21 octobre 2020 | International, Aérospatial, Naval, C4ISR

General Atomics Starts SeaGuardian RPAS Validation Flights In Japan

General Atomics Aeronautical Systems, Inc. (GA-ASI), a global leader in Remotely Piloted Aircraft Systems (RPAS), kicked off a series of validation flights on Oct. 15 for Japan Coast Guard (JCG) in Hachinohe, Aomori Prefecture, Japan. GA-ASI is working with Asia Air Survey (AAS) in Japan to conduct the flights.

Naval News Staff

GA-ASI press release

We appreciate Asia Air Survey's support in demonstrating how the MQ-9B SeaGuardian RPAS can provide affordable, long-endurance airborne surveillance of Japan's maritime domain,” said Linden Blue, CEO, GA-ASI. “The system's ability to correlate multiple sensor feeds and identify vessel anomalies provides effective, persistent maritime situational awareness.”

The SeaGuardian flights will validate the wide-area maritime surveillance capabilities of RPAS for carrying out JCG's missions, from search and rescue to maritime law enforcement. These flights follow successful “legacy” MQ-9 maritime patrol demonstrations in the Korea Strait in 2018 and the Aegean Sea in 2019. The Hachinohe operation features the MQ-9B configuration, capable of all-weather operations in civil national and international airspace.

The SeaGuardian RPAS features a multi-mode maritime surface-search radar with Inverse Synthetic Aperture Radar (ISAR) imaging mode, an Automatic Identification System (AIS) receiver, a High-Definition – Full-Motion Video sensor equipped with optical and infrared cameras. This sensor suite, augmented by automatic track correlation and anomaly-detection algorithms, enables real-time detection and identification of surface vessels over thousands of square nautical miles.

GA-ASI's MQ-9B is revolutionizing the long-endurance RPAS market by providing all-weather capability and compliance with STANAG-4671 (NATO airworthiness standard for UAVs). These features, along with an operationally proven collision-avoidance radar, enables flexible operations in civil airspace.

https://www.navalnews.com/naval-news/2020/10/general-atomics-starts-seaguardian-rpas-validation-flights-in-japan/

Sur le même sujet

  • House panel isn’t giving defense industry all the COVID aid it wants

    10 juillet 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    House panel isn’t giving defense industry all the COVID aid it wants

    By: Joe Gould WASHINGTON ― The Pentagon would have $758 million to help mid-tier defense firms weather the financial effects of the coronavirus pandemic as part of the annual defense spending bill approved by the House Appropriations Committee on Wednesday. But the aid, which was part of the panel's proposed $694.6 billion bill, falls short of the “lower double-digit billions” Pentagon officials say defense firms will claim under the stimulus bill Congress passed in March. As Congress debates the next stimulus, the defense industry has been urging lawmakers to appropriate enough to reimburse the Pentagon's suppliers for pandemic-related disruptions. Under Section 3610 of the Coronavirus Aid, Relief, and Economic Security Act, contractors can seek to recover such costs, but Congress has yet to appropriate money for it. “While helpful and our industry appreciates the recognition of the need in the HAC mark and all the support we have received from the Pentagon and Congress to date, this level is insufficient to provide the support indicated previously by [the Office of the Secretary of Defense] and also by company leaders who have been communicating with the Pentagon, the Congress and the White House, including [the Office of Management and Budget],” said National Defense Industrial Association Vice Chairman Arnold Punaro. “We are urging that the next stimulus bill provide the needed funds particularly to support section 3610, the reasonable adjustments due to disruptions, and the added costs of protecting the workforces and doing business in a COVID-19 environment,” he added. Not all of the details of the defense bill were available Wednesday, but a committee summary says it provides “$758 million to mitigate the impacts of COVID on second, third, and fourth tier suppliers in the Defense Industrial Base.” Such support would supplement $688 million for the defense-industrial base that the Department of Defense previously set aside as part of the $10.5 billion it got from the coronavirus relief fund created under the CARES Act. Under Secretary of Defense for Acquisition and Sustainment Ellen Lord warned Congress last month that the DoD's pandemic-related costs, which include 3,610 claims, may nonetheless force it to dip into modernization and readiness accounts if Congress doesn't backfill the money. “The department does not have the funding to cover these costs,” she said. The House Appropriations Committee's bill is not the last word, and Republicans, who control the Senate and the White House, will negotiate over the final numbers. “FY21 appropriations bills must be changed before they have any chance of becoming law,” the panel's top Republican, Rep. Kay Granger of Texas, said Tuesday. This week, Senate Majority Leader Mitch McConnell, R-Ky., began to outline a forthcoming GOP-drafted coronavirus relief package, but it was not immediately revealed what the Pentagon's share might be. House Democrats are reportedly seeking $250 billion in emergency spending for an array of issues, to include rural broadband and transportation infrastructure to health care and global coronavirus relief. As lawmakers reconcile these many priorities, at least one one influential lawmaker on defense ― House Armed Services Committee Chairman Adam Smith, D-Wash. ― has said repeatedly that the Defense Department should draw from its existing budget. The Project on Government Oversight's Mandy Smithberger said the Pentagon has yet to make the case that payments to the defense industry will be the best means to stimulate the economy. “Even though they often don't act like it, resources are still limited to a degree and Congress has to consider fairness as part of that distribution, including who needs the government's help most, and which sectors are going to do the most to help the country,” Smithberger said. “These companies have much better access to capital than a number of other industries and individuals. Even from a reviving-the-economy perspective, this sector has always been one of the poorer performers per dollar for job creation.” The health care and education sectors create more than twice as many jobs per $1 million than the military, and the energy and infrastructure sectors create 40 percent more, according a 2019 analysis by the Costs of War project at Brown University. https://www.defensenews.com/congress/2020/07/08/house-panel-isnt-giving-defense-industry-all-the-covid-aid-it-wants/

  • Deal struck to send German-made Leopard 1 tanks from Belgium to Ukraine

    9 août 2023 | International, Terrestre

    Deal struck to send German-made Leopard 1 tanks from Belgium to Ukraine

    Dozens of second-hand Leopard 1 tanks that once belonged to Belgium have been bought by another European country for Ukrainian forces fighting Russia's invasion, the arms trader who did the deal said Tuesday.

  • HOW HACKED WATER HEATERS COULD TRIGGER MASS BLACKOUTS

    14 août 2018 | International, C4ISR

    HOW HACKED WATER HEATERS COULD TRIGGER MASS BLACKOUTS

    WHEN THE CYBERSECURITY industry warns about the nightmare of hackers causing blackouts, the scenario they describe typically entails an elite team of hackers breaking into the inner sanctum of a power utility to start flipping switches. But one group of researchers has imagined how an entire power grid could be taken down by hacking a less centralized and protected class of targets: home air conditioners and water heaters. Lots of them. At the Usenix Security conference this week, a group of Princeton University security researchers will present a study that considers a little-examined question in power grid cybersecurity: What if hackers attacked not the supply side of the power grid, but the demand side? In a series of simulations, the researchers imagined what might happen if hackers controlled a botnet composed of thousands of silently hacked consumer internet of things devices, particularly power-hungry ones like air conditioners, water heaters, and space heaters. Then they ran a series of software simulations to see how many of those devices an attacker would need to simultaneously hijack to disrupt the stability of the power grid. Their answers point to a disturbing, if not quite yet practical scenario: In a power network large enough to serve an area of 38 million people—a population roughly equal to Canada or California—the researchers estimate that just a one percent bump in demand might be enough to take down the majority of the grid. That demand increase could be created by a botnet as small as a few tens of thousands of hacked electric water heaters or a couple hundred thousand air conditioners. "Power grids are stable as long as supply is equal to demand," says Saleh Soltan, a researcher in Princeton's Department of Electrical Engineering, who led the study. "If you have a very large botnet of IoT devices, you can really manipulate the demand, changing it abruptly, any time you want." The result of that botnet-induced imbalance, Soltan says, could be cascading blackouts. When demand in one part of the grid rapidly increases, it can overload the current on certain power lines, damaging them or more likely triggering devices called protective relays, which turn off the power when they sense dangerous conditions. Switching off those lines puts more load on the remaining ones, potentially leading to a chain reaction. "Fewer lines need to carry the same flows and they get overloaded, so then the next one will be disconnected and the next one," says Soltan. "In the worst case, most or all of them are disconnected, and you have a blackout in most of your grid." Power utility engineers, of course, expertly forecast fluctuations in electric demand on a daily basis. They plan for everything from heat waves that predictably cause spikes in air conditioner usage to the moment at the end of British soap opera episodes when hundreds of thousands of viewers all switch on their tea kettles. But the Princeton researchers' study suggests that hackers could make those demand spikes not only unpredictable, but maliciously timed. The researchers don't actually point to any vulnerabilities in specific household devices, or suggest how exactly they might be hacked. Instead, they start from the premise that a large number of those devices could somehow be compromised and silently controlled by a hacker. That's arguably a realistic assumption, given the myriad vulnerabilities other security researchers and hackers have found in the internet of things. One talk at the Kaspersky Analyst Summit in 2016 described security flaws in air conditioners that could be used to pull off the sort of grid disturbance that the Princeton researchers describe. And real-world malicious hackers have