Thursday, January 15, 2026
More
    Home Blog Page 341

    DSIT Announces New Asian Orders for AquaShield Diver Detection Systems

    DSIT Solutions Ltd. From Israel is announcing at IMDEX three new order from Asian customers, for AquaShield Diver Detection Systems (DDS) worth US$5 million. The new sonar launched in 2008 is designed to detect divers and protect fixed and relocateable installations, such as ports, coastal facilities and stationary vessels.

    The first AquaShield system was installed in 2007 to protect an oil terminal in Poland. In 2008 the company supplied systems worth $8 million, including a complete harbor surveillance system capable of detecting, tracking, classification and promptly responding to above-water as well as underwater threats. “We are currently experiencing a growing demand for our products due in part to the surge in terrorist activities around the globe.” Dan Ben-Dov, DSIT’s VP Sales & Marketing told Defense-Update. The systems, to be used at undisclosed locations in Asia, will guard and protect the customer infrastructure from underwater intrusion and sabotage. The system will include multiple DDS units, which will be combined and integrated into a comprehensive surveillance system. He said the system has proved extremely reliable, operating around the clock.

    The need for improving monitoring and detection of underwater threats were realized in recent years, as the risk of terror attack became more realistic. “Current marine surveillance solutions often ignore the areas of underwater surveillance and underwater site security, tracking only above-water activity, and leaving the area under water vulnerable to intrusion by divers and Swimmer Delivery Vehicles (SDV).” said Ben-Dov, “Navies, governments and commercial companies are becoming aware of the need to protect critical marine and coastal infrastructures”. DSIT’s AquaShield provides such capability with an unattended sonar system that detects tracks and warns of unauthorized divers and SDVs activity throughout the protected area. According to Ben-Dov, AquaShield provides positive detection, with low false-alarm rate at the longest possible range, utilizing very-low frequency sonar, augmented with resolution level adequate to detect a human diver and SDV while ignoring potential false targets such as large fish and water mammals. Operating over an extended range enables the system to evaluate multiple potential threats simultaneously and provide the operators with early warning, conduct identification and pursuit of the threat, thus improving overall response times

    This AquaShield display screen depicts two divers tracked as they infiltrate into a protected facility. Photo: DSIT

    The system provides automatic detection, tracking and target recognition, locating potential threats at a sub-meter resolution, in a specific sector prevents site shutdown on every alert, while enabling security units to employ the necessary intervention. AquaShield tracks can be relayed to a remote display unit, installed on a patrol boat, enabling rapid and effective interception of maneuvering targets.

    The DDS operates unattended and is integrated into existing command and control systems, monitored and controlled through a single console. DSIT offers the sensor in three versions differing in their coverage configurations – 120°, 240°, and 360°, thus adapting to different site topography. Each sensor provides a ‘node’ in the security network. Such sensors are installed on a jetty, breakwater or pier, where the underwater sensor is attached to an electronic control unit located above water, or on the seabed, where the sensors are fitted with integral electronic processing unit. Underwater sonar units are strategically placed underwater to provide maximum coverage of the protected area. The number and configuration of nodes are customized to meet each site’s unique requirements and topology. The system can be deployed within one hour and operate in all weather and water conditions.

    In 2009 DSIT expects to surpass last year’s sales. By May this year the company added three major customers in Asia, among them a $1.7 million system installed in a large energy facility and a $2.3 contract with an Asian government, installing comprehensive port security solutions, all based on the AquaShield.

    AquaShield sensors (image above) can integrate into a port security utilizing a single console (left) where underwater sonar sensors and alerts are integrated with perimeter and area security and surveillance systems such as remotely controleld EO sensors seen on the right. Photo: DSIT

    Fighting Counterinsurgency in Iraq – Veterans speak out in Clear

    For a majority of Americans, these days in March 08, mark the fifth anniversary of the start of an Iraq war that was not worth fighting, one that has already cost thousands of lives and surpassed spending over half a trillion dollars, which, these days, seem critical for US economy. But for the Bush administration, however, it is the first anniversary of an Iraq strategy that seems to signal a change of fortune and has started to show signs of success. But does it?

    In the spring of 2007, as the first wave of new combat brigades arrived in Baghdad to execute President George W. Bush’s troop surge, an Army lieutenant colonel named Paul Yingling former deputy commander of the 3rd Armored Cavalry Regiment, who served two tours in Iraq, wrote a highly intriguing article in the Armed Forces Journal, criticizing US military leadership in Iraq. It was an extraordinary piece of writing by a serving military officer.

    The debate which followed Colonel Yingling’s article is in itself of significant interest, as it displays a growing unrest within the US Army’s officer corps in the conduct of counter- insurgency (COIN), or asymmetric warfare, in Iraq and in Afghanistan. In his article Colonel Yingling argues that the US general corps needs to be overhauled because it failed to anticipate the post-invasion insurgency in Iraq, and because of its reluctance to admit the onset of such an insurgency in 2004. He likens Iraq to Vietnam, stating that “for the second time in a generation, the United States faces the prospect of defeat at the hands of an insurgency”.


    Because Vietnam was commanded by different generals than Iraq, he concludes that the US generalship, as an institution has failed, though not individual generals. He proposes that Congress takes more interest in military affairs, especially when confirming generals to their combat related posts. Generals, in his opinion, need to be aware that future US wars won’t involve one big enemy army – that is, they need to admit that realities have changed since the World Wars. He states that the US needs generals to be more creative, as well as better understand the history of war, international relations, and foreign cultures.

    The colonel actually spares no small talk on his critics: “It is unreasonable to expect that an officer who spends 25 years conforming to institutional expectations will emerge as an innovator in his late forties Actually senior officers suffer from conformity, lack of vision, and lack of creativity”, the colonel claims. Moreover, “Events over the last two decades demonstrate that insurgency and terrorism are the most likely and most dangerous threats our country will face for the foreseeable future. Our enemies have studied our strengths and weaknesses and adapted their tactics to inflict the maximum harm on our society.”

    A new look at Counterinsurgency?

    Colonel Yingling’s unprecedented “j’accuse” caused quite a ruckus among his fellow compatriots and the media, which obviously had a field day. But it also triggered an important debate, in which some of the more important issues in modern warfighting came to light and not only within the US Army. The ongoing arguments, which reflect various views over tactics used, represent an attempt to answer a searing question: “What are the lessons of Iraq?” Ultimately, the answer will probably emerge in and endless debate, which will continue long after the troops are withdrawn from the battlefield.

    Counterinsurgency is a much-disputed concept, but it refers to methods of warfare used to divide a civilian population’s political and sentimental allegiance away from a guerrilla force. From the start of the Iraq war, a cadre of warrior-thinkers in the military has questioned the use of tactics that focus more on killing enemies than giving the Iraqi population reasons not to support terrorists, insurgents and militias.

    “We don’t just talk about the enemy, we talk about the environment,” explained Lt. Gen. Ray Odierno, until recently the corps commander in Iraq, in a lecture at the Heritage Foundation. Even the staunchest critics assert that early use of a sound counterinsurgency strategy could have won the Iraq war itself. But many analysts agree, based on the visible decline in violence in Iraq during the last half of 2007 that a better counterinsurgency strategy would have allowed the war to have been less costly than it proved to be.

    There are critical lessons that the counterinsurgency proponents believe need to be applied – first in Iraq and Afghanistan, and then institutionalized throughout the entire military establishment. To them, institutionalization is key: it’s something that the military avoided in the generation between Vietnam and Iraq, so as not to entangle the U.S. in any more counterinsurgency campaigns – even as adversaries adjusted to America’s conventional military dominance. The fact is that during the Clinton era, the Pentagon focused on buying more high-tech jet fighters, sophisticated communications systems, and sensors, all geared towards high intensity conflict, while placing very little emphasis on the tactical needs in low-intensity warfare, which was already in the cards, in the turn of the new century. A similar trend emerged clearly in the Winograd Commission findings, which examined the Israeli defense community decisions in preparing the IDF for a low-intensity conflict with Hezbollah during summer 2006.

    Within the US Army there are already some early signs, small as they still are, of an institutionalization change. General David Petraeus, an officer with considerable experience in counterinsurgency warfare, has become a significant figure opting for profound changes in the army’s tactical and operational doctrine. Before the general left for his overall command in Iraq, Petraeus commanded the Combined Arms Center at Ft. Leavenworth, a bastion of the Army’s institutional knowledge, where he established the first counterinsurgency course for young officers. Another important development is the fact, that the Army recently raised stability operations to equal importance with offensive and defensive operations in its official Operations manual, FM 3-0 – adding a brand new category of warfare for the first time in the Army’s 232-year history. But not all is going smoothly yet, as it takes time to make new operational concepts to be fully accepted within a deeply conservative and highly institutionalized organization like any professional Army. There are already some “seniors” in the service, which regard the “newcomers” as insufficiently “mature” to radicalize long established operational traditions. In their view, the “young and eager counterinsurgents” , are still regarded in outsider status, which causes them naturally, to consider themselves a besieged minority inside the “Big Army “.

    Even elements in the Marine Corps, traditionally known as open minded, people are somewhat skeptical over the newly emerging trend, which they fear could sap some of their specific operational requirements. Present Marine Commandant, Gen. James Conway, and surprisingly even slighted counterinsurgency in his latest public statements as a “lesser-included” mission of the Marine Corps. General Conway commanded the 1st Marine Expeditionary Force during Operation Vigilant Resolve in Fallujah and rumors then spread that the Marines were criticizing army tactics in the battle, which the general vehemently denied: in his words : ” We shall follow our orders”, as he and his troops did indeed in the controversial battle of Fallujah.

    But the counterinsurgency strategy still encounters opposition within the Army. Even with General Petraeus promoted to the helm of the Army’s lucrative promotions board, some of his compatriots wondered why, for example, a veteran colonel named H.R. McMaster, who successfully implemented a counterinsurgency strategy in the Iraqi city of Tal Afar in 2005 at the command of the 3rd Armored Cavalry Regiment, had been surpassed and will he ever receive his first star?

    Still something seems to give after all, in the bureaucratic grapevine from the top down. While the long established procurement priorities of the Army have not dramatically changed since Operation Iraqi Freedom (OIF), nor have the ground services gotten a significantly bigger piece of the budgetary pie “The Army has gotten a much bigger share than it has traditionally because of the costs of the operations in Iraq and Afghanistan, where it plays the dominant role,” said Steve Kosiak, a defense analyst at the Center for Strategic and Budgetary Assessments. “In terms of the ‘base’ budget – i.e., the budget exclusive of war costs – its share has grown as well, but only very modestly. But it still receives slightly less than the Navy and Air Force.” Kosiak warns.

    Nevertheless, there are counter critics in the ongoing debate as well. One of them is Yingling’s brother officer, anArmy lieutenant colonel Gian Gentile, who served two tours in Iraq commanding an armored cavalry squadron. The colonel considers the counterinsurgents’ sense of besiegement to be virtually ludicrous. To him, the military is undergoing a “titanic shift” in favor of counterinsurgency with little debate over its in-depth implications. “I worry about a hyper-emphasis on COIN and irregular warfare,” he claims in another article in the Armed Forces Journal, “with less mechanization, less protection and more infantry on the ground walking and talking with the people, it’s a potential recipe for disaster if our enemies fight the way Hezbollah did against the Israelis in the summer of ‘06.” Colonel Gentile warned. Gentile said that units – including his own – applied COIN practices throughout the war, but he observed that in Iraq, conditions got worse, not better.

    That realization turned Gentile from an ardent COIN practitioner to a COIN skeptic. Counterinsurgency, he now believes, has a role in a modern military, but an excessive focus on it serves as an alibi to avoid recognizing that the U.S. military is not omnipotent. “I think Andrew Bacevich (a former army colonel and international relations professor), at the policy-strategy level, has basically nailed it,” Gentile said, referring to the retired Army colonel who contends that Iraq is an irredeemable strategic mistake. “He points out the limits of what American military power can accomplish.”

    Striking that balance is the central question in U.S. military circles in 2008, and the counterinsurgency community is at the heart of it. In this argument between two respected senior officers, the next major debate over U.S. defense policy can be gleaned. Yingling speaks for an ascending cadre of young defense intellectuals, most of whom are Iraq and Afghanistan veterans, who assert that the U.S. military must embrace principles of counterinsurgency if it is to triumph in the multifaceted fight against global terrorism. While still at odds, in their respective views ,both based on their common experiences in combat, the two colonels readily agree, that the military still suffers from lack of intellectual reassessment. “We don’t agree on every point,” Yingling said, “but we do agree on the need for a rigorous debate in the Army about what kind of threats we face and what the Army needs to defeat them. I would not want the Army to rigidly adopt COIN doctrine in the same way we rigidly adopted high-intensity mechanized state-on-state warfare.”

    Defense Update would like to open a discussion on this highly intriguing issue, which affects not only the US Army, but also all military forces engaged, one way or other in counterinsurgency and asymemtric warfare against terrorists.

    Raytheon Unveils Tandem Warhead Bunker-Busting Technology


    Raytheon Company (NYSE:RTN) demonstrated a new conventional warhead technology designed to defeat hardened and deeply buried bunkers. In a recent test the new 1,000 pound class (454 kg) tandem warhead demonstrated penetration of 19 feet, 3 inches (5.86 meters ) of a 20-foot (6 meters), 330-ton, steel rod-reinforced concrete block, delivering 12,600 pounds per square inch (psi) compressive strength (about twice the pressure generated by existing 1,000 pound weapons). The new large shape-charged test was the first against a target built to withstand pressures of more than 10,000 psi. Most conventional weapons in the same weight class as Raytheon’s precursor warhead cannot penetrate targets rated at more than 6,000 psi.

    The new tandem warhead consists of a shaped-charge precursor warhead combined with a follow- through penetrator explosive charge. Raytheon engineers believe Tandem Warhead System, which is lighter and more powerful than current conventional systems, is suited for weapons with long standoff range and greater survivability against enemy threats.

    “Bunkers are getting harder and deeper, and high-value ones are extremely well protected,” said Harry Schulte, Missile Systems’ vice president, Strike product line. “The warfighter has a need for increased capabilities against this challenging target set, but because conventional warheads in the inventory can’t meet this requirement, Raytheon self-funded the development of this new warhead.”
    “Now that we’ve demonstrated it’s possible to create a conventional warhead that weighs approximately 1,000 pounds and provides unmatched capability, we’re looking at scaling the technology,” Schulte said. “We believe we can place a warhead that uses this new technology on any strike weapon system in the inventory in 18 months or less.”

    According to Schulte, innovative engineering techniques enabled Raytheon’s engineers to take the warhead from the drawing board to the proving grounds in fewer than nine months.

    Context-Aware Computing Rediscovers Information for Intelligence Analysts

    Analysts review and file hundreds of pieces of data from multiple sources amid the everyday challenges of interagency sharing requirements and compressed timetables to provide mission-critical intelligence. However, mission success may depend on analysts re-finding that same, now critical bit of data weeks or months after they first discovered it. But making rediscovery even more difficult is how analysts organize their data

    Analysts traditionally file data in highly personalized ways, meaning that filing methods across the intelligence enterprise can be quite diverse. As a result, personalization may make it more difficult for analysts to share data files and rediscover the original context of the data.

    According to Mark Hoffman, Advanced Technology Laboratories (ATL) technology manager at Lockheed Martin, a new application called Contrail, developed at Lockheed Martin captures the analysts’ trails of discovery and reasoning as well as the items they encountered along the way, helping analysts to ‘rediscover’ stored information, find and share new information, and provide an audit trail for items like capturing lessons learned.

    Integrated into an intelligence agency’s computing infrastructure, Contrail’s software builds an explicit, machine-understandable representation of analysts’ contexts by monitoring how they handle information. The technology then builds a personalized software model that automatically tags newly found data, enabling analysts to later retrieve that needed intelligence using metadata, content, or context at time of storage.

    Analysts can also share data by using context tags – such as people, places, events, or concepts active when they first stored the data. During searches, Contrail automatically suggests stored items that are relevant by matching the current situational context with that on the tags of stored items.

    Contrail was developed in 2007 as a context-aware computing framework that gives the intelligence community the tools to capture, retrieve and share contextually relevant information at reduced time and cost. It was developed as part of the Collaboration and Analyst/System Effectiveness program sponsored by the Intelligence Advanced Research Projects Activity. Through internal research and development, ATL continues to expand Contrail’s functionality.

    Dense Inert Metal Explosive (DIME)

    Research of Dense Inert Metal Explosive (DIME) technology is planned to integrated into SDB I within the next couple of years. DIME was developed to facilitate precise and focused attacks in densely populated areas, causing focused effect with minimal collateral damage. munitions based on DIME technology will benefit the warfighter in missions where standard munitions would inflict unacceptable collateral damage levels.

    The research into DIME technology is conducted by the US Air Force Resarch Lab partnered with Lawrence Livermore National Laboratory. This technology was demonstrated in a low collateral damage warhead, allowing a “behind-the-wall” threat prosecution with a highly localized lethal footprint. The warhead case consists of a low-density, wrapped carbon-fiber/epoxy matrix integrated with a steel nose and base. The low-density composite case can survive penetration into a one-foot hardened concrete wall.

    Upon detonation, the carbon-fiber warhead case disintegrates into small non-lethal fibers with little or no metallic fragments, thus significantly reducing collateral damage to people and structures. The warhead explosive fill is a dense inert metal explosive containing fine tungsten particles to provide a ballasted payload with sufficient penetration mass. The tungsten displaces energetic material so as to reduce the total energetic used. The net results are higher dynamic energy impulse all within a small lethal footprint.

    DIME are among the technologies considered for inclusion in the Focused Lethality Munition (FLM) Upgrades for the Small Diameter Bomb (SDB). FLM exploites focused lethality munitions, which would further reduce a small diameter bomb’s collateral damage. In the FLM, the steel casing will be replaced with one made of carbon fibers, thus eliminating fragmentation effect which, in standard bombs can reach up to 2,000 feet. FY2007 increase of $40.2M for Small Diameter Bomb (SDB) Focused Lethality Munition (FLM) supported teh examination of alternate bomb fills and casings into SDB I preparing for technology integration into SDB I.

