Despite long-term budget restrictions, U.S. officials appear optimistic about development of air-launched missiles to destroy short- and medium-range ballistic missiles during the early launch or boost phases of their flight.
Before his October retirement, the U.S. Air Force chief of staff, Gen. Norton Schwartz, confirmed that the mission area and an air-launch and kill architecture is of interest to the service.
HAIFA, Israel — Some of Israel’s missile designers say their new advanced missile defense systems — like Iron Dome and David’s Sling — are so sophisticated that they may likely mark the end of an era as the last large, kinetic missiles to be developed.
They may well parallel the F-35’s Joint Strike Fighter’s role as the last stealthy, manned, strike fighter.
During the 2006 conflict in southern Lebanon, about 25% of the Hezbollah-fired missiles struck populated areas in northern Israel. While Israeli security keeps a lid on where the latest Hamas and Jihadist missiles fired into southern Israel from Gaza are striking, the very few deaths reported in Israel – in the single digits so far – indicates that the first five batteries of the short-range Iron Dome missile defense system are being surprisingly efficient.
Washington – As of Nov. 19, 877 Hamas rockets had been fired into Israel, according to Israeli Defense Forces count. Of those, 570 landed in Israel and 307 were intercepted by the Iron Dome missile defense system.
However, the 570 that hit Israel and were not intercepted does not mean that Tel Aviv’s prize new Iron Dome short-range missile defenses failed. It means the system’s ability to determine which missiles are headed toward populated areas – and which are not – is working as designed.
There is a new, secret White House document that may finally start codifying what an offensive cyber weapon is, who can generate it, what its legitimate targets are and who can authorize its use.
The document, Presidential Policy Directive 20, signed in October, establishes a set of standards to guide the military and other federal agencies in responding to or perhaps pre-empting cyberattacks on U.S. military and commercial networks.
To active cyber warriors and aerospace industry officials, it comes as a bit of a disappointment.
An Oct. 24 bombing raid on the Yarmouk weapons factory near Khartoum, Sudan, destroyed dozens of shipping containers thought to be carrying rockets and other weapons headed for Egypt’s lawless Sinai peninsula and Hamas-run Gaza.
For Europe, the pivot to the Pacific in U.S. priorities is not a particularly momentous event, contends Lt. Gen. Mark Hertling, commander of U.S. Army Europe and the 7th Army. What is a big deal will be the reshaping of U.S. forces in Europe to have few tanks and lots of offensive and defensive cyber capabilities.
NETANYA, Israel — With virtually every cyber network in the world in jeopardy of attack, Elbit has positioned itself over the last three years to cash in on the escalating likelihood of digital intrusions.
A program here is training teams of cyber warriors for companies, government agencies and military organizations that want an in-house defense capability. That can be done at Elbit’s facilities, or the company can provide a customer with the system, build the facilities and provide trainers for those wanting a turnkey, in-house facility.
NETANYA, Israel — As Israel prepares for advanced network war, it is readily apparent that cyber situational awareness systems — supported by event-management capabilities since digital warfare can never be a fully automatic process — has become a key part of the country’s defense.
Capabilities being commercialized by Elbit Systems’ land and C4I solutions branch provide a number of clues about how cyber defenses are being developed here.
NETANYA, Israel — At one time spy agencies drove development of advanced investigative cyber technology, but nowadays it is banks, credit card companies, PayPal, Google and Yahoo that are steering the design and functionality of new investigative tools.
NETANYA, Israel — Cyberdefense specialists in Israel are looking for ways to protect networks that control critical infrastructure from attacks like the Stuxnet worm discovered in 2010 that infiltrated Iranian nuclear facilities.
The networks that control many crucial industrial and manufacturing processes were once considered largely immune to cyberattack. But now researchers have found there are often obscure Internet connections in virtually every automated network.
The U.S. Air Force is beginning to sift through all the exotic weapons, materials and electronics in development and prototype programs and find a place for the most promising of them as operational tools in as little as 3-5 years.
The focus of the work will be to develop, in parallel, the materials, tactics and training to make the weaponry effective in combat. The effort is being designed to counter foes who are themselves fielding a new generation of weapons that include advanced jamming, stealth and cyberattack capabilities.
There is little political, deterrent or military value in either the U.S. or Israel bombing Iran’s nuclear and missile programs, say participants at this week’s Air Force Association air warfare symposium here.
“If the Iranians really wanted a store of enriched uranium, they could buy it,” says a U.S. official with links to the U.S. military’s cyber and operations communities. “And they don’t have to process it themselves except for the national prestige it would give the country and to keep the international spotlight on Tehran.”
In researching our cover package on aeromedical evacuation, one of the hardest things to grapple with was how to count casualties. It turns out that even those experienced in the field can become confused on what metric is the most appropriate to use in any given circumstance....More
In recent years the number of airlines operating Boeing's long-range, high capacity 777 (particularly the -300 series, but also some smaller -200s) has increased noticeably at the UK's premier international gateway....More