Google
 

Wednesday, August 6, 2008

RE: Israeli Jam Session (UAV-based Electronic Attack)

PRESS RELEASE

Northrop Grumman Corporation (NYSE:NOC) has been awarded a contract by the U.S. Office of Naval Research to develop and demonstrate a signals intelligence (SIGINT) payload for use on an unmanned aerial vehicle (UAV) under the Warfighter's Tactical SIGINT Resource (WTSR) program.

 
"In today's battlespace environment, persistent surveillance is key," said Fred Bean, WTSR program manager. "Tactical units must rapidly and reliably use sensor networks to track potential targets; collect, send and receive actionable intelligence; and automatically receive warning of impending dangers. The WTSR program is aimed at providing expeditionary forces with that kind of enhanced battlespace awareness. We look forward to providing our expeditionary fighting forces with the right data and the right amount data at the right time.

"Tactical units at the lowest echelon currently receive little to no intelligence of value because they have very few -- if any -- ISR assets under their direct control. The WTSR program will help to overcome that problem as well as a number of other key limitations associated with conventional sensor technology," he said.

The Navy's objective is to provide small unit tactical forces with the sensing and tracking capabilities needed to conduct warfare against an asymmetric threat. The program focuses on developing significant technological advances in three key areas: sensors; tags and taggants; and network communications that integrate unmanned vehicles and unattended ground sensors into the net-centric battlefield.

Under the three-year, $5.2 million contract, Northrop Grumman will first develop a low-cost, lightweight, plug-and-play SIGINT sensor package that requires minimal power. The sensor will be equipped with flight-tunable receivers that enable rapid re-tasking of the SIGINT payload during flight operations. Once developed, Northrop Grumman will conduct a Tier II/Class II tactical UAV flight demonstration of the SIGINT payload at an operational altitude of 3,000 feet. The WTSR contract was awarded by the Office of Naval Research's Expeditionary Maneuver Warfare & Combating Terrorism department as part of the FORCEnet Science & Technology - GWOT Focused Tactical Persistent Surveillance program.

Northrop Grumman will lead the effort from its Ft. Wayne, Ind. facility and is teamed with Swift Engineering, Inc., San Clemente, Calif. Other Northrop Grumman work on the program will be accomplished in Sacramento, Calif., and in Cincinnati.

NOTE:  The WTSR payload is based on the Xetron XR2000.

Monday, July 14, 2008

Lasers can destroy enemy missles, UAVs

http://www.navytimes.com/news/2008/07/navy_aircraftprotection_071108w/
 
A defense contractor announced July 8 that it has successfully tested a weapons system that it says could protect aircraft operating from military and civilian airfields, as well as Navy ships and other infrastructure, from “a broad range of threats,” including shoulder-fired surface to air missile systems and unmanned aerial vehicles.

General Dynamics’ ground-based Counter Man-Portable Airspace Protection System uses a system of sensors, an autonomous data integration center, and high powered lasers to track and destroy surface to air missiles and small unmanned aerial vehicles by targeting “critical aircraft components”...

Lasers can destroy enemy missles, UAVs

http://www.navytimes.com/news/2008/07/navy_aircraftprotection_071108w/
 
A defense contractor announced July 8 that it has successfully tested a weapons system that it says could protect aircraft operating from military and civilian airfields, as well as Navy ships and other infrastructure, from “a broad range of threats,” including shoulder-fired surface to air missile systems and unmanned aerial vehicles.

General Dynamics’ ground-based Counter Man-Portable Airspace Protection System uses a system of sensors, an autonomous data integration center, and high powered lasers to track and destroy surface to air missiles and small unmanned aerial vehicles by targeting “critical aircraft components”.

...

Thursday, July 10, 2008

Electronic Warfare Plays Critical Role in Columbian Hostage Rescue

http://www.washingtonpost.com/wp-dyn/content/article/2008/07/08/AR2008070803243.html?nav=rss_nation/special

BOGOTA, Colombia, July 8 -- For months before a group of disguised Colombian soldiers carried out a daring rescue of three American citizens and a prominent Colombian politician from a guerrilla camp, a team of U.S. Special Forces joined elite Colombian troops tracking the hostages across formidable jungle terrain in the country's southern fringes.

The U.S. team was supported by a vast intelligence-gathering operation based in the U.S. Embassy in Bogota, far to the north. There, a special 100-person unit made up of Special Forces planners, hostage negotiators and intelligence analysts worked to keep track of the hostages. They also awaited the moment when they would spring into action to help Colombian forces carry out a rescue.

That moment came in June after a Colombian army major hatched an unconventional plan. Further developed by Colombian intelligence agents, the plan abandoned the idea of a military raid and relied instead on tricking a rebel group notorious for killing hostages into simply handing over 15 of their most prominent captives.

...

The complex operation included infiltrators in the FARC's highest echelons, a team of Colombian commandos playing the parts of relief workers and guerrillas, and an elaborate scheme to intervene in the rebels' radio communications network. The sting was directed at the leaders of guerrilla units who were responsible for moving hostages through the jungle but who communicated infrequently with the FARC's seven-man directorate.

Brownfield explained to Cheney, Rice and the others how Colombian officials would ensure that a fake radio message -- purportedly from the unit headed by the FARC's supreme leader, Alfonso Cano -- would be sent to the guards. The order would be to prepare the hostages to be picked up by a relief agency and then flown by helicopter to the rebel high command...

Tuesday, July 8, 2008

Air Force prepares to restart B-52 jammer programme

Good summary of B-52 CCJ program at http://www.flightglobal.com/articles/2008/07/07/225111/air-force-prepares-to-restart-b-52-jammer-programme.html.  Excerpts follow:

...

If the core component jammer (CCJ) wins approval from senior USAF leaders in the programme objective memorandum and then eventually gets congressional backing, a demonstration of the technology could take place by fiscal year 2012, says Col Bob Schwarze, the air force's chief of EW and cyber warfare requirements...

Stand-off jamming is aimed at the enemy's low-band, early-warning radars. It enables attack jets and other aircraft to enter that airspace undetected and take out surface-to-air missiles sites and other threats...

Theatre Air Campaign

If equipped with the stand-off jamming capability, the EB-52 would be integrated into a theatre air campaign along with other first-strike aircraft, such as the stealthy fifth-generation Lockheed Martin F-22A Raptor. EW capability would enable the Stratofortress to launch kinetic strikes with cruise missiles or GPS-guided smart bombs while engaging in offensive airborne electronic attack...

Value and Merit

...

The B-52 jammer upgrade is just one of many air force EW modernisation projects. Last year the USAF stood up a new management group to oversee all its aircraft EW upgrades while trying to streamline the upgrade process between different programme offices to keep costs down...

But apart from some "breadboards" at the Air Force Research Laboratory, most of the CCJ concept remains solely on paper and no components have been flown or tested on a range. Officials envisage the wing pod being about 12m (40ft) long and weighing 2,270kg (5,000lb), similar to external fuel tanks. "We are looking at the technical maturation of that type of capability," says Schwarze...

The service plans to continue its AEA-related development in 2009 and air force officials have requested just over $34 million in research and development for the CCJ effort. Congress has yet to approve the Pentagon's budget, however.

Among the efforts under way is the development of four separate "critical technologies" that will play a key role in giving the B-52 a stand-off jamming capability. These include low-band, high-power transmitting phased arrays, mid-band high-power transmitting phased arrays, advanced exciters and aircraft integration systems engineering.

Programme's Fate

After an expected FY2012 demonstration, air force leaders must then decide the programme's fate. A platform could be fielded as early as 2015 or 2016, says Schwarze...

In late May, Northrop said it had demonstrated - through an AFRL-funded study - that airborne electronic jammer aircraft were more effective and efficient when networked and enhanced by decision aids...

The study appears to validate the objectives of the 2005-cancelled Joint Unmanned Combat Air System programme, which was a joint air force and navy effort.

The 2005 Quadrennial Defence Review - a Pentagon requirements document updated every five years - directed the air force to terminate work on its portion of that programme and begin developing a new long-range bomber, which the service wants to field by 2018.

