CyberDefense REPORT – March 2017                               
March 2017

The CyberDefense quarterly newsletter from the editorial staff of mil-embedded.com and OpenSystems Media provides features, news, columns, and more covering cyber technology as well as hardware and software designs for cyber defense and information warfare in the defense and aerospace domain, as well as commercial markets.


View our archive of recent and past issues of the CyberDefense REPORT e-mail newsletter.




DoD launches open-source initiative></a></td>
                                  <td class=
DoD launches open-source initiative

The Department of Defense (DoD) has announced its launch of "Code.mil," an open-source effort that enables software developers around the globe to collaborate on unclassified code written by federal employees in support of DoD projects. DoD is partnering with GitHub, an open-source platform, to experiment with promoting increased collaboration between federal employees and private-sector software developers on software projects built within the DoD.


Rapid Prototyping a High-Performance Embedded Computing System

The availability of appropriate hardware can be a gating factor in the development of high performance, SWaP-constrained applications. However, this white paper describes an approach that can deliver a compelling process.


GPGPU for Embedded Systems

High Performance Embedded Computer (HPEC) systems are now leaning toward using the specialized parallel computational speed and performance on General Purpose Graphic Processor Units (GPGPUs).


"Hack the Army" program finds 118 unique and actionable vulnerabilities></a></td>
                                  <td class=
"Hack the Army" program finds 118 unique and actionable vulnerabilities

Officials released the results of the latest Department of Defense (DoD) bug bounty program, termed "Hack the Army": The three-week scheme found 118 unique and actionable reports; the first vulnerability was found within five minutes of the launch of the program.


Utilidata & Raytheon partner to delivery cybersecurity for power utilities ></a></td>
                                  <td class=
Utilidata & Raytheon partner to delivery cybersecurity for power utilities

Utilidata and Raytheon officials formed a strategic alliance to help power utilities proactively detect, defend against, and respond to cyberthreats.


SiCore Technologies and Charles River partner to protect against avionics malware ></a></td>
                                  <td class=
SiCore Technologies and Charles River partner to protect against avionics malware

SiCore Technologies and Charles River Analytics Inc. are partnering to protect against avionics malware in a program for the U.S. Air Force Avionics Vulnerability Assessment, Mitigations, and Protections (AVAMP) program.


Raytheon to develop automated tool for wargame scenarios></a></td>
                                  <td class=
Raytheon to develop automated tool for wargame scenarios

Raytheon officials received a contract from the U.S. Missile Defense Agency to develop an automated tool that assesses the effectiveness of using missiles and interceptors (kinetic) and cyber and electronic warfare (non-kinetic) weapons in wargames. The system automatically teaches participants which weapons to use in every possible scenario, ultimately better preparing warfighters to succeed.


IARPA launches crowdsourcing research effort></a></td>
                                  <td class=
IARPA launches crowdsourcing research effort

The Intelligence Advanced Research Projects Activity (IARPA), part of the Office of the Director of National Intelligence, has announced that it is embarking on a multiyear research effort to develop and test large-scale, structured collaboration methods to improve reasoning. If the project is successful, the Crowdsourcing Evidence, Argumentation, Thinking and Evaluation (known as "CREATE") program will improve analysts’ and decisionmakers’ understanding of the evidence and assumptions that support or conflict with their conclusions.


Veritas Capital to acquire Harris' government IT business segment ></a></td>
                                  <td class=
Veritas Capital to acquire Harris' government IT business segment

Veritas Capital and Harris Corp. officials have entered into an agreement, in which Veritas Capital will acquire Harris' government IT services business for $690 million in cash. The transaction is subject to regulatory review and other customary closing conditions and is expected to close before the end of fiscal 2017.


Booz Allen Hamilton completes acquisition of Aquilent></a></td>
                                  <td class=
Booz Allen Hamilton completes acquisition of Aquilent

Officials at Booz Allen Hamilton closed the acquisition of the Laurel, MD-based digital services firm eGov Holdings, Inc. (d/b/a Aquilent) on January 24, 2017. The transaction is expected to add approximately $20 million of revenue through the remainder of Booz Allen’s fiscal year 2017. It is expected to be accretive to Booz Allen earnings and operating margin in fiscal year 2018.




Rhamnousia: Framework for cyberattack attribution
Rhamnousia: Framework for cyberattack attribution

The science of cyberattack attribution gets a boost, thanks to a U.S. Department of Defense $17.3 million award to a team led by Georgia Institute of Technology researchers.





Cybersecurity in radar/electronic warfare systems
Cybersecurity in radar/electronic warfare systems

The U.S. Department of Defense (DoD) is pushing for more security in radar and electronic warfare (EW) systems. “What used to be kind of the split between system integrity or anti-tamper and information assurance really is falling under the same cybersecurity umbrella,” says Shaun McQuaid, director of product management for Mercury Systems’ Embedded Products Group in Chelmsford, Massachusetts.



Can you trust that drone?
Can you trust that drone?

The recent activities in the South China Sea of the seizure and subsequent return by China of a U.S. unmanned underwater vehicle (UUV) – also known as an “ocean glider drone” - has once again brought drone security into the spotlight. Securing data collected as part of Internet of Things (IoT) environments is top of mind, and never more so than in military applications.


Domains of warfare and strategic offsets
Domains of warfare and strategic offsets

It’s 2017, and I’m back. After enduring uncomfortably-deep probing and evaluation of my literary skills and technical analysis capabilities, along with a comprehensive DNA test, my masters here at OpenSystems Media have decided to keep me on as a writer, to ply you with another year of fascinating and intriguing next-generation warfare articles. For 2017 I will write with an emphasis on present capabilities of the U.S. and our enemies, as well as new platforms and strategies under development.


Software: King of SWaP
Software: King of SWaP

Size, weight, and power (SWaP) considerations have always been important for embedded electronics but will become even more critical in the future. Driving this trend in embedded system design is the plethora of small platforms, such as unmanned aerial vehicles (UAVs), entering the inventory. Developers of the processing systems that will be deployed on this growing cohort of small, intelligent, sometimes battery-operated platforms at the tactical edge will have to scrutinize hardware and software components to ensure the most efficient use of resources.




Subscribe to Military Embedded Systems in print and online.