Monday, November 18, 2024
More
    Home Blog Page 281

    Cyber Warfare is Here and Now!

    In recent years network attacks have grown dramatically, not only by sheer number but in their sophistication and precision. Converging computers and mobile phones, the global network absorb us through billions of computer-embedded devices that monitor, control and operate our infrastructure, health, commerce and trade.

    They manage our privacy and interaction with the world, protect us from crime and maintain our national security.
    However, that same infrastructure is also providing subversive elements with the means and access to compromise our security. These are ranging from rogue nations, hostile takeovers by corporations, to illusive, non-state organizations and anarchists.
    Even individuals, with powerful tools, previously accessible only at the national security level have become security perils. 

    These tools are not limited to irritating E-mail spams, or obnoxious group messages, but also to endanger powerful encryption, adequately protecting information-exchange for tactical applications, and ‘logic weapons’. They are empowering individuals and groups to conduct stealthy, precision attacks against high-profile cyber-entities, causing effects which have potential lethality and damage, equal or exceeding notorious the 9-11 attacks.

    Attacking strategic infrastructure networks such as electricity, gas and water is relatively easy once field attack vectors are taken into account” admits Eyal Udassin, IT manager at C4 Security, a ‘Red Team’ that hacks into such networks in an attempt to uncover security gaps. “Such networks can be easily discovered and compromised, utilizing reverse-engineering of SCADA and control protocols, to gain control of specific nodes, or even the entire network. “We can hack military networks in the same way” Udassin adds. “While companies are investing ever growing funds in securing their networks, many solutions are protecting the front gate, but leave many back-door accesses uncovered. The process cannot be considered complete, before verifying that the system can now successfully resist an attack launched by a serious adversary.”

    Udassin and his team are certainly not the “bad guys”, as they purposely challenge the networks, at the request of their customers who want to know just how secure they are. On the contrary, they alert all the relevant governmental agencies of the found technical vulnerabilities and assist the vendors in remedying them. Yet, equally capable terror hackers are also lurking online, using the same methodologies to seek out the weak spots, which they can exploit, to gain information and access to meaningful targets, to create ‘high profile attacks’.

    Media coverage of one such attempt that successfully compromised several nuclear power stations in the U.S., was suppressed by the authorities, to deny potential terrorists access to media leaks, they were hoping for.

    “Without carrying out the type of attack in a controlled manner or its own network, the utility or critical infrastructure cannot know for sure that it can withstand such an attack” says Udassin. Utilities fear that conducting such controlled attack simulations will harm their operations, but this is where the role of experienced SCADA auditors come into play.


    World CyberWarriors – Unite!

    “Repairing the damages caused by potential cyber terror attacks could be extremely expensive” warnes Brig. General (Res) Nitzan Nuriel, head of the counter terror bureau at the Israel National Security Council, “Cyber Security authorities around the world should join together, establishing a network that can fight back against this network of cyber-terror.” Nuriel suggests that such a network could be deployed similar to the U.S. Defense Support Program, a network of satellites providing early warning on missile launches throughout the world. “Such a network should also develop the capability to counterattack these threats as they develop, through almost instantaneous action, thus taking toll of every attempt” he added.

    Cross-national cooperation among piers in the different member countries should also contribute to better preparedness, as all member nations will have better knowledge and warning on imminent threats, sometime enabling them to take preventive action or preempting an attack.

    “This is not a battle a nation or a single organization can fight alone” Gemeral Nuriel said. He agrees that cyber warfare is a powerful tool for the national authorities in fighting terror and crime, but such capabilities remain within the national realm. “nations should negate the access of non-state actors to these tools and capabilities.” He added.

    Exploiting the persistence, anonymity and widescale reach of the modern computerized world, Cyber terror and cyber crime are today becoming the fastest growing threat, “almost every type of criminal behavior has a parallel in the cyberworld” said Israel Police Chief Superintendent Izhak Shopen, head of the
    cyber crime unit.

    Cyber crime and espionage are already wide-spread in the global network, and the next wave, targeting the ‘web apps’, becoming so popular in social networks and mobile phones, has already arrived.

    According to Joseph Tal, a member of IBM Security Services (ISS), almost half of the known vulnerabilities that exist today are somehow related to these apps that have minimal (if any) security measures. One of the most widely used and fastest growing threats existing today is the ‘botnet’, a stealthy, compact code, planted in a targeted device through a deceptive approach (fake email from a friend, for example). Once contaminated with the botnet, the computer is at the mercy of a remote user, taking control of that device, without the user’s awareness. By taking over the victim, a hacker can use that computer to carry on further attacks, directed at other computers, penetrate into protected networks, (for example, when the unsuspecting victim, has access to his organization’s protected intranet compromised by alien elements) Hackers can actually ‘mine’ for information from the victim, or launch attacks against critical nodes connected to the system. Frequently, these planted botnets are also offered to other hackers for rent, at rates ranging from few hundred to several thousand dollars for operation.

    The Cyber Attacker’s Dillema

    Shai Blitzbau, technical director at Magelan information defense and intelligence services describes typical attacks simulated by his company, providing threat assessment audit for government, security and commercial organizations.
    In recent exercises Magelan performed a threat simulation, that targeted an essential national infrastructure network responsible for the production and distribution of a vital product, considered as basic necessity for the entire population. The simulation demonstrated how, after 96 hour preparation, the team could bring a network,
    producing and distributing critical goods to a standstill, and keep it idle for at least two weeks. The aggressor team that started with zero access to, or knowledge of the target, managed to study the target, write malicious code, penetrate the network and execute his attack in less than four days.

    There are other means the intelligence can use to gather high quality information. A cyber attack should be executed only when the gain expected significantly exceeds the potential cost one could pay for such act. Blitzbau explains that a cyber espionage act
    point-out the person and the information it targets, thus identifying the attackers and their interest.

    Professional attacks are stealthy and deceptive, thus masking the true identity, intensions or cause of their perpetrators. For example, a wide-scale campaign launched in 2009 known as ‘Operation Aurora’ was attributed to Chinese hackers (or Chinese authorities?) although the code was allegedly ‘signed’ in Taiwan… The targets were unknowingly exposed to this ‘Advanced persistent Threat’ (APT) seemingly directed at specific source- codes of critical applications, developed and operated by mega companies in the U.S., like Google and Yahoo. What the hackers were after is still unknown. Maybe this phase was only the beginning, and the next phase will exploit the codes already having being compromised?

    The fact remains that the attackers penetrated the most inner circles of these companies, and obtained highly sensitive data deliberately. This brute aggression caused Google to decide on leaving China, and brought a serious political rift between the USA and Beijing.

    In another attack, directed at the Ford Company, the alien operators recruited in the U.S. company were found and indicted, but the actual targets were intercepted inside the organization and the final destination of the information stolen through the cyber scheme remains a mystery.

    Network Intelligence is a powerful tool that is widely used as part of every modern intelligence campaign, yet, the cyber intelligence, in its common form poses major challenges for intelligence organizations, since it has the potential to point directly at the perpetrators, their senders and their targets. Once compromised, such means are instantly shut down, wiping out years of developments and untapped exploitations that could take advantage of such dormant assets. “Compromising such dormant ‘logic weapon’ represents the biggest risk for the hackers, whether they represent themselves, criminals or terrorists, or an intelligence agency.” Blitzblau said. He describes such a weapon recently uncovered by the Maglan team as an ‘innocent looking’ piece of code, only 8Kb in size, that has the potential to do much damage on the computer it was planted on and even beyond it. “Inserted into the targeted computer, this malicious code was acting on commands received from the remote computer through a maze of pathways hiding the source. Although it wasn’t highly sophisticated it was quite difficult to spot” he said.

    According to Blitzbau, the most common type of attack known as ‘Defacement’ is still taken too lightly by security personnel and executives, measuring their effect only by the superficial damage they cause, by replacing the home page with humorous messages or political propaganda. ‘Almost 30% of defacement hits, commonly considered as the work of amateur hackers, are actually an act of deception, where the attackers hide a malicious code somewhere in the computer being compromised, hitting the home page to hide their tracks. Most webmasters being attacked simply reload the original data and consider the case closed, although their website now becomes a ‘zombie’, contaminating the site, while users remain unaware about the risk being hit with the stealthy, malicious codes.

    Cyber Warfare was the theme discussed at the Tel Aviv Workshop for Science, Technology and Security, April 13, 2010.

    Watchkeeper is Flying in the UK

    The Newest British UAV is Scheduled for Delivery Later in 2010

    Watchkeeper, the newest unmanned aircraft to join the ranks of the British Army performed its first flight in the U.K. on April 14, 2010 at Parc Aberporth in West Wales. TheParc Aberporth facilities, managed by QinetiQ through the West Wales Unmanned Air vehicle (UAV) Centre, are the premier test facilities for UAVs in the UK.

    Performing the first success flight is the first milestone in the UAV induction of the Watchkeeper system with Army units, demonstrating that the vehicle and its system meet the robust safety and airworthiness criteria required to fly UAVs initially on ranges and segregated airspace in the UK. Thales UK, the system integrator and prime contractor is scheduled to deliver the first Watchkeeper systems to the MOD this year. Photos: Thales UK

    “2010 is an important year for the program as it will also see the opening of the Watchkeeper training facility based in Larkhill, and the continuation of the technical field trials at Parc Aberporth” Alex Dorrian, CEO of Thales UK added. “Building on lessons learnt on current operations, Watchkeeper will also soon be an invaluable asset for commanders on the ground.” Dorian added. Thales UK, as Prime Contractor for the Watchkeeper program, will deliver equipment, training and facilities, with the capability being delivered to the MoD customer from late 2010. Production of the Watchkeeper system will take place at U-TacS (UAV Tactical Systems Ltd), the Thales UK and Elbit Systems joint company, based in Leicester.

    Watchkeeper is a high-performance multi-sensor, all-weather UAS that can remain airborne for over 16 hours in a single mission. It includes a high degree of automation, with automatic take-off and landing (ATOL), and has a de-icing capability, to expand its ability to operate in all weather / operational environment. Delivered in a dual-payload configuration, the system includes enhanced electro-optic / infrared sensors, with laser target designator, as well as an advanced I-Master synthetic aperture radar / ground moving target indicator radar.

    Until the Watchkeeper is fielded, the Army relies on the services of fleet of leased Hermes 450 unmanned air vehicles (UAVs) operated by Thales UK offering the MoD customer an innovative ‘ISTAR-by-the-hour’ contract. Since the contract award, in July 2007, these Hermes 450 UAVs have flown more than 30,000 operational hours in over 2,000 sorties, supporting UK forces in current operations, primarily in Afghanistan. The company launched this service in response to an Urgent Operational Requirement (UoR) contract issued by the UK Ministry of Defence (MoD), and will run through to contract completion in October 2010 which could potentially be extended until April 2011 when the H-450s will be phased out as the Watchkeeper delivers frontline capability.

