cyber
-
Machine learning, deep learning networks support drone security in UND research project
A research team from the University of North Dakota (UND) has been working since mid-2017 under a grant from Rockwell Collins with the aim of addressing cybersecurity concerns involving unmanned aerial systems (UASs), more commonly called drones. The research, which is concluding in early 2019, has expanded to include a swarm of small-scale UASs, giving UND students real-world, hands-on experience using machine learning and neural networks to detect multiple targets in national airspace.
-
Ballistic missile radars pushed to detect widening range of threats
As adversaries develop missile technology to attack the U.S. in ways that can challenge our missile defense - such as conventional and nuclear intercontinental ballistic missiles, sea-launched land-attack missiles, hypersonic weapons, and space-based missiles that orbit Earth - it's critical to have radar systems capable of providing early detection.
-
Radar/electronic warfare funding up, but AI takes first dibs
Department of Defense (DoD) funding is crucial to continue advancements in radar and electronic warfare (EW) systems. “DoD budgets are always difficult to characterize directly,” says Chris Rappa, product line director for Radio Frequency, Electronic Warfare and Advanced Electronics within BAE Systems FAST Labs [Arlington, Virginia], “there are few line items that directly point to [...]
-
GAO: DoD has a pervasive weapon systems cybersecurity problem
Weapon systems operated by the U.S. Department of Defense (DoD) are more software-dependent and networked than ever before, which a new General Accounting Office (GAO) report says opens the door to mission-critical cyber vulnerabilities. The DoD intends to spend $1.66 trillion to develop its current portfolio of major weapons systems, so Congress asked the GAO to assess DoD weapon systems security in terms of its current state, vulnerabilities, and steps being taken to develop more cyberresilient weapon systems. To do this evaluation, GAO analyzed weapons systems cybersecurity test reports, policies, and guidance; what they found is disturbing: In recent cybersecurity tests of major weapons systems the DoD is developing, testers playing the role of the adversary were able to take control of systems relatively easily, cause damage quickly, and operate largely undetected.
-
Milestone in abstracting the hardware: Realizing the promise of FACE
The Future Airborne Capability Environment (FACE) Consortium, part of The Open Group, was formed to establish a standard common operating environment to support portable capability-based applications across Department of Defense (DoD) avionics systems. Key to the common operating environment envisioned by FACE is the definition of an interface for operating systems and board support packages (BSP) that enables the hardware portion of a system to be abstracted, greatly increasing the portability and reusability of software applications. With the wide adoption of FACE, system integrators can reap tremendous benefits in interoperability and cost.
-
FMC enhancements for growing high-speed data needs
Field-programmable gate array (FPGA) technology has proven to be invaluable to embedded designers for many years. Often acting as an all-in-one solution, FPGAs negate the need for ASIC [application-specific integrated circuit] technology and reduce the cost of custom IP algorithms in silicon. FPGAs have even aided in derisking designs by allowing engineers to modify their logic after silicon is on the board. This approach allows for more efficient prototyping and a faster time to market.
-
New rotorcraft designs, silent operations are key goals in Army, Uber partnership
Warfighters on missions and Uber passengers hitching rides will soon have something in common - both getting done thanks to what are essentially unmanned, flying cars. The U.S. Army Research Laboratory (ARL) and transportation company Uber are partnering to advance future vertical lift technologies to push forward the U.S. Army's modernization efforts.
-
The future of military systems is software-defined and virtualized
Software-defined open virtualization solutions are a smart way to implement next-gen military systems: They're easier to maintain and enable future software and hardware upgrades with minimal risks, costs, and downtime.
-
Foreshadow: Researchers discover another Intel processor vulnerability
Two international teams of security researchers have independently and concurrently discovered "Foreshadow," a new variant of the hardware vulnerability known as "Meltdown" that was announced earlier this year. Meltdown can be exploited to bypass Intel...
-
No room for compromise in supply chain security: New DoD initiative establishes benchmark for strategic ICT sourcing
In response to the growing nexus between physical risk (counterfeits) and cyber risk (infiltration of systems and exfiltration of data) the U.S. Department of Defense (DoD) has introduced a new policy adding security as a fundamental pillar of federal acquisition and supply chain risk management. Component manufacturers in the military and aerospace arenas - as well as those in all high-tech verticals - can adopt current and emerging best-practice approaches to mitigate both cybersecurity threats and counterfeit component exposures.