Friday, December 26, 2025
More
    Home Blog Page 272

    FBI Clamp Down an International Cyber Network

    The FBI arrested 20 persons suspected to be members and operators in an international cyber crime network charged with bank fraud scheme. The network compromised dozens of individual and business accounts in the U.S. and transferred more than $3 million under false identities. The FBI is charging more than 60 people  from Russia, from Belarus, Kazakhstan and Ukraine, as well as U.S. nationals, some already convicted in money laundering and fraud. Of the 60 charged in this case only 20 were arrested in recent days, 17 are still at large in the U.S. and abroad. The charges followed Tuesday’s arrests of 19 people in Britain on computer crime charges being part of “a sweeping and coordinated effort to combat the 21st century’s variation on traditional bank robbery,” US Attorney Preet Bharara said in New York.


    FBI Assistant Director-in-Charge Janice K. Fedarcyk, attributed the attack to the ‘Zeus Trojan’ malware which allegedly allowed hackers to get into victim accounts from thousands of miles away. “They did it with far less exertion than a safecracker or a bank robber.” Fedarcvk admitted but assured, they, “Like the money mules, many, if not all, will end up behind bars.”

    According to the FBI, the scheme was headed by Artem Tsygankov, a Russian national, age 23, who recruited other young students to operate as mules and managed their activities, directing the money gained by the scheme through fraudulent wire transfers to the mules’ accounts. The network followed ‘multi-level’ scheme, where recruits and recruiters keep around 10% of the amount they transfer. The network recruited ‘mules’ by targeting young students holding U.S. tourist Visas, targeted on Russian social network sites. Tsygankov is still at large, wanted by the FBI. If convicted, he faces more than 30 years imprisonment.

    After the ‘mules’ have opened hundreds of bank accounts, under false identities, at U.S. banks, the cyber attack was launched from Eastern Europe, unleashed by sending millions of emails containing the “Zeus Trojan”, targeting computers at small businesses and municipalities in the United States where security awareness is considered low. According to the FBI, once the email was opened, the malware embedded itself in the victims’ computers, and recorded their keystrokes – including their account numbers, passwords, and other vital security codes – as they logged into their bank accounts online. The hackers responsible for the malware then used the stolen account information to take over the victims’ bank accounts, making unauthorized transfers of thousands of dollars at a time to receiving accounts controlled by the co-conspirators.

    Hundreds of receiving accounts were set up in advance by a “money mule organization” responsible for retrieving the proceeds of the malware attacks and transporting or transferring the stolen money overseas. To carry out the scheme, the money mule organization recruited individuals who had entered the United States on student visas, providing them with fake foreign passports, and instructing them to open false-name accounts at U.S. banks. Once these false-name accounts were successfully opened and received the stolen funds from the accounts compromised by the malware attacks, the “mules” were instructed to transfer the proceeds to other accounts, most of which were overseas, or to withdraw the proceeds and transport them overseas as smuggled bulk cash.

    The investigation began in February 2010 when New York Police Department (NYPD) investigated a suspicious $44,000 withdrawal from Bronx bank, said Commissioner Raymond W. Kelly said: “It soon became evident that it was just the tip of an international iceberg.” said Kelly. The investigation unfolded far beyond New York, involving national and trans-national agencies to reach and decipher the international scheme which represents the profile of typical modern cyber crime. As the incidence of transnational cybercrimes continues to rise, investigations and prevention activities are elevated to include the Diplomatic and Secret Service. “The results of this investigation clearly demonstrate how the Secret Service is forging strong partnerships with other law enforcement agencies, successfully combating cyberfraud, and bringing high-tech perpetrators to justice.” DSS Special Agent-in-Charge Christopher Paul added “The charges announced today send a strong message: Diplomatic Security is committed to collaborating with our law enforcement partners to make sure that those who commit fraud face consequences for their criminal actions. Diplomatic Security’s strong relationship with the U.S. Attorney’s Office and other law agencies around the world continues to be essential in the pursuit of justice.”

    Stuxnet Computer Worm Exposes Potentially Disastrous Vulnerabilities to Cyber Terrorism

    Stuxnet is definitely not a military code, at least not a Western one” said Shai Blitzblau, Head of Maglan-Computer Warfare and Network Intelligence Labs, interviewed by Defense Update. “Stuxnet is a sophisticated and highly advanced code, but it lacks certain elements commonly associated with military operations” Blitzblau explains that the broad, indiscriminate attack on industrial computers launched by Stuxnet is not characteristic to a military operation, where the nation launching the attack tries to minimize collateral damage and focus on a specific target.


    “Every student can write a module discriminating the target computer and localizing the attack to a specific target” Blitzblau added, “The fact that this sophisticated code does not have such elements, and certain aspects of the functionality of the malicious code, allege to the creators’ aiming Stuxnet to target Siemens industrial systems on a broad base, rather than a specific application as reported by the media.” In addition, a high level code aimed at Network Intelligence Operations would have an anti-anti debug mechanism to avoid forensic analysis.

    Who could be the perpetrators behind this attack and what were their goals?