    IMI Delivers the last of 170 Upgraded M-60A1 to the Turkish Army

    Israel Military Industries (IMI) has delivered the last of 170 upgraded M-60A1 tanks to the Turkish Army. April 7, 2010, at an official ceremony held at the 2nd Turkish Army Depot at Kayseri, Turkey – the location in which the tanks underwent upgrading work in recent years. IMI is the prime contractor for the $687.5 million project, considered to be one of the world’s largest tank upgrade programs, bringing the M60A1 tank to level of the world’s leading main battle tanks.

    In 2002 Turkey and Israel embarked on the multi-year program to modernize 170 tanks. The project also included establishment of training and logistic support infrastructure, and transfer the technology to local industries enabling local production of part of the systems. The modernization of the 1960 vintage M-60A1 transformed the tank into a modern weapon system, integrating modern and combat proven protection, firepower, propulsion and vectronic systems. The design implemented in the Turkish program utilized systems already proven in modern armored vehicles in service with the IDF, such as the merkava 4 main battle tank.

    Through the upgrade program the tank’s original 105mm rifled gun was replaced with a new 120mm smooth bore gun, all-electric turret drive, sophisticated optronic and fire control systems. The armor suite was enhanced with advanced hybrid armor system protecting the crew. A modern powertrain was also introduced, including a more powerful 1000 hp MTU diesel engine with matching transmission and final drive from Renk, both from Germany, and advanced suspension system derived from the Merkava design. The modernized tank has undergone extensive testing and qualification performed in Israel and Turkey, by Turkish test and evaluation teams, supported by IMI and the program’s subcontractors.

    In addition to upgrading the M60A1, Turkey has also upgraded 171 Leopard 1 tanks and acquired 298 surplus Leopard 2A4 tanks from Germany. Turkey has more than 1,000 additional tanks of the M60A1/Leopard 1 models that could be considered for future modernization. For the future acquisition Turkey has embarked on an ambitious program to develop and produce the Altai, a modern main battle tank, based on South Korea's latest Black Panther MBT design.

    The production line established at the 2nd MMC (depot) in Turkey was modernized with the latest production methods and unique machine tools necessary to support the program. Israel Military Industries (IMI) is the prime contractor for the program, leading a team of subcontractors that include Elbit Systems, as the system integrator of the electronic systems, Urdan Industries and Orlite, providing part of the armor modules, and Aselsan and MKE from Turkey which operated alongside IMI to facilitate local support for the systems.

    IMI was hopeful that the Turks will continue to upgrade more M-60A1 tanks under the program. However, in parallel to the Israeli led program, Turkey has been upgrading 171 Leopard 1 tanks and acquired 298 surplus Leopard 2A4 tanks from Germany, therefore fulfilling their immediate requirements for main battle tanks. Turkey has more than 1,000 additional tanks of the M60A1/Leopard 1 models that could be considered for future modernization. For the future acquisition Turkey has embarked on an ambitious program to develop and produce the Altai, a modern main battle tank, based on South Korea’s latest Black Panther MBT design.

    Turkey and Israel have agreed to pursue foreign markets for new opportunities in tank upgrading. At the closing ceremony the Turkish Defence Minister H.E. M.Vecdi GÖNÜL referred to the advanced technologies implemented in the upgraded tanks, noting the cooperative agreement signed between Israel Military Industries and Aselsan of Turkey will contribute to further collaboration on future programs in foreign countries. IMI’s Chairman Avner Raz expressed his confidence that the cooperation established between the two countries and industries will lead to more opportunities in the future. One opportunity being discussed is a tank modernization planned by the Columbian Army. Major General Luis Alberto Ardila, Second Commander and Chief of State of the Colombian Army has visited Turkey to inspect the modernized tank.

    The Dark side of Cyberspace – Cyber Espionage Campaign Uncovered by Canadian Shadow Warriors

    In a report released earlier this month, Canadian based ‘Information Warfare Monitor’ and the ‘Shadowserver Foundation’ have warned of an ongoing, massive cyber espionage scheme directed from China against several countries, among them India and Pakistan. The warning was included in the “Shadows in the Cloud: An investigation into cyber espionage 2.0” report.

    The study uncovered a complex ecosystem of cyber espionage that systematically targeted computer systems throughout the world, targeting governments individuals, non-state and international organizations, among them the Offices of the Dalai Lama, the United Nations, as well as Indian government officials and Pakistani embassies. Through their investigation the group recovered thousands of official documents obtained by hacking targeted computers being ‘harvested’ through internet.


    A Small Piece of a Big Pie

    “This is just a small piece of a very big pie.” Said Steven Adair is a security researcher with the Shadowserver Foundation. “This is a problem that goes well beyond those detailed in this report and affects organizations and missions of all sizes all over the globe.” According to the researchers, the attackers seemingly targeted specific sensitive and classified material, belonging to government, business, academic, and other computer networks and politically sensitive targets by employing virus-like ‘maleware’ applications. These shadow worms systematically snoop through the files stored on targeted computers, sending the harvested data through the web to core servers located in the People’s Republic of China (PRC).

    Among the document recovered by the researchers were “SECRET”, “RESTRICTED” and  “CONFIDENTIAL” classified encrypted diplomatic correspondence, identified as belonging to the Indian government. The researchers admit that these files may have been harvested unintentionally, as they were transferred to non-secure computers by their owners, not being aware of the underlying harvesting of material from their PCs. Such material includes information originated by the user of that PC, as well as by others, unaware of the data compromising of secure data on by trusted partners.
    Although the identity and motivation of the attackers remain unknown, the report provides evidence that the attackers operated or staged their operations from Chengdu, PRC. Although the links to China are clear, Nart Villeneuve, Chief Security Officer at the SecDev Group does not attribute the scheme to official Chinese espionage “There is no direct evidence linking these attacks to the Chinese government. We look forward to working with China CERT to shut down this malware network.”

