Tuesday, November 19, 2024
More
    Home Blog Page 267

    Remington to Upgrade Army M24 Sniper Rifles into XM2010 Weapon Systems

     

     

     

    The U.S. Army’s PEO Soldier has awarded Remington Arms Company a contract for the modification of 250 M24 sniper rifles, a first batch of up to 3,600 M-24s to be modified into the XM2010 weapon systems – what the Army calls the M24E1 “reconfigured Sniper Weapon System”. The modified rifle is chambered for .300 Winchester Magnum cartridges, (originally the M-24 was designed for 7.62mm NATO .308 Winchester) significantly extending the weapon’s maximum effective range from 800 to 1,200 meters. The Army expects to begin fielding the upgraded weapons to deployed U.S. Army Snipers by the end of December 2010. The current upgrade is expected to sustain the XM2010 weapon system in service for at least 10 years and will serve as a precursor to future sniper systems. The value of the current award is $192,000 while the potential value of the entire program could reach $28.2 million

    According to LTC Chris Lehner, Product Manager Individual Weapons at PEO Soldier, the program has matured within less than a year, through close cooperation between the Army and industry. “The XM2010 had pinpoint precision,” said SFC Robert Roof, NCOIC/Chief Instructor, United States Army Sniper School. “We were able to achieve shots well within the weapon’s capabilities both during limited visibility and during the day. The optics were clear and easy to use and the ergonomics of the weapon made it very comfortable to shoot.”

    Remington reconfigured M24 'Sniper Weapon System' - Photo: US Army, PEO Soldier.

    Besides the chambering to match the .300 Winchester Magnum cartridge,  The M24 Sniper Weapon Systems upgrade comprises a Leupold Mark 4 6.5-20x50mm Extended Range / Tactical riflescope with advanced scalable ranging and targeting reticlel fielded with the AN/PVS-29 Clip-on Sniper Night Sight, and quick attach/detach suppressor to reduce audible and visible signature with an available thermal sleeve that reduces mirage effect on heated suppressors. The weapon uses a five-round box magazine, offering easier load and reload with the additional option to change out ammunition quickly. Each modified M-24 rifle has also gets rail endowed chassis and free floating barrel that allow for easier mounting of weapon accessories and greater accuracy, a folding and adjustable stock that includes comb and length-of-pull adjustments.

    Raytheon Expands Cybersecurity Portfolio with the Acquisition of ‘Technology Associates’

    The Raytheon Company has acquired Technology Associates Inc., a privately held supplier to the U.S. intelligence community, providing system engineering support for mission-critical programs. Technology Associates’ capabilities include data extraction and analysis; digital media intercept and exploitation; embedded system programming; and information assurance services. Based in Reston, Va., Technology Associates was established in 1990 and has 110 employees.

    Technology Associates will become part of Raytheon’s Intelligence and Information Systems (IIS) business. Technology Associates President Preston Harrelle joins Raytheon and will continue to lead business operations while taking on a broader cyberstrategy role across the Information Security Solutions (ISS) product line. “By acquiring Technology Associates and integrating its talent and expertise into our business, we’ll further strengthen our ability to meet the evolving needs of our customers.” Lynn Dugle, president of Raytheon IIS commented.

    ManTech to Operate Expeditionary Surveillance Sensors Supporting the U.S. Army in Iraq

     

    As combat U.S. forces in Iraq convert from combat to ‘advice and assist‘ missions, some missions formerly carried out by the military are handed over to civil contractors. A key force protection security mission handed over recently is the operation of perimeter and remote sensors employed around forward operating bases in Iraq. These Base Expeditionary Target Surveillance Systems-Combined (BETSS-C) will now be operated by civil contractors, under a $70 million contract awarded to ManTech through U.S. Army’s Project Manager Night Vision/Reconnaissance, Surveillance and Target Acquisition (PM NV/RSTA). The recently announced contract covers the next 12 months, at a total amount of US$70 million.

     

    BETSS-C enhances perimeter surveillance, battle command and force protection at joint security stations, forward-operating bases and combat outposts throughout Iraq. The system provides commanders with a digital map display of video, images and other information from ground sensors, pan-tilt-zoom cameras, mid- and long-range electro-optical/infrared sensors and radar mounted on towers, aerostats and other unmanned airborne vehicles.

    “ManTech’s superior communications and electronics expertise, coupled with our extensive in-theater operations support experience will be a valuable asset to the BETSS-C program,” said Louis M. Addeo, president and chief operating officer of ManTech’s Technical Services Group. “We are proud to continue our support of the U.S. and coalition mission in Iraq.”

    Related posts:

    Dyneema HB80 Composite Material Selected for the U.S. Forces’ Improved Combat Helmet

    ECH helmet

    DSM Dyneema has been awarded a contract for the development of an improved combat helmet based on advanced Ultra-high-molecular-weight polyethylene (UHMWPE) material solution. DSM Dyneema has been focusing on research and development of new UHMPWE series of materials to substantially lighten the load for military and law enforcement. As part of the contract the company will develop new unidirectional (UD) materials suitable for the improved combat helmet next generation improved combat helmet application, offering superior ballistic performance at lower weight.

