Thursday, December 25, 2025
More
    Home Blog Page 285

    How Vulnerable is the ‘Cloud’?

    Modern ‘Cloud Computing’ operating methodology is rapidly adapted by the commercial sector but for many in the government, defense and intelligence sectors these concepts are becoming a nightmare, for the serious security risk they present to companies, and to national security, unless adequate security measures are taken. While the ‘Cloud’ provides for efficient utilization of human resources, knowledge and infrastructure through collaboration and seamless access to information, it could also be vulnerable to attack, particularly by Active Persistent Threats (APT). According to a survey published by Lockheed Martin and its Cyber Security Alliance, 70% of government technology decision makers in federal, defense/military and intelligence agencies were most concerned about data security, privacy and integrity in the cloud.

    “Seamless security is critical to protecting our customers’ information in the cloud. Collaboration with industry partners and government will accelerate innovation and adoption while enabling successful cloud implementations in the public sector,” said Rick Johnson, Chief Technology Officer and Vice President, Lockheed Martin Information Systems & Global Services.


    According to the survey, cloud computing has low levels of awareness, trust and adoption among IT decision makers in the U.S. defense, military and federal government. Despite all the attention cloud computing receives as one of the leading IT trends, a third of government IT decision makers surveyed were not familiar with cloud computing, and a similar percentage do not trust it. Awareness and trust are lacking even among professionals who are familiar with it and may be responsible for securing enterprise systems and information. While cloud adoption is expected to grow, respondents’ inexperience with cloud computing, security concerns (and in some cases, lack of concern) and uncertainty about governance could make it difficult for organizations to effectively implement cloud computing or realize full value from it.

    The outlook for cloud computing adoption in government depends on how well cloud computing service providers and potential users raise the levels of awareness and trust in the model. The data reflects barriers to adoption, but adoption rates and user experiences show the barriers can be overcome. Respondents who know cloud computing best trust it most. For example, those who are familiar with cloud computing tend to implement it, those who implement expand their use by accessing multiple applications through the cloud, and professionals who are most involved in cyber security have more trust in cloud computing than IT decision makers at large.

    More Aerostats Improve Security in Afghanistan

    In the lead-up to the summer fighting season in Afghanistan, the Defense Department is planning to dramatically increase the number of aerostats to be used as persistent sensors over key operating areas.

    The military has been using elevated, line-of-sight cameras as part of its intelligence, reconnaissance, and surveillance counterinsurgency tactics, but these sensors provide only a brief, ‘bird’s eye’ of the scene. Aerostat-borne cameras augment the UAV with persistent capability.

    The aerostat has a deterrent factor over potential adversaries and develops a sense of security among the population, as it watches the area with an unblinking eye constantly watching areas of suspected insurgent activity. According to Ashton B. Carter, Undersecretary of Defense for acquisition, technology and logistics, the number of aerostat-based, line-of-sight sensors could be increased dramatically, ‘as much as twentyfold’ during the summer of 2010, in an effort to improve security in Southern Afghanistan.

    In addition to significant cost saving, compared to an unmanned aerial system, the aerostat also provides other benefits – persistence, and better bandwidth utilization, since part or all of its communications can be conducted over the tether cable.

    Aerostat parked at Forward Operating Base (FOB) Ghazni near Kandahar. Photographer: Paul Galan

    Iranian Military Conducts Offensive, Defensive Wargame at the Straits of Hormoz

    Iran began today (April 22, 2010) a large scale exercise held in the Persian Gulf, south of the Hurmoz Straits. Public demonstrations held today simulated a naval assault on enemy landing craft. The assault began with a direct attack by a swarm of fast boats, attacking the target with anti-ship missiles and, by RPGs from very close range. This phase was followed by assault teams boarding the vessel, from the sea and by helicopters. This phase was concluded with a torpedo attack sinking the target ship.

    Participating in the exercise are units from the Republican Guards, Army, Air Force, Navy and Marine Corps. According to MEHR agency, naval units taking part in the assault demonstrated to news teams, performed near the port of ‘Bandar Abas’, included new ‘radar evading’ fast attack boats of different types, as well as larger frigate size vessels, operating in a simulated, escalating scenario ranging from engagement of naval forces in the straits, to defeating an amphibious assault. Photos: MEHR.

    RAAD Missile

    The third and final phase of the Iranian ‘Great Prophet V’ exercise culminated with the traditional firing demonstration of different types of missiles and rockets. Today, April 26 2010, the Iranians demonstrated different coastal anti-ship missiles. These included the Ra’ad (Thunder), the Chinese truck mounted version of the HY-2 Silkworm with a maximum range of 360 km, and the C-802 Noor (Lightning), capable of hitting targets at sea from a distance of 40-180 km. The Iranians also fired various rockets, including the medium range Fajr 5 as well as shorter range rockets. Photo: MEHR

    These fast attack boats operated by the Iranian Revolutionary Guards (IRGC) are armed with heavy machine gun and roof-mounted multiple launch tubes firing rockets in a direct attack mode. Photo: MEHR

    This fast attack boat is based on a Rigid Inflatable Hull (RIBS) featuring a low silhouette and relatively small radar signature. Photo: MEHR

    Four Thondor class Fast Attack Crafts, each equipped with four C-802 medium range anti-ship missiles, also participated in the exercise. Photo: MEHR

    Photo: MEHR

    U.S. Air Force to Test X-37B Orbital Test Vehicle

    The U.S. Air Force launched the newest and most advanced unmanned re-entry spacecraft today, April 22nd, 2010 at 7:52PM from Cape Canaveral Air Station, Fla. The spacecraft was launched on an Atlas V expendable launch vehicle, the 8.9 meter long, five ton X-37B Orbital Test Vehicle (OTV) is a ‘risk reduction’ vehicle designed for space experimentation that explores concepts of operation for a long-duration, reusable space vehicle. According to Mr. Gary Payton, Air Force Deputy Under Secretary for Space Programs, the first mission of the X-37B OTV will evaluate new concepts of operation employing a reusable autonomous, unmanned spacecraft. Experimentation will be performed on the mission in space and on the ground, upon its return, assessing the cost and complexity of the turnaround cycle – repairing the vehicle after the flight and preparing it for a new mission in a timely and cost effective manner. Following a series of in-orbit experiments, the vehicle will be commanded to autonomously perform the reentry maneuver to land at the Vandenberg Air Force Base in California, gliding through the atmosphere, on its 4.5 m’ span wings.

    The X-37B is shown above after landing at 1:16 a.m. Pacific time on December 3, 2010, concluding its more than 220-day experimental test mission. It was launched from Cape Canaveral Air Force Station, Fla., on April 22. Photo: Boeing

    “The X-37B is an important step in the effort to make space access more routine, affordable, and responsive,” said David Hamilton Jr., the Air Force Rapid Capabilities office director. “The technologies and concepts of employment that are proven by the Orbital Test Vehicle will be folded into development programs that will provide capabilities for our warfighters in the future.”

    The X-37B landed at Vandenberg AFB on December 3, 2010, concluding its more than 220-day experimental test mission. Photo: Boeing

    The OTV will demonstrate a number of advanced technologies; some have already been tested on modern spacecraft but have not been used on reusable vehicles. These include thermal protection systems, utilizing advanced ceramic tiles made of silica, expected to better isolate the vehicle from heat developed through reentry, these tiles are also expected to better withstand ablation and not absorb moisture, enhancing the vehicle’s ability to launch under weather conditions that would have restricted current Shuttle operations. The OTV also uses advanced power sources based on solar array powered lithium-ion batteries, replacing the hydrogen-oxygen fuel cells used on the Space Shuttle. Other experiments to be performed on board involve the new avionics systems, guidance, navigation and control, systems, high temperature structures and seals.

    The Boeing X-37B Orbital Test Vehicle is 8.9 meter long, 4.990 ton reusable spacecraft, Its height, including the twin tail is 2.9 meters, the wing span is 4.5 m'. The spacecraft is seen here mated with the Lockheed-Martin Atlas V launcher. Photo: U.S. Air Force

    A vehicle like the X-47B is designed to carry out extended space missions of up to 270 days (the spacecraft landed on December 3, 2010 50 days short of that target), providing a flexible platform offering the air force rapid access to space, deploying multiple small satellites into orbit in quick succession. According to Payton, the Air Force hopes for turnaround time similar to the SR-71 Blackbird – several days or few weeks, rather than months required for refurbishing the Space Shuttle for space missions. Eventually, the Air Force plans to operate a fleet of reusable spacecraft – Boeing is already producing the next X-47B, to be delivered next year.

    Although the X-37B represents a new generation of spacecraft, it is based on a design dating back to the mid- 1990s, at the time when NASA explored several concepts reusable space vehicles but hasn’t flown any of them to space. Among these programs were the X-33, X-34, and X-37 vehicles. All have flown in the atmosphere in captive and free flight experiments but were not launched into orbit. The OTV is the first vehicle since NASA’s shuttle orbiter that has the ability to return experiments to Earth for further inspection and analysis.

    NASA’s original X-37 program began in l999 and ran until September 2004 when NASA transferred the program to DARPA. NASA envisioned building two vehicles, an Approach and Landing Test Vehicle, or ALTV, and an Orbital Vehicle. The ALTV validated flight dynamics and extended the flight envelope beyond the low speed/low altitude tests conducted by NASA from 1998 through 2001 on the X-40A, a sub-scale version of the X-37 developed by Air Force Research Labs. DARPA completed the ALTV portion of the X-37 program in September 2006 by successfully executing a series of captive carry and free flight tests. NASA’s X-37 Orbital Vehicle was never built: but its design was the starting point for the Air Force’s X-37B Orbital Test Vehicle program.

    The X-37B program is now led by Air Force Rapid Capabilities Office, which expedite development and fielding of select Defense Department combat support and weapons systems. This program builds upon early development and testing conducted by officials from NASA, the Defense Advanced Research Projects Agency and the Air Force Research Laboratory. “The X-37B is the only self contained effort intended to be an economically viable experimental test platform on-orbit for months at a time and then return,” said David Hamilton Jr., the Air Force Rapid Capabilities office director. “The OTV has the potential to revolutionize how the Air Force operates in space by making space operations more aircraft like and adding in the capability for returnable plug-and-play experiments,” Mr. Hamilton added. “There is much to learn in the first few flights on the technologies used on this vehicle, how quickly it can be readied for a re-flight, and on the operational utility,” Mr. Hamilton said. “We have started discussions with Air Force Space Command (officials) to plan for the possibility for transition to an operational capability, but the system first must prove its utility and cost effectiveness during the test program.”

    Malaysia Acquires 257 Turkish Designed 8×8 Pars APCs

    The Malaysian Defense ministry nominated the Malaysian company DRB-Hicom Defence Technologies (Deftech) a prime contractor to locally produce and supply 257 armored personnel carriers based on the Turkish 8×8 Pars wheeled armored vehicle. The Pars, developed and produced developed by the Turkish company FNSS is based on a design made by the U.S. company GPV. The value of the Malaysian ‘letter of intent’ is worth over worth about US$2.5 billion. Deliveries will span over seven years. The prototype APC is expected to be delivered for testing to the Malaysian Army by 2011. Deftech is to build 12 variants from the base vehicle, including personnel carrier, anti-tank weapon carrier, command and control and anti-aircraft weapon vehicles.

    The APC version will be equipped with a two-man manned turret to be developed and produced by the South African company Denel. Sapura Thales Electronics (STE) will be the electronics system integrator.

    Pars 8x8 vehicle has demonstrated its outstanding cross-country desert mobility in the desert dunes of the United Arab Emirates, during field trials in 2008.

    The cost of the new vehicle seems excessively high – about $9.8 million per unit. Malaysian defense officials explained that these figures represent the total life cycle cost of the program, including which usually includes design, development, logistical support and sustainment as well as non-recurring engineering costs and investments associated with the set-up of local production facilities in Malaysia to develop its armored vehicle manufacturing. Yet, even when considering a 250% mark-up to cover such the price tag on the new Malaysian vehicle seem odd.

    The Pars (Anatolian Leopard) armored personnel carrier is design and developed by the Turkish FNSS company, based on a design of U.S. based General Purpose Vehicles (GPV). The 8×8 configured Pars APC was officially unveiled in 2005 as a basis for a family of armored vehicles addressing Turkish Land Forces Command requirement. Heavier and lighter configurations ranging from 6×6 to 10×10 are also proposed by GPV and FNSS. The Pars has a modular design and can be fitted with various armament fits, including external and turret mounted armament. The vehicle can accommodate one- or two-men turrets as well as remotely operated weapon stations and specific mission equipment. The vehicle is operated by a crew of two, and can carry up 1

    The malaysian troop carrier version of the 8x8 Pars will be equipped with a two-man turret. The version in this photo shows a smaller one man turret designed for the Turkish Army.

    2 troops or up to eight tons of payload. Featuring advanced, active hydropneumatic suspension system with electrically controlled variable height enabling adjustable ground clearance and central tyre inflation system.

    During field trials held in the UAE in 2008 the Pars demonstrated remarkable cross-country desert mobility. It also has full amphibious capability without preparation, utilizing the wheels for propulsion while swimming. With the use of optional hydrojets it can develop more speed and maneuverability. The Pars can be airlifted inside the C17 or the future A400M transport aircraft ordered by Malaysia back in 2005. According to Malaysian defense officials, the order for four aircraft remain in effect although the delivery of the aircraft could be delayed by 3-4 years.

    Deftech is a leading supplier of defense material to the Malaysian Armed Forces, government and security sector, Deftech is a wholly owned subsidiary of the DRB-HICOM Berhad consortium traded on the Kuala Lumpur stock exchange. The award announcement was released on first day of the the Malaysian defense exhibition DSA 2010.

    Iranian Displays Advanced Ballistic Missiles, Air Defense Systems & Anti-Ship Missiles on Army Day Parade

    Iranian S-300 'look alike' missile carriers shown on the Army Day Paradein Tehran, April 18, 2010. These vehicles seem to be carrying mock-ups representing a future missile being developed by Iran. The design looks similar to the Russian S-300 or Chinese HQ-9, but is too simplistic to represent an operational SAM unit. Photo: Ali Rafiei, Fars

    Above: the Iranians displayed the Ghadr-I Ballistic missile at the Army Day Parade 2010. This missile is capable of hitting targets at a range of 2000 km. The Iranians displayed an earlier version of the Ghadr in 2007. This missile is about four meter longer than the Shahab-3B/M versions, adding 35 seconds burn time. Photo: Ali Rafiei, Fars

    Iran’s S-300 ‘look-alike’ – Hoax or Reality?

    Iran has unveiled several new missiles and UAVs at the 2010 Army Day Parade, highlighting long-range ballistic missiles of the solid-propelled Safir and liquid propelled Shahab family. Iran also hints on the existence of a new missile in its arsenal, an S-300 ‘look-alike’. The vehicle displayed on the parade carries four cylindrical canisters measuring roughly as the S-300 container-launcher, but the Iranian vehicle does not show any erection apparatus. If these vehicles are part of a real system, they could be vehicles carrying reload missiles. The system is definitely not the Russian S-300, but could be a derivative of the Chinese HQ-9.

    Iranian S-300 'look alike' missile carriers shown on the Army Day Paradein Tehran, April 18, 2010. These vehicles seem to be carrying mock-ups representing a future missile being developed by Iran. The design looks similar to the Russian S-300 or Chinese HQ-9, but is too simplistic to represent an operational SAM unit. Photo: Ali Rafiei, Fars

    Yet, the likelihood of this vehicle being a true missile is questionable, according to Aviation Week reporter Dave Fulghum, that considers the Iranian display a hoax. Iran has claimed for several months now that it has developed an indigenous air-defense missile comparable to the S-300 it has ordered from Russia. Iran is also modernizing its Hawk missiles, into the locally modified Hawk (Shahin) to improve its air defense capability. Iran has also introduced the Mersad (Ambush) – a further improved version of the Hawk. Iran’s Defense Minister Ahmad Vahidi said recently that Iran’s defense industries began full scale production of the Mersad surface-to-air missile, considered to be superior to the missile Iran received from the USA during the 1970s. The range of the Mersad is claimed exceed 40 km. The system introduces modern radar signal processing technology, an advanced launcher, and improved guidance and target acquisition systems.

    A top view of the Iranian S-300 'look alike' missile carriers show attachment assemblies different from similar Russian or Chinese systems.

    The parade included mostly locally developed and produced systems, and, therefore has not displayed the latest air defense system in Iran’s arsenal – the SA-15 Tor delivered by Russia few years ago. These point defense missiles being used to defend many of its nuclear sites.

    The Iranians are also planning to introduce locally developed radars to replace a series of aging Russian-made systems currently deployed in the Persian Gulf. “The systems will be designed and installed chiefly for defense purposes,” said Vice President for Science and Technology, Nasrin Soltankhah.  She added that the new radar systems will also feature capabilities to provide meteorological data for weather forecasting and analysis.

    Iran’s Defense Minister Ahmad Vahidi said recently that Iran’s defense industries began full scale production of the Mersad surface-to-air missile, considered to be superior to the US-made Hawk missile Iran received from the USA during the 1970s. The Mersad introduces modern radar signal processing technology, an advanced launcher, and improved guidance and target acquisition systems.

    The Iranians are also planning to introduce locally developed radars to replace a series of aging Russian-made systems currently deployed in the Persian Gulf. “The systems will be designed and installed chiefly for defense purposes,” said Vice President for Science and Technology, Nasrin Soltankhah. She added that the new radar systems will also feature capabilities to provide meteorological data for weather forecasting and analysis.

    An Iranian fast boat launching the Nasr-1 anti-ship missile. Photo: MEHR

    Anti-Ship Missiles on Display

    Two classes of antiship missiles participated in the parade. The Ra’ad (Thunder), is the first indinenously produced anti-ship missile from Iran. Based on the Chinese HY-2 Silkworm, the Ra’ad and its Silkworm launcher were matched to a tracked platform to provide an all-terrain weapon system that can be deployed along the coastal plains of the Persian Gulf. The missile has a maximum range of 360 km. Iran is also producing three types of anti-ship missiles designed for operation from surface vessels or land vehicles.

    These include the Chinese C-802, the land-based configuration carries three missiles, capable of attacking surface targets at distances of 120-180 km. The missile has an autonomous (self-targeting) range of 40 km. The Kosar is a smaller, short-range version of the Chinese C-701, This missile can be guided using radar or TV guidance.

    The newly developed Nasr 1 is larger than the Kosar missile – based on the Chinese C-704 design. Longer and heavier than the C-701, the new missile has a heavier warhead, capable of destroying larger ships, with displacement of up to 3,000 tons. The Iranians designate the weapon a ‘cruise missile’, but it seems it is more likely a short-to-medium range anti-ship missile. According to Jane’s Air-Launched Weapons, the range of the C-704 is 170 km (106 miles) and its warhead weighs about 109 kg (240 pounds). There are probably two versions of the missile – one using radar guidance and another, operating a TV seeker. Future enhancement of the missile could also include air-launched versions. A longer range version of the Nasr could also be in development – most probably a long-range naval attack weapon based on the Chinese turbojet-powered C-705 cruise.

    Iran is also fielding enhanced versions of the Noor (Chinese C-802), converted into an air-launched version that can be carried by Mi-17 helicopters and strike fighter jet aircraft.

    Latest Ballistic Missiles on Parade

    Among the ballistic missiles displayed on the parade were two Shahab 3 missiles and the solid-propelled Sejjil 2. All missiles were seemingly of operational capability, carried on erector-launchers, by commercial trucks.

    Sejjil-2 long range ballistic missile. Photo: Ali Rafiei, Fars
    An Iranian Shahab-3B ballistic missile. This variant has a larger warhead, compared to both the Shahab-3 and the Shahab-3M. Photo: Ali Rafiei, Fars

    Fateh 110 short range guided missile is believed to be based on the unguided Zelzal-1 rocket is probably the Iranian first attempt to develop an advanced ballistic missile having trajectory shaping, terminal maneuvering and precision attack capability. From the images have been released sofar it seems that the missile seems to be in development. Photo: Ali Rafiei, Fars

    Iran's defense industries have began full scale production of the Mersad surface-to-air missile, considered to be superior to the 1970 vintage US-made Hawk missile Iran received from the USA before the islamic revolution. The Mersad introduces modern radar signal processing technology, an advanced launcher, and improved guidance and target acquisition systems. Photo: MEHR

    SUPACAT Introduces the SPV400 Light Armored Vehicle

    The new vehicle is one of the contenders for the UK MoD LPPV Program

    The all-terrain vehicle producer Supacat launched the new light armored vehicle Supacat Protected Vehicle (SPV400) this week at the Long Valley Test Ground in Aldershot, UK. The new vehicle is one of the contenders for the UK Ministry of Defence’s (MoD) Light Protected Patrol Vehicle (LPPV) program. MoD is planning to order the LPPV under an Urgent Operational Requirement (UOR) to replace the unprotected Land Rover Snatch patrol vehicles. The selection of the supplier and order for an initial batch of 200 vehicles is expected soon, the LPPV is intended to enter service in early 2011.