    The shadow network maintained persistent control over the network through facades of service providers, unaware of the scheme they were assisting. These networks were established of multiple, redundant cloud computing systems, social networking platforms, and free web hosting services. The attackers exploited freely available social media systems, like Twitter, Google Groups, Blogspot, Baidu Blogs, blog.com and Yahoo! Mail as the command-and-control infrastructure for their worldwide scheme, leveraging these cloud-based social media services to establish tiered command and control infrastructure, and maintain persistence over the whole network. Exploiting these services by ‘phishing’, disguised as innocent message activities, directing compromised computers to accounts on free web hosting services, where disabled routed to the targeted computers to a stable core of command and control servers located in the PRC.

    “The Shadow report shows that the social media clouds of cyberspace we rely upon today have a dark, hidden core” warns Ron Deibert, Director of the Citizen Lab at the Munk School of Global Affairs, University of Toronto. “There is a vast, subterranean ecosystem to cyberspace, within which criminal and espionage networks thrive. The Shadow network we uncovered was able to reach into the upper echelon of the Indian national security establishment, as well as many other institutions, and extract sensitive information from unwitting victims. Networks such as these thrive because of a vacuum at the global level. Governments are engaged in a competitive arms race in cyberspace, which prevents cooperation on global cyber security.”

    A Wake Up Call

    The Shadow report should offer a wakeup call to governments, to establish cyber security strategies and implement a foreign and security policy addressing cybersecurity challenges. Unless governments take action, we may find that we are the next victim of the Shadows and GhostNets of cyberspace. Deibert warned.
    “Cyber espionage has gone industrial” warns Rafal Rohozinski, CEO of the SecDev Group and Psiphon Inc., and the co-founder and principal investigator of the OpenNet Initiative and Information Warfare Monitor, and a senior research advisor at the Citizen Lab, Munk School of Global Affairs, University of Toronto. “We are witnessing cloud-based techniques and tradecraft from cybercrime being repurposed to target government systems and computers belonging to officials entrusted with state or commercial secrets.”

    Whether the attackers are working for state agencies, or freelancing and selling stolen data or tradecraft on the global graymarket, the recent report is a clear wake-up call that the threat of advanced persistent threats is very real and requires measured international action. “First and foremost, we need an agreement on the norms that should govern cyberspace similar to the treaties we presently have for outer space, the sea or other domains where we have international agreements.” Rohozinski added, “We must take care to preserve the openness of the global commons without precipitating an overreaction that could diminish or even roll back the very real gains in knowledge, empowerment, and to democratization that cyberspace has catalyzed over the last 20 years. We must balance the need to create policies and practices appropriate to information security in a global networked age, while preventing unnecessary overreaction to what we fear as the dark side of the net.”

    About the Researcher Collaboration:

    This investigation is a result of a collaboration between the Information Warfare Monitor and the Shadowserver Foundation. The Information Warfare Monitor (infowar-monitor.net) is a joint activity of the Citizen Lab, Munk School of Global Affairs, University of Toronto, and the SecDev Group, an operational consultancy based in Ottawa specialising in evidence-based research in countries and regions under threat of insecurity and violence. The Shadowserver Foundation (shadowserver.org) was established in 2004 and is comprised of volunteer security professionals that investigate and monitor malware, botnets, and malicious attacks. Both the Information Warfare Monitor and the Shadowserver Foundation aim to inform the field of cyber security through accurate, evidence-based assessments and investigations.

    SIPRI: U.S., UK, France and Italy Continue to Lead the World’s Defense Market

    The total arms sales of the world’s top 100 largest arms producing companies has increased by $39 billion in 2008, to reach $385 billion; BAE Systems was rated by the Stockholm International Peace Research Institute (SIPRI) as the world’s largest arms-producing companies. Four U.S. companies are trailing BAE in the top 5 positions – Lockheed Martin, Boeing, Northrop Grumman and General Dynamics. SIPRI published today its annual report listing the world’s 100 largest arms-producing companies. The institute estimates the global arms market (excluding China) at $3.85 trillion in 2008, an increase of $39 billion over their arms sales estimate in 2007.

    ‘BAE Systems’ move to first place in the Top 100 is notable for a variety of reasons’, says SIPRI arms industry expert Dr Susan Jackson. ‘The company is based in the UK, but does more than half of its business in the USA. BAE really shows the increasing internationalization of the arms industry and the attractiveness of the US market.’ The sales of the company’s Land and Armaments group almost doubled (from $7 billion to $12 billion), a large part of which is due to sales to the US Government of mine-resistant, ambush-protected (MRAP) vehicles for the wars in Afghanistan and Iraq.


    US-based Navistar entered the SIPRI Top 100 in 20th place, with arms sales of $3.9 billion to the US Department of Defense in 2008. This figure represents a dramatic increase of 960 per cent in its defense sales, up from $368 million in 2007. Navistar’s main driver of defense business was the MaxxPro Mine Resistant, Ambush Protected (MRAP) armored vehicles delivered to the U.S. Army fulfilling urgent operational requirement. Another company thet entered the Top-20 list was Russian Almaz-Antei, producer of the S-300 and S-400 series of air defense systems. Almaz Nateu is the first Russian company to enter the top 20 with $4.3 billion in arms sales in 2008, attributed mostly to S-300 systems sold to a number of countries, among them China, Algeria, Lybia and Venezuela. Almaz-Antei has tripled its arms sales since 2003. One of the most talked about deals, with Iran has not been completed yet.

    ‘The continued upswing in many Russian arms-producing companies is the combined effect of longer term increases in exports and the more recent increases in domestic arms procurement,’ states Jackson.

