Sunday, November 17, 2024
More
    Home Blog Page 291

    Israel Emerges as First International Customer for the F-35A

    As the JSF founding members squirm for excuses to cut projected orders, anticipating the program’s soaring costs consuming growing shares of local defense budgets, Israel is expected to become the first international customer to commit to the next generation stealth fighter, although the country has not formally joined the program as one of the ‘founding members’.

    Bowing under unprecedented financial pressure, the U.K. is moving to axe the planned construction of one aircraft carrier, along with up to 88 F-35B (V/STOL) fighters that would be operating on board, saving about £7.6 billion in out-year budget.

    Financial issues have also led the Australian government to defer the decisions to commit on the planned procurement of 3-4 squadrons. By delaying procurement decisions to 2010 and possibly cutting the number of aircraft operating with each squadron, from 24 to 14, Canberra is hopeful the A$16 billion investment could be approved next year. Netherlands and Denmark have not made their final decision about the aircraft yet, although both are supporting the acquisition of the American stealth fighter. Norway has decided in favour of the JSF but hasn’t ordered the aircraft to date. Even the U.S. Air Force ahs not placed orders for serial production fighters to date.

    With such malleable backing to their program, no wonder that the U.S. is aiming at the ‘captive’ markets – clients dependent on U.S. aircraft – such as the Israelis and Turks – to stabilize the program. Turkey has embarked on a shopping spree for defense systems, investing well over $30 billion in arms procurement over the nbext 5 years. As a program member Turkey is planning to produce about 100 of the 130 F-35As it plans to buy over the next decade. Turkey has also produced hundreds of F-16s for its air force. Israel plans to replace at 2-3 F-16A squadrons with the F-35A, however, unlike the Turks, Israel has not received any commitments for its local industries, neither arranged for local assembly. Italy is also considered a strong candidate, although Rome has not yet committed to the procurement phase, the F-35Bs will be needed sooner or later, to replace the Sea Harriers on its aircraft carriers. However, the number of aircraft to be fielded will undoubtedly be influenced by the British decision and the flyaway cost of the F-35B, which is currently supported by the U.S. Marine Corps and the U.K.


    Despite the recognition that the IAF needs the new stealth fighter to maintain its qualitative edge within the Middle East, Israel has sofar delayed its decision due to a number of reservations by the Air Force, regarding the aircraft operational range, payload and avionic suite. Through all its recent aircraft acquisitions, Israel insisted including a comprehensive array of electronic systems, primarily electronic warfare suits, command, control and communications, as well as specific weapons operated by the IAF, that provided the Israeli variants of such fighters a qualitative edge over similar types operated by Egypt, Jordan or Saudi-Arabia. These systems also provided the new fighters to be fully integrated within the Israeli command and control system, optimally operate under all conditions, and be prepared to employ indigenously developed weaponry, such as the Spice EO standoff guided weapon or Delilah loitering missiles, which have to be individually integrated into the operating systems of IAF fighters.

    However, the architecture that provided the baseline of the JSF design prevents such changes, as they are effecting the entire aircraft operation. Alternatively, users are provided with selective access to the operational system, enabling limited integration of weapons, and avionics systems to operate with on-board assets. While such approach provides more flexibility for users with limited requirements, it does not allow for close linking with on board functions and capabilities, required to maintain the fighter’s stealth and low electronic emission.

    As for the limited range, Israel has a relatively unique operational requirement – to nbe able to extend its strike capability over thousand miles inside enemy territory, reaching as far as Iran, while flying within potentially hostile airspace. Stealth was considered a key capability for gaining operational flexibility for such operations, which would be based on the fighter’s unrefuelled range – internally carrying both fuel and ordnance over extended range. While the basic F-35A has an operational radius of 610 nautical miles, an extra fuel tank could extend its range considerably, matching the proposed stealthy F-15SE ‘Silent Eagle’ that could be offering an operational radius of 800 nautical miles, with limited stealth capability.

    Despite these obstacles, Israel apparently decided to remove these requirements, at least for the first batch of 25 aircraft, realizing that the required changes could drive the acquisition cost of the Israeli F-35A variant to beyond $130 million a peace, delaying delivery schedules far beyond Israel’s requirements. The indigenous systems would mean the stealth fighter would maintain a qualitative edge over similar fighters, if (or when) delivered to other U.S. allies in the region. The inclusion of additional internal fuel would contribute to more flexible mission planning, particularly in the ‘outer circle’ where Israel is required to operate deep inside enemy or hostile territory, beyond 1,000 km, as far as in Iran, where stealth capabilities are mandatory and aerial refueling may not be possible.

    Once the special requirements of the IAF are relieved, the aircraft cost could return to just over $80 million a piece. The IAF is expecting the first aircraft to be delivered in 2014 to replace the first F-16As that would be phased out by that time. The projected modifications could delay this schedule by at least 24 months.

    However, the Israelis could be eluding themselves with $80 million cost per aircraft, as the Pentagon is already preparing the ground for major cost increase. According to a recent report by the Department of Defense Joint Estimating Team (JET), the JSF program may be exceeding budget by $16 billion, and slip off schedule in the next five years. This bleak prediction is not shared by the joint program office, which stresses that development and testing are progressing well and within schedule.

    Two videos showing two of the primary advances sensors used on the JSF. above, prthe APG-81 active electronically steered array (AESA) radar in the Lockheed Martin F-35 Joint Strike Fighter. A key sequence in the video – real radar test data, the company says – shows how fast the AESA scans, detects and tracks multiple targets – more targets, more quickly than a conventional fighter radar with mechanically scanned antenna. The video below depicts the electro-optical distributed aperture system (DAS) and its contribution to the aircraft. (Videos by Northrop Grumman)

    One of the arguments for not having to integrate locally developed systems is the high quality of the advanced systems already integrated into the aircraft. The two videos above show the radar and distributed EO systems. Below, an example of the high definition, integrated targeting system is demonstrated, This system replaces the traditional targeting pods such as the Sniper or Litening, used on other tactical aircraft.

    Video below: An alternative to the F-35, yet on paper, is the Silent Eagle F-15SE proposed as an upgrade for F-15Es or new built aircraft. (a Boeing marketing Video). The first F-15SE technology demonstrator is scheduled to fly in mid 2010.

    Thales Reco NG Reconnaissance Pod Enters Flight Testing

    Rafale flying with the Reco NG (AREOS) recce pod. The new pod, currently undergoing flight testing, will be introduced with Air Force and Naval Rafale units by 2012. Photos: Dassault.

    The French Air Force has initiated flight testing with the Reco NG aerial reconnaissance (AREOS) pod developed by Thales. Flight testing on board the Rafale is expected to continue for about six months.

    Currently, the French Air Force’s tactical recce operations are limited to the obsolete Mirage F1 CR, using its internal sensors and the Presto pod. The new pod will enable the Rafale to assume this role. Reco NG is able to capture digital imagery both day and night, from high, medium and low altitudes.

    Rafale flying with the Reco NG (AREOS) recce pod. The new pod, currently undergoing flight testing, will be introduced with Air Force and Naval Rafale units by 2012. Photos: Dassault.
    a French Navy Rafale carries a Reco NG pod on a test flight.

    The pod can be operated in fully autonomous mode, without any intervention by the crew. The French air force has ordered 12 pod systems with three ground systems to equip Rafale F3 fighter. The French Navy will get six more systems. Thales is expected to complete the delivery of all 18 pods by April 2012.

    a close-up view of the pod

    The pod began flight testing a year ago, assisting the integration of the shipborne station on the Charles de Gaulle aircraft carrier, using a Mirage 2000D platform. During these flights, datalink transmissions between the pod and the embedded shipborne station were validated, including very high-speed Ku-band datalink from the pod to the shipborne station for downlink of useful sensor data and the UHF datalink (based on the L22 TDMA) between the pod and the shipborne station for coordination.

    The imagery gathered by the Reco NG pod is displayed on the MINDS-NG multi-sensor image interpretation and dissemination system (known as SAIM-NG in French), developed by Thales Communications / Intelligence Surveillance & Reconnaissance and also integrated on the aircraft carrier.

    Soldier using the Multi-sensor Image iNterpretation and Dissemination System (MINDS) is designed to operate with the ground segment of the Recce NG system. MINDS consists of an image processing and exploitation subsystems capable of handling high definition images and analysis tools assisting intelligence analysts in their work.

    Homeland Security Technology from Israel

    Weapons and Ammunition

    At Milipol 2009 Israel Weapon Industries (IWI) is displaying the X95 (Micro Tavor), designed for special units, offers high reliability and accuracy under extreme operating conditions. With the aid of a conversion kit, the weapon can be converted from 5.56mm into a 9mm caliber SMG. The X95 comes with an integral optical sight and multiple rails mounting configuring various accessories specially designed for specific applications. The optimization of the weapon’s elements were designed employing advanced human ergonomics, resulting an a compact and comfortable weapon, yet highly accurate and effective, offering high level of confidence to the user.

    Personal Gear & Protection

    At Milipol 2009 Rabintex is launching the Rabintex Ballistic Helmet (RBH) Air Crew helmet, a new member of the RBH line which already includes some of the popular helmet types such as the PASGT, MICH and Attack helmets. The new helmet is fabricated from Aramid to offer Level IIIA protection, providing combat air crews the same level of protection provided for soldiers, with added ear mufflers and piccatinny. The company is also launching RAV ‘Ladies First’ body armor. This bullet proof vest is designed with seamless panels at the front, made to fit women’s bust shape. The vest can be applied with an outer shell for regular use or a special outer shell design for concealed use. The vest is made of Aramid fibers, weighs 2.6 kg and meets protection Level IIIA NIJ 0101. 05.


    Lior Textile’s ‘Star Guard’ is designed especially for undercover work, providing field agents a high level of protection against bullet and knife stab, in a concealed format. The vest offers a clean front and back surface with special closing that wrap around the waist to eliminate contours that might hint the existence of body armor. Ergonomically designed to provide optimal freedom of movement and protection, the Star Guard offers an expanded surface area of protection, superior to common concealable protection. The ergonomic, flexible and lightweight vest fits nicely under the shirt or jacket and is used by businessmen, detectives and bodyguards requiring maximum ballistic and stabbing protection in a concealed format.

    Marom Dolphin is offering a wide range of backpacks designed for special operations forces and special weapons teams. The new range includes the Commander line of modular backpacks that comes with several cutaway pouches for an emergency runaway. The bag can be added with more pouches assembled with the use of MOLLE straps. Made of heavy duty fire retardant mesh, reducing back sweating, the bag has an integrated rain cover and a removable 15 liter front bag with integral carrying straps, which can be used as separately of the main backpack. The chest rig for Special Forces is a new addition to the company’s line of products. It can be used as a full vest with front and back parts, or as a chest rig with only the front part. The rig is equipped with integrated M16 magazine pouches at the front, and an integrated water pack inside the back part. The internal part of the vest is made using an anti flame mesh with 2 back support padding’s.

    Homeland Security Technology from Israel: Correctional Facilities

    Dealing with criminals and convicted felons doesn’t end in court ruling; advanced technologies developed for riot control, security, countering-explosives are also implemented behind bars, when matters get rough.

    For example, Beit Alfa Trailers (BAT) is introducing the ‘Ranger Eye’ – computerized incident management system, employing their patented water cannon and an innovative thermal imaging system, developed at Opgal. The Ranger-Eye continuously monitors an area day and night, reports incidents, or an emergency and enables guards to activate various types of response and countermeasures, by employing water cannons as non-lethal deterrents, or using available fire fighting equipment for this activity.

    Mobile phones are providing essential personal communications for everyone, but these privileges are normally denied to detainees, incarcerated in correctional facilities. Therefore, unauthorized phones become an important asset much sought after by criminal inmates. To combat these unauthorized cellphones, communications-monitoring and jamming are used in prison facilities, to deny inmates the use of such devices. Jamming is activated selectively, to enable authorized users operate mobile phones for official and personal use. Systems such as the Cellular Detectors MS from Netline can intercept a non-authorized device activated in a restricted area.

    Such systems provide alerts whenever cellular activity is detected: phone conversations, short text/media message or standby-mode registration, alert wardens on suspected activity, leading to search, locate and confiscate hidden, unauthorized cell phones. When the operational policy allows for active countermeasures to be taken, jamming signals can instantly be activated by Netline’s C-Guard Hammer cellphone detector and jammer, against the intercepted device, denying link establishment. The C-Guard Hammer is suited for different coverage areas and applications, from small rooms to wide range complex sites, indoor and outdoors, employing different RF transmission power levels for each application.

    Wireless cuffs have been used for several years enabling the correctional services system to provide inmates, held in low-security institutions, to be released back to the community under limiting conditions. Similar techniques can also be implemented behind bars, to protect wardens or track individual detainees in high security facilities, providing electronic personal surveillance and improve the security of both officers and inmates. The TRaCE system, developed by ELMO Tech performs location supervision and tightens inmate control. The system uses field-proven monitoring technologies, tailored for stringent security and safety requirements of correctional facilities. It provides real-time inmate and staff location-tracking, headcounts, officer’s ingress and egress notifications and can quickly alert on ‘man-down’ incidents.

    C-True Provides Self-Service Biometric ID Kiosks

    C-Pass, a complete solution that matches e-Passport facial data to passengers’ faces in real time was unveiled earlier in 2009 by C-True. The system obtains the passport's holders biometric and personal data from the e-passport, and authenticates it with the passports' printed information. Photo: C-True

    The Israeli company C-True is displaying in Milipol 2009 a family of security systems utilizing the company’s face recognition biometric system. Combining image capture, display and image processing of face recognition technology, C-True has developed a family of unattended systems designed to perform check-in and boarding control at airports, handle e-passports at immigration gates and provide access control to secured areas, from high security operations areas to members-only clubs and backstage areas.

    Initiating a dialog with a new customer, the system performs a quick 3D scan of the subject’s face, employing an algorithm that analyzes facial features and assigns the persons a unique ID. The system performs this process autonomously, without any operator support. C-True employs a combination of face recognition identification techniques, including mapping face features and special distinguishing marks, skin tone and skin texture. Under normal conditions, the system provides high probability (99.99%) positive identification. The company has implemented the technology in a line of products solutions, including the C-Gate passenger authentication system used at airports and the C-Pass, providing a comprehensive e-Passport authenticating systems, processing passengers through immigration point of entry. The system is also providing access control.

    An implementation of C-True technology is the ‘C-Gate’ passenger authentication system (Photo at left), utilizing facial recognition to visually match passengers that have checked in, with passengers boarding the aircraft at the gate. This procedure addresses an IATA requirement that specify that only the person that checks in can board the aircraft. The C-Gate captures an image of the passenger at the check in desk. Enrolment through the system takes less than a second, requiring merely the passenger looking into the system. The images captured at check-in are processed to deliver a personal ID, matched with the passengers’ destination and flight. From this point till departure, passengers can be identified, tracked and eventually cleared to board an aircraft with a high degree of confidence and minimal intrusive and delaying security checks. Security systems can also leverage the airlines frequent flying members lists or other providers loyalty programs such as rent-a-car agencies, shopping clubs, VIP lounges etc., facilitating rapid and automatic ID verification, routing known passengers through a ‘green path’ with high level of confidence.

    Since 2005, governments have been issuing electronic passports (e-Passports) with integrated circuits, to permit storage of a digital image of the passport photograph for use with face recognition technology, which is used to improve identity verification and reduce identity-related fraud. Leveraging the wide distribution of e-Passports, C-True has also launched the C-Pass, a complete solution that matches e-Passport facial data to passengers’ faces in real time.

    C-True has introduced C-Entry as a biometric access control gatekeeper that uses individual's face as a key to grant access of use to premises which needs to be secured against unauthorized individuals. Photo: C-True

    The system obtains the passport’s holders biometric and personal data from the e-passport, and authenticates it with the passports’ printed information. The solution is fully compliant with Machine Readable Travel Document (MRTD), with ICC/chip, as per ICAO (DG2, ISO/IEC 19794-5:2005).

    The new system will assist border control, customs and security officials to verify passenger’s identity, allowing for rapid processing, while increasing security, control and response to heightened alerts. The system could also be integrated in self service kiosk for passenger authentication. Such technology is already implemented in C-True’s “SmartGate” kiosks, employing the C-Entry access control system and C-Gates, a document authentication system.

    Safely Training to Deal with IEDs

    The Israeli company TAMAR Explosives is introducing at Milipol 2009 the X-test range of explosive simulants, products specifically designed for training and testing of homeland security personnel. The X-test products realistically simulate the actual explosives they represent, in appearance, texture, odor, and density. It can be used for the training of EOD technicians and security inspectors, performing searches for explosive devices in passenger baggage.

    They also represent similar chemical properties, such as effective atomic number (Zeff) computed tomography (CT number) to effectively represent the explosive material to advanced detection systems, such as millimeter wave and X-ray diffraction sensors. The company has also developed a range of improvised explosive devices training devices in which its explosives simulants are used, along with simulants of detonators, detonation cords, and a variety of initiation devices. Explosive vests, pipe bombs and other items – all inert – complete the assortment, allowing high fidelity train of security agents for high threat environments.

    Being inert materials, such simulants enable trainees, instructors and inspectors to handle explosive training devices with relative safety, allowing trainees to get a feel of the actual explosives and IEDs, and also to train in detection via hand search or a variety of detection technologies. X-Test materials are used for the training of security agents performing manual checks aimed at detecting explosive materials, assisting agents in becoming familiar with the visual and tactile properties of various explosive materials and easily recognize them during the course of their work. Other uses are in the instruction of operators of detection systems such as X-ray and EDS, searching for explosives concealed in baggage and other personal belongings. The operators learn to distinguish the concealed simulants by detecting their images on their screens, even when hidden among other items. Such materials are also used in exercises carried out by regulators and airport authorities as well, to preserve the operation of the security setup at a constantly high state of alertness. These “red team” exercises also comprise a fundamental component of airports’ quality assurance program. Simulants can also be used for the training of dogs (K-9), taught to identify and spot explosive materials.

    Jammers combat insurgents’ wireless and mobile phone triggering ‘dial a bomb’ IEDs

    Cellphones and other wireless communications devices are providing terrorists an effective means of control. By separating the device preparation and placement from the actual activation, IEDs can be planted in different locations and be activated by remote command, in response to the target’s behavior – such as speed of movement, specific target vulnerability, local situation (vis-à-vis nearby civilians) or when a specific VIP is being targeted in a convoy.

    As improvised explosive devices proliferated throughout the world, adversary operating techniques have also evolved, utilizing advanced triggering devices, enabling perpetrators to activate these explosive devices with devastating timing and accuracy, to overmatch passive and active means of protection such as ballistic armoring and evasive maneuvers.

    To counter such remote-controlled devices (RCIED), electronic countermeasures IED defeat solutions are employed, including jamming, pre-activation and neutralization techniques. Originally known as ‘bomb jammers’ these devices were utilized by EOD/ bomb disposal teams, to deny an adversary to trigger a device under inspection by the EOD technician. These jammers are also used by first responders when arriving at terror scenes, in effort to deny the activation of secondary explosive charges planted at the site, aimed against the rescue teams.

    The IED jammer effectively cuts off radio communications from the triggering transmitter to the device attached to the bomb, thus temporarily preventing bomb detonation while the jammer is in effective range.

    At Milipol 2009, two Israeli companies – Netline and SESP are displaying advanced high-power jammers, among them devices designed for EOD and VIP applications.

    Technological Aspects of Homeland Security: Fighting IEDs

    The photo on the right depicts an x-ray image of a cellphone, planted inside a metal pipe commonly used for pipe-bomb type IEDs. Image: by Vidisco Fox-Rayzor.

    Cellphones and other wireless communications devices are providing terrorists an effective means of control. By separating the device preparation and placement from the actual activation, IEDs can be planted in different locations and be activated by remote command, in response to the target’s behavior – such as speed of movement, specific target vulnerability, local situation (vis-à-vis nearby civilians) or when a specific VIP is being targeted in a convoy.

    Jammers combat insurgents’ wireless and mobile phone triggering ‘dial a bomb’ IEDs

    The photo on the right depicts an x-ray image of a cellphone, planted inside a metal pipe commonly used for pipe-bomb type IEDs. Image: by Vidisco Fox-Rayzor.

    As improvised explosive devices proliferated throughout the world, adversary operating techniques have also evolved, utilizing advanced triggering devices, enabling perpetrators to activate these explosive devices with devastating timing and accuracy, to overmatch passive and active means of protection such as ballistic armoring and evasive maneuvers. IED jammers are designed to cut off radio communications from the triggering transmitter to the device attached to the bomb, thus temporarily preventing bomb detonation while the jammer is in effective range.

    At Milipol 2009, two Israeli companies – Netline and SESP are displaying advanced high-power jammers, among them devices designed for EOD and VIP applications. (read more…)

    An X-ray view into an improvised explosive device (IED) top left, timing and activation mechanism (above right) and another fuze, chached inside a bottle in an attempt to mask it from scanner. Photo: Vidisco, taken by the FoX-Rayzor flat scanner.