A final decision on whether the air force receives approval to allocate the funding in its internal spending plan is expected later this year. But funding levels and requirements could change when a new US president takes up office in January 2009.

Thursday, July 3, 2008

Cyberspace career fields, training paths, badge proposed

Air Force officials recently proposed a plan to develop its enlisted and officer corps into Airmen who specialize in establishing, controlling and fighting in the cyberspace domain.

That's according to Maj. Gen. William T. Lord, the Air Force Cyber Command (Provisional) commander who referenced AFCYBER's force development intent during a recent cyberspace symposium in Marlborough, Mass.

"We've created a roadmap that outlines our efforts to establish cyberspace operators, specialists, analysts and developers who grow from a basic understanding of cyberspace doctrine to experts in their respective fields," he said. "Along with outlining specific career fields that can be used throughout our Air Force, we also looked at how we can deliberately manage their career to grow cyberspace warriors, leaders and future visionaries."

Cyber warriors will be identified as operators -- officer and enlisted members who plan, direct and execute offensive and defensive actions; specialists -- enlisted communications and information personnel who specialize in technical aspects of cyberspace; analysts -- officer and enlisted intelligence personnel with the technical foundations to support cyberspace operations; and developers -- primarily officers and enlisted with advanced skills for designing and modifying software and hardware packages.

This roadmap provides details about cyberspace operators and specialists. Particulars for analysts and developers are expected to be outlined later this year. These changes will affect approximately 30,000 active-duty members and about 2,000 Guard and Reserve forces currently performing cyber-related duties.

Maj. Timothy Franz, the AFCYBER (Provisional) chief of force development, said numerous teams will be meeting throughout the coming year to fine tune the changes.

"We have a lot of work ahead of us still, but we know the direction we're headed," Major Franz said. "We're now working on an implementation plan that will define specific goals, objectives and tasks to make this vision a reality. Some of these tasks can be worked quickly and others will take a few more years."

Along with identifying career specialties, the roadmap also outlines education and training paths. Professional development for the approximately 30,000 civilians in cyberspace is still under review, but they will also be fully integrated into the implementation plan.

Cyberspace specialists
Members in the communications and information mission areas will transition to 15 new 1B Air Force specialty codes. This will require the phase out of the current 2E (communications-electronics), 3A (information management) and 3C (communications and computer systems) specialties.

All cyber enlisted members will start off with a 1B0 or 1B1 specialists skill set. As they enter their retraining window, a select few will have the opportunity to retrain into a 1B4 operator specialty. The 1B4s will possess new skills being developed to work on-net (1B4X1) and electronic (1B4X2) warfare missions. As cyberspace operators, they will attend additional cyber warfare training.

Cyberspace operators
Most officers will have technical, and possibly graduate-level technical degrees, but all will develop a breadth of knowledge and experience within cyberspace. The paths for officers will allow them to be technically proficient in many areas of cyberspace and, as they progress, develop a breadth of leadership skills required for senior leadership.

Current plans call for two new officer AFSCs: a 17D cyberspace warfare operator, which will require the phase out of the 33S (communications-computer) specialty; and a 12W electronic warfare officer, which will be a subset of today's 12X combat systems officer community.

Both the 17D and 12W AFSCs will be further developed under the oversight of a Cyberspace General Officer Steering Group with recommendations expected for later this year.

Cyberspace training
Cyberspace specific content is being added to the enlisted 2E, 3A and 3C basic technical (pipeline) courses. However, plans call for these courses to transition to the new AFSCs by 2010. This will be the first group affected by the implementation plan.

Along with new pipeline schools, more advanced training will be available through cyberspace 100/200/300/400 series of supplemental courses intended to focus on professional development throughout their careers. These courses will impart cyber-related knowledge, skills, and ability appropriate to an individuals' grade and experience, as well as provide exposure to aspects of the cyber warfare mission area which they may not have had experience. Cyber warriors will also attend formal training units that will be specific to their duty locations and missions.

In addition, there'll be "gap training" to transition existing communications and information personnel to their new cyberspace specialties. The gap training will be provided through a blended approach of computer-based training, targeted career development courses and mobile education teams as necessary. Specifics of courses and training content are yet determined.

Cyberspace badge
During the symposium, General Lord also revealed the proposed badge that will identify future cyber operators. The badge features lightning bolts to signify the cyberspace domain, center bolts taken from the navigator badge and the Air Force seal to signify cyberspace's worldwide power and reach and its common lineage and history of electronic warfare officers, and orbits to signify cyberspace's space-related mission elements. And, like other specialty badges, it will identify skill (certification) levels. Final approval and specifics of the wear criteria is under review at the Air staff.

<<080701-F-0000P-104[1].jpg>>

The way ahead
"Simply inserting new material about cyberspace power into current specialties will not suffice," General Lord said. "We must develop future leaders who understand how cyberspace operations integrate with conventional kinetic operations at all levels of command, with our sister services and throughout the Defense Department. Our teams of experts will spend the next few years further refining and developing what we've outlined in this roadmap. We all have a role in defending our cyberspace capabilities, but now we're on our way to having a specific cadre of professionals who'll help work to manage, deconflict, direct and integrate cyberspace operations."

1B enlisted specialists/operators
The enlisted force provides the technical depth needed to execute tactical missions. While the proposals call for the phase out of the 2E, 3A, 3C AFSCs, a review is also being done of the 1A3 (airborne mission systems) as cyberspace may use portions of this skill set as well.

For now, the proposed new specialties are:

1B0X1 -- knowledge operations: They will possess application and presentation networking skills necessary for content management, retrieval and presentation.

1B0X2 -- cyber systems operations: They will focus on servers, data storage, software applications, system technologies, protocols, standards and client interfaces.

1B0X3 -- cyber surety: They use information technology resources to monitor and evaluate policy and procedures to protect clients, networks, data and voice systems and databases from unauthorized activity.

1B0X4 -- computer programmer: They will develop and standardize tools and interfaces as well as possess the ability to transform raw data into actionable command and control information. They will also translate operational offensive and defensive requirements into program code to ensure freedom of maneuver in the cyberspace domain.

1B1X1 -- client systems specialist: They will integrate and sustain common client-level voice, data and video devices with a primary focus on end user devices.

1B1X2 -- cyber transport systems specialist: They will focus on sustainment of the network and telecommunication infrastructure, distribution media, cryptographic equipment, etc.

1B1X3 -- radio and frequency transmissions systems specialists: They understand space, radio and satellite systems technologies and configurations required to integrate and sustain airborne and terrestrial multimode, multiband radio frequency systems to include wireless voice, data and video systems.

1B1X4 -- cyber spectrum specialists: They engineer, nominate and assign frequencies to support communications requirements and coordinate frequency needs with federal, military and civil authorities.

1B1X5 -- radar systems specialists: They understand radar technology to support airfield, weather and early warning radar system missions. They will perform search, intercept, identification and location of sources radiating electromagnetic energy for purposes of threat recognition.

1B1X6 -- airfield systems specialist: They will understand meteorological, navigational and air traffic control radio, console and recorder technologies and will meet all national airspace system certification requirements.

1B1X7 -- cable and antenna systems specialist: They will link the base campus voice, data and video networks and focus primarily on external communications cables and radio frequency antenna systems.

1B1X8 -- control systems specialist: They monitor and control emergency and distribution management systems, and supervisory control and data acquisition systems.

1B1X9 -- mission systems specialist: They will perform cyberspace-related duties on airborne platforms and will primarily operate, maintain, repair and test airborne communications, sensor, computer and electronic systems.

1B4X1 -- on-net operations: These are network warfare operators who provide net attack, defense and exploit capabilities to disrupt, deny, degrade or destroy information or the delivery systems themselves. (Operators will retrain at the three- to five-year point.)

1B4X2 -- electronic warfare operations: They will integrate and sustain operations across the electromagnetic spectrum and will perform search, intercept, ID and location of sources for threat recognition and implement electronic protect and attack measures. (Operators will retrain at the three- to five-year point.)

Find links to story images at http://www.af.mil/news/story_media.asp?id=123105049.

See original story at http://www.af.mil/news/story.asp?id=123105049.

