Sponsored by Spectra Group
https://spectra-group.co.uk/
————————————————————————
02 June 22. Pentagon’s AI, data office fully operational as leadership posts filled. A top-level office the Pentagon says will speed the adoption of artificial intelligence and data analytics across the defense ecosystem achieved full operating capability, right on schedule.
The Chief Digital and AI Office, or CDAO, reached full operations June 1, some six months after Deputy Secretary of Defense Kathleen Hicks announced it and laid out a timeline for ramping up. The office achieved initial operating capability at the start of February.
CDAO is billed as an overseer, an expeditor and an enabler of AI, subsuming what were the Joint Artificial Intelligence Center, the Defense Digital Service, the Advana data-and-systems integration platform and the chief data officer.
The office will steer the Department of Defense’s strategy and policy development for AI, data and analytics, as well as flesh out infrastructure the department requires to take full advantage of critical technologies at a time of heated international competition.
“In CDAO, we have brought together data strategy and policy with hands-on implementation and the barrier-removal power of a [principal staff assistant] to apply lessons DoD has learned over the last several years and build upon them with greater scale and momentum,” Margaret Palmieri, the deputy chief digital and AI officer, said in a statement June 1.
A senior adviser to the Pentagon’s chief data officer told C4ISRNET earlier this year that the creation of CDAO instilled a feeling of opportunity among the workforce to align strategies, drive change across the department and embrace data analytics and AI.
Craig Martell, who previously led machine learning at ride-share company Lyft, was in late April named the chief digital and AI officer. Hicks at the time said Martell brings cutting-edge industry experience to apply to a unique set of problems and initiatives.
Martell has no previous Pentagon experience. The Defense Department looked both internally and externally to fill the role.
Other leaders were named Wednesday:
- DCDAO for Acquisition – Sharothi Pikar
- DCDAO for Policy, Strategy and Governance – Clark Cully
- DCDAO for Enterprise Platforms and Business Optimization – Greg Little
- DCDAO for Algorithmic Warfare – Joe Larson
- DCDAO for Digital Services – Katie (Olson) Savage
- Chief Operating Officer – Dan Folliard
- Chief Technology Officer – Bill Streilein
- Chief of AI Assurance – Jane Pinelis
Full administrative alignment of personnel and resources is expected in October. The office reports directly to the deputy defense secretary. (Source: Defense News)
02 June 22. Closely Coordinated. The close coordination of tactical cyberwarfare and electronic warfare is imperative if both are to deliver useful effects on the battlefield.
Much cyberwarfare discussion focuses on the cyberattack threat to critical national infrastructure like power grids, financial systems and politico-military targets. Nonetheless, there is growing interest in how cyberattack could be deployed at the tactical level.
Precedence
Armada previously reported Russian armed forces’ use of cyberwarfare following their 2014 invasion of Ukraine. X-Agent malware, believed to have been developed by Russia’s Fancy Bear cyber espionage group, infected Ukrainian artillery fire control software. The malware retrieved information on the location of Ukrainian artillery units. This was used by Russian Army counter-battery fire which destroyed up to 20 percent of the Ukrainian Army’s 2A18/D-30 122mm howitzer fleet. These figures were compiled by the International Institute of Strategic Studies London-based think tank.
Examples of tactical cyberwarfare are few and far between but interest in the subject is growing. Presentations at this year’s Association of Old Crows’ Electronic Warfare Europe exhibition, held in Montpellier, southern France between 11th and 12th May addressed this subject.
CEMA Approaches
Cyberwarfare is increasingly bundled with Electronic Warfare (EW) in CEMA (Cyber and Electromagnetic Activities) approaches, underscored by the British Army’s 2018 CEMA Doctrine. While distinct missions, cyberwarfare and EW share commonalities: On the battlefield cyberattacks may depend on radio frequency transmissions to reach hostile computer systems. A hostile radio network maybe exploited to carry a cyber attack into a red force tactical Command and Control (C2) system.
EW Europe discussions noted that cyber effects can help multiple EW effects and vice versa. Red force troops could be targeted with cyber attacks on their C2 systems in one place and jamming elsewhere. This could trigger deception: Red force troops adjacent to those being jammed maybe lured into a false sense of security. As their communications are left untouched, they may not believe they are targeted, perhaps unaware their C2 systems are now subtly feeding them false information. A close coordination of tactical cyberwarfare and EW is imperative. Ignoring this risks unsynchronised effects and even electronic fratricide.
Combining cyberwarfare and EW effects enables the targeting of physical layers like radios and rugged computers. Communications networks and computer software can also be attacked. Cyber effects can convey false or demoralising information on red force networks.
As well as having a physical impact on the red force, coordinating cyberwarfare and EW should make the red force behave differently and to its detriment.
Battlefield Interdiction
Combining cyberwarfare and EW may have similar outcomes to the battlefield interdiction efforts of artillery and airpower some distance from the frontline.
A cyberattack against computers controlling a transport hub like an airfield or port may prevent it operating efficiently, or at all. This could slow or stop the delivery of red force materiél into theatre to support planned or ongoing manoeuvre. The cyberattack could spread disinformation that there is nothing wrong at the transport centre and that it is functioning normally.
Combined cyber and electronic warfare effects against targets like transport infrastructure could be exploited for battlefield interdiction.
As a result, the red force continues to move materiél into the hub. This causes congestion as the hub cannot handle the traffic. Feedback cannot be sent up the red force chain of command explaining the situation as EW systems are jamming local civilian and military communications. As one presentation summarised “port infrastructure is rendered inoperable. Adversarial forces are delayed from disembarking (and the) fight can be fought on the terms of the friendly force”: All without a shot being fired.
Tactical cyberwarfare is a reality. Although cyberwarfare and EW have their unique attributes and missions, they need to coordinate to ensure maximum effect. Ignoring this invites chaos and possible electronic fratricide with devastating effects. At the same time, closely coordinating cyberwarfare and EW effects promises to have an impact well beyond the tactical edge. (Source: Armada)
02 June 22. Torn Asunder. Wrecked antennas from a Russian Army Torn COMINT system captured by Ukrainian forces. Armada continues its open-source analysis of Russian land forces’ electronic warfare capabilities deployed to the Ukraine theatre of operations, this month examining the Torn electronic warfare system.
The Russian Army’s Torn Communications Intelligence (COMINT) system is considered one of the most modern Electronic Warfare (EW) capabilities in service with its manoeuvre force. Torn hit the headlines in March when Ukrainian forces reported they had captured a system deployed to Ukraine.
This is not the first time Torn has deployed to Ukraine. In 2019, the Organisation for Security and Cooperation in Europe discovered a system deployed in the southern Donetsk region.
Capabilities
Little is known about Torn. Open sources say it can detect, identify and localise emissions across wavebands of 1.5 megahertz/MHz to three gigahertz/GHz. This would allow it to collect COMINT on High Frequency (HF: three megahertz to 30MHz) and Very/Ultra-High Frequency (V/UHF: 30MHz to three gigahertz) emitters.
Torn uses two Kamaz-5350 trucks. One accommodates the systems’ antennas, processing equipment and operator workstations. The other carries rigging and cabling supporting the antennas.
Kamaz-5350 trucks carrying the Torn electronic warfare system are seen here in this screen grab from the Ukrainian media.
Deployment
Jonas Kjellén’s 2018 publication Russian Electronic Warfare: The role of Electronic Warfare in the Russian Armed Forces, gives some illuminating detail. Mr. Kjellén explains that Torn is thought to have been in service since 2012. It deployed into Russian-occupied Ukraine from 2015. Interestingly, Torn is not deployed at the tactical level with EW companies equipping army manoeuvre formations. Instead, it equips reconnaissance units organic to the army’s motorised rifle and tank brigades and divisions.
This is almost certainly to enrich the tactical reconnaissance picture. The army’s EW companies provide organic electronic warfare support to the manoeuvre force to help achieve electromagnetic superiority and supremacy. EW systems used by reconnaissance units, on the other hand, most probably help enhancetactical intelligence.
Assuming each manoeuvre formation has one Torn system deployed with its reconnaissance battalion, this could mean that 32 systems either furnish, or are furnishing, the army writ large. This would see one system deployed with each army manoeuvre formation. Armada also estimates that a single Torn may be deployed with the 6th Combined Arms Army’s 96th Separate Reconnaissance Brigade. This unit is part of the Western Military District. Given the number of army manoeuvre formations in Ukraine Armada assesses that up to 28 Torn systems may have been deployed.
Assessment
Open sources say Torn is capable of detecting, locating and identifying emitters at ranges of up to 70 kilometres/km (38 miles). As we did in early May regarding the Russian Army’s Repellent-1 counter uninhabited aerial vehicle system, we decided to see if these claims stack up. Using MASS’ Battleye electronic warfare mission support tool, it is possible to assess Torn’s potential attributes.
We programmed Battleye with Torn’s specifications. For the purpose of this simulation, we used a single system deployed on relatively flat ground to the south of Lysychansk, eastern Ukraine. Battleye’s simulation assesses that open-source estimates of Torn’s capabilities maybe exaggerated, but not by much. A single system is assessed as having a 60km (32-mile) detection range for ground-based HF and V/UHF emitters. This is less than the 70km estimated in open sources. Interestingly, as regards this system, it seems that open-source assessments are only a slight increase to those of Battleye.
An estimation of the Torn COMINT system’s coverage using Battleye illustrates that emitters operating on frequencies of 1.5MHz to three gigahertz can be detected, located and identified at ranges of 60km. The green circle shows this can be done with between 90 and 100 percent certainty.
Armada will continue assessing Russian Army EW capabilities as the war in Ukraine continues and additional open source information comes into our possession. Stay tuned! (Source: Armada)
02 June 22. New EW products.
Hensoldt unveiled the company’s new Kalaetron Attack electronic warfare system in late April. Kalaetron Attack is designed to protect airborne platforms. This new system joins the company’s Kalaetron product line which includes the Kalaetron Radar Warning Receiver launched in 2019. Kalaetron Attack uses an Active Electronically Scanned Array (AESA) jammer. Company artwork demonstrated this in a podded configuration. A press release announcing the news stated that Kalaetron Attack has been developed as an escort jammer to provide overarching protection for strike packages of aircraft. Although not disclosed, it is possible the pod detects and jams emitters across two gigahertz/GHz to 40GHz waveband. Plans to develop the Kalaetron Attack system were revealed by the company in 2019. In March, the Luftwaffe (German Air Force) confirmed it would procure a new version of the Eurofighter Typhoon as an EW platform. This replaces the circa 20 Tornado-ECR jets the force currently uses for air defence suppression. It would not be surprising if the Kalaetron Attack pod forms part of the fit for these forthcoming Typhoon-ECRs.
Reports in May revealed that Avantix’ FlashHawk airborne communications intelligence system has entered production. The system can equip an array of fixed- and rotary-wing, inhabited and uninhabited aircraft. FlashHawk covers frequencies of 30 megahertz/MHz to three gigahertz, providing a one-degree root mean squared accuracy for emitters of interest. Once an emitter is detected, an accompanying optronics system can be immediately cued in its direction. As Armada reported in the past, FlashHawk flight tests have been performed using a Beechcraft King Air-350 turboprop transport. Avantix is also proposing the system for the Diamond DA-62 turboprop aircraft. There are no details on any customers for FlashHawk, although its entry into production suggests the system has won orders.
Saab’s new Sirius Compact EW system has a scalable, modular design. As a result it can be used in several applications from UAVs to fixed installations. It is shown here in a mast-mounted configuration.
May saw Saab unveil its new Sirius Compact electronic warfare system. A company press release revealed that Sirius has been designed as a lightweight electronic support measure. It can equip an array of platforms. These include uninhabited aerial vehicles, ground vehicles, backpack and mast-mounted applications, the press release continued. Saab said that the Sirius Compact has a scalable, modular design allowing it to be used in a stand-alone configuration, or as part of a larger network of sensors. The company says it has shared development and production between its facilities in Finland and Sweden.
Noisecom has shared details with Armada concerning their UFX7000B programmable noise generator, NC1000 series amplified noise module and NC3000 series calibrated coaxial AWGN noise sources. Matt Diessner, director of business development for the Wireless Telecom Group, which includes Noisecom, revealed that the UFX7000B was released late last year. The NC1000 and NC3000 modules have been available for over 30 years, he continued: “The specifications for higher frequency, wider bandwidth and increased power levels have evolved based on client demand.” The company’s products can be customised with Mr. Diessner saying that “we have made specific custom modules for clients based on bandwidth and power levels for their needs.” He added that “Noisecom is looking to work with clients where we can build an integrated solution (combining) the noise source, higher power amplifier and attenuators that are fixed or variable that drive the optical modulator. This can reduce the size, reduction of power supply connections and allow them to focus on the optical issues offloading the RF (Radio Frequency) demands.”
Programmes
In early May, the world was greeted to its first glimpse of the Royal Australian Air Force’s (RAAF) new Gulfstream MC-55A Peregrine Intelligence, Surveillance and Reconnaissance (ISR) aircraft. The plane was photographed taking off from Gulfstream’s factory in Savanah, Georgia. The heavily modified jet features a ventral canoe fairing, along with enlarged tail cone and a fairing atop the vertical stabiliser. An article on thedrive.com speculates these house optronics and a satellite communications antenna respectively. Noteworthy are the multitude of blade antennas on the ventral fuselage. These most probably provide high degrees of bearing and location accuracy for emitters of interest detected by the aircraft. Although not disclosed it is probable that the aircraft will detect emitters across at least 500MHz to 40GHz. This will enable the aircraft to gather communications intelligence on hostile radio systems and networks. At the same time, it will be able to collect electronic intelligence on hostile radars. In 2017 it was revealed the US State Department had approved a foreign military sale of an ISR aircraft to the Australian government. The programme is worth circa $1.5 bn in 2022 values. This results in a unit price of circa $375 m. Mission systems are believed to have been provided by L3Harris. The US Air Force’s Big Safari signals intelligence unit at Wright-Patterson airbase, Ohio is also believed to be involved in the programme. The RAAF is expected to acquire four of the jets.
Staying with the USAF, on 18th May militaryaerospace.com reported that the Air Force Research Laboratory (ARL) had awarded a contract worth $4.5 m to BlackHorse Solutions. The award was made via the ARL’s Multi-Spectral Sensing Technologies Research and Development (MUSTER) programme. MUSTER is developing radio frequency and optronics sensors for offensive and defensive applications. Under the contract, BlackHorse will work to improve RF sensing systems supporting situational awareness and targeting applications as part of the MUSTER project.
Meanwhile, Northrop Grumman has been awarded a $254.4 m contract by the US Navy to build AN/SLQ-32(V)7 Block-3 Surface Electronic Warfare Improvement Programme (SEWIP) systems. Reports stated that the work will be completed by 2025. The contract award follows on from the firm’s low-rate initial production award for AN/SLQ-32(V)7 SEWIP Block-3 systems in early 2019. The SEWIP programme is an overarching modernisation of US Navy surface ship electronic warfare capabilities.
Operations
In late April spacedaily.com reported that Microsoft had determined that hackers working for the Russian government had performed hundreds of cyberattacks against Ukraine since the war began. The report stated that Russian cyberattacks are often coordinated with specific actions on the battlefield. Microsoft had countered 237 distinct cyber operations waged by the Russian government, or its proxies, against Ukraine. The company continued that separate Russia-aligned nations had performed similar attacks against Ukraine. The report did not reveal the identity of these states. Microsoft said it is working with Ukrainian cybersecurity experts and other companies to blunt the effectiveness of Russian attacks. Attacks have been performed against the Ukrainian government and Ukraine’s critical national infrastructure. Microsoft said that Russia’s efforts had included so-called ‘wiper attacks’. These delete vital computer data in hacked systems. Microsoft continued that the attacks began just under one year before the Russian government commenced its invasion of Ukraine on 24th February. The company added that the observed attacks are probably a fraction of the cyberwarfare performed against Ukraine both before and during the conflict. (Source: Armada)
02 June 22. Airbus strengthens its cybersecurity activities. Airbus is taking steps to strengthen and grow its cybersecurity activities throughout the Group. The company will showcase its cybersecurity solutions at the International Cybersecurity Forum (FIC) from 7th to 9th June 2022 in Lille (France). With the exponential cyber threats, along with the increasing digitalisation and connectivity of its products and systems, cybersecurity has become a strategic and pivotal component of Airbus development and future. The company has therefore undertaken a series of actions and investments to further develop and strengthen its cybersecurity capabilities and expertise, ensuring the best possible protection for the company, its ecosystem, and its customers.
Thus, Airbus has decided to combine its existing Company-wide cybersecurity services activities in a single organisation which will go live on 1st July 2022. The new organisation, which will focus on cybersecurity and safety services, especially in the industrial sector will bring together more than 1,000 experts based in France, Germany, the UK and Spain. It will provide a unique global service offering to protect the Group and meet the needs of national authorities and commercial customers including critical infrastructures.
Besides this services activity, cybersecurity teams dedicated to large projects will develop further their expertise and business for defence and space customers and programmes. 400 experts will contribute to major integration projects in France, Germany, UK and Spain around high-level technologies such as cyber defence and cryptography.
Furthermore, Airbus has recently acquired DSI, a Germany-based company certified by the Federal Office for Information Security (BSI) that provides cryptography and communication systems for the space, airborne, naval and land sectors.
For its cybersecurity products, Airbus has just launched a double-digit m euros investment plan – mostly focused on R&D activities – in its Stormshield subsidiary. The company, which gathers 400 experts and offers data, endpoint and network security solutions will increase the capabilities and performance of its product lines and accelerate the development of its international activities.
Within a fast-paced sector where the turnover of employees is high, Airbus continues to invest in talents, having recruited several hundred cybersecurity experts in recent years and foreseeing an increasing need of cyber skills at all levels. Among many initiatives in this domain, Airbus has just launched its own diploma in cybersecurity. The first 25 students will start their degree-level training programme in cybersecurity in September 2022. To discover Airbus’ capabilities, meet us at the FIC – Stand F22.
27 May 22. US Army aviation exercise focuses on communicating with allies. In the U.S. Army’s second annual aviation-focused exercise, a unit from the Netherlands digitally requested a casualty evacuation from the U.S., marking new success interoperating with foreign partners.
What exercises with allies and partners have shown over the years is that this type of interoperability remains challenging, but military officials say repetition and practice are key to making strides.
The casualty evacuation mission was “a good example of that progress there,” Brig. Gen. Brandon Tegtmeier, deputy commanding general of the 82nd Airborne Division, told Defense News in an interview following the completion of the exercise known as EDGE 22, which took place at Dugway Proving Ground, Utah, earlier this month.
“That’s just a small thing,” he said. “We have a lot of progress to make still, but again, a really good step forward.”
Additionally, the Army reported a call for fire was achieved through a Dutch-run waveform.
The Army’s EDGE series of exercises began last year and is slated to continue annually in coordination with Project Convergence, a larger event in the fall. EDGE is considered the practice round for the aerial tier of PC. This year, Project Convergence, now in its third iteration, brought in international partners for the first time; EDGE then followed.
Project Convergence examines and tests how the Army plans to fight against near-peer adversaries across all domains using capability slated for fielding in roughly 2030 and beyond.
EDGE, this year, was focused on a European theater scenario centered around a wet gap crossing. The 82nd Airborne and other allied units at the exercise were tasked with defeating an enemy’s integrated air defense systems. That would then lead to the second phase, introducing maneuver forces through air assaults to seize two different pieces of terrain.
Netherlands, Italy and Germany were active participants in the exercise, while Australia, Canada, France and the United Kingdom were observers.
German and Italian forces participated in the combined air assault with the 82nd. The Germans brought their German Future Soldier System, and Italian soldiers brought their Targeting and Communication Command Kit.
The Netherlands contributed its Joint Air Ground Gateway, a command-and-control tactical node, and was able to successfully integrate the node into the Windows Tactical Assault Kit (WINTAK), a map-based application that provide operators position data, a chat function and mission planning capabilities across a shared picture.
The exercise relied on the Variable Message Format communication protocol, understood by all NATO forces, to communicate.
“I think everybody would admit we are not where we need to be with our allies,” Tegtmeier said. “I think having those nations present out at Edge 22 is a huge step forward in terms of fixing that problem.”
Exercises like EDGE, he noted, generate new technology ideas and new possibilities to increase interoperability.
In the scenario, the 82nd’s Tactical Command Post served as a Combined Joint Task Force headquarters. The headquarters was positioned well outside the range of enemy long-range fires that it would not have been able to assume using current fleet capabilities. The Army expects to have vast improvements when it comes to speed and range from its Future Vertical Lift fleet with a planned fielding timeline of 2030.
The work the Army did as a coalition with its allies “really informed our gaps when it comes to cross-domain solutions within the coalition,” Maj. Gen. Wally Rugen, who oversees the Army’s FVL development, told Defense News in a recent interview.
“It went much better than expected,” he added.