    Blitzblau describes an act of ‘Advanced Industrial Espionage’ a deliberate cyber sabotage launched by someone against Siemens – this could be a competitor or service-provider, seeking to exploit the situation for business opportunities – first create the problem and then – help fixing it. But there are also other aspects to the attack that could tell a different story. “This could also be a ‘general test’, prior to a planned attack, or a proof of concept, initiated by an academic group – in the past we witnessed such attacks, for example, one attack was launched from Japan, on video drivers.” According to Blitzblau a military test going out of control is not an option here. “Military offensive cyber ops are not conducted this way and even when an intelligence agency conducts such tests they will go a long way to ensure that the test is limited to a specific volume and not spread it worldwide.” He said. Blitzblau attributes the widespread infection of industrial networks in Iran to low level of security and, apparently the high popularity of Siemens systems in the country. In fact, Stuxnet could have propagated from Belarus, and Russia unintentionally by Russian system engineers, using USB devices to update and program Siemens systems in Iran, Indonesia and India. The intensity of attack in Iran could illuminate the intensity of their activities associated with the nuclear projects in Natanz and Bushehr.

    While the media attributed Stuxnet as a cyber weapon launched by Israel or the USA against Iran’s nuclear facilities, the possibility of it being a cyber weapon developed and launched by international terrorists’ organization has not been tackled seriously by the media. Yet, Blitzblau has a grim outlook as to the potential value of such cyber weapon in the hands of terrorist organizations. “International terrorist organizations certainly have the will, and means to launch such an attack, and they could gain the most from it – creating mega events like bringing airports, disrupting train traffic, cutting power supplies and utilities. “Even if they did not create it, they now have access to such a weapon, as Stuxnet is now in their reach, like a loaded gun. Despite the countermeasures developed by Microsoft and Siemens, there are many networks that have not been patched yet – some will never be protected. Blitzblau warns that the current attack will probably set the route for new vectors for cyber terror, as the malicious code is modified and manipulated into a range of new forms and variants. The vulnerabilities highlighted by the current attack will undoubtedly set the course for more attacks aimed at industrial controllers and embedded systems. With that, the risk of compromising military systems will grow dramatically; as such elements are widely used in military weapon systems.

    Northrop Grumman, Lockheed Martin Share USAF $2.3 Billion Advanced Targeting Pods Buy

    On Thursday last week (Sept 30) the Pentagon awarded two competitive contracts for the delivery of advanced targeting pods for U.S. Air Force fighters. The Air Force will continue the procurement of two types of pods under the Advanced Targeting Pod – Sensors Enhancement (ATP-SE) program – the AAQ-33 Sniper from Lockheed Martin and AAQ-28(V) Litening – from Northrop Grumman and Israel’s Rafael. The total spending on the two systems over the life of the program could reach US$2.3 billion. The service is seeking to acquire an estimated 275 systems. At present, the contracts awarded to each of the two teams amount about $23 million each.


    Stuxnet Under the Microscope – Israeli Cyber Warfare Expert Analyzes the Malicious Code

    Stuxnet uncovers the vulnerability of our infrastructure system – exposing the vulnerable interfaces between the logical and physical world, these elements are totally unprotected and open disastrous vulnerabilities to attack by cyber terrorism and cyber criminals.

    “We have analyzed the code, and compared it to other, similar known malware, this new code has definitely the parameters of a ‘military code’, but it lacks some aspects one would expect to find in military cyber warfare application” Shai Blitzblau, Head of Maglan-Computer Warfare and Network Intelligence Labs, interviewed by Defense Update. Among these parameters are communications, encryption, internal self-protection (anti-anti debug) and certain methodologies that are followed by western cyber warfare specialists.


    While Iran was marked as Stuxnet’s most popular target, other countries falling prey to the new malware were many third world nations where Siemens equipment is widely used and security and legal discipline in licensing and security methods are not strictly enforced. Stuxnet also attacked Indonesia, India, Russia, Belarus, and in Kirgizstan. What’s more important is where the Stuxnet didn’t attack – China and – most surprisingly – Germany, where only few systems were compromised yet none of the reports was confirmed!

    “Siemens is reporting that industrial plants in Germany have also been hit by the Stuxnet worm. According to Wieland Simon, press spokesman at Siemens, approximately one third of the 15 infections discovered at industrial plants worldwide have been found at sites in German process industry sector. Siemens’ own plants are said not to be affected” simon added.

    Although it was ‘discovered’ by the media in late September, Stuxnet is definitely not a new threat and, in fact, most of the vulnerabilities it exploited have already been ‘patched’. It was created sometime in January-February according to the ‘time stamps’ embedded into the compiled code. Initial anomalies related to the new threat were reported about two months later. Maglan received the new threat as part of our technical support services to some of our customers, who were hit by the malware. After thorough analysis we have uncovered several interesting aspects of the code that were not familiar before, and lead us to assume that Stuxnet was not created by a western cyber warfare organization. However, the great effort and resources invested in this code testify to its value to its creators, who spent great investments – financial, technical and in – most importantly, in assets considered scarce commodities among the hackers community.

    Targeting Industrial and Infrastructure Systems

    First, and most important, the code was not written by “home based” hackers – unlike most other malware codes, it is not directed against conventional windows systems, but specifically at industrial systems, by exploiting four different vulnerabilities (security ‘holes’ detected by hackers but not yet patched, three months ago, by the targeted software provider – also called ‘Zero Day’ exploits). Such Zero-Day Exploits are not spent easily by hackers, and would rarely be used in tandem, let alone in a ‘quad’ formation, testifying to the fact that the developer team had no limits on the use of resources.

    Multiplicity and redundancy were also employed addressing the targeted operating systems. The creators of Stuxnet also went into great effort to ensure the malware covers all potential avenues of approach – including systems that rarely interest hackers – like WindowsCC, a Microsoft operating system designed for embedded systems. The code also targets all Windows platforms from Windows ME, XP, NT, Vista, 2000, 2003 and 2008 to the latest Windows 7 – again not a simple task for regular hackers. Other aspects of the code target specific vulnerabilities attributed to Siemens PSC7 systems, designed to control Programmable Logic Controllers (PLC) widely used in utility and industrial SCADA systems.

    While each of these penetration axes operates independently, these parallel lines are coordinated and supporting each others to achieve the goal – ‘hijack’ as many PLCs as possible and burry embedding itself into the command and control hubs. The malicious code does not carry the type of spyware commonly found in other bots, but is rather ‘attack oriented’ – carrying a ‘payload’ in form of a set of commands designed to bypass those controlling the PLC, and carry out a set of actions as instructed by the hijacker.

    Self Contained Weapon’s Payload

    The carry out and control such attack the creators of Stuxnet embedded three separate means of communications in the code – two are considered ‘advanced’ and one ‘low level’. However, the code lacks communications elements that would enable a ‘nation state’ operation much more flexibility and control, having the capability and means to conduct operations in the proximity of the targeted site. One of the unique features of Stuxnet is the way its payload is ‘packed’ into the code.

    Previous malware attacks employed a communications mechanism that could download the payload – the intelligence collecting ‘spyware’ or ‘attack’ from the command and control center – this enables the use of more compact code, better precision and more flexibility as the attack unfolds. Stuxnet has the payload built-in to the code, alluding to the fact that it was targeted against known targets and its creators had little consideration as to the collateral damage they create. Again, this methodology is rarely used among Western cyber warfare operatives.

    Although the code was designed with remotely controlled ‘uninstall’ and termination function, these do not work properly in most cases, as the level of sophistication invested in this segment fall behind the general high standard of Stuxnet.

    Countermeasures and Concealment

    Nevertheless, the creators took great effort to conceal the malicious code from detection, in an effort to mask its existence, activity and objectives. For example, the malicious code was written as a ‘dynamic link library’ (.dll) commonly associated with hardware device drivers – software elements rarely considered a risk, since these they are written, signed off and distributed by hardware providers to support specific functions of such hardware. Users commonly download these devices as part of hardware installations and support and trust their own anti-virus scanners and the companies that provided the drivers for their security. Alas, Stuxnet exploited this vulnerability – it uses highly sophisticated anti-anti-virus countermeasures, addressing 38 (!) known anti-virus programs, not only few of the most common ones, as most hackers will do.

    In addition, the code is digitally signed by VeriSign as genuine Siemens software. Later, Siemens reported that these signatures were stolen but did not explain how such sensitive material was compromised and reached hostile elements. Technically, ‘extracting’ such signature from existing products is possible, but this capability is beyond the reach of hackers and could be done only with massive computing power not available in non governmental levels. In this area, Stuxnet creators have again demonstrated they can be generous – to ensure their code is accepted, they used two different signatures – by chip Taiwanese makers JMicron and Realtek. The fact that these signatures are time-stamped in within more than a week of each other could testify as to the lengthy process of the preparation, testing and operation planning.

    USAF Caps B-52 Spending at $12 Billion for Support and Modernization Over the Next Eight Years

    Boeing has been awarded a sole-source $11.9 Billion  indefinite-delivery/indefinite-quantity (IDIQ) contract to support the fleet of B-52H bombers operated by the U.S. Air Force for the next eight years. The contract provides for the all acquisition and sustainment activities needed to support the aircraft and its systems, through their life extension and modernization. The award sets the framework for the program with individual orders to be awarded as required.


    The B-52 is a long-range, heavy bomber that can perform a variety of missions. The bomber is capable of flying at high subsonic speeds at altitudes up to 50,000 feet (15,166.6 meters). It can carry nuclear or precision guided conventional ordnance with worldwide precision navigation capability.

    In a conventional conflict, the B-52 can perform strategic attack, close-air support, air interdiction, offensive counter-air and maritime operations. For example, during Desert Storm in 1991, B-52s delivered 40 percent of all the weapons dropped by coalition forces. It is highly effective when used for ocean surveillance, and can assist the U.S. Navy in anti-ship and mine-laying operations. Two B-52s, in two hours, can monitor 140,000 square miles (364,000 square kilometers) of ocean surface. The aircraft has been equipped with heavy stores adapter beams for carrying 2,000 pound munitions, and a full array of advance weapons currently under development. All B-52s can be equipped for precision attack carrying two electro-optical viewing sensors, a forward-looking infrared and advanced targeting pods to augment targeting, battle assessment, and flight safety, thus further improving its combat ability. Pilots wear night vision goggles to enhance their vision during night operations. Night vision goggles provide greater safety during night operations by increasing the pilot’s ability to visually clear terrain, avoid enemy radar and see other aircraft in a lights-out environment.

    The B-52A first flew in 1954, and the B model entered service in 1955. A total of 744 B-52s were built with the last, a B-52H, delivered in October 1962.  The first of 102 B-52H’s was delivered to Strategic Air Command in May 1961. The H model can carry up to 20 air launched cruise missiles. In addition, it can carry the conventional cruise missile that was launched in several contingencies during the 1990s, starting with Operation Desert Storm and culminating  in the early 2000s with Operation Iraqi Freedom, and Operation Enduring Freedom in Afghanistan.

    Only the H model is still in the Air Force inventory and is assigned to the 5th Bomb Wing at Minot AFB, N.D. and the 2nd Bomb Wing at Barksdale AFB, La., which fall under Air Force Global Strike Command. The aircraft is also assigned to the Air Force Reserve Command’s 917th Wing at Barksdale.