    In 2008 the wars in Afghani­stan and Iraq continued to heavily influence sales of military equipment such as armored vehicles, unmanned aerial vehicles (UAVs) and helicopters. In parallel, sales of logistical services, repair and refurbishment of military equipment continued to grow, as did the arms sales of Russian companies to both domestic and for­eign customers.

    According to the report, the world’s largest arms producer is the U.S. with more than $25.5 billion worth of arms sales (domestic and export), followed by the U.K sales of 58 billion (much of this is attributed to BAE systems, of which U.S. based companies are making a significant of its portfolio) France is third, with an arms market of 29 Billion, followed by Italy with +15 Billion, Germany and Russia (+10B each), Israel, Spain and Japan (+6B each), India, Republic of Korea and others.

    The SIPRI Arms Industry Database was created in 1989. It contains financial and employment data on arms-producing companies in the OECD and developing countries (except China). Since 1990, SIPRI has published data on the arms sales and employment of the 100 largest of these arms-producing companies in the SIPRI Yearbook.

    An Israeli Helmet Display is Tailored for Rocket Planes

    The Targo Racer helmet display

    X Racers Debut at Tulsa with Revolutionary Live-Virtual High Speed Race

    Rocket Racing pilots participating at the upcoming Tulsa Airshow will have the first opportunity to experience and demonstrate the next generation helmet mounted display technology sofar available only to fighter pilots. The revolutionary Targo Racer aviator’s helmet developed by Israel’s Elbit Systems (NASDAQ: ESLT) integrates a display system and avionics, that enable Rocket Racing League (RRL) pilots to competitively challenge each other flying the 3D Raceway-In-The-Sky (RITS) sky track.

    All photos: courtesy of RRL

    “With more than 2500 pounds of thrust, RRL pilots go from zero to full throttle in a fraction of a second and wheels-up in 4 seconds – think NASCAR or Formula One racing in the sky,” explains RRL co-founder Peter Diamandis. The Targo Racer’s state of the art capabilities give our pilots, which are some of the most skilled in the world, the advanced avionics they need to deliver the most dramatic performance for our fans and sponsors.” The RRL will debut the Targo Racer, a new helmet display developed by Elbit Systems, On April 24, 2010 at the QuikTrip Air & Rocket Racing Show in Tulsa, Oklahoma.

    RRL will feature multiple rocket races, from closed circuit to drag-style racing, pitting 2 to 10 Rocket Racer aircraft roaring head-to-head for victory. Rocket Racer pilots will race their vehicles through an RRL-developed "Raceway-In-The-Sky" (RITS) – a custom Cockpit-based Augmented Reality System projected onto 3D helmet displays.

    Rocket Racing League (RRL) is a revolutionary new sports and entertainment franchise where teams of highly trained military and test pilots such as former “Top Gun” graduates from the Navy’s Fighter Weapons School, fly rocket-powered aircraft through a 3D virtual Raceway-In-The-Sky (RITS). To be held at venues across the USA, Rocket Racing will feature multiple rocket races, from closed circuit to drag-style racing, pitting 2 to 10 Rocket Racer aircraft roaring head to head for victory. The closed circuit format is planned to be a 4-lap multiple elimination heat on a 5-mile Formula One style raceway in the Sky. The drag style race will feature two Rocket Racers in drag-style side-by-side format. In February 2010 Tulsa was announced to be the first airshow to host this ambitious rocketplane race. Flown by selected pilots with military experience, flying high performance, all-composite X-Racer rocket powered aircraft aircraft. Flight testing of the two aircraft competing in Tulsa were recently conducted at the North Texas Regional Airport (NTRA) in Texas.

    The closed circuit race format is planned to be a 4-lap, multiple elimination heat on a 5-mile Formula One-style "Raceway-In-The-Sky".

    “X-Racer vehicles provide a high profile platform to demonstrate our unique Helmet Mounted Avionics (HMA) technology in an environment where pilots are navigating their way through a virtual raceway-in-the-sky in head-to-head competitions,” said Yoram Shmuely, Executive Vice President and Co-General Manager of Elbit Systems’ Aerospace Division. Elbit is one of the RRL partners.

    The integrated display helmet provides an essential link between the pilot, aircraft and audience. It enables RRL pilots to receive mission and race critical flight information directly onto their helmet visor within their natural line-of-sight therefore increasing safety and performance. The display shows raceway geometry, altitude, speed, gravitational pull and other parameters directly in front of the aviator’s eyes on a crisp off-the-visor display that adjusts in real time. From a spectator perspective, fans can expect to see the racing action live and in real-time on large projection screens, or remotely, via TV or PC, fed by the Ground and Air Based Augmented Reality Systems and dynamic imagery streams from the Targo Racer and Cockpit-Based Augmented Reality Systems. Additional remote and rocket-mounted cameras will give fans the further sensation of riding right alongside famed RRL pilots.

    The Targo Racer helmet display

    Targo™ Racer, a variant of the Targo™ family by Elbit systems, is powered by “Helmet Mounted Avionics” (HMA) technology that allows fast and flexible adaptation for unique customer platforms and requirements. The helmet was adapted to the racing environment with the support of RRL’s avionics partner, the University Research Foundation (URF) Maryland Advanced Development Laboratory (MADL).

    Diamandis and his team will host a press briefing tomorrow, April 13, reporting on the status of the latest developments related to the Rocket Racing League, the new X-Racer vehicles, the high performance rocket engines, pilots, testing and demonstration schedule, and the featured content for the QuikTrip Air & Rocket Racing Show scheduled for April 24, 2010 in Tulsa, Oklahoma.

