Recently the U.S. Air Force successfully tested a new MS-177 sensor system for its RQ-4B Global Hawk UAV. The new sensor system is an MSI (multi-spectral imaging) type and the third generation of space satellite quality radar/optical sensors for the 13-ton RQ-4B UAV. This is a large, jet powered UAV that entered service in 2006.… Read More The new sensor system is an MSI (Multi-Spectral Imaging)
Russia has had a hard time competing with Israel and the United States when it comes to UAVs (unmanned aerial vehicles or drones), especially when it comes to specialized small UAVs called loitering munitions. These are smaller UAVs that can carry out aerial search for a target and, if one is found, the operator can… Read More UAV’s Loitering Munitions, a Summary on the Latest Technology.
During the recent Hamas/Israel ten-day war there were ample opportunities to test new Israeli AUD (Anti UAV Defense) systems. Israel is a leader in the development of AUD, mainly because it is the one country that faces the widest variety of UAV (Unmanned Aerial Vehicles) types, and most attacks using UAVs. In preparation for a… Read More Testing of new Israeli AUD (Anti UAV Defense) systems during the Hamas/Israel ten-day war.
The U.S. believes they have spotted a new Chinese ASAT (anti-satellite) system in orbit. This one, Shijian-17, has a grappling arm that enables the ASAT to maneuver into position and grab another satellite for closer examination or to put it in another orbit that will cause it to plunge earthward and burn up in the… Read More News Monitors – Explanation About the New Chinese ASAT (anti-satellite) system in orbit
WASHINGTON — A group of top U.S. national security agencies warned Monday in a report that adversarial nations’ influence on 5G standards is a major threat to securing advanced communications networks of the future. Standard-setting bodies for 5G technology are vulnerable to “undue influence” from adversarial nations that want to boost proprietary technologies and limit future interoperability… Read More News Monitors: On 5G vulnerabilities and The Billions Spent on Experiments
Saudi Arabia has a growing problem with Iranian UAVs (Unmanned Aerial Vehicles) used as cruise missiles. For several years Iran has been smuggling in UAV components to northern Yemen where Shia rebels have been trying to take over the entire country since 2014. That offensive was thwarted in 2015 by the intervention of an Arab… Read More In-depth Look: Saudi Arabia’s growing problem with Iranian UAVs used as cruise missiles
Since the 1990s North Korea has been training more and more Internet software engineers and hackers, even though North Korea has limited access to the Internet. They made the best of their situation by having North Korean Internet engineers build an intranet. This is an Internet type network for North Korea that has no access… Read More Information Warfare: An Inside Look On North Korea’s Intranet.
The U.S. Air Force indicates the importance of little-known equipment and aircraft by the amount of money it devotes to maintaining and expanding their capabilities. One of the best examples of this is the BACN (Battlefield Airborne Communications Node) technology and the aircraft used to carry it aloft. The air force recently spent $3.6 billion… Read More BACN (Battlefield Airborne Communications Node) technology and the aircraft used to carry it aloft.
In early 2021 the Israeli military announced that it was the prime backer of the new Advanced Navigation Technology Center. This new division of state-owned IAI (Israel Aerospace Industries) will develop and manufacture a new generation of INS (Inertial Navigation System) technology to complement or replace satellite (GPS) guidance. IAI did not provide any more… Read More New generation of INS (Inertial Navigation System) technology to complement or replace satellite (GPS) guidance.
In late 2020 someone carried a major hacking attack on Israeli supply and logistics firms. Worse, it wasn’t a ransomware attack demanding money but simply to obtain information, and this series of attacks was very successful. The attackers first penetrated Amital Data, an Israeli software developer that supplies specialized software to firms that distribute goods.… Read More Analysis: On the Fallout from the Amital Cyber Attack. Tracking Bitcoin Payments Back to Iran