    Related posts:

    Updated: Iran’s Hornets Nest at Bandar Abbas

    Iran is preparing a massive force of small but highly capable combat elements capable of disrupting oil transportation through the Persian Gulf and the Straight of Hurmoz choke point. The Iranians have developed unique operational concepts employing coordinated swarm attacks that could effectively defeat large, well protected surface combatants such as those operated by the allied naval forces present at the Gulf. Many of these Swarm elements are currently stationed at the naval base at Bandar Abbas, acting as the Swarm’s ‘Hornets Nest’ at the southern end of the Hurmoz Straits in the Persian Gulf. In recent, highly publicized naval exercises held by Iran’s Revolutionary Guards’, swarm attacks were demonstrated by engaging targets from extended range by anti-ship missiles, while smaller fast boats were closing in at high speed, firing rockets and Rocket propelled Grenades (RPG) from very short range.

    Bavar-2 amphibian seaplane employs the 'Wing in Ground Effect' (WIG) principle to fly low above sea level. In fact, Bavar-2 traces back to the Russian Eska-1 an early WIG planes designed in the 1970s. It is equipped with maritime surveillance equipment, and communications for recce and target acquisition over the sea. The new plane is operated by the Iranian revolutionary Guards naval units. Photo: Fars news agency, by Vahid reza Alaei.

    An Iranian fast boat firing a 107mm rocket in direct fire against a naval target. Such boats are employed in swarm attacks, saturating a target defense. Photo: Fars news agency by Hossein Zohrevand.

    In recent years Iran is escalating its swarm capabilities to higher levels, with the development of indigenous weapons and platforms tailored for the Persian Gulf Theater of operation. Among these elements are mini submarines, amphibian seaplanes, high speed missile boats and medium range anti-ship missiles. All are designed as compact, cost efficient element that together, creating a force multiplier that cannot be ignored even by the world’s largest, most capable navies.

    Iranian Ghadir mini submarines are based at Bandar Abbas. Photo: FARS news agency by Vahid Reza Alaei

    A key element in this ‘hornets nest’ is the Ghadir mini-submarine. The first two locally built subs were delivered in 2008 and this year during a visit at the base four subs were visible. These submarines built for short missions operating at shallow water, carrying out coastal reconnaissance, mine laying and engagement of surface targets, including moving vessels and oil rigs. Mining by submarines could become one of Iran’s modus operandi as detection or attribution of such action to the actual perpetrator is almost impossible.

    Another element of the hornets nest was unveiled this week, as Iran’s Revolutionary Guards naval units displayed over a dozen planes during an official visit of the Guards’ commander, brig. General Ahmad vahidi at Bandar Abbas. Unveiled as a prototype in 2006, Bavar-2 is designed to operate as a rapid reaction force, equipped with aerial cameras and communications links transmitting images in real-time to command centers at sea or on land. The seaplane is also equipped with a machine gun. It is flown by a single pilot and is fitted to operate in day or night, using night vision devices.

    In August 2010 the Iranians unveiled the ‘sting’ of the hornets – the new Zulfikar fast patrol boats (shown in the video below), an all-aluminum built fast boat armed with Iranian-made Nasr-1 medium range anti-ship missiles. (actually, an Iranian version of the Chinese C-704 missile). The Iranians plan to deploy large numbers of these boats, armed with the locally produced missiles, being able to saturate the defenses of highly protected surface vessels.

    Iran's Revolutionary Guards naval forces unveiled the first amphibian aircraft squadron at Bandar Abbas in September 2010. Photo: Mehr News Agency

    The new Bavar-2 Wind in Ground Effect (WIG) amphibian seaplane, designed to perform short range maritime surveillance, coastal patrol and provide target acquisition for the Zulfiqar fast boats, enabling them to launch their missiles at maximum range, thus avoiding counter attack from the surface. As a WIG amphibian, Bavar-2 has unique capabilities to ‘sea skim’ just above wave-top level, or perch at sea level, thus evading detection by hostile radars. Typically, such planes cruise at a speed of 130 km/h and perform optimally at an altitude of few meters above the sea although, technically some WIG designs can reach a maximum altitude of 300 meters.

    In times of crisis it is assumed that the fast boats, submarines and seaplanes will disperse to many coastal locations, from where they will be able to launch surprise attacks against merchant ships, tankers or military targets. The submarines and amphibians will provide the eyes and ears for the missile carrying fast fast boats, which could group into attack swarms to strike and disperse immediately after it, thus making it difficult for the enemy to launch an effective counter strike.

    Related posts:

    Extendable Stick Turns Micro Robot into a Pole Cam

    ReconRobotics has introduced a new, versatile add-on to the Recon Scout Micro Robot enabling the use of the robot either as a remotely controlled sensor or static, elevated ‘Pole Cam’. The novel device enables military scouts to mount the Micro Robot on the 20 inch (0.52 m) long ‘Recon Scout Search Stick’, a quipped with actuated jaws that grasp the 1.2 pound Recon Scout micro robot.

    Recon Scout micro Robot can now be mounted on an extensible pole to act as a Pole Cam. Photo: ReconRobotics
    The new ReconStick turns the remotely controlled Micro-Robot into a static, elevated 'Pole Cam'. Photo: ReconRobotics

    The telescopic pole can be extended to 72 inch (1.78 m) in fully retracted mode, enabling scouts to easily see over a 12 foot (3.65 m) wall or into a second story window while maintaining protective cover. Throughout such inspections the robot transmits live video to a handheld operator control unit. The SearchStink can also be used to quietly place the robot at elevated or confined space, where it can then search the location for adversaries, IEDs or other threats. Once the inspection has been completed, the operator can use the jaws on the SearchStick to retrieve the robot.

    According to Alan Bignall, president and CEO of ReconRobotics, more than 1,200 Recon Scout Micro Robots are currently operational, and the new device will provide users unique new capabilities to gaining visual access into walled compounds, rooftops, attics, ventilation systems, tunnels and crawl spaces. And because most Recon Scout robots are equipped with infrared optical systems, this visual reconnaissance can be conducted even in complete darkness. “This ‘Know Before You Go’ capability allows tactical teams to quickly and safely clear large multi-level structures before personnel enter these environments” Said Bignall.

    Several branches of the U.S. military and international forces have deployed Recon Scout robots around the world, and are employed in route clearing operations, remote reconnaissance and IED inspection. Nearly 200 police and security agencies use Recon Scout robots for tactical reconnaissance, including the many police tactical teams as well as the FBI, U.S. Marshals, Border Patrol, DEA and the Bureau of Alcohol, Tobacco, Firearms and Explosives. When multiple robots are employed simultaneously in the same location, by different agencies, each robot operates on any of three transmitting frequencies, allowing police and military personnel to operate up to three robots in the same environment at the same time.

    Updated: Pentagon Tests U.S., Foreign Active Protection Systems in Search for a Mature Solution Against RPGs

    The U.S. Office of Secretary of Defense (OSD) is testing seven Active protection Systems, mostly from international vendors, to determine the maturity and potential of such systems, protecting U.S. forces against Rocket Propelled Grenades and other Anti-Armor weapons. The Active Protection Systems Live Fire Test and Evaluation effort, which was mandated by Congress in 2008 provides U.S. with comparative insight into potential defenses readily available to protect U.S. forces. The test program will also formulate a comparative baseline for consideration during possible future defense acquisition programs.

    The congressionally mandated evaluation is performed by the OSD, with assistance of the Institute of Defense Analysis (IDA). The evaluation includes seven systems considered relatively ‘mature’. Among the systems tested were the Swedish-South African LEDS 150 from Saab, TRAPS developed by Textron Systems, the Israeli Iron Fist from IMI and Iron Curtain, a close-in APS developed by ARTIS. By early 2011 the AMAP-ADS close-in APS from the German company IBD was tested, followed by the Israeli Trophy, made by Rafael Advanced Defense Systems. The tests have also included few shots of experimental systems developed in the past decade, including the CICM, IAAPS and FCLAS, ‘revived’ for the evaluation.

    The first phase of the evaluation has now been concluded. Yet to be tested is the Quick Kill, originally developed for the Future Combat Systems program by Raytheon. The first phase addressed a target set including anti-tank rockets and guided missiles. A limited, follow on evaluation is planned, testing advanced systems capable of performing ‘multilayer’ countermeasures against a wider target set including anti-tank Rockets, anti-tank guided missiles and kinetic rounds, utilizing a combination of ‘soft kill’ and ‘hard kill’ measues.

    The evaluation has spurred much interest among U.S. and allied forces, which led to a European request for information sharing.

    LEDS-150 mounted on an Eagle light armored vehicle undergoing live firing test. Photo: Saab

    The first test employed the LEDS 150 developed by Saab South African Avitronics subsidiary, in cooperation with ATK. For these tests the system was integrated on an Eagle armored vehicle. LEDS 150 employs radar and infrared sensors to detect and target the incoming threat, firing an active countermeasure destroying the threat far away from the protected vehicle. According to sources at Saab, the system performed well overall, but as it was the first time it was integrated on such a small vehicle, some of the elements did not perform as expected, and the team applied to repeat the test with new hardware.

    Textron was the second to demonstrate the APS, and the first to demonstrate a ‘close-in’ system based on its Tactical Rocket-Propelled Grenade (RPG) Airbag Protection System (TRAPS) system. For these tests TRAPS was mounted on a MRAP, effectively demonstrated its capability to protect armored vehicles against RPG threats. Textron also tested another countermeasure, called TRAPSNet – comprised of a modular net system. According to the company, these are the first in a family of countermeasures that will enable spiral upgrades to address advanced threats while maintaining the common hardware of the TRAPS system.

    “We designed the TRAPS architecture to be flexible, scalable and highly effective,” says Chief Technology Officer Thomas McNamara of Textron Systems Corporation. “The system is compatible with multiple military vehicle types, and it delivers reliable, robust performance against different RPG threats while minimizing costly, time-consuming modifications and vehicle recertification tests. In addition, TRAPS offers significantly lower weight and demonstrated lower collateral damage than competing active protection systems. Following the successful OSD testing, we are prepared to deliver the customer a mature, affordable and rapidly deployable active vehicle protection solution.”

    Another ‘Close-in’ type system tested recently is the Iron Curtain, developed by ARTIS. This system employs motion sensors and countermeasures fired downward, destroying an incoming RPG few inches ahead of the vehicle’s wall.

    The most recent test involved a Mine Resistant Ambush Protected (MRAP) vehicle was fitted with the Israeli Iron-Fist active protection system developed by Israel Military Industries (IMI). The system withstood numerous rocket attacks under a two month test and evaluation program. According to IMI, the rigorous test program spanned over several months and evaluated the system under complex engagement scenarios. “The Iron Fist demonstrated exceptional performance in each test scenario. All tests were performed with the system installed on the MRAP vehicle.” An IMI source told Defense Update.

    The Iron Fist APS uses passive and active sensors for threat detection, situational awareness and fire control. The system can employ both an electro-optical ‘soft kill’ countermeasure and ‘hard kill’ interceptors that are launched against incoming threats, therefore covering a broader spectrum of threats, compared to RPG-dedicated ‘Close-In’ type APS. “The combination of soft and hard kill methods effectively defeats RPGs and guided missiles, including advanced models fitted with tandem warheads, as well as tank rounds.” In addition to its defensive role, the IMI system also contributes to situational awareness and counter-action: In addition to the protection by soft and hard kill means Iron Fist accurately identifies the enemy firing positions, enabling rapid counterstrike thus eliminating repeated attacks.

    A front view of the APS installed on an up-armored Stryker. This view clearly shows the significant reduction in size between the first and second generation APS. While Trophy 1 (on the right) was developed for main battle tanks, Trophy Light (on the left) is designed specifically for integration on smaller, lighter vehicles. Photo: Rafael

    In January 2011 two additional Israeli APS, the Trophy and Trophy Light developed by Rafael Advanced Defense Systems were also tested. Both systems were used, demonstrating impressive results. For the OSD evaluation Rafael has integrated the TROPHY System on an IDF Stryker Armored Fighting Vehicle utilizing a new configuration optimized for the vehicle. The Stryker system comprised the regular four panel ‘WindGuard’ radar, and two countermeasure units positioned on each side of the vehicle. “We chose to be evaluated on a Stryker to show TROPHY’s diversity – on one hand the system protects Merkava 4 MBT along Israel’s borders and on the other hand it can protect light and medium Armored Fighting Vehicles as they are part of the current battlefield” said Giora Katz, Corporate VP and General Manager of Land and Naval Sector at Rafael.

    Related links:

    IMI’s Iron Fist APS Completes a Successful Evaluation in the U.S.A.

    A Mine Resistant Ambush Protected vehicle fitted with the Israeli active protection system developed by Israel Military Industries withstood numerous rocket attacks under a two month test and evaluation program.

    Iron Fist, the active protection system (APS) for armored vehicles developed by Israel Military Industries (IMI), has completed an evaluation by the U.S. Office of Secretary of Defense (OSD) as part of a congressionally mandated evaluation of domestic and foreign APS. For the OSD evaluation IMI integrated the Iron Fist onto a Mine Resistant Ambush Protected, or MRAP, vehicle. The rigorous test program spanned over several months and evaluated the system under complex engagement scenarios. The Iron Fist demonstrated exceptional performance in each test scenario. All tests were performed with the system installed on the MRAP vehicle.

    Iron Fist employs blast effect to defeat the incoming target, whether a shaped charge of an RPG or HEAT warhead of an anti-tank or HEAT tank round, or even a high speed kinetic penetrator, fired by a tank gun. Photo: IMIwave to

    The evaluation culminated with a VIP event attended by senior members of the OSD, which also included a presentation of other IMI APS products, including the man-portable, ‘Shock Absorber’ missile ‘soft kill’ countermeasure solution, and a light-weight, ‘Bright Arrow’ remotely controlled weapon station with Iron Fist integrated, which was installed on a HMMWV.

    An early stage Iron-Fist interceptor about to engage an incoming RPG. Photo by a high speed camera, courtesy of IMI.

    The Iron Fist APS uses passive and active sensors for threat detection, situational awareness and fire control. The system can employ both an electro-optical ‘soft kill’ countermeasure and ‘hard kill’ interceptors that are launched against incoming threats. The combined soft and hard kill method effectively defeats threats such as RPGs and guided missiles, including advanced models fitted with tandem warheads, as well as tank rounds. In addition to the protection by soft and hard kill means Iron Fist accurately identifies the enemy firing positions, enabling rapid counterstrike thus eliminating repeated attacks.

    The Israel Defense Force (IDF) has selected to equip the Iron Fist on its new Namer Infantry Fighting Vehicle (IFV). The Iron Fist is currently in final development and integration for the Namer.

    Related posts:

    ‘Cyber Storm III’ Tests U.S. resilience Under Cyber Attack

    A Cyber Storm III exercise participant briefs Department of Homeland Security (DHS) Deputy Secretary Jane Holl Lute during the exercise kickoff at U.S. Secret Service headquarters in Washington, D.C. Photo: DHS

    The U.S. Department of Homeland Security (DHS) launched today the ‘Cyber Storm III’, a drill testing the nations’ resilience under a simulated, deliberate international cyber attack aimed at the hubs of government, infrastructure and business.

    The three day exercise is the third and largest in a series of annual cyber attack drills conducted outside the defense community. The current event involves more participants that past years, form the federal, state, and commercial sectors. Among the ‘defenders’ are players from seven government departments, 11 states, 12 different countries and 60 private sector companies. The exercise is managed by the DHS’s National Cyber Security Division (NCSD).

    The cabinet-level departments participating in Cyber Storm III are from Commerce, Defense, Energy, Homeland Security, Justice, Transportation and Treasury. In addition, the White House and representatives from the intelligence and law enforcement communities will also attend the event. Eleven states are taking part – California, Delaware, Illinois, Iowa, Michigan, Minnesota, North Carolina, New York, Pennsylvania, Texas and Washington. Among the participant countries are Australia, Canada, France, Germany, Hungary, Japan, Italy, the Netherlands, New Zealand, Sweden, Switzerland, and the United Kingdom (only four foreign nations participated in Cyber Storm II last year). DHS selected 60 companies from the private sector, to assess the effect of potential cyber attack on commercial services sectors, such as Banking and Finance, Chemical, Communications, Dams, Defense Industrial Base, Information Technology, Nuclear, Transportation, and Water.


    The scenario developed by NCSD incorporates known, credible technical capabilities of adversaries and the exploitation of real cyber infrastructure vulnerabilities, resulting in a range of potential consequences – including loss of life and the crippling of critical government and private sector functions. By coincidence, such capabilities have surfaced in recent weeks, with the distribution of a new malicious code called Stuxnet, spreading through industrial systems and infrastructure networks. Such code has the potential to penetrate highly protected systems, including networks that are completely isolated from the internet, to conduct espionage, disruption or deliberate attack.

    The ‘defenders’ could face over 1,500 separate events; some will be subtle, with only few hints indicating ongoing penetrations into computerized systems. Other events will be more dramatic, demonstrating the resulting effects to compromised networks. They will have to identify the ongoing attack in real time, mitigate the compromises and vulnerabilities that allowed it to occur, and deal with the possible consequences to compromised systems. “At its core, the exercise is about resiliency – testing the nation’s ability to cope with the loss or damage to basic aspects of modern life.” DHS officials explain, adding “the Cyber Storm III exercise scenario reflects the increased sophistication of our adversaries, who have moved beyond more familiar Web page defacements and Denial of Service (DOS) attacks in favor of advanced, targeted attacks that use the Internet’s fundamental elements against itself – with the goal of compromising trusted transactions and relationships.”

    Cyber Storm III provides the DHS with the first opportunity to assess and strengthen cyber preparedness and resilience of the nation’s critical infrastructure and key resources (CIKR) – evaluating how the collective cyber preparedness and response capabilities perform against realistic cyber attack. It will also provide the first opportunity to assess the newly-developed National Cyber Incident Response Plan (NCIRP) – a blueprint directed by President Barack Obama, for cybersecurity incident response. The exercise will examine the roles, responsibilities, authorities, and other key elements of the nation’s cyber incident response and management capabilities and use those findings to refine the plan. It will also test the new, National Cybersecurity and Communications Integration Center (NCCIC) inaugurated in October of 2009, which serves as the hub of national cybersecurity coordination.

    Singapore Orders 12 M346 Trainers to Replace TA-4SU

    ST Aerospace has been selected to operate the Singapore Republic of Singapore Air Force’s (RSAF) training in Cazaux, France. As the prime contractor for the entire program, ST Aerospace is acquiring 12 M346 advanced trainers at the cost of S$543 million, the first is scheduled for delivery in 2012. In addition, ST Aerospace will provide systems maintenance and support while Boeing will provide ground based training as a subcontractor. ST Aerospace has been providing depot maintenance for RSAF’s A-4SU / TA-4SU fleet in Cazaux since 1999. In 2007 the company was selected by the Singapore Ministry of Defense (MinDef) to widen the scope of its maintenance program to Total Aviation Support.

    Singapore has selected the M-346 from Alenia Aermacchi for its new advanced trainer, replacing the TA-4SU. Photo: Alenia Aermacchi

    Ausi Super-Hornets to be Wired for Electronic Attack

    Boeing is pre-wiring 12 of the Royal Australian Air Force’s (RAAF) Super Hornet for potential conversion of the aircraft for Electronic Attack role. At present the Australians have not decided whether to equip the aircraft with such capabilities. According to RAAF Group Capt. Steve Roberton, Officer Commanding 82 Wing currently operating these fighters, the ability to introduce an electronic attack capability on part of the Australian Super Hornets provides maximum flexibility for future missions. “Ultimately, if a decision to incorporate an electronic attack option is pursued, it will further expand the broad capability of an already formidable Super Hornet weapon system.” Robertson said.

    Australia is wiring 12 of its new Super Hornets to receive Electronic Surveillance and Attack systems, if and when such capability will be required. Photo: Boeing

    Pre-wiring prepares the infrastructure on aircraft to feed RF signals, power, and cool the unique payloads associated with electronic surveillance and attack. Pre-wiring will enable a standard Super-Hornet Block II to carry Signals Intelligence (SIGINT) payloads (ALQ-218 radar band and ALQ-227 communications scanners) as well as the ALQ-99 Electronic Attack jammer. Both are currently employed with the U.S. Navy’s F-18G Growler. Australia is the first Super Hornet customer to follow the ‘pre wiring’ track. Boeing completed the production of the first batch of 12 Australian F/A-18E/Fs and is on schedule to deliver the last of the 24h Super Hornets in 2011. According to Boeing’s Australian Super Hornet program manager, Carolyn Nichols, the pre-wired configuration reduces the cost associated with future retrofit at a later date”

    The 24 F/A-18E/F Block II Super Hornets ordered by Australia in 2007 are multirole aircraft, able to perform virtually every mission in the tactical spectrum, including air superiority, day/night strike with precision-guided weapons, fighter escort, close air support, suppression of enemy air defenses, maritime strike, reconnaissance, forward air control and tanker missions. Adding an Electronic surveillance and Attack capabilities will dramatically enhance the nation’s cyber-warfare potential to engage future adversaries with non lethal but highly effective, means.

    Laser JDAM Tested with 2,000 pound Mk-84 Warhead

    Loading Laser JDAM weapons on an F-16 prior to the first combat strike in Iraq, 2008. Photo: US Air Force, by Erik Gudmundson.

    Boeing completed the first pair of seven flight tests of the MK-84 Laser Joint Direct Attack Munition (Laser JDAM) this summer at Eglin Air Force Base, Fla., as part of the new weapon qualification process. Integration of Laser JDAM will provide these heavy warheads with pinpoint strike precision, utilizing redundant navigation and guidance modes the guidance kit will enable midcourse GPS and terminal laser guidance, providing more effective, flexible attack modes.

    Laser JDAM
    2000 pound Mk84 weapon fitted with GBU-54 Laser JDAM guidance kit loaded on an F-16 at Eglin Air Force Base, prior to a test flight in July 2010. The Precision Laser Guidance Set (PLGS) at the tip of the weapon is covered, to minimize wear of the transparent window protecting the seeker. Photo: Boeing

    In these recent tests the 2,000-pound weapon will engage fixed, relocatable and moving targets. During the first two tests performed in July 2010 two inert MK-84 Laser JDAM weapons were released from an F-16 flying at an altitude of 30,000 feet and a speed of Mach 0.95. Both weapons flew a series of aggressive, preprogrammed maneuvers to verify their maneuverability and aerodynamic performance.

    An existing JDAM becomes a Laser JDAM with the installation of the Precision Laser Guidance Set (PLGS). “By adding the PLGS feature, warfighters can now attack relocatable and moving land and maritime targets with the same precision and reliability that they rely on every day with the existing JDAM.” Explains Kerry Bush, JDAM program manager for Boeing. The company has already qualified a lighter version of Laser JDAM – Guided Bomb Unit GBU-54, armed with the 500 pounds Mk82 bomb. Since fielding the weapon in 1998, Boeing has produced more than 215,000 JDAM guidance kits. Laser JDAM was fielded in 2008 and has since been used in combat in Afghanistan and Iraq.

    Navistar Introduces the Medium Tactical Vehicle (MTV) High Mobility Truck

    Navistar Defense, LLC unveiled today a new, high-mobility medium tactical vehicle (MTV) at the Modern Day Marine Exposition. The MTV is based on the International 7000-MV platform. The MTV incorporates the DXM independent suspension and can also accommodate a variety of survivability and armoring solutions derived from the International MaxxPro Mine Resistant Ambush Protected (MRAP) vehicle.

    Navistar unveiled the new MTV, high mobility tactical truck based on the 7000_MV platform. Photo: Navistar Defense

    The MTV also incorporates automatic traction control, anti-lock brakes, self-diagnostics, advanced electronics systems optional central tire inflation system (CTIS). It is offered with two powertrain options – utilizing the MaxxForce D 9.3L and 13L powertrains. The vehicle is capable of climbing a 60 percent gradient and maneuvering 40 percent side slopes.

    The MTV can be equipped with armor modules derived from the Army's MaxxPro MRAP vehicle. Photo: Navistar Defenseeled,

    According to Archie Massicotte, president, Navistar Defense, since receiving the first contract in 2005 Navistar Defense has delivered more than 21,000 7000-MV vehicle platforms in 13 different variants. The current variant adds survivability and independent suspension technologies meeting the requirements of U.S. and allied nations operating in Afghanistan. The company recently completed building 1,130 MaxxPro Dash vehicles with the DXM independent suspension for fielding in Afghanistan. An additional 1,222 Dash units already in operation will also soon be retrofitted with the DXM suspension solution. Navistar medium tactical vehicles are currently in operation in countries such as Iraq, Afghanistan, Canada, Israel, Jordan and Taiwan.

     

    Skunk Works and XTEND Simplify Multi-Drone Command

    0
    Lockheed Martin Skunk Works® and XTEND have achieved a major milestone in JADC2 by integrating the XOS operating system with the MDCX™ autonomy platform. This technical breakthrough enables a single operator to simultaneously command multiple drone classes, eliminating the friction of mission handoffs. From "marsupial" drone deployments to operating in GPS-denied environments, explore how this collaboration is abbreviating the data-to-decision timeline and redefining autonomous mission execution.

    From Ukraine to Taiwan: The Global Race to Dominate the New Defense Tech Frontier

    0
    As traditional defense primes face mounting competition from agile “neoprimes” such as Anduril, Palantir and Helsing, the balance of innovation is shifting toward software-defined warfare and scalable, dual-use technologies, while global industry consolidation—marked by Boeing’s integration of Spirit AeroSystems and other strategic mergers—signals an intensified race to secure control over the defense technology value chain. Our Defense-Tech weekly report highlights these trends.

    Europe’s “Drone Wall”

    0
    In early October 2025, a coordinated wave of unmanned aerial system (UAS) incursions—widely attributed to Russia—targeted critical infrastructure across at least ten European nations. The unprecedented campaign exposed the fragility of Europe’s air defenses...

    Weekly Defense Update & Global Security Assessment

    0
    Executive Summary The past week (September 18-25, 2025) represents an inflection point where strategic defense concepts have transitioned from doctrine to tangible reality. An analysis of global events reveals four primary, interconnected trends shaping an...

    U.S. Air and Space Forces Push Next-Gen Programs at the AS&C 2025 Conference and...

    0
    At the 2025 Air, Space & Cyber Conference, U.S. Air Force and Space Force leaders unveiled major updates on next-generation fighters, bombers, unmanned systems, and space initiatives, highlighting both rapid innovation and critical readiness challenges as the services race to outpace global competitors. A short version is available here, with a more detailed version for subscribers.

    TADTE 2025: Reflecting Taiwan’s Strategic Themes

    0
    The Taipei Aerospace & Defense Technology Exhibition (TADTE) 2025 crystallized around four dominant strategic themes that collectively illustrate Taiwan's comprehensive approach to defense modernization amid escalating regional tensions. Based on a detailed report by Pleronix (available upon request). Includes a Podcast discussion on TADTE 2025's highlighting Taiwan's four strategic themes beyond the post's coverage.

    Iron Beam 450 Completes Testing, Soon to Join With Operational Air Defense Units

    0
    Israel’s Iron Beam 450 high-power laser system has completed final testing, marking a major leap in air defense. Developed by Rafael, it offers precise, cost-effective interception of rockets, UAVs, and mortars, and is set for IDF deployment by 2025.