Sunday, November 17, 2024
More
    Home Blog Page 292

    Video Analytics Improving Surveillance

    Image processing performed on the video stream can determine the size, direction of movement, speed and distance between vehicles, and lane deviation, this information can be processed, analyzed and used for situational awareness or law enforcement. Once a stationary vehicle is detected here, an alarm will be triggered, alerting on a potential traffic hazard.

    Security personnel are faced with an overwhelming volume of video and data, making it difficult to pinpoint events of genuine importance. Automated video analytical systems can help organize the information flow, to prioritize such vast amounts of video and data, for effective decision-making and faster and timely reaction. They enable security officers to focus on deterring and managing threats, rather than scanning banks of video monitors in trying to detect these.

    Nextiva video analytic surveillance system from Verint employs video analytics to display the images most likely to be of interest and value, based on the situation and incident being followed. Photo: Verint

    Procedures rendered and rapidly disseminated through a video surveillance network, can trigger alerts more rapidly and intelligently, thus responding to evolving conditions and dynamic situations, while simultaneously displaying relevant video streams to respective authorities.

    The proliferation of video surveillance systems scanning city centers, along roads and railways, outdoors and in large, commercial open spaces, opens more data sources, improving security, detering criminal activity and vandalism, while assisting criminal investigation in solving crime, terror events or heightened security alerts. Video analysis addresses the potential to extract valuable insight from historical visual information, as well as real-time video streams. A search into historical records can verify or deny suspects’ alibi, pointing to a potential direction for further investigation. Yet, the laborious search, required by manual analysis of days and weeks of video records, renders such manual process inefficient.

    Utilizing automated Video Analytics (VA) has proven essential for large scale monitoring and control centers at airports, public transport hubs and government facilities. Video analytics applications, utilizing transport security systems reach far beyond security, resulting in improved passenger safety and quality of service. It also provides powerful investigative tools for intelligence and law-enforcement agents, investigating crimes and terror incidents.

    Image processing performed on the video stream can determine the size, direction of movement, speed and distance between vehicles, and lane deviation, this information can be processed, analyzed and used for situational awareness or law enforcement. Once a stationary vehicle is detected here, an alarm will be triggered, alerting on a potential traffic hazard.

    An example of such VA application is the Nextiva system, developed by Verint. The system comprises analytics-embedded encoders, wireless transmitters and analytic-enables IP cameras, enabling video to be analyzed at the point of capture, thus reducing overhead and communications bandwidth consumption, particularly in large scale networks.

    The congested, busiest urban centers become a unique challenge to municipal, transportation and law-enforcement officials. Video monitoring is often used on a wide scale, sending live views from the street, enabling the situation-room to address any evolving emergency. With cameras distributed in city centers and along transportation routes, video monitoring systems provide efficient means for assessing a developing situational event. Here, video analytics services become essential in verifying multiple incoming alerts, using real-time video feeds.

    In this example, a person climbing on the fense will be spotted since the fense is defined as an excluded area, triggering immediate alert. Photo: Verint

    Based on better situational awareness, officers can allocate the optimal resources , to timely deal with the most critical situation sector. For example, analytic processing can automatically report double-parked vehicles or identify vehicles blocking traffic lanes or access routes, alert on crowd gathering near sensitive locations, detect intrusions into restricted, or dangerous areas, assessing traffic congestion before they develop into dangerous choke-points, blocking major transportation routes. Similarly, airport security centers can benefit from VA, to identify breaches in gate security, trigger alerts for people moving in the wrong direction in security-critical sectors, detect potential threats inside terminals and parking areas, monitor the airport perimeter and overview critical areas and sterile zones.

    More features in this survey:

    Combating Terrorism & Crime: Analytics Unveil Hidden Clues

    speech analytic voice recognition technology employed by Nice Sysrems is used at call centers, to track unsatissfied customers by identifying words such as 'cancel my subscription', 'not satisfied' or 'disconnect', automatically elevating the issue tomore experienced support agents. The same technology is used by intelligence agencies to track terrorists!

    With the exponential growth in the volume and data complexity, agencies operating telecom interceptions need to handle growing numbers of information sources and the data overflow which accompany them, outsmarting sophisticated evasive techniques that exploit the relative anonymity offered by modern internet-based services. By automatically analyzing large volumes of data, analysts can deal with the information-flow streaming from mass communications, by monitoring systems in a timely manner. This enables investigators and analysts to exploit actionable information in addressing the short life-span of potential targets.

    Automatic, intelligent analysis of content is therefore imperative, transforming large volumes of unstructured data to a structured and meaningful information process.
    While communications interception has always been maintained as a strategic asset, providing efficient analytic tools operated by investigators, as part of criminal investigations, these huge volumes of data can turn into valuable insights and leads. Both Verint and Nice Systems are introducing powerful analytic data processing systems that have recently evolved from the shadows of top secret intelligence services, into the commercial, emergency and law-enforcement domain.

     Video below: NICE Systems demonstrates speach analytic analysis for service centers, live on CNBC’s “Squawk Box”

    Verint is offering a powerful a data fusion and analytic system called X-TRACT, to assist crime investigations. Similar systems are used by counter-intelligence and counter terror agents in to reveal and hunt hostile and criminal networks. The system implements analytic methodology, utilizing inference solution suites, linked to various data sources, mapping dynamic links between disparate objects, indicating potential associations between different entities. Results are displayed in an intuitive environment, designed for the use by analysts and investigators. This end-to-end data investigation solution includes powerful data access, smart scoring, alert management, visual desk investigation and reporting capabilities. Verint’s patent-protected speech analytics solution is capable of indexing every word and phrase identified for context and meaning. Conversations containing specific words or phrases can be isolated for further investigation, and with trend analysis, reveal activity around these terms.

    Similar services are built into the powerful NiceTrack communications monitoring and analysis suite, incorporating a range of analytical and operational tools, improving the extraction of intelligence products from communications monitoring. Typically, analytic systems provide voice analysis – applying voice recognition, speaker-verification and identification, and ‘voice content structuring’ speech processing technology, trained to spot specific spoken words, phrases and even detect excitement in speech.

    speech analytic voice recognition technology employed by Nice Sysrems is used at call centers, to track unsatissfied customers by identifying words such as ‘cancel my subscription’, ‘not satisfied’ or ‘disconnect’, automatically elevating the issue tomore experienced support agents. The same technology is used by intelligence agencies to track terrorists!

    Nice Track converts raw voice records through ‘Speech to Text’ process, enabling automatically annotating of data with identifying tags and textual categories to describe the data, uncovering hidden relationships and events ‘buried’ within mass volumes of textual information. The process begins with the spoken words turned into text, by voice and speech recognition processing. Once converted, call records are processed through data mining techniques, to seek meaning and insight into voice, text, email and other data formats. Processing includes language identification, translation, word spotting and more accurate phrase spotting. Analysts can also rely on content analysis for the understanding of the textual content and structure. Target profiling can be obtained, utilizing target location tracking in real time as well as offline tracking of the target’s movement over time. Based on such automatic processing of context analysis, automatic alerts can be issues on the interception of important evidence or in response to short life spanned information.

    Data analysis has also been widely implemented in the financial, business and commerce sectors, tracking fraudulent activity, money laundering and mitigating business risks. One of the leading companies in this field is Fortnet, recently acquired by Actimize, a subsidiary of Israeli based Nice Systems, which was also dominant in this field. With this acquisition, the majority of the world’s largest banks and all top-ten global banks will be using Actimize, for compliance and financial crime prevention. Such systems are used for Anti-Money Laundering, real-time cross-channel fraud prevention; brokerage compliance and enterprise case and investigation management. Since its foundation in 1993 Fortent provided analytics based Anti-Money Laundering (AML) and financial crime prevention system solutions for the financial services industry, servicing top-tier clients such as Barclays, JPMorgan Chase, Mizuho, Royal Bank of Scotland and Scotiabank.

    More features in this survey:

    Combating Terrorism & Crime: Location Tracking via Cellphones

    Beside monitoring content and call activity, cellular networks provide powerful location tracking of active subscribers, enabling intelligence and law enforcement agencies to track the locations of tens of thousands of subscribers per second. These capabilities are being implemented by the network providers, with authorities having mandated such capability. Tracking technologies have been developed by companies specializing in cellular services, based on protocols implemented by the companies developing the network services (Nokia, Erricson, Motorolla, etc).


    Basic location monitoring and tracking services were originally developed as commercial services, deployed by service- providers, as part of added-value service. When endorsed by intelligence and law enforcement, these services require higher location and tracking accuracy, enabled by the fusion of several location techniques. As location tracking became mandatory by homeland security authorities, relevant tracking technology providers became strategically important for communications monitoring providers such as Verint and Nice Systems; both companies have recently acquired small enterprises specialized in this field.

    Septier Communications provides location tracking services that enable law enforcement agencies track suspects more accurately using only cellular information. Location tracking solutions can trigger real-time alerts when a subscriber is entering or leaving a specified zone or when two suspects are in close proximity (indicating that a meeting may take place). These solutions can also help law enforcement agencies creating a geographical profile and can also aid in alibi confirmation.

    Nice Systems also acquired an Israeli cellular location tracking technology provider, called Hexagon System Engineering. Hexagon provides location of cellular devices at a high level off accuracy. Law enforcement, intelligence agencies and internal security organizations already rely on NiceTrack solutions will be able to use Hexagon services to track the location of their targets, while intercepting the communications emitted by the radio or phone.

    As billions of mobile phones have been used as electronic companions and personal communications, by countless subscribers worldwide, these highly sophisticated electronic devices can be mined for information, as tracks of phonebooks, text messages or call history can be traced on the device even after they are deleted from memory or SIM cards. When a mobile phone finally falls into the hands of the law, valuable data can be extracted, correlated and used as evidence providing clear indication of whereabouts, intentions and activities of the suspect.

    However, until recently, such mining required expert processing and analysis that took days and weeks.
    A small hand-held device has changed all that, empowering field teams and investigators with the capability to interrogate a suspect’s mobile phone, as if it was their own device. Launched in Israel in 2008 by Cellbrite, Universal Forensic Extraction Device (UFED) has already been fielded with many law enforcement agencies and police departments, empowering the investigating of field detectives and assisting in forensic evidence collection. The hand-held device is designed to extract data from over 2,000 types of handsets, smartphone and PDAs. In 2008 Cellbrite has launched a range of portable interrogation devices that can transfer, backup, and management the information stored on the phone’s memory devices. Data can be extracted even when the original SIM is not available or is locked with the user’s secret PIN.

    An example of excellent detective work employing data mining of suspect’s mobile phone was the case of a murder case recently solved by DC Steve Miller from Leeds, U.K. The mass of information he obtained from a suspect’s phone was unprecedented in the details and quality. The phone recovered by the investigation had been passed around many criminals and used with a number of different SIM cards. By retrieving historical data remaining on the device, Detective Miller was able to prove that one of those cards was used by the suspect. He was able to recover a deleted text message, in which the suspect arranged to meet the murdered woman, shortly before he killed her. The defendant was convicted and sent to life imprisonment.

    More features in this survey:

    Combating Terrorism & Crime: Stealth Probes Track Terrorists Online

    Communications interception systems are designed to comply with Lawful Interception (LI) delivery standards. These include norms set by the European Telecommunications Standards Institute (ETSI) as well as the American Telecommunications Industry Association (TIA). However, some agencies are operating ‘above the law’ and are exempt of LI restrictions. Organizations such as the Intelligence and National Security agencies, rely on powerful non-intrusive stealth ‘wire tapping’ known as probes, passively intercepting and monitoring telephony and internet network links, using front-end devices, independently of network operators. These probes can be deployed anywhere, on the trunk links connecting service providers’ networks to each other or within the networks themselves.

    Septier, an Israeli communications interception expert is specializing in the development and deployment of such probes. The company developed passive interception devices that can be used covertly, thus not affecting the service to the subscriber, or create any indication to the subscriber, or the network that interception is actually taking place. Given the immense potential of such capability, Sepiter provides their passive interception capability with maximum level of security, to safeguard from unsecured or unauthorized access to the system, from external or internal sources. These are including an extensive permissions mechanism, detailed internal logging as well as different encryption options. The system complies with ETSI and CALEA lawful interception standards, as well as with other regional regulations. Sepiter can intercept, process and decode internet traffic at rates up to 25 Gigabit/second.

    These systems are built to collect massive amounts of raw data and information. The data is stored in dedicated fast-performing storage devices, utilizing hundreds of terabytes per system. By utilizing data-mining and pre-programmed reports and analytical tools, users can extract nontrivial insights from stored information, highlighting implicit, previously unknown, and potentially useful information from the collected data.

    Today’s communications are not limited to voice or cellular. Even the old copper lines connecting our homes to the land network, have transformed to offer immense broadband communications, enhanced with Asymmetric digital subscriber line (ADSL) and more recently, Very high bit-rate Digital Line Subscriber (VDSL) modems, dramatically increasing data transfer capacity and offering massive multimedia streaming and data transfer, for business and personal use.

    Providing law enforcement agencies an insight into potentially illicit use of these new communications technologies, TraceSpan Communications has developed the Phantom family of probes, enabling broadband analysis and monitoring of ADSL and VDSL lines. Earlier this year the company released the latest member of its family, VDSL ‘Phantom 3838’, passive Lawful Interception (LI) monitoring solution for VDSL2 lines. The Phantom provides passive tapping devices that record and store broadband digital information. The probes can monitor both upstream and downstream data simultaneously at high bit rate. Such probes can be installed at virtually any location – at the central office, or in the field, while data is monitored remotely.

    To display and analyze the data being intercepted, TraceSpan developed the ‘Phantom Viewer’ monitoring application displaying the network traffic, including internet browsing, Email services, FTP, instant messaging and voice calls in real-time and playback mode. Utilizing this application, the agent monitoring a suspect is able to see all the suspect’s network activity, including web pages visited, identified with properties of the destination pages (target IP); monitoring agents can also retrieve hidden attributes of the information, such as passwords, or hidden email addresses, they can read instant messages and tap IP voice telephony in real time, or play-back on demand.

    More features in this survey:

    U.S. Navy Accelerates LCS Operational Deployment

    The Littoral Combat Ship USS Freedom (LCS 1) conducts flight deck certification with an MH-60S Sea Hawk helicopter assigned to the Sea Knights of Helicopter Sea Combat Squadron (HSC) 22. Photo & video by the U.S. Navy

    The Lockheed Martin built Freedom class Littoral Combat Ship (LCS-1) is already in service, and could be deployed for its first mission as early as next year (early 2010) – two years ahead of its scheduled maiden deployment. The second vessel, USS Independence has completed builders sea trials last week and is awaiting inspection by the customer, prior to handover to the U.S. Navy. According to Navy plans, USS Freedom which is currently undergoing a ‘shakedown’ by the navy, will be ready for operational deployment by early 2010, operating under the U.S. Navy Southern Command and Pacific Command.

    The Littoral Combat Ship USS Freedom (LCS 1) conducts flight deck certification with an MH-60S Sea Hawk helicopter assigned to the Sea Knights of Helicopter Sea Combat Squadron (HSC) 22. Photo & video by the U.S. Navy

    According to Adm. Gary Roughead, chief of naval operations, the early deployment of the LCS will improve the U.S. Navy’s ability to dominate littoral regions. Absence of such assets has opened a warfighting gaps that must be urgently closed. Offering unique combat capabilities not previously addressed by the ‘Blue Sea’ cruisers and destroyers, the LCS could have a dramatic impact on the readiness and global reach of the U.S. Navy. To facilitate the early deployment, the Navy adjusted the Freedom testing schedule; prioritized testing events needed for deployment and deferred others not required for the missions envisioned during this deployment.

    Accelerated Fielding of Mission Systems

    USS Freedom (LCS 1) Structural Test Firings of the 57mm gun

    The Littoral Combat Ship (LCS) is designed for operations near coastlines and in the littoral areas, tasked with anti-submarine warfare (ASW), surface warfare (SUW) and mine warfare (MIW) missions. LCS leverage its modularity from the Mission Package (MP) concept – a mission focused group of mission systems and specialist personnel providing the ship its warfighting capability. The MP is embarked on an LCS prior to a mission, enhancing its capability to assume specific tasks or operate against the identified threat. After a mission is completed, the MP is disembarked and restored for future use in any LCS. The MP comprises individual elements, called Mission Systems, and support equipment, together form a Mission Module (MM). One or more MMs along with the crew and support aircraft form an MP.
    To facilitate early fielding the planned testing schedule of the ship will be altered, focusing on the testing of vessel’s shakedown, overseas sustainment, crew training and combat systems and mission packages related to the anticipated mission scope of the vessel. As part of these tests, the Navy performed structural test firing with the vessel’s Mk110 57mm gun and the Surface Warfare (SUW) 30mm Gun Mission Module, while the ship was at sea off the Virginia coastDifferent mission modules comprise the LCS mission packages, which are a combined set of remote sensors, precision weapons, software components and off-board vehicles packaged in a modular fashion to easily and quickly swap in and out of the LCS. Each mission package provides warfighting capabilities for a focused mission area.

    Rolling Airframe Missile inert rounds (below). Photos: Lockheed Martin

    The SUW Mission Package is specifically designed to defeat fast in-shore attack craft. Another element of the SUW Mission Package is the NLOS-LS medium range surface to surface missile module. This module will begin at-sea testing in 2012.