Monday, June 30, 2008

Boeing Awarded B-52 Airborne Electronic Attack Technical Maturation Contract

BOEING NEWS RELEASE

ST. LOUIS, June 27, 2008 -- The Boeing Company [NYSE: BA] has been awarded a $14.9 million contract by the U.S. Air Force Research Laboratory to develop and mature technologies required to enable airborne electronic attack from long distances, filling the stand-off electronic attack role. The contract includes systems engineering studies focusing on potential pod installation on the B-52H aircraft, as the designated demonstration airframe. This effort will advance the technology required for the planned Core Component Jammer (CCJ).

"We look forward to maturing the planned CCJ technology, which will keep our warfighters safer as they complete missions in the air and on the ground," said Scot Oathout, director of B-52 Programs for Boeing. "This is the first step in getting this capability fielded, and the B-52H is the right platform to mature this technology."

The multi-mission B-52H is the only platform in the Air Force inventory that accommodates all necessary attributes for jamming electronic attacks while delivering its full complement of weapons, including responsiveness, range, loiter time, size and power.

"Adding this capability to the B-52H will strengthen its position as the most versatile aircraft in the U.S. inventory," said Jeff Weis, CCJ program manager for Boeing. "The B-52 will still be able to deliver precision weapons on target while protecting other allied forces in theater."

The Boeing-led team will employ the electronic-attack expertise of Bethpage, N.Y.-based Northrop Grumman Integrated Systems. After successful completion of this initial three-year effort, a follow-on effort to demonstrate in-flight, stand-off jamming on the B-52 is scheduled for 2011-2012.

"Our decades of experience designing sophisticated airborne electronic attack systems tells us that the Boeing and Northrop Grumman team can develop a powerful, best-value jamming system for the Air Force with a minimum of risk," said Patricia McMahon, vice president and deputy, Northrop Grumman Integrated Systems Eastern Region. "The team is excited about delivering the results of our study to the Air Force."

USAF formally revives B-52 jammer with five-year study

http://www.flightglobal.com/articles/2008/06/26/224920/usaf-formally-revives-b-52-jammer-with-five-year-study.html

...

The USAF plans to spend $68 million over the next five years to improve the technical maturity of the contracts involved. On 23 June, Boeing received a contract worth nearly $15 million to complete aircraft integration studies for new phased-array pods called core component jammers (CCJ) and advanced exciters.

Northrop Grumman's Integrated Systems division, Boeing's previous competitor for the original SOJS contract, is now Boeing's subcontractor.

Potential suppliers for the CCJ - EDO, ITT, Northrop's Electronic Systems division and Raytheon - are being awarded separate contracts to develop the new jamming systems...

Wednesday, June 25, 2008

AFCYBER headquarters staff to operate virtually

Air Force Cyber Command officials announced their intent to spread out headquarters staffing among nine locations so it can meet the 45 percent manning requirements needed for initial operations.

"Normally, a major command headquarters will house all its staff functions at one place, but because the final basing decision for AFCYBER has not been determined, the command will operate in a virtual environment," said Maj. Gen. William T. Lord, the commander of the AFCYBER (Provisional).

He said this action will allow some personnel to be assigned to Barksdale Air Force Base, La. -- the interim headquarters location for the command -- and minimize relocation actions at the other places for the rest of the proposed 450-person HQ staff. Of the original 540 positions allocated for AFCYBER HQ staffing, about 90 of those positions were moved to man positions in the 24th Air Force and subordinate wings.

Thus the command will assign about 240 positions and fill them during the summer so it can declare initial operations capability by Oct. 1. It is not known at this time whether the rest of the 450 authorizations will also be assigned to the identified locations, or to new ones after that date, or be on hold until the final basing location is decided.

"We'll be operating in this virtual construct until the final basing decisions are made, which is expected to be announced by September of 2009. At that time the Air Force may be decide to keep AFCYBER in this construct, relocate all its staff to one place or perhaps a combination of the two," General Lord said. "What this virtual command will do for us is minimize environmental impacts to all involved while be able to move forward in building this command. The virtual construct is not intended to foreclose or presuppose any options for permanent basing."

During this process there are no new billets being created and there are no net increases in the number of people at these locations. Movements will result from a limited number of permanent change of sation actions, or, as in most cases, permanent change of assignments (same base but different organization) and through temporary duty assignments.

The numbers listed at the locations represent the authorizations being assigned as HQ staff at the time the command declares IOC.

<<080601-F-0000K-101[1].jpg>>

The locations and proposed numbers for authorizations are:

Barksdale Air Force Base, La. -- 36 billets. As the current location of the provisional command, the interim capability for the HQ staff will remain there until the final basing location is established. This will facilitate integrations with the Air Force Network Operations Center, a new 608th Air Operations Center and the command structure that provides forces to combatant commands.

Scott AFB, Ill. -- 69. Many of the A1-manpower and personnel functions, as well as the A6-communications functions are currently being done by members assigned to the Air Force Communications Agency. Those authorizations will be recoded to support the headquarters functions.

Langley AFB, Va. -- 58. Billet transfers will come from both the Air Combat Command and Global Cyberspace Integration Center. Much of the A5-plans and requirements and A8-strategic plans and programs functions for cyberspace already occur here.

Lackland AFB, Texas -- 43. This is the location of the Air Force Information Operations Center and the 67th Network Warfare Wing. This will allow for the leveraging of the A2-intelligence and the A3-air, space and information operations capabilities.

Tinker AFB, Okla. -- 5. The 3rd Combat Communications Group and the 38th Engineering and Installation Group are located here. Along with HQ, A3 and A6 functions, there will also be elements of A4-logistics that will work contracting issues for combat communications and engineering and installation requirements.

Davis-Monthan AFB, Ariz. -- 20. Davis-Monthan houses the 55th Electronic Combat Group. Interim capability for the new Electronic Warfare Wing headquarters will be established here to leverage the preponderance of EW forces gained by AFCYBER.

Wright-Patterson AFB, Ohio -- 13. This is where the most significant Air Force procurements are channeled as well as the leading Air Force Research and Development Center for cyberspace. The command will leverage its A4-logistics and A7-installations and mission-support functions here.

Hanscom AFB, Mass. -- 7. This is the location for major research and development operations as well as the program office for a large number of communications and cyberspace initiatives.

Griffiss ANGB (Rome Labs), N.Y. -- 2. Rome Labs currently conducts leading research for information operations and cyber warfare and these authorizations will take advantage of R&D efforts to advocate for the development of cyber capabilities.

Peterson AFB, Colo. -- 7 (tentative). Discussions are underway for achieving capabilities with space-related resources.

"Again, this represents the minimum capability required to activate the command and gain units," said the general. "We must move forward to provide people the right chain of command, the right leadership and be able to meet the Air Force's timeline on schedule."

See original story at http://www.af.mil/news/story.asp?id=123104128.

Monday, June 23, 2008

Air Force aims to improve electronic warfare capabilities

Controlling the electromagnetic spectrum to deny or attack an adversary -- that is electronic warfare, and the Air Force is in search of ways to maximize that capability.

Air Force leaders started the Electronic Warfare Life Cycle Management Group to establish a uniform approach to the research, development and evaluation of electronic warfare hardware, software, techniques and capabilities.

Col. Tim Freeman, the group's co-chairman, compared the electronic warfare community to a symphony orchestra.

"For years, Air Force electronic warfare has been like an orchestra warming up, and the (group) will be the conductor that brings it all together," said Colonel Freeman, commander of the 542nd Combat Sustainment Wing at Robins Air Force Base, Ga.

Before the group was established, there was no mechanism to pull together an enterprise view at how the Air Force conducts electronic warfare, he said.

"The result was that people were doing great things, but it was inefficient. In some cases, different organizations were paying different contractors to do the exact same things only because they weren't talking to each other," Colonel Freeman said.

The group's goal is to find commonalities across weapons systems that will allow standardization and interface among electronic warfare programs.

"It's all about aircraft survivability in combat," said Col. Robert Schwarze, chief of electronic warfare and cyber requirements at the Pentagon and co-chair of the warfare management group. "We maintain 56 electronic warfare systems (that use) 34 different computer languages. We thought, 'Hey, that's pretty stupid' and we're trying to make it better."