     The drag style race will feature two Rocket Racers soaring in tandem just 20 feet apart. Fans also see the racing action live and in real-time on large projection screens fed by the Ground-based Augmented Reality System. The fans watching on televisions and PCs at home will experience the thrill of Rocket Racing via unique remote and rocket-mounted cameras that will give at-home fans the sensation of riding right alongside the Rocket Racing League pilots.

     the X-Racer, based on an airframe built by Velocity Aviation, flys at a 300 mph speed, powered by a rocket engine produced by Armadillo Aerospace, burning liquid oxygen (LOX) and ethanol, producing a maximum of 2,500 pounds of thrust. In the future, RRL will include other airframes and propulsion systems to develop the X-Racers. The new pant scheme of the X-racer was unveiled recently, toward the Tulsa Airshow in Oklahoma. Photos: RRL

     

    RRL is currently recruiting teams accross the USA and Canada. Candidate teams include the Bridenstine Rocket Racing, Santa Fe Racing, Rocket Star Racing, Team Extreme Rocket Racing, and Canada-based Beyond Gravity Rocket Racing. Among the pilots currently associated with the races are aerobatic pilot Sean Tucker, Len Fox, Dave Morss and Jim Bridenstine.

     

     RRL races will offer fans to immerse in the games through a virtual racing league. RRL’s game approach is multi-platform, to attract casual / social players as well as seasoned multiplayer online gamers. Orad, an Israeli real-time special effect specialist responsible for many of the special effects currently viewed on television, is one of the founders of the Rocket Racing League.

     

     

    India Test Fires the AGNI-3 Strategic Ballistic Missile

    The fourth flight of the Indian long range missile AGNI-3 with a range capability of 3,500 km was tested successfully by Defence Research and Development Organisation (DRDO) last month. The missile was launched from the Wheeler Island, in the Bay of Bengal off the coast of Odisha. Overall, with a range of 3,500 km, Agni III is considered a potent weapon designed to balance a potential Chinese threat, rather than the Pakistani missiles. Compared to its Chinese peers – CSS-5 and DF-21, Agni III is considered more advanced.

    The Indian Ministry of Defense confirmed the missile, tested for the full range, have met all the mission objectives. The two-stage AGNI-3 Missile has a length of 17 meters and diameter of two meters. With launch weight of 50 tons, the solid propellant powered missile carries a payload of up to 1.5 tons, sufficient for carrying nuclear warheads. The recent flight took the missile to an altitude of 350 km.

    The recent test is part of the missile’s developmental test plan. Although the Indian Defense Department claims the missile is ‘ready for induction’, more testing and verifications remain to be done. At present Agni III is transported by rail and launched from prepared launch pads. Operational missiles should be able to deploy more flexibly and rapidly – missile stored in containers, and launched utilizing transporter-erector-launcher (TEL) systems yet to be deployed.

    Despite the Recent Acquisition of Javelin Missiles, France Still Undecided on Future Anti-Tank Missile Buy

    The competition for the supply the French Army with multi-purpose guided weapons is not over yet, even after the French Ministry of Defense has ordered an initial batch of 36 Javelin missiles systems, to equip French forces operating in Afghanistan. According to the U.S. Defense Security Cooperation Agency France has requested 76 such systems, plus 260 missiles. The current order that could amount up to $69 million, fulfils urgent operational requirement for Afghanistan operations. The head of the Direction Generale pour l’Armement (DGA) procurement office Laurent Collet-Billon said a follow-on competition will determine which company will win this contract.

    The French selection of the Javelin was logical, due to the availability of this weapon and support equipment is more available in Afghanistan, with U.S. Army, Marines and British forces. The Javelin is widely used in theater to suppress and attack snipers and mortar locations firing beyond the effective range of small caliber weapons such as 0.5 machine guns and high power sniper rifles. Its sight module is also used independent of the weapon, for observation and target acquisition at extended range.

    Javelin

    However, the requirements for the French acquisition are broader than the limited mission Javelins are performing in Afghanistan. The will be used as successors to Milan-2 anti-tank missiles, used by all French infantry units, and will be called upon to perform as anti-tank and multi-purpose weapons. Despite its near-term selection of the Javelin, France is still undecided which of the two contenders will wind the final award for undred of launchers – the Raytheon/Lockheed Martin team offering the Javelin anti-armor missile or the Israeli/European team offering the Spike missile developed by Israel’s Rafael’s Advanced Defense Systems and produced by the European Eurospike company. The French ministry plans to award the contract to a local prime contractor, most likely EADS/MBDA or Thales, each of these local companies will team with one of the the foreign developers, facilitating local integration, production, training and support.Spike Missile

    Sofar the Spike has beaten Javelin in most NATO countries, except the UK, and Ireland. Spike has won major orders in Spain, the Netherlands, Italy and Germany. Among the advantages attributed to the Spike are its scalability, multi-purpose warhead and weapon station integration. The Javelin is also undergoing product improvement, to include a planned introduction of a multi-purpose warhead in the near future.

    Lightweight Air-Dropped Guided Weapon Optimized for Tactical-UAVs

    General Dynamics Ordnance and Tactical Systems (GDOTS) has successfully demonstrated a lightweight, precision guided weapon that could potentially be launched from tactical-class unmanned aerial vehicles (TUAV), such as the RQ-7 Shadow. Transformed into a precision guided bomb, a standard 81mm mortar bomb is applied with a smart guidance kit, replacing its standard fuze. The guidance section employs GD’s patented Roll-Controlled Fixed-Canard (RCFC) system, guiding the bomb to impact precisely on a pre-designated target.

    This nose-mounted guidance kit was designed as a common, multi-platform Guidance, Navigation and Control (GNC); according to the manufacturer, it has been successfully demonstrated on multiple mortar calibers, in both air-drop and tube-launch applications. The recent test was carried out at Ft. Sill, where an 81mm Air-Dropped Guided Mortar (ADM) bomb was deployed from an aircraft. The interface with the launching platform was provided by the ‘Smart Rack’ carriage and release system, also developed by General Dynamics, enabling the weaponization of any tactical unmanned aerial vehicle (TUAV) platform. (see photo)

    This application has been designed to meet the requirements of the U.S. Army, Marine Corps and Special Forces, for a rapid target-response capability. It was developed in conjunction with the U.S. Army’s Armament Research Development and Engineering Center (ARDEC) in Picatinny Arsenal, N.J. The weapon was first tested in December 2008. The ADM will use existing mortar inventory to provide a low-cost, lightweight weapon system, with proven energetics. The company’s patented GPS enhanced, Roll Controlled Fixed Canard (RCFC) guidance kit is employed in this 81mm air-drop configuration, while enhancing the precision of tube-launched 120mm mortar bombs.

    The tube-launched application is a low-cost guidance approach already successfully demonstrated at Yuma Proving Grounds, in a tactical 120mm guided mortar configuration, known as the Roll Controlled Guided Mortar (RCGM). The tube-launched 120mm RCGM uses the existing warhead and the M934A1 fuze.

    Sagem Receives Production Order for 3400 AASM Weapons

    Sagem has been awarded a contract to supply 3,400 AASM Air-to-Ground Weapons to equip the French Air Force Rafale aircraft. The order also covers the initial order of 680 weapons. This latest order follows the initial contract won by Sagem for 750 AASMs to be delivered to the French air force. The AASM has been deployed on Rafale fighters in Afghanistan for the last two years.

    The basic version will integrate an upgraded, GPS module and be prepared to receive an Inertial/GPS and laser terminal guidance systems. The new multi-sensor guided version expands the AASM family, which already includes two versions qualified on the Rafale multirole combat aircraft, with inertial/GPS or inertial/GPS/infrared guidance. In particular, the new version enables precision strikes against moving targets. The AASM weapon family comprises kits and augmentation kits fitting 1,000, 500, 250, and 125 kg bombs.

    Launched from standoff distance, day or night and in all weather conditions, the AASM offers a range exceeding 50 kilometers. The AASM can be released at low altitude, and can also be fired off-axis, in relation to the aircraft’s flight path. It offers very high precision and strikes its target vertically, a feature suited to asymmetrical conflicts. This makes it the perfect weapon for combat in difficult terrain or urban environments, for both planned missions and opportunity fire.

    India Test Fires the AGNI-3 Strategic Ballistic Missile

    The fourth flight of the Indian long range missile AGNI-3 with a range capability of 3,500 km was tested successfully by Defence Research and Development Organisation (DRDO) last month. The missile was launched from the Wheeler Island, in the Bay of Bengal off the coast of Odisha. Overall, with a range of 3,500 km, Agni III is considered a potent weapon designed to balance a potential Chinese threat, rather than the Pakistani missiles. Compared to its Chinese peers – CSS-5 and DF-21, Agni III is considered more advanced.


    The Indian Ministry of Defense confirmed the missile, tested for the full range, have met all the mission objectives. The two-stage AGNI-3 Missile has a length of 17 meters and diameter of two meters. With launch weight of 50 tons, the solid propellant powered missile carries a payload of up to 1.5 tons, sufficient for carrying nuclear warheads. The recent flight took the missile to an altitude of 350 km.

    The recent test is part of the missile’s developmental test plan. Although the Indian Defense Department claims the missile is ‘ready for induction’, more testing and verifications remain to be done. At present Agni III is transported by rail and launched from prepared launch pads. Operational missiles should be able to deploy more flexibly and rapidly – missile stored in containers, and launched utilizing transporter-erector-launcher (TEL) systems yet to be deployed.

    Enhanced APKWS Rockets Enter Production, to arm Marine Corps Gunships

    APKWS, the lightweight 2.75″ laser guided rocket developed by BAE Systems in partnership with the U.S. government, has been approved for production. The U.S. Marine Corps will initially deploy APKWS from AH-1W Cobra helicopters. APKWS also has been successfully demonstrated from a U.S. Army OH-58 Kiowa Warrior. APKWS is the Program of Record established by the U.S. Government to meet war fighter requirements for a laser-guided 2.75″ rocket. The Navy assumed acquisition executive oversight of the program in 2008 and has fully funded it for production.

    Prior to being declared production-ready, the weapon underwent a rigorous series of flight, component, and all-up-round qualification tests. The flight tests, which culminated in a perfect 8-for-8 score in a series designed and conducted by Marine test pilots, demonstrated that the system’s accuracy exceeds government requirements. Throughout its eight-year history of flight tests, APKWS has hit an average distance from the center of the laser spot of less than 0.75 meters against a government specification of 2 meters.

    In a series of shots fired during the weeks of Jan. 11 and 18, Marine AH-1W Cobra helicopters flying a variety of scenarios fired laser-guided APKWS rockets at targets typical of those encountered in theater. Live warheads were fitted to the APKWS guidance section, and in day and night tests, the guided rockets struck their laser-designated targets and detonated on impact.

    “The APKWS operational assessment has demonstrated the system’s effectiveness in a variety of scenarios involving various targets, platform speeds, ranges, and tactics,” said Maj. Matt Sale, requirements officer for Marine Corps Aviation Weapons. “The system’s reliability has been proven with its 19-for-19 performance in tests, exceeding requirements and expectations. We are confident that APKWS is the right-size weapon for many of our typical engagements and will be highly effective in allowing Marine aviators to prosecute targets.”

    The weapon system, which transforms standard 2.75-inch unguided rockets to smart, highly precise laser-guided missiles, “is a game-changer for our nation’s war fighters,” said Mike Lewis, vice president and general manager of soldier and vehicle solutions at BAE Systems. “Its demonstrated precision and small warhead mean aviators can prosecute very specific targets from a greater distance without incurring collateral damage. The technology’s low weight compared to other precision-guided munitions is critical to mission success on helicopters operating in high-altitude environments.”
    APKWS is a low-cost alternative to other air-launched munitions currently in inventory. Because it uses standard launchers, APKWS requires no platform integration or aircraft modifications, and because it is loaded and fired like a standard 2.75-inch rocket, it requires little additional aviator or ordnance crew training. The mid-body design of its guidance section enables use of existing warheads, fuses, and rocket motors, enhancing the capability of the existing 100,000-unit inventory of unguided rockets.

    New and Enhanced Patriot Scores a First Kill in an Intercept Test

    Photo: Lockheed Martin
    Photo: Lockheed Martin

    A modified version of the PAC-3 Missile has been tested successfully in February 2010, verifying the latest enhancement of the system known as PAC-3 Missile Segment Enhancement (MSE). During the test the missile successfully intercepted a threat representative tactical ballistic missile target over the White Sands Missile Range, N.M.

    The PAC-3 MSE Missile was selected as the primary interceptor for the multi-national Medium Extended Air Defense System (MEADS) in September 2006.  The MEADS program has completed hardware Critical Design Reviews and is now integrating and testing the radars, launchers, tactical operation centers and reloaders needed for system tests at White Sands Missile Range, N.M., in 2012.

    The PAC-3 MSE Missile provides increased performance, greater altitude and range than the baseline PAC-3 Cost Reduction Initiative (CRI) Missile. The new missile uses a larger rocket engine, resulting in a larger diameter. Its aerodynamic surfaces are larger and the span of the aft control surfaces is greater, to accommodate the increased performance envelope. To sustain the missile’s longer engagement profile, the missile uses new thermal batteries with increased capacity.

    The PAC-3 MSE Missile is packaged in a single canister, four of which can be operated by each MSE upgraded Patriot launcher. Each of the upgraded launchers could be configured with a mix of PAC-3 and MSE weapons.

    French Military Receive New Small, Mini and Micro Drones

    AeroVironment Wasp micro UAV Block III. Photo: AeroVironment

    The French forces have received three new SDTI drones, the new production units were ordered in August 2009 under as part of a € 5 million contract. The new SDTI model uses redesigned, lighter wings improving the drone’s performance operating from high elevations and at high temperatures.

    The SDTI was inducted to French Army service with the 61th Artillery Regiment (Chaumont) in 2004. After 10 deploying to Kosovo for months in 2007, the regiment has deployed to the Tora Surobi forward operating base in Afghanistan where it is stationed since October 2008.

    The SDTI tactical drone is supporting French troops in Afghanistan since October 2008. Photo: French Army SIRPA
    Elbit Systems Skylark 1 mini-UAV. Photo: Elbit Systems

    While the French Army is operating the SDTI, the Special Forces are been equipped with mini and micro UAVs to enhance situational awareness, force protection and target acquisition. In recent months the command has fielded the AeroVironment Wasp micro UAVs augmenting the Elbit Systems Skylark 1 mini-UAV in service with French special forces since 2008. The hand-launched Wasp provides the SF teams with more autonomy, supporting missions characterized by short duration and close range.

    In addition to these tactical UAV assets, the French Air Force is also operating three Heron type medium-altitude long endurance (MALE) UAVs in Afghanistan.

    AeroVironment Wasp micro UAV Block III. Photo: AeroVironment

    Diehl’s Sky Sphere set to Defeat UAS, OWA Drones Head-On

    0
    Diehl Defence has teamed up with Skysec to develop a drone interceptor. Diehl works with Skysec’s subsidiary, Skysec Defence, to modify the original civilian-oriented net-arresting interceptor into a hard-kill system suitable for military missions....

    Defense Update Weekly News Summary

    0
    Welcome to the latest episode of Defense-Update News Summary! In this episode, we dive into this week’s developments in defense technology, military acquisitions, and strategic partnerships worldwide. Some of this week's highlights include: Elbit Systems...

    Unmanned Combat Aerial Vehicle Program Launches as Part of Rafale F5 Standard

    0
    The French Ministry of Armed Forces has officially launched the Unmanned Combat Aerial Vehicle (UCAV) program as part of the Rafale F5 standard development. This event marks the beginning of a new era in...

    Air Defense & C-UAS Innovations at the AUSA 2024 Exhibition

    0
    Army Air Defense Undergoes Significant Modernization to Counter Drone Threats The U.S. Army's air defense branch has experienced its most substantial modernization and growth in over four decades, primarily driven by the need to counter...

    Elbit Systems Address US Army Artillery Modernization with Sigma 155×52 Wheeled Howitzer

    0
    Elbit Systems of America showcases the Sigma Next Generation Howitzer at AUSA 2024, where competing systems from Sweden, South Korea, France, and Germany are likely to be presented, some in models, others in full...

    Defense-Update Weekly News Summary

    0
    Welcome to the latest episode of Defense-Update News Summary! In this episode, we dive into this week’s developments in defense technology, military acquisitions, and strategic partnerships worldwide. Some of this week's highlights include: Elbit Systems...

    Israel Revamps Aerial Bomb Production

    0
    Elbit Systems has signed a 1.5-billion-shekel (approximately $400 million) contract with Israel's Ministry of Defense to establish an aerial bomb manufacturing bombs for the Israeli Air Force. In the past, the government-owned IMI operated...