    The company launched the Dyneema HB80 in June 2009. Initially known as Prototype Dyneema X31, this UD composite material  has undergone extensive ballistic and secondary property testing, demonstrating the potential to significantly lighten the load carried by soldiers, providing greater comfort and mobility for soldiers wear protective gear. HB80 offers over the highest ballistic performance on the market today. With 35 percent greater protection against fragmentation threats and its advanced ballistic properties, SWAT helmets made of HB80  could be produced with half the weight of today’s models. This material has now been selected for both body and vehicle armor applications where ultra-light weight and enhanced performance are required.

    The HB80 has been extensively tested and evaluated in different helmet constructions and is currently in the final development testing phase of ECH program. The ECH will use manufacturing techniques  different from those associated with resin-impregnated para-aramids while the UHMWPE uses advanced thermoplastic processing.

    According to DSM Dyneema the company is already working with all major helmet manufacturers involved in the Enhanced Combat Helmet (ECH) program. Unlike previous models made of Kevlar, Improved versions of the ECH will employ the high tech UHMWPE developed specifically to address the requirements of the U.S. Army and Marine Corps. The program is a joint PEO Soldier/Marine Corps Systems Command developmental effort that will provide increased protection against ballistic and fragmentation threats. Previous reports about the ECH mentioned that the new lightweight helmet will match or exceed the ballistic fragmentation resistance of current helmets offering a significant weight reduction of approximately 20%, which means above 0.5 pounds as compared to the older designs (reference).

    IAI Introduces: Panther UAV – Electrically Powered Tilt-Rotor VT-UAV

    Israel Aerospace Industries(IAI) is unveiling two new unmanned systems, representing a breakthrough in Vertical Take off and Landing (VTOL) unmanned aerial vehicle (UAV) designs. Both designs, named Panther and Mini-Panther employ a new tilt-rotor propulsion concept patented by IAI. Both are designed for tactical use. The Panthers have already performed test flights and are expected to operational ready next year. The new Panther will be displayed tomorrow in Latrun, Israel

    The Panther combines the flight capabilities of an airplane with helicopter-like hovering, takeoff and landing employing tilt-rotor propellers, and a vertical lift augmenting propeller. Photo: IAI

    Panther combines the flight capabilities of fixed wing airplane with helicopter-like hovering, takeoff and landing, by employing two tilt-rotor propellers, and a vertical lift augmenter propeller providing additional lift for hovering, takeoff and landing. This configuration enables the Panther to be runway-independent, taking off and landing from unprepared areas. This unique, concept can be applied to UAVs of different sizes, providing land forces and special operations units at tactical level the capabilities commonly associated with much larger platforms.

    This image shows the two tilt-rotors pointing upward, along with the augmenting propeller that is activated only for takeoff, landing and hover. Photo: IAI Photo: Defense-Update

    Weighing about 65 kg, the Panther is powered by three electrical motors and packs sufficient power to loiter on missions of up to six hours at an altitude of 10,000 ft. At this altitude operational radius can exceed 60 km. The Panther carries IAI’s MiniPOP multi-sensor electro-optical day-night payload comprising stabilized day and night cameras, laser rangefinder, laser pointer or laser designator. The smaller Mini-Panther is a 12 kg tilt-rotor mini-UAV designed for mission endurance of two hours. This version operates at lower altitudes and carries the miniature ‘Micro-POP’ EO stabilized payload. Both versions are powered by ultra-quiet electrical motors contributing to the Panther’s stealth capability. The Panther’s flight control system is enhanced with automatic transition flight modes controlling the transitions between hovering and forward flight, enabling the Panther to take off and land automatically by a simple click of the operator console, thus eliminating the need for an external pilot.

    The Panther system employs compact ground control station and support systems packed into a midsize vehicle, storing up to three aircraft, communications datalink, and support equipment, allowing tactical units an autonomous operation. The ground control segment has two operators, using two fully redundant and identical consoles. The two consoles are employed for maximum mission efficiency – according to IAI, the Panther can be operated by a single operator as well. Designed as a portable system, the mini Panther includes two aircraft and a command and control unit carried by two soldiers. The Panther control station, transported on a midsize vehicle, can store up to three aircraft, as well as the ground data link, the support equipment and spare parts, all of which allow the troops’ autonomous operation on the field at a tactical level. Two operators control the mission using two fully redundant identical consoles. IAI is unveiling the Panther tilt-rotor tactical UAV tomorrow, at the Latrun Conference in Israel. IAI’s new UAV will make its international debut later this month, at the Association of the United States Army’s (AUSA) 2010 Annual Meeting and Exposition in the USA.