The F-35 Joint Strike Fighter, F-22 Raptor and B-1B Lancer are among the aircraft that have specific electronic warfare capabilities, but the Air Force currently can not transfer capabilities across multiple platforms.

If one aircraft type has a tremendous capability against a particular threat, the Air Force has to regenerate that separately for other platforms because no hardware or data standard exists. This requires additional research, manpower and money.

The group has a tiered structure with four echelons that includes all of the Air Force's electronic warfare organizations. The first echelon is the Senior Advisory Group, made up of general officers and senior executive service members, which is the decision-making body of the group.

The second echelon, the Technical Advisory Group, is the advisory and oversight body made up of colonels and senior civil service members. The final two echelons include the Electronic Warfare Product Group Manager, and System and Technique Evaluation Development teams.

"The (group) will help find ways to use the money we have more effectively, eliminate duplication of efforts and streamline processes," Colonel Freeman said. "This is probably the most prolific change in electronic warfare in the Air Force in 30 years. (We're) going to...make decisions that will keep the rest of the fleet, from an electronic warfare perspective, viable in the 21st Century."

See original story at http://www.af.mil/news/story.asp?id=123103791.

Friday, June 13, 2008

Israeli Jam Session (UAV-based Electronic Attack)

Excerpt from Aviation Week blog:

...Israel-based Elisra has developed countermeasure, or “self-protection” as they call it, systems for unmanned aerial vehicles (UAVs). The electronic intelligence system (ELINT), called the AS210, enables a fleet of UAVs to not only detect, identify and track incoming threats, but to defend against those threats...There are three layers to the AS210, Davidi said, area protection and self protection (one system relying on radio frequency and the second on infrared).

The area protection system is essentially a jamming system comprising a receiver, algorithm generator and a jammer...The Elisra system weighs in at 36 kg. “It’s the same one as in our F-16s,” he said. The jamming system covers a radius of about 120 km. “All the UAVs within that area will be protected.” The jamming system emits tracking information that creates a “ghost” UAV. It sends false vector, velocity, and other information to enemy radar.

The RF self-protection system has a chaff dispenser instead of a jammer, as does the IR system.

The IR sensor detects not only radiation from potential missiles, but can differentiate the heat source. The system relies on a unique algorithm to calculate the movement behind the IR emission and determine whether it’s a missile or a campfire. And if it is a missile, in which direction it’s headed. The RF package weighs about 12 kg and IR sensor package is 20 kg...

See full blog post at:

http://www.aviationweek.com/aw/blogs/defense/index.jsp?plckController=Blog&plckScript=blogScript&plckElementId=blogDest&plckBlogPage=BlogViewPost&plckPostId=Blog%3A27ec4a53-dcc8-42d0-bd3a-01329aef79a7Post%3Af04f0b2e-eef1-4036-b56e-4b5c0946c902

Tuesday, May 13, 2008

Cobham Buys M/A-COM for $425M

http://www.defensenews.com/story.php?i=3525558&c=EUR&s=TOP

LONDON - British aerospace and defense company Cobham has taken its acquisition spending in the U.S. this year past the $1 billion mark with the announcement here that it is buying M/A-COM from Tyco Electronics for $425 million.

M/A-COM is a world leading radio frequency components and subsystems suppliers with revenues in the year to September 2007 totaling $477 million. Just under 40 percent of that is in the aerospace and defense sector.

Cobham said it intends to sell off the commercial sector of the business, as it is noncore. Based on the encouraging levels of interest expressed by other bidders during the Tyco auction of M/A-COM, it expects a quick sale of the business, it said.

The aerospace and defense portion of the business employs some 1,000, based principally in California and Massachusetts. Company supplied systems can currently be found on the Joint Strike Fighter, Advanced Medium-Range Air-to-Air Missiles and Integrated Defense Electronic Countermeasures...

ViaSat to add Link 16 capability to Air Force Joint Communication Simulator

NEWS RELEASE

ViaSat Inc. (Nasdaq:VSAT) has received a $3.97 million Task Order (TO) for modification of the Joint Communication Simulator (JCS) under an Indefinite Delivery/Indefinite Quantity (ID/IQ) contract from the U.S. Air Force. The JCS enables accurate analysis of communication system performance without the expense of in-flight testing. This award continues to expand the simulation system capabilities to include new operating modes and communication, navigation and intelligence signals, including integrating Link 16 into government RF communication simulators.

"Link 16 is the preferred tactical data link between coalition forces and this development increases the utility of the JCS by adding this key communication signal to the RF simulation environment," said Greg Norton, program manager, ViaSat Simulation Systems Group.

For more than 10 years ViaSat has been developing and delivering communication, navigation, and identification (CNI) test systems to DoD customers. RF stimulation from ViaSat goes beyond ordinary simulation and computer modeling techniques to actually stimulate the avionics environment with real signals of RF energy, including RF jamming and background signals.

JCS systems are located at the Air Force Flight Test Center's (AFFTC) Electronic Warfare Avionics Test and Integration Complex (ATIC) at Edwards Air Force Base (EAFB), California and the Air Combat Environment Test and Evaluation Facility (ACETEF) at the Naval Air Warfare Center - Aircraft Division (NAWC-AD), Maryland.

For more information, see www.viasat.com/government-communications/rf-signal-stimulation.

Monday, May 12, 2008

Sources Sought for Radar Threat Signal Simulator Portable Calibration Unit

The 412 Electronic Warfare Group (EWG), Edwards AFB, CA, intends to solicit a order for a Portable Calibration Unit. The contractor shall perform to build, integrate, test, deliver, install, and verify a Portable Calibration Unit (PCU) for the CEESIM (Combat Electromagnetic Environment Simulator) radar threat signal simulators at the Benefield Anechoic Facility (BAF), Edwards AFB, California.

The basic CEESIM design is composed of a digital simulation and control component, called the Digital Generation System (DGS), and RF generation components, in the form of RF generator channels and RF transmit carts. To ensure the accurate RF representation of simulated signals, each CEESIM channel must be calibrated. Channels are calibrated one at a time using software executing on the DGS component, and using “monitor and calibration” racks containing software-controlled test equipment. During real-time execution of the simulation, a DGS is fully utilized to control the connected RF channels. Hence, if all simulators are being used for their intended purpose, no calibrations can be performed on remaining RF channels not being utilized. Furthermore, with only two sets of monitor and calibration racks, no more than two channels can be calibrated simultaneously in the best case.

The Portable Calibration Unit provided by this contract will be used to perform RF channel calibration independent of the valuable DGS and test equipment rack assets. Off-the-shelf test equipment will be used for calibration measurements. All relevant calibration functionality provided by the baseline CEESIM system will be available (frequency calibration, transmit linearization, transmit alignment, HFIM linearization, & HFIM DC offset adjustment), and with multiple PCUs, calibration of several RF channels will be possible simultaneously with real-time simulator operation.

The contract will consist of requirements that are detailed in the attached Performance Work Statement (PWS). This requirement is for ALL services identified in the PWS. Any qualified and interested companies responding to this announcement must be able to support all areas. NO partial support responses from industry will be accepted. The Government is seeking only, qualified, experienced sources interested in performing the services identified in the attached PWS. The contractor must have current expertise in the electronic warfare systems.

See additional details including statement of work at https://www.fbo.gov/?s=opportunity&mode=form&id=c5d5937e3aad9527c3e4be0d7c409747&tab=core&_cview=0.

Air Force Industry Day for Competitive Electronic Warfare Subsystem Performance Based Logistics Sustainment Strategies

Synopsis from FedBizOpps website:

1.  DESCRIPTION:  This synopsis is to make industry aware of and to extend an invitation to the upcoming Industry Day designed to familiarize potential offerors with the Communications and Electronics Commodity Council's (CECC) general concept of Competitive Performance Based Logistics (PBL) support contracts for sub-systems.  The CECC is currently considering the following two sub-systems for competitive PBL support:

a.  AN/ALQ 161A Radio Frequency Surveillance/Electronic Countermeasure System (RFS/ECMS) used on the B-1B Aircraft.  A Sources Sought Synopsis was previously posted on the Federal Business Opportunities website on 12 Dec 07 and responses were due on 23 Jan 08.

b.  Tactical Electronic Warfare System (TEWS) used on the F-15 aircraft.  A Sources Sought Synopsis with a response date of 23 May 08 is currently posted on the Federal Business Opportunities website.  https://www.fbo.gov/index?s=opportunity&mode=form&id=a275d2dc9a8391a2e13048b6c2d942f5&tab=core&_cview=0

2.  DATE/TIME

22 May (Thursday)

8:00-8:30am - Registration
8:30am-12:00noon - Presentations from the CECC  
12:00 until 1:30pm - Break for lunch (everyone makes your own plans)
1:30-4:00pm-Conduct previously scheduled one-on-one meetings with individual companies

23 May (Friday)

8:30am-4:00pm- Conduct previously scheduled one-on-one meetings with individual companies

3.  RESERVATIONS:  Contact Jeff Morgan and Debra Hester by e-mail at jeffrey.morgan.1@us.af.mil and debra.hester@robins.af.mil before noon on 21 May 08 to make reservations for the conference and request scheduling of a one-on-one meeting.  Be sure to identify all attendees from your company and provide their e-mail addresses. There is no fee to attend the conference.  The one-on-one meetings will be scheduled on a 1st come 1st served basis with priority given to scheduling out of town attendees on Thursday and local attendees on Friday.  Sessions will last ½ hour.  You may also contact us by phone:  Jeff Morgan at 478-327-3618 and Debra Hester at 478-327-3587.

For additional details and meeting location see: https://www.fbo.gov/?s=opportunity&mode=form&id=5a8a52119ade7d222d7fd189f65676e4&tab=core&_cview=0.

Monday, May 5, 2008

Northrop Grumman Receives Third Order for Airborne Electronic Attack Systems From U.S. Navy

NEWS RELEASE

The U.S. Navy is acquiring a third lot of Northrop Grumman Corporation (NYSE:NOC) Improved Capability (ICAP) III airborne electronic attack systems for its fleet of EA-6B Prowlers under a $101.9 million firm, fixed-price contract. The company will deliver seven complete systems, plus associated piece parts and spares. Deliveries are scheduled to begin during the second quarter of 2010.

 
To date, Northrop Grumman has delivered two lots of Prowlers modified with the new ICAP III system to the Navy. These aircraft have been deployed several times to support combat operations in Iraq and Afghanistan. The third lot will be delivered to the U. S. Marine Corps at Marine Corps Air Station Cherry Point, N. C., becoming part of Marine Air Group 14.

"We are very excited to support the Marine Corps as they transition to this next generation of EA-6B capabilities," said Patricia McMahon, vice president and Electronic Support and Attack Solutions Integrated Product Team leader for Northrop Grumman. "From its remarkable performance in Iraq and Afghanistan, we know that the combat-tested ICAP III system will fit well into the Marines' vision for supporting deployed infantryman and future electronic warfare networks."

Prowlers are a high-demand, low-density military asset used by U.S. forces in all airborne electronic attack missions. They are used heavily in the global war on terrorism. ICAP III is the latest of five generations of EA-6 airborne electronic-attack systems designed to identify, degrade and destroy enemy radar-guided air defense and communication systems. Prowlers equipped with ICAP III capabilities reached initial operational capability in 2005.

At the heart of the ICAP III Prowler are the new ALQ-218 receiver and the sophisticated algorithms that allow selective-reactive jamming and threat precision geolocation capabilities. ICAP III also has the new Multifunction Information Distribution System (MIDS). MIDS, which features the U.S. military's primary data-link system, LINK 16, will enable ICAP III Prowlers to become key nodes in the Navy's Sea Power 21 FORCEnet architecture.

Northrop Grumman, the EA-6B Prowler ICAP III prime contractor, will perform services under this contract in Bethpage. The company also manufactures the ICAP III ALQ-218 receiver subsystem. Major subcontractors include: BAE SYSTEMS, Nashua, N.H. and Times Microwave, Wallingford, Conn.

Air Force to award AEA-Electronic Warfare Studies and Analysis contract to JHU-APL

NOTICE OF CONTRACT ACTION, 02 May 2008

The Aeronautical Systems Center Capabilities Integration Directorate, ASC/XR, Wright-Patterson AFB, OH intends to solicit Johns Hopkins University Applied Physics Laboratory (JHU/APL), Laurel, MD 20723-6099 on a sole-source basis to provide technical analysis and systems engineering support for the Airborne Electronic Attack (AEA) system of systems (SoS) concept development and other Air Force Electronic Warfare (EW) projects, as required. As a DoD designated University Affiliated Research Center (URAC), JHU/APL has unique credentials based on their extensive experience in EW analyses, systems engineering support, and independent assessment ability supplied over the years to the Navy EA-6B/EA-18G and the Air Force EF-111 Electronic Attack (EA) platforms and numerous studies and analyses for DoD EW programs.

This Notice of Contract Action is published to notify potential subcontractors that this is anticipated to be a new contract awarded on a sole-source basis to JHU/APL around 1 Dec 08. This notice of intent is not a request for competitive proposals. Information received will be considered solely for the purpose of determining whether to conduct a competitive procurement. The proposed contract action is for services for which the Government intends to solicit and negotiate with only one source under the authority of FAR 6.302. The Air Force anticipates awarding JHU/APL a 5-year cost plus fixed fee contract not to exceed $24.5M . An approved system for storing and managing Top Secret material is required under this effort. The Government does not contemplate providing any equipment or data under this contract. It is anticipated that JHU/APL will provide analysis and engineering service support to the AEA SoS, as well as other Air Force and DoD/Service EW efforts.

The AEA SoS includes, but is not limited to, the B-52 with standoff support jamming capability, recoverable stand-in support jamming capability, Miniature Air Launched Decoy (MALD), MALD-Jammer (MALD-J), Navy EA-6B and EA-18G, Navy, Marine, and Air Force F-35, Air Force F-22 and Air Force EC-130H Compass Call; as well as appropriate network interconnectivity and local Electronic Combat battle management between and among the SoS elements for the employment of the SoS.

...

Companies who are interested in sub-contracting opportunities should contact Lou Colangelo of JHU/APL at (443) 778-5904. All documentation shall become the property of the Government. This synopsis neither constitutes a Request for Proposal, nor does it restrict the Government to a particular acquisition approach. This synopsis should not be construed as commitment by the Government for any purpose other than market research.

For additional info see https://www.fbo.gov/?s=opportunity&mode=form&id=c6baeb818bac883a9188430c99503ded&tab=core&_cview=0.

JSF 'at risk' from new Russian radars

http://news.theage.com.au/jsf-at-risk-from-new-russian-radars/20080501-29yn.html

Australia's new Joint Strike Fighter (JSF) combat aircraft could be vulnerable to a Russian radar technology which appears to overcome their key stealth advantage, a defence analyst has warned.

Dr Carlo Kopp, an analyst with the defence think tank Air Power Australia, says the risk was demonstrated almost a decade ago when Serbian air defences shot down a US F-117A Nighthawk stealth aircraft.

That wake-up call evidently was not heeded in the west, he said...

Russian publications stated quite bluntly that US stealth designs had been largely optimised to defeat widely-used radars operating in the centimetric and decimetric bands, Dr Kopp said.

Such radars feature wavelengths around 10-100 millimetres, but new advanced Russian digital radars, now being actively marketed, operate in the VHF (very high frequency) band with wavelengths about two metres.

Dr Kopp said stealth technology was very effective at defeating centimetric and decimetric radar but much less so at remaining invisible to VHF radar.

An analysis of JSF suggested it was particularly vulnerable to detection by radars in this band because of its small size and particular design, he said...

Once the Russians deployed their counter-stealth radars, it was to be expected that other nations such as China would follow, Dr Kopp said...

A defence spokesman said the very low observable (VLO) stealth characteristics of the JSF, as with all stealth aircraft, were optimised for specific radar frequency bands.

"However, even outside of these optimised bands a VLO aircraft is much harder to detect than a conventional aircraft," he said...

Sypris Data Systems Awarded Taiwan HF SIGINT Receiver Contract

NEWS RELEASE

Sypris Data Systems, Inc., a subsidiary of Sypris Solutions, Inc., announced today that it has received a contract to supply over 400 High Frequency (HF) receivers to Taiwan. The Digital Signal Processing (DSP) based software-defined receivers will be used for signal collection and monitoring purposes. Previously an established supplier of signal recording and storage devices, the contract award denotes the Company’s entrance into the Signals Intelligence (SIGINT) receiver market for HF, VHF/UHF and microwave requirements for fixed site, mobile, airborne and shipboard applications.

For more information visit www.sypris.com.

Analysis: China to get SAMs from Russia

Excerpted from http://www.spacewar.com/reports/Analysis_China_to_get_SAMs_from_Russia_999.html

Russia will deliver to China four battalions of 200-kilometer-range S-300PMU2 surface-to-air missiles this summer, the last batch in a series ordered by China. The first batch of four battalions of the same missiles was delivered in July 2007.

Starting in 1993, China received 12 battalions of S-300 SAMs, four of them S-300PMUs and eight S-300PMU1s. This means there are a total of 20 battalions of S-300 SAMs deployed in China. These missiles are expected to play a major role in China's core air defense system.

These missiles now cover the whole of the Chinese coast facing the Taiwan Strait...

In sum, there are five S-300 positions and two HQ-2 positions along the Taiwan Strait, the latter two located at Zhengzhou and Shantou Airports, with altogether 20 S-300 launchers. The No.2 Ground-to-Air Missile Brigade is stationed in this area.

S-300 positions are also found under construction in Beijing and Qingdao. The missiles have been sighted at the Zhonghuabu position near Qingdao, indicating this is the newest S-300 position, probably intended for the deployment of the latest S-300PMU2s. The importance of Qingdao lies in that the S-300s deployed here can be used to provide protection for the PLA Navy's No.1 Nuclear Submarine Base currently under expansion...

A new HQ-9 ground-to-air missile position has been observed at Fangezhuang, indicating that at least two battalions of HQ-9s are now under operational deployment...The deployment of HQ-9s in Beijing means that China's air defense capability has improved greatly, with a network that provides multiple-system, long-range and deep air defense. However, observers outside China have little knowledge of the technical parameters of the HQ-9...

Other S-300 positions have been identified in Dalian and Lushun. This region is given special attention as it occupies a strategically important location; any aerial attacks upon Beijing launched by U.S. forces based on the Korean peninsula would have to go through this region.

Another major city currently protected by S-300 SAMs is of course Shanghai, where the No. 3 Ground-to-Air Missile Brigade is stationed. The Nichung and Minhang S-300 positions to the south of Shanghai are very close to the shore, and are obviously intended to deal with air attacks on Shanghai by Taiwan's tactical air force units in the event of a confrontation...

The layout of the above missile positions reveals to some extent the tactical intentions of the PLA Air Force, that is, to give priority protection to Beijing and the coastal region with its S-300 SAMs. In particular, the air defense network along the coastal region including the Taiwan Strait and Shanghai has been greatly reinforced. A total of 18 S-300 SAM positions have been identified...

Find background information on the S-300 at http://en.wikipedia.org/wiki/S-300.

Friday, May 2, 2008

Signal Intelligence/Electronic Warfare Trainer contract award

The United States Special Operations Command has announced a Signal Intelligence/Electronic Warfare Trainer contract award in the amount of $335,727.20 to Radio Reconnaissance Technologies, Inc of Fredericksburg, Virginia.

Further information can be found at https://www.fbo.gov/?s=opportunity&mode=form&tab=core&id=ff9dc967e4d573305151adfc8ef9394a.

Air Force plans solicitation for Virtual Integrated Electronic Warfare Simulations (VIEWS)

The 412 Electronic Warfare Group (EWG), Edwards AFB, CA, intends to solicit and compete a limited competition, Cost-Plus Fixed Fee contract to the successful bidder. The contract will consist of multiple services that are detailed in the attached Performance Work Statement (PWS). This requirement is for ALL services identified in the PWS. Any qualified and interested companies responding to this announcement must be able to support all areas. NO partial support responses from industry will be accepted. The Government is seeking only, qualified, experienced sources interested in performing the services identified in the attached PWS.

Minimum Qualifications

General
The contractor must have current domain expertise in the field of military electronic warfare systems, both U.S./friendly and hostile. The contractor must have knowledge of the nature and operation of ground-based and airborne radar systems, complex and unique air defense modeling and simulation systems, electronic warfare passive sensors (both RF and IR), command and control networks and command and control techniques, integrated air defense systems and techniques, communications and datalink radio systems.

The contractor must also have experience in the use of signal simulators and stimulators in the test and evaluation of electronic warfare systems, including radar signal simulators, radar target return simulators, communications and navigation signal simulators, GPS signal simulators, and command and control simulators. The contractor must have in-depth expertise in these systems to develop and determine detailed integration requirements, programming requirements, and user/operator needs when multiple systems are integrated together. When connected together the multiple systems must be capable of coherent and synchronous operation.

DIADS Validation and Correlation
The contractor must have detailed knowledge of the DIADS (Digital Integrated Air Defense System) and the complexities associated with its interface within the ITIP (Installed Test Integration Program) architecture to satisfactorily perform the tasks related to validation and correlation. Only high level documentation of the DIADS and ITIP architecture is available. The contractor must have experience and knowledge specific to the normal and special management program aspects of the DIADS validation and correlation program. The validation and correlation activities are conducted at specific remote facilities. Since training of data analysts is not available at these facilities and access is very limited, it is absolutely necessary that the contractor have personnel that either have current or prior experience and knowledge to perform the highly complex data reduction and analysis tasks at these remote facilities.

ITIP System Components
The contractor must have detailed knowledge of the capabilities, design, and operation of the existing ITIP system components. These components include: Scenario Development, Test Control, Real-time Displays (including the Symvionics-developed Interactive Analysis and Display System ®), Data Reduction and Analysis. The contractor must have expertise in the internal design of the ITIP components, how they are implemented in hardware and software, and how they are interconnected to function with each other. The contractor must have experience in the integration of physically distributed real-time signal generation and control subsystems. The contractor must understand how each of these components support the Benefield Anechoic Facility (BAF) ground test activities and how they integrate to support the more complex multi-sensor test scenarios. The contractor must have expertise in software engineering and programming to undertake modifications of a large base of existing software code. The contractor must have experience in the Microsoft “.net” framework upon which this code is based.


Requirements

General Tasks

(a) Develop and install new releases of the ITIP and DIADS software at the 412 EWG and conduct site acceptance testing.
(b) Provide system administrative support for the DIADS software at the 412 EWG, to include system administrative support for DIADS workstations running both Sun Solaris and Red Hat Linux.

(c) Provide support in the development and modifications of ITIP and DIADS scenarios and laydowns and DIADS player library databases utilizing appropriate intelligence sources and support government personnel in the operations and maintenance of the DIADS model.

(d) Provide general purpose software tools (scripts and patches) for use with DIADS and other models as part of the analysis and exercise support; the development of scripts for the automatic retrieval of data from DoD databases and reformatting the data for use with the DIADS model; the development of scripts to extract post-mission data from the DIADS model and display it with a visualization program; the development of software to interface with DIADS during runtime and provide interim patches for DIADS software deficiencies.

(e) Provide support to government personnel in the setup, testing and operation of ITIP and DIADS systems; exercise support to include system architecture development, scenario development, testing, player development, and post exercise analysis.

(f) Provide network support for exercise and development networks where DIADS is installed; administrative and operational support for simulations interfaced to DIADS at various off-site model locations.

(g) Provide software development for DIADS to include: integrating DIADS into Distributed Interactive Simulation (DIS) and High Level Architecture (HLA) federations/exercises; modifying the existing code to correct deficiencies in the model and incorporate new code into the model to provide additional capabilities when requested.

(h) Develop new DIADS players, as required; develop command and control (C2) players and Surface to Air Missiles (SAM) players; develop Ground Control Intercept (GCI) players for DIADS as outlined by the 412 EWG and support the validation/correlation of DIADS players and scenarios, as required.

(i) Support ITIP and DIADS test/analysis activities by developing test requirements, preparing test plans and scenarios, conducting tests, performing data reduction and analysis, preparing test reports, recommending fixes/improvements.

(j) Identify, develop, and document system, subsystem, and configuration item requirements.
(k) Perform system interface development and integration of sometimes dissimilar 3rd party systems.
(l) Identify and document interface requirements; design hardware and software interface approaches; and manage the implementation of interfaces through final test.

(m) Develop real-time software and resolve real-time programming constraints; perform hardware/software integration; develop real-time data processing and display systems; develop user interfaces; develop storage, cataloging, and reporting tools for use with large sets of data; develop report generation tools for stored data.

(n) Identify trade spaces in new designs, and perform sufficient engineering analysis to propose best-case tradeoffs for new capabilities.

(o) Develop DIADS and ITIP system technical documentation, including: system user manuals; system design documentation; system programming and administration manuals; system hardware and functional diagrams; and system security documents

(p) Plan, develop, and present training courses on the design, maintenance, and operation of the systems.
(q) Develop the integration of DIADS into new ITIP systems utilizing the simulator interface processor (SIP) approach to interfacing the DIADS and the simulators/stimulators. The systems are required to operate synchronously and be coherent for certain type of test configurations.

(r) Perform test control, data reduction, test control and display system improvements and upgrades under various task directives.

For full details see https://www.fbo.gov/?s=opportunity&mode=form&tab=core&id=65d491a2c3b5589a1c4838de480cc92e&_cview=0

Air Force announces planned award for Multi-System Electronic Warfare Reprogramming Integrated Tool Set (MERITS) upgrade

The Air Force has announced a planned acquisition for engineering services to upgrade and more fully automate the Multi-System Electronic Warfare Reprogramming Integrated Tool Set (MERITS) capability, which will effectively reduce the time lag in getting updated and improved mission data to the warfighter.  MERITS is the mission data generator for the ALR-45/69 Radar Warning Receiver (RWR) Systems. 

Period of performance shall be 24 months after receipt of order (ARO).

The proposed contract action is for supplies or services for which the Government intends to solicit sole source to The Corporation of Mercer, Mercer Engineering Research Center, 135 Osigian BLVD., Warner Robins, GA, 31088-7810, Cage Code: 1WDH9, under authority FAR 6.302-1.

For full details see https://www.fbo.gov/?s=opportunity&mode=form&id=0ef18b643cb8a410780a8029e9a708a5&tab=core&_cview=0.

Army announces planned award for Contractor Logistical Support of the Suite of Integrated RF Countermeasures (SIRFC)

Solicitation Number: AN-ALQ-211{V}6-7APR08
Notice Type: Presolicitation Synopsis
Added: Apr 16, 2008 3:52 pm

The United States Special Operations Command, Technology Applications Contracting Office, has a requirement for Contractor Logistical Support (CLS) for the Suite of Integrated Radio Frequency Countermeasures (SIRFC) used within the U.S. Army Special Operations Aviation Regiment (Airborne) MH-47 and MH-60, and the Air Force Special Operations command CV-22. Logistic support consists of a contractor depot for repair of SIRFC, ALQ-136, and all associated equipment, field service representative (FSR), interim software support, configuration management, administration, depot parts, and Aviation Unit Level Maintenance (AVUM)/Organizational Level (O-level) maintenance spares. A time and material (T&M) purchase order is contemplated with a 90 day period of performance. The Government intends to solicit and negotiate with only one source under authority of FAR 6.302-1. Only one responsible source and no other supplies or services will satisfy agency requirements. The intended source of supply/service is ITT Corporation, Electronic Warfare Systems, 77 River Road, Clifton, NJ 07014. This notice of intent is not a request for a competitive quote; however, all responsible sources may submit a proposal which shall be considered.

The point of contact for this action is Bobbi Forbes, (757)878-5223 ext 239, e-mail: bobbi.forbes@us.army.mil.

For further details see https://www.fbo.gov/?s=opportunity&mode=form&id=fe3c4cc3e2419d5210867a66b3eeb64e&tab=core&_cview=0

Thursday, May 1, 2008

NASA releases "4D Ionosphere" plug-in for Google Earth

NASA-funded researchers released to the general public a new "4D" live model of Earth's ionosphere. Without leaving home, anyone can fly through the layer of ionized gas that encircles Earth at the edge of space itself. All that's required is a connection to the Internet.

"This is an exciting development," says solar physicist Lika Guhathakurta of NASA headquarters in Washington, DC. "The ionosphere is important to pilots, ham radio operators, earth scientists and even soldiers. Using this new 4D tool, they can monitor and study the ionosphere as if they're actually inside it."

The ionosphere is, in a sense, our planet's final frontier. It is the last wisp of Earth's atmosphere that astronauts leave behind when they enter space. The realm of the ionosphere stretches from 50 to 500 miles above Earth's surface where the atmosphere thins to near-vacuum and exposes itself to the fury of the sun. Solar ultraviolet radiation breaks apart molecules and atoms creating a globe-straddling haze of electrons and ions.

Ham radio operators know the ionosphere well. They can communicate over the horizon by bouncing their signals off of the ionosphere—or communicate not at all when a solar flare blasts the ionosphere with X-rays and triggers a radio blackout. The ionosphere also has a big impact on GPS reception. Before a GPS satellite signal reaches the ground, it must first pass through ionospheric gases that bend, reflect and attenuate radio waves. Solar and geomagnetic storms that unsettle the ionosphere can cause GPS position errors as large as 100 meters. Imagine a pilot flying on instruments descending toward a landing strip only to discover it is a football field to the right.

"Understanding the ionosphere is clearly important. That's why NASA's Living with a Star (LWS) program funded this work," says Guhathakurta, LWS program scientist. Space Environment Technologies, Inc. of California received the LWS grant and they partnered with Space Environment Corp. of Utah and the US Air Force to develop the 4D ionosphere.

"The best way to appreciate the 4D ionosphere is to try it," says W. Kent Tobiska, president of Space Environment Technologies and chief scientist of its Space Weather Division. He offers these instructions:

"One, download and install Google Earth (http://earth.google.com/)."

"Two, visit our web site (http://terra1.spacenvironment.net/~ionops/ES4Dintro.html) and click on the link 'Total Electron Content.'"

Wait for the file to load and presto—you're flying through the ionosphere: screenshot.

"Colors represent electron content," Tobiska explains. "Bright red is high density; that's where radio communications are restricted to few or no frequencies. Blue denotes low density; no problem there."

Using the intuitive Google Earth interface, users can fly above, around and through these regions getting a true 3D view of the situation. Make that 4D. "The fourth dimension is time. This is a real-time system updated every 10 minutes," he says.

The 4D model can be fun and even a little addictive, warns Tobiska, who likes to use it to pilot an imaginary plane over the Arctic. "A growing number of commercial business flights are crossing the Arctic Circle," he says. "It's the shortest distance between, say, Chicago and Beijing and many other major cities."

The ionosphere is particularly important to these lucrative flights. While they are over the Arctic, planes lose contact with most geosynchronous satellites and must rely on "old-fashioned" radio communications—a link that could be severed during a radio blackout. Using the 4D model, a flight controller could examine the ionosphere from the flyer's point of view and use that information to anticipate problems that could cause a flight to be delayed or diverted.

The proper name of the system is CAPS, short for Communication Alert and Prediction System. Earth-orbiting satellites feed the system up-to-the-minute information on solar activity; the measurements are then converted to electron densities by physics-based computer codes. It is important to note, says Tobiska, that CAPS reveals the ionosphere not only as it is now, but also as it is going to be the near future. "Forecasting is a key aspect of CAPS available to our customers from, e.g., the Dept. of Defense and the airline industry."

 

Paradigm shift: how Hezbollah won the July 2006 war

http://vineyardsaker.blogspot.com/2008/04/paradigm-shift-how-hezbollah-won-july.html

...

The Israelis only deceive themselves when they use alibis — bad decisions or inadequate preparation — to ‘explain’ their military failures. Ever since their withdrawal from southern Lebanon in April 2000, the Israeli leadership had prepared for the occasion to deal a knockout blow to Hezbollah. Indeed, when the Israelis launched their latest invasion of Lebanon, they had had more than six years to prepare.

The Hezbollah too had prepared. Without fanfare, but with dedication, discipline, skill, and cunning, the Hezbollah leaders assembled an arsenal of low-tech rockets as well as more advanced missiles; they built secret bunkers; they laid out defensible communications; they acquired capabilities in electronic warfare; they used drones and eaves-dropping equipment to gather information; they placed spies inside Israel; they studied their enemy; and, most importantly, they had planned and trained, while maintaining the highest secrecy.

...

Israel had started the war against Lebanon, convinced that it could destroy Hezbollah or greatly diminish its military force within a few days — and do it with air power alone. Israel’s decision to end the war 33 days later, even as Hezbollah kept up its barrage of Katyusha rockets into Israel, was a dark chapter in Israel’s military history. Israel’s military might had been neutralised by a seemingly Lilliputian adversary.

In July 2006, agility and cunning favoured the Hezbollah. Consider the victories that Israel failed to score against this tiny but agile foe: it failed to destroy or jam Hezbollah’s communications network; to knock out its television and radio stations; to kill or capture Hassan Nasrallah; or to dent Hezbollah’s ability to launch Katyusha rockets into Israel.

...

The Hezbollah scored its most impressive military victory in the area of intelligence. Israel’s electronic warfare systems are amongst the most advanced in the world; they are war-tested and developed in cooperation with the United States. Indeed, the Israeli commanders were certain at the outset of the war of their ability to jam Hezbollah communications. They were wrong. Hezbollah’s command and control system remained operational throughout the war; they evaded Israeli jamming devices by using fibre optic lines instead of relying on wireless signals.

The Hezbollah had blocked the Barak anti-missile system on Israeli ships; hacked into Israeli battlefield communications in order to monitor Israeli tank movements; and, they monitored cell phone conversations in Hebrew between Israeli reservists and their families. They intercepted Israeli military communications on battlefield casualties and announced them on their media network. They successfully employed decoys to hide the location of hundreds of bunkers they had built in southern Lebanon to store weapons and shelter their fighters. As a world leader in weapons technology and communications, Israel had held a decisive advantage in electronic warfare in its wars with Arab armies. The Hezbollah neutralised this advantage.

...

If the Hezbollah can extend these advantages, if it can add shoulder-fired anti-aircraft missiles to its arsenal and bring down a few Israeli helicopters and jets, Israel could quickly lose its unchallenged control over Lebanese skies. Israel’s daily and wanton violations of Lebanese airspace would also come to an end.

The Hezbollah offers Israel a new kind of asymmetric warfare: it combines low-tech guerilla tactics with sophisticated missile and communications technology. Understandably, the Israelis find these Hezbollah achievements hard to digest. What the world witnessed in Lebanon in July 2006 were events that contain the potential for shifting the balance of power in the Middle East. Earlier, the Iraqi insurgents had demonstrated that they can make an occupation — even by the world’s greatest power — very costly. Now, the Hezbollah had shown that a disciplined guerilla force, with access to advanced missiles, can repel the most powerful invading army.

It appears that the weapons gap that had opened up in recent decades between western powers and the weaker, technologically backward nations may be closing....Will the 21st century herald the dawn of another era of gains for movements of resistance across Asia, Africa and Latin America?

The Hunt for the Kill Switch

http://spectrum.ieee.org/may08/6171

Are chip makers building electronic trapdoors in key military hardware? The Pentagon is making its biggest effort yet to find out...

According to a U.S. defense contractor who spoke on condition of anonymity, a "European chip maker" recently built into its microprocessors a kill switch that could be accessed remotely. French defense contractors have used the chips in military equipment, the contractor told IEEE Spectrum. If in the future the equipment fell into hostile hands, "the French wanted a way to disable that circuit," he said. Spectrum could not confirm this account independently, but spirited discussion about it among researchers and another defense contractor last summer at a military research conference reveals a lot about the fever dreams plaguing the U.S. Department of Defense (DOD)...

The dwindling of domestic chip and electronics manufacturing in the United States, combined with the phenomenal growth of suppliers in countries like China, has only deepened the U.S. military's concern.

Recognizing this enormous vulnerability, the DOD recently launched its most ambitious program yet to verify the integrity of the electronics that will underpin future additions to its arsenal. In December, the Defense Advanced Research Projects Agency (DARPA), the Pentagon's R&D wing, released details about a three-year initiative it calls the Trust in Integrated Circuits program...In January, the Trust program started its prequalifying rounds by sending to three contractors four identical versions of a chip that contained unspecified malicious circuitry. The teams have until the end of this month to ferret out as many of the devious insertions as they can...

In 2004, the Defense Department created the Trusted Foundries Program to try to ensure an unbroken supply of secure microchips for the government...

Three years ago, the prestigious Defense Science Board, which advises the DOD on science and technology developments, warned in a report that the continuing shift to overseas chip fabrication would expose the Pentagon's most mission-critical integrated circuits to sabotage. The board was especially alarmed that no existing tests could detect such compromised chips, which led to the formation of the DARPA Trust in IC program...

So what's the best way to kill a chip? No one agrees on the most likely scenario, and in fact, there seem to be as many potential avenues of attack as there are people working on the problem. But the threats most often mentioned fall into two categories: a kill switch or a backdoor.

A kill switch is any manipulation of the chip's software or hardware that would cause the chip to die outright—to shut off an F-35's missile-launching electronics, for example. A backdoor, by contrast, lets outsiders gain access to the system through code or hardware to disable or enable a specific function. Because this method works without shutting down the whole chip, users remain unaware of the intrusion. An enemy could use it to bypass battlefield radio encryption, for instance...

Almost all FPGAs are now made at foundries outside the United States, about 80 percent of them in Taiwan. Defense contractors have no good way of guaranteeing that these economical chips haven't been tampered with. Building a kill switch into an FPGA could mean embedding as few as 1000 transistors within its many hundreds of millions. "You could do a lot of very interesting things with those extra transistors," Collins says.

The rogue additions would be nearly impossible to spot. Say those 1000 transistors are programmed to respond to a specific 512-bit sequence of numbers. To discover the code using software testing, you might have to cycle through every possible numerical combination of 512-bit sequences. That's 13.4 × 10153 combinations. (For perspective, the universe has existed for about 4 × 1017 seconds.) And that's just for the 512-bit number—the actual number of bits in the code would almost certainly be unknown. So you'd have to apply the same calculations to all possible 1024-bit numbers, and maybe even 2048-bit numbers, says Tim Holman, a research associate professor of electrical engineering at Vanderbilt University, in Nashville. "There just isn't enough time in the universe." ...

Clearly, the companies participating in the Trust in IC program have their work cut out for them. As Collins sees it, the result has to be a completely new chip-verification method. He's divided up the Trust participants into teams: one group to create the test chips from scratch; another to come up with malicious insertions; three more groups, which he calls "performers," to actually hunt for the errant circuits; and a final group to judge the results.

To fabricate the test chips, Collins chose the Information Sciences Institute at the University of Southern California, Los Angeles. He picked MIT's Lincoln Laboratory to engineer whatever sneaky insertions they could devise, and he tapped Johns Hopkins University Applied Physics Laboratory, in Laurel, Md., to come up with a way to compare and assess the performers' results.

The three performers are Raytheon, Luna Innovations, and Xradia. None of the teams would speak on the record, but their specialties offer some clues to their approach. Xradia, in Concord, Calif., builds nondestructive X­ray microscopes used widely in the semiconductor industry, so it may be looking at a new method of inspecting chips based on soft X­ray tomography...

Luna Innovations, in Roanoke, Va., specializes in creating antitamper features for FPGAs. Princeton's Lee suggests that Luna's approach may involve narrowing down the number of possible unspecified functions...

Raytheon, of Waltham, Mass., has expertise in hardware and logic testing, says Collins. He believes the company will use a more complex version of a technique called Boolean equivalence checking to analyze what types of inputs will generate certain outputs...