    An Insight into the IED

    While jamming temporarily eliminates the threat of IED, the device remains highly dangerous until it is deactivated and eliminated. EOD teams tasked with this dangerous mission utilize robotic systems to inspect the suspicious devices and deactivate it by disrupting or eliminating the activation mechanism. While sophisticated equipment is available for visual inspection of the devices, looking through the devices, by X-ray or computer tomography is still a complex task handled by professionals. (read more…)

    Safely Training to Deal with IEDs

    Another aspect of handling IEDs is the training of EOD, and security inspectors performing searches for such devices in passenger baggage. The Israeli company TAMAR Explosives is introducing at Milipol 2009 the X-test range of explosive simulants, products specifically designed for training and testing of homeland security personnel. The X-test products realistically simulate the actual explosives they represent, in appearance, texture, odor, and density. (read more…)

    Netline Introduces Counter-IED Jammers

    Originally known as ‘bomb jammers’ these devices were utilized by EOD/ bomb disposal teams, to deny an adversary to trigger a device under inspection by the EOD technician. These jammers are also used by first responders when arriving at terror scenes, in effort to deny the activation of secondary explosive charges planted at the site, aimed against the rescue teams.

    The IED jammer effectively cuts off radio communications from the triggering transmitter to the device attached to the bomb, thus temporarily preventing bomb detonation while the jammer is in effective range. At Milipol 2009, several Israeli companies are displaying advanced high-power jammers, among them devices designed for EOD and VIP applications.

    Each member of the Netline’s C-Guard Very High Power IED jammers consists of multiple high-power transmitting devices, operating on different frequency bands, protecting personnel, vehicles and installations against complex threats, employing multiple threats operating over a wide area and broad frequency spectrum. To extend Radio Controlled Improvised Explosive Device (RCIED) protection, provided by the vehicular jammer to dismounted teams, Netline developed the C-Guard manpack. This system is designed as a lightweight, backpack system, to be operated by ground troops under risk of encountering remote controlled improvised explosive devices, including combat engineers, dismounted patrols etc. The battery powered system is blanketing a given area to prevent radio receivers from achieving RF signal for detonation of remote controlled explosive weapons. The system can be configured to cover VHF, UHF, cellphones and wireless devices, satellite phones etc.

    To support bomb disposal units, a portable, battery-powered IED Jamming-device, such as the Netline TXP ECM can be employed. The system is housed in a trolley-style pelican case can be configured to operate on nearby AC main power or from an integral battery. These devices can be deployed to locations where the anti-IED vehicle has no access. Blocking multiple frequency bands in one case, the system covers a wide spectrum, from VHF to cell phones, satellite phones and beyond. The system can support extended and continuous field operations, by employing ‘hot swap’ of spare batteries.

    JAM-V High Power Counter-IED Jammers

    Originally known as ‘bomb jammers’ these devices were utilized by EOD/ bomb disposal teams, to deny an adversary to trigger a device under inspection by the EOD technician. These jammers are also used by first responders when arriving at terror scenes, in effort to deny the activation of secondary explosive charges planted at the site, aimed against the rescue teams.

    The IED jammer effectively cuts off radio communications from the triggering transmitter to the device attached to the bomb, thus temporarily preventing bomb detonation while the jammer is in effective range. At Milipol 2009, several Israeli companies are displaying advanced high-power jammers, among them devices designed for EOD and VIP applications.

    VIP protection is the forte of the Israeli company SESP, specializing exclusively in RF jamming technology since 1997. SESP is offering a suite of high-power jammers to meet a wide range of applications, claimed to cover all frequency bands that could be employed by potential threats. The company offers custom made, highly reliable jammers, integrated into protected vehicles to provide maximum security for VIPs, military units, SWAT teams and EOD squads, anti-terror units, anti-drug agencies, and other law enforcement personnel.

    SESP jammers are fully integrated and concealed into luxury vehicles such as the JAM-V Mercedes S500L and BMW 7 Series. The powerful jammer is installed in the trunk, along with its cooling, ensuring uninterrupted operation in any climate, and power generator feeding directly from the vehicles’ fuel tank, sustaining the jammer with peak power under all driving conditions, without degrading the vehicle’s mobility or comfort. The vehicle is customized with special RF shielding for full protection of the driver and passengers. In addition, the vehicle can also be armored to level B6.

    SESP’s Jamkit high-power vehicular multi-band jamming system can simultaneously jam the RF frequency bands most used around the world, including cellular (CDMA, TDMA, GSM, HGSM, etc.), satellite, VHF/UHF and WiFi and Bluetooth frequency bands. The remotely controlled system is installed in separate attaché cases containing the cellular/satellite and VHF/UHF high power jamming units, feeding 350 watts RF output power to 5-8 roof-mounted streamlined high-gain omni-directional antennas. Vehicles are configured with cabling and antennas, while the actual jammers rotated between several vehicles depending on user operational methodology.

    Employing high-power jammers, users can often protect a vehicle formation such as a small convoy or VIPs from the threat of roadside bombs, or radio-controlled improvised explosive devices (RCIEDs). This method can be applied mostly in civilian and VIP protection when the group of vehicles maintains close distances, moves and is controlled under strictly disciplined movement drills. Such systems dramatically lower risk of assassination attempts from enemy-deployed explosive devices. For vehicle escort applications, SESP provides even more powerful jammer, designed for integration into four-wheel-dive luxury vehicle, transmitting over one kilowatt of RF jamming signal, resulting in greater radius of coverage around the vehicle.

