• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER, EW, CLOUD AND HOMELAND SECURITY UPDATE

May 22, 2015 by

20 May 15. US Navy seeks to close back doors to weapons systems. Today’s weapons systems are vulnerable to hackers, who could potentially commandeer them with the right tools and skills. The Navy is trying to address that risk with a new research solicitation. The risk not always to the weapons directly. The research solicitation addresses support systems that connect to the weapons intermittently, such as maintenance laptops and industrial control system interfaces. “There is a paucity of cyber R&D and threat information for weapon systems and supporting systems that directly or indirectly connect to weapon systems,” the Navy noted. The solicitation lists 34 areas of interest for securing platforms, weapons and support equipment, including malware detection, “non-destructive” cyber inspection and how to patch software for weapons that only connect to the network periodically. (Source: C4ISR & Networks)

21 May 15. BAE Systems SIGINT Payload for Gray Eagle. BAE Systems has developed an intelligence-gathering sensor for the U.S. Army unmanned aircraft system (UAS) MQ-1C Gray Eagle. With advances in technological capabilities, unmanned aircraft systems (UAS) have taken on crucial tasks in the military. Although this progression keeps troops safer, adapting to smaller platforms like a UAS comes with its challenges. Among these challenges is developing updated hardware to fit within the size, weight, and power (SWaP) constraints of a UAS. At BAE Systems, the sensors team rose to the occasion by developing a tool that will allow warfighters to see the big picture with intel from a U.S. Army UAS known as the MQ-1C Gray Eagle. This new sensor, called the Tactical Signals Intelligence Payload (TSP), gathers intelligence by intercepting signals, known broadly as Signal Intelligence, or SIGINT capability. As part of an indefinite delivery, indefinite quantity contract potentially worth $70m, BAE received an order for the initial production of 12 TSP systems and engineering support services. These new SIGINT systems will help provide intelligence for the U.S. Army and Special Operations Command, and will be adaptable to other manned and unmanned aerial platforms. The TSP system’s open, software-defined architecture means that its network of sensors is interoperable and can talk to each other. Additionally, the system’s ability to capture a 360-degree aerial field of view gives the ground commander a comprehensive picture, allowing the commander, sensor operators, and analysts optimal situational awareness so they can make decisions in near real-time. Using the sensor to detect, identify, and geo-locate electronic emitters, the ground team can address any number of targets – all from one system. (Source: UAS VISION)

20 May 15. Predictions for cyber-crime in 2015 and how the Security Industry is Responding. From Heartbleed and Shellshock to the Target breach and the Sony hack, last year was littered with high-profile cyber threats and security breaches. The dire consequences an attack can have on a business have become increasingly apparent, as poor response to security breaches has led to the resignation of senior staff and even companies going out of business. In 2015, the frequency and severity of cyber-attacks will continue to increase – and organisations will have to explore new approaches in responding to cyber-attacks. These are my predictions on how cybercrime will manifest itself this year, and how the cyber-security industry will develop in response. Each year, the frequency and severity of cyber-attacks increases, and there is no reason to think that 2015 will buck this trend. Europe may appear to be relatively unscathed so far, but this is probably because public disclosure is not generally required as it is in the US. In 2015, however, there will be an attack on the scale of the Target breach – so large and far reaching that it can’t be swept under the carpet. The consequence will be harsher measures imposed on companies

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • PARLIAMENTARY QUESTIONS

    March 23, 2023
    Read more
  • Ajax vehicles on course for new delivery times.

    March 20, 2023
    Read more
  • EXHIBITIONS AND CONFERENCES

    March 17, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT