnitude of work involved, the level of resources required, and the extent and nature of threats, including cybersecurity risks,” the GAO wrote. Among the DoD's goals it did complete are several IPv6 training programs, information sharing opportunities and a program management office. The GAO recommended that Defense Secretary Mark Esper direct the DoD chief information officer to complete an inventory of IP-compliant devices, develop a cost estimate and perform a risk analysis. The DoD agreed that it needed to develop a cost estimate and risk analysis but didn't concur that it needed to inventory devices, citing new guidance from OMB and calling an inventory “impractical” because of the department's size. “The lack of an inventory is problematic due to the role that it should play in developing transition requirements,” the GAO wrote. https://www.c4isrnet.com/it-networks/2020/06/02/watchdog-says-pentagon-needs-better-planning-for-ip-update-17-years-after-first-attempt/

  • Polish Navy chooses Arrowhead 140 design for new frigates

    March 7, 2022 | International, Naval

    Polish Navy chooses Arrowhead 140 design for new frigates

    The detailed design and systems integration planning process for the Polish frigates is expected to conclude later this year, with construction starting next year and completion of the first ship in 2028.

All news