Back to news

August 3, 2024 | International, C4ISR, Security

U.S. Releases High-Profile Russian Hackers in Diplomatic Prisoner Exchange

Historic prisoner exchange involves the U.S., Russia, and allies, freeing cybercriminals and political detainees, marking a significant diplomatic ach

https://thehackernews.com/2024/08/us-releases-high-profile-russian.html

On the same subject

  • US Army seeks tethered UAV for laser-designating

    April 28, 2020 | International, Aerospace, C4ISR

    US Army seeks tethered UAV for laser-designating

    Gareth Jennings, London - Jane's International Defence Review 26 April 2020 The US Army is looking to acquire tethered unmanned aerial vehicles (UAVs) to laser-designate ground targets from stand-off distances. A solicitation posted on 24 April by the Department of the Army calls for information on a tethered-UAV that can be used by Air National Guard (ANG) Special Tactics Operators (STOs) to observe and engage hostile ground forces using laser-guided weapons from greater stand-off distances. "The required product will allow STOs to develop tactics, techniques, and procedures for observing and engaging hostile forces with low-collateral, long stand-off, laser-guided weapons fired or released from weapons systems that are unable to self-designate and expedite targeting for systems that can self-designate but have not yet identified a target's location," the request for information (RFI) noted. Performance standards for the tethered UAV set out in the RFI comprise the ability to reach 200 ft above ground level (AGL); 24-hour flight on a 2 kw or smaller generator; a 5 lb (2.3 kg) payload capacity; AES 256 encryption of the UAV control and video data; ability for open architecture use of the UAV's onboard computer; gimballed camera with co-witness laser designator capability of 30 mj or better, laser spot tracker, and laser rangefinder (which would reduce the 5 lb payload); the ability to generate target co-ordinates; an untethered communications link range of 8 km or better; remote handoff capability desired; an untethered flight duration of at least 45 min with 3 lb payload; autonomous delivery capability of 4 lb; multiple hot-swappable payloads and batteries (ability to change payload and batteries without powering down); the ability to operate in high winds of more than 40 mph (64 kph); the ability to operate in precipitation- industry standard IP54 or better; a temperature capability of -10°F to + 120°F (-23°C to 49°C); a hover capability and forward flight speed of 35 mph or better; target recognition artificial intelligence (AI) capable for people and vehicles; an Android Team Awareness Kit (ATAK) integrated plugin; and the ability to operate and navigate in GPS and radar-denied environments. https://www.janes.com/article/95779/us-army-seeks-tethered-uav-for-laser-designating

  • ICAO Council endorses new Global Aviation Security Plan

    November 15, 2017 | International, Aerospace, Security

    ICAO Council endorses new Global Aviation Security Plan

    ​The 36-State ICAO Council. In endorsing the very first Global Aviation Security Plan today to improve international coordination, reponse, and planning relating to threats to civil aviation passengers, aircraft and facilities, the Council encouraged the ICAO Secretariat to continue refining and improving it on the basis of close continued cooperation with States and security stakeholders globally, and with due attention to all applicable implementation assistance and capacity building requirements in ICAO's Regions. ​ Montréal, 15 November 2017 – The ICAO Council took an historic step in endorsing the very first Global Aviation Security Plan to improve international coordination, response, and planning to counter threats to civil aviation passengers, cargo, aircraft and facilities. “This new strategic document will assist ICAO Member States in their aviation security coordination with other States and applicable security agencies, as well as helping to nurture security cultures and capabilities, place greater focus on the role of new technologies and innovations, and refine related frameworks for oversight and quality assurance,” affirmed ICAO Council President Dr. Olumuyiwa Benard Aliu. A set of indicators and target dates have also been established, and all associated targets and outcomes will be regularly reviewed and adjusted, taking into account all new and emerging aviation security threats. “The Council has encouraged the ICAO Secretariat to continue refining and improving this critical living document, on the basis of close continued cooperation with States and security stakeholders globally, and with due attention to all applicable implementation assistance and capacity building requirements in ICAO's Regions,” Dr. Aliu further commented. Subsequent to its first review of the new Global Aviation Security Plan in June 2017, the Council authorized its transmission to ICAO Member States and international organizations for comment. Ninety-six percent of those replies indicated agreement with its scope and purpose, as well as the related strategies and global targets, which will continue to be refined. “The ICAO Secretariat has developed this strategic document on an accelerated basis to answer the call of ICAO's Council and Member States and the respective commitments and actions of national governments will now be essential to its overall impact and value,” commented ICAO Secretary General Dr. Fang Liu. “This new Global Aviation Security Plan will now take its place alongside ICAO's existing Global Plans for aviation safety and system-wide capacity and efficiency, and importantly it directly responds to various resolutions and expectations regarding aviation security and terrorism which have been expressed to ICAO by the United Nations Security Council.” The ICAO Global Aviation Security Plan calls for action at the global, regional and national levels by States, industry and other stakeholders in raising the level of implementation of Annex 17 to the Convention on International Civil Aviation – Security. Secretary General Liu further confirmed that a roadmap outlining 94 tasks, accompanying 32 actions under five key priority outcomes, will be central to the new Global Plan's roll out. These lay the groundwork for objectives over the next three years until the 40th Session of the ICAO Assembly in 2019. In line with its contribution to the Global Counter-terrorism Strategy of the United Nations, ICAO will continue to coordinate with the Security Council and its various committees on all priorities relevant to aviation and border security, and bring together the private and public sector partners who help ensure our network remains at the dependable service of societies and economies. https://www.icao.int/Newsroom/Pages/ICAO-Council-endorses-new-Global-Aviation-Security-Plan.aspx