    A derivative of the Jamkit, JAM-V MK4 is tailored for the Toyota Land Cruiser, featuring over 1.3 kW RF output while a concealed configuration of the JAMX jammer, designed for the Hummer H2, covering an extended frequency range, can deliver a combined RF output of over 1.5 kW to act as an escort jammer.

    An Insight into the IEDs

    The photo on the right depicts an x-ray image of a cellphone, planted inside a metal pipe commonly used for pipe-bomb type IEDs. Image: by Vidisco Fox-Rayzor.

    EOD teams tasked with this dangerous mission utilize robotic systems to inspect the suspicious devices and deactivate it by disrupting or eliminating the activation mechanism. While sophisticated equipment is available for visual inspection of the devices, looking through the devices, by X-ray or computer tomography is still a complex task handled by professionals.

    The photo above depicts an x-ray image of a cellphone, planted inside a metal pipe commonly used for pipe-bomb type IEDs. Image: by Vidisco Fox-Rayzor.

    At Milipol 09 Vidisco is introducing two new portable systems utilizing flat amorphous silicon panels – the Flat foX-17 and foX-Rayzor designed for operation with EOD robots. With these inspection systems a bomb disposal technician can analyze images on-site, identify and differentiate organic materials like explosives or drugs from inorganic substances like metals. The new battery operated XR-DE Dual Energy Module, enables automatic detection of organic and inorganic materials to enhance existing pulsed X-ray sources. The new system improves penetration by 200%, allowing for better probability of detection (POD) in IED’s.

    An X-ray view into an improvised explosive device (IED) top left, timing and activation mechanism (above right) and another fuze, chached inside a bottle in an attempt to mask it from scanner. Photo: Vidisco, taken by the FoX-Rayzor flat scanner.

    These systems are fully integrated on EOD robots, enabling the EOD team to leverage remotely controlled means beyond logistical and disruption functions. Integrated into the robot, the X-ray system is fully controlled over the robot communications link, or separately, over wireless communications, where applicable.

    The high power wireless units were developed by the company to give a long range wireless solution. In recent tests the system demonstrated wireless communication distance of 750 m in line of sight conditions. The system demonstrated control distances of 1.5 km using two units.

    shoes with live TNT cast in the sole, images taken with foX-Rayzor.

    Helicopter Gunners to use Helmet Mounted Q-SIGHTs

    The British Navy is the first service to adapt BAE Systems' Q-SIght technology to be used for airborne remote gunner sight application. Photo: BAE Systems.

    BAE Systems received the first order for 12 Q-Sights to equip British helicopter’s Gunner’s operating the new Gunner’s Remote Sighting System (GRSS) on Royal Navy Lynx Mk8 helicopters. The system will display the image of the gun-mounted thermal sight on a ‘see-through’ display mounted on the weapon operator’s helmet.

    The British Navy is the first service to adapt BAE Systems' Q-SIght technology to be used for airborne remote gunner sight application. Photo: BAE Systems.

     

    Photo: BAE Systems.

    Q-Sight Lightweight Near-Eye Display Technology

    Using patented technology to move light via holographic waveguides, the Q-Sight system displays a video image on a transparent screen approximately the thickness of a credit card. This technology eliminates the need for complex intermediate lenses that are heavy and create visual distortions. The system is lighter, simpler, performs better, and costs less than conventional helmet-mounted displays.

    The system is compatible with standard night-vision goggles. The new system’s advantage is the ability to seamlessly switch between goggles and the thermal sight to acquire, track, and engage targets. The new displays will be delivered by May 2010 and enhance the helicopters’ capabilities in maritime force protection, counter-piracy, and counter-narcotics operations.

    Combating Terrorism & Crime: Prowlers in Cyberspace

    Terrorism and unlawful activities have prevailed and flourished in the modern information age, with criminal activity rapidly adapting cyberspace as safe haven for illicit activity. Historically, national intelligence agencies have relied on the monitoring of public telephone networks, by establishing and performing ‘legal eavesdropping’ on physical telecommunications and telegraph (PTT) ‘copper lines’.

    These human- and hardware-intensive operations rapidly absorbed new technologies relying on land lines, such as fax, but were slow to encompass wireless communications and the internet, leaving these areas vulnerably uncovered.

    Following huge investments in infrastructure, as part of the global war on terror and, with the related fight against money laundering and financial support of terrorist activities, these gaps became quite effectively bridged. Presently, most modern countries are well equipped to effectively monitor the all types of communication in their territory.

    But this effort is never ending. Rapid advances in telecommunication and Internet Protocol (IP) technologies constantly challenge law enforcement and intelligence agencies around the world in a relentless race. Wireless telephony, broadband multimedia communications and entertainment services, are rapidly expanding to reach the majority of individuals in the developed and developing countries. Engaging customers through a multitude of interactions, such services are exploited by strategic and tactical monitoring systems, developing unprecedented knowledge of individual behavior and group activity, which can be assessed in real-time or by analyzing historical data, to seek meaningful trends and behavior patterns indicating suspicious activity. Added with DNA profiling and other biometric identification and financial transactions, tracked through credit-card companies and facial recognition of customers at points of sale, are all adding, up to a whole new world, where no one can hide and everyone could become a potential suspect.

    ‘Target interception’ refers to the interception of a known target and is typically performed in real-time, according to criteria such as email address, or phone number. However, in many intelligence scenarios, targets remain unidentified. Using ‘Mass Interception’, intelligence agents identify unknown suspects, spot new activities, completing the intelligence picture. Mass interception refers to the potential, tracing of all network communications, enabling intelligence agents to extract clues from the retroactive analysis of large volumes of past communications. Mass interception systems can access such networks by monitoring the trunks at the operator’s facility, or via microwave and satellite surveillance.


    In the past, authorities required legal warrants to access and tap the physical communications lines. Today, exploiting wireless connections, through microwave links, wireless local area networks, cellular broadband and the upcoming WiMAX wireless broadband mobile links, authorities are able to tap into the new media ‘of the air’ with relative ease, monitoring GSM, CDMA, Satellite Communication and Computers Communication. Such activities can be done without the subscribers’ awareness or knowledge. Furthermore, physical networks sofar considered relatively safe to unauthorized eavesdropping, can now be monitored by stealthy ‘probes’ – using bugging devices, capable of seeping the entire traffic over broadband channels, analyzing the traffic in search of suspicious traces of data – such as words, phrases and names. Other methods utilizing stealthy ‘Trojan horses’ empower cell-phones, personal digital assistants (PDA) and PCs, without their owner’s knowledge, turning these personal communicators into active eavesdropping devices.

    Military grade COMINT solutions were traditionally employed by national security agencies, in counter-espionage operations, to ‘fish’ spies. Currently, security agencies, law enforcement and government agencies require such services for daily operations, monitoring, locating and tracking wireless systems, from licensed trunk radios to wireless, cordless phones, intercepting, tracking and localizing electronic signals that could trigger explosive devices, or tracking phones involved in criminal activities. Modern COMINT systems comprise the receivers, mapping, decoding, and decompressing subsystems, handling the intercepted transmissions and analysis tools, to interpret signals and content in real time. Services are enhanced with link, location, and other analytics that link the COMINT interception with information gathered from other sources.

    Israeli companies are prominent worldwide for their unique and powerful communications monitoring equipment. Such systems have been deployed with many government agencies worldwide, as national security assets, as well as for the use by law enforcement agencies. More recently, the technology was ‘scaled down’ to meet the requirements of emergency call- centers, such as the 911 in the U.S., for which powerful systems were developed, to improve public service, by developing better situational understanding and location tracking, while providing better analytic tool in support of law enforcement investigations.

    More features in this survey:

    Homeland Security Technology from Israel: Electro-Optics

    Electro-optical (EO) systems are providing essential capabilities for improving security, counter terror and combating crime. Advancement in this field include smarter video surveillance systems, empowered by automated ‘video analytic’ systems managing massive flows of multiple sensors into a clear situational picture. Thermal imaging is also improved with lightweight, compact and cost effective uncooled sensors (bolometer type), used in surveillance equipment, weapons sights, night observation devices, payloads for unmanned systems etc.

    On other fields, powerful image processing is harnessed for biometric identification, analyzing facial details in real-time to assist, and in certain conditions, replace human gatekeepers and attendants.

    At Milipol 2009 OPGAL is introducing the ‘Compact-Eye’ (seen in the photo above), an ultra-compact thermal imaging engine designed for low-power applications. It is based on a state-of-the-art 384 x 288, uncooled 8-14μ microbolometer detector, with a 25 micron pitch. The miniature features make it suitable for portable IR applications and for thermal camera integrators seeking reduced space, weight and power requirements.

    Typical uses are in surveillance systems and border security. The engine comes with an effective anti-blooming mechanism, integral x2 and x4 digital zoom and employs proprietary algorithms proven effective under poor visibility conditions. The system also employs high-resolution graphics software and flexible signal processing capabilities.

    Magna BSP Introduce the Virtual Wall

    Another innovative electro-optical system is the ‘virtual wall’ from Magna BiScopic Protection (BSP). The company has developed a range of security applications based on the BSP patented principle, performing perimeter protection, surveillance and patrol as well as for use for airport safety and security. To facilitate high probability of detection at very low false alarm rate, Magna employs a combination of different methods of operation, among them the company’s patented Three Dimension Motion Detection (TDMD) and BiScopic Protection. The company is offering these systems under several product lines including the Hawk and Optical Watch Line (OWL) family, creating a ‘virtual wall’ generating an invisible trip line around the protected area, while the EAGLE family offers scanning biscopic protection for the defense of fenced-in areas and entrances. (read more…)

    Analytics Improve Video Surveillance

    Security personnel are faced with an overwhelming volume of video and data, making it difficult to pinpoint events of genuine importance. Automated video analytical systems can help organize the information flow, to prioritize such vast amounts of video and data, for effective decision-making and faster and timely reaction. They enable security officers to focus on deterring and managing threats, rather than scanning banks of video monitors in trying to detect these. (read more…)

    Heightening Security While Accelerating Passenger Flow

    Face recognition ID (FRID) is already endorsed by major industry and government agencies as the leading biometric ID technology. When providing a high level of positive ID, Facial recognition is more user-friendly and less intrusive than other biometric identification systems such as iris or fingerprint authentication. Deployed at a point-of-service to facilitate identification of customer’s identity, such systems are offering significant advantages for security and law enforcement. A typical system offered by C-True is combining image capture and display and processing with face recognition technology. Initiating a dialog with a new customer, the system performs a quick 3D scan of the subject’s face, employing an algorithm that analyzes facial features and assigns the persons a unique ID. (read more…)

    Better Vision for the Snipers

    A newcomer to Milipol, the Israeli company ‘Pulse Inteco’ is introducing its compact, lightweight fire-control system, designed for sniper rifles, grenade and rocket launchers. The system incorporates a single-pulse laser rangefinder operating in an eye-safe spectral range (invisible to night vision devices) integrated with a sniper’s telescope and fire control computer. The laser accurately measures distance to the target. The ballistic computer calculates the elevation angle, moving the scope’s displayed reticule to compensate for the ballistic trajectory. At night, the system matches with a night vision viewing device for enhanced operation.

    At Milipol 2009 Meprolight is announcing the NOA (picture above), the latest weapon sight added to the company’s night sights portfolio. NOA is an uncooled thermal weapon sight, incorporating a mission computer turning the sight into a powerful surveillance and intelligence collection tool. The sight supports X4/X7 magnification with image clarity and precision enabling a sniper to detect a human target at 1500 meters. Static targets can even be detected behind camouflage, battlefield obscurants, in adverse weather and total darkness.

    Combating Terrorism & Crime: Emergency Services as Information Outposts

    911 emergency call center in New York City. Photo: NY City

    Methodological recording of emergency-call services provide a wealth of information that can help improve public safety, highlight evolving trends in public safety and security and support crime investigations. Historically, reviewing enough calls to identify performance trends and challenges has been a manual task that many centers didn’t have the resources to fulfill. Likewise, public safety operations lack formalized quality and analysis processes – such as those available through integrated voice/screen recording – leaving them with only a limited view of what is really happening across their operations.

    The photo below shows a geographical information system (GIS) processing of 911 call records shows the areas most prone to criminal activity. Photo: ESRI
    911 emergency call center in New York City. Photo: NY City

    The availability of patented speech analytics solutions developed by Verint for the intelligence community enabled the recent introduction of recording and analytic services to assist public safety agencies, performing trend spotting to help reduce crime and improve quality of life for citizens, by leveraging 9-1-1 interactions. The service utilizes Verint Impact 360 Speech Analytics system, to enable law enforcement agencies to obtain call records and events gathered by Public Safety Centers such as 911, and mine recorded emergency calls to uncover key facts for incident investigations.

    The new system provides automatically transcribed emergency contact audio, into data that can be mined for intelligence. This new capability enable emergency centers to identify opportunities that can make their work more efficient and effective, while proactive trend spotting tools can uncover issues before they become widespread problems. The software empowers users to uncover insights within all related recorded calls through guided, visual search tools. This will not only support public safety agencies by helping investigators uncover facts during emergency situations, but also identify staff training and process improvement opportunities.

    NICE Systems is offering the ‘Nice Inform’ suite of data mining applications to provide central incident information management solution by processing communications monitoring information related to specific incidents, including the acquisition, location, association and reconstruction of conversations that took place over the radio or telephone. consolidation of voice calls, (telephony, radio, VoIP), video, and tracking information, all displayed over a digital map, relative to the crime scene, with relevant photos and video clips, incident reports, mug-shots, emails, and more. Such tools provide for faster scenario reconstruction, accident investigation and post-incident analysis offering greater insight, and improved response. The system extracts a complete, unified, chronological, multimedia-rich history of incidents used for debriefing, and event analysis by homeland security and first responders.

    More features in this survey:

    Diehl’s Sky Sphere set to Defeat UAS, OWA Drones Head-On

    0
    Diehl Defence has teamed up with Skysec to develop a drone interceptor. Diehl works with Skysec’s subsidiary, Skysec Defence, to modify the original civilian-oriented net-arresting interceptor into a hard-kill system suitable for military missions....

    Defense Update Weekly News Summary

    0
    Welcome to the latest episode of Defense-Update News Summary! In this episode, we dive into this week’s developments in defense technology, military acquisitions, and strategic partnerships worldwide. Some of this week's highlights include: Elbit Systems...

    Unmanned Combat Aerial Vehicle Program Launches as Part of Rafale F5 Standard

    0
    The French Ministry of Armed Forces has officially launched the Unmanned Combat Aerial Vehicle (UCAV) program as part of the Rafale F5 standard development. This event marks the beginning of a new era in...

    Air Defense & C-UAS Innovations at the AUSA 2024 Exhibition

    0
    Army Air Defense Undergoes Significant Modernization to Counter Drone Threats The U.S. Army's air defense branch has experienced its most substantial modernization and growth in over four decades, primarily driven by the need to counter...

    Elbit Systems Address US Army Artillery Modernization with Sigma 155×52 Wheeled Howitzer

    0
    Elbit Systems of America showcases the Sigma Next Generation Howitzer at AUSA 2024, where competing systems from Sweden, South Korea, France, and Germany are likely to be presented, some in models, others in full...

    Defense-Update Weekly News Summary

    0
    Welcome to the latest episode of Defense-Update News Summary! In this episode, we dive into this week’s developments in defense technology, military acquisitions, and strategic partnerships worldwide. Some of this week's highlights include: Elbit Systems...

    Israel Revamps Aerial Bomb Production

    0
    Elbit Systems has signed a 1.5-billion-shekel (approximately $400 million) contract with Israel's Ministry of Defense to establish an aerial bomb manufacturing bombs for the Israeli Air Force. In the past, the government-owned IMI operated...