    Could Premature SpinOut take FCS Out of Synch?

    The U.S. Army’s Future Combat System (FCS) program comprises 14 integrated weapon systems and an advanced information network. The $160 billion program is the centerpiece of the Army’s effort to transition to a lighter, more agile, and more capable combat force. The program led by Lead Integrators Boeing and SAIC, represent a generation leap in technology, procurement and scale for the army, research and development community and defense industry. The scale of the program, the Army’s acquisition strategy and the cost involved, led to establishment of special oversight and review by the U.S. Government Accountability Office (GAO), required to report annually on the program’s progress.

    Despite the progress made with the program in recent months, GAO assessed “The progress made during the year by the FCS program, in terms of knowledge gained, is commensurate with a program in early development. Yet, the knowledge demonstrated thus far is well short of a program halfway through its development schedule and its budget”. The report indicated that delayed development progress could lead to increased costs and delays, as the program enters the most expensive and problematic phase of full scale development. “FCS’s demonstrated performance, as well as the reasonableness of its remaining resources, which will be paramount, at the 2009 milestone review for the FCS program.,GAO determines. The report warns that requirements definition and preliminary designs are proceeding but are not yet complete in several of the program’s key areas. “Critical technologies are immature; complementary programs are not yet synchronized; and the remaining acquisition strategy is very ambitious.” GAO continued.

    GAO warns that the program is entering a critical path in 2008, as the Army decides to commit on early production of several FCS-related systems (called Spinout I), in advance of the low-rate production decision for the FCS core program in 2013. However, the Army’s commitment to the first spin out may be made before testing is complete. This decision was made in order to field some systems wit the current force, rather than the future FCS brigades, as those systems were determined as offering functions and services urgently required by warfighters today. GAO warned that production commitments should be planned after key information on all related systems is available. The Army intends to commit to production of early versions of the Non-Line-of-Sight Cannon this year. This commitment is being made to respond to congressional direction to field the cannon.

    GAO warns that the cost of the program, currently set at $160 billion could prove underestimated. Two independent cost assessments made recently are significantly higher than the Army’s estimate. While the Army reduced the content of the program from 18 systems to 14, and plans to further reduce the number of platforms if further cost control measures fail, GAO indicated that if those higher cost estimates prove correct, it seems unlikely that the Army could reduce FCS content enough to stay within the current ceiling while still delivering a capability that meets requirements. The GAO report recommended that clear criteria will be set for the program in time for the 2009 ‘go/no go’ decision; The report also recommends that the viable alternatives to FCS should be considered prior to that decision.

    US Outlines its Counter-IED Strategy: Attack the Network, Defeat the Device and Train the Force

    The latest information on the improvised explosive devices (IEDs) was the focus of remarks delivered by Joint IED Defeat leadership at a recent Arlington, Va. government-industry summit. The 2008 Counter-IED Summit, sponsored by the Institute for Defense and Government Advancement, is a forum that focused on understanding and reducing the current IED and EFP threats. The recent event was held in Washington in January 2008. Attendees included senior level professionals from military units, government agencies, contractors and technology service providers. The Counter-IED Summit 2008 was sponsored by Defense Update.

    These charts, relesed by JIEDDO in february 2008 indicate the sharp drop of IED activity in Iraq, in contrast  with proportional increase in casualties of IED attacks in Afghanistan, where attacks became more sophisticated in recent time. Images: JIEDDO.
    The Joint Improvised Explosive Device Defeat Organization (JIEDDO) kicked off the summit with an overview of the evolving threat. Established by the Department of Defense, JIEDDO’s mission is to support combatant commanders in their efforts to counter IEDs.

    In his keynote address, Navy Capt. Jeff Trumbore, JIEDDO Division Chief, Technology and Integrations Requirements Division described JIEDDO’s mission and commented on the recent decline in the number of IED incidents in Iraq. Trumbore is responsible for the technology requirements and technology solutions for countering IEDs.

    “IEDs are the weapon systems and there is a variety of weapon systems in subcategories underneath IEDs,” Trumbore told his audience. “We have been effective, the surge has worked; the technology pieces that have been put in place have had an impact. It has shifted the enemy’s tactics and has quieted the enemy down.”

    JIEDDO’s strategy focuses counter IED efforts using three lines of operation: Attack the Network, Defeat the Device and Train the Force. “‘Attack the Network’ is one of the biggest areas where JIEDDO has made progress; we enable the services to go after the network,” Trumbore explained. “Attack your enemy before they can take action.”

    Fighting The Network

    JIEDDO supports units conducting offensive operations through improvements to intelligence collection, information operations, forensic exploitation and surveillance. These initiatives become long-term Service programs of record that provide an enduring Counter-IED (C-IED) capability to the warfighter. One highly successful program targeting IED networks is the Law Enforcement Professional program. After noting similarities between organized crime and IED networks, JIEDDO funded the LEP program to leverage the knowledge and skill of former law enforcement experts to attack the IED network activities. It has enabled the services to disrupt the vast network by expanding operations beyond emplacers and target the finances, explosives, supply line of parts and the brains that build IEDs.

    Unmanned airborne systems have also been highly successful in providing surveillance capability for counter-IED efforts. A successful counter-IED initiative that has been transferred to the Army within the last year is Warrior Alpha, an unmanned airborne system with intelligence, surveillance, and reconnaissance capabilities. “Putting ISR assets over the target is critical to giving the folks in theater air detection capabilities,” Trumbore said. “JIEDDO has sent six initiatives to the Services under the detect air capability.” Trumbore also highlighted the importance of training. ‘Train the force’ is a key element of the JIEDDO strategy. JIEDDO supports initiatives that will provide the latest training, equipment, tactics and information to deploying service members. Between fiscal year 07 and fiscal year 09, JIEDDO funded 26 initiatives to assist the services in conducting training. This training dramatically increases the warfighter’s ability to perform C-IED tactics and saves lives.


