IDF Picks Fire Weaver Networked Sensor-to-Shooter System for Digitized Battlespace
Posted on
The Israeli Ministry of Defense (IMOD) has announced the acquisition of ‘Fire Weaver’ – a networked sensor-to-shooter system. The game-changing system will serve the IDF’s ground forces divisions, and become operational in the coming year. Fire Weaver was developed jointly by the IDF’s ground forces, DDR&D (The IMOD’s Directorate of Defense Research and Development) and […]
US should buy control of Nokia, Ericsson to fight Huawei: attorney general
Posted on
The United States and its allies should take controlling stakes in Nokia, Ericsson or both to battle Chinese telecoms giant Huawei’s dominance of the 5G market, US Attorney general Bill Barr said Thursday. “There are only two companies that can compete with Huawei right now: Nokia and Ericsson,” Barr said in a speech on the […]
Extended range: VECTOR flies beyond 300 km using a UHF datalink
Posted on
A robust communication network between an unmanned aerial vehicle and the ground control station is paramount for the successful execution of a BVLOS (Beyond Visual Line of Sight) operation. Although the VECTOR autopilot, UAV’s most advanced flight control system is fully capable of executing an entirely autonomous mission, a solid and reliable data or video […]
China’s Long March-5B carrier rocket arrives at launch site
Posted on
China’s Long March-5B carrier rocket arrived at the launch site in southern China’s Hainan Province Wednesday after a week of ocean and rail transport, according to the China Aerospace Science and Technology Corporation. The rocket will take part in a joint rehearsal with the prototype of the Chinese space station’s core module at the Wenchang […]
System uses machine learning, curiosity-driven ‘honeypots’ to stop cyberattacks
Posted on
In recent months, the FBI issued a high-impact cybersecurity warning in response to increasing attacks on government targets. Government officials have warned major cities that such hacks are a disturbing trend that is likely to continue. A new tool from Purdue University researchers may help stop some of those threats. The Purdue team created a […]
Cybercriminals abuse Bitbucket to infect users with malware
Posted on
Cybercriminals are carrying out targeted attacks against companies around the world utilizing a shotgun approach with many different types of malware. Cybereason’s researchers determined 500,000 + workstations are infected around the world. Cybereason, creators of the leading Cyber Defense Platform, today announced that its Nocturnus research team released its newest research findings The Hole in […]
South Korea Relies on Thales’ Systems to Avoid Friendly Fire Incidents
Posted on
Thales IFF systems will be integrated by LIG Nex1 who has been selected by DAPA, South Korea’s Defense Acquisition Program Administration, to supply TSA 1412 IFF (identification Friend or Foe) interrogators for integration with man-portable missile systems and TSA 2522 for air defence vehicles. For this contract, Thales has teamed with a South Korean partner, […]
NASA funds demonstration of assembly and manufacturing in space
Posted on
NASA has awarded a $142 million contract to Maxar Technologies of Westminster, Colorado, to robotically assemble a communications antenna and manufacture a spacecraft beam in orbit. The technology demonstration is slated to take place on NASA’s Restore-L spacecraft, designed to service and refuel a satellite in low-Earth orbit. The Restore-L spacecraft will be modified to […]
Space Force decommissions 26-year-old GPS satellite to make way for GPS 3 constellation
Posted on
The 2nd Space Operations Squadron decommissioned Satellite Vehicle Number-36, the second to last Block IIA satellite, Jan. 27. Capt. Collin Dart, 2nd SOPS assistant flight commander of GPS mission engineering, said the disposal of SVN-36 will allow for newer vehicles to take it’s place. “The main reason it was decommissioned was because, at this time, […]
DOD to Require Cybersecurity Certification in Some Contract Bids
Posted on
By the end of September, the Defense Department will require at least some companies bidding on defense contracts to certify that they meet at least a basic level of cybersecurity standards when responding to a request for proposals. DOD released its new Cybersecurity Maturity Model Certification today, billed by the undersecretary of defense for acquisition […]