    The SPV400 is an all-British vehicle designed to retain good mobility when adequately protected from the common IED threats currently encountered in the Afghan theater. It combines an integrated blast and ballistic protection system, including an all composite protected crew capsule (pod) and V-shaped hull. The vehicle retains the exceptional cross country mobility characteristic of all Supacat platforms, and the agility to maneuver in tight urban environments.

    “The SPV400 is purpose designed for LPPV” said Nick Ames, Managing Director of Supacat Ltd. “Its clean sheet design is `future-proofed` and can be upgraded to exceed the present LPPV requirements for protection and mobility”.

    The first SPV 400 prototype was subjected in December 2009 to two days of blast trials, simulating IEDs and large Vehicle Borne IED (VBIED) effect. The second and third SPV400 prototypes were completed at Supacat’s Dunkswell, Devon, facility in January 2010 and following initial company trials are participating in the UK MoD’s full trials program. A further two prototypes are being completed with one due to undergo further blast tests.

    The vehicle was designed by Devon based Supacat, the specialist in high mobility, all terrain vehicles. Its armor protection partner is Coventry based NP Aerospace, which has designed the composite crew pod and protection system with access to the UK’s classified armor technology.  Supacat and NP Aerospace have formalized their alliance under which volume production will be conducted through the Alliance at NP Aerospace’s Coventry facility.

    SPV400 tech

    With the Design Authority for the SPV400 being UK based, all Intellectual Property Rights for the SPV400 automotive and protection systems reside with Supacat and NP Aerospace.  This means the UK retains full control over future design upgrades and the SPV400 is free from US ITAR restrictions.

    SPV400
    The SPV400 is designed by Devon based Supacat, the world leader in high mobility, all terrain vehicles.  Its armour protection partner is Coventry based NP Aerospace, which has designed the composite crew pod and protection system with access to the UK’s classified armour technology. Supacat and NP Aerospace have formalised their Alliance Agreement under which volume production will be conducted through the Alliance at NP Aerospace’s Coventry facility.

    Cyber Warfare is Here and Now!

    In recent years network attacks have grown dramatically, not only by sheer number but in their sophistication and precision. Converging computers and mobile phones, the global network absorb us through billions of computer-embedded devices that monitor, control and operate our infrastructure, health, commerce and trade.

    They manage our privacy and interaction with the world, protect us from crime and maintain our national security.
    However, that same infrastructure is also providing subversive elements with the means and access to compromise our security. These are ranging from rogue nations, hostile takeovers by corporations, to illusive, non-state organizations and anarchists.
    Even individuals, with powerful tools, previously accessible only at the national security level have become security perils. 

    These tools are not limited to irritating E-mail spams, or obnoxious group messages, but also to endanger powerful encryption, adequately protecting information-exchange for tactical applications, and ‘logic weapons’. They are empowering individuals and groups to conduct stealthy, precision attacks against high-profile cyber-entities, causing effects which have potential lethality and damage, equal or exceeding notorious the 9-11 attacks.

    Attacking strategic infrastructure networks such as electricity, gas and water is relatively easy once field attack vectors are taken into account” admits Eyal Udassin, IT manager at C4 Security, a ‘Red Team’ that hacks into such networks in an attempt to uncover security gaps. “Such networks can be easily discovered and compromised, utilizing reverse-engineering of SCADA and control protocols, to gain control of specific nodes, or even the entire network. “We can hack military networks in the same way” Udassin adds. “While companies are investing ever growing funds in securing their networks, many solutions are protecting the front gate, but leave many back-door accesses uncovered. The process cannot be considered complete, before verifying that the system can now successfully resist an attack launched by a serious adversary.”

    Udassin and his team are certainly not the “bad guys”, as they purposely challenge the networks, at the request of their customers who want to know just how secure they are. On the contrary, they alert all the relevant governmental agencies of the found technical vulnerabilities and assist the vendors in remedying them. Yet, equally capable terror hackers are also lurking online, using the same methodologies to seek out the weak spots, which they can exploit, to gain information and access to meaningful targets, to create ‘high profile attacks’.

    Media coverage of one such attempt that successfully compromised several nuclear power stations in the U.S., was suppressed by the authorities, to deny potential terrorists access to media leaks, they were hoping for.

    “Without carrying out the type of attack in a controlled manner or its own network, the utility or critical infrastructure cannot know for sure that it can withstand such an attack” says Udassin. Utilities fear that conducting such controlled attack simulations will harm their operations, but this is where the role of experienced SCADA auditors come into play.


    World CyberWarriors – Unite!

    “Repairing the damages caused by potential cyber terror attacks could be extremely expensive” warnes Brig. General (Res) Nitzan Nuriel, head of the counter terror bureau at the Israel National Security Council, “Cyber Security authorities around the world should join together, establishing a network that can fight back against this network of cyber-terror.” Nuriel suggests that such a network could be deployed similar to the U.S. Defense Support Program, a network of satellites providing early warning on missile launches throughout the world. “Such a network should also develop the capability to counterattack these threats as they develop, through almost instantaneous action, thus taking toll of every attempt” he added.

    Cross-national cooperation among piers in the different member countries should also contribute to better preparedness, as all member nations will have better knowledge and warning on imminent threats, sometime enabling them to take preventive action or preempting an attack.

    “This is not a battle a nation or a single organization can fight alone” Gemeral Nuriel said. He agrees that cyber warfare is a powerful tool for the national authorities in fighting terror and crime, but such capabilities remain within the national realm. “nations should negate the access of non-state actors to these tools and capabilities.” He added.

    Exploiting the persistence, anonymity and widescale reach of the modern computerized world, Cyber terror and cyber crime are today becoming the fastest growing threat, “almost every type of criminal behavior has a parallel in the cyberworld” said Israel Police Chief Superintendent Izhak Shopen, head of the
    cyber crime unit.

    Cyber crime and espionage are already wide-spread in the global network, and the next wave, targeting the ‘web apps’, becoming so popular in social networks and mobile phones, has already arrived.

    According to Joseph Tal, a member of IBM Security Services (ISS), almost half of the known vulnerabilities that exist today are somehow related to these apps that have minimal (if any) security measures. One of the most widely used and fastest growing threats existing today is the ‘botnet’, a stealthy, compact code, planted in a targeted device through a deceptive approach (fake email from a friend, for example). Once contaminated with the botnet, the computer is at the mercy of a remote user, taking control of that device, without the user’s awareness. By taking over the victim, a hacker can use that computer to carry on further attacks, directed at other computers, penetrate into protected networks, (for example, when the unsuspecting victim, has access to his organization’s protected intranet compromised by alien elements) Hackers can actually ‘mine’ for information from the victim, or launch attacks against critical nodes connected to the system. Frequently, these planted botnets are also offered to other hackers for rent, at rates ranging from few hundred to several thousand dollars for operation.

    The Cyber Attacker’s Dillema

    Shai Blitzbau, technical director at Magelan information defense and intelligence services describes typical attacks simulated by his company, providing threat assessment audit for government, security and commercial organizations.
    In recent exercises Magelan performed a threat simulation, that targeted an essential national infrastructure network responsible for the production and distribution of a vital product, considered as basic necessity for the entire population. The simulation demonstrated how, after 96 hour preparation, the team could bring a network,
    producing and distributing critical goods to a standstill, and keep it idle for at least two weeks. The aggressor team that started with zero access to, or knowledge of the target, managed to study the target, write malicious code, penetrate the network and execute his attack in less than four days.

    There are other means the intelligence can use to gather high quality information. A cyber attack should be executed only when the gain expected significantly exceeds the potential cost one could pay for such act. Blitzbau explains that a cyber espionage act
    point-out the person and the information it targets, thus identifying the attackers and their interest.

    Professional attacks are stealthy and deceptive, thus masking the true identity, intensions or cause of their perpetrators. For example, a wide-scale campaign launched in 2009 known as ‘Operation Aurora’ was attributed to Chinese hackers (or Chinese authorities?) although the code was allegedly ‘signed’ in Taiwan… The targets were unknowingly exposed to this ‘Advanced persistent Threat’ (APT) seemingly directed at specific source- codes of critical applications, developed and operated by mega companies in the U.S., like Google and Yahoo. What the hackers were after is still unknown. Maybe this phase was only the beginning, and the next phase will exploit the codes already having being compromised?

    The fact remains that the attackers penetrated the most inner circles of these companies, and obtained highly sensitive data deliberately. This brute aggression caused Google to decide on leaving China, and brought a serious political rift between the USA and Beijing.

    In another attack, directed at the Ford Company, the alien operators recruited in the U.S. company were found and indicted, but the actual targets were intercepted inside the organization and the final destination of the information stolen through the cyber scheme remains a mystery.

    Network Intelligence is a powerful tool that is widely used as part of every modern intelligence campaign, yet, the cyber intelligence, in its common form poses major challenges for intelligence organizations, since it has the potential to point directly at the perpetrators, their senders and their targets. Once compromised, such means are instantly shut down, wiping out years of developments and untapped exploitations that could take advantage of such dormant assets. “Compromising such dormant ‘logic weapon’ represents the biggest risk for the hackers, whether they represent themselves, criminals or terrorists, or an intelligence agency.” Blitzblau said. He describes such a weapon recently uncovered by the Maglan team as an ‘innocent looking’ piece of code, only 8Kb in size, that has the potential to do much damage on the computer it was planted on and even beyond it. “Inserted into the targeted computer, this malicious code was acting on commands received from the remote computer through a maze of pathways hiding the source. Although it wasn’t highly sophisticated it was quite difficult to spot” he said.

    According to Blitzbau, the most common type of attack known as ‘Defacement’ is still taken too lightly by security personnel and executives, measuring their effect only by the superficial damage they cause, by replacing the home page with humorous messages or political propaganda. ‘Almost 30% of defacement hits, commonly considered as the work of amateur hackers, are actually an act of deception, where the attackers hide a malicious code somewhere in the computer being compromised, hitting the home page to hide their tracks. Most webmasters being attacked simply reload the original data and consider the case closed, although their website now becomes a ‘zombie’, contaminating the site, while users remain unaware about the risk being hit with the stealthy, malicious codes.

    Cyber Warfare was the theme discussed at the Tel Aviv Workshop for Science, Technology and Security, April 13, 2010.

    Watchkeeper is Flying in the UK

    The Newest British UAV is Scheduled for Delivery Later in 2010

    Watchkeeper, the newest unmanned aircraft to join the ranks of the British Army performed its first flight in the U.K. on April 14, 2010 at Parc Aberporth in West Wales. TheParc Aberporth facilities, managed by QinetiQ through the West Wales Unmanned Air vehicle (UAV) Centre, are the premier test facilities for UAVs in the UK.

    Performing the first success flight is the first milestone in the UAV induction of the Watchkeeper system with Army units, demonstrating that the vehicle and its system meet the robust safety and airworthiness criteria required to fly UAVs initially on ranges and segregated airspace in the UK. Thales UK, the system integrator and prime contractor is scheduled to deliver the first Watchkeeper systems to the MOD this year. Photos: Thales UK

    “2010 is an important year for the program as it will also see the opening of the Watchkeeper training facility based in Larkhill, and the continuation of the technical field trials at Parc Aberporth” Alex Dorrian, CEO of Thales UK added. “Building on lessons learnt on current operations, Watchkeeper will also soon be an invaluable asset for commanders on the ground.” Dorian added. Thales UK, as Prime Contractor for the Watchkeeper program, will deliver equipment, training and facilities, with the capability being delivered to the MoD customer from late 2010. Production of the Watchkeeper system will take place at U-TacS (UAV Tactical Systems Ltd), the Thales UK and Elbit Systems joint company, based in Leicester.

    Watchkeeper is a high-performance multi-sensor, all-weather UAS that can remain airborne for over 16 hours in a single mission. It includes a high degree of automation, with automatic take-off and landing (ATOL), and has a de-icing capability, to expand its ability to operate in all weather / operational environment. Delivered in a dual-payload configuration, the system includes enhanced electro-optic / infrared sensors, with laser target designator, as well as an advanced I-Master synthetic aperture radar / ground moving target indicator radar.

    Until the Watchkeeper is fielded, the Army relies on the services of fleet of leased Hermes 450 unmanned air vehicles (UAVs) operated by Thales UK offering the MoD customer an innovative ‘ISTAR-by-the-hour’ contract. Since the contract award, in July 2007, these Hermes 450 UAVs have flown more than 30,000 operational hours in over 2,000 sorties, supporting UK forces in current operations, primarily in Afghanistan. The company launched this service in response to an Urgent Operational Requirement (UoR) contract issued by the UK Ministry of Defence (MoD), and will run through to contract completion in October 2010 which could potentially be extended until April 2011 when the H-450s will be phased out as the Watchkeeper delivers frontline capability.

    IMI Delivers the last of 170 Upgraded M-60A1 to the Turkish Army

    Israel Military Industries (IMI) has delivered the last of 170 upgraded M-60A1 tanks to the Turkish Army. April 7, 2010, at an official ceremony held at the 2nd Turkish Army Depot at Kayseri, Turkey – the location in which the tanks underwent upgrading work in recent years. IMI is the prime contractor for the $687.5 million project, considered to be one of the world’s largest tank upgrade programs, bringing the M60A1 tank to level of the world’s leading main battle tanks.

    In 2002 Turkey and Israel embarked on the multi-year program to modernize 170 tanks. The project also included establishment of training and logistic support infrastructure, and transfer the technology to local industries enabling local production of part of the systems. The modernization of the 1960 vintage M-60A1 transformed the tank into a modern weapon system, integrating modern and combat proven protection, firepower, propulsion and vectronic systems. The design implemented in the Turkish program utilized systems already proven in modern armored vehicles in service with the IDF, such as the merkava 4 main battle tank.

    Through the upgrade program the tank’s original 105mm rifled gun was replaced with a new 120mm smooth bore gun, all-electric turret drive, sophisticated optronic and fire control systems. The armor suite was enhanced with advanced hybrid armor system protecting the crew. A modern powertrain was also introduced, including a more powerful 1000 hp MTU diesel engine with matching transmission and final drive from Renk, both from Germany, and advanced suspension system derived from the Merkava design. The modernized tank has undergone extensive testing and qualification performed in Israel and Turkey, by Turkish test and evaluation teams, supported by IMI and the program’s subcontractors.

    In addition to upgrading the M60A1, Turkey has also upgraded 171 Leopard 1 tanks and acquired 298 surplus Leopard 2A4 tanks from Germany. Turkey has more than 1,000 additional tanks of the M60A1/Leopard 1 models that could be considered for future modernization. For the future acquisition Turkey has embarked on an ambitious program to develop and produce the Altai, a modern main battle tank, based on South Korea's latest Black Panther MBT design.

    The production line established at the 2nd MMC (depot) in Turkey was modernized with the latest production methods and unique machine tools necessary to support the program. Israel Military Industries (IMI) is the prime contractor for the program, leading a team of subcontractors that include Elbit Systems, as the system integrator of the electronic systems, Urdan Industries and Orlite, providing part of the armor modules, and Aselsan and MKE from Turkey which operated alongside IMI to facilitate local support for the systems.

    IMI was hopeful that the Turks will continue to upgrade more M-60A1 tanks under the program. However, in parallel to the Israeli led program, Turkey has been upgrading 171 Leopard 1 tanks and acquired 298 surplus Leopard 2A4 tanks from Germany, therefore fulfilling their immediate requirements for main battle tanks. Turkey has more than 1,000 additional tanks of the M60A1/Leopard 1 models that could be considered for future modernization. For the future acquisition Turkey has embarked on an ambitious program to develop and produce the Altai, a modern main battle tank, based on South Korea’s latest Black Panther MBT design.

    Turkey and Israel have agreed to pursue foreign markets for new opportunities in tank upgrading. At the closing ceremony the Turkish Defence Minister H.E. M.Vecdi GÖNÜL referred to the advanced technologies implemented in the upgraded tanks, noting the cooperative agreement signed between Israel Military Industries and Aselsan of Turkey will contribute to further collaboration on future programs in foreign countries. IMI’s Chairman Avner Raz expressed his confidence that the cooperation established between the two countries and industries will lead to more opportunities in the future. One opportunity being discussed is a tank modernization planned by the Columbian Army. Major General Luis Alberto Ardila, Second Commander and Chief of State of the Colombian Army has visited Turkey to inspect the modernized tank.

    The Dark side of Cyberspace – Cyber Espionage Campaign Uncovered by Canadian Shadow Warriors

    In a report released earlier this month, Canadian based ‘Information Warfare Monitor’ and the ‘Shadowserver Foundation’ have warned of an ongoing, massive cyber espionage scheme directed from China against several countries, among them India and Pakistan. The warning was included in the “Shadows in the Cloud: An investigation into cyber espionage 2.0” report.

    The study uncovered a complex ecosystem of cyber espionage that systematically targeted computer systems throughout the world, targeting governments individuals, non-state and international organizations, among them the Offices of the Dalai Lama, the United Nations, as well as Indian government officials and Pakistani embassies. Through their investigation the group recovered thousands of official documents obtained by hacking targeted computers being ‘harvested’ through internet.


    A Small Piece of a Big Pie

    “This is just a small piece of a very big pie.” Said Steven Adair is a security researcher with the Shadowserver Foundation. “This is a problem that goes well beyond those detailed in this report and affects organizations and missions of all sizes all over the globe.” According to the researchers, the attackers seemingly targeted specific sensitive and classified material, belonging to government, business, academic, and other computer networks and politically sensitive targets by employing virus-like ‘maleware’ applications. These shadow worms systematically snoop through the files stored on targeted computers, sending the harvested data through the web to core servers located in the People’s Republic of China (PRC).

    Among the document recovered by the researchers were “SECRET”, “RESTRICTED” and  “CONFIDENTIAL” classified encrypted diplomatic correspondence, identified as belonging to the Indian government. The researchers admit that these files may have been harvested unintentionally, as they were transferred to non-secure computers by their owners, not being aware of the underlying harvesting of material from their PCs. Such material includes information originated by the user of that PC, as well as by others, unaware of the data compromising of secure data on by trusted partners.
    Although the identity and motivation of the attackers remain unknown, the report provides evidence that the attackers operated or staged their operations from Chengdu, PRC. Although the links to China are clear, Nart Villeneuve, Chief Security Officer at the SecDev Group does not attribute the scheme to official Chinese espionage “There is no direct evidence linking these attacks to the Chinese government. We look forward to working with China CERT to shut down this malware network.”

    The shadow network maintained persistent control over the network through facades of service providers, unaware of the scheme they were assisting. These networks were established of multiple, redundant cloud computing systems, social networking platforms, and free web hosting services. The attackers exploited freely available social media systems, like Twitter, Google Groups, Blogspot, Baidu Blogs, blog.com and Yahoo! Mail as the command-and-control infrastructure for their worldwide scheme, leveraging these cloud-based social media services to establish tiered command and control infrastructure, and maintain persistence over the whole network. Exploiting these services by ‘phishing’, disguised as innocent message activities, directing compromised computers to accounts on free web hosting services, where disabled routed to the targeted computers to a stable core of command and control servers located in the PRC.

    “The Shadow report shows that the social media clouds of cyberspace we rely upon today have a dark, hidden core” warns Ron Deibert, Director of the Citizen Lab at the Munk School of Global Affairs, University of Toronto. “There is a vast, subterranean ecosystem to cyberspace, within which criminal and espionage networks thrive. The Shadow network we uncovered was able to reach into the upper echelon of the Indian national security establishment, as well as many other institutions, and extract sensitive information from unwitting victims. Networks such as these thrive because of a vacuum at the global level. Governments are engaged in a competitive arms race in cyberspace, which prevents cooperation on global cyber security.”

    A Wake Up Call

    The Shadow report should offer a wakeup call to governments, to establish cyber security strategies and implement a foreign and security policy addressing cybersecurity challenges. Unless governments take action, we may find that we are the next victim of the Shadows and GhostNets of cyberspace. Deibert warned.
    “Cyber espionage has gone industrial” warns Rafal Rohozinski, CEO of the SecDev Group and Psiphon Inc., and the co-founder and principal investigator of the OpenNet Initiative and Information Warfare Monitor, and a senior research advisor at the Citizen Lab, Munk School of Global Affairs, University of Toronto. “We are witnessing cloud-based techniques and tradecraft from cybercrime being repurposed to target government systems and computers belonging to officials entrusted with state or commercial secrets.”

    Whether the attackers are working for state agencies, or freelancing and selling stolen data or tradecraft on the global graymarket, the recent report is a clear wake-up call that the threat of advanced persistent threats is very real and requires measured international action. “First and foremost, we need an agreement on the norms that should govern cyberspace similar to the treaties we presently have for outer space, the sea or other domains where we have international agreements.” Rohozinski added, “We must take care to preserve the openness of the global commons without precipitating an overreaction that could diminish or even roll back the very real gains in knowledge, empowerment, and to democratization that cyberspace has catalyzed over the last 20 years. We must balance the need to create policies and practices appropriate to information security in a global networked age, while preventing unnecessary overreaction to what we fear as the dark side of the net.”

    About the Researcher Collaboration:

    This investigation is a result of a collaboration between the Information Warfare Monitor and the Shadowserver Foundation. The Information Warfare Monitor (infowar-monitor.net) is a joint activity of the Citizen Lab, Munk School of Global Affairs, University of Toronto, and the SecDev Group, an operational consultancy based in Ottawa specialising in evidence-based research in countries and regions under threat of insecurity and violence. The Shadowserver Foundation (shadowserver.org) was established in 2004 and is comprised of volunteer security professionals that investigate and monitor malware, botnets, and malicious attacks. Both the Information Warfare Monitor and the Shadowserver Foundation aim to inform the field of cyber security through accurate, evidence-based assessments and investigations.

    SIPRI: U.S., UK, France and Italy Continue to Lead the World’s Defense Market

    The total arms sales of the world’s top 100 largest arms producing companies has increased by $39 billion in 2008, to reach $385 billion; BAE Systems was rated by the Stockholm International Peace Research Institute (SIPRI) as the world’s largest arms-producing companies. Four U.S. companies are trailing BAE in the top 5 positions – Lockheed Martin, Boeing, Northrop Grumman and General Dynamics. SIPRI published today its annual report listing the world’s 100 largest arms-producing companies. The institute estimates the global arms market (excluding China) at $3.85 trillion in 2008, an increase of $39 billion over their arms sales estimate in 2007.

    ‘BAE Systems’ move to first place in the Top 100 is notable for a variety of reasons’, says SIPRI arms industry expert Dr Susan Jackson. ‘The company is based in the UK, but does more than half of its business in the USA. BAE really shows the increasing internationalization of the arms industry and the attractiveness of the US market.’ The sales of the company’s Land and Armaments group almost doubled (from $7 billion to $12 billion), a large part of which is due to sales to the US Government of mine-resistant, ambush-protected (MRAP) vehicles for the wars in Afghanistan and Iraq.


    US-based Navistar entered the SIPRI Top 100 in 20th place, with arms sales of $3.9 billion to the US Department of Defense in 2008. This figure represents a dramatic increase of 960 per cent in its defense sales, up from $368 million in 2007. Navistar’s main driver of defense business was the MaxxPro Mine Resistant, Ambush Protected (MRAP) armored vehicles delivered to the U.S. Army fulfilling urgent operational requirement. Another company thet entered the Top-20 list was Russian Almaz-Antei, producer of the S-300 and S-400 series of air defense systems. Almaz Nateu is the first Russian company to enter the top 20 with $4.3 billion in arms sales in 2008, attributed mostly to S-300 systems sold to a number of countries, among them China, Algeria, Lybia and Venezuela. Almaz-Antei has tripled its arms sales since 2003. One of the most talked about deals, with Iran has not been completed yet.

    ‘The continued upswing in many Russian arms-producing companies is the combined effect of longer term increases in exports and the more recent increases in domestic arms procurement,’ states Jackson.

    In 2008 the wars in Afghani­stan and Iraq continued to heavily influence sales of military equipment such as armored vehicles, unmanned aerial vehicles (UAVs) and helicopters. In parallel, sales of logistical services, repair and refurbishment of military equipment continued to grow, as did the arms sales of Russian companies to both domestic and for­eign customers.

    According to the report, the world’s largest arms producer is the U.S. with more than $25.5 billion worth of arms sales (domestic and export), followed by the U.K sales of 58 billion (much of this is attributed to BAE systems, of which U.S. based companies are making a significant of its portfolio) France is third, with an arms market of 29 Billion, followed by Italy with +15 Billion, Germany and Russia (+10B each), Israel, Spain and Japan (+6B each), India, Republic of Korea and others.

    The SIPRI Arms Industry Database was created in 1989. It contains financial and employment data on arms-producing companies in the OECD and developing countries (except China). Since 1990, SIPRI has published data on the arms sales and employment of the 100 largest of these arms-producing companies in the SIPRI Yearbook.

    An Israeli Helmet Display is Tailored for Rocket Planes

    The Targo Racer helmet display

    X Racers Debut at Tulsa with Revolutionary Live-Virtual High Speed Race

    Rocket Racing pilots participating at the upcoming Tulsa Airshow will have the first opportunity to experience and demonstrate the next generation helmet mounted display technology sofar available only to fighter pilots. The revolutionary Targo Racer aviator’s helmet developed by Israel’s Elbit Systems (NASDAQ: ESLT) integrates a display system and avionics, that enable Rocket Racing League (RRL) pilots to competitively challenge each other flying the 3D Raceway-In-The-Sky (RITS) sky track.

    All photos: courtesy of RRL

    “With more than 2500 pounds of thrust, RRL pilots go from zero to full throttle in a fraction of a second and wheels-up in 4 seconds – think NASCAR or Formula One racing in the sky,” explains RRL co-founder Peter Diamandis. The Targo Racer’s state of the art capabilities give our pilots, which are some of the most skilled in the world, the advanced avionics they need to deliver the most dramatic performance for our fans and sponsors.” The RRL will debut the Targo Racer, a new helmet display developed by Elbit Systems, On April 24, 2010 at the QuikTrip Air & Rocket Racing Show in Tulsa, Oklahoma.

    RRL will feature multiple rocket races, from closed circuit to drag-style racing, pitting 2 to 10 Rocket Racer aircraft roaring head-to-head for victory. Rocket Racer pilots will race their vehicles through an RRL-developed "Raceway-In-The-Sky" (RITS) – a custom Cockpit-based Augmented Reality System projected onto 3D helmet displays.

    Rocket Racing League (RRL) is a revolutionary new sports and entertainment franchise where teams of highly trained military and test pilots such as former “Top Gun” graduates from the Navy’s Fighter Weapons School, fly rocket-powered aircraft through a 3D virtual Raceway-In-The-Sky (RITS). To be held at venues across the USA, Rocket Racing will feature multiple rocket races, from closed circuit to drag-style racing, pitting 2 to 10 Rocket Racer aircraft roaring head to head for victory. The closed circuit format is planned to be a 4-lap multiple elimination heat on a 5-mile Formula One style raceway in the Sky. The drag style race will feature two Rocket Racers in drag-style side-by-side format. In February 2010 Tulsa was announced to be the first airshow to host this ambitious rocketplane race. Flown by selected pilots with military experience, flying high performance, all-composite X-Racer rocket powered aircraft aircraft. Flight testing of the two aircraft competing in Tulsa were recently conducted at the North Texas Regional Airport (NTRA) in Texas.

    The closed circuit race format is planned to be a 4-lap, multiple elimination heat on a 5-mile Formula One-style "Raceway-In-The-Sky".

    “X-Racer vehicles provide a high profile platform to demonstrate our unique Helmet Mounted Avionics (HMA) technology in an environment where pilots are navigating their way through a virtual raceway-in-the-sky in head-to-head competitions,” said Yoram Shmuely, Executive Vice President and Co-General Manager of Elbit Systems’ Aerospace Division. Elbit is one of the RRL partners.

