Back to news

July 6, 2023 | International, Land, C4ISR

US Army taps RTX for $117 million infrared sensor deal

The new contract is the culmination of "many years of research and development on what is an extremely complex" topic, an Army official said.

https://www.c4isrnet.com/industry/2023/07/06/us-army-taps-rtx-for-117-million-infrared-sensor-deal/

On the same subject

  • How tensions with Iran could test a new cyber strategy

    January 10, 2020 | International, C4ISR, Security

    How tensions with Iran could test a new cyber strategy

    Mark Pomerleau In 2018, the Department of Defense began following a new philosophy for cyber operations to better protect U.S. networks and infrastructure. Known as “defend forward,” the approach allows U.S. cyber forces to be active in foreign network outside the United States to either act against adversaries or warn allies of impending cyber activity that they've observed on foreign networks. After the U.S. military killed an Iranian general in a Jan. 2 drone strike and after national security experts said they expect Iran might take some retaliatory action through cyber operations, the specter of increased cyber attacks against U.S. networks puts Cyber Command and its new approach front and center. “This Iran situation today is a big test of the ‘defend forward' approach of this administration,” James Miller, senior fellow at Johns Hopkins Applied Physics Laboratory and former undersecretary of defense for policy, said at a Jan. 7 event hosted by the Council on Foreign Relations. “Will [Cyber Command] take preventative action? Will they do it in a way that our allies and partners support and that can be explained to the public?” While Iran fired several missiles Jan. 7 at a base in Iraq where U.S. troops lived as an initial response to the drone strike, many national security experts expect Iran could continue cyber actions as further retaliation for the strike. Iran could also ratchet up its cyber operations in the United States following the collapse of portions of the 2015 nuclear deal between the United States, Iran and five other nations to curb Iran's nuclear weapons capability in return for sanctions relief. Over the past 12 months, the White House and Congress streamlined many of the authorities used to conduct cyber operations to help cyber forces to get ahead of threats in networks around the world. One such provision in last year's annual defense policy bill provides the Pentagon with the authority to act in foreign networks if Iran, among other named nations, is conducting active, systematic and ongoing campaigns of attacks against the U.S. government or people. Cyber Command declined to comment on what, if anything, they were doing differently since the drone strike. Some experts, however, have expressed caution when assessing how well this defend forward approach has worked thus far given it is still relatively new. “The jury is very much still out here,” Ben Buchanan, assistant professor and senor faculty fellow at Georgetown University, said at the same event. “We don't have a lot of data, there's been a lot of hand-wringing ... about these authorities and about how Cyber Command may or may not be using them. I just don't think we've seen enough to judge whether or not ... [it is] meaningfully changing adversary behavior.” Others have also expressed reservations about how effective Iran can even be in cyberspace toward U.S. networks. “Iran is a capable cyber actor, Iran is a wiling cyber actor. That means Iran will conduct cyberattacks,” said Jacquelyn Schneider, Hoover fellow at the Hoover Institution at Stanford University. “It's not like they have this capability and they've been deterred in the past and maybe now they're going to turn it on. I think they've been trying this entire time.” Complicating matters further could be other actors trying to take advantage of U.S.-Iran imbroglio for their own interests. Priscilla Moriuchi, senior principal researcher and head of nation-state research at threat intelligence firm Recorded Future, said over the past several months, there have been reports of Russian state-affiliated actors hijacking Iranian cyber infrastructure to conduct operations masquerading as Iranians. “That creates its own uncertainty,” she said at the same event. “Another level of potential what we call inadvertent escalation if a country perceives that they are attacked by Iran but in reality, it” wasn't. https://www.fifthdomain.com/dod/2020/01/09/how-tensions-with-iran-could-test-a-new-cyber-strategy/

  • Britain buys 14 new Chinook helos, but it’ll take a decade for full delivery

    May 14, 2021 | International, Aerospace

    Britain buys 14 new Chinook helos, but it’ll take a decade for full delivery

    The deal was made through the U.S. Defense Department’s Foreign Military Sales process and will see Britain pay $2 billion for the helicopters and associated equipment.

  • Satellite Imagery + Social Media = A New Way to Spot Emerging Nuclear Threats

    July 31, 2018 | International, Aerospace

    Satellite Imagery + Social Media = A New Way to Spot Emerging Nuclear Threats

    BY PATRICK TUCKER A research team is training computers to find and fuse clues from wildly different rivers of digital data. Hiding illicit nuclear programs might be getting harder, thanks to new ways of gleaning and combining clues from various rivers of digital data. That's the conclusion of new research funded in part by the U.S. Energy Department's National Nuclear Security Administration. Satellites offer one kind of information; social media another — particularly inside countries that may be trying to flout inspections. But large volumes of satellite imagery and social media data aren't similar. You can have one analyst examine satellite pictures and another look at social media posts to see if they align, but the process is time-consuming and generally far from comprehensive. The study's authors developed a method for fusing different types of data in a machine-readable way to offer a much clearer picture. “In light of their ubiquitous emergence, social media increasingly promise to be of great value even though associated applications have thus far remained simple, and their fusion with other data has been largely ad hoc,” the team from North Carolina State University writes in “Fusing Heterogeneous Data: A Case for Remote Sensing and Social Media.” Only by creating a new statistical method for fusing the outputs of satellite data and social media data do you get something you can use to predict what might happen next within a given area of interest, such as a specific nation's nuclear enrichment or weapons development. The researchers looked at satellite and social media data from August 2013, when deadly floods killed eight people and caused widespread damage in Colorado. They sought to show that if you could algorithmically identify which imagery showed the flooding from space, and which geotagged tweets described it on the ground, you could could much more quickly verify one data set against another — that is, you could determine whether incoming social media data supports the conclusions you might be reaching from your satellite data, and vice versa. “Next steps for the project include evaluating nuclear facilities in the West to identify common characteristics that may also be applicable to facilities in more isolated societies, such as North Korea,” notes a press release on the paper. One of the authors, NCSU computer and electrical engineering professor Hamid Krim, said the team would try to “address the insufficient knowledge in general in areas of great interest (e.g. N. Korea and Iran). The goal is to come up with systematic methodologies to transport knowledge about nuclear environments available in other areas (e.g., in the West) to these domains where there is very little available. Creating such an environment in these places of interest will help them detect potential undesired activity.” Of course, there are limitations to media monitoring in Iran and North Korea. The former's social media environment is largely underground, thanks to bans on Twitter and many other social networks. The latter has virtually no social media environment at all. Krim noted that the “adversarial strategy” of social-media censorship makes his team's analysis harder. But even social posts from nearby countries can help illuminate their more secretive neighbors, he said — think tweets from Japan after earth tremors are felt. https://www.defenseone.com/technology/2018/07/satellite-imagery-social-media-new-way-spot-emerging-nuclear-threats/150146/

All news