Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Italy, Germany upgrading identification friend-or-foe systems
by Staff Writers
Basildon, England (UPI) Nov 20, 2013


Malware up, hackers bypass security safeguards: survey
Washington (AFP) Nov 20, 2013 - Malicious software is on the rise both on computers and mobile devices, fueled in part by hackers' ability to bypass a key security measure, researchers said Wednesday.

McAfee Labs said in its third quarter survey that it is seeing a rise in malware which circumvents the so-called digital signature validation meant to ensure software can be trusted.

McAfee said it saw a 30 percent jump in the quarter of mobile malware that allows an attacker to bypass the digital signature validation of apps on Android devices, along with a 50 percent increase in traditional malware signed with digital signatures.

"The efforts to bypass code validation on mobile devices, and commandeer it altogether on PCs, both represent attempts to circumvent trust mechanisms upon which our digital ecosystems rely," said Vincent Weafer, senior vice president of McAfee Labs.

"The industry must work harder to ensure the integrity of these technologies given they are becoming more pervasive in every aspect of our daily lives."

McAfee's quarterly report on threats in cyberspace also cited a rise in the use of Bitcoin for illicit activities such as the purchase of drugs, weapons, and other illegal goods on websites such as Silk Road.

"As these currencies become further integrated into our global financial system, their stability and safety will require both financial monetary controls and oversight, and the security measures our industry provide," he said.

McAfee also saw cybercriminals develop Bitcoin-mining malware to infect systems, and produce Bitcoins for commercial transactions.

Bitcoins allow the creation of new currency through a process known as mining, according to McAfee. While initially people used their own computing resources for mining, certain kinds of malware allow attackers to employ infected computers to produce Bitcoins, often without their knowledge.

The NATO Support Agency has given Selex ES a $4 million contract to provide four SIR-M5-E interrogator friend-or-foe systems to the Italian Air Force.

The IFF systems will equip four FPS-117 defense radar systems by Lockheed Martin, a three-dimension, long-range, phased radar system.

The SIR-M5-E IFF has a range of more than 279 miles and was developed by Selex ES to meet NATO and U.S. military standards.

The Mode 5 system can clearly recognize aircraft detected by the air defense radar, even in a crowded environment and with electronic jamming, Selex ES said.

"This contract is a demonstration of how Selex ES's IFF products are developed with interoperability and common standards in mind, which makes them easy to integrate with radar systems designed by third-party manufacturers," the company said.

"Previously, in January 2012, the Italian Ministry of Defense ordered two SIR-M5-E to equip the two Italian Air Force TPS -77 mobile air defense radar systems manufactured by Lockheed Martin."

IFF systems are essential in air defense systems for discriminating between friendly and enemy aircraft, and a program is under way to upgrade all IFF NATO systems by 2020.

Germany's IFF systems on aircraft, ships and in use on Army ground stations are being upgraded by Cassidian, a subsidiary of EADS.

Under a contract from the Federal Office of Bundeswehr Equipment, Information Technology and In-Service Support, Cassidian is converting existing MSSR 2000 I secondary radar systems to the new Mode 5 standard.

EADS said Cassidian will undertake the project in two phases. First it will modernize the MSSR 2000 I, or Monopulse Secondary Surveillance Radar, on one German Navy ship in each class as well as a German Army mobile system and two ground radar systems. In the second phase, it will modernize all remaining naval and ground secondary radars and IFF transponders aboard aircraft.

EADS did not disclose the value of the contract to Cassidian, the number of units to be modernized and the contract's timeline.

Unlike the Mode 4 IFF system in current use by the German military, Mode 5 uses sophisticated encryption techniques to protect against electronic counter-measures.

"During the U.S. Army's Bold Quest 2013 exercise, Cassidian provided the participating German troops with IFF equipment supporting Mode 5 for the entire action chain: MSSR 2000 I interrogators deployed in a German Air Force C160 Transall mission aircraft and state-of-the-art QRTK3/4NG cryptographic computers." EADS said. "This equipment proved its interoperability with the [NATO] alliance partners' Mode 4 and Mode 5 IFF systems and demonstrated the problem-free functioning of the next-generation Mode 5 IFF standard, which is to be introduced by NATO forces from 2014."

Cassidian IFF systems for ground and naval forces are in use in Britain and France.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
US panel urges punishment for China cyber spying
Washington (AFP) Nov 20, 2013
A US panel Wednesday called for tougher action against China, including possible sanctions to stop cyber spying, warning that Beijing has yet to be persuaded to end rampant espionage. In an annual report to Congress, the US-China Economic and Security Review Commission charged that Beijing "is directing and executing a large-scale cyber espionage campaign" that has penetrated the US governme ... read more


CYBER WARS
US has time to boost bid for Turkey missile system: FM

US to keep Patriot missiles in Turkey for another year

Unprecedented Dual Intercept Success for MEADS at White Sands Missile Range

Patriot delivers another flawless performance in Japan test firings

CYBER WARS
Russia and Egypt on verge of missile deal: Moscow

Lockheed Martin Conducts Second Successful LRASM Flight Test

Turkey hopes to finalise China missile purchase in six months

Iran starts producing new missile system

CYBER WARS
US drone strike kills senior Haqqani leader in Pakistan

Protest against US drone strikes in Pakistan postponed

Iran unveils attack drone 'with 2,000 km range'

Opponents demand end to US drone strikes, secrecy

CYBER WARS
Manpack Radios in Arctic Connect with MUOS Satellites Orbiting Equator

Self-correcting crystal may unleash the next generation of advanced communications

Northrop Grumman Receives Contract to Sustain Joint STARS Fleet

Raytheon expands international footprint of electronic warfare capability

CYBER WARS
Airbus and Cassidian play key role in Perseus maritime surveillance program

US firm claims first 3D-printed metal gun

Chemical arms treaty meets love-gone-wrong in US high court

Northrop Grumman Demonstrates Micro-Gyro Prototype for DARPA Program

CYBER WARS
AgustaWestland fights to keep graft-hit Indian chopper deal

Russia 'offers Egypt MiG-29s in $2B arms deal'

Another US Navy officer suspended over bribery scandal

DLA touts reverse auctions for procurement savings

CYBER WARS
US China envoy who oversaw embassy drama to resign

China blasts US panel for 'Cold War' thinking

Walker's World: The Red Bonnets of France

Outside View: New security mindset needed

CYBER WARS
New hologram technology created with tiny nanoantennas

Nano magnets arise at 2-D boundaries

Structure of bacterial nanowire protein hints at secrets of conduction

All aboard the nanotrain network




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement