Military & Aerospace Electronics - December 2018
Military & Aerospace Electronics - December 2018
RELEVANT. TRUSTED.
ENABLING TECHNOLOGIES.
2018
Innovation
Awards
Defense and aerospace
electronics companies
recognized for
technology innovation
and achievement. PAGE 6
Secure data
storage
Designers and systems
integrators struggle
with keeping data
secure in proliferating
networked
devices. PAGE 22
militaryaerospace.com
Military organizes
for cyber warfare
U.S. warfighters work
aggressively to protect
military computers
and networks. PAGE 16
I S S I ON
M I C AL
2 TRENDS
I T
CR ICES
4 NEWS
DEV
4 IN BRIEF
6 INNOVATORS AWARDS
2018 Military & Aerospace Technology
Innovation Awards announced for
DC-DC
aerospace and defense achievement Converters
AC-DC
COvER STORY
16
Power
SPECIAL REPORT
Military organizes for cyber warfare
U.S. warfighters work aggressively to Supplies
protect computers and networks, just as
they would do to protect territory, airspace,
sea lanes, and access to space.
• Expanded Operating
22 TECHNOLOGY FOCUS
Temperatures -55 to +85C
L s p p p
Armed with the world’s largest selection of in-stock, ready to ship RF components, and the brains to back them up,
Pasternack Applications Engineers stand ready to troubleshoot your technical issues and think creatively to deliver
solutions for all your RF project needs. Whether you’ve hit a design snag, you’re looking for a hard to find part or
simply need it by tomorrow, our Applications Engineers are at your service. Call or visit us at pasternack.com to learn more.
866.727.8376
Pasternack.com
an company
1812MAE02-03.indd 31
PastYou_MAE_1807 12/5/18
6/22/18 12:03 PM
2:22 PM
news
Navy asks Lockheed Military researchers seek to
Martin to build additional
Trident II D5 submarine- counter threats from enemy
launched nuclear missiles
Strategic weapons experts at Lockheed Martin
hypersonic missiles and aircraft
Corp. will build additional UGM-133A Trident BY John Keller
II D5 submarine-launched ballistic nuclear mis- This effort asks the U.S. defense
siles and support deployed D5 atomic weap- ARLINGTON, Va. — U.S. military research- industry for innovative proposals in
ons under terms of two orders announced ers are kicking off a project to develop counter-hypersonics to advance U.S.
Friday collectively worth $90.4 million. enabling technologies to counter the means to counter hypersonic vehicles.
Officials of the U.S. Navy Strategic Systems growing threat of enemy hypersonic It will develop and demonstrate an ad-
Programs (SSP) office in Washington are ask- missiles and aircraft. vanced interceptor able to engage en-
ing the Lockheed Martin Space Systems seg- Officials of the U.S. Defense Ad- emy maneuvering hypersonic threats
ment in Sunnyvale, Calif., to provide new pro- vanced Research Projects Agen- in the upper atmosphere.
curement of Trident II (D5) missile production cy (DARPA) in Arling-
and D5 deployed systems support. One order ton, Va., issued a broad
is worth $41.3 million, and the second order agency announcement
is worth $49.1 million. Over the past eight in November for the
months Lockheed Martin received contracts Glide Breaker program
and orders collectively worth $139.3 million to counter enemy hy-
for Trident II D5 missiles and support. Over personic vehicles — or
the same period the Charles Stark Draper those that can fly fast-
Laboratory Inc. in Cambridge, Mass., won a er than five times the
$58.6 million order for Trident D5 MK 6 guid- speed of sound.
ance system production. Top U.S. military
leaders over the past
Here’s what you need to year have voiced their
know about America’s alarm about Chinese
new defense Titan and Russian projects
Military researchers have turned their attention to defending
Harris Corp. and L-3 Technologies are plan- to develop hyperson- against enemy hypersonic missiles and aircraft, which can
ning to come together in hopes of better ic missiles and aircraft. travel as fast as five times the speed of sound.
competing against the much larger primes. Hypersonic missiles
Two years ago Harris completed its acquisi- particularly would be useful to attack DARPA officials will choose one con-
tion of Exelis Inc. On Oct. 14 Harris and L-3 large U.S. surface warships like air- tractor for Glide Breaker, which will car-
said they would combine in an all-stock deal craft carriers. ry out a system requirements review,
that would create a $33.5 billion defense The DARPA Glide Breaker project preliminary design review, critical de-
electronics company. L-3 Technologies CEO will develop an enabling technology sign review, and test readiness review
Chris Kubasik said the deal would move the critical for an advanced interceptor to counter enemy hypersonics.
two companies closer to becoming an “inno- capable of defeating hypersonic vehi- The winning contractor will devel-
vative non-traditional 6th Prime,” though cles, DARPA officials say. Key aspects op requirements, define a design, man-
the company would still fall well short of of the project are classified, and only age risk, mature enabling technologies,
industry leaders Lockheed Martin, General proposals addressing the classified as- develop requirements, develop a con-
Dynamics, Northrop Grumman, Raytheon, pects of Glide Breaker will be eligible ceptual design, develop software, con-
for funding. duct trade studies, and analyze costs.
8
D E C E M B E R 2 0 1 8 MILITARY & AEROSPACE ELECTRONICSwww.militaryaerospace.com
www.Astronics.com/ats-6100-wft
www.elma.com www.gms4sbc.com
ElmaEleSCRev_MAE_1812 1 GenMic1_MAE_1812
11/27/18 4:25 PM 1 11/28/18 4:45 PM
www.gms4sbc.com
12
D E C E M B E R 2 0 1 8 MILITARY & AEROSPACE ELECTRONICSwww.militaryaerospace.com
GenMic2_MAE_1812 1 11/28/18 4:49 PM
MerTrrust_MAE_1812 1 11/19/18 2:09 PM
www.appliedavionics.com/mae www.atrenne.com
AppAvi_MAE_1812 1 AtrInt_MAE_1812
11/28/18 4:43 PM 1 11/27/18 3:43 PM
www.gms4sbc.com
zmicro
www.rfmw.com/ProductDetail/QPD1025L-Qorvo/616661/ zmicro.com/ZM3
14
D E C E M B E R 2 0 1 8 MILITARY & AEROSPACE ELECTRONICSwww.militaryaerospace.com
Qorvo2_MAE_1812 1 11/29/18
ZMicro_MAE_1812
10:04 AM 1 11/14/18 9:46 AM
www.rfmw.com/ProductDetail/QPM1002-Qorvo/615014/
Military organizes
for cyber warfare
U.S. warfighters work aggressively to protect computers and networks, just as they would
do to protect territory, airspace, sea lanes, and access to space. By J.R. Wilson
Fairviewmicrowave.com
1.800.715.4396
an company
1812MAE16-21.indd 171
PastRight_MAE_1807 12/5/18
6/22/18 12:03 PM
2:18 PM
S PECIAL REPORT
reason to believe the next 20 or 30 years enemy assaults by denying an oppo- cyber warfare superpower, also has
will not be just as changeable — from nent the advantage of, and ensure unified its cyber capabilities. Russia
the Internet of Things, to autonomous friendly unimpeded access to, the EM has employed cyber warfare at least
vehicles, and to wearable computing. spectrum. EW can be applied from air, twice in the past decade — in its 2008
“Trying to keep up with those is a sea, land and space, and can target hu- military incursion into Georgia and in
major challenge,” Bertoli continues. mans, communications, radar or other a 2014 cyber attack on Ukraine.
“The Army is embracing this change military and civilian assets. Israel also is considered one of the
and trying many ways to change their world’s new breed of cyber super pow-
processes to improve their speed of ca- Targeting computers ers, based in part on its estimated 10
pability enhancement, and their speed Cyber warfare represents the use or percent share of global computer and
of acquisition. There is still a lot of work targeting of computers, online control network security technology sales.
to be done, but we are aware of pend- systems, and networks through offen- While not as active or public as the
ing challenges and gearing-up to sup- sive and defensive acts of electronic others, the United Kingdom in recent
port those.” espionage and sabotage. While it of- years has invested heavily in expand-
ing its cyber capabilities to
become the European center
of cyber warfare technology.
Although less is known
about the cyber warfare
developments of Iran and
North Korea, of those tightly
closed societies are suspect-
ed in several cyber attacks —
North Korea against U.S. cor-
porations like Sony, and Iran
in a host of attacks across
Southwest Asia — especial-
ly against Saudi Arabia.
Some pundits have de-
clared the world has entered
into a new, multi-polar Cold
War, with its own cyber war-
fare equivalent of the origi-
nal Cold War’s doctrine of
Personnel of the 780th Military Intelligence Brigade set up deployable cyber tools overlooking the mock Mutual Assured Destruction
city of Razish at the National Training Center at Fort Irwin, Calif.
(MAD), in which the U.S. and
SIGINT was born in January 1904, ten is equated with EW, which is the Soviet Union refrained from the use
during the Russo-Japanese War, when subject of several programs and stud- of nuclear weapons because the oth-
a British cruiser intercepted a wire- ies throughout U.S. Department of De- er side would respond in kind. While
less transmission to mobilize the Rus- fense (DOD), cyber warfare has been de- this new, unofficial “digital equilib-
sian fleet and passed it on to Japan, clared a domain of war with the 2010 rium” has been followed by the five
then a British ally. It was the first act creation of the joint U.S. Cyber Com- cyber warfare superpowers, Iran and
of electronic warfare, defined by the mand, which brought together the in- North Korea have launched serious at-
military as any action involving the dividual cyber capabilities of the Army, tacks, with Iran, in particular, seeking
use of the electromagnetic (EM) spec- Navy, Air Force and Marines. to cause real damage.
trum or directed energy to control the China, which has touted its inten- In the event of a direct conflict be-
spectrum, attack an enemy or impede tion to become the world’s dominant tween any of the Five, however, each
18
D E C E M B E R 2 0 1 8 MILITARY & AEROSPACE ELECTRONICSwww.militaryaerospace.com
nation’s full cyber warfare capabilities “A lot of the government side is a lit- has its own internal effort, but we’re
likely will be employed, possibly as a tle helter-skelter on cyber,” says Steve still working on treaties and interna-
first strike. That still may be avoided, Edwards, director of secure embedded tional law to develop a governance on
especially as artificial intelligence (AI) solutions at the Curtiss-Wright Corp. cyberspace,” Wittstruck says, adding
comes into play, making cyber war- Defense Solutions Division in Ashburn, that military authorities still don’t have
fare far more precise and effective, says Va. “We don’t do back office enterprise cyber warfare doctrine, training, lead-
Richard Wittstruck, associate director, systems; we deal with hardware that ership development, facilities, and pol-
field-based experimentation and inte- gets deployed air-land-sea. There are icy completely nailed down.
gration at CERDEC’s Space and Terrestri- lots of people involved and they’re still In a digital world, where most tech-
al Communications Directorate (STCD). trying to figure out how to have a co- nologies are readily available to anyone,
hesive strategy. coordinated, constant, and comprehen-
Parallel attacks Everyone has his own opinion about sive countermeasures are mandatory.
“In field artillery, we can have single what’s important in cyber warfare, Ed- “Cyber is the new IED [improvised
shots or volleys,” Wittstruck explains. wards says. “Even with commands in explosive device], which began in the
“In cyber, it’s very rare to have a sin- the same service, you get different early ‘90s in Bosnia with explosives
gle-shot weapon; it’s usually multiple perspectives. Within each division, put in a pothole and covered with gar-
parallel attacks in hopes one or more they are working on that. We’ve tak- bage,” says CERDEC’s Wittstruck. “It
strikes hit the target. Artificial Intelli- en part in a couple of meetings on the was prolific, effective, and random
gence (AI) will enable offense to do more Air Force side and the standardization and anybody could do it who had the
of those attacks, but also allow defense push they’re trying to make across the knowledge and access to materials.
to put up more barriers simultaneously. Air Force, but it’s a slow process.” The same is true today with cyber, al-
So you really will have machine-to-ma- Under today’s military structure, the though they also need to be able to ac-
chine warfare. AI may become the nu- individual service cyber commands fo- cess a network.”
clear deterrent element, because you cus on the needs of their warfighters. Despite this, the military can search
know I can do it, I know you can do it, Some of the technologies and materiel cyberspace constantly for abnormal-
so we go to the negotiation table — dig- are the same, but how they are applied ities or alerts that something has
ital MAD. Still, the general public needs can be different. CYBERCOM functions changed. “The challenge is things can
a better understanding of cyber warfare. as an umbrella command, setting na- change very rapidly, so in a matter of
“We keep speaking in geek-speak tional policy and ensuring there is no milliseconds, you can go from having
within the community, and until we duplication of effort. a good day to having a bad day,” Witt-
can translate that into terms the av- “There also are areas of agreement struck says.
erage person can understand, it will and exchanges of people in terms of “Once something does occur, it doesn’t
be hard to help people understand cy- DOD working with other agencies, such mean that’s a combat loss; you just have
ber is not something foreign; it’s just a as Homeland Security,” says Army CER- to manage it, determine the effect on
new environment we operate in,” Witt- DEC’s Wittstruck. “Cyber cuts across your fighting capability, and have a con-
struck says. “In some ways, it’s a gen- several different departments and tingency plan on getting back.” This is
erational thing. Those who grew up in there are interagency agreements and called a primary alternate contingen-
a digital world — born with a comput- statutory authorities. Cyber is so pro- cy emergency (PACE) plan. “This is a
er in the crib — are very comfortable lific, every federal agency has a cyber combined arms fight,” Wittstruck says.
talking about all these terms, but the component, which makes it a lot easi- “Cyberspace is what some call the fifth
digital dinosaur is almost still trying er in a digital age to communicate and domain and we bring many of those
to learn how to spell cyber.” cooperate across those boundaries.” combined arms principals to bear on
This holds true for the military, as force effectiveness and planning.”
well — even though each service has Problems with cooperation Defensive cyber warfare can face
a cyber component in CYBERCOM, and Such cooperation becomes more prob- a variety of attack types, depending
DOD puts increasing levels of people lematic when sharing cyber warfare ca- on whether the enemy wants to deny,
and money into cyber research. pabilities among allies. “Each country degrade, or disrupt computers and
networking — or any combination of it a high-level hacker who can pene- make the difference between degrada-
the three. It also depends on the tar- trate network defenses without a care tion, disruption and denial.
get — military enterprise, subnet, plat- if the target knows about it or not. If Even so, not everyone sees cyber
form, individual warfighter or unit. Or the same person makes multiple at- as a potential 21st Century Pearl Har-
they may target civilian infrastructure tacks, he or she is likely to leave digital bor, as several government officials
and just turn the lights on and off to fingerprints reflecting the techniques have warned.
tell civilians they are no longer in con- they use, which may help identify and
trol and can be attacked at any time,” locate the attacker. For now, howev- Keeping the lid on
Wittstruck says. er, cyber forensics is unlikely to find “Granted, there are thousands of at-
a “smoking gun”. tacks every day on various targets, a
Difficult to trace The effects of a cyber attack can last lot of them using automated systems
Modern military satellite surveillance long after the attacker has disconnect- churning away and looking for weak-
covers most of the planet, making it ed. Shutting down a power grid, for ex- nesses or openings,” says CERDEC’s
virtually impossible to hide an attack ample, could leave thousands, even Bertoli. “For the most part, commer-
by missiles, aircraft, ships or land forc- millions, of people without electrici- cial service and security providers have
es, enabling the target to strike back ty to heat or cool their homes, pump made great strides and most of those
against the attacker’s home base. That gas for cars and trucks, light homes activities are blocked at various plac-
is not the case with a cyber attack, how- and streets (an open invitation to loot- es within the infrastructure.”
ever, which is extremely difficult to ers, who also would not have to worry For would-be cyber criminals, how-
backtrack. Even if a cyber attacker can about alarms), get fresh water because ever, pulling off an attack is easier said
be traced, it can be impossible to tell if the pumping stations are down, treat than done. “Cyber attacks are not near-
the attack came was the nation from patients in hospitals The only remedy ly as easy to pull off as you might as-
which the attack was launched, a non- is for the power company to have the sume,” Bertoli says. “Going after a hard
state group, or even individual operat- necessary remediation, redundancy, target requires some serious effort —
ing from within that nation. and repair capabilities in place; how you have to know what defenses the
Sorting out cyber attackers is called quickly it performs those functions will target has, for example. So while there
cyber forensics, which has had expo-
nential growth in recent years as the
cyber threat has become more pro-
nounced. Backtracking requires that
the attack is still in progress. Once it
ends, different methods must be em-
ployed. Still, without that critical link
between the attacker and the tar-
get, determining the attacker’s IP ad-
dress is almost impossible with cur-
rent technology.
More frustrating to cyber defend-
ers is how cheaply perpetrators can
launch cyber attacks; it doesn’t require
a lot of money or infrastructure, only
the necessary skills and the ability to
access the target.
How a cyber attacker gets to the
target represents another line of in- The Cyber Operations Center at Fort Gordon, Ga., is home to signal and military intelligence
vestigation. Does the attacker have noncommissioned officers, who watch for and respond to network attacks from adversaries
someone on the inside helping, or is as varied as nation-states, terrorists and “hacktivists.”
20
D E C E M B E R 2 0 1 8 MILITARY & AEROSPACE ELECTRONICSwww.militaryaerospace.com
Keeping in practice
Cyber Blitz 2019 will pivot to the Pacific
and work with Pacific Command to de-
termine what elements should be the
subject of focus. Wittstruck predicts
they will integrate cyber into some as
yet unnamed element in that exercise.
Cyber defense is not exclusively an
Cyber operations specialists from the Expeditionary Cyber Support Detachment, 782nd end user concern, it begins at the be-
Military Intelligence Battalion (Cyber), from Fort Gordon, Ga., provide offensive cyber ginning, with the contractors who build
operations as part of the Cyber-Electromagnetic Activities (CEMA) Support to Corps and the systems, subsystems and compo-
Below (CSCB) program during the 1st Stryker Brigade Combat Team, 4th Infantry Division, nents that comprise a cyber or cy-
National Training Center Rotation.
ber-protected program.
are threats we must take into consid- cyber in military exercises, including “The threats are ubiquitous,” notes
eration, it is unrealistic to believe one some, such as the Army’s Cyber Blitz, David Sheets, senior principal secu-
guy in his basement, acting alone, could dedicated to cyber warfare. The Army rity architect at Curtiss-Wright De-
bring down the Internet or any major has conducted three such exercises, fense Solutions. Defense contractors,
infrastructure system.” each incorporating what was learned he says, “have to understand the risks
Perhaps the notion of a Cyber Pearl from previous efforts and the latest and make sure we have all the correct
Harbor is somewhat overblown. “Could technologies. procedures and processes in place so
an adversary mount a meaningful at- Cyber Blitz 3 involved more than we can tell our customers we have
tack against a critical infrastructure 700 participants from 25 organizations, done the due diligence to assure they
component to cause harm? Absolute- including the Marines. The integrated will have a secure system once they
ly,” he says. “But could it cause the same campaign has matured through those put all the boards and such together.
kind of loss of life as a Pearl Harbor or exercises to improve how to go “from That impacts our supply chain man-
9/11? Probably not. Our power structure space to mud” in support of the tacti- agement, production flow, all of which
is pretty resilient and could recover from cal commander in a fight against a re- have to go together to insure there are
an attack fairly quickly. I would not put gional peer in kinetic and non-kinetic no kinks in the armor as you integrate
cyber in the same category as a Pearl effects, such as cyber. these systems.
Harbor or 9/11. I don’t think anybody “Cyber Blitz was born as the result of “Multiple people have been trying to
would really want to make that kind of the Cyber Center of Excellence and CER- wrap their heads around the intersec-
cyber attack on its own, except perhaps DEC, back in 2015, wanting to demon- tion of cyber security and safety critical
a terrorist organization. So while some strate and validate the concepts of that systems and how those work togeth-
scenarios are pretty scary, I don’t think doctrine before it was updated to the er,” Sheets says. “I don’t think anyone
they jump to that level.” Army writ large,” says CERDEC’s Witt- has a good answer to that yet — there
To help prepare for and defend struck. “We established our first Cyber is a lot of synergy in some areas, while
against cyber attacks, the U.S. mili- Blitz in 2016, in which a unit had to fight in others, cyber may say one thing and
tary services have begun including their way through a validated scenario, safety something else.”
with new and legacy information storage technologies. in the world today has at least an of-
fice, if not a full command, devoted to
cyber and electronic security. Although
BY J.R. Wilson that has placed a greater emphasis on
security, especially at various levels
Information is the fuel that drives 21st Military forces today rely on infor- of “data at rest”, it also has been done
Century military tactics, techniques, mation technology more than ever be- largely on an independent basis.
and procedures (TTPs) and the foun- fore. “We are becoming more and more “Our biggest question in terms of
dation on which all offensive and de- dependent on technology — and the cyber and physical security is where is
fense actions depend. more dependent we become, the high- DOD going. There are huge numbers of
While the emphasis best known to er the threat,” Castle says. “We will be briefings on it and we really want to un-
the public is the collection of infor- more rather than less vulnerable as derstand how all those are going to join
mation, securing the collected data we become more and more dependent together in a uniform strategy for DOD
from the point of origin to eventual
archiving is of equal, if not greater,
importance. The increasingly rapid
evolution of technology also is keep-
ing security measures in a constant
state of flux.