    C-IED Training for the Warfighters

    Through its Joint Center of Excellence, a training arm headquartered at Fort Irwin, JIEDDO supports the Services to provide realistic training in all facets of defeating IEDs including identification of the devices and their components. Service members preparing to deploy train with the latest C-IED tactics and equipment that mirror the systems they will employ in Iraq and Afghanistan. “You can put all the technology out forward, but if you don’t have a solid training program you have not thought through the how to train the soldier to use this technology,” Trumbore said. “A lot of the technology that has been proposed to JIEDDO is something only a PhD can use. The soldier in the field must be able to put the technology to use.”

    One example is the Counter Radio-Controlled Electronic Warfare (CREW). JIEDDO funded the purchase of 35,157 CREW systems, a new-generation jammer that has cut in half the number of remote controlled IED attacks in Iraq. “CREW has been extremely effective and has driven the insurgents to other tactics,” Trumbore said. “It is moving to the Services as programs of record, they have proven their worth.”

    To train service members on how to use the equipment, units are exposed to six types of CREW devices they will find in theater, namely, the vehicle-mounted Duke and the man-portable Guardian systems. Additionally, the JCOE has trained over 1,400 personnel in Electronic Warfare (EW) training, including three EW courses that prepare CREW operators to employ the systems to best effect. “We enable the services to come up to speed with new counter IED training, not at the speed of the Pentagon but at the speed of the tactical environment,” Trumbore said. “JIEDDO has the ability and funds to make quick changes to influence the training base of the Services prior to sending folks overseas.”

    Lastly, Trumbore spoke about initiatives that defeat the IED itself. Defeat the Device works to enhance commanders’ freedom of action for safe operations and to reduce the effects of IED detonation at the point of attack. “‘Defeat the Device’ is tangible,” Trumbore said. “You can see it, put armor on a vehicle, give a detector to someone, and add sensors and new capabilities, as the route clearance package, but the only problem with Defeat the Device is that you already have lost the battle, since the IED is already in place.”

    Near and Long Term Solutions

    During 2007, JIEDDO continued to fund commercial-off-the-shelf solutions and develop capabilities to ‘defeat the device’ and reduce the effects of IED detonations. These include armor packages for vehicles, route clearance blowers for suspicious roadside litter and the modular mine roller system are examples where JIEDDO’s initiatives are saving people’s lives every day.

    The long-term threat posed to U.S. strategic interests by IEDs requires continuing support from industry and government. In the last year, JIEDDO received 1335 technology initiatives from which 89 were funded for Joint Urgent Needs of Warfighters. JIEDDO’s new Broad Area Announcement (BAA) containing guidelines for technology developments was posted on the JIEDDO website Feb. 8, 2008. The BAA contains the latest information targeted for what deployed units need now.

    “From a training industry perspective, we need help with surrogates to provide realistic training without violating FAA rules,” Trumbore explained. “We need persistent ISR capability on platforms that already exist. We need “plug and play capability” in theater where you can swap out sensors, adding to mission capability. We are not interested in unique assets without a supply chain.”

    JIEDDO will be holding its semi-annual JIEDDO Technology Outreach Conference April 8-10 2008 in Denver, Colorado. For more information, email questions to [email protected]. To submit a proposal, visit the JIEDDO Bids Portal at www.jieddo.dod.mil and click on proposal submission.

    Could Premature SpinOut take FCS Out of Synch?

    The U.S. Army’s Future Combat System (FCS) program comprises 14 integrated weapon systems and an advanced information network. The $160 billion program is the centerpiece of the Army’s effort to transition to a lighter, more agile, and more capable combat force. The program led by Lead Integrators Boeing and SAIC, represent a generation leap in technology, procurement and scale for the army, research and development community and defense industry. The scale of the program, the Army’s acquisition strategy and the cost involved, led to establishment of special oversight and review by the U.S. Government Accountability Office (GAO), required to report annually on the program’s progress.


    Despite the progress made with the program in recent months, GAO assessed “”The progress made during the year by the FCS program, in terms of knowledge gained, is commensurate with a program in early development. Yet, the knowledge demonstrated thus far is well short of a program halfway through its development schedule and its budget”. The report indicated that delayed development progress could lead to increased costs and delays, as the program enters the most expensive and problematic phase of full scale development. “FCS’s demonstrated performance, as well as the reasonableness of its remaining resources, which will be paramount, at the 2009 milestone review for the FCS program.,GAO determines. The report warns that requirements definition and preliminary designs are proceeding but are not yet complete in several of the program’s key areas. “Critical technologies are immature; complementary programs are not yet synchronized; and the remaining acquisition strategy is very ambitious.” GAO continued.

    GAO warns that the program is entering a critical path in 2008, as the Army decides to commit on early production of several FCS-related systems (called Spinout I), in advance of the low-rate production decision for the FCS core program in 2013. However, the Army’s commitment to the first spin out may be made before testing is complete. This decision was made in order to field some systems wit the current force, rather than the future FCS brigades, as those systems were determined as offering functions and services urgently required by warfighters today. GAO warned that production commitments should be planned after key information on all related systems is available. The Army intends to commit to production of early versions of the Non-Line-of-Sight Cannon this year. This commitment is being made to respond to congressional direction to field the cannon.

    GAO warns that the cost of the program, currently set at $160 billion could prove underestimated. Two independent cost assessments made recently are significantly higher than the Army’s estimate. While the Army reduced the content of the program from 18 systems to 14, and plans to further reduce the number of platforms if further cost control measures fail, GAO indicated that if those higher cost estimates prove correct, it seems unlikely that the Army could reduce FCS content enough to stay within the current ceiling while still delivering a capability that meets requirements. The GAO report recommended that clear criteria will be set for the program in time for the 2009 ‘go/no go’ decision; The report also recommends that the viable alternatives to FCS should be considered prior to that decision.

