BROOKLYN, N.Y., May 30, 2018 -- The NYU Tandon School of Engineering's Future Labsentrepreneurial network will bring together leading cybersecurity practitioners and researchers to explore the rapidly emerging promises and risks that artificial intelligence hold for cybersecurity.
Aimed at helping professionals at established enterprises, startups, and research institutions understand recent advancements in AI technology and how talent challenges play a role in the balance between progress and security, "Focus AI: Cybersecurity" is the latest in the Future Labs' speaker series for New York City's entrepreneurial community. It will take place on Monday, June 4, 2018, from 5 to 8 p.m. at the Midtown Manhattan offices of sponsoring partner PwC.
- Larry Trittschuh, chief security officer, Americas at Barclays
- Michael J. Landewe, co-founder of security firm Avanan
- Carol Lee, partner at PwC and leader of technology-sector initiatives
- Lucas Nelson, security expert and partner at venture fund Lytical Ventures and Kauffman Fellows
- Dawud Gordon, Ph.D, founder of behavioral biometrics startup TwoSense
- Damon McCoy, NYU Tandon assistant professor of computer science and engineering and a member of NYU'sCenter for Cybersecurity
McCoy's research focuses on empirically measuring the security and privacy of technology systems, and he recently received attention for his long-term study of ransomware, a type of malware that encrypts the files of infected hosts and demands payment for their restoration. It is timely work given that the Online Trust Alliance called 2017 "the worst year ever in data breaches and cyber incidents" worldwide, and the global costs of such attacks are expected to reach up to $6 trillion annually by 2021. McCoy has led numerous research investigations into cybercrime using large data sets.
The conference will provide an important forum for discussion about AI technologies, industry needs, and investment opportunities surrounding cyber risk, which Warren Buffett deemed a greater threat to mankind than nuclear weapons. With a recent survey showing that almost 40 percent of enterprise organizations already deploy AI-based security analytics to some extent, and that figure expected to steadily increase, cybersecurity providers are racing to implement advanced AI-driven solutions for their clients.
For more information or to register, visit https://goo.gl/JjPYQ9.
About the New York University Tandon School of Engineering
The NYU Tandon School of Engineering dates to 1854, the founding date for both the New York University School of Civil Engineering and Architecture and the Brooklyn Collegiate and Polytechnic Institute (widely known as Brooklyn Poly). A January 2014 merger created a comprehensive school of education and research in engineering and applied sciences, rooted in a tradition of invention and entrepreneurship and dedicated to furthering technology in service to society. In addition to its main location in Brooklyn, NYU Tandon collaborates with other schools within NYU, one of the country's foremost private research universities, and is closely connected to engineering programs at NYU Abu Dhabi and NYU Shanghai. It operates Future Labs focused on start-up businesses in downtown Manhattan and Brooklyn and an award-winning online graduate program. For more information, visit http://engineering.nyu.edu.
SOURCE NYU Tandon School of Engineering
Cambridge Pixel's RadarWatch Display Software to Enhance Coastal Surveillance and Small Port & Harbour Security
CAMBRIDGE, England, May 30, 2018 --
- Augmented vision is implemented within RadarWatch to fuse primary radar tracks with data from ship (AIS) and aircraft (ADS-B and IFF) transponders and then display this as an overlay to camera video
Cambridge Pixel, a developer of radar display, tracking and recording sub-systems, has announced RadarWatch, its new radar and sensor-agnostic display software application designed for in-country integrators developing coastal surveillance, small port & harbour security, and short-range vessel traffic management system (VTS-Lite) applications.
The Windows-based RadarWatch software application can display tiled maps, S57/S63 electronic charts, video from up to 2 radars and video from up to 16 cameras, within multiple windows and across multiple screens. RadarWatch is compatible with a wide range of radar scanners, including those from Kelvin Hughes, Simrad, Terma and Furuno, and provides a common software architecture that can be scaled to single or multi-sensor installations.
Augmented vision is implemented within RadarWatch to fuse primary radar tracks with data from ship (AIS) and, where appropriate, aircraft (ADS-B and IFF) transponders and then display this as an overlay to camera video. This feature aids the interpretation of a complex surveillance situation enabling a faster response to threats, clarity of decision making and improved situational awareness, as well as enabling features such as slew-to-cue.
David Johnson, CEO, Cambridge Pixel, said, "RadarWatch provides an in-country integrator with a modern, multi-screen, multi-window display solution that fuses information from radar sensors, transponders and cameras to present a consolidated view of maritime information."
"Our product works seamlessly with many different radar and camera sensors and by implementing augmented vision, we can allow targets to be labelled within the camera video footage, easing the burden on the operator and enabling faster, clearer and better-informed decisions," David added.
RadarWatch also features comprehensive alarm logic allowing alarms to be configured based on areas, target activity, or target behaviour. Full recording of sensor data, cameras, network traffic and operator screens is provided by the optional RDR software. Target tracking is provided by Cambridge Pixel's SPx Server, which can run local to the RadarWatch display, or remotely if the radar sensor is distant.
Cambridge Pixel provides integrators with a highly flexible solution. The RadarWatch software accepts open data formats such as ASTERIX and NMEA-0183 and works with Cambridge Pixel's own software modules too, such as SPx Fusion, SPx Camera Manager and SPx Radar Data Recorder.
"This open and modular approach gives systems integrators the flexibility to design and build a complete coastal security solution selecting from us just the functional modules they need to meet the requirements of the particular project," said David Johnson. "This enables them to add their own value and not get locked into an expensive and inflexible coastal surveillance solution."
Cambridge Pixel's radar technology is used in naval, air traffic control, vessel traffic, commercial shipping, security, surveillance and airborne radar applications. Its systems have been implemented in mission-critical applications with companies such as BAE Systems, Frontier Electronic Systems, Blighter Surveillance Systems, Exelis, Hanwha Systems, Kelvin Hughes, Lockheed Martin, Navtech Radar, Raytheon, Saab Sensis, Royal Thai Air Force, Sofresud and Tellumat.
About Cambridge Pixel (http://www.cambridgepixel.com)
Cambridge Pixel is an award-winning developer of sensor processing and display solutions including primary and secondary radar interfacing, processing and display components for military and commercial radar applications. It is a world-leading supplier of software-based radar tracking and scan conversion solutions through its modular SPx software, and HPx hardware product range. Based near Cambridge in the UK, the company operates worldwide through a network of agents and distributors
BOULDER, Colo., May 30, 2018 -- Ball Aerospace has been chosen to develop and build the Wide Field Instrument (WFI) Optical Mechanical Assembly (WOMA) for NASA's Wide Field Infrared Survey Telescope (WFIRST). WFIRST is a NASA observatory designed to answer essential questions in the areas of dark energy, exoplanets and infrared astrophysics using the WFI.
"WFIRST was identified as a top priority of the most recent Decadal Survey in 2010 and Ball supports the decadal process, which builds a community consensus for science priorities," said Jim Oschmann, vice president and general manager for Civil Space, Ball Aerospace. "The science WFIRST will provide is unprecedented as the wide-field imaging of distant galaxies will unlock the mysterious effects of dark energy, which may fundamentally change our understanding of physics."
The WFI consists of WOMA and key subassemblies provided by NASA Goddard Space Flight Center. Ball and NASA will work together to integrate and test the WFI. The WFI will be about the size of an upright piano, and with Ball's WOMA design, provides exquisite stability and structural repeatability. When launched in the mid-2020s, WFIRST will have a field of view 100 times larger than Hubble Space Telescope's Advanced Camera for Surveys, allowing scientists to efficiently answer the most fundamental science questions – with the capability to collect data in days that once took months or years.
For nearly 60 years, Ball has been developing instruments for NASA. For example, Ball built seven science instruments for the Hubble Space Telescope, including building the Wide-field Camera 3 (WFC3) alongside Goddard Space Flight Center, as well as two star trackers, five major leave-behind equipment subsystems and more than eight custom tools to support astronauts during servicing missions. Ball designed and built the advanced optical technology and lightweight mirror system for the James Webb Space Telescope. Overall, Ball has contributed to all of NASA's Great Observatories – Compton Gamma Ray, Hubble, Chandra X-Ray, Spitzer Space Telescope and Webb – and WFIRST will continue that tradition.
Ball Aerospace pioneers discoveries that enable our customers to perform beyond expectation and protect what matters most. We create innovative space solutions, enable more accurate weather forecasts, drive insightful observations of our planet, deliver actionable data and intelligence, and ensure those who defend our freedom go forward bravely and return home safely. Go Beyond with Ball.® For more information, visit www.ball.com/aerospace or connect with us on Facebook or Twitter.
About Ball Corporation
Ball Corporation (NYSE: BLL) supplies innovative, sustainable packaging solutions for beverage, food and household products customers, as well as aerospace and other technologies and services primarily for the U.S. government. Ball Corporation and its subsidiaries employ 18,300 people worldwide and reported 2017 net sales of $11 billion. For more information, visit www.ball.com, or connect with us on Facebook or Twitter.
This release contains "forward-looking" statements concerning future events and financial performance. Words such as "expects," "anticipates," "estimates," "believes," "targets," "likely" and similar expressions typically identify forward-looking statements, which are generally any statements other than statements of historical fact. Such statements are based on current expectations or views of the future and are subject to risks and uncertainties, which could cause actual results or events to differ materially from those expressed or implied. You should therefore not place undue reliance upon any forward-looking statements and any of such statements should be read in conjunction with, and, qualified in their entirety by, the cautionary statements referenced below. The company undertakes no obligation to publicly update or revise any forward-looking statements, whether as a result of new information, future events or otherwise. Key factors, risks and uncertainties that could cause actual outcomes and results to be different are summarized in filings with the Securities and Exchange Commission, including Exhibit 99 in our Form 10-K, which are available on our website and at www.sec.gov. Additional factors that might affect: a) our packaging segments include product demand fluctuations; availability/cost of raw materials; competitive packaging, pricing and substitution; changes in climate and weather; competitive activity; failure to achieve synergies, productivity improvements or cost reductions; mandatory deposit or other restrictive packaging laws; customer and supplier consolidation, power and supply chain influence; changes in major customer or supplier contracts or a loss of a major customer or supplier; political instability and sanctions; currency controls; changes in foreign exchange or tax rates, including due to the effects of the 2017 U.S. Tax Cuts and Jobs Act; and tariffs or other governmental actions in any country affecting goods produced by us or in our supply chain, including imported raw materials, such as pursuant to section 232 of the U.S. Trade Expansion Act of 1962; b) our aerospace segment include funding, authorization, availability and returns of government and commercial contracts; and delays, extensions and technical uncertainties affecting segment contracts; c) the company as a whole include those listed plus: changes in senior management; regulatory action or issues including tax, environmental, health and workplace safety, including U.S. FDA and other actions or public concerns affecting products filled in our containers, or chemicals or substances used in raw materials or in the manufacturing process; technological developments and innovations; litigation; strikes; labor cost changes; rates of return on assets of the company's defined benefit retirement plans; pension changes; uncertainties surrounding geopolitical events and governmental policies both in the U.S. and in other countries, including the U.S. government elections, budget, sequestration and debt limit; reduced cash flow; ability to achieve cost-out initiatives and synergies; interest rates affecting our debt; and successful or unsuccessful joint ventures, acquisitions and divestitures, including with respect to the Rexam PLC acquisition and its integration, or the associated divestiture; the effect of the acquisition or the divestiture on our business relationships, operating results and business generally.
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS and FBI identified Internet Protocol (IP) addresses and other indicators of compromise (IOCs) associated with two families of malware used by the North Korean government:
- a remote access tool (RAT), commonly known as Joanap; and
- a Server Message Block (SMB) worm, commonly known as Brambul.
The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information on HIDDEN COBRA activity, visit https://www.us-cert.gov/hiddencobra.
FBI has high confidence that HIDDEN COBRA actors are using the IP addresses—listed in this report’s IOC files—to maintain a presence on victims’ networks and enable network exploitation. DHS and FBI are distributing these IP addresses and other IOCs to enable network defense and reduce exposure to any North Korean government malicious cyber activity.
This alert also includes suggested response actions to the IOCs provided, recommended mitigation techniques, and information on how to report incidents. If users or administrators detect activity associated with these malware families, they should immediately flag it, report it to the DHS National Cybersecurity and Communications Integration Center (NCCIC) or the FBI Cyber Watch (CyWatch), and give it the highest priority for enhanced mitigation.
See the following links for a downloadable copy of IOCs:
NCCIC conducted analysis on four malware samples and produced a Malware Analysis Report (MAR). MAR-10135536.3 – RAT/Worm examines the tactics, techniques, and procedures observed in the malware. Visit MAR-10135536.3 – HIDDEN COBRA RAT/Worm for the report and associated IOCs.
According to reporting of trusted third parties, HIDDEN COBRA actors have likely been using both Joanap and Brambul malware since at least 2009 to target multiple victims globally and in the United States—including the media, aerospace, financial, and critical infrastructure sectors. Users and administrators should review the information related to Joanap and Brambul from the Operation Blockbuster Destructive Malware Report  in conjunction with the IP addresses listed in the .csv and .stix files provided within this alert. Like many of the families of malware used by HIDDEN COBRA actors, Joanap, Brambul, and other previously reported custom malware tools, may be found on compromised network nodes. Each malware tool has different purposes and functionalities.
Joanap malware is a fully functional RAT that is able to receive multiple commands, which can be issued by HIDDEN COBRA actors remotely from a command and control server. Joanap typically infects a system as a file dropped by other HIDDEN COBRA malware, which users unknowingly downloaded either when they visit sites compromised by HIDDEN COBRA actors, or when they open malicious email attachments.
During analysis of the infrastructure used by Joanap malware, the U.S. Government identified 87 compromised network nodes. The countries in which the infected IP addresses are registered are as follows:
Malware often infects servers and systems without the knowledge of system users and owners. If the malware can establish persistence, it could move laterally through a victim’s network and any connected networks to infect nodes beyond those identified in this alert.
Brambul malware is a brute-force authentication worm that spreads through SMB shares. SMBs enable shared access to files between users on a network. Brambul malware typically spreads by using a list of hard-coded login credentials to launch a brute-force password attack against an SMB protocol for access to a victim’s networks.
Joanap is a two-stage malware used to establish peer-to-peer communications and to manage botnets designed to enable other operations. Joanap malware provides HIDDEN COBRA actors with the ability to exfiltrate data, drop and run secondary payloads, and initialize proxy communications on a compromised Windows device. Other notable functions include
- file management,
- process management,
- creation and deletion of directories, and
- node management.
Analysis indicates the malware encodes data using Rivest Cipher 4 encryption to protect its communication with HIDDEN COBRA actors. Once installed, the malware creates a log entry within the Windows System Directory in a file named mssscardprv.ax. HIDDEN COBRA actors use this file to capture and store victims’ information such as the host IP address, host name, and the current system time.
Brambul malware is a malicious Windows 32-bit SMB worm that functions as a service dynamic link library file or a portable executable file often dropped and installed onto victims’ networks by dropper malware. When executed, the malware attempts to establish contact with victim systems and IP addresses on victims’ local subnets. If successful, the application attempts to gain unauthorized access via the SMB protocol (ports 139 and 445) by launching brute-force password attacks using a list of embedded passwords. Additionally, the malware generates random IP addresses for further attacks.
Analysts suspect the malware targets insecure or unsecured user accounts and spreads through poorly secured network shares. Once the malware establishes unauthorized access on the victim’s systems, it communicates information about victim’s systems to HIDDEN COBRA actors using malicious email addresses. This information includes the IP address and host name—as well as the username and password—of each victim’s system. HIDDEN COBRA actors can use this information to remotely access a compromised system via the SMB protocol.
Analysis of a newer variant of Brambul malware identified the following built-in functions for remote operations:
- harvesting system information,
- accepting command-line arguments,
- generating and executing a suicide script,
- propagating across the network using SMB,
- brute forcing SMB login credentials, and
- generating Simple Mail Transport Protocol email messages containing target host system information.
Detection and Response
This alert’s IOC files provide HIDDEN COBRA IOCs related to Joanap and Brambul. DHS and FBI recommend that network administrators review the information provided, identify whether any of the provided IP addresses fall within their organizations’ allocated IP address space, and—if found—take necessary measures to remove the malware.
When reviewing network perimeter logs for the IP addresses, organizations may find instances of these IP addresses attempting to connect to their systems. Upon reviewing the traffic from these IP addresses, system owners may find some traffic relates to malicious activity and some traffic relates to legitimate activity.
A successful network intrusion can have severe impacts, particularly if the compromise becomes public. Possible impacts include
- temporary or permanent loss of sensitive or proprietary information,
- disruption to regular operations,
- financial losses incurred to restore systems and files, and
- potential harm to an organization’s reputation.
DHS recommends that users and administrators use the following best practices as preventive measures to protect their computer networks:
- Keep operating systems and software up-to-date with the latest patches. Most attacks target vulnerable applications and operating systems. Patching with the latest updates greatly reduces the number of exploitable entry points available to an attacker.
- Maintain up-to-date antivirus software, and scan all software downloaded from the internet before executing.
- Restrict users’ abilities (permissions) to install and run unwanted software applications, and apply the principle of least privilege to all systems and services. Restricting these privileges may prevent malware from running or limit its capability to spread through the network.
- Scan for and remove suspicious email attachments. If a user opens a malicious attachment and enables macros, embedded code will execute the malware on the machine. Enterprises and organizations should consider blocking email messages from suspicious sources that contain attachments. For information on safely handling email attachments, see Using Caution with Email Attachments. Follow safe practices when browsing the web. See Good Security Habits and Safeguarding Your Data for additional details.
- Disable Microsoft’s File and Printer Sharing service, if not required by the user’s organization. If this service is required, use strong passwords or Active Directory authentication. See Choosing and Protecting Passwords for more information on creating strong passwords.
- Enable a personal firewall on organization workstations and configure it to deny unsolicited connection requests.
Response to Unauthorized Network Access
Contact DHS or your local FBI office immediately. To report an intrusion and request resources for incident response or technical assistance, contact DHS NCCIC ([email protected] or 888-282-0870), FBI through a local field office, or FBI’s Cyber Division ([email protected] or 855-292-3937).
- May 29, 2018: Initial version
Protection against many common pathogens and environmental stressors is written into our DNA. Our skin responds to sun exposure. Our immune system mounts defenses when we get the flu. Our bodies inherently work to mitigate the potential for harm caused by these health threats. However, these intrinsic responses are not always quick, robust, or appropriate enough to adequately defend us from harm, which is why many people experience sunburn after intense sun exposure or suffer severe symptoms, even death, following exposure to the flu.
Military service members, first responders, and civilian populations face threats far more severe than sunburn and respiratory infections. Pathogens with pandemic potential, toxic chemicals, and radioactive materials can all quickly and powerfully overwhelm the body’s innate defenses. And though significant public and private investment has been focused on the development of traditional medical countermeasures such as drugs, vaccines, and biologics to guard against the worst effects of these health threats, current countermeasures are often limited in their effectiveness and availability during emergencies.
DARPA is looking to make gains beyond the status quo. Inspired by recent advances in understanding of when and how genes express their traits, DARPA’s new PReemptive Expression of Protective Alleles and Response Elements (PREPARE) program will explore ways to better protect against biological, chemical, or radiological threats by temporarily and reversibly tuning gene expression to bolster the body’s defenses against – or directly neutralize – a given threat.
“The human body is amazingly resilient. Every one of our cells already contains genes that encode for some level of resistance to specific health threats, but those built-in defenses can’t always express quickly or robustly enough to be effective,” said Renee Wegrzyn, the PREPARE program manager. “PREPARE will study how to support this innate resistance by giving it a temporary boost, either before or after exposure, without any permanent edits to the genome.”
The program will focus on four key health challenges as proofs of concept for what DARPA ultimately envisions as a generalizable platform that can be rapidly adapted to emerging public health and national security threats: influenza viral infection, opioid overdose, organophosphate poisoning, and exposure to gamma radiation.
“Each of these four threats are major health concerns that would benefit from disruptive approaches,” Wegrzyn said. “Seasonal flu vaccines, for example, are limited in that they try to hit a perpetually moving target, so circulating flu strains are often mismatched to vaccine strains. Programmable modulation of common viral genome sequences could potentially neutralize many more circulating viral strains simultaneously to keep up with moving targets. Combining this strategy with a temporary boost to host protection genes could change how we think about anti-virals.”
PREPARE requires that any treatments developed under the program have only temporary and reversible effects. In so doing, PREPARE diverges sharply from recent gene-editing research, which has centered on permanently modifying the genome by cutting DNA and inserting new genes or changing the underlying sequence to change the genetic code. Such approaches may cause long-lasting, off-target effects, and though the tools are improving, the balance of risk versus benefit means that these therapies are reserved for individuals with inherited genetic disorders with few to no other treatment options. In addition, some indications, including treatment of pain, may only require temporary solutions, rather than life-long responses.
The envisioned PREPARE technologies would provide an alternative that preserves the genetic code exactly as it is and only temporarily modulates gene activity via the epigenome and transcriptome, which are the cellular messages that carry out DNA’s genetic instructions inside cells. This would establish the capability to deliver programmable, but transient, gene modulators to confer protection within brief windows of time for meaningful intervention.
“Focusing only on programmable modulation of gene expression enables us to provide specific, robust protection against many threats at once, with an effect that carries less risk, is limited but tunable in duration, and is entirely reversible,” Wegrzyn said.
Success will hinge on developing new tools for targeted modulation of gene expression inside the body. Researchers must identify the specific gene targets that can confer protection, develop in vivo technologies for programmable modulation of those gene targets, and formulate cell- or tissue-specific delivery mechanisms to direct programmable gene modulators to the appropriate places in the body. Although the immediate program goal is to develop defenses against one of the four focus areas determined by DARPA, the ultimate objective of PREPARE is to develop a modular, threat-agnostic platform solution with common components and manufacturing architecture that can be readily adapted to diverse and emerging threats.
Research will be conducted primarily using computer, cell culture, organoid, and animal models to establish proof of concept. However, DARPA’s vision is to generate new medical countermeasures for future use in humans. As such, DARPA is working with independent bioethicists to identify and address potential ethical, legal, and societal issues.
By the end of the four-year program, DARPA aims for each funded team to submit at least one final product to the U.S. Food and Drug Administration (FDA) for regulatory review as an Investigational New Drug or for Emergency Use Authorization. Throughout the program, teams will be required to work closely with the FDA to ensure that the data generated and experimental protocols meet regulatory standards.
DARPA will hold a Proposers Day on June 13, 2018, in Arlington, Va., to provide more information about PREPARE and answer questions from potential proposers. For additional information, visit: https://fbo.gov/spg/ODA/DARPA/CMO/DARPA-SN-18-45/listing.html. Advance registration is required; please visit: https://events.sa-meetings.com/PREPAREProposersDay. A full description of the program will be made available in a forthcoming Broad Agency Announcement.
TUCSON, Ariz. -- Disabled veterans in Alabama, Arizona, New Mexico and Texas can now apply for the 2018 No Barriers Warriors Grand Canyon Veteran Wilderness Expedition funded by Raytheon Company (NYSE: RTN). In October, the non-profit No Barriers USA organization will once again lead a team of 14 disabled veterans on a nine-day journey of discoveries and challenges in the Grand Canyon. Disabled veterans from all military branches and eras of service can apply. Apply by July 15, 2018, for October Grand Canyon rafting trek
To be considered for this year's expedition, disabled veterans should apply by July 15, 2018, through the No Barriers Warriors website. Once selected, team members must train for the journey and commit to a nine-day rafting adventure through the Grand Canyon. Participants pay nothing for the expedition; Raytheon underwrites the entire trip.
"I have witnessed the transformative power of No Barriers expeditions," said Dr. Taylor W. Lawrence, Raytheon Missile Systems president. "These are truly life-changing experiences for veterans seeking to improve their quality of life."
By fusing a comprehensive curriculum involving structured group dialogues with physically challenging activities such as long-distance hiking and rafting, disabled veterans team up to gain new strategies and skills that help them confront and overcome the barriers they face. This is the fifth year Raytheon and No Barriers have partnered for a veteran wilderness expedition. Previous journeys took teams to the Rocky Mountains in Colorado and Wind River Range in Wyoming.
About No Barriers USA
No Barriers improves the lives of veterans with disabilities through curriculum-based experiences in challenging environments. Our experiences serve as both an opportunity for growth and a catalyst for change as these brave men and women stretch physical and emotional boundaries, foster camaraderie, pioneer through adversity, and step up and serve others. Through experiences that are one part adventure, one part curriculum and one part physical challenge, we show veterans that what's within them is stronger than what is in front of them. The mission of No Barriers USA is to unleash the potential of the human spirit. Through transformative experiences, tools and inspiration, No Barriers helps people embark on a quest to overcome obstacles, live a full life and contribute their absolute best to the world. Follow us on Facebook and Twitter.
Raytheon Company, with 2017 sales of $25 billion and 64,000 employees, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 96 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5ITM products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Massachusetts. Follow us on Twitter.
No Barriers USA
+1.970.484.3633, ext. 316
EL SEGUNDO, Calif., May 28, 2018 -- Raytheon (NYSE: RTN) signed an interactive project agreement with Defence Science and Technology (DST) to work collaboratively to develop and prototype advanced electronic warfare capabilities for the Australian Defence Force's priorities and programs.
Australia's Chief Defence Scientist, Dr Alex Zelinsky, has welcomed the agreement saying it further strengthens the partnership between DST and Raytheon.
"Our ability to build Defence capability relies on support from industry to deliver leading-edge innovation and research," said Dr Zelinsky. "Scientific organisations alone cannot achieve the needed advances without extensive collaboration with industry and academia."
Under the agreement, Raytheon will provide its Multi-Function Receiver Exciter System test bench, a control system and a modeling and simulation environment. The lab will use MFIRES, a part of a product family that includes Raytheon's Next Generation Jammer Mid-band, to evolve and test advanced EW techniques.
"Controlling the electromagnetic spectrum is essential to today's mission success," said Doug Marimon, director of Raytheon Electronic Warfare Systems. "By combining U.S. and Australian strengths, we enhance our ability to deliver decisive EW capabilities in the Pacific and beyond."
Along with its electronic attack capability, MFIRES is also a radar warning receiver, providing electronic support and protection. Integrating multiple functions enables system success across the full EW mission by using less power, weight and space, all crucial elements in creating a significant advantage in electronic warfare.
Raytheon brings 50 years of EW experience and an established reputation for electromagnetic spectrum reliability and performance. DST Group, Australian industry and Raytheon will stand-up the lab in Adelaide, where they will take the first step toward creating a sovereign, integrated electronic warfare solution in Australia.
Raytheon Company, with 2017 sales of $25 billion and 64,000 employees, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 96 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I™ products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Mass. Follow us on Twitter.
May 21, 2018 -- Secretary of Homeland Security Kirstjen M. Nielsen today announced the release of Fiscal Year (FY) 2018 Notices of Funding Opportunity for eight DHS preparedness grant programs totaling more than $1.6 billion. The grant programs provide funding to state, local, tribal, and territorial governments, as well as transportation authorities, nonprofit organizations, and the private sector, to improve the nation’s readiness in preventing, protecting against, responding to, recovering from and mitigating terrorist attacks, major disasters and other emergencies. The grants reflect the Department’s focus on funding for programs that address our nation’s immediate security needs and ensure public safety in our communities.
“The administration remains committed to strengthening the security and resilience of our state and local communities,” said Secretary Nielsen. “The DHS grant programs are flexible by design and will be used to help address evolving threats. They will go toward building and sustaining capabilities across all levels of government and the whole community to maximize preparedness.”
The FY 2018 grant guidance will continue to focus on the nation’s highest risk areas, including urban areas that face the most significant threats. For FY 2018, the Urban Area Security Initiative (UASI) will enhance regional preparedness and capabilities by funding 32 high-threat, high-density urban areas. This represents Congressional intent to limit FY 2018 UASI funding to those Urban Areas that represent up to 85 percent of the nationwide risk, as stated in the Explanatory Statement accompanying the Department of Homeland Security Appropriations Act, 2018 (Pub. L. No. 115-141).
Consistent with previous grant guidance, dedicated funding is provided for law enforcement and terrorism prevention throughout the country to prepare for, prevent and respond to pre-operational activity and other crimes that are precursors or indicators of terrorist activity.
Grant recipients are encouraged to use grant funding to maintain and sustain current critical core capabilities through investments in training and exercises, updates to current planning and procedures, and lifecycle replacement of equipment. New capabilities that are built using homeland security grant funding must be deployable if needed to support regional and national efforts. All capabilities being built or sustained must have a clear linkage to the core capabilities articulated in the National Preparedness Goal.
Preparedness Grant Program Allocations for Fiscal Year 2018:
Emergency Management Performance Grant (EMPG)—provides more than $350 million to assist state, local, tribal, territorial governments in enhancing and sustaining all-hazards emergency management capabilities.
Homeland Security Grant Program (HSGP)—provides more than $1 billion for states and urban areas to prevent, protect against, mitigate, respond to, and recover from acts of terrorism and other threats.
State Homeland Security Program (SHSP)—provides $402 million to support the implementation of risk-driven, capabilities-based State Homeland Security Strategies to address capability targets. States are required to dedicate 25 percent of SHSP funds to law enforcement terrorism prevention activities.
Urban Area Security Initiative (UASI)—provides $580 million to enhance regional preparedness and capabilities in 32 high-threat, high-density areas. States and Urban Areas are required to dedicate 25 percent of UASI funds to law enforcement terrorism prevention activities.
Operation Stonegarden (OPSG)—provides $85 million to enhance cooperation and coordination among local, tribal, territorial, state and federal law enforcement agencies to jointly enhance security along the United States land and water borders.
Since the enactment of the 9/11 Act, FEMA has required states to ensure that at least 25 percent of the total funds awarded to them under SHSP and UASI are dedicated toward law enforcement terrorism prevention activities (LETPA). The total LETPA allocation can be satisfied from SHSP, UASI or both. In addition, states must obligate at least 80 percent of the funds awarded under SHSP and UASI to local or tribal units of government within 45 days of receipt of the funds.
Tribal Homeland Security Grant Program (THSGP)—provides $10 million to eligible tribal nations to implement preparedness initiatives to help strengthen the nation against risk associated with potential terrorist attacks and other hazards.
Nonprofit Security Grant Program (NSGP)—provides $60 million to support target hardening and other physical security enhancements for nonprofit organizations that are at high risk of a terrorist attack. This year, $50 million is provided to nonprofits in UASI-designated urban areas, and $10 million is provided to nonprofits located in any state or territory.
Intercity Passenger Rail - Amtrak (IPR) Program—provides $10 million to protect critical surface transportation infrastructure and the traveling public from acts of terrorism and increase the resilience of the Amtrak rail system.
Port Security Grant Program (PSGP)—provides $100 million to help protect critical port infrastructure from terrorism, enhance maritime domain awareness, improve port-wide maritime security risk management, and maintain or reestablish maritime security mitigation protocols that support port recovery and resiliency capabilities.
Transit Security Grant Program (TSGP)—provides $88 million to owners and operators of transit systems to protect critical surface transportation and the traveling public from acts of terrorism and to increase the resilience of transit infrastructure.
Intercity Bus Security Grant Program (IBSGP)—provides $2 million to owners and operators of intercity bus systems to protect critical surface transportation infrastructure and the traveling public from acts of terrorism and to increase the resilience of transit infrastructure.
All preparedness Notices of Funding Opportunities can be found at www.grants.gov. Final submissions must be made through the Non-Disaster (ND) Grants system located at https://portal.fema.gov.
Further information on DHS’s preparedness grant programs is available at www.dhs.gov and http://www.fema.gov/grants.
# # #
CIVITAVECCHIA, Italy, May 21, 2018 -- Percepto, developers of on-site autonomous drone systems, today announced that Enel, a multinational power company and a leading integrated player in the global, power, gas and renewables markets, has completed deployment of Percepto's Sparrow drone system for use at its Torrevaldaliga Nord power plant in Italy. The multipurpose drone platform will support operation and maintenance activities at the site.
At Enel's power plant, Sparrow will fly in automated mode, under the supervision of an operator who can take control of the device at any moment as Italy's regulatory framework does not currently allow fully autonomous drone flight.
Powered by computer vision and AI technology, the drone carries a permanent dual payload of day and night-vision (thermal) cameras enabling around-the-clock operations, including the collection of aerial video, snapshots and data that can be transmitted to Enel personnel in real-time.
When flying autonomously, Sparrow conducts inspection missions without any human intervention.
Percepto's drone-in-a-box solution makes aerial missions easier to conduct, increasing flight frequency and the probability of anomaly detection at an early stage. Once an anomaly is detected, the drone sends out an alert in real-time, describing the nature of the problem and reporting its location. Sparrow's ongoing data collection and analysis enables preventative maintenance, ultimately leading to a reduction in operational costs and improved site productivity.
"While drones are touted as the technology of the future, the ability to act autonomously unlocks their true potential, enabling them to act as a responsible, independent and smart 'team member' that provides not only a bird's-eye view of facilities, but real, actionable insights," said Dor Abuhasira, CEO of Percepto. "We're proud to be working with Enel and look forward to many years of cooperation with a company that excels in terms of generation of safe, low-cost, and environmentally-conscious energy."
Sparrow is stationed on-site at Enel's Torrevaldaliga Nord power plant and is housed in a self-contained base unit from where it launches and lands autonomously. The Percepto Base shelters, charges, transfers data and conducts "health checks" on the drone when it is not in operation. The system is also designed to withstand harsh weather conditions, such as heavy rain, snow and dust, allowing it to operate year-round.
To view Percepto's Sparrow drone operating at Enel's Torrevaldaliga Nord power plant, please click here.
Founded in 2013, Percepto is pioneering the use of commercial drones in industrial environments. Percepto's on-site drone system operates autonomously without human intervention. It is also capable of performing multiple security, safety and inspection missions around the clock. As a long time supplier of real-time machine vision and AI technology to the defense industry, Percepto now offers its unique set of capabilities to commercial markets. For more information, please visit us at: http://www.percepto.co