Military technology

  • Unmanned aerial logistics system to bypass ground-based threats, challenges

    Rugged terrain and threats such as ambushes and Improvised Explosive Devices (IEDs) can make ground-based transportation to and from the front lines a dangerous challenge. Combat outposts require on average 100,000 pounds of material a week, and high elevation and impassable mountain roads often restrict access. Unmanned aerial logistics system would bypass ground-based threats and enable faster, more effective delivery of cargo and other essential services in hard-to-reach areas.

  • Israeli legal expert urges development of ethics code for cyberwarfare

    Col. Sharon Afek, former deputy military advocate general, says that countries would benefit from developing an ethics code to govern cyber warfare operations. He notes that existing law already prohibits cyber operations which would directly lead to loss of life, injury, or property damage, such as causing a train to derail or undermining a dam. “Israel faces a complex and challenging period in which we can expect both a cyber arms race with the participation of state and non-state entities, and a massive battle between East and West over the character of the future legal regime,” he writes. He acknowledges, though, that only a catastrophic event like “Pearl Harbor or Twin Towers attack in cyberspace” would accelerate developments in this area.

  • Most of Libya’s chemical weapons destroyed

    When Libya joined the Chemical Weapons Convention in December 2003, it reported to the Organization for the Prohibition of Chemical Weapons (OPCW) that it was operating three chemical-weapons production facilities, and that it had produced a total of twenty-five tons of sulfur mustard gas, 3,563 bombs with warfare agents, and 1,390 tons of precursor materials. Over the next eight years, these chemical weapons stock were systematically destroyed under international supervision. The work was halted between February and November 2011 – the beginning of the rebellion against Qaddafi and his departure from power – and resumed in early 2012. OPCW announced than on 26 January 2014, work on destroying Libya’s mustard gas has been completed. The question is whether the Qaddafi regime was truthful in its 2003 declaration – or whether there are still stocks of chemical agents stashed somewhere in desert caches.

  • First full-system mechanical environment test of B61-12 nuke completed successfully

    The U.S. National Nuclear Security Administration (NNSA) announced the successful completion of the first full-system mechanical environment test of the B61‑12 as part of the NNSA’s effort to refurbish the B61 nuclear bomb. This first full-system mechanical environment test is one of several critical milestones for the B61-12 Life Extension Program (LEP). The B61-12 will replace the existing B61-3, -4, -7, and -10 bombs. Fielding the B61-12 will also enable the retirement of the B83, the last U.S. megaton class weapon, in the mid-to-late 2020s.

  • U.S. Navy probes exam cheating at school for nuclear power reactor operator

    Yet another military service is facing allegations of exam-cheating. Earlier this year, the U.S. Air Force launched a probe into a cheating scandal involving about 100 officersat Malmstrom Air Force Base, Montana, who are responsible for maintaining and operating land-based nuclear missiles. Now the U.S. Navy is investigating about one-fifth of its trainers at the school for naval nuclear power reactor operators in Charleston, South Carolina. The sailors are accused of cheating on written tests required to obtain certification as instructors at the nuclear propulsion school.

  • New research on ocean conditions to aid Navy planners

    The Office of Naval Research Global (ONR Global) announced last week a grant to the University of Melbourne which will provide new insights into ocean conditions — crucial information for Navy planners involved in tactical and strategic decision-making. The goal of the effort is to provide the best information possible on the environmental, or battlefield, conditions, so that tactical and strategic decisions can be properly made.

  • Chemical, defense companies subject to Chinese Nitro attacks

    More and more chemical and defense companies around the world are victims of Nitro attacks. These attacks, launched by government-backed Chinese hackers, install PoisonIvy, a Remote Access Tool (RAT) stealthily placed on computer systems to steal information. The majority of the computers infected belong to firms in the United States, Bangladesh, and the United Kingdom.

  • National Guard units help states ward off cyberattacks

    Governors across the United States are mobilizing their states’ National Guard units to combat threats from cyberattacks. The state of Washington was the first state to assign the state’s National Guard cybersecurity responsibilities. The state recognized the potential of its National Guard as a cyberforce when it realized that many of its soldiers, who are full-time employees and part-time soldiers, worked for tech employers such as Google, Boeing, Cisco, Verizon, and Microsoft.

  • Barrier technology strengthens protection at Navy ports

    Advanced technology rules the day in modern warfare — yet one very real threat to the U.S. Navy comes from a simple but deadly enemy strategy: small speed boats laden with explosives ramming into ships in harbor. Now a new maritime security barrier, developed with support from the Office of Naval Research (ONR), could provide a quantum leap in existing sea-port protection.

  • “Space cops” to help control traffic in space, prevent satellites from colliding

    Collisions in space of satellites and space debris have become increasingly problematic. A team of scientists are using mini-satellites that work as “space cops” to help control traffic in space. The scientists used a series of six images over a 60-hour period taken from a ground-based satellite to prove that it is possible to refine the orbit of another satellite in low earth orbit.

  • Gaza-based Palestinian hackers compromise Israeli defense ministry computer

    Hackers broke into a computer at the Israeli Ministry of Defense through an e-mail attachment tainted with malicious software. The attachment looked as if it had been sent by the country’s internal security service, the Shin Bet. it was likely that Palestinians were behind the cyberattack, saying that the more recent attacks were similar to cyberattacks against Israeli computers more than a year ago. Those attacks originated in the Hamas-controlled Gaza Strip. The attackers used an e-mail attachment to infect the computers with Xtreme RAT malware, which is a remote access Trojan. The malware allows hackers complete control of an infected machine. They can steal information, load additional malicious software onto the network, or use the invaded computer as a base of operations from which to conduct reconnaissance and attempt to gain deeper access into the network.

  • U.S. weapons shipped to moderate Syrian rebels after secret congressional approval

    U.S. and European sources have confirmed that U.S.-manufactured light arm have been flowing to moderate Syrian rebels in the south of Syria, and that Congress has approved funding to continue the shipments for the next few months. The weapons, which are being delivered to the rebels through Jordan, include both light arms and heavier weapons such as anti-tank rockets. The shipments, however, do not include shoulder-fired anti-aircraft missiles.

  • Israeli jets destroy Hezbollah-bound advanced Russian missiles stored near Latakia

    Large warehouses near the port city of Latakia, where the Assad regime stored advanced Russian missiles before shipping them to Hezbollah, were destroyed by aerial attack late Sunday. Israel has already launched six attacks in 2013 on Syrian arms shipments to Hezbollah — on 30 January, 3 May, 5 May, 5 July, 18 October, and 30 October. The attack on 5 July was on storage facilities in the same Latakia area, where Syria kept a large quantity of advanced P-800 Oniks anti-ship missiles, also called Yakhont missiles. Three weeks after the attack, U.S. sources said that the attack did not succeed in wiping out all of the missiles. “American officials said that further Israeli strikes are likely,” the New York Times reported on 31 July.

  • USAF nuclear-missile officers alleged to have regularly cheated on readiness tests

    Three former U.S. Air Force officers have alleged that USAF officers responsible for operating nuclear-armed missiles at Malmstrom Air Base in Montana have, for many years, been cheating on monthly readiness tests, and were never punished for it. The former officers claim that cheating is the norm and that officers who did otherwise are the exception.The officers who made the allegations added, though, that misconduct on tests did not impair the safety of the nuclear weapons or the Air Force’s ability to launch missiles if ordered.

  • The basis for a permanent deal: deep, verifiable changes to Iran’s nuclear program

    A new study says that only broad and verifiable changes to Iran’s current nuclear program could serve as a basis for a permanent nuclear deal between Iran and the international community. Among the changes: reducing the number of Iran’s uranium-enrichment centrifuges from the current 19,500 to no more than 4,000, and limiting Iran to one enrichment site; converting the heavy-water reactor being built in Araq to a light-water reactor fueled by low-enriched uranium; and imposing a tight, intrusive inspection regime for at least twenty years.