  • The unlikely tool that’s improving physical security at military bases

    April 23, 2018 | International, Security

    The unlikely tool that’s improving physical security at military bases

    By: Adam Stone From their perch in the operations center at the Navy Yard in Washington, D.C., security analysts peer down like hawks over the Naval Research Lab, Walter Reed National Military Medical Center Joint Base Anacostia-Bolling and a half-dozen other major military installations scattered around the national capital region. It takes just 10 people to maintain constant surveillance over all those disparate sites, “but you need machines to help you,” said Robert Baker, command information officer for the Naval Facilities Engineering Command. Those machines include a complex network of cameras and sensors, supported by analytics software. When the software spots a suspect event – traffic headed in the wrong direction, for example – that video feed gets pushed to the foreground for human analysis. This is just one example of how the military looks to technology to improve physical security. The real-world influence of technology is evident across the military: Everything from targeting systems to logistics to intelligence, surveillance and reconnaissance has been enhanced in some way by IT. Physical security represents an emerging frontier, where artificial intelligence, machine learning, autonomous technologies and other advances could give the military an edge. Force multiplier At Edwards Air Force Base in California last summer, a security team installed a ground-based radar system to monitor a wide landscape using electro-optical and infrared sensors. The team turned to technology to give them insight across a massive 308,000-acre facility. “The driving need for this system is to proactively defend Edwards AFB. Given the mission of Edwards, and how much terrain we have, we need a system that can overcome the difficulties of patrolling the vast amount of land Edwards presents to our patrols,” Staff Sgt. Alexander Deguzman, an installation security technician with the 412th security forces squadron said in a news release. As at the Navy Yard, the effort at Edwards is all about using some combination of remote sensing, networked surveillance and machine intelligence to create a force multiplier in physical security. Analysts say such initiatives could make bases and installations markedly safer at a lower cost and with less labor required. The rise of artificial intelligence is a critical technology moving forward. Security often involves the constant observation of multiple video and data feeds for prolonged periods of time. Human analysts get tired. They look away for a moment. In short, they miss stuff. “A human can look at things once or twice, but after 100 times they start to lose their edge,” said retired Air Force Lt. Gen. Bob Elder, chair of the cyber and emerging technologies division at the National Defense Industrial Association. “AI goes beyond what a human can do, because it doesn't get tired.” Elder envisions a future in the near-term in which routine surveillance can be carried out by software-supported machines, with computers scanning for anomalies and alerting human analysts to potential threats. That saves on labor. In addition, such as approach also would allow the military to use less highly-skilled operators, relying instead on the machine's expertise and accuracy. Eyes in the sky Industry's interest in this subject has helped bring AI and autonomy to the fore as potential security assets. With the rise of the drones and the imminent arrival of driverless cars, some experts are looking to autonomy as the next logical step in military security. Drones alone don't offer a security fix: Their batteries run down too fast. The military might however consider the use of tethered drones, autonomous ISR assets that can hover in place and remain attached to a power source for ongoing operations. Put one at each corner of a base camp and leaders can put together a big-picture view of any approaching hazard. “This kind of solution is really smart, because you can constantly feed it power, you don't have to worry about it flying away, and if someone tries to damage it or take control of it, you know about it right away,” said Steve Surfaro, chairman of the Security Industry Association public safety working group. Another key industry trend, biometrics, may also point the way forward on physical security. “Investing in facial recognition software ... can improve perimeter security by automating aspects of it to speed up entry to bases for those authorized and focus screening attention on those that represent a risk,” according to a Deloitte report on smart military bases titled “Byting the Bullet.” The networking needs To make the most of the technological imperative around security, experts say, the military will have to give serious thought to issues of infrastructure. Security is becoming a data function: Sensor streams, video feeds, drone surveillance and other methodologies all will require robust network support and substantial compute resources. The data will need to flow freely, even in great quantities, with ample processing available to put it to use. Much of the processing will be done in the cloud, “but you still need to have a reliable connection to that cloud, which means you want diversity and redundancy. At a minimum you want two connections and ideally you want three ways of doing it – wires, line of sight wireless, and satellite,” Elder said. “You need a reliable way to get to your cloud services.” Such an implementation will require, at the least, a significant amount of bandwidth. At the Navy Yard, Baker said he is able to overcome that hurdle through thoughtful network design. In other words: Rather than pushing all the information back to the operations center for processing, new video and sensor analytics takes place on the edge, shrinking the overall networking demand. “The more processing you can do at the edge of the network, the less robust your network needs to be,” he said. Efficient network design weeds out routine activity “and then the really interesting information is being sent for human analysis.” While emerging technologies can enhance the military's security operations, some argue that IT capabilities are not, in themselves, a rationale for upgrading systems that may already be meeting mission. Budgetary constraints apply. “You could make processing faster, but what is the threat that we are trying to counter? If we are seeing zero incidents, why we would gold-plate that area? We want to be good stewards of the taxpayer dollars,” Baker said. “At the same time, if there was some high-risk area where we needed to do that better, we would absolutely want to put resources against that.” https://www.c4isrnet.com/it-networks/2018/04/12/the-unlikely-tool-thats-improving-physical-security-at-military-bases/

All news