    “As the Navy moves towards multipurpose ships with modular design, it only makes sense that our maintenance and support activities adapt,” sais Program Executive Officer, Littoral and Mine Warfare, E. Anne Sandel, endorsing the newly established Mission Package Support Facility (MPSF). “This is a great first step in the advancement of Navy surface combatant lifecycle support philosophies.” Sandel added. The Navy has recently established the LCS (MPSF) located near USS Freedom’s San Diego, California home port. Providing the central hub supporting the vessel’s mission packages, the new facility will store, deploy, upgrade and maintain the systems and elements that comprise the Mission Packages (MP), address afloat maintenance issues and provide technical support for Mission Module detachments. While the LCS is at sea, MPSF will have a virtual presence on deck, using Distance Support, to assist the crew operating, supporting and reconfigure all deployed Mission Modules.

    Textron, L-3 Com Team to Compete on a $4 billion LCAC Successor Program

    Textron is also working on a larger design called T-Craft, designed for the deployment of prepositioned military hardware from sea-bases to the area of operation.

    Textron Marine & Land Systems has teamed with L-3 Communications to pursue the U.S. Navy’s future $4 billion Ship-to-Shore Connector (SSC) program. The Navy is planning to field the 73 ton Air Cushion Vehicle (ACV), starting in the year 2019, gradually replacing the Landing Craft Air Cushion (LCAC) hovercraft landing-craft currently in service.

    Textron Marine has constructed 80 in the 1980-1990s. Under the planned SSC program the Navy hopes to buy 80 hovercrafts to replace its current (LCAC) fleet.

    Textron is also working on a larger design called T-Craft, designed for the deployment of prepositioned military hardware from sea-bases to the area of operation.

    These craft provide the primary over-the-horizon, ship-to-objective amphibious lift capability, as well as the capability to move across the beach carrying heavy payloads for military and humanitarian operations. The Navy’s SSC Specification Development is scheduled to continue for another year, with an anticipated release of a request for proposal of the Detailed Design and Construction of the lead craft in late 2010.

    The team will include Textron as the prime contractor. “Our team will be focused on taking the Navy design and ensuring a low risk transition to production,” said Textron Marine & Land Systems Senior Vice President and General Manager Tom Walmsley. “No one has the proven knowledge and expertise that our two companies possess on such a unique platform.” He added.


    T-Craft to Deliver Units from Sea Bases to the Shore

    T-Craft is one of several innovative naval prototypes being developed by ONR to support the broad objectives of the U.S. Navy’s Sea Base program. Its mission is to self-deploy from an intermediate support base to a sea base area of operations. Once on site, the T-Craft will take cargo, consisting primarily of wheeled and tracked vehicles, from the sea base to the shore line without the use of port facilities. The transit will be made at high speed, and will end with the delivery of cargo “feet dry” on the beach in a wide range of sea conditions and terrain. Photo: Textron Defense.

    In February 2008 Textron Marine & Land Systems has been selected for a Phase II contract by the Office of Naval Research (ONR) to continue development of the Sea Base Connector, Transformable Craft (T-Craft). During a Phase I study, the team developed a preliminary design of a craft that can operate as a catamaran at low speed, a surface effect ship at high speed, and as a fully amphibious air cushion vehicle for cargo discharge. In addition, the air cushion is used to provide a powerful motion control system to stabilize the T-Craft during cargo transfer operations at the sea base.

    Yellow Jacket Fuses MASINT, IMINT, UAVs to Hunt IEDs

    CenTauri Solutions has been awarded by the U.S. Department of Defense to demonstrate an integrated UAV-based counter-IED technology. Known as “Yellow Jacket” the $11.7 million program is sponsored by the U.S. Air Force Research Laboratory, (AFRL) in Rome, New York. Such a capability could provide life saving services for military patrols and convoys, by scanning the roads and locations and identifing potential IED threats before the arrival of the forces.

    Under the project CenTauri will demonstrate the compilation of two intelligence disciplines – Measurement and Signature Intelligence (MASINT) and Imagery Intelligence (IMINT), co-located on a single platform and fused to enable timely detection of improvised explosive devices at a high level of probability. CenTauri will install the electro-optical HD imaging and unintentional electromagnetic emissions sensor on the Sciebel Camcopter S-100 vertically take off and landing vehicle.

    The ground control system developed by Sciebel enables the operator to plan and perform a complete autonomous mission. Photos: Sciebel

    The radio-frequency detector will be able to scan an area, searching for electromagnetic signals emitted from electronic circuits and electrical that could be associated with IEDs. These could be such as remote controllers, as well as triggering and activation devices. On detection of such signals, high definition imaging sensors could be cued to explore the location for a closer look.