    The Mini-Panther from IAI Malat made a surprise appearance at Latrun today. Mini-Panther is a 12 kg tilt-rotor UAV which provided the first proof of concept for the Panther line of vehicles. IAI plans to develop a wide range of aerial vehicles, configured for VTOL, high speed, tethered (kite-like platforms that can disconnect the tether and hover for extended period), as well as manned platforms. This photo shows a unique feature of the Panther - the flat lifting body and the payload bay that will eventually enable the vehicle to drop off or collect objects using a miniature manipulator arm. Photo: Noam Eshel, Defense Update

    Saab Gets a Second Customer for Saab 2000 Erieye Airborne Early Warning (AEW) System

    The Saab group has been awarded a contract to deliver an Airborne Early Warning & Control (AEW&C) system comprising the Saab 2000 aircraft platform equipped with the ERIEYE airborne early warning radar system. The contract comprises a Saab 2000 aircraft equipped with the advanced ERIEYE radar system, ground equipment, logistics and support services, to be delivered over a period of 4.5 years. The identity of the customer has not been released but it is assumed to be Saudi-Arabia. The number of aircraft to be delivered has not been released as well.

    Saab 2000 aircraft carrying the Erieye Airborne Early Warning & Control (AEW&C) Radar system.
    Saab 2000 aircraft carrying the Erieye Airborne Early Warning & Control (AEW&C) Radar system.

     

    Earlier this year the UAE has ordered two smaller Erieye AEW systems based on the saab 340 platform. At the time official sources at the UAE explained the w340 is an interim solution, and that the country is still undecided on the long-term plans for its objective AEW capability, considering the Saab 2000, Boeing 737 and Northrop Grumman E-2D. Other nations in the region interested in acquiring AEW capability include Oman and Kuwait.

    Another country that could be interested in such capabilities is South Africa where Saab sold the Gripen fighter aircraft and also operates local subsidiaries. In 2008 the use of Erieye was considered to bolster aerial surveillance and security during the World Cup games this year. However, the presence of such aircraft during the games was not reported. According to Saab, the Erieye airborne surveillance system in combination with the ground equipment provide a detailed picture of a situation which can be used in connection with, for example, border surveillance, rescue operations as well as in combating terrorism and organized crime.

    “This contract can be seen as a further confirmation of our strong position in the world regarding not only the area of airborne surveillance but in systems integration and data fusion as well, says Håkan Buskhe,” CEO, Saab. “This surveillance system will provide the customer with improved solutions for defense and civil security.”

    Saab’s ERIEYE radar is currently operated by the Swedish Air Force and Royal Thai Air Force and the UAE Air Force (on Saab 340 platforms). Brazil, Mmexico and Greece operate it on the Embraer 145 platform. The only Saab-2000 sofar is Pakistan.

    Elbit Systems to Upgrade Asian Tanks with BMS, Optronics

    Elbit Systems Ltd. announced today that it was awarded an approximately $56 million tank upgrade contract from a customer in Asia. The tank upgrade project will span over 24 months and include the installation of battle management systems (BMS), and optronic observation and surveillance systems. The current program is a follow-on upgrade Elbit Systems is conducting with this specific customer (the identity of the customer was not released).

    Elbit Systems has developed a number of battle management systems designed for armored combat vehicles. This system employs the TORCH system employed by the IDF as part of the Digital Army Program (Zayad). Photo: Elbit Systems
    Due to political implications and U.S. technology transfer limitations, Israeli companies are restricted in offering defense systems to a number of Asian countries. Among these, Azerbaijan, India, Singapore and Thailand fit the vague description provided by the company.

    It was reported in the Indian media that the Indian state owned DRDO is cooperating with Elbit Systems in the development of Battlefield Management System for the Indian indigenous Arjun tank. BMS integration could follow as part of the continuous Indian upgrades of the T-72M tanks and, and, possibly with the T-90S.  Such BMS allows the tank to network with other fighting units, enabling several tanks to network with other each other, to effectively engage multiple targets. On the other hand, Azerbaijan has recently received 62 T-72 tanks from Russian military surplus. Azeri T-72s have already been updated with new fire control and remotely controlled weapon station.

    FBI Clamp Down an International Cyber Network

    The FBI arrested 20 persons suspected to be members and operators in an international cyber crime network charged with bank fraud scheme. The network compromised dozens of individual and business accounts in the U.S. and transferred more than $3 million under false identities. The FBI is charging more than 60 people  from Russia, from Belarus, Kazakhstan and Ukraine, as well as U.S. nationals, some already convicted in money laundering and fraud. Of the 60 charged in this case only 20 were arrested in recent days, 17 are still at large in the U.S. and abroad. The charges followed Tuesday’s arrests of 19 people in Britain on computer crime charges being part of “a sweeping and coordinated effort to combat the 21st century’s variation on traditional bank robbery,” US Attorney Preet Bharara said in New York.


    FBI Assistant Director-in-Charge Janice K. Fedarcyk, attributed the attack to the ‘Zeus Trojan’ malware which allegedly allowed hackers to get into victim accounts from thousands of miles away. “They did it with far less exertion than a safecracker or a bank robber.” Fedarcvk admitted but assured, they, “Like the money mules, many, if not all, will end up behind bars.”

    According to the FBI, the scheme was headed by Artem Tsygankov, a Russian national, age 23, who recruited other young students to operate as mules and managed their activities, directing the money gained by the scheme through fraudulent wire transfers to the mules’ accounts. The network followed ‘multi-level’ scheme, where recruits and recruiters keep around 10% of the amount they transfer. The network recruited ‘mules’ by targeting young students holding U.S. tourist Visas, targeted on Russian social network sites. Tsygankov is still at large, wanted by the FBI. If convicted, he faces more than 30 years imprisonment.

    After the ‘mules’ have opened hundreds of bank accounts, under false identities, at U.S. banks, the cyber attack was launched from Eastern Europe, unleashed by sending millions of emails containing the “Zeus Trojan”, targeting computers at small businesses and municipalities in the United States where security awareness is considered low. According to the FBI, once the email was opened, the malware embedded itself in the victims’ computers, and recorded their keystrokes – including their account numbers, passwords, and other vital security codes – as they logged into their bank accounts online. The hackers responsible for the malware then used the stolen account information to take over the victims’ bank accounts, making unauthorized transfers of thousands of dollars at a time to receiving accounts controlled by the co-conspirators.

    Hundreds of receiving accounts were set up in advance by a “money mule organization” responsible for retrieving the proceeds of the malware attacks and transporting or transferring the stolen money overseas. To carry out the scheme, the money mule organization recruited individuals who had entered the United States on student visas, providing them with fake foreign passports, and instructing them to open false-name accounts at U.S. banks. Once these false-name accounts were successfully opened and received the stolen funds from the accounts compromised by the malware attacks, the “mules” were instructed to transfer the proceeds to other accounts, most of which were overseas, or to withdraw the proceeds and transport them overseas as smuggled bulk cash.

    The investigation began in February 2010 when New York Police Department (NYPD) investigated a suspicious $44,000 withdrawal from Bronx bank, said Commissioner Raymond W. Kelly said: “It soon became evident that it was just the tip of an international iceberg.” said Kelly. The investigation unfolded far beyond New York, involving national and trans-national agencies to reach and decipher the international scheme which represents the profile of typical modern cyber crime. As the incidence of transnational cybercrimes continues to rise, investigations and prevention activities are elevated to include the Diplomatic and Secret Service. “The results of this investigation clearly demonstrate how the Secret Service is forging strong partnerships with other law enforcement agencies, successfully combating cyberfraud, and bringing high-tech perpetrators to justice.” DSS Special Agent-in-Charge Christopher Paul added “The charges announced today send a strong message: Diplomatic Security is committed to collaborating with our law enforcement partners to make sure that those who commit fraud face consequences for their criminal actions. Diplomatic Security’s strong relationship with the U.S. Attorney’s Office and other law agencies around the world continues to be essential in the pursuit of justice.”

    Stuxnet Computer Worm Exposes Potentially Disastrous Vulnerabilities to Cyber Terrorism

    Stuxnet is definitely not a military code, at least not a Western one” said Shai Blitzblau, Head of Maglan-Computer Warfare and Network Intelligence Labs, interviewed by Defense Update. “Stuxnet is a sophisticated and highly advanced code, but it lacks certain elements commonly associated with military operations” Blitzblau explains that the broad, indiscriminate attack on industrial computers launched by Stuxnet is not characteristic to a military operation, where the nation launching the attack tries to minimize collateral damage and focus on a specific target.


    “Every student can write a module discriminating the target computer and localizing the attack to a specific target” Blitzblau added, “The fact that this sophisticated code does not have such elements, and certain aspects of the functionality of the malicious code, allege to the creators’ aiming Stuxnet to target Siemens industrial systems on a broad base, rather than a specific application as reported by the media.” In addition, a high level code aimed at Network Intelligence Operations would have an anti-anti debug mechanism to avoid forensic analysis.

    Who could be the perpetrators behind this attack and what were their goals?

    Blitzblau describes an act of ‘Advanced Industrial Espionage’ a deliberate cyber sabotage launched by someone against Siemens – this could be a competitor or service-provider, seeking to exploit the situation for business opportunities – first create the problem and then – help fixing it. But there are also other aspects to the attack that could tell a different story. “This could also be a ‘general test’, prior to a planned attack, or a proof of concept, initiated by an academic group – in the past we witnessed such attacks, for example, one attack was launched from Japan, on video drivers.” According to Blitzblau a military test going out of control is not an option here. “Military offensive cyber ops are not conducted this way and even when an intelligence agency conducts such tests they will go a long way to ensure that the test is limited to a specific volume and not spread it worldwide.” He said. Blitzblau attributes the widespread infection of industrial networks in Iran to low level of security and, apparently the high popularity of Siemens systems in the country. In fact, Stuxnet could have propagated from Belarus, and Russia unintentionally by Russian system engineers, using USB devices to update and program Siemens systems in Iran, Indonesia and India. The intensity of attack in Iran could illuminate the intensity of their activities associated with the nuclear projects in Natanz and Bushehr.

    While the media attributed Stuxnet as a cyber weapon launched by Israel or the USA against Iran’s nuclear facilities, the possibility of it being a cyber weapon developed and launched by international terrorists’ organization has not been tackled seriously by the media. Yet, Blitzblau has a grim outlook as to the potential value of such cyber weapon in the hands of terrorist organizations. “International terrorist organizations certainly have the will, and means to launch such an attack, and they could gain the most from it – creating mega events like bringing airports, disrupting train traffic, cutting power supplies and utilities. “Even if they did not create it, they now have access to such a weapon, as Stuxnet is now in their reach, like a loaded gun. Despite the countermeasures developed by Microsoft and Siemens, there are many networks that have not been patched yet – some will never be protected. Blitzblau warns that the current attack will probably set the route for new vectors for cyber terror, as the malicious code is modified and manipulated into a range of new forms and variants. The vulnerabilities highlighted by the current attack will undoubtedly set the course for more attacks aimed at industrial controllers and embedded systems. With that, the risk of compromising military systems will grow dramatically; as such elements are widely used in military weapon systems.

    Northrop Grumman, Lockheed Martin Share USAF $2.3 Billion Advanced Targeting Pods Buy

    On Thursday last week (Sept 30) the Pentagon awarded two competitive contracts for the delivery of advanced targeting pods for U.S. Air Force fighters. The Air Force will continue the procurement of two types of pods under the Advanced Targeting Pod – Sensors Enhancement (ATP-SE) program – the AAQ-33 Sniper from Lockheed Martin and AAQ-28(V) Litening – from Northrop Grumman and Israel’s Rafael. The total spending on the two systems over the life of the program could reach US$2.3 billion. The service is seeking to acquire an estimated 275 systems. At present, the contracts awarded to each of the two teams amount about $23 million each.


    Stuxnet Under the Microscope – Israeli Cyber Warfare Expert Analyzes the Malicious Code

    Stuxnet uncovers the vulnerability of our infrastructure system – exposing the vulnerable interfaces between the logical and physical world, these elements are totally unprotected and open disastrous vulnerabilities to attack by cyber terrorism and cyber criminals.

    “We have analyzed the code, and compared it to other, similar known malware, this new code has definitely the parameters of a ‘military code’, but it lacks some aspects one would expect to find in military cyber warfare application” Shai Blitzblau, Head of Maglan-Computer Warfare and Network Intelligence Labs, interviewed by Defense Update. Among these parameters are communications, encryption, internal self-protection (anti-anti debug) and certain methodologies that are followed by western cyber warfare specialists.


    While Iran was marked as Stuxnet’s most popular target, other countries falling prey to the new malware were many third world nations where Siemens equipment is widely used and security and legal discipline in licensing and security methods are not strictly enforced. Stuxnet also attacked Indonesia, India, Russia, Belarus, and in Kirgizstan. What’s more important is where the Stuxnet didn’t attack – China and – most surprisingly – Germany, where only few systems were compromised yet none of the reports was confirmed!

    “Siemens is reporting that industrial plants in Germany have also been hit by the Stuxnet worm. According to Wieland Simon, press spokesman at Siemens, approximately one third of the 15 infections discovered at industrial plants worldwide have been found at sites in German process industry sector. Siemens’ own plants are said not to be affected” simon added.

    Although it was ‘discovered’ by the media in late September, Stuxnet is definitely not a new threat and, in fact, most of the vulnerabilities it exploited have already been ‘patched’. It was created sometime in January-February according to the ‘time stamps’ embedded into the compiled code. Initial anomalies related to the new threat were reported about two months later. Maglan received the new threat as part of our technical support services to some of our customers, who were hit by the malware. After thorough analysis we have uncovered several interesting aspects of the code that were not familiar before, and lead us to assume that Stuxnet was not created by a western cyber warfare organization. However, the great effort and resources invested in this code testify to its value to its creators, who spent great investments – financial, technical and in – most importantly, in assets considered scarce commodities among the hackers community.

    Targeting Industrial and Infrastructure Systems

    First, and most important, the code was not written by “home based” hackers – unlike most other malware codes, it is not directed against conventional windows systems, but specifically at industrial systems, by exploiting four different vulnerabilities (security ‘holes’ detected by hackers but not yet patched, three months ago, by the targeted software provider – also called ‘Zero Day’ exploits). Such Zero-Day Exploits are not spent easily by hackers, and would rarely be used in tandem, let alone in a ‘quad’ formation, testifying to the fact that the developer team had no limits on the use of resources.

    Multiplicity and redundancy were also employed addressing the targeted operating systems. The creators of Stuxnet also went into great effort to ensure the malware covers all potential avenues of approach – including systems that rarely interest hackers – like WindowsCC, a Microsoft operating system designed for embedded systems. The code also targets all Windows platforms from Windows ME, XP, NT, Vista, 2000, 2003 and 2008 to the latest Windows 7 – again not a simple task for regular hackers. Other aspects of the code target specific vulnerabilities attributed to Siemens PSC7 systems, designed to control Programmable Logic Controllers (PLC) widely used in utility and industrial SCADA systems.

    While each of these penetration axes operates independently, these parallel lines are coordinated and supporting each others to achieve the goal – ‘hijack’ as many PLCs as possible and burry embedding itself into the command and control hubs. The malicious code does not carry the type of spyware commonly found in other bots, but is rather ‘attack oriented’ – carrying a ‘payload’ in form of a set of commands designed to bypass those controlling the PLC, and carry out a set of actions as instructed by the hijacker.

    Self Contained Weapon’s Payload

    The carry out and control such attack the creators of Stuxnet embedded three separate means of communications in the code – two are considered ‘advanced’ and one ‘low level’. However, the code lacks communications elements that would enable a ‘nation state’ operation much more flexibility and control, having the capability and means to conduct operations in the proximity of the targeted site. One of the unique features of Stuxnet is the way its payload is ‘packed’ into the code.

    Previous malware attacks employed a communications mechanism that could download the payload – the intelligence collecting ‘spyware’ or ‘attack’ from the command and control center – this enables the use of more compact code, better precision and more flexibility as the attack unfolds. Stuxnet has the payload built-in to the code, alluding to the fact that it was targeted against known targets and its creators had little consideration as to the collateral damage they create. Again, this methodology is rarely used among Western cyber warfare operatives.

    Although the code was designed with remotely controlled ‘uninstall’ and termination function, these do not work properly in most cases, as the level of sophistication invested in this segment fall behind the general high standard of Stuxnet.

    Countermeasures and Concealment

    Nevertheless, the creators took great effort to conceal the malicious code from detection, in an effort to mask its existence, activity and objectives. For example, the malicious code was written as a ‘dynamic link library’ (.dll) commonly associated with hardware device drivers – software elements rarely considered a risk, since these they are written, signed off and distributed by hardware providers to support specific functions of such hardware. Users commonly download these devices as part of hardware installations and support and trust their own anti-virus scanners and the companies that provided the drivers for their security. Alas, Stuxnet exploited this vulnerability – it uses highly sophisticated anti-anti-virus countermeasures, addressing 38 (!) known anti-virus programs, not only few of the most common ones, as most hackers will do.

    In addition, the code is digitally signed by VeriSign as genuine Siemens software. Later, Siemens reported that these signatures were stolen but did not explain how such sensitive material was compromised and reached hostile elements. Technically, ‘extracting’ such signature from existing products is possible, but this capability is beyond the reach of hackers and could be done only with massive computing power not available in non governmental levels. In this area, Stuxnet creators have again demonstrated they can be generous – to ensure their code is accepted, they used two different signatures – by chip Taiwanese makers JMicron and Realtek. The fact that these signatures are time-stamped in within more than a week of each other could testify as to the lengthy process of the preparation, testing and operation planning.

    USAF Caps B-52 Spending at $12 Billion for Support and Modernization Over the Next Eight Years

    Boeing has been awarded a sole-source $11.9 Billion  indefinite-delivery/indefinite-quantity (IDIQ) contract to support the fleet of B-52H bombers operated by the U.S. Air Force for the next eight years. The contract provides for the all acquisition and sustainment activities needed to support the aircraft and its systems, through their life extension and modernization. The award sets the framework for the program with individual orders to be awarded as required.


    The B-52 is a long-range, heavy bomber that can perform a variety of missions. The bomber is capable of flying at high subsonic speeds at altitudes up to 50,000 feet (15,166.6 meters). It can carry nuclear or precision guided conventional ordnance with worldwide precision navigation capability.

    In a conventional conflict, the B-52 can perform strategic attack, close-air support, air interdiction, offensive counter-air and maritime operations. For example, during Desert Storm in 1991, B-52s delivered 40 percent of all the weapons dropped by coalition forces. It is highly effective when used for ocean surveillance, and can assist the U.S. Navy in anti-ship and mine-laying operations. Two B-52s, in two hours, can monitor 140,000 square miles (364,000 square kilometers) of ocean surface. The aircraft has been equipped with heavy stores adapter beams for carrying 2,000 pound munitions, and a full array of advance weapons currently under development. All B-52s can be equipped for precision attack carrying two electro-optical viewing sensors, a forward-looking infrared and advanced targeting pods to augment targeting, battle assessment, and flight safety, thus further improving its combat ability. Pilots wear night vision goggles to enhance their vision during night operations. Night vision goggles provide greater safety during night operations by increasing the pilot’s ability to visually clear terrain, avoid enemy radar and see other aircraft in a lights-out environment.

    The B-52A first flew in 1954, and the B model entered service in 1955. A total of 744 B-52s were built with the last, a B-52H, delivered in October 1962.  The first of 102 B-52H’s was delivered to Strategic Air Command in May 1961. The H model can carry up to 20 air launched cruise missiles. In addition, it can carry the conventional cruise missile that was launched in several contingencies during the 1990s, starting with Operation Desert Storm and culminating  in the early 2000s with Operation Iraqi Freedom, and Operation Enduring Freedom in Afghanistan.

    Only the H model is still in the Air Force inventory and is assigned to the 5th Bomb Wing at Minot AFB, N.D. and the 2nd Bomb Wing at Barksdale AFB, La., which fall under Air Force Global Strike Command. The aircraft is also assigned to the Air Force Reserve Command’s 917th Wing at Barksdale.

    Related posts:

    Updated: Iran’s Hornets Nest at Bandar Abbas

    Iran is preparing a massive force of small but highly capable combat elements capable of disrupting oil transportation through the Persian Gulf and the Straight of Hurmoz choke point. The Iranians have developed unique operational concepts employing coordinated swarm attacks that could effectively defeat large, well protected surface combatants such as those operated by the allied naval forces present at the Gulf. Many of these Swarm elements are currently stationed at the naval base at Bandar Abbas, acting as the Swarm’s ‘Hornets Nest’ at the southern end of the Hurmoz Straits in the Persian Gulf. In recent, highly publicized naval exercises held by Iran’s Revolutionary Guards’, swarm attacks were demonstrated by engaging targets from extended range by anti-ship missiles, while smaller fast boats were closing in at high speed, firing rockets and Rocket propelled Grenades (RPG) from very short range.

    Bavar-2 amphibian seaplane employs the 'Wing in Ground Effect' (WIG) principle to fly low above sea level. In fact, Bavar-2 traces back to the Russian Eska-1 an early WIG planes designed in the 1970s. It is equipped with maritime surveillance equipment, and communications for recce and target acquisition over the sea. The new plane is operated by the Iranian revolutionary Guards naval units. Photo: Fars news agency, by Vahid reza Alaei.

    An Iranian fast boat firing a 107mm rocket in direct fire against a naval target. Such boats are employed in swarm attacks, saturating a target defense. Photo: Fars news agency by Hossein Zohrevand.

    In recent years Iran is escalating its swarm capabilities to higher levels, with the development of indigenous weapons and platforms tailored for the Persian Gulf Theater of operation. Among these elements are mini submarines, amphibian seaplanes, high speed missile boats and medium range anti-ship missiles. All are designed as compact, cost efficient element that together, creating a force multiplier that cannot be ignored even by the world’s largest, most capable navies.

    Iranian Ghadir mini submarines are based at Bandar Abbas. Photo: FARS news agency by Vahid Reza Alaei

    A key element in this ‘hornets nest’ is the Ghadir mini-submarine. The first two locally built subs were delivered in 2008 and this year during a visit at the base four subs were visible. These submarines built for short missions operating at shallow water, carrying out coastal reconnaissance, mine laying and engagement of surface targets, including moving vessels and oil rigs. Mining by submarines could become one of Iran’s modus operandi as detection or attribution of such action to the actual perpetrator is almost impossible.

    Another element of the hornets nest was unveiled this week, as Iran’s Revolutionary Guards naval units displayed over a dozen planes during an official visit of the Guards’ commander, brig. General Ahmad vahidi at Bandar Abbas. Unveiled as a prototype in 2006, Bavar-2 is designed to operate as a rapid reaction force, equipped with aerial cameras and communications links transmitting images in real-time to command centers at sea or on land. The seaplane is also equipped with a machine gun. It is flown by a single pilot and is fitted to operate in day or night, using night vision devices.

    In August 2010 the Iranians unveiled the ‘sting’ of the hornets – the new Zulfikar fast patrol boats (shown in the video below), an all-aluminum built fast boat armed with Iranian-made Nasr-1 medium range anti-ship missiles. (actually, an Iranian version of the Chinese C-704 missile). The Iranians plan to deploy large numbers of these boats, armed with the locally produced missiles, being able to saturate the defenses of highly protected surface vessels.

    Iran's Revolutionary Guards naval forces unveiled the first amphibian aircraft squadron at Bandar Abbas in September 2010. Photo: Mehr News Agency

    The new Bavar-2 Wind in Ground Effect (WIG) amphibian seaplane, designed to perform short range maritime surveillance, coastal patrol and provide target acquisition for the Zulfiqar fast boats, enabling them to launch their missiles at maximum range, thus avoiding counter attack from the surface. As a WIG amphibian, Bavar-2 has unique capabilities to ‘sea skim’ just above wave-top level, or perch at sea level, thus evading detection by hostile radars. Typically, such planes cruise at a speed of 130 km/h and perform optimally at an altitude of few meters above the sea although, technically some WIG designs can reach a maximum altitude of 300 meters.

    In times of crisis it is assumed that the fast boats, submarines and seaplanes will disperse to many coastal locations, from where they will be able to launch surprise attacks against merchant ships, tankers or military targets. The submarines and amphibians will provide the eyes and ears for the missile carrying fast fast boats, which could group into attack swarms to strike and disperse immediately after it, thus making it difficult for the enemy to launch an effective counter strike.

    Related posts:

    Extendable Stick Turns Micro Robot into a Pole Cam

    ReconRobotics has introduced a new, versatile add-on to the Recon Scout Micro Robot enabling the use of the robot either as a remotely controlled sensor or static, elevated ‘Pole Cam’. The novel device enables military scouts to mount the Micro Robot on the 20 inch (0.52 m) long ‘Recon Scout Search Stick’, a quipped with actuated jaws that grasp the 1.2 pound Recon Scout micro robot.

    Recon Scout micro Robot can now be mounted on an extensible pole to act as a Pole Cam. Photo: ReconRobotics
    The new ReconStick turns the remotely controlled Micro-Robot into a static, elevated 'Pole Cam'. Photo: ReconRobotics

    The telescopic pole can be extended to 72 inch (1.78 m) in fully retracted mode, enabling scouts to easily see over a 12 foot (3.65 m) wall or into a second story window while maintaining protective cover. Throughout such inspections the robot transmits live video to a handheld operator control unit. The SearchStink can also be used to quietly place the robot at elevated or confined space, where it can then search the location for adversaries, IEDs or other threats. Once the inspection has been completed, the operator can use the jaws on the SearchStick to retrieve the robot.

    According to Alan Bignall, president and CEO of ReconRobotics, more than 1,200 Recon Scout Micro Robots are currently operational, and the new device will provide users unique new capabilities to gaining visual access into walled compounds, rooftops, attics, ventilation systems, tunnels and crawl spaces. And because most Recon Scout robots are equipped with infrared optical systems, this visual reconnaissance can be conducted even in complete darkness. “This ‘Know Before You Go’ capability allows tactical teams to quickly and safely clear large multi-level structures before personnel enter these environments” Said Bignall.

    Several branches of the U.S. military and international forces have deployed Recon Scout robots around the world, and are employed in route clearing operations, remote reconnaissance and IED inspection. Nearly 200 police and security agencies use Recon Scout robots for tactical reconnaissance, including the many police tactical teams as well as the FBI, U.S. Marshals, Border Patrol, DEA and the Bureau of Alcohol, Tobacco, Firearms and Explosives. When multiple robots are employed simultaneously in the same location, by different agencies, each robot operates on any of three transmitting frequencies, allowing police and military personnel to operate up to three robots in the same environment at the same time.

    Diehl’s Sky Sphere set to Defeat UAS, OWA Drones Head-On

    0
    Diehl Defence has teamed up with Skysec to develop a drone interceptor. Diehl works with Skysec’s subsidiary, Skysec Defence, to modify the original civilian-oriented net-arresting interceptor into a hard-kill system suitable for military missions....

    Defense Update Weekly News Summary

    0
    Welcome to the latest episode of Defense-Update News Summary! In this episode, we dive into this week’s developments in defense technology, military acquisitions, and strategic partnerships worldwide. Some of this week's highlights include: Elbit Systems...

    Unmanned Combat Aerial Vehicle Program Launches as Part of Rafale F5 Standard

    0
    The French Ministry of Armed Forces has officially launched the Unmanned Combat Aerial Vehicle (UCAV) program as part of the Rafale F5 standard development. This event marks the beginning of a new era in...

    Air Defense & C-UAS Innovations at the AUSA 2024 Exhibition

    0
    Army Air Defense Undergoes Significant Modernization to Counter Drone Threats The U.S. Army's air defense branch has experienced its most substantial modernization and growth in over four decades, primarily driven by the need to counter...

    Elbit Systems Address US Army Artillery Modernization with Sigma 155×52 Wheeled Howitzer

    0
    Elbit Systems of America showcases the Sigma Next Generation Howitzer at AUSA 2024, where competing systems from Sweden, South Korea, France, and Germany are likely to be presented, some in models, others in full...

    Defense-Update Weekly News Summary

    0
    Welcome to the latest episode of Defense-Update News Summary! In this episode, we dive into this week’s developments in defense technology, military acquisitions, and strategic partnerships worldwide. Some of this week's highlights include: Elbit Systems...

    Israel Revamps Aerial Bomb Production

    0
    Elbit Systems has signed a 1.5-billion-shekel (approximately $400 million) contract with Israel's Ministry of Defense to establish an aerial bomb manufacturing bombs for the Israeli Air Force. In the past, the government-owned IMI operated...