Skip to main content

tv   Defense News  ABC  May 15, 2016 11:00am-11:30am EDT

11:00 am
>> this week on defense news, we speak to the israeli bureau chief on destroying underground passageways and we get a close look at programs on satellites and security on the battlefield. welcome to defense news. here is a look at this week's top headlines. ashcroft or is rebooting the silicon valley outpost. will now report directly to carter, sidestepping an internal pentagon bureaucracy that storage -- sources say are outright hostile to the silicon valley group.
11:01 am
, although the secretary did not offer specifics. the former secretary of defense chuck hagel warned that unless the next u.s. president makes it a priority to sit down with a vladimir putin, the two nations could find themselves drawn to a cold war style buildup. the next u.s. leader needs to swallow their pride and personally sit down to deescalate tensions. the minister of defense announced the first buildup of personnel since the cold war ended 25 years ago. the increase in troop strength comes amid a new russian threat and political military turmoil. and now joining us to speak about antiterrorist efforts in israel is defense news israel bureau
11:02 am
we happy to have you here. bithave reported quite a about the discovery of tunnels extending into israel from southern gaza. >> the tunnels were built by how maas, the designated terror organization. they were built as strategic weapons to be used against israel. it is important to note that these sunil's are not new. they use them to strategic affect a decade ago when they crossed underneath the border into israel. tank, they took captive an israeli soldier. the soldier was held for five years until the israeli
11:03 am
release in exchange for 1027 prisoners. it was a huge strategic achievement on the part of hamas . the sheer number of these tunnels and the lengths that they extend up into the community. so in their mind, it is the epitome of asymmetric warfare. they cannot seize territory from traditional warfare. and with the absence of deployment, they also found they cannot bring it in with sustained rocket attacks over 51 days.
11:04 am
this is the crux of their concept of operations. clear how they are utilizing them now? tell?easy to assumption is that they call them assault tunnels, terror tunnels. the idea is that when the time is right, they will send in commandos large enough for fully armed commandos to go through them without crouching. wired withlly communication and electricity. antitankexport missiles and all kinds of weaponry. whether they have actually tried and failed
11:05 am
, this is the intention. we have all efforts to discover and destroy these tunnels before they can pop up out of the ground to replace civilians or military personnel. talk to me about the efforts to destroy the tunnels on the part of israel. >> there is a first tunnel discovered after they were in mid april. and last week, they discovered another tunnel. 34s is in addition to the known tunnels that were destroyed or located in the 51 days of fighting two summers ago.
11:06 am
it is an entire underground labyrinth. thatrranean combat ground can be connected to homes, urban offare, and the academy other backed groups. >> i know israel has been somewhat quiet in terms of the actual system they are using to destroy these tunnels. >> this is a black program. completely classified. they can hear and see big machinery.
11:07 am
they want to build a layered involvesthat persistence and intelligence. it boots on the ground and sophisticated technology. is i can say at this point there will be a combination of vacuumsthat can detect or hollow spaces up to 30 meters underneath the person. israel is adamant and how maas thes to strip -- protect strategic ones. something orered they are working half a
11:08 am
to target these groups. israel is firing back with tanks and airpower. this is first priority. >> i know israel is asking the u.s. for some support as well. it we will take a quick break. stay tuned with the bureau chief in israel. you are watching "defense news." somehow it felt like everything was moving in slow motion.
11:09 am
if i didn't react, things could have gotten messy in a hurry. i mean just got that sweet ride with a great rate from navy federal. i was not about to let anything happen to her. just looking out for my wingman. he's still in training. open to the armed forces, the dod and their families. navy federal credit union.
11:10 am
>> welcome back to defense news. i wanted to continue. i know you attended the special operations forces exhibition and there was a lot of talk about cooperation in the region. >> everyone wants to cooperate. was the theme of the conference and a lot of cooperation is going on not only in the overt battle, but covertly. and with covert partners, i might add. cooperation is key
11:11 am
. how effectively this can be implemented is an open issue. >> challenges and information sharing, can that really unite them in terms of the fight? >> they train a lot of special forces at a special training site. as you suggested, it is very difficult. not only operationally, but politically. today's friends can be tomorrow's foes. ago, the syrians were considered allies and a common fight against terror and of course the jordanian government is at office it ends. things change.
11:12 am
jordan. as aw jordan has emerged leader. froms their role different others among the allies? for jordan and king abdullah, this is a personal fight. the islamic state has declared war. they had a pilot who is captured alive in a cage. from hosting 1.2 million syrian refugees.
11:13 am
so this has survival at stake. they need to maintain stability. >> i know the u.s. has also called for an increased alliance between the united states and that area of the country or that area of the world. absolutely. it u.s. leadership is critical. >> thank you for joining us. when we return, how darpa is fighting cyber warfare from the battlefield.
11:14 am
11:15 am
>> welcome back to defense news. darfur,e programs at plan ask. >> can you tell us a little bit about what the program is? a cyber operations platform for the military. we really wanted to think about the military having a way to think about cyber. the way we would be able to accomplish this, we did a lot of early experimentation and over several years, got to the point where we have a functional platform we are taking to a couple exercises this year.
11:16 am
goal is to simplify cyber security for users. >> the first thing you will see is what we call mission command for cyber. in the future, units have the ability to conduct cyber, the most important thing for a commander he or she is responsible for is what are the units doing. are they collaborating? are they succeeding or failing? having that situational awareness, it gives better confidence that they can be effective. it gives the commander the ability to look in real time. what you see here is the cyber battle space.
11:17 am
responsible for. they can represent things like , very nuancedems and hard to understand data. using ismodel we are called cyber observable. that data model is being used and sharing data back-and-forth. we think there will be a broad use case and even some potential commercial spinoffs as cyber situational awareness. >> in a
11:18 am
click and drag scenario. >> the ease of the process is also something we are trying very hard to do. the original concept was strongly influenced by studying the decision-making process. the idea of a course of action and down through a chain of command, in some cases, it can take very long. they wouldn't know if that specific capability existed. are able to automate a lot of those monday and processes. we've collapsed that timeframe to actual execution of t
11:19 am
making it easier to construct , we have developed a way for cyber operators to construct plans so that they don't have to know the nuanced details. they can administer their own enterprise. here,s plan we built we've come up with a scenario to demonstrate capabilities. detected crimeware on the desktop and call the i.t. desk. they notice there is no antivirus detection of that. is where an agent got installed. in this case, will take a screenshot
11:20 am
out of the store, bring that mission on the battle space and they were able to detect the malware was there. a matter of a system that provides the tools needed to deal with cyber security manually and automatically. >> we have not taken humans out of the loop. and what we have done is we've taken a lot of the monday and undane labor out of the task. we found they spend a lot of time building up test networks to simulate what they would want to do.
11:21 am
lastly, a series of these nodes, they will replicate those. and what an operator can do is take a course of action and employ that on the virtual cyber range over and over to make sure it will work the way they want it to. , it wasrsaving concept not one of the hardest things we had to work on. it leaves the human being to think about things that are much more important like understanding how that malware got into that network. >> is it specifically geared toward the battlefield? is it for command? can it
11:22 am
be civilian agencies? >> we're really developing this the dod. there are commercial spinoff opportunities. there's no reason somebody couldn't take that idea and take enhancements we've made, especially with the programmability of that. we made the network programmable. we definitely see some sendoff opportunities. we actually have it running on that laptop over there and scales to the data center. we have the test data that we use. expert givesinance us tips for buying a car for your teenager. >>
11:23 am
owning and operating a car on their own is a proud and scary moment. between the flashy car desires and your practicality, it is real. it is safer and cheaper to go with a midsized sedan. make your kids accountable for a portion of the payments, however small. it teaches the responsibility of ownership. you can come up with savings strategies. check to see if your financial institution has special offers and discounts for the military. and if they offer a quick approval process, show up with the approval letter in hand. it gives you bargaining power.
11:24 am
and planning you can turn it cringe worthy moment into a teachable one. funhen we return, more darpa demo days. we were making a move. the dewe had to. made -- we knew that if we came in too high, it would cost us big time. we had to stay low. and boy did we. we locked it in and rode that low rate from navy federal credit union all the way to our first house. it's a split-level ranch. so cute! open to the armed forces and their families for over 80 years. navy federal credit union.
11:25 am
>> we are back with more from darpa demo day. i am here with the program manager from darpa that supports a program that essentially services satellite in space? >> the first robotic repair man to go out in orbit. >> we're going to change all that. >> talk to me a little bit about the program. >> we've been working on the technologies to make it possible for several years. we are starting a flight program to send this robotic servicing satisfy -- satellite to a geosynchronous orbit where the tv satellites and military
11:26 am
services. >> in terms of getting this to space and testing it out, how are you progressing in terms of making that happen? soon, we will be releasing a solicitation for a commercial partner. commerciala satellite, unusual for a military organization. there are five times as many commercial satellites so we get five times the chances to test it. satellitebring the and we put the robotics on and get it to orbit. >> there is the commercialization that benefits the commercial side and/or reflect back.
11:27 am
>> ecb technology. >> we will be able to do the same sorts of things for both. we would be able to push it out and get it operating again on the commercial side. we will be adding value. >> it can last longer and be maintained more easily in faith. have you gotten response to this so far? >> they are interested in being our partner and are interested in using the services.
11:28 am
>> before we start providing these services, it will be a testing time. they say we have a satellite you can play with. give everybody the confidence that it will do what we say. there is a bunch of laboratory testing going on. it has some of the key expertise in both software and hardware to make this successful. when we are finished with the demonstrations, people are pretty confident there is a new game in the space. >> that is all next week -- this week. tune in next time were we bring you the most interesting innovations. be sure to check out the latest news and analysis at defense news.com.
11:29 am
thanks f
11:30 am
[music] >> dr. charles stanley: we are prone to become like the people we associate with. you associate with godly people, more than likely you're going to be godly, because that is the atmosphere and the environment. you associate with people who are ungodly, who are fools, who are gossips, who are hotheaded and who are disloyal, you can't trust them, then you're more than likely to become like them. friendships are awesome, but they can also be very destructive. >> male announcer: next on "in touch," "strong friendships: part two." >> announcer: join us during the program and follow along with the sermon notes. go online to intouch.org/followalong where you can create your own notes

101 Views

info Stream Only

Uploaded by TV Archive on