    Excalibur GPS Artillery Projectile Debut in Afghanistan


    Soldiers fired the first 155mm GPS-guided Excalibur artillery round in Afghanistan Feb. 25. The Excalibur was fired using the M-777A2 155mm howitzer. The M-777 is designed to be a digitally programmed weapon and is about 9,800 pounds lighter than the more commonly used M-198 Howitzer and is reportedly more accurate. The fuze setting was performed by Enhanced Portable Inductive Artillery Fuse Setter, placed on the tip of the round, sending a digital message containing the coordinate for the round to find.Photo: Staff Sgt. Jamare Cousar and Staff Sgt. Darius Scott (right), both deployed with Charlie Battery, 3rd Battalion, 321st Field Artillery Regiment, inspect the Army's new GPS-guided Excalibur round before firing it Feb. 25 for the first time at Camp Blessing, Afghanistan. Photo: US Army

    “The main purpose of the M-777A2 is that it is more able to help the units in the Korengal Valley by providing more timely and accurate fire,” said Army Capt. Ryan Berdiner, 28, commander of C Battery, 3rd Bn., 321st FAR.” By using the Excalibur, we are mitigating a lot of collateral damage that other rounds may cause,” said Scott. “The Excalibur round travels farther and is designed to hit targets that conventional ammo does not always hit,” said Army Staff Sgt. Darius Scott of C Battery, 3rd Battalion, 321st Field Artillery Regiment.

    Photo: Staff Sgt. Jamare Cousar and Staff Sgt. Darius Scott (right), both deployed with Charlie Battery, 3rd Battalion, 321st Field Artillery Regiment, inspect the Army’s new GPS-guided Excalibur round before firing it Feb. 25 for the first time at Camp Blessing, Afghanistan.

    Text & photo: Sgt. Henry Selzer, U.S. Army 173rd Airborne Brigade Combat Team.

    Europe First? Al Qaeda Targets New Global Terror Strategy

    At the European Security conference in Munich, last February, US Defense Secretary Robert Gates told European nations that they were under direct threat from Islamist extremists and that this phenomenon would not go away. His warning followed Western intelligence services which already established operational links between al-Qaeda in Afghanistan and the Islamic Maghreb (AQIM) whose goals include striking at the heart of Europe. (see our analysis: Defeated in Iraq Al Qaeda Migrates to Maghreb – Next Stop: Europe). “I am concerned that many people on this continent may not comprehend the magnitude of the direct threat to European security” the secretary lamented. Gates warned: “The threat posed by violent Islamic extremism is real – and it is not going away. Europeans knew “all too well” about the Madrid bombings that killed 191 people in March 2004 and the attacks in London that left 56 dead in July 2005, but further from the spotlight there had been “multiple smaller attacks” in cities from Glasgow to Istanbul”, Secretary Gates said.

    Al-Qaeda has not made any secrets of its eagerness to target Europe. Indeed, Osama bin Laden’s number two, Ayman al-Zawahiri, has repeatedly threatened Europe. In September 2006 he appeared in a video website on the fifth anniversary of the 11 September attacks, urging to punish France as prime target for Islamist militants. Pierre de Bousquet de Florian, then head of the DST (domestic security service), said the threat of terrorist attack in France remained “very high and very international”.


    In fact, the Islamic terrorist group continues to be the most serious terrorism threat to Europe, said Gilles de Kerchove, newly appointed coordinator of counter-terrorism efforts among EU member states, speaking to the European Parliament, last November. He mentioned European converts to radical Islam having had a hand in several recent terrorism plots on European soil, including a foiled attack in Germany in 2007. German counter terrorist authorities claimed of up to 50 Islamic militants linked to the three men were suspected planning to assassinate the head of Germany’s federal police, Joerg Ziercke. Two German citizens and one Turkish national were arrested in connection with the plot. They allegedly trained in terrorism camps in Pakistan before founding the domestic cell of an al Qaeda affiliate inside Germany.

    Also, last September, based on information provided by US intelligence, German counter terror agents arrested three members of an al-Qaeda cell that planned to bomb Frankfurt airport and the nearby US military air base at Ramstein. This network allegedly had ties to other European countries, since the explosives seized were similar to those used in the London plots. The investigation also showed that the alleged terrorists had connections to both Pakistan and Syria. Another important fact revealed that two of the three were Muslim converts. However, thanks to the outstanding job of counter-terrorism services, fortunately, al-Qaeda’s only major success in Europe in 2007 was the June 30 attack on Glasgow airport that killed one and injured five. That attack had followed two foiled car bombs in the center of London that could have killed hundreds, had it been successful. The scheme was nicknamed the “doctors’ plot,” because it was planned by foreign doctors who resided in Britain.

    In Spain, which is also a major target for Islamic terrorism, security services dismantled an al-Qaeda affiliated terror cell almost exclusively manned by Pakistani, except for a single Indian member. It was planning a terror attack in Barcelona. The local newspaper El Pais reported, that interrogations revealed a wave of planned attacks in Germany, France, Britain and Portugal.

    Britain’s intelligence Chief Jonathan Evans has also spoken out against domestic radicalism, saying that the number of individuals in Britain with suspected terrorist links has risen to at least 2,000 in 2007, compared with less than 1,600 in 2006. “As I speak, terrorists are methodically and intentionally targeting young people and children in this country,” he said in a speech to the Society of Editors Conference in Manchester. “They are radicalizing, indoctrinating and grooming young, vulnerable people to carry out acts of terrorism.”

    Tom Fingar – a former State Department intelligence officer and currently, chairman of the National Intelligence Council (NIC), an office, under the director of national intelligence, that leads the joint National Intelligence Estimate (NIE) drafting process – expressed concern about the possibility of Europe-based terrorists attacking the United States, citing the ease of travel from European countries. His concern is very real: For example, a convicted terrorist known as Dhiren Barot, a Hindu Indian by birth, converted to Islam, worked as an airline ticket and reservations agent in Central London, when he was arrested by British agents in 1994. Now serving a thirty-year sentence in a British prison, Barot had “reconnaissance plans” of buildings in New York and Washington, including Citigroup, the New York Stock Exchange, and International Monetary Fund headquarters.

    Another terrorist, Younis Tsouli, a Moroccan born UK resident, who recently pleaded guilty to terrorism charges in Britain, was an administrator of an online jihadist forum. On his laptop, authorities discovered a folder labeled “Washington” containing video clips of the U.S. Capitol grounds and the World Bank’s D.C. headquarters. US counter terrorist agents claim that terrorists from European countries face far fewer obstacles to infiltrating the United States. A majority of them can make the trip legally under the visa waiver program. In addition, many of them speak English and have experience living in Western countries, making it far easier for them to adapt to life in America.