    The integrated display helmet provides an essential link between the pilot, aircraft and audience. It enables RRL pilots to receive mission and race critical flight information directly onto their helmet visor within their natural line-of-sight therefore increasing safety and performance. The display shows raceway geometry, altitude, speed, gravitational pull and other parameters directly in front of the aviator’s eyes on a crisp off-the-visor display that adjusts in real time. From a spectator perspective, fans can expect to see the racing action live and in real-time on large projection screens, or remotely, via TV or PC, fed by the Ground and Air Based Augmented Reality Systems and dynamic imagery streams from the Targo Racer and Cockpit-Based Augmented Reality Systems. Additional remote and rocket-mounted cameras will give fans the further sensation of riding right alongside famed RRL pilots.

    The Targo Racer helmet display

    Targo™ Racer, a variant of the Targo™ family by Elbit systems, is powered by “Helmet Mounted Avionics” (HMA) technology that allows fast and flexible adaptation for unique customer platforms and requirements. The helmet was adapted to the racing environment with the support of RRL’s avionics partner, the University Research Foundation (URF) Maryland Advanced Development Laboratory (MADL).

    Diamandis and his team will host a press briefing tomorrow, April 13, reporting on the status of the latest developments related to the Rocket Racing League, the new X-Racer vehicles, the high performance rocket engines, pilots, testing and demonstration schedule, and the featured content for the QuikTrip Air & Rocket Racing Show scheduled for April 24, 2010 in Tulsa, Oklahoma.

     The drag style race will feature two Rocket Racers soaring in tandem just 20 feet apart. Fans also see the racing action live and in real-time on large projection screens fed by the Ground-based Augmented Reality System. The fans watching on televisions and PCs at home will experience the thrill of Rocket Racing via unique remote and rocket-mounted cameras that will give at-home fans the sensation of riding right alongside the Rocket Racing League pilots.

     the X-Racer, based on an airframe built by Velocity Aviation, flys at a 300 mph speed, powered by a rocket engine produced by Armadillo Aerospace, burning liquid oxygen (LOX) and ethanol, producing a maximum of 2,500 pounds of thrust. In the future, RRL will include other airframes and propulsion systems to develop the X-Racers. The new pant scheme of the X-racer was unveiled recently, toward the Tulsa Airshow in Oklahoma. Photos: RRL

     

    RRL is currently recruiting teams accross the USA and Canada. Candidate teams include the Bridenstine Rocket Racing, Santa Fe Racing, Rocket Star Racing, Team Extreme Rocket Racing, and Canada-based Beyond Gravity Rocket Racing. Among the pilots currently associated with the races are aerobatic pilot Sean Tucker, Len Fox, Dave Morss and Jim Bridenstine.

     

     RRL races will offer fans to immerse in the games through a virtual racing league. RRL’s game approach is multi-platform, to attract casual / social players as well as seasoned multiplayer online gamers. Orad, an Israeli real-time special effect specialist responsible for many of the special effects currently viewed on television, is one of the founders of the Rocket Racing League.

     

     

    India Test Fires the AGNI-3 Strategic Ballistic Missile

    The fourth flight of the Indian long range missile AGNI-3 with a range capability of 3,500 km was tested successfully by Defence Research and Development Organisation (DRDO) last month. The missile was launched from the Wheeler Island, in the Bay of Bengal off the coast of Odisha. Overall, with a range of 3,500 km, Agni III is considered a potent weapon designed to balance a potential Chinese threat, rather than the Pakistani missiles. Compared to its Chinese peers – CSS-5 and DF-21, Agni III is considered more advanced.

    The Indian Ministry of Defense confirmed the missile, tested for the full range, have met all the mission objectives. The two-stage AGNI-3 Missile has a length of 17 meters and diameter of two meters. With launch weight of 50 tons, the solid propellant powered missile carries a payload of up to 1.5 tons, sufficient for carrying nuclear warheads. The recent flight took the missile to an altitude of 350 km.

    The recent test is part of the missile’s developmental test plan. Although the Indian Defense Department claims the missile is ‘ready for induction’, more testing and verifications remain to be done. At present Agni III is transported by rail and launched from prepared launch pads. Operational missiles should be able to deploy more flexibly and rapidly – missile stored in containers, and launched utilizing transporter-erector-launcher (TEL) systems yet to be deployed.

    Skunk Works and XTEND Simplify Multi-Drone Command

    0
    Lockheed Martin Skunk Works® and XTEND have achieved a major milestone in JADC2 by integrating the XOS operating system with the MDCX™ autonomy platform. This technical breakthrough enables a single operator to simultaneously command multiple drone classes, eliminating the friction of mission handoffs. From "marsupial" drone deployments to operating in GPS-denied environments, explore how this collaboration is abbreviating the data-to-decision timeline and redefining autonomous mission execution.

    From Ukraine to Taiwan: The Global Race to Dominate the New Defense Tech Frontier

    0
    As traditional defense primes face mounting competition from agile “neoprimes” such as Anduril, Palantir and Helsing, the balance of innovation is shifting toward software-defined warfare and scalable, dual-use technologies, while global industry consolidation—marked by Boeing’s integration of Spirit AeroSystems and other strategic mergers—signals an intensified race to secure control over the defense technology value chain. Our Defense-Tech weekly report highlights these trends.

    Europe’s “Drone Wall”

    0
    In early October 2025, a coordinated wave of unmanned aerial system (UAS) incursions—widely attributed to Russia—targeted critical infrastructure across at least ten European nations. The unprecedented campaign exposed the fragility of Europe’s air defenses...

    Weekly Defense Update & Global Security Assessment

    0
    Executive Summary The past week (September 18-25, 2025) represents an inflection point where strategic defense concepts have transitioned from doctrine to tangible reality. An analysis of global events reveals four primary, interconnected trends shaping an...

    U.S. Air and Space Forces Push Next-Gen Programs at the AS&C 2025 Conference and...

    0
    At the 2025 Air, Space & Cyber Conference, U.S. Air Force and Space Force leaders unveiled major updates on next-generation fighters, bombers, unmanned systems, and space initiatives, highlighting both rapid innovation and critical readiness challenges as the services race to outpace global competitors. A short version is available here, with a more detailed version for subscribers.

    TADTE 2025: Reflecting Taiwan’s Strategic Themes

    0
    The Taipei Aerospace & Defense Technology Exhibition (TADTE) 2025 crystallized around four dominant strategic themes that collectively illustrate Taiwan's comprehensive approach to defense modernization amid escalating regional tensions. Based on a detailed report by Pleronix (available upon request). Includes a Podcast discussion on TADTE 2025's highlighting Taiwan's four strategic themes beyond the post's coverage.

    Iron Beam 450 Completes Testing, Soon to Join With Operational Air Defense Units

    0
    Israel’s Iron Beam 450 high-power laser system has completed final testing, marking a major leap in air defense. Developed by Rafael, it offers precise, cost-effective interception of rockets, UAVs, and mortars, and is set for IDF deployment by 2025.