The exercise also helped the service and its coalition partners further understand the technical challenge of achieving the ultimate interoperability goal — being able to work from a single screen in the CJTF environment.
The coalition used a cross-domain solution certified waveform to perform a number of vignettes in which sensitive but unclassified data was passed into a secret enclave and then out to an unclassified one.
“The reason that’s important is really being able to go from strategic to tactical, tactical to strategic in a very agile manner,” Rugen said, referring to the way digital data was securely passed between those performing the tactical mission and the headquarters coordinating the mission.
But coalition interoperability remains a challenge, Rugen said, because it’s not yet clear what data should be passed and what the U.S. and its partners should keep to themselves.
“We should have the ability to filter that [data] out but still provide useful information to our coalition partners and vice versa,” Rugen said. “There’s an ability to filter out that metadata and then give useful things to either the tactical edge or the strategic decision makers.”
Findings at EDGE will inform policies going forward, he noted.
Moving forward, the coalition needs to come to a decision on what waveforms and databases are used as a standard of operation and construct a gateway that allows the right data to flow, Rugen said. Then that gateway has to be interoperable within everyone’s network.
In EDGE, the Army used a variety of waveforms including TSM and Link-16.
During the exercise, “we didn’t necessarily care what the parallel network was, if somebody has a different one. … It doesn’t matter what the black box is,” Rugen said. In other words, the exercise proved interoperability as a concept, but the Pentagon and its allies and partners will have to determine what hardware and software will be standard.
The Army, over 19 days at EDGE, said it achieved 67 technical objectives with 34 first-time events using over 17 distinct FVL-related technologies and capabilities.
These included experimentation with an Air-Launched Effects swarm launched by a surrogate aircraft flying as Future Attack Reconnaissance Aircraft. The swarms evaluated at EDGE mark the largest ALE-small swarm to date. The Army deployed about 25 drones in four waves using the service’s “Wolfpack” concept for intelligent swarms, allowing the aircraft to stimulate, hunt, kill and assess threats.
The Army also used two waveforms that allowed the swarm to double ALE range from missions executed last year.
And the service’s Aerial Tier Network (ATN), which provides digital and voice communication, saw further refinement and improvement, according to Rugen.
The Army also evaluated a number of dual-use sensors typically used for protection, but, at EDGE, were used for lethal effects. Radar warning receivers in aircraft cockpits, for example, transferred data of incoming fire through the network to the CJTF to be used for targeting, Rugen said. (Source: C4ISR & Networks)
31 May 22. Nigeria: Arrest of cyber gang members unlikely to alter cyber threat landscape due to Nigeria’s declining socio-economic stability. On 30 May, Interpol disclosed that a joint operation with 11 Southeast Asian countries led to the arrest of three Nigerian hackers for stealing funds and credential details. The law enforcement agencies claimed that the three individuals utilised the Remote Access Trojan (RAT) known as Agent Tesla to target organisations, including oil and gas firms, in the Middle East, North Africa, and Southeast Asia. This is the latest effort to crack down Nigerian cyber crime since Interpol arrested an alleged high-ranking member of the SilverTerrer (TMT) gang in late May (see Sibylline Cyber Daily Analytical Update – 26 May 2022). While Interpol plans to launch more clampdown operations in the coming year, such actions are unlikely to significantly deter cyber gangs. Indeed, the negative socio-economic effects of the Covid-19 pandemic have led a number of young Nigerians to increase their reliance on cyber activity to generate revenue. Given these factors and some cyber attacks’ low technical requirements, cyber crime will likely increase amongst unemployed youth, heightening the risk of further attacks against targets of interest, such as financial services providers. (Source: https://www.gov.uk/)
31 May 22. Prime Minister Anthony Albanese has unveiled his new ministry, introducing a new portfolio to oversee cyber security.
Clare O’Neil has been announced as minister for home affairs and minister for cyber security during a press conference by Prime Minister Albanese this evening.
Minister O’Neil succeeds former Minister Karen Andrews, who also supported the implementation of much of the previous government’s cyber security policy as home affairs minister.
The former government did not have a separate minister for cyber security, with Prime Minister Albanese also confirming that Minister O’Neil will now join him in cabinet.
Meanwhile, Deputy Prime Minister Richard Marles has been named as the new minister for defence, succeeding Peter Dutton in the portfolio.
Minister Marles had served as shadow minister for defence for a stint in opposition but was replaced prior to the election by Brendan O’Connor after being elevated to deputy leader of the Labor Party. (Source: https://www.cybersecurityconnect.com.au/)
30 May 22. Global: Ransomware group’s resurgence is likely temporary and a façade to facilitate the shuttering of its cartel. On 28 May, IT security company NCC Group reported a significant uptick in attacks launched by the supposedly defunct ransomware group CLOP. According to dark web investigations, the victims published on CLOP’s data leak site increased from 1 to 21 between March and April. While little is known about the targeted organisations, the two most impacted sectors were industrial and tech organisations. CLOP’s cyber criminal activity has declined noticeably since the Ukrainian National Police (UNP) arrested six of its hackers in June 2021, with CLOP reportedly being the most inactive ransomware group in March (see Sibylline Cyber Daily Analytical Update – 17 June 2021). It is unclear what brought about CLOP’s apparent resurgence. However, a likely explanation is that CLOP, much like the Conti group, is uploading previously unpublished victims’ data and/or launching new attacks as a subterfuge while its members defect to other ransomware groups. Regardless of the rationale, such a development is unlikely to significantly alter the cyber threat landscape in the short term. Other high-profile cyber criminal groups, such as LockBit 2.0, are highly likely to continue targeting industries of interest, such as agribusiness, in the coming six months. (Source: PR Newswire)
30 May 22. Pentagon eyes mobile MIMO networking capability. Information and network technology specialists at the US Department of Defense (DoD) are poised to evaluate potential solutions to meet multi-input, multi-output (MIMO) requirements for on-the-move tactical communication networks. Industry submissions for the distributed MIMO (D-MIMO) development effort are due to the department’s Research and Engineering directorate by the end of June, according to the request for sources (RFS) solicitation issued in April. The D-MIMO programme is part of a larger DoD-led advanced mobile communications development effort known as the Innovate Beyond 5G (IB5G) programme. Research and development (R&D) work conducted under the IB5G umbrella will focus on design, prototyping, and integration of “novel IB5G network concepts and components” to support the department’s data-centric networked communication strategy. Specifically, the IB5G initiative is looking to leverage advanced technology concepts like human-to-machine and machine-to-machine interfaced communications and scaling those systems and applications to the internet of things (IoT), according to the RFS. (Source: Janes)
24 May 22. Defense-Focused Survey Reveals Military Personnel Concerned About Communications Being Surpassed By Adversaries And Lack Of Current Action. Despite signs of improving U.S. defense communications reliability, the survey points to growing concern among Department of Defense (DoD) personnel about U.S. military communications’ capabilities being surpassed by adversaries and a lack of current action being taken to address this challenge.
Viasat Inc., global communications company, announced results from its Annual State of Military Communications study conducted by the Government Business Council (GBC), the research division of Government Executive Media Group. Despite signs of improving U.S. defense communications reliability, the survey points to growing concern among Department of Defense (DoD) personnel about U.S. military communications’ capabilities being surpassed by adversaries and a lack of current action being taken to address this challenge. A copy of the complete survey report can be found here.
According to the third annual survey, more than two-thirds (68%) of respondents said they believe near-peer adversaries will match or surpass U.S. military communications capabilities within five years, including 36% believing this will happen in the next two years. In addition, nearly three-quarters (73%) of DoD respondents believe that U.S. defense communication technologies are on par with or falling behind those used by adversaries, which represents a 13-percentage point increase from 2020.
These findings come despite DoD personnel also reporting greater reliability in their own experience with defense communications. More than half (52%) of respondents said they rarely or never experience a complete loss in connectivity, a significant increase from 34% in 2020 and 24% in 2019, indicating steady year-over-year improvement in reliability. However, 85% of respondents still reported experiencing at least one such disruption in the last year.
Other key findings from the survey include:
Actions aren’t aligned with beliefs yet on communications improvements and value in commercial capability
- 83% of respondents said they believe improvements to defense communications should be a top or high priority for their agency compared with other priorities. Also, a majority (55%) of respondents agreed commercial capabilities can deliver the same or better levels of performance compared to DoD purpose-built communications.
- Additionally, more than half of respondents (59%) agreed increasing the use of commercial solutions is critical to accelerating strategic initiatives like Joint All-Domaine Command and Control (JADC2) or other joint warfighting programs.
- However, when asked if their agency would adopt commercial defense communications technology and services in the next year to keep pace with adversaries, just 33% said commercial communications adoption was very (26%) or extremely (7%) likely to happen. Similarly, just 35% of respondents said their agency was taking advantage of new acquisition processes and mechanisms like OTAs and as-a-service models to help update defense communications technologies.
Space-based networks and commercial solutions needed for future warfighting
- More than three-quarters (77%) of respondents agree the future fight will require advanced space-based networking capability to meet operational and mission needs. But, despite acknowledging the importance of space networks, just 19% said their agency was actively investing in advanced satellite communications to support modern warfighter needs.
Cyber-attacks on defense communications technology/infrastructure remain a challenge
- 40% of respondents feel their agency is adequately prepared for a cyber-attack on defense communications technology/infrastructure. While this may signal an improvement from 2020, when only 24% of respondents were very or extremely confident in their agency’s preparedness for a cyber-attack on defense communications, it is still concerning that nearly three in 10 respondents (28%) don’t think their agency is adequately prepared for such a cyber-attack.
Next-gen technologies needed to advance defense communications, but investment is lagging
- Artificial Intelligence (AI), cloud computing and 5G technology were the top technologies selected by respondents to advance defense communications capabilities. However, active investment in these technologies appears to be lagging with just 27% of respondents saying their agency is actively investing in AI and 26% in 5G. Cloud was the biggest priority next-gen technology, with 37% saying their agency is actively investing in cloud to support defense communications.
“In its third year, the State of Military Communications survey highlights both encouraging and concerning trends surrounding the future of U.S. military communications. Government is recognizing the need to modernize defense communications and the value of commercial capabilities,” said Craig Miller, president of Viasat Government Systems. “But cultural change is often more difficult than technological change. DoD personnel see adversaries closing the capabilities gap and know new approaches are needed if the U.S. is going to maintain an advantage. Multi-domain communications and data transport is not only vital to missions, but it will likely be a deciding factor in future conflicts.” (Source: Satnews)
27 May 22. UK-Russia: Moscow will increase targeting of countries supporting Kyiv with misinformation to sow unrest amid protracted conflict in Eastern Ukraine. On 25 May, Google’s Threat Analysis Group (TAG) disclosed that the Russian state-linked hacking group ColdRiver is likely responsible for a website leaking emails between prominent Brexit politicians. The leaked emails purport that hard-line pro-Brexit figures – such as former head of MI6 Richard Dearlove – conspired to remove then British Prime Minister Theresa May and replace her with current Prime Minister Boris Johnson during the EU withdrawal negotiations in 2019 because of Johnson’s firmer stance. If the authenticity of these emails is officially confirmed, this would constitute the latest Russia-linked leak since UK-US trade documents were leaked before the 2019 UK general election to influence the vote. While the aim of this latest campaign is unclear, there is a high likelihood that it is attempting to sow unrest and limit the UK’s capacity to provide aid to Kyiv during its conflict with Russia. Moscow’s concerns over its limited military successes in Eastern Ukraine are likely to remain high in the coming weeks. As such, further misinformation campaigns are expected to be launched against countries providing aid to Ukraine, such as during the US mid-term elections, in support of Russia’s military operations in the Donbas. (Source: Sibylline)
————————————————————————-
Spectra Group Plc
Spectra Group (UK) Ltd, internationally renowned award-winning information security and communications specialist with a proven record of accomplishment.
Spectra is a dynamic, agile and security-accredited organisation that offers secure Hosted and Managed Solutions and Cyber Advisory Services with a track record of delivering on time, to spec and on budget.
With over 15 years of experience in delivering solutions for governments around the globe, elite militaries and private enterprises of all sizes, Spectra’s platinum and gold-level partnerships with third-party vendors ensure the supply of best value leading-edge technology.
Spectra was awarded the prestigious Queen’s Award for Enterprise (Innovation) in 2019 for SlingShot.
In November 2017, Spectra Group (UK) Ltd announced its listing as a Top 100 Government SME Supplier by the UK Crown Commercial Services.
Spectra’s CEO, Simon Davies, was awarded 2017 Businessman of the Year by Battlespace magazine.
Founded in 2002, the Company is based in Hereford, UK and holds ISO 9001:2015, ISO 27001:2013 and Cyber Essentials Plus accreditation.
————————————————————————-