• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2022

CYBER, EW, CLOUD COMPUTING AND HOMELAND SECURITY UPDATE

September 25, 2015 by

24 Sep 15. Harris awarded two more EW suites for Independence variant LCS. Harris Corp is to produce two more electronic support measure suites for integration on US Navy (USN) Independence variant Littoral Combat Ships (LCS), officials announced on 23 September. The award, made by General Dynamics Advanced Information Systems (GD-AIS) under a contract awarded in 2012, provides for two AN/SLD-4 electronic surveillance and countermeasure systems to complement a suite of Harris-provided electronic warfare technologies on board the aluminium trimaran variant LCS, being built by Austal USA. Harris has delivered four AN/SLD-4 systems to the USN and four systems are in production. Delivery of the two suites to GD-AIS is planned for 2016. (Source: IHS Jane’s)

24 Sep 15. NAWCWD puts the ‘Next Generation’ in Next Generation Jammer. Big things are happening in the world of electronic warfare at Naval Air Warfare Center Weapons Division (NAWCWD) Point Mugu. NAWCWD is bulking up its electronic warfare capabilities to make Raytheon’s Next Generation Jammer the most effective device in the Navy’s electronic warfare arsenal, relayed Jeff Anderson, technical lead for Jammer Technique Optimization (JATO), late August aboard Naval Base Ventura County, California.
“The Next Generation Jammer (NGJ) is exactly the tool that we need to continue supporting the warfighter on the next level,” Anderson said. “This new system is essentially software loaded, which means that our aircrews can more readily use the wide spectrum of electronic countermeasures developed here at Point Mugu.”
According to Anderson, the NGJ gives operators the ability to load a broader variety and higher capacity of electronic attacks with ease and flexibility.
“It used to take up to 90 days for a contractor to manufacture the design of one of these application specific integrated circuits (ASIC) chips,” Anderson said. “Now we can program our jammer to go against it within hours.”
Around the 1990s, jamming technique types were burned into unmodifiable ASICs. Previous mission preparation required operators to load a limited number of parameters for a fixed set of jamming waveform types into the aircraft’s ALQ-99 jamming pod – based on inferences made by analysts studying an adversary’s capabilities.
“Radar technologies are quickly advancing,” Anderson said. “They’re faster and smarter, sensing interference on other frequencies and automatically switching to frequencies and waveforms with less interference.”
Keeping up with those improvements can be challenging, but the JATO group at Point Mugu, in conjunction with JATO personnel at the Naval Research Lab and Johns Hopkins Applied Physics Lab, specializes in jamming technology and other electronic warfare methods.
Raytheon reports active testing for NGJ at China Lake, California, and Weapons Division authorities say there are joint plans to integrate the new design into the EA-18G Growler, a variant of the F/A-18F Super Hornet. (Source: ASD Network)

21 Sep 15. Iran and Saudi marching to cyber war! As the two powers vie for influence over the civil wars in Yemen and Syria and regional dominance, Tehran and Riyadh have begun using cyber attacks to release critical intelligence. WikiLeaks released on June 19 over half a million cables from the Saudi Foreign Ministry, including several “Top Secret” reports from the country’s General Intelligence Services after a hack by a group calling itself the Yemeni Cyber Army. Recently, the Washington Post reported that the theft of the Saudi Cables bore indications of Iranian hackers.
“These events fit a pattern that looks and smells like Iranian-proxy actors,” said Jen Weedon, manager of threat intelligence at FireEye, a firm specializing in cyber-security. The incident “definitely resembles past activity we’ve seen by Iranian groups.”
Some analysis’s have suggested that the civil war in Yemen is effectively a proxy-war between the two regional powers, with the predominately-S

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • InVeris
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • DSEi
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
Hilux DVD2022 GlobalMilSat

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    July 1, 2022
    Read more
  • VETERANS UPDATE

    July 1, 2022
    Read more
  • MANAGEMENT ON THE MOVE

    July 1, 2022
    Read more

Copyright BATTLESPACE Publications © 2002–2022.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT