2,199 research outputs found
Image Exploitation-A Forefront Area for UAV Application
Image exploitation, an innovative image utilisation program uses high revisit multisensor, multiresolution imagery from unmanned air vehicle or other reconnaissance platform for intelligent information gathering. This paper describes the imagc exploitation system developed at the Aeronautical Dcvclopment Establishment, Bangalore, for the remotely piloted vehicle (RPV) Nishonr and highlights two major areas (i) In-flight imagc exploitation, and (ii) post-flight imagc cxploitatlon. In-flight imagc study includes real-timeenhancement of images frames during RPV flight. target acquisition. calculation of geo-location of targets, distance and area computation, and image-to-map correspondence. Post-flight image exploitation study includes image restoration, classtfication of terrain, 3-D depth computation using stereo vision and shape from shading techniques. The paper shows results obtained in each of these areas from actual flight trials
Indian armed forces approach to managing ISR big data
The importance of information and intelligence for the military is apparent from the fact that it is fundamental to the planning of any military operation in peace or war. It forms the core component of the military kill chain. The Military uses a term Kill Chain to describe the sequence of events leading to the destruction of the target. It includes the steps of target detection and identification, dispatch of force or weapon to track it, decision making, and final command to destroy it. It is also known as F2T2EA cycle or the Find, Fix, Track, Target, Engage and Assess cycle. ISR is the key determinant of detection and identification of the target
Multi-rover testbed for teleconducted and autonomous surveillance, reconnaissance, and exploration
At Caltech's Visual and Autonomous Exploration Systems Research Laboratory (http://autonomy.caltech.edu) an outdoor multi-rover testbed has been developed that allows for near real-time interactive or automatic control from anywhere in the world via the Internet. It enables the implementation, field-testing, and validation of algorithms/software and strategies for navigation, exploration, feature extraction, anomaly detection, and target prioritization with applications in planetary exploration, security surveillance, reconnaissance of disaster areas, military reconnaissance, and delivery of lethal force such as explosives for urban warfare. Several rover platforms have been developed, enabling testing of cooperative multi-rover scenarios (e.g., inter-rover communication/coordination) and distributed exploration of operational areas
Drone Swarms in Adversarial Environment
Drones are unmanned aerial vehicles (UAVs) operated remotely with the help of cameras, GPS, and on-device SD cards. These are used for many applications including civilian as well as military. On the other hand, drone swarms are a fleet of drones that work together to achieve a special goal through swarm intelligence approaches. These provide a lot of advantages such as better coverage, accuracy, increased safety, and improved flexibility when compared to a single drone. However, the deployment of such swarms in an adversarial environment poses significant challenges. This work provides an overview of the current state of research on drone swarms in adversarial environments including algorithms for swarming formation of robotic attack drones with their strengths and weaknesses as well as the attack strategies used by attackers. This work also outlines the common adversarial counter-attack methods to disrupt drone attacks consisting of detection and destruction of drone swarms along with their drawbacks, a counter UAV defense system, and splitting large-scale drones into unconnected clusters. After identifying several challenges, an optimized algorithm is proposed to split the large-scale drone swarms more efficiently
Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph
Police SWAT teams and Military Special Forces face mounting pressure and
challenges from adversaries that can only be resolved by way of ever more
sophisticated inputs into tactical operations. Lethal Autonomy provides
constrained military/security forces with a viable option, but only if
implementation has got proper empirically supported foundations. Autonomous
weapon systems can be designed and developed to conduct ground, air and naval
operations. This monograph offers some insights into the challenges of
developing legal, reliable and ethical forms of autonomous weapons, that
address the gap between Police or Law Enforcement and Military operations that
is growing exponentially small. National adversaries are today in many
instances hybrid threats, that manifest criminal and military traits, these
often require deployment of hybrid-capability autonomous weapons imbued with
the capability to taken on both Military and/or Security objectives. The
Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of
Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that
required military response and police investigations against a fighting cell of
the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade
Enhanced cyberspace defense with real-time distributed systems using covert channel publish-subscribe broker pattern communications
In this thesis, we propose a novel cyberspace defense solution to the growing sophistication of threats facing networks within the Department of Defense. Current network defense strategies, including traditional intrusion detection and firewall-based perimeter defenses, are ineffective against increasingly sophisticated social engineering attacks such as spear-phishing which exploit individuals with targeted information. These asymmetric attacks are able to bypass current network defense technologies allowing adversaries extended and often unrestricted access to portions of the enterprise. Network defense strategies are hampered by solutions favoring network-centric designs which disregard the security requirements of the specific data and information on the networks. Our solution leverages specific technology characteristics from traditional network defense systems and real-time distributed systems using publish-subscribe broker patterns to form the foundation of a full-spectrum cyber operations capability. Building on this foundation, we present the addition of covert channel communications within the distributed systems framework to protect sensitive Command and Control and Battle Management messaging from adversary intercept and exploitation. Through this combined approach, DoD and Service network defense professionals will be able to meet sophisticated cyberspace threats head-on while simultaneously protecting the data and information critical to warfighting Commands, Services and Agencies.http://archive.org/details/enhancedcyberspa109454049US Air Force (USAF) author.Approved for public release; distribution is unlimited
Space-based Global Maritime Surveillance. Part I: Satellite Technologies
Maritime surveillance (MS) is crucial for search and rescue operations,
fishery monitoring, pollution control, law enforcement, migration monitoring,
and national security policies. Since the early days of seafaring, MS has been
a critical task for providing security in human coexistence. Several
generations of sensors providing detailed maritime information have become
available for large offshore areas in real time: maritime radar sensors in the
1950s and the automatic identification system (AIS) in the 1990s among them.
However, ground-based maritime radars and AIS data do not always provide a
comprehensive and seamless coverage of the entire maritime space. Therefore,
the exploitation of space-based sensor technologies installed on satellites
orbiting around the Earth, such as satellite AIS data, synthetic aperture
radar, optical sensors, and global navigation satellite systems reflectometry,
becomes crucial for MS and to complement the existing terrestrial technologies.
In the first part of this work, we provide an overview of the main available
space-based sensors technologies and present the advantages and limitations of
each technology in the scope of MS. The second part, related to artificial
intelligence, signal processing and data fusion techniques, is provided in a
companion paper, titled: "Space-based Global Maritime Surveillance. Part II:
Artificial Intelligence and Data Fusion Techniques" [1].Comment: This paper has been submitted to IEEE Aerospace and Electronic
Systems Magazin
Routing UAVs to Co-Optimize Mission Effectiveness and Network Performance with Dynamic Programming
In support of the Air Force Research Laboratory\u27s (AFRL) vision of the layered sensing operations center, command and control intelligence surveillance and reconnaissance (C2ISR) more focus must be placed on architectures that support information systems, rather than just the information systems themselves. By extending the role of UAVs beyond simply intelligence, surveillance, and reconnaissance (ISR) operations and into a dual-role with networking operations we can better utilize our information assets. To achieve the goal of dual-role UAVs, a concrete approach to planning must be taken. This research defines a mathematical model and a non-trivial deterministic algorithmic approach to determining UAV placement to support ad-hoc network capability, while maintaining the valuable service of surveillance activities
Impacts and Risk of Generative AI Technology on Cyber Defense
Generative Artificial Intelligence (GenAI) has emerged as a powerful
technology capable of autonomously producing highly realistic content in
various domains, such as text, images, audio, and videos. With its potential
for positive applications in creative arts, content generation, virtual
assistants, and data synthesis, GenAI has garnered significant attention and
adoption. However, the increasing adoption of GenAI raises concerns about its
potential misuse for crafting convincing phishing emails, generating
disinformation through deepfake videos, and spreading misinformation via
authentic-looking social media posts, posing a new set of challenges and risks
in the realm of cybersecurity. To combat the threats posed by GenAI, we propose
leveraging the Cyber Kill Chain (CKC) to understand the lifecycle of
cyberattacks, as a foundational model for cyber defense. This paper aims to
provide a comprehensive analysis of the risk areas introduced by the offensive
use of GenAI techniques in each phase of the CKC framework. We also analyze the
strategies employed by threat actors and examine their utilization throughout
different phases of the CKC, highlighting the implications for cyber defense.
Additionally, we propose GenAI-enabled defense strategies that are both
attack-aware and adaptive. These strategies encompass various techniques such
as detection, deception, and adversarial training, among others, aiming to
effectively mitigate the risks posed by GenAI-induced cyber threats
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones
As smartphones become more pervasive, they are increasingly targeted by
malware. At the same time, each new generation of smartphone features
increasingly powerful onboard sensor suites. A new strain of sensor malware has
been developing that leverages these sensors to steal information from the
physical environment (e.g., researchers have recently demonstrated how malware
can listen for spoken credit card numbers through the microphone, or feel
keystroke vibrations using the accelerometer). Yet the possibilities of what
malware can see through a camera have been understudied. This paper introduces
a novel visual malware called PlaceRaider, which allows remote attackers to
engage in remote reconnaissance and what we call virtual theft. Through
completely opportunistic use of the camera on the phone and other sensors,
PlaceRaider constructs rich, three dimensional models of indoor environments.
Remote burglars can thus download the physical space, study the environment
carefully, and steal virtual objects from the environment (such as financial
documents, information on computer monitors, and personally identifiable
information). Through two human subject studies we demonstrate the
effectiveness of using mobile devices as powerful surveillance and virtual
theft platforms, and we suggest several possible defenses against visual
malware
- …