Back to news

November 17, 2024 | International, Land

US, Japan, Australia broaden exercises, set target for live-fire drill

The three militaries are learning to work together in case of a crisis in the region.

https://www.defensenews.com/pentagon/2024/11/17/us-japan-australia-broaden-exercises-set-target-for-live-fire-drill/

On the same subject

  • The Lightweight Laser Designator Rangefinder 2H provides highly accurate targeting capabilities to ground forces

    July 10, 2019 | International, C4ISR

    The Lightweight Laser Designator Rangefinder 2H provides highly accurate targeting capabilities to ground forces

    APOPKA, Fla. – July 9, 2019 – Northrop Grumman Corporation (NYSE: NOC) has received a $17.6 million award from the U.S. Army to upgrade Target Locator Modules (TLMs). The TLMs will be retrofitted with high accuracy capability to modernize the Lightweight Laser Designator Rangefinder 2H (LLDR 2H) man-portable targeting system. “The LLDR has been at the core of Army ground targeting for more than a decade, and the innovations in the 2H provide even greater accuracy to support the Army's missions into the future,” said Bob Gough, vice president, land and avionics C4ISR, Northrop Grumman. The LLDR 2H hybrid sensor solution fuses data from a digital magnetic compass and celestial navigation sensors to provide high accuracy target location and long-range imaging to allow warfighters greater leverage to shape the field of engagement. Interconnectivity within the digitized battlefield enables the operator to use LLDR 2H to quickly acquire, locate and designate high-value targets. The LLDR 2H system also features Northrop Grumman's patented thermal diode pumping technology for designation, which consumes less power than older lasers, yet yields greater output energy and lower beam divergence. More than 2,700 LLDR systems have been delivered and fielded to date. Northrop Grumman is a leading global security company providing innovative systems, products and solutions in autonomous systems, cyber, C4ISR, space, strike, and logistics and modernization to customers worldwide. https://news.northropgrumman.com/news/releases/northrop-grumman-receives-award-to-upgrade-us-army-lightweight-laser-designator-rangefinder-systems

  • Synthetic biology raises risk of new bioweapons, US report warns

    June 21, 2018 | International, Security

    Synthetic biology raises risk of new bioweapons, US report warns

    Ian Sample Report warns that swift progress in our ability to manufacture viruses is making us vulnerable to biological attacks The rapid rise of synthetic biology, a futuristic field of science that seeks to master the machinery of life, has raised the risk of a new generation of bioweapons, according a major US report into the state of the art. Advances in the area mean that scientists now have the capability to recreate dangerous viruses from scratch; make harmful bacteria more deadly; and modify common microbes so that they churn out lethal toxins once they enter the body. The three scenarios are picked out as threats of highest concern in a review of the field published on Tuesday by the US National Academy of Sciences at the request of the Department of Defense. The report was commissioned to flag up ways in which the powerful technology might be abused, and to focus minds on how best to prepare. Michael Imperiale, chair of the report committee, and professor of microbiology and immunology at the University of Michigan, said the review used only unclassified information and so has no assessment of which groups, if any, might be pursuing novel biological weapons. “We can't say how likely any of these scenarios are,” he said. “But we can talk about how feasible they are.” In the report, the scientists describe how synthetic biology, which gives researchers precision tools to manipulate living organisms, “enhances and expands” opportunities to create bioweapons. “As the power of the technology increases, that brings a general need to scrutinise where harms could come from,” said Peter Carr, a senior scientist at MIT's Synthetic Biology Center in Cambridge, Massachusetts. More than 20 years ago, Eckard Wimmer, a geneticist at Stony Brook University in New York, highlighted the potential dangers of synthetic biology in dramatic style when he recreated poliovirus in a test tube. Earlier this year, a team at the University of Alberta built an infectious horsepox virus. The virus is a close relative of smallpox, which may have claimed half a billion lives in the 20th century. Today, the genetic code of almost any mammalian virus can be found online and synthesised. “The technology to do this is available now,” said Imperiale. “It requires some expertise, but it's something that's relatively easy to do, and that is why it tops the list.” Other fairly simple procedures can be used to tweak the genes of dangerous bacteria and make them resistant to antibiotics, so that people infected with them would be untreatable. A more exotic bioweapon might come in the form of a genetically-altered microbe that colonises the gut and churns out poisons. “While that is technically more difficult, it is a concern because it may not look like anything you normally watch out for in public health,” Imperiale said. The report calls on the US government to rethink how it conducts disease surveillance, so it can better detect novel bioweapons, and to look at ways to bolster defences, for example by finding ways to make and deploy vaccines far more rapidly. For every bioweapon the scientists consider, the report sets out key hurdles that, once cleared, will make the weapons more feasible. One bioweapon that is not considered an immediate threat is a so-called gene drive that spreads through a population, rewriting human DNA as it goes. “It's important to recognise that it's easy to come up with a scary-sounding idea, but it's far more difficult to do something practical with it,” said Carr. https://www.theguardian.com/science/2018/jun/19/urgent-need-to-prepare-for-manmade-virus-attacks-says-us-government-report

  • The Air Force sends good guys in to hack its cloud

    August 8, 2019 | International, Security

    The Air Force sends good guys in to hack its cloud

    By: Andrew Eversden The Air Force invited ethical hackers into its IT networks again this spring, allowing good guys the chance to infiltrate its enterprise-wide Air Force Common Computing Environment in search of vulnerabilities, the white hat hacking company Bugcrowd announced Aug. 6. The bug bounty program, done in a partnership with Bugcrowd and the Air Force's CCE program office, found 54 vulnerabilities. Bug bounties work under the assumption that the customer, in this case the Air Force, will now close the loopholes the hackers found, making the system more secure. The CCE cloud uses Amazon Web Services and Microsoft's Azure commercial cloud. The service plans to migrate more than 100 applications to that cloud environment, Bugcrowd executives said. The largest payout from the bug bounty totaled $20,000. The event ran from March 18 to June 21 at Hanscom Air Force Base in Massachusetts. Casey Ellis, Bugcrowd founder and CTO, said it was the first time Bugcrowd has worked with the Air Force. The Air Force has completed several other white hat hacking events with the firm HackerOne. Ellis said that moving to the cloud from on-premise environment represents a “paradigm shift” for many organizations. Penetration testing is an important part of keeping that environment secure, he said. Bugcrowd conducted such tests in six phases: source code analysis, AWS environment testing, Azure environment testing, black box network authentication assessment, social engineering engagement and Air Force portal testing. Bugcrowd declined to discuss how many vulnerabilities were found throughout each stage of the process. According to a news release from the Air Force from April, the CCE currently houses 21 Air Force applications and "has room for countess more.” The computing environment allows the Air Force to have a cloud to host its applications that reside on its Global Combat Support System, which is a centralized, cohesive enterprise resource planning system. The Air Force said in the April release that each migration costs $446,000 and that the service has spent more than $136 million on the program since 2016. https://www.fifthdomain.com/dod/air-force/2019/08/06/the-air-force-sends-good-guys-in-to-hack-its-cloud/

All news