    The Sciebel S-100 Camcopter is well suited for te mission, providing autonomous operational capability and significant payload carrying capacity, while requiring minimal field support. The S-100 can fly missions over 6 hours long, carrying up to 75 pounds of different payloads out to ranges of 180km. It can operate up to heights of 18,000 ft above sea level, making it effective for the most parts of Afghanistan. Back in August this year Sciebel and Boeing announced a teaming agreement to pursue marketing and support opportunities for Schiebel’s S-100 Camcopter.

    CenTauri Solutions is a U.S. consultancy group and system engineering company specializing in Intelligence, Defense and Homeland Security based in Alexandria, Virginia.

    Airbag RPG Countermeasure Completes First Testing Phase

    The TARPS system was displayed at the AUSA 2009 exhibition installed on the JLTV model developed by the GTV team. Photo: Defense Update

    The TARPS system has been modified through its developmental process, becoming more robust and adaptable to different types of light and medium protected vehicles. (Photo: Defense Update).

    Textron Defense Systems’ Tactical Rocket Propelled Grenade (RPG) Airbag Protection System, (TRAPS), has recently completed the first phase of testing at the Energetic Materials Research and Testing Center (EMRTC) in Socorro, New Mexico. During these tests the system defeated live RPGs fired at different angles and from both short and long ranges. Phase II testing followed in late fall of 2009. The third, system level test series was completed in March 2010, where TRAPS demonstrated its effectiveness against different types of RPGs and over a much larger range than in prior phases. These tests validated the hardware modifications introduced to the system, based on the Army Fuze Safety Review Board’s recommendations. All three phases of testing utilized a TRAPS architecture design for the Mine Resistant Ambush Protected, or MRAP, vehicle.

    The TARPS system was displayed at the AUSA 2009 exhibition installed on the JLTV model developed by the GTV team. Photo: Defense Update

    TARPS is designed for use for the protection of light and medium protected vehicles. The system employs a sensor detection technology combined with airbags and non-lethal countermeasures to defeat threats.“Goals for this round of testing included recording extensive system data, as well as evaluating its baseline operational performance,” says Chief Technology Officer Tom McNamara of Textron Systems Corporation.

    TARPS was created as the ‘inflating airbag system’ (IAB) developed by a company named IST, which developed a prototype that combined an inexpensive radar sensor and airbag systems which are inflated before the RPG hits the protected vehicle. The airbag disrupts the shaped charge fuse, as the projectile collapses upon itself, jamming the time-out fuse, thus defusing the shaped charge before it hits the vehicle’s skin. During the initial tests, the system was installed on up-armored Humvees doors, and demonstrated effective protection of the crew compartment. IABS was also effective in protecting the transparent armor (windows) which were broken, but were not penetrated by the RPG.

    Two images depicting the RPG impacting the airbag, resulting in crushing the fuze and dsrupting the warhead to minimize the lethal effect of its shaped charge warhead. Photo: IST

    NATO to Collectively Support HIP Helicopter Operations

    Czech Mi-171 taking part in the Gap Tallard multinational helicopter exercise sponsored by the European Defense Agency, March 2009. Photo by Alexander Drevet

    Afghan M-8 HIP helicopters

    NATO intends to establish a multi-national helicopter unit, to assist the smaller members of the alliance, primarily Eastern European countries that do not have the resources to sustain helicopter units to support of their own forces. The unit will be supported by nine NATO alliance countries. Created in February 2009 and led by the Czech Republic, the HIP Helicopter Task Force is responsible for the development of a multi-national transport helicopter program for NATO. The multi-national unit will deploy transport helicopters in-theatre through the collective support of other Allies. Czech Republic and Hungary, who already operate HIP type transport helicopters such as Russian made MI 8, MI 17 and MI 171, would benefit from the program, when required to set up a multi-national deployable operation.

    The new initiative was endorsed in the recent NATO meeting in Bratislava by the Czech Republic, Albania, Hungary, Norway, Poland, Slovakia Spain, Turkey and the UK. The declaration provides the mandate to start mitigating critical utility helicopter shortfalls, particularly in the conduct of ISAF operations in Afghanistan. The assistance to be provided by the unit will support operational pre-deployment training; command and control capabilities; base support or financial aid. A parallel NATO program addresses other helicopter shortfalls with the UK-French Multinational Helicopter Initiative (MHI), providing multi-national resources to finance helicopter deployment-related activities.

    Japan Completes Testing of the First Missile Defense AEGIS Destroyer

    The Japan Maritime Self-Defense Force (JMSDF), U.S. Navy and the United States Missile Defense Agency (MDA) performed the third successful missile intercept with the Aegis Ballistic Missile Defense (BMD). It was the third and final test in a the vessel’s qualification, verifying the capabilities of Japan’s newest destroyer, JS MYOKO (DDG-175), recently upgraded with the Aegis BMD missile engagement capability.

    Before returning to Japan, JS MYOKO will be loaded with additional SM-3 Block IA missiles. The ship will arrive in Japan ready to provide additional ballistic missile defense capability against the increasing ballistic missile threat present in that region.

    DDG-175 JS Myoko AEGIS missile destroyer sails along the US Navy SS CVN-76 Ronald Reagan aircraft carrier on a naval exercise in the Pilippines, 2007. U.S. Navy photo by Chief Mass Communication Specialist Spike Call

    In this test, the Japanese navy Ship was cruising off the coast of Kauai in Hawaii, intercepted a ballistic missile target launched from the island. The Japanese crew detected the missile, developed an intercept plan and was ready to fire an SM-3 Block 1A missile about four minutes after the target was launched.

    Approximately three minutes later the interceptor hit the target at an altitude of approximately 100 miles above the ocean.

    HAMMER – Ground Launched Loitering Missile

    Raytheon introduced at AUSA 2009 a new enhancement of the MLRS family, based on the Hammer ground-launched multi-role loitering missile. The Hammer was designed as a low-cost, land based loitering weapon system, based on the Miniature Air Launched Decoy (MALD) family, extending the Army’s electronic attack and Suppression of Enemy Air Defense (SEAD) capability.

    Powered by a TJ-150 turbojet engine Hammer sustains flight duration of 60 minutes at 30,000 ft. at a cruising speed of 0.6 mach. The missile can cover a range of 200-500 km guided by on-board GPS/INS navigation unit. Flying an autonomous mission along a pre-programmed path, the missile can loiter near the target, receive and acknowledge target updated in flight, through a two-way communications link. The missile is controlled via the Advanced Field Artillery Tactical Data System (AFATDS) Net-Enabled Command Capability (NECC) through a two-way communications link, which also supports pre-launch mission planning. The Hammer can be loaded with several warheads, containing an electronic attack unit to suppress enemy air defense missiles and radars and a semi-active laser seeker, performing long-range precision strike with unique re-attack capability. A unitary warhead and a tri-modal active seeker complement the Hammer effects, with the tri-modal seeker enabling operation under all weather conditions and engagement of moving targets. The missile uses existing MLRS/HIMARS launchers, each loading one (HIMARS) or two (M270) six-pack containers.

    BAE Systems Tests DIMA Radio for DARPA

    BAE Systems has completed a real-time mobile tests of new wireless military radio technology designed to transfer critical communications without interruption under combat and emergency conditions. Developed as part of the DARPA Interface Multiple Access (DIMA) program, these new digital wireless radios will be able to overcome interference typically encountered with digital communications, ensuring increased network capacity and uninterrupted performance in highly congested mobile networks.

    BAE Systems has completed a real-time mobile tests of new wireless military radio technology designed to transfer critical communications without interruption during battle.

    The test was part of a Defense Advanced Research Projects Agency (DARPA) Interface Multiple Access, or DIMA, a $15.5 million program developing wireless radios that can untangle interfering digital communications signals. The development aims to increase network capacity and performance in highly congested mobile networks.

    Unlike current networks that share frequency or time slots between different users, The new radios will allow multiple transmissions to occur simultaneously on one frequency and can support up to five simultaneous conversations over each frequency slot, even in the presence of severe interference. “DIMA buys back the capacity loss caused by those limitations with technology that separates multiple, interfering digital signals.” says Dr. Brian Pierce of DARPA.

    Known as multi-user detection, BAE Systems’ real-time technology enables users to communicate simultaneously on the same channel without centralized control or infrastructure. Recent experiments validated the technology in a mobile, ad-hoc network environment and demonstrated the vehicle-mounted DIMA radio’s ability to receive up to five simultaneous transmissions from different users while traveling at 15 mph. According to Joshua Niedzwiecki, manager of BAE Systems’ communications and signal exploitation research group, the system will be further improved and tested at higher speeds, “By next March, we expect to operate at speeds greater than 30 mph in highly interfering scenarios, and may even operate as high as 60 mph,” he said.

    DI@NE Tactical Internet

    Thales is offering a tactical internet called DI@NE. The network comprises an internetworking system of systems, including interfaces to PR4G tactical radios and long-range HF radios, which are interconnected into the network via T@CNODE gateways, which convert standard CNR radios into secure voice/data networks utilizing VoiP capabilities. T@CNODE supports messaging, file transfer and data distribution services optimized for the limited bandwidth available with current tactical VHF networks.

    For the shorter range, and intra-Command Post (CP) applications, Secured WiFi links operated over reserved military frequencies are used while vehicular local networks support interconnection between several workstations and resources at each mobile or stationary CP. To access the network, users at CPs are utilizing the SOTAS M2 featuring IP LAN, intercom, telephone and voice/data radio integration.

    Typical applications sharing the new military internet are BMS and logistics support systems. The network’s backbone consist of a system of high capacity 34 Mbps TRC4000 microwave radio relays, managed centrally from a central DI@NE communication canter, via NMS2000 network management system.

    ‘David Sling’ – Israel’s Extended Air & Missile Defense

    Raytheon has received two contracts worth in excess of $100 million from RAFAEL for the design and development of the Stunner missile and associated firing unit, as part of the ‘David’s Sling’ Weapon System (DSWS). RAFAEL is the prime contractor for the DSWS development, a joint program between the Missile Defense Agency and the Israel Missile Defense Organization. The system will defeat short-range ballistic missiles, large-caliber rockets and cruise missiles in their terminal phase of flight. Employable in a variety of engagement scenarios that combine ground-, sea- and air-based sensors, Stunner offers substantial operational and deployment flexibility.

    The interceptor missile is an advanced hit-to-kill interceptor designed for insertion into the DSWS and allied integrated air and missile defense systems. The missile will be stored in and launched from the missile firing unit (MFU), vertical launcher. ”

    Rafael and Raytheon are responding to the worldwide demand for affordable missile defense by co-developing a next-generation hit-to-kill interceptor,” said David Stemer, Rafael’s Missile Division general manager. “The Stunner interceptor redefines the performance-cost value equation for terminal missile defense and provides all-weather hit-to-kill performance at a tactical missile price.”

    The two companies are planning to offer the Stunner and MFU as stand-alone elements as well as an enhancement of existing air defense systems, offering extended air and missile defense. “Large-caliber rockets and short-range ballistic missile threats are inexpensive, plentiful, easily concealed and largely exempt from international arms control accords,” said Mike Booen, Raytheon’s vice president of Advanced Security and Directed Energy Systems. “Stunner offers a near-term and affordable solution to this asymmetric threat.”

    Diehl’s Sky Sphere set to Defeat UAS, OWA Drones Head-On

    0
    Diehl Defence has teamed up with Skysec to develop a drone interceptor. Diehl works with Skysec’s subsidiary, Skysec Defence, to modify the original civilian-oriented net-arresting interceptor into a hard-kill system suitable for military missions....

    Defense Update Weekly News Summary

    0
    Welcome to the latest episode of Defense-Update News Summary! In this episode, we dive into this week’s developments in defense technology, military acquisitions, and strategic partnerships worldwide. Some of this week's highlights include: Elbit Systems...

    Unmanned Combat Aerial Vehicle Program Launches as Part of Rafale F5 Standard

    0
    The French Ministry of Armed Forces has officially launched the Unmanned Combat Aerial Vehicle (UCAV) program as part of the Rafale F5 standard development. This event marks the beginning of a new era in...

    Air Defense & C-UAS Innovations at the AUSA 2024 Exhibition

    0
    Army Air Defense Undergoes Significant Modernization to Counter Drone Threats The U.S. Army's air defense branch has experienced its most substantial modernization and growth in over four decades, primarily driven by the need to counter...

    Elbit Systems Address US Army Artillery Modernization with Sigma 155×52 Wheeled Howitzer

    0
    Elbit Systems of America showcases the Sigma Next Generation Howitzer at AUSA 2024, where competing systems from Sweden, South Korea, France, and Germany are likely to be presented, some in models, others in full...

    Defense-Update Weekly News Summary

    0
    Welcome to the latest episode of Defense-Update News Summary! In this episode, we dive into this week’s developments in defense technology, military acquisitions, and strategic partnerships worldwide. Some of this week's highlights include: Elbit Systems...

    Israel Revamps Aerial Bomb Production

    0
    Elbit Systems has signed a 1.5-billion-shekel (approximately $400 million) contract with Israel's Ministry of Defense to establish an aerial bomb manufacturing bombs for the Israeli Air Force. In the past, the government-owned IMI operated...