    An extremely interesting study on the cultural threat, posed by Islamic terror on Europe was published in “The Washington Quarterly” Summer 2004 edition, by Timothy M. Savage, a former U.S. foreign service officer, titled “Europe and Islam: Crescent Waxing, Cultures Clashing”. According to Savage, the world of Islam may do more to define and shape Europe in the twenty-first century than the United States, Russia, or even the European Union. The Islamic challenge that Europe faces today is twofold: Internally, Europe must integrate a ghettoized, but rapidly growing Muslim minority, that many Europeans view as encroaching upon the collective identity and public values of European society. Externally, Europe needs to devise a viable approach to the primarily Muslim-populated volatile states, stretching from Casablanca to the Caucasus, that are a currently focus of the EU’s recently adopted security strategy. Mr. Savage warns that the European-Islamic nexus is spinning off a variety of new phenomena, including the rise of terrorism; for instance, the emergence of a new kind of anti-Semitism; the shift of established European political parties to the right and the recalibration of European national political calculations.

    According to Timothy Savage’s study, Europe’s track record of engagement with Islam over the last 1,350 years is not very encouraging. Although trying to explore some new initiatives, Europeans seem still inclined to pursue a status quo approach, at home and abroad, preferring caution, predictability, control, and established structures over the required boldness, adaptability, engagement, and redefined relationships that the new demographic challenges require. A similar mind-set is evident among Europe’s Muslim population. With more than 23 million Muslims residing currently in Europe, already comprising nearly 5 percent of the population, the danger exists that, if suitable accommodation is not reached in time, current dynamics will likely yield a Europe, that not only faces increased social strife, national retrenchment, and even civil conflict domestically, but also could well succumb to a “Fortress Europe” posture, signaling even its political decline on the international stage.

    JIEDDO’s Information Systems are Targeting IED Support Networks

    The strategy developed by the U.S. DoD Joint Improvised Explosive Device Defeat Organization (JIEDDO) focuses counter IED efforts using three lines of operation: Attack the Network, Defeat the Device and Train the Force.

    ’Attack the Network’ is one of the biggest areas where progress has been made. JIEDDO supports units conducting offensive operations through improvements to intelligence collection, information operations, forensic exploitation and surveillance. These initiatives become long-term service programs of record that provide an enduring C-IED capability to the warfighter.

    In August 2006 JIEDDO established the Counter-IED Operations Integration Center (COIC) to focus on attacking enemy networks employing and assisting IED supporters, producers, trainers and operators. COIC also provides an avenue for strategic reachback to collaborative, fused, multi-source information and knowledge resources across critical DoD, government, industry, academic organizations and agencies. Through COIC’s fused intelligence products, formerly highly classified intelligence is now available at the secret level, making it accessible to warfighters at the tactical level.

    One highly successful program targeting IED networks is the Law Enforcement Professional program. After noting similarities between organized crime and IED networks, JIEDDO funded the LEP program to leverage the knowledge and skill of former law enforcement experts to attack the IED network activities. It has enabled the services to disrupt the vast network by expanding operations beyond emplacers and target the finances, explosives, supply line of parts and the brains that build IEDs.

    The insurgents who place IEDs in Iraq and Afghanistan are often supported by organized networks that finance their operations, supply critical elements for the production of IEDs, create the devices and plan and execute attacks. The new system implements powerful analytics to gain critical, data driven insight into the structure, character, interactions and methods associated with those networks. By analyzing data from myriad sources the new system can identify and analyze the linkages between individuals and groups that may indicate a support network.

    Capitalize on the value hidden in document collections with a unified business intelligence platform to improve your predictive models.Text based information resources such as email and articles can be used with text processing applications such as SAS Text Miner (picture here), to uncover information hidden in document collections, by analysing a elements with common intelligence values and predictive models.

    Terrorists Tracks Uncovered by Information Data-Mining

    Along its effort to combat the networks supporting the IEDs and their producers and operators, JIEDDO has recently launched a new intelligence collection and analysis system aiming to uncover and target the operational, financial and social networks involved in IED deployment. The system was implemented by system integration specialist SAS and Detica, a developer of data analysis tools.

    Detica and SAS combined to provide an analytical solution that addresses the challenges of data access, integration, quality and management. Following this ground work, JIEDDO can now integrate existing data from all relevant sources, and with advanced analytics and reporting capabilities, provide exploitable information to field commanders in theater.

    The JIEDDO solution uses several tools, including data and text analysis, predictive modeling and optimization. Analysts and other end users receive detailed intelligence developed using data driven investigative techniques and link analysis based on social network theory. While the concepts are leading edge, it is a proven technical solution currently running in both government agencies and commercial businesses in the UK and the US. Analysts are provided with client tools and customizable report creation and delivery capabilities that provide intelligence in the most appropriate format for decision makers and other end users. The solution is also customizable to be implemented at all levels of security classification.

    In the modern and developed world, where most of those support networks operate, government agencies and the business sector generate unprecedented volumes of data. Customer profiles, organizational operational performance, and personal behaviour of individuals are monitored by multiple sevice providers.
    Some data resides in structured form in databases or exists as real-time streams. Some exists in unstructured form, for example as e-mails, electronic documents or media files. Whatever the form, there exists huge potential to transform these data into relevant intelligence to improve business decision-making.

    Before the solution could be deployed, JIEDDO had to address various data challenges. Until recently, much of the data received from multiple sources in theater, from DOD and other US government agencies, was not integrated or coordinated with data developed by other units or agencies, it usually remained unstructured or lacked a common format or vocabulary. Also, data quality was problematic because of the amount that was manually keyed or handwritten, the lack of standard format and templates, and the variety of sources.

    SAS is the leading business intelligence and analytical software specialist, providing services to the business and government customers. Specializing in information-intensive areas of security, fraud containment, risk management, regulatory compliance and customer management Detica is also a supplier of information processing systems to the national security market. The companies developed effective tools to handle huge and complex data sources, building systems that aggregate and analyse data to generate useful and relevant intelligence. “SAS and Detica have worked closely with JIEDDO to create a solution that will work toward helping our armed forces fight back against the most effective weapon in the insurgent arsenal,” concluded Tom Mazich, SAS Vice President of Government Operations.

    NATO Establishes Core Geographic Services

    An industry team led by Siemens Enterprise Communications (SEN) and ESRI will develop the Core Geographic Services project that will provide the baseline for the all the alliance’s geospatial systems currently under development. This core will establish a common ground establishing the Geographic Information System (GIS) standards for effective and timely cooperation and collaboration between NATO staff, from the Supreme Headquarters Allied Powers Europe (SHAPE) to NATO’s deployable headquarters (HQ).

    Common standards will enable commanders, analysts, and other NATO network users to fuse geospatial content from Core Geographic Services with other forms of information for command and control, intelligence, and logistics applications. The Core Geographic Services form a key architectural building block in support of NATO’s service-oriented architecture (SOA).

    The system will be based on ESRI’s ArcGIS server which provides services to NATO staff through a Web viewer and to other NATO systems through standard Open Geospatial Consortium, Inc. (OGC), interfaces. For geospatial analysis NATO’s staff will use ESRI’s ArcGIS Desktop with Job Tracking for ArcGIS (JTX) workflow manager.

    Maveric Micro UAV


    At AUVSI 2008 Prioria Robotics, Inc. launched a new version of the MAVERIC. A small system, carried and launched by a single-person, Maveric operates as an autonomous UAS, controlled by Peoria’s Merlin operating system which has unique collision avoidance capabilitiesdesigned into its embedded-vision navigation. Another unique feature of the Maveric is its bendable, carbon fiber wings, allowing storage in a six-inch tube and deployment in less than two minutes with no assembly.


    The airframe is manufactured from lightweight composite materials. These algorithms improve the vehicle’s performance in obstacle-saturated airspace, as in urban area, or in dense woodland. Other skills available in the maverick include target tracking, target identification and precision collision (guided strike).

    The Maveric weighs only two pounds fifty and is designed to carry a payload weight of 200 grams; standard payload includes a forward looking color video camera and another, side looking sensor accommodating either video or IR camera.At AUVSI 08 the company unveiled two redesigend versions of the Maveric, the Maveric 100 equipped with fixed camera and the ‘150, carrying a retractable gimbaled payload and forward looking fixed camera.

    The bird shaped Maveric weighs about 2.5 pounds and is powered by an electrical motor which is inaudible beyond 100 meters. It can fly missions of up to 50 minutes at a speed of 35 mph, or maximum airspeed of 60 mph, at altitudes of 50 – 25,000 ft. Maximum range is 27 km. At the end of its mission, Maveric will return to a predetermined point for skid landing.

    Porcupine Active Protection System

    Porcupine RPG countermeasure assembly, under development at Northrop Grumman, integrates a pack of interceptors (4 or 8) mounted on remotely controlled weapon station side by side with an XM307 crew served weapon. These countermeasures utilize modified LAW rockets, which are aimed and programmed to explode near the incoming rocket, thus neutralizing its warhead at a stand-off distance form the protected vehicle.

    From Venezuela, to India, and the Rise of the Laser Era – a Weekly...

    0
    The opening week of 2026 has been defined by a singular, paradigmatic shift in modern warfare: the "catastrophic failure" of Venezuela's integrated air defense network during a U.S. special operation. The operation succeeded not through brute force, but by rendering Venezuela's Russian S-300VM and Chinese "anti-stealth" radars effectively blind, validating the supremacy of advanced electronic warfare over legacy kinetic defenses. This failure has sent shockwaves through the global defense market, underscoring why nations like Spain and Germany are rushing to modernize their air defense architectures with Western alternatives, while massive procurement programs exceeding $301 billion signal an accelerated transformation toward unmanned systems, directed energy weapons, and indigenous production capabilities.

    Beyond Drones: Key Facts Defining Turkey’s Rise as a Global Arms Giant

    0
    Turkey's defense industry transformation extends far beyond its celebrated drones. Now ranking 11th globally in defense exports, Turkey is executing a comprehensive strategy to become a top-tier arms supplier. With 75% of exports flowing to Western markets and five firms in Defense News' Top 100, Turkey is methodically building a complete defense ecosystem through combat-proven systems, integrated defense diplomacy, strategic self-reliance, and real-world R&D in active conflict zones.

    Skunk Works and XTEND Simplify Multi-Drone Command

    0
    Lockheed Martin Skunk Works® and XTEND have achieved a major milestone in JADC2 by integrating the XOS operating system with the MDCX™ autonomy platform. This technical breakthrough enables a single operator to simultaneously command multiple drone classes, eliminating the friction of mission handoffs. From "marsupial" drone deployments to operating in GPS-denied environments, explore how this collaboration is abbreviating the data-to-decision timeline and redefining autonomous mission execution.

    From Ukraine to Taiwan: The Global Race to Dominate the New Defense Tech Frontier

    0
    As traditional defense primes face mounting competition from agile “neoprimes” such as Anduril, Palantir and Helsing, the balance of innovation is shifting toward software-defined warfare and scalable, dual-use technologies, while global industry consolidation—marked by Boeing’s integration of Spirit AeroSystems and other strategic mergers—signals an intensified race to secure control over the defense technology value chain. Our Defense-Tech weekly report highlights these trends.

    Europe’s “Drone Wall”

    0
    In early October 2025, a coordinated wave of unmanned aerial system (UAS) incursions—widely attributed to Russia—targeted critical infrastructure across at least ten European nations. The unprecedented campaign exposed the fragility of Europe’s air defenses...

    Weekly Defense Update & Global Security Assessment

    0
    Executive Summary The past week (September 18-25, 2025) represents an inflection point where strategic defense concepts have transitioned from doctrine to tangible reality. An analysis of global events reveals four primary, interconnected trends shaping an...

    U.S. Air and Space Forces Push Next-Gen Programs at the AS&C 2025 Conference and...

    0
    At the 2025 Air, Space & Cyber Conference, U.S. Air Force and Space Force leaders unveiled major updates on next-generation fighters, bombers, unmanned systems, and space initiatives, highlighting both rapid innovation and critical readiness challenges as the services race to outpace global competitors. A short version is available here, with a more detailed version for subscribers.