compromised everything from refrigerators to fish tanks. Given that assumption, the researchers ran simulations in power grid software MATPOWER and Power World to determine what sort of botnet would could disrupt what size grid. They ran most of their simulations on models of the Polish power grid from 2004 and 2008, a rare country-sized electrical system whose architecture is described in publicly available records. They found they could cause a cascading blackout of 86 percent of the power lines in the 2008 Poland grid model with just a one percent increase in demand. That would require the equivalent of 210,000 hacked air conditioners, or 42,000 electric water heaters. The notion of an internet of things botnet large enough to pull off one of those attacks isn't entirely farfetched. The Princeton researchers point to the Mirai botnet of 600,000 hacked IoT devices, including security cameras and home routers. That zombie horde hit DNS provider Dyn with an unprecedented denial of service attack in late 2016, taking down a broad collection of websites. Building a botnet of the same size out of more power-hungry IoT devices is probably impossible today, says Ben Miller, a former cybersecurity engineer at electric utility Constellation Energy and now the director of the threat operations center at industrial security firm Dragos. There simply aren't enough high-power smart devices in homes, he says, especially since the entire botnet would have to be within the geographic area of the target electrical grid, not distributed across the world like the Mirai botnet. But as internet-connected air conditioners, heaters, and the smart thermostats that control them increasingly show up in homes for convenience and efficiency, a demand-based attack like the one the Princeton researchers describes could become more practical than one that targets grid operators. "It's as simple as running a botnet. When a botnet is successful, it can scale by itself. That makes the attack easier," Miller says. "It's really hard to attack all the generation sites on a grid all at once. But with a botnet you could attack all these end user devices at once and have some sort of impact." The Princeton researchers modeled more devious techniques their imaginary IoT botnet might use to mess with power grids, too. They found it was possible to increase demand in one area while decreasing it in another, so that the total load on a system's generators remains constant while the attack overloads certain lines. That could make it even harder for utility operators to figure out the source of the disruption. If a botnet did succeed in taking down a grid, the researchers' models showed it would be even easier to keepit down as operators attempted to bring it back online, triggering smaller scale versions of their attack in the sections or "islands" of the grid that recover first. And smaller scale attacks could force utility operators to pay for expensive backup power supplies, even if they fall short of causing actual blackouts. And the researchers point out that since the source of the demand spikes would be largely hidden from utilities, attackers could simply try them again and again, experimenting until they had the desired effect. The owners of the actual air conditioners and water heaters might notice that their equipment was suddenly behaving strangely. But that still wouldn't immediately be apparent to the target energy utility. "Where do the consumers report it?" asks Princeton's Soltan. "They don't report it to Con Edison, they report it to the manufacturer of the smart device. But the real impact is on the power system that doesn't have any of this data." That disconnect represents the root of the security vulnerability that utility operators need to fix, Soltan argues. Just as utilities carefully model heat waves and British tea times and keep a stock of energy in reserve to cover those demands, they now need to account for the number of potentially hackable high-powered devices on their grids, too. As high-power smart-home gadgets multiply, the consequences of IoT insecurity could someday be more than just a haywire thermostat, but entire portions of a country going dark. https://www.wired.com/story/water-heaters-power-grid-hack-blackout/

Toutes les nouvelles