CyberDefense REPORT – January 2017                               
January 2017

The CyberDefense quarterly newsletter from the editorial staff of mil-embedded.com and OpenSystems Media provides features, news, columns, and more covering cyber technology as well as hardware and software designs for cyber defense and information warfare in the defense and aerospace domain, as well as commercial markets.


View our archive of recent and past issues of the CyberDefense REPORT e-mail newsletter.




Cybersecurity for U.S. power grid contracts won by Raytheon></a></td>
                                  <td class=
Cybersecurity for U.S. power grid contracts won by Raytheon

Raytheon won multiple contracts from the Defense Advanced Research Projects Agency (DARPA) to research and develop technologies to detect and respond to cyber attacks on the U.S. power grid infrastructure.


WFMC+ Mezzanine Card Evolution for Low Latency and High Bandwidth Solutions

Latency, or the time between input and output, can be very important, depending on the application - Click here to read more!


Military C4ISR market growth creates opportunities for cybersecurity and COTS suppliers></a></td>
                                  <td class=
Military C4ISR market growth creates opportunities for cybersecurity and COTS suppliers

Analysts at Frost & Sullivan are forecasting global military command and control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) spending to grow steadily through 2020, due to cybersecurity solutions sales as well as increased requirements for assured GPS/navigation, unmanned sea vehicles, and missile defense systems.


Cybersecurity simulation and training collaboration forged by SAIC, root9B></a></td>
                                  <td class=
Cybersecurity simulation and training collaboration forged by SAIC, root9B

Officials at Science Applications International Corp. (SAIC) and root9B have joined hands to provide advanced cybersecurity training and simulation environments to military and other government users. Under the agreement, the companies will focus on redefining how organizations ready their personnel to perform cyber operations via tailored training, dynamic simulation, and realistic scenarios.


DoD announces two cybersecurity initiatives></a></td>
                                  <td class=
DoD announces two cybersecurity initiatives

In an effort to draw on the success of last summer's “Hack the Pentagon” bug-bounty pilot -- in which hackers from across the country were given free rein to spot vulnerabilities in specific Department of Defense networks in return for cash payments -- the Department of Defense (DoD) today unveiled two new initiatives designed to further enhance the DoD's cybersecurity position.


Raytheon encryption devices provide Navy tactical radios with next-gen safeguards></a></td>
                                  <td class=
Raytheon encryption devices provide Navy tactical radios with next-gen safeguards

Raytheon engineers will provide the U.S. Navy with next-generation encryption devices to protect military tactical data transmissions for air, surface, subsurface, and ground assets under a $32 million production contract.


Probabilistic models will be developed for IARPA's insider threat detection program></a></td>
                                  <td class=
Probabilistic models will be developed for IARPA's insider threat detection program

Engineers at Charles River Analytics Inc. will support the Intelligence Advanced Research Projects Activity (IARPA) in the advancement of the Continuous Insider Threat Detection (SCITE) Program. The contract spans over a year and is valued approximately $1.25 million. If all options are exercised in the contract, it could add to the total an additional $2.5 million.


NCI tasked to engineer and test INSCOM C4I/IT systems for U.S. Army></a></td>
                                  <td class=
NCI tasked to engineer and test INSCOM C4I/IT systems for U.S. Army

The U.S. Army Information Systems Engineering Command, National Capital Region Engineering Directorate tasked NCI, Inc. to deliver engineering and integration services to the U.S. Army Intelligence and Security Command (INSCOM) at Fort Meade, Maryland under the TEIS III contract. The task order is valued at $10 million and covers an 18-month period.


DoD tasks SGI to upgrade ARL computing technology></a></td>
                                  <td class=
DoD tasks SGI to upgrade ARL computing technology

Department of Defense (DoD) officials selected Silicon Graphics International Corp. (SGI) to upgrade two of the Army Research Laboratory Defense Supercomputing Resource Center (ARL DSRC) systems with the company's SGI ICE XA, as part of the technology insertion (TI-16) for the High Performance Computing Modernization Program (HPCMP).


NAVAIR selects MacAulay-Brown, Inc. to provide cyber warfighting capabilities></a></td>
                                  <td class=
NAVAIR selects MacAulay-Brown, Inc. to provide cyber warfighting capabilities

U.S. Navy officials selected MacAulay-Brown, Inc. (MacB) to support the Naval Air Systems Command (NAVAIR) Cyber Warfare Detachment (CWD) initiative and provide cyber warfighting capabilities for Navy aircraft, weapons, and related aviation systems and subsystems including ashore and afloat enterprise systems.


Semi-rugged notebooks ordered by U.S. Army></a></td>
                                  <td class=
Semi-rugged notebooks ordered by U.S. Army

U.S. Army officials placed an order with Getac for 3,750 S410 semi-rugged notebooks that will be used to help digitally capture medical treatment data in operational environments, enhance continuity of care, and enable a comprehensive lifelong electronic health record for service members.




Leveraging VPX experience aids development of secure, rugged rackmount servers
Leveraging VPX experience aids development of secure, rugged rackmount servers

Few companies in the business of manufacturing boards and systems using VITA technology exclusively develop products based on that technology. They also develop products in other form factors, depending on their market focus and the needs of their customers. Successful suppliers leverage the same core technology into various form factors in a way that minimizes the amount of development work and maximizes the reuse of their own core competencies.


PICMG COM Express Type 7 includes 10 GbE
PICMG COM Express Type 7 includes 10 GbE

A new COM Express specification developed by the PICMG is soon to be released. One of the upcoming major advancements is the COM Express Type 7 pinout, supporting up to four 10 GbE-KR interfaces, making it ideally suited for the new edge node servers required by Internet of Things (IoT) and Industry 4.0 applications. By 2020, it is expected that data created and copied annually (much of it from IoT, cloud, and big data applications) will increase to around 44 zettabytes. That’s 44 trillion gigabytes. In order to minimize traffic between clients, central clouds, and data centers, data should be processed as close as possible to its place of origin or inquiry location.


Business barometer: 2017 trend predictions
Business barometer: 2017 trend predictions

Trend predictions during an election year are extremely challenging, especially in the circus election that is going on in the United States right now. By the time you read this, it will all be over, and there is a good chance that I may be headed to Australia for a few years! Here goes my attempt to share a few highlights for what developments I expect to unfold in the market next year.





Security driving military communications development
Security driving military communications development

Defense electronics suppliers in the military communications market cite cybersecurity, encryption, wireless network security, etc., as critical targets for development funding going forward.



How much and what kind of coverage analysis is enough?
How much and what kind of coverage analysis is enough?

The discussion of coverage analysis can bring up a number of different assumptions that do not always agree. Does it mean checking that all the code has been executed? Does it mean that all requirements have been exercised and tested? Does it bring up some number other than 100 percent that can be relied upon for functioning code? What we want to do is to assure ourselves that a program has been thoroughly tested to the point it can be relied upon, even in life-threatening situations. How do we achieve this and what aspect of “coverage” will allow us to rest easy?


Nail down software security with dynamic analysis
Nail down software security with dynamic analysis

You’ve secured your Internet of Things (IoT)-connected system with components for authentication such as password, retina scan, physical key, plus encryption/decryption and more. But building these things in is not enough. You’ve got to be certain that they all work together properly and that the code doesn’t contain any flaws that could grant access to hackers. Security needs to be built in at the very start of the project by using secure protocols and continuing on up to functional elements in the application. One powerful tool for gaining this assurance is dynamic analysis.


In a cyberwar
In a cyberwar

This is another broad, sticky, and complex topic, much like the previous article on cryptology. So, let’s get started by offering some definitions. A cyberwar is when computers in one country’s critical infrastructure are attacked by computers (and specific software) on the Internet, or through movable memory devices, controlled by another country’s intelligence groups, military services, or government sponsored hackers. The attackers typically use proxy (hijacked) computers, unknowing mercenaries, to carry out the attack so the malfeasance cannot be tracked directly back to the initiator.




Subscribe to Military Embedded Systems in print and online.