“With the emergence of so many
technologies, it’s hard to predict which
technologies and security measures
will be adopted — and some that are
adopted may not last long,” says Drew
Castle, vice president of engineering at
Chassis Plans LLC in San Diego.
“Estimates are there will be 40 bil-
lion interconnected devices by the end
of next year,” Castle continues. “Look at
new technologies that are being devel-
oped by individuals at home and won-
der how many will be adopted widely,
what will trickle into the DOD [U.S. De- The battlefield of today is a monolithic data network, with data continually flowing from
partment of Defense] space.” ground units, to aircraft, to satellites. This wouldn’t be possible without secure data storage.
22 DECEMBER 2018 MILITARY & AEROSPACE ELECTRONICS www.militaryaerospace.com
Ne ed(s): Tomorrow?
Re liabili ty Pasternack
Te st R eports
L o t Trac e abilit y
866.727.8376
Pasternack.com
an company
1812MAE22-29.indd 231
PasCable_MAE_1811 12/5/18
9/25/18 12:03 PM
3:12 PM
TECHNOLOGY F CUS
meeting their future cyber and phys- to new developments in security and of Standards and Technology that de-
ical security requirements for storage security-breaking capabilities. Require- scribe government computer security
and networking,” says Chassis Plans ments also reflect what the military policies, procedures and guidelines. “So
President Mike McCormack. perceives as the greatest threat to se- the biggest concern at DOD is the cy-
“I think that is still a work in prog- cure information storage at the time. ber threat,” McCormack says.
ress. DOD is trying to understand what Still, it must take into account every Dealing with legacy systems
is the threat, how sophisticated is it, step along the way to creating and im- What is certain is the demand for
how can they counter and mitigate that, plementing security measures, with higher levels of security for military in-
offensively and defensively, McCor- those requirements becoming perva- formation storage only will increase as
mack says. “The big question for us is sive across the network stream as well the ability of an ever-widening list of
what do we do in the next few years in as in networked storage. potential adversaries to penetrate leg-
terms of where DOD is going.” acy and current state-of-the-art grows.
That especially is true for legacy sys-
Complicated picture tems, which tend to have proprietary
That question is getting more compli- security methodologies, making up-
cated for those supplying securi- grades difficult.
ty systems; contractors are told “There is a level of encryption,
only the requirements — phys- but it is proprietary in most leg-
ical or software encryption or acy systems, where now FIPS
both — but not how or where 140-2 is an industry standard
the end system will be used. with regard to encryption,”
“Depending on the mis- says Amos Deacon III, presi-
sion and application, it goes dent of Phoenix International
into the ability to meet FIPS in Orange, Calif. “Going back
[Federal Information Process- 10 or 20 years, companies de-
ing Standard] compliance with veloped their own proprietary
your servers, depending on the encryption techniques, certified
customers perceived risk and how by NSA, but that is really expensive
to mitigate that risk,” McCormack to do. And each future change has to
says. “In most cases, the customer be reviewed and re-certified.”
won’t discuss with us the utilization These legacy systems can be diffi-
of the data being stored, just ask what This chart outlines a process for designing cult — if not impossible — to upgrade
we can do to mitigate their risk. That trusted computing systems with secure data sufficiently to comply with modern
storage.
may be FIPS compliance, potential out- data storage security standards. “For
side corruption from an EMP [electro- legacy systems, you’re looking at a
magnetic pulse] blast and so on.” “I would say physical capture is the forklift upgrade,” Deacon says. “If you
Systems integrators are trying to biggest threat, but a four-star general have a system using hard disk drives
keep information security risks to a might say cyber security, being able to that have been operating for more than
minimum. “It really depends on what gain remote access,” McCormack con- five years, you have the output power
the customer wants us to do to miti- tinues. “The threat is greater, including and performance requirements of new
gate the risk, whether physical securi- at the personal level, if you don’t have technologies, in many cases, making it
ty, tamper-proofing, or encryption lev- the proper firewalls in place.” ineffective to try to continue using the
els. They give us the requirements and Third-party DOD information from older equipment and upgrade interfac-
that’s what we develop our products to a contractor to the military also has to es. You just put in a whole new system
meet,” McCormack says. have cyber security safeguards in place rather than a legacy tech refresh.”
Those requirements evolve not only to comply with NIST 800, which are In a lot of those systems, the soft-
with new missions but also in response documents from the National Institute ware was written for that specific
environment and equipment — which when it is removed from the deployed technologies available in the market-
may have been out of production for asset and returned to a lab,” says Ja- place,” Wade says. “In just hard drives,
many years. The solution is to move son Wade, president of ZMicro in San there are numerous solutions with
to new systems, many of sel f- enc r y pted
them Linux-based, which drives. The way
enables the use of indus- you get a solution
try-standard encryption for the end user is
techniques. to bring togeth-
er a system that
Physical security works in concert
Although the bulk of to- with the mother-
day’s data storage security board, the hard
is software-focused, physi- drive, and Opal
cal security remains an im- 2 compliance. To
portant part of most security systems, Diego. “So you have to look at how you provide the strongest level of securi-
especially active, online storage at fixed are cooling the drive, how it can be re- ty, you will put a layer on top of that
locations and inactive, offline archi- moved without degradation, and pro- using software encryption.”
val storage. tection against the environment.” The Opal Security Subsystem Class
“If you want secure data, that is se- Sometimes the answer is combin- is a hardware-based hard drive stan-
curity in terms of encryption, but also ing technologies. “The state-of-the- dard developed by the Trusted Com-
security of the physical drive, especially art is really when you combine the puting Group (TCG) in Beaverton, Ore.,
www.phenxint.com 714-283-4800
www.militaryaerospace.com
PhoInt_MAE_1812 1 MILITARY & AEROSPACE ELECTRONICS D E C E M B E R11/28/18 25
2 0 1 84:09 PM
you have to rely on the level of en- levels of physical and digital security satellites. It also has made no secret
cryption. The level of computing pow- in place, but still be vulnerable due to of its intention to become the world
er these days requires a higher lev- a third-level supplier’s use of compo- leader in cyber and electronic warfare.
el of encryption, typically AES-256 nents made in China. The U.S. military has protocols in place
on a fixed 140-2 device. The beauty The People’s Republic of China has blocking the use of Chinese and Rus-
of AES-256 is the use of encryption become the world’s leading produc- sian software and electronics to combat
keys, which are what allow you to ac- er of electronics, from the smallest counterfeit parts and potential “back
cess the system — and the combina- connectors to major systems, such as door” security holes.
tion of keys is massive.”
It’s extremely difficult to break in to
one of today’s secure hard drives. “To
put it in perspective, breaking into a
256-bit key by brute force would take
something like 50 supercomputers
checking a billion AES keys per second
RUGGED COMPUTING
SOLUTIONS FOR
MISSION SUCCESS
Built-in encryption solves helps safeguard
sensitive mobile information since
adversaries will be unable to access data on
the drive without the authorization key.
www.militaryaerospace.com
888.645.8400
“Part of the conversation today is how corporations, and the military, yet its spread of viruses because security in
to reduce vulnerability, but a lot of things primary evolution is in the least secure the home, especially, does not protect
are made in China, including most pro- environment of all — the home. against cyber attacks. If someone at-
cessors. There are processes and proce- tacks my thermostat, which is connect-
dures in place to verify component pro- Networked vulnerabilities ed to my computer, that allows access
viders,” says ZMicro’s Wade. “What’s at “Who is driving the technology? Look to my bank accounts.”
issue is the potential of vulnerabilities in at the Internet of Things, with total- “It’s like building the interstate,” he
hardware, which always needs to be ad- ly interconnected homes and people continues. “It improved transporta-
dressed. And that brings you back to the who are remote working,” McCormack tion, but fatalities increased massive-
system-level approach, with Opal drives warns. “Having everything connected ly. Between 2005 and 2012, we saw a lot
and 256-level encryption and hardware is fantastic. But that also will be the big- of ransomware attacks. Then we got
that supports TPM tech.” gest threat. It allows the exponential smarter. Each home, office, and defense
Trusted Platform Module (TPM) is component must have
an international standard for a secure more and more firewalls
cryptoprocessor — a dedicated micro- and security measures to
controller that secures hardware by isolate them within great-
integrating cryptographic keys. The er wide area networks.”
technical specification was written The rapid and univer-
by the Trusted Computing Group. The sal spread of new electron-
International Organization for Stan- ic and computing technol-
dardization (ISO) and Internation- ogies has increased the
The Data Transport System (DTS1) from Curtiss-Wright
al Electrotechnical Commission (IEC) vulnerability of today’s
Defense Solutions is a rugged network attached storage
standardized the specification as ISO/ deployed military to data
(NAS) file server for use in unmanned aerial vehicles;
IEC 11889 in 2009. unmanned underwater vehicles; and intelligence, interception, spoofing,
Sometimes it all comes down to the surveillance, and reconnaissance aircraft. and tampering.
political situation at any given time.
“China has now become an adversary COMPANY LIST
in technology and political and eco-
nomic power in the world, says Chas- Aitech Defense Systems DRS Tactical Systems Inc. Mercury Systems
sis Plans’s McCormack. “DOD and the Chatsworth, Calif. www.leonardodrs.com/ Andover, Mass.
www.rugged.com products-and-services/ www.mrcy.com
world in general are realizing we have leonardo-tactical-systems
Barracuda Networks Pentek Inc.
to find other sources that are TEA [tech- Campbell, Calif. Elma Electronic Inc. Upper Saddle River, N.J.
nology exchange agreement] compli- www.barracudanetworks.com Fremont, Calif. www.pentek.com
www.elma.com
ant. But Taiwan is TEA compliant, but Cavium Networks Phoenix International
get a lot of their components from Chi- San Jose, Calif. Extreme Engineering Orange, Calif.
www.caviumnetworks.com Solutions www.phenxint.com
na,” he says. Verona, Wis.
Chassis Plans LLC Trusted Computing Group
“Do you have processes in place to www.xes-inc.com/about/
San Diego Beaverton, Ore.
contact/
make sure you are not getting compo- www.chassis-plans.com https://trustedcomputinggroup.
General Micro Systems org
nents that are counterfeit or have been Crystal Group
Rancho Cucamonga, Calif.
tampered with in China? There will be Hiawatha, Iowa ZMicro
www.gms4sbc.com
www.crystalrugged.com San Diego
a bigger drive to see that there is more Kaman Fuzing & Precision https://zmicro.com
Conduant
TEA complaint board manufacturing in Products
Longmont, Colo.
Middletown, Conn.
the U.S., in the DOD space and in U.S. www.conduant.com
www.kaman.com/
manufacturing,” he says. Curtiss-Wright Defense fuzing-precision-products
On the near horizon is another ad- Solutions
Kontron
Ashburn, Va.
vance that influences the data se- www.kontron.com
www.conduant.com
curity of individuals, governments,
“It will include secure physical access, from passwords + ADDITIONAL x8 OR TWO x4 PCIe EXPANSION SLOTS AVAILABLE
tc
watch
OPTICS
watch
c
OPTICS
or twos, we can roll out tens of kilowatts. by data movement between embedded learning, advanced sensors, and wire-
That is within a factor of two or three of computing nodes. less interfaces.
being useful on a battlefield, airplane or While short-reach connects is pos- While optical signaling is common
ship” to take out enemy drone swarms, sible today between on-chip cores today in such systems at the board and
Griffin says. A space-based weapon that and within multi-chip modules using rack levels, it has not yet been integrat-
could destroy boost-phase missiles would high-bandwidth electrical links, this ed within component switch chips, cen-
require power in the megawatt class. One interconnect performance rapidly de- tral processing units (CPUs), and graph-
big question remains: whether missile-de- grades at the longer lengths of circuit ical processing units (GPUs).
fense satellites will make it into the Missile boards and beyond because of unfavor- The PIPES program revolves around
Defense Review. able scaling with frequency and reach. three technical areas: photonically en-
This restricts off-chip I/O capacity, re- abled multichip modules; photonics for
Medium-wave infrared duces system performance, and lim- massive parallelism; and interconnect
(MWIR) camera for electro- its scalability. fabrics to facilitate package-level pho-
optical imaging introduced Granted, photonic transceiver mod- tonic I/O in future systems.
by Sierra-Olympic
ules can enable optical signaling with PIPES is a 42-month program divided
Sierra-Olympic Systems Inc. in Hood River, high bandwidth and minimal loss over into three phases: demonstration of con-
Ore., is introducing the Ventus 275 medi- long distances with optical fiber, yet op- cepts, components, and function; inte-
um-wave infrared (MWIR), 640-by-512- tical I/O typically comes in pluggable gration and prototyping; and establish-
by-15-micron imaging engine for security, modules on circuit boards, connected ing scalability, complexity, and maturity.
surveillance, fixed monitoring, military, and to MCM packages with electrical links Companies interested were asked
unmanned vehicle applications. The com- whose power dissipation and density to upload abstracts to the DARPA BAA
pact MWIR camera core weighs about 2.5 limit overall performance. Website by 20 Nov. 2018 at https://baa.
pounds, and is designed for OEM integra- Instead, DARPA researchers are try- darpa.mil, and to submit full propos-
tors of surveillance system enclosures and ing to find improvements by reducing als no later than 17 Jan. 2019 online at
other imaging gimbals. It has an f/5.5, signaling energy and latency, while in- www.grants.gov/applicants/apply-for-
19–275 millimeters continuous zoom (CZ) creasing overall signaling capacity and grants.html.
optic. The Ventus 275 features include an component density. This is where the Email questions or concerns to Gor-
indium antimonide focal plane array and PIPES project comes in. don Keeler, the PIPES program man-
a finely tuned athermalized and parfocal Developing efficient, high-band- ager, at HR001119S0004@darpa.mil.
zoom lens with a 28.4–2-degree horizon- width, package-level photonic signal-
tal field of view (HFOV). The image pro- ing should have substantial influence More information is online at https://www.fbo.
cessing engine provides advanced image on high-performance computing, on gov/spg/ODA/DARPA/CMO/HR001119S0004/list-
enhancements including electronic image big-data applications that use machine ing.html.
stabilization, automatic-and-manual gain
control, adaptive contrast control and
optional target tracking and detection. Lockheed Martin eyes satellite sensor payload
The electro-optical imaging device also
features a shutter-based non-uniformity providers for next-gen missile warning
correction (NUC) and an environmental- Lockheed Martin Corp. has down-selected Raytheon and a Northrop Grumman–Ball
ly-sealed front lens element. Several out- Aerospace team to compete to provide the satellite sensor payload for the Air Force’s next-gen-
put interfaces include analog NTSC/PAL eration missile warning satellite system. This competition will be part of the first-phase con-
video, H.264/MJPEG IP video, and 14-bit tract for the next-generation overhead persistent infrared (OPIR) Block O Geosynchronous
Camera Link digital video. For more infor- Orbit (GEO) satellite, which will replace the service’s current Space-Based Infrared System
mation contact Sierra Olympic online at (SBIRS) expected to be phased out within the next five years. The award includes develop-
https://www.sierraolympic.com/products/ ment scope through critical design review. A final down-select is expected at the end of the
details/ventus-275. CDR phase in 2020.
thousands of missions for over 20 years without and MQ-9 Reaper attack unmanned aerial vehi- (UAVs). They found their solution from Persistent
flight failures. cle (UAV). Systems LLC in New York.
DDC’s hermetically sealed RAD-PAK NAND Fuzing provides mechanical, electro-me- Persistent Systems and Insitu, a Boeing com-
Flash devices come in a ceramic flat package with chanical, and electronic safe/arm products for pany, have entered into a five-year agreement
radiation-hardened shielding. They are based on general-purpose and penetration bombs, mis- for Insitu to incorporate Persistent’s Wave Relay
as many as eight 32 Gb x8 NAND Flash die (256 siles, and rockets. MANET technology into Insitu UAVs.
Gb), and use single-level cell (SLC) Technology for Kaman is the sole source of the Joint Program- Installing Persistent’s MANET radios on
fast read and write capabilities and boot times. mable Fuze (FMU-152 A/B) to the Air Force, and unmanned aircraft will enable Insitu UAVs to join
The BioSentinel mission is funded by the been the sole provider of the JPF to the Air Force land-, air-, and sea-based networks to enable
Advanced Exploration Systems program within warfighters to share voice and data, including
the Human Exploration and Operations Mission imagery, video, and text.
Directorate at NASA headquarters in Washington. The agreement between Persistent and
Partner organizations include NASA Ames Insitu enables Insitu to join the Wave Relay Eco-
Research Center in Mountain View, Calif.; NASA system, an alliance of companies using Wave
Johnson Space Center in Houston; Loma Linda Relay MANET radios. This will enable Insitu’s
University Medical Center in Loma Linda, Calif.; UAVs to work seamlessly with all other Wave
and the University of Saskatchewan in Saska- since 2002. Kaman also provides the JPF to 26 Relay MANET-enabled products.
toon, Saskatchewan. other nations. Kaman produces the JPF at facili- “Integrating the Wave Relay MANET into our
For more information contact DDC online ties in Orlando, Fla., and in Middletown, Conn. products gives our systems a critical communi-
at www.ddc-web.com, or the Space Dynamics The has projectile velocity measurement equip- cation capability, enabling a wholly networked
Laboratory at Utah State University at www. ment, projectile impact media, high-speed pho- field solution,” says Matt Bartow, Insitu’s chief
sdl.usu.edu/solutions/hardware/pearl. tographic equipment, and lighting for night fir- technology officer.
ing and tests to help in JPF production. Ad-hoc networking enables warfighters
On this order Kaman will do the work in operating in the same region to create RF net-
WEAPONS FUZING Orlando, Fla., and Middletown, Conn., and works on the fly to enable data networking, in
Air Force chooses Kaman to should be finished by June 1, 2020. For more areas where no communications infrastructure
provide programmable fuzes information contact Kaman Fuzing & Pre- exists. Each Persistent Systems radio acts simul-
for airborne weapons cision Products online at www.kaman.com/ taneously as a transmitter, receiver, and network
U.S. Air Force airborne weapons experts needed fuzing-precision-products/about-us. node — similar to a cell phone tower.
special fuzes that enable aircraft pilots to pro- The Wave Relay MANET adapts quickly and
gram weapons in flight. They found their solu- continuously to fluctuations in terrain and other dif-
tion from the Kaman Corp. Fuzing & Precision WIRELESS NETWORKING ficult environmental conditions to make the most
Products segment in Orlando, Fla. Persistent Systems to provide of connectivity and communications performance.
Officials of the Air Force Life Cycle Man- mobile ad-hoc networking The Wave Relay MANET’s proprietary rout-
agement Center at Eglin Air Force Base, Fla., (MANET) for unmanned aircraft ing algorithm enables users to incorporate vast
announced a $52 million order to Kaman on Unmanned aircraft designer Insitu in Bingen, numbers of meshed communications devices
Wednesday for 15,000 FMU-152 A/B Joint Pro- Wash., needed mobile ad-hoc networking into the network in which the devices them-
grammable Fuzes (JPF). (MANET) capability for the company’s ScanEa- selves form the communication infrastructure.
The JPF enables air crew to program weapon gle, ScanEagle2, ScanEagle3, Integrator, and Persistent Systems Wave Relay radios each
settings in flight while weapons are mounted to RQ-21A Blackjack unmanned aerial vehicles use three antennas instead of one to boost com-
the aircraft, and is for several different weapons, munications range and power, as well as to mit-
including general-purpose bombs and guided igate the effects of multipath and other inter-
bombs that use JDAM or Paveway kits. ference to keep data communications open and
Aircraft that can use the JPF on their weap- operating at high bandwidth.
ons include the F-15E jet fighter-bomber, F-16 For more information contact Persistent
jet fighter, F-22 fighter, A-10 ground-attack jet, Systems online at www.persistentsystems.com,
B-1 and B-2 strategic bombers, B-52 bomber, or Insitu at www.insitu.com.
38
D E C E M B E R 2 0 1 8 MILITARY & AEROSPACE ELECTRONICSwww.militaryaerospace.com
new products
contact John Keller at jkeller@pennwell.com.
1812MAE39-40_c3.indd 1 40
RGBSpec_MAE_1812 12/5/18
11/7/18 12:03 PM
1:52 PM
RF AND MICROWAVE
EDITORIAL OFFICES
PennWell Corporation,
Military & Aerospace Electronics
Waveguide
Components
All Available for
Same-Day Shipping
RF Solutions
From RF Engineers
Pasternack’s RF Engineering team has assembled the largest selection of in-stock and ready to ship waveguide
components covering RF, microwave and millimeter-wave bands up to 110 GHz. With 20 different waveguide categories
and over 500 designs including adapters, power amplifiers, detectors, bandpass filters, PIN diode switches, attenuators,
horn antennas and more, Pasternack has the waveguide components you are looking for. Whether it’s waveguide
products or any of the other 40,000 in-stock components we carry, our Application Engineers stand ready to deliver
solutions for all your RF project needs.
866.727.8376
visit pasternack.com today!
1812MAE_c1-c2_c4.indd
PasEnt_MAE_1802 1 4 12/5/18 12:58
1/22/18 12:03 PM
PM