How to Promote Your ATI Course in Social Media

How to Promote Your ATI Course in Social Media LinkedIn for ATI Rocket Scientists   Did you know that for 52% of professionals and executives, their LinkedIn profile is the #1 or #2 search result when someone searches on their name? For ATI instructors, that number is substantially lower – just 17%. One reason is […]
How to Promote Your ATI Course in Social Media LinkedIn for ATI Rocket Scientists   Did you know that for 52% of professionals and executives, their LinkedIn profile is the #1 or #2 search result when someone searches on their name? For ATI instructors, that number is substantially lower – just 17%. One reason is that about 25% of ATI instructors do not have a LinkedIn profile. Others have done so little with their profile that it isn’t included in the first page of search results. If you are not using your LinkedIn profile, you are missing a huge opportunity. When people google you, your LinkedIn profile is likely the first place they go to learn about you. You have little control over what other information might be available on the web about you. But you have complete control over your LinkedIn profile. You can use your profile to tell your story – to give people the exact information you want them to have about your expertise and accomplishments.   Why not take advantage of that to promote your company, your services, and your course? Here are some simple ways to promote your course using LinkedIn… On Your LinkedIn Profile Let’s start by talking about how to include your course on your LinkedIn profile so it is visible anytime someone googles you or visits your profile. 1. Add your role as an instructor. Let people know that this course is one of the ways you share your knowledge. You can include your role as an instructor in several places on your profile:
  • Experience – This is the equivalent of listing your role as a current job. (You can have more than one current job.) Use Applied Technology Institute as the employer. Make sure you drag and drop this role below your full-time position.
  • Summary – Your summary is like a cover letter for your profile – use it to give people an overview of who you are and what you do. You can mention the type of training you do, along with the name of your course.
  • Projects – The Projects section gives you an excellent way to share the course without giving it the same status as a full-time job.
  • Headline – Your Headline comes directly below your name, at the top of your profile. You could add “ATI Instructor” at the end of your current Headline.
Start with an introduction, such as “I teach an intensive course through the Applied Technology Institute on [course title]” and copy/paste the description from your course materials or the ATI website. You can add a link to the course description on the ATI website. This example from Tom Logsdon’s profile, shows how you might phrase it:   Here are some other examples of instructors who include information about their courses on their LinkedIn profile:
  • Buddy Wellborn – His Headline says “Instructor at ATI” and Buddy includes details about the course in his Experience section.
  • D. Lee Fugal – Mentions the course in his Summary and Experience.
  • Jim Jenkins – Courses are included throughout Jim’s profile, including his Headline, Summary, Experience, Projects, and Courses.
  • 2. Link to your course page.
In the Contact Info section of your LinkedIn profile, you can link out to three websites. To add your course, go to Edit Profile, then click on Contact Info (just below your number of connections, next to a Rolodex card icon). Click on the pencil icon to the right of Websites to add a new site. Choose the type of website you are adding. The best option is “Other:” as that allows you to insert your own name for the link. You have 35 characters – you can use a shortened version of your course title or simply “ATI Course.” Then copy/paste the link to the page about your course. This example from Jim Jenkins’ profile shows how a customized link looks:   3. Upload course materials. You can upload course materials to help people better understand the content you cover. You could include PowerPoint presentations (from this course or other training), course handouts (PDFs), videos or graphics. They can be added to your Summary, Experience or Project. You can see an example of an upload above, in Tom Logsdon’s profile. 4. Add skills related to your course. LinkedIn allows you to include up to 50 skills on your profile. If your current list of skills doesn’t include the topics you cover in your course, you might want to add them. Go to the Skills & Endorsements section on your Edit Profile page, then click on Add skill. Start typing and let LinkedIn auto-complete your topic. If your exact topic isn’t included in the suggestions, you can add it. 5. Ask students for recommendations. Are you still in touch with former students who were particularly appreciative of the training you provided in your course? You might want to ask them for a recommendation that you can include on your profile. Here are some tips on asking for recommendations from LinkedIn expert Viveka Von Rosen. 6. Use an exciting background graphic. You can add an image at the top of your profile – perhaps a photo of you teaching the course, a photo of your course materials, a graphic from your presentation, or simply some images related to your topic. You can see an example on Val Traver’s profile. Go to Edit Profile, then run your mouse over the top of the page (just above your name). You will see the option to Edit Background. Click there and upload your image. The ideal size is 1400 pixels by 425. LinkedIn prefers a JPG, PNG or GIF. Of course, only upload an image that you have permission to use.   Share News about Your Course You can also use LinkedIn to attract more attendees to your course every time you teach. 7. When a course date is scheduled, share the news as a status update. This lets your connections know that you are teaching a course – it’s a great way to reach the people who are most likely to be interested and able to make referrals. Go to your LinkedIn home page, and click on the box under your photo that says “Share an update.” Copy and paste the URL of the page on the ATI website that has the course description. Once the section below populates with the ATI Courses logo and the course description, delete the URL. Replace it with a comment such as: “Looking forward to teaching my next course on [title] for @Applied Technology Institute on [date] at [location].” Note that when you finish typing “@Applied Technology Institute” it will give you the option to click on the company name. When you do that ATI will know you are promoting the course, and will be deeply grateful! When people comment on your update, it’s nice to like their comment or reply with a “Thank you!” message. Their comment shares the update with their network, so they are giving your course publicity. If you want to start doing more with status updates, here are some good tips about what to share (and what not to share) from LinkedIn expert Kim Garst. 8. Share the news in LinkedIn Groups. If you have joined any LinkedIn Groups in your areas of expertise, share the news there too. Of course, in a Group you want to phrase the message a little differently. Instead of “Looking forward to teaching…” you might say “Registration is now open for…” or “For everyone interested in [topic], I’m teaching…” You could also ask a thought-provoking question on one of the topics you cover. Here are some tips about how to start an interesting discussion in a LinkedIn Group. 9. Post again if you still have seats available. If the course date is getting close and you are looking for more people to register, you should post again. The text below will work as a status update and in most LinkedIn Groups. “We still have several seats open for my course on [title] on [date] at [location]. If you know of anyone who might be interested, could you please forward this? Thanks. ” “We have had a few last-minute cancellations for my course on [title] on [date] at [location]. Know anyone who might be interested in attending?” 10. Blog about the topic of the course. When you publish blog posts on LinkedIn using their publishing platform, you get even more exposure than with a status update:
  • The blog posts are pushed out to all your connections.
  • They stay visible on your LinkedIn profile, and
  • They are made available to Google and other search engines.
A blog post published on LinkedIn will rank higher than one posted elsewhere, because LinkedIn is such an authority site. So this can give your course considerable exposure. You probably have written articles or have other content relevant to the course. Pick something that is 750-1500 words. To publish it, go to your LinkedIn home page, and click on the link that says “Publish a post.” The interface is very simple – easier than using Microsoft Word. Include an image if you can. You probably have something in your training materials that will be perfect. At the end of the post, add a sentence that says: “To learn more, attend my course on [title].” Link the title to the course description on the ATI website. For more tips about blogging, you are welcome to join ProResource’s online training website. The How to Write Blog Posts for LinkedIn course is free. Take the first step The most important version of your bio in the digital world is your LinkedIn summary. If you only make one change as a result of reading this blog post, it should be to add a strong summary to your LinkedIn profile. Write the summary promoting yourself as an expert in your field, not as a job seeker. Here are some resources that can help: Write the first draft of your profile in a word processing program to spell-check and ensure you are within the required character counts. Then copy/paste it into the appropriate sections of your LinkedIn profile. You will have a stronger profile that tells your story effectively with just an hour or two of work! Contributed by guest blogger Judy Schramm. Schramm is the CEO of ProResource, a marketing agency that works with thought leaders to help them create a powerful and effective presence in social media. ProResource offers done-for-you services as well as social media executive coaching. Contact Judy Schramm at jschramm@proresource.com or 703-824-8482.  

Russian Frigate Yaroslav Mudryy Harasses the San Jacinto

Christopher P. Cavas, Defense News6:18 p.m. EDT June 30, 2016 This petty harassment by Russian ships continues! At the time, the USS San Jacinto was enacting plans against Islamic State militants in Iraq and Syria along with the USS Dwight D. Eisenhower, an aircraft carrier. This is a mission that both the US and our “friend”  Russia […]

Christopher P. Cavas, Defense News6:18 p.m. EDT June 30, 2016

This petty harassment by Russian ships continues! At the time, the USS San Jacinto was enacting plans against Islamic State militants in Iraq and Syria along with the USS Dwight D. Eisenhower, an aircraft carrier. This is a mission that both the US and our “friend”  Russia jointly support. With friends like this, who needs enemies? This is personal to me.  He was also onboard in October 2012 when the San Jacinto and the USS MONTPELIER (SSN 765) collided while both vessels are conducting exercises off the coast of Florida. I have a son-in-law on the USS San Jacinto (CG-56). He has posted on Facebook that things were very tense and there was some concern about an attempt to board as a possibility.
USS San Jacinto involved in incident
http://navysite.de/cg/cg56.html Read more at http://www.inquisitr.com/3271959/russian-warship-accused-of-aggressive-maneuvers-near-us-navy-ship-the-second-cold-war-style-action-in-weeks/#hpqrL3K0RAV11MIi.99 For more details and photos see the links below and the source article at http://www.defensenews.com/story/defense-news/2016/06/28/russia-navy-destroyer-frigate-gravely-yaroslav-mudry-neustrashimy-mediterranean-truman-carrier-collision-encounter/86481616/ WASHINGTON — The same Russian frigate that, according to the US Navy, spent more than an hour June 17 maneuvering erratically and unsafely near a US aircraft carrier and destroyer in the Mediterranean Sea was at it again Thursday June 30, this time near a different carrier. And this time, the ship’s reputation as a dangerous driver was anticipated. The Yaroslav Mudryy, a Project 1154 Neustrashimy-class frigate wearing pennant number 777 was, according to a US Navy report, conducting shadowing operations of the aircraft carrier Dwight D. Eisenhower carrier strike group as the flattop was flying combat operations against ISIS targets in Syria and Iraq. The Russian frigate closed on the cruiser San Jacinto, operating as the carrier’s air defense commander, in an action a Navy message characterized as “abnormal, [un]safe and unprofessional.” The message details how the Yaroslav Mudryy was observed by the San Jacinto to be approaching “with ten personnel topside and weapons uncovered but unmanned.” “The actions of FF-777 were abnormal as they displayed maneuvers rarely seen by professional mariners at sea combined with an aggressive approach of [the San Jacinto],” the message continued. The Yaroslav Mudryy, after the close approach, took station in the San Jacinto’s wake about 3,000 yards astern of the cruiser and, according to the message, began broadcasting “do not cross my bow,” an action the US characterized as “inconsistent with the spirit of the [Incidents at Sea] agreement,” a longstanding agreement between the US and Russia to deal with such situations. “I think it is very important that sailors and officers on the bridge of a ship —whatever nationality it is—act prudently and communicate frequently to avoid any mistakes or miscalculations,” Vice Adm. James G. Foggo IIIwho is simultaneously commander of the U.S. Navy’s 6th Fleet, Joint Force Maritime Component Commander Europe and NATO’s Naval Striking and Support Forces NATO https://news.usni.org/2016/06/30/truman-strike-group-flight-operations    

ISIS hackers respond to US cyberattacks with threat

  Applied Technology Institute (ATI Courses) offers a variety of courses on Cyber Security, Communications & Networking, We think the recent developments below would be of interest to our readers. A group of pro-ISIS hackers known as the United Cyber Caliphate responded to cyber attacks mounted by the U.S. against the terror group with a […]
 
Uniformed and civilian cyber and military intelligence specialists monitor Army networks in the Cyber Mission Unit’s Cyber Operations Center at Fort Gordon, Ga. U.S. Army photo by Michael L. Lewis 0 Monitor Networks Uniformed and civilian cyber and military intelligence specialists monitor Army networks in the Cyber Mission Unit’s Cyber Operations Center at Fort Gordon, Ga. U.S. Army photo by Michael L. Lewis
Applied Technology Institute (ATI Courses) offers a variety of courses on Cyber Security, Communications & Networking, We think the recent developments below would be of interest to our readers. A group of pro-ISIS hackers known as the United Cyber Caliphate responded to cyber attacks mounted by the U.S. against the terror group with a threat. In a post uncovered on the messaging app Telegram, the hackers declared the U.S. is their target and said President Barack Obama “should afford all the consequences.” “#Expect the Islamic state #SOON,” it said in a post published late Tuesday. The group also slammed the “technical US-led war” against the Islamic State as “fake” and said it doesn’t harm ISIS. The message is not an official statement by the terror group, but marks the time ISIS-affiliated hackers have responded to U.S. cyber attacks. It follows an April 24 New York Times report that Washington is taking the battle against ISIS online, directing its Cyber Command to wage computer attacks that aim to undermine ISIS’ abilities to draw new supporters, distribute orders and execute daily functions like pay fighters. “We are dropping cyberbombs,” Deputy Secretary of Defense Robert O. Work told the paper. “We have never done that before.” It is unclear if the United Cyber Caliphate has been effected by the attacks. They may have offered a response since they’re the main group associated with Islamic State’s hacking activities. Earlier this week, Vocativ discovered that the group distributed a “kill” list that appeared to include dozens of U.S. government personnel — people linked to the State Department, the Department of Homeland Security and the departments of defense, energy, commerce and health and services. Read the original report on US Cyber Attacks here.  
Sign Up For ATI Courses eNewsletter

Defiant North Korea launches a space rocket

Applied Technology Institute (ATI Courses) offers a variety of courses on Radar, Missiles and Combat Systems.  We believe the news below would be of interest to our readers. North Korea has declared the successful firing of a long-range rocket and flouted international condemnation of the launch by promising “many more”. In defiance of international warnings, North […]
Applied Technology Institute (ATI Courses) offers a variety of courses on Radar, Missiles and Combat Systems.  We believe the news below would be of interest to our readers. North Korea has declared the successful firing of a long-range rocket and flouted international condemnation of the launch by promising “many more”. In defiance of international warnings, North Korea fired the rocket on Sunday morning in what it said was a mission under the direct orders of lead Kim Jong-un to put an Earth observation satellite, the Kwangmyongsong-4, into orbit. But the United Nations deplored Pyongyang’s move, widely seen as part of its program to develop intercontinental ballistic nuclear missiles (ICBMs).
North Korea beamed a special announcement live on state-run television claiming the launch as a success, and trumpeted the beauty of the “fascinating vapor of Juche satellite trailing in the clear and blue sky”.
It came just weeks after Pyongyang’s widely-disputed claim that it had successfully tested a hydrogen bomb, and is the latest evidence of North Korean leader Kim Jong-un’s willingness to ignore international pressure as tensions on the Korean Peninsula heighten. Washington has persistently called on Beijing, a key trade partner on which Pyongyang relies heavily, to do more to rein in its neighbor. But China has resisted calls to leverage its economic relationship with North Korea, fearing it would back an already volatile Kim Jong-un further into a corner. “China expresses regret that North Korea, in spite of the pervasive opposition of the international community, insisted on using ballistic missile technology to carry out a launch,” the Chinese foreign ministry said in a statement on Sunday. North Korea sees its rocket and nuclear tests as crucial steps toward its ultimate goal of achieving a nuclear-armed long-range missile arsenal – necessary, it says, to defend itself against what it describes as decades of US hostility, and part of Kim Jong-un’s “byungjin” policy of developing North Korea’s nuclear program and economy simultaneously. Pyongyang had initially told UN agencies it planned to launch its rocket sometime between February 8 and 25, before bringing the window forward to between February 7 and 14 on Saturday. It launched two hours into the revised window. This is the sixth long-range missile test by the North in its program to develop nuclear-loaded ICBMs. It is thought to have a small arsenal of atomic bombs as well as an array of medium-range missiles but has yet to demonstrate the capability to produce nuclear warheads small enough to attach on a missile.


Sign Up For ATI Courses eNewsletter

Anonymous #OpISIS: Can Cyber Warfare Win the War on Terror?

Applied Technology Institute (ATI Courses) offers a variety of courses on Cyber Security, Communications & Networking.  This is our take on the recent activities of the most famed Hacktivist group to date called  Anonymous. The horrors of the Paris attacks have prompted a new wave of hate and determination among the cyberwarfare group of unknown size. Anonymous will […]
Applied Technology Institute (ATI Courses) offers a variety of courses on Cyber Security, Communications & Networking.  This is our take on the recent activities of the most famed Hacktivist group to date called  Anonymous. The horrors of the Paris attacks have prompted a new wave of hate and determination among the cyberwarfare group of unknown size. Anonymous will not forgive. Anonymous will not forget. Expect them. With the news of this declaration of war, many questions are rising. Will Anonymous succeed? Are cyberattacks what is needed in the face of the ever-expanding terrorist organization? Will it do more harm than good? Cyberattacks have taken many forms in the past, often focusing on taking control of online accounts, websites or databases and causing ridicule or putting a full stop to any of the targeted organization’s operations. The online hacker group has been famous for coming from all over the world to unite over one cause, be it the taking down of a government, as in their recent launch of Operation North Korea, or publishing and thereby shutting down harmful websites, such as child pornography websites in a ploy known as Operation DarkNet. Anonymous had a key role in kickstarting Arab Spring protests with their involvement in Operation Tunisia, which served to fight online censorship and awaken Tunisian activism in the face of their repressive government. What are its plans to destroy Daesh? Operation Ice ISIS, which vowed to execute “coordinated cyberattacks against extremist Jihadi websites and governments such as Turkey and Saudi Arabia who funded and supported ISIS”, had already been initiated in late September of last year.  Among criticism and fear of putting the cyberattackers in extreme danger, however, this operation resorted to using knowledge as a weapon. The goal became to spread the fact that ISIS does not represent a religion, and that the 1.6 billion Muslims in the world do not condone the abominable actions being carried out by the extremist group. The operation was revived after the Charlie Hebdo attacks in January of this year. Consecutive videos were published as part of #OpIsis (in FebruaryMarch, and April). The operation seemed somewhat successