Sponsored by Spectra Group
https://tacs.at/Spectra
——————————————————————-
12 Sep 19. NZ issues RfI to advance its networked army. New Zealand has initiated Tranche 2 of its Network Enabled Army (NEA) programme following governmental approval in July. The project is digitising the New Zealand Defence Force’s (NZDF) command-and-communications technology, BMS and secure satellite communications.
Investment in Tranche 2 totals NZ$106m ($68.2m) till 2022. Defence Minister Ron Mark told Shephard the funding enables the C4 project, which was established under the first tranche of the NEA in 2015, to continue building capability.
‘Tranche 1 has laid the foundations and delivered capability to the highest-priority personnel initially. Trialling and evaluation has taken place ahead of expanding the reach of the capability. The focus of Tranche 2 is the digital communications and other systems for equipping dispersed command elements, such as medial and logistics headquarters,’ Mark said.
It will extend the capabilities across a 250-man light task group.
Tranche 2 funding also initiates an ISR project to deliver improved situation awareness to support deployed commanders with new sensors and intelligence gathering and processing.
‘As this project is in its definition phase, confirming requirements and engaging with industry will be a focus of its work. Future delivery will involve a progressive rollout of capabilities,’ Mark said. ‘This project’s priorities have included establishing the network – a combination of hardware and software to enable the functionality required – and setting up the facilities and systems for testing, research and evaluation of hardware and software. This will ensure that any future introduction of capability is compatible and can be integrated with existing systems.’
An RfI for the NEA’s ISR and EW capabilities was released in August to gather details about possible solutions. The intention is to fill the capability gap in ISR, EW and processing, exploitation and dissemination with new systems for a combined-arms battalion group. The RfI said it wants to ensure land and special operations forces can collect information and intelligence (I2) using ISR/EW sensors, and that a deployable sensitive compartmented information facility can allow them to access and process the intelligence.
It also wants to upgrade existing EW capabilities and integrate collection sensors into the Land Tactical Information Network and BMS, and integrate with multinational partners.
The new ISR/EW systems must be compatible with the existing Sitaware BMS from Systematic, and Harris radios for the Mobile Tactical Command System, already selected under Tranche 1.
ISR/EW is divided into three work streams: I2, reconnaissance and surveillance, and EW.
The I2 capability will be delivered though a deployable all-source cell (ASC) to support the land commander. The ASC must be able to analyse information from organic assets. To do this, the ASC needs to access large databases, software that allows personnel to conduct analysis, fusion software to process information from multiple single sources into fused intelligence products, a collection and management system, and software to support mission planning and tasking.
Reconnaissance/surveillance systems include new sensors for a variety of platforms eg soldier-, UAS- and vehicle-mounted systems. These include night vision systems, acoustic sensors, ground surveillance radar, unattended ground sensors, laser surveillance and warning systems.
The RfI said the EW work-stream will deliver ‘tactical modular and scalable EW capability, for the interception, geolocation and disruption of an adversary communications network’. It will allow the formation of light EW teams with a command post to manage collection elements such as electronic support/attack and processing.
Open-architecture collection elements need an ‘on-the-march man-pack solution, semi-static dismounted man-portable solution, and mobile mounted solution, possibly supported by aerial sensors’.
Tranche 3, expanding capabilities across a larger deployable force and refreshing earlier systems, should begin in 2021. (Source: Shephard)
10 Sep 19. Curtiss-Wright Debuts New Multi-Sensor Video Gateway for ISR Platforms. Rugged RVG-MS1 video gateway/video multiplexer manages analog & digital sensor inputs while easing operator-defined selection of mission display views. Curtiss-Wright’s Defense Solutions division, a proven leading supplier of deployed video management solutions, has announced the newest addition to its Rugged Video Gateway (RVG) family of commercial off-the-shelf (COTS) video management solutions with the introduction of the Multi-Sensor Rugged Video Gateway (RVG-MS1), a military standard system designed to provide multi-input and output capability for demanding video sensor applications. Today’s state of the art deployed intelligence, surveillance, and reconnaissance (ISR) systems rely on numerous types of advanced sensors, including infrared cameras, thermal imaging systems, and laser target designators, that require a low latency distribution system for mission success. The management of these analog and digital inputs is optimized through the use of video gateways that support flexible display of imagery and information.
The RVG-MS1 receives and processes a platform’s sensor signals and then outputs them to a Curtiss-Wright or similar display, enabling operators to simultaneously view multiple sensor feeds, in different configurations, at the touch of a single button. The unit’s easy to use graphical user interface (GUI) allows operators to intuitively select the operational view that best supports their mission. For example, image configuration options include flexible picture in picture (PiP) and single, dual, triple, and quad mode window overlays. The video gateway also supports video streaming and blending capabilities. What’s more, because the RVG-MS1 functions as an Ethernet gateway, it facilitates video streaming for platforms built to the latest vehicle architectures, such as VICTORY and GVA.
“Curtiss-Wright’s rugged COTS-based video management solutions are designed to increase warfighter effectiveness and help drive mission success,” said Lynn Bamford, Senior Vice President and General Manager, Defense and Power. “Our newest RVG video management gateway, the RVG-MS1, is ideal for managing multiple advanced sensors, with low latency and maximum flexibility to optimize and ease the operator’s experience.”
The rugged RVG-MS1 is qualified to MIL-STD-810G, MIL-STD-1257E and MIL-STD-461F and designed for use in the harsh environmental conditions typically encountered in aerospace and defense applications. Optimized for size, weight, power, and cost (SWaP-C), the RVG-MS1 is a line replaceable unit (LRU) that can minimize cabling, reduce system weight, and reduce management costs while providing OEMs and system integrators a well-defined upgrade and integration path for the most demanding ISR systems.
RVG-MS1 Performance Features:
- 20 x 3G-SDI inputs
- 4 x analog inputs
- 1 x HDMI
- 16 x 3G-SDI outputs
- 2 x TV analog output
- 2 x H.264 outputs
- CAN Bus and RS485/422/232 control interfaces
- Windowing, PiP, and overlays
- Video streaming (x2)
- Optional image blending
- Low latency
- Low SWaP
Military standards qualified (MIL-STD-810G/MIL-STD-1257E/MIL-STD-
Curtiss-Wright’s Latest 3U OpenVPX™ DSP Module is First to Deliver the Power of Intel® Xeon® D and Xilinx® MPSoC FPGA Processing with TrustedCOTS™ Security
10 Sep 19. Designed for extremely compute-intensive HPEC applications, CHAMP-XD1S supports critical missions with advanced TrustedCOTS security features. Curtiss-Wright’s Defense Solutions division, a trusted leading supplier of embedded ISR processing technology, is introducing its highest performance 3U OpenVPX digital signal processor (DSP) engine, the CHAMP-XD1S, a multi-core High Performance Embedded Computing (HPEC) module with advanced security features. The CHAMP-XD1S is the industry’s first Commercial Off the Shelf (COTS) board to deliver the performance of a 12 core (576 GFLOPS) Intel Xeon D processor, a Xilinx Zynq® UltraScale+™ MPSoC (ZU4EG) FPGA, and a Flash-based Microsemi® SmartFusion®2 IPMC FPGA with HOST v3.0 support to deliver best-in-class data security. The board’s advanced TrustedCOTS security features include Enhanced Trusted Boot capabilities, such as FPGA-based authenticated boot code and other features, to protect against malicious cyber attacks and reverse engineering. It also supports Intel Trusted Platform Module (TPM) 2.0 and NVMe encrypted Flash. The CHAMP-XD1S features memory modules that provide enhanced security protection for processor and FPGA memory. This fully rugged module is an ideal size, weight and power (SWaP)-optimized solution for system integrators seeking to deploy the highest available compute performance in support of compute intensive applications that require high security. It is designed for use in demanding SWaP-constrained radar, SIGINT, EW, and floating-point intensive DSP applications, such as specialized threat analysis and protection (STAP), SAR, sonar, multi-sensor (i.e., EO/IR), direction finding (e.g. TDOA), and mission computing.
The CHAMP-XD1S will be continually enhanced, with multiple capabilities planned for introduction over time, that leverage the secure capabilities of the FPGAs and other devices on the board.
“With the introduction of the new CHAMP-XD1S, we further strengthen our commitment to providing system integrators with the most secure and capable DSP modules available,” said Lynn Bamford, Senior Vice President and General Manager, Defense and Power.“ As the importance of cybersecurity grows every day, our new board, with TrustedCOTS protections, delivers a highly secure, supercomputer-class ISR processing solution for the most demanding and SWaP-constrained HPEC applications.”
CHAMP-XD1S Performance Features
- Extended temperature Intel Xeon D 12-Core (576 GFLOPS @ 1.5 GHz)
- PCH integrated in Xeon D SoC
- Native dual 10 Gigabit Ethernet (GigE) KR ports with option to route one to FPGA
o TCXO for maximum stability over temperature
- 32 GB DDR4 @ 2133 mega-transfers per second (34 GB/s aggregate)
- XMC mezzanine expansion site (PCIe up to Gen3)
- PCIe Gen3 on 3U OpenVPX data plane
- Xilinx MPSOC FPGA with embedded quad-core A53 processor and 4 GB DDR4 SDRAM Module
- SmartFusion2 IPMI with full Vita46.11 Tier 1, Tier 2 and HOST support
- 80GB NVMe 1.3 SLCm SSD Flash supporting encryption, write protection and sanitization
- Open Standards Aligned Pinout Options
o Enterprise Open Standards Architecture (EOSA)
o MOD3-PAY-1F1F2U1TU1T1U1T-16.2.15-2 (SOSA aligned with PCIe data plane)
o MOD3-PAY-2F2U-16.2.3-11
o Contact factory for details
- TrustedCOTS, Enhanced Trusted Boot
- Conduction-cooled, (-40º to +85º deg. C)
Software Support
Planned software support for the CHAMP-XD1S includes Board Support Packages (BSP) for CentOS 7.6 and Red Hat® Enterprise Linux® 7.6, and a TrustedCOTS Security Firmware/Software Package. Support will also be provided for Curtiss-Wright’s OpenHPEC™ Accelerator Suite of development tools and Dolphin® SuperSockets™ eXpressWare over PCIe Software. Support for Wind River® VxWorks® 7 is planned. Please contact the factory for more information on schedules and feature roll out.
Fully Integrated HPEC Solutions
Leveraging Curtiss-Wright’s extensive 3U OpenVPX ecosystem, the CHAMP-XD1S is ideal for use as the centerpiece of small form factor HPEC system architectures. It is backwards compatible with the CHAMP-XD1, and is compatible with the full range of Curtiss-Wright OpenVPX modules including single board computers, Ethernet switches and routers, graphics processors, and FPGA-based ADC/DAC modules.
To reduce program risk, improve affordability, and speed time to deployment, Curtiss-Wright offers system integrators a range of development-to-deployment system options. This approach enables the system integrator to match the equivalent development system they need to the appropriate stage of their program, while enabling application transfer between the stages with minimal effort.
11 Sep 19. Deterrence in Cyberspace Requires Multifaceted Approach, DOD Official Says. Defending in cyberspace is only half the battle. Making it clear to adversaries that the United States is capable of engaging in damaging cyberattacks of its own is a way of deterring adversaries from acting in the first place, a senior Defense Department official told lawmakers on Capitol Hill.
- Edwin Wilson, deputy assistant secretary of defense for cyber policy, spoke yesterday during a joint hearing of the House Armed Services Committee’s intelligence, emerging threats and capabilities subcommittee and the House Oversight and Reform Committee’s national security subcommittee. Securing the nation’s internet infrastructure was the hearing’s topic.
Wilson told lawmakers one form of deterrence involves denying adversaries what they are looking for: seeing effects from their attacks.
“We want to deny adversaries the benefit of what they are trying to achieve through a cyber-effects operation or any other type of activity directed at the U.S. or allies or the nation at large,” he said. “That’s where you see the partnership between Department of Homeland Security and the other departments and agencies of the U.S. government — where we have stepped in to begin to assist, enable [and] support the resiliency of our critical infrastructure segments.”
Deterrence also includes letting adversaries know the United States has the ability to strike back, Wilson told lawmakers. “We look very hard at the ability, if called upon, to deliver consequences, not just kinetically or in all the other domains of operations the department has, but also in the domain of cyberspace,” he said.
Congressional involvement has enhanced the department’s ability to deter, specifically with clarity on the authorities DOD has to act when needed, Wilson said. Additionally, National Security Presidential Memorandum 13 also focuses on the decision process for either offensive or defensive cyber-effects operations, he said.
“Our strategic competitors such as Russia and China are conducting persistent cyber-enabled campaigns to erode U.S. military advantage, threaten our nation’s critical infrastructure and reduce our economic prosperity,” Wilson said. “In response, the department adopted a proactive posture to compete with and counter determined and rapidly maturing cyber adversaries. Our objective is to prevent or mitigate significant threats before they reach U.S. soil. We refer to this strategy as ‘defending forward.’ It is the core of our DOD Cyber Strategy.”
Wilson said the approach is focused on enabling interagency, industry and international partners to strengthen resilience, close vulnerabilities and defend critical networks and systems while simultaneously imposing cost on adversary malicious cyber actors when called upon. (Source: US DoD)
10 Sep 19. Raytheon Company (NYSE: RTN) and Hanwha Systems signed a technical cooperation agreement to produce Identification Friend or Foe Mode 5 systems for the Korean military. Mode 5 IFF systems allow operators to positively identify friendly aircraft using a secure, encrypted code, reducing the potential for fratricide and increasing situational awareness.
“Our Mode 5 IFF solutions help lift the fog of combat,” said Barbara Borgonovi, vice president of Raytheon Integrated Communication Systems. “Cluttered airspace, crowded battlefields and uncertain seas characterize today’s operational environment. We are providing the latest technology that gives coalition forces the ability to distinguish between friend and foe with absolute certainty in the midst of these challenging conditions.”
Under the agreement, Raytheon will provide its IFF technology and industry leading expertise while Hanwha Systems will oversee domestic production.
To reduce the risk of “friendly” fire incidents and to enhance system security, coalition nations are moving to a new version of IFF called Mode 5. The new technology extends the range of Mode 4 and upgrades the signaling waveforms, making communications faster and more secure. Mode 4 – in service since the 1960s – uses signals similar to Morse code, while Mode 5’s sophisticated modulation techniques will change its codes every few seconds to ensure rapid identification.
For more than 70 years, Raytheon has been a leader in Identification Friend or Foe systems. Together with its global partners, Raytheon has delivered, installed and maintained more than 130,000 IFF systems on over 120 different types aircraft, ships and land vehicles across the world
10 Sep 19. Masergy, a leading provider of Managed SD-WAN, Cloud Communications, and Managed Security solutions, today announced the introduction of Masergy AIOps, the industry’s first integrated AI-based, digital assistant for network, security and application optimisation. Masergy AIOps acts as a virtual engineer embedded into Masergy’s Intelligent Service Control customer portal, supporting the administration and optimisation of global software defined networks.
With the initial release of this service, Masergy network clients will receive intelligent alerts and recommendations to enhance application performance, predict bandwidth needs and optimise network throughput based on anomaly detection and predictive analytics.
“Nemertes’ research shows enterprise adoption of managed SD-WAN as a service is rising sharply, delivering up to 20% reduction in WAN staff time and a 26% reduction in branch WAN staff,” said John Burke, CIO and Principal Research Analyst at Nemertes. “Managed SD-WAN services also reduce annual downtime by 70% and average outage length by 82% compared to do-it-yourself deployments. The network and application performance insights, provided by solutions such as Masergy AIOps, help increase uptime, enable faster fault recovery, and further reduce the amount of time IT teams spend troubleshooting problems.”
Key features of the service include:
- Intelligent analysis and recommendations to optimise multi-cloud environments
- Sophisticated pattern recognition algorithms leveraging big data
- Predictive anomaly detection with actionable insights
- Embedded AI tools in the Intelligent Service Control customer portal
- Expandable use cases for proactive network, application, and security optimisation
“With almost 20 years of software defined networking and security experience, we are uniquely positioned to deliver significant advancements in network automation technology to global enterprises,” said Chris MacFarland, executive chairman and CTO of Masergy. “We expect to deliver fully autonomous networking to global enterprises in the next few years, and the launch of Masergy AIOps moves us firmly in the direction of our vision.”
09 Sep 19. Dutch and Portuguese navies to boost their ships warfare protection thanks to Thales’ Electronic Warfare system. The Netherlands Defence Materiel Organisation (DMO), has selected Thales’s innovative digital wideband Radar Electronic Support Measures product Vigile D, as part of an equipment upgrade for three Royal Netherlands Navy warships, and two Portugues Navy frigates undergoing retrofit in the Netherlands..
Vigile D illustrates Thales Electronic Warfare digitalization.
With modern electronic warfare (EW) systems required to cope with the unprecedented growth in Electromagnetic transmissions across the Electromagnetic spectrum (EMS), traditional systems are now suffering from unparalleled saturation, which reduces the probability of accurate threat detection. The need to protect against complex and diverse threats that exploit the EMS is more critical than ever.
Applying our transformative expertise and advanced digital technology, only Vigile D will detect multiple signals simultaneously across a wide frequency range with 100% multi-signal probability detection.
Our digital technology provides the earliest possible warning of radar guided weapons, targeting systems or covertly operating forces, with greater reliability and accuracy than conventional systems even where the electromagnetic spectrum is congested.
In addition to this, because of Thales’s continuous commitment to progress, the company is making EW more versatile and transferable as a military capability; the equipment delivered to DMO uses easily upgradeable software and wideband digital receiver technology, making use of more affordable off-the-shelf technology.
Ultimately, only Vigile D will provide relevant and timely intelligence for decision makers to understand and evaluate their operational environment, making better operational decisions.
“Thales is pleased that DMO has recognised the benefits of the digital technology in Vigile D. As the Netherlands is an advanced user of electronic warfare technology, they are also very much a landmark customer for Thales. The adoption of the Vigile D technology by two other NATO navies in addition to the UK Royal Navy, offers enhanced data exchange between allied warships. Other NATO navies are now actively exploring the integration of Vigile-D onto their fleets, which will broaden the Vigile-D family and generate synergies and benefits across a wide community, for years to come.” Victor Chavez, CEO Thales in the UK
09 Sep 19. Curtiss-Wright Intelligent Tactical Data Link Translation Gateway Improves and Simplifies Real-time Warfighter Communications. New HUNTR™ software application lets JTACs and TACPs easily create a Multi-Tactical Datalink Network that supports Link 16, VMF, Cursor-On-Target (CoT), JREAP, SADL, and CESMO data exchanges between ground forces, aircraft, ships, and C2 elements. Curtiss-Wright’s Defense Solutions division, a trusted leading supplier of Tactical Data Link (TDL) software and hardware solutions, announced today that its Tactical Communications Group (TCG) business has introduced HUNTR (TDL Hub and Network Translator), a new intelligent TDL translation gateway for Link 16, Variable Message Format (VMF), Cursor-On-Target (CoT), Joint Range Extension Applications Protocol (JREAP), Situational Awareness Data Link (SADL), and Cooperative ESM Operations (CESMO). Today, moving data between similar and dissimilar data links is a daunting task that can prove an obstacle to mission success. HUNTR is a breakthrough software application that significantly improves and simplifies the real-time translation and routing of TDLs. It provides warfighters and command and control centers with real-time access to accurate operational data in the field.
HUNTR supports the automatic routing, forwarding, and translation of J-Series, K-Series, CoT, and CESMO messages and automates processing and translation of multiple, simultaneous Digitally-Aided Close Air Support (DACAS) missions between ground JTAC kits equipped with VMF or CoT radios and air/land/sea Link 16 assets. Designed to run on any Microsoft Windows 10 supported platform, HUNTR delivers instant integration and interoperability for multiple heterogeneous TDLs. The HUNTR software is ideal for use in air, ground, sea, base stations, mobile land platforms, and command and control center applications.
“With the introduction of our new HUNTR Tactical Data Link Translation Gateway software solution, Curtis-Wright further strengthens our leadership position in the TDL community,” said Lynn Bamford, Senior Vice President and General Manager, Defense and Power. “HUNTR uniquely enables JTACs and TACPs to create a Multi-Tactical Datalink Network that supports SADL, Link 16, Cursor on Target, and VMF Combat Net Radio (CNR) data exchanges between ground forces, aircraft, ships, and C2 elements.”
Reliable Battlefield Communications
In the field, the warfighter needs a reliable, intuitive way to access information from a variety of data links. HUNTR’s operator-focused GUI is designed for ease of use and simplicity. Designed from the ground up to simplify the complex process of coordinating and managing the multiple data links used by in-field resources and command and control centers during missions, HUNTR provides unmatched interface and standards support. It supports touchscreen or keyboard-and-mouse operation and features a “green-good, red-bad” operator feedback scheme for rapid identification of terminal/radio operational status, routing errors, or areas in need of attention. Thanks to its intuitive, simple-to-use interface, HUNTR enables access to and configuration of multiple similar and dissimilar data links with little or no training. The GUI clearly indicates connectivity, information flow, and filtering of traffic, and enables operators to quickly and dynamically add or remove data links, and manage data flow between the links. HUNTR’s intelligent filtering simplifies the control of data flow when the sending and receiving links have disparities in information capacity, or where operator “information overload” is a concern. Additionally, the software automatically converts VMF 9-lines into multiple Link 16 messages and automatically updates and maintains Link 16 PPLI and Surveillance tracks and Command and Control (C2) messages.
HUNTR supports the following data link protocols and associated terminals/radios:
LINK 16
- J message MIL-STD-6016 C, D, E, F
- MIL-STD-6020 Data Forwarding
- JREAP MIL-STD-3011 Revisions A, B, C
VMF
- K message MIL-STD-6017 A, B
- MIL-STD-2045-47001 B, C, D CN1
- MIL-STD-188-220 C, D CN1
- ECP-1, ECP-2, ECP-11
- UDP over IP and IP waveforms
- Automatic multi-stack management
CURSOR ON TARGET (COT)
- CoT v2.0 schema including platform-specific enhancements
- UDP Multicast, Unicast, and Smartphone CoT Server mode (multi-unicast)
- Any radio, tablet, or smartphone that supports IP transmission/reception of CoT messages
CESMO (COOPERATIVE ESM OPERATIONS)
- CESMO AEDP-13 A1 and B1
- CESMO X1
- UDP over IP and IP waveforms
- MIL-STD-188-220 C, D CN1
07 Sep 19. Could this cyber partnership help national security? The director of the Cybersecurity and Infrastructure Security Agency (CISA) is looking to partner with the new Cybersecurity Directorate at the National Security Agency in defending the United States’ critical infrastructure from cyberattacks.
At the Billington Cybersecurity conference, which ran Sept. 4-5 in Washington, D.C., Chris Krebs, the director of CISA, said he’s had a relationship of “collaboration and cooperation” with the directorate’s leader Anne Neuberger that he wants to continue. He said he’s worked with her since he joined government, particularity when she took over the Russia Small Group, a task force at NSA looking at Russian threats.
“Now I’m looking at this as a continued evolution of that partnership,” Krebs told reporters after the event. “How can I provide the NSA and the cybersecurity division the guidance and requirements set where they can turn around and help me?”
“This is almost a concept that’s widespread in the Department of Defense and the military. There’s a supporting command and a supported command. We are the supported command. The NSA is providing us information to help us execute our mission — elections is just one example — but [also] broader critical infrastructure.”
Neuberger and Krebs both have similar tasks: protecting critical infrastructure, including elections.
Neuberger said that the cybersecurity directorate, set to begin work Oct. 1, will work to “prevent and irradiate cyber actors from national security systems and critical infrastructure with a focus on the defense industrial base.”
Krebs’s agency, still short of one year old, focuses on assisting federal agencies, state and local governments defend against cyberattacks.
There are other similarities, as well: both rely on information sharing with their audience and provide vulnerability assessments. However, Krebs explained the differences in the two entities missions after the event, telling reporters that “there is no overlap” and that the two agencies complement each other.
“On the election security space, they are very focused on the intelligence piece and the over there,” said Krebs.
“We are very focused on the here — working with state and local election partners, the private sector, and being able to bring in the NSA and their capabilities and Cyber Command and their capabilities in to support those state and local election officials as they defend their networks.” (Source: Fifth Domain)
09 Sep 19. Rohde & Schwarz presents new R&S PR200 portable monitoring receiver. The new, lightweight, extremely high-performance portable monitoring receiver features excellent RF characteristics, fast signal processing and well-engineered handling. At this year’s ITU Telecom World in Budapest, Rohde & Schwarz unveils the new R&S PR200 portable monitoring receiver. With a very wide frequency range from 8 kHz to 8 GHz, or even up to 18 GHz with the HF907DC SHF handheld antenna with integrated downconverter, it is highly versatile. Thanks to its high linearity and effective preselection, the receiver is especially suited to handle complex signal environments. To prevent overloading and enable adaptation to any given situation, the receiver also offers automatic gain control (AGC) to attenuate or amplify the input signal.
The R&S PR200 is an indispensable tool for regulatory authorities, mobile network operators, police forces, military units and other security organizations. Using the portable receiver, they can search for and analyze known and unknown radio emissions and localize signal sources. The receiver offers various display options, markers and other tools for signal analysis.
Low weight was a design criterion in the development of the R&S PR200. At only 3.5 kg, the receiver enables a long operating time of more than 3.5 hours, perfect for longer field operations. Thanks to extensive beta-user feedback, Rohde & Schwarz was able to position the R&S PR200 as THE go-to-tool at large.
The R&S PR200 offers wide-ranging recording capabilities for documentation purposes or subsequent signal analysis. For example, the receiver can record and reproduce all measured values over an prolonged period, such as the amplitude, bearing, spectrum and demodulated audio information of a received signal. A snapshot of the I/Q signal with up to 60 million samples is also possible. Numerous options and extensions for the R&S PR200 support a wide range of applications. Another important feature is the additional DF function in combination with the R&S MobileLocator. Temporarily installed in a vehicle, this combination enables effective geolocation of all radio emissions even in difficult environments, such as dense urban areas.
“The R&S PR200 features excellent RF characteristics combined with innovative signal processing and outstanding ease of use”, says Jörg Pfitzner, Director of Product Management, Rohde & Schwarz Monitoring and Network Testing Division. “The R&S PR200 is the successor to the R&S PR100, with similar appearance, size and weight. However, it is a completely new product and better than its predecessor in many regards. Following the R&S EB100, R&S EB200 and R&S PR100, which are already deployed with many customers, the R&S PR200 is the fourth generation of portable receivers from Rohde & Schwarz.”
The R&S PR200 performs signal processing in two separate paths, each with up to 40 MHz realtime bandwidth, enabling simultaneous spectrum display and analysis in the frequency domain, as well as signal display and demodulation in the time domain. The R&S PR200 reliably detects signals with a duration of 1.5 microseconds, so virtually no signal goes undetected.
06 Sep 19. Cyber Strategy Protects Critical U.S. Infrastructure. Last spring, the Defense Department embarked on a new cyber strategy that will play an increasingly important, yet nontraditional supporting role: protecting critical infrastructure in the homeland.
Burke E. “Ed” Wilson, deputy assistant secretary of defense for Cyber Policy, spoke about the “Pathfinder” strategy during a panel discussion yesterday at the 10th Annual Billington Cybersecurity Summit in Washington.
“[It is] new territory for the department, so we’re not trying to overarchitect or overthink the problem,” Wilson said. “We’re trying to … begin collaboration with industry and interagency partners to understand roles and responsibilities and the unique attributes, scale, scope and perspectives that the department can bring in defense of critical infrastructure.”
DOD has already begun partnering with other government agencies, including the Department of Homeland Security, as well as with critical infrastructure representatives, he said.
U.S. Cyber Command and some intelligence agency representatives also are sharing information in Pathfinder, such as indicators of compromise and systemic risk, he said.
The Defense Department is focused on two key infrastructure assets, Wilson said: financial institutions and the energy sector. Regarding the electrical grid, that partnership also includes the Energy Department.
Pathfinder is making headway, Wilson said. “There’s a lot of wind in that sail,” he added. “We’re making good progress.”
Tonya Ugoretz, deputy assistant director of the FBI’s Cyber Readiness, Outreach and Intelligence Branch, said the FBI is also collaborating with government agencies, including DOD, and with private sector companies and infrastructure to prevent malicious criminal activities.
The FBI, industry, academia and other government agencies also participate in the National Cyber-Forensics Training Alliance, a nonprofit organization established for information sharing about criminal activity, she said, noting that, as a result of that collaboration, a malicious bot recently was taken down and arrests were made. (Source: US DoD)
06 Sep 19. Cyber Strategy Embodies Lethality, Reform, Partnerships. The Defense Department’s cyber strategy directly reflects the National Defense Strategy’s emphasis on three key pillars: lethality, reform and partnerships, said Marine Corps Maj. Gen. Dennis A. Crall, DOD’s deputy principal cyber advisor and senior military advisor for Cyber Policy.
Speaking during a panel discussion at the 10th annual Billington Cybersecurity Summit yesterday, Crall said lethality means being able to carry out offensive and defensive cyber operations in a contested environment. The network and communications have to work at least at some minimal level, he said.
Another aspect of lethality is that the commander needs to have the right authorities to carry out the mission. “Congress and the administration loaded us up with authorities we never before had, so we need to use them,” he said.
Those authorities need to be built into the planning and tested with the right processes in place to take full advantage of them, he added. “Bad process can take the most energetic, forceful, excited individuals and crush them through a series of bureaucratic morass that doesn’t lead to an outcome,” the general said.
And, finally, he said, lethality means having a well-trained, well-led workforce because people are pivotal to the success of any endeavor.
Regarding reform, Crall said the cyber workforce needs to have cutting-edge equipment and capabilities to perform the mission at hand, saying it’s foolish to spend sustainment dollars on outdated technology that’s no longer effective.
“At one time, money flowed too freely and DOD couldn’t account for the way it was spent,” he said, cautioning stakeholders to be careful. “People want to help us. Results have to be data-driven and show effectiveness.”
The military needs to keep trust with its warfighters and with the American people, he continued. That means scarce resources must be applied in the most consistent, meaningful and thoughtful ways.
On partnerships, Crall noted that some allies and partners have authorities and capabilities the U.S. military doesn’t have. “We want to make sure we take advantage of those,” he told the summit audience.
Regarding operating with coalition forces, Crall said: “We still struggle with information sharing in a timely manner, so we need better cross-domain solutions, and that’s on the radar to solve this year. Information needs to flow at the speed of warfare.”
Partnerships are built on relationship building and rigorous joint and combined training, he said. (Source: US DoD)
——————————————————————-
Spectra Group Plc
Spectra has a proven record of accomplishment – with over 15 years of experience in delivering secure communications and cybersecurity solutions for governments around the globe; elite militaries; and private enterprises of all sizes.
As a dynamic, agile, security accredited organisation, Spectra can leverage this experience to deliver Cyber Advisory and secure Hosted and Managed Solutions on time, to spec and on budget, ensuring compliance with industry standards and best practices.
Spectra’s SlingShot® is a unique low SWaP system that enables in-service U/VHF tactical radios to utilise Inmarsat’s commercial satellite network for BLOS COTM. Including omnidirectional antenna for the man, vehicle, maritime and aviation platforms, the tactical net can broadcast over 1000s miles between forward units and a rear HQ, no matter how or where the deployment. Unlike many BLOS options, SlingShot maintains full COTM (Communications On The Move) capability and low size and weight
On 23 November 2017, Spectra Group (UK) Ltd announced that it had recently been listed as a Top 100 Government SME Supplier for 2015-2016 by the UK Crown Commercial Services
Spectra’s CEO, Simon Davies, was awarded 2017 BATTLESPACE Businessman of the Year by BATTLESPACE magazine and is a finalist in the inaugural British Ex-Forces In Business Awards in the Innovator Of The Year category.
Founded in 2002, the Company is based in Hereford, UK and holds ISO 9001:2015, ISO 27001 and Cyber Essentials Plus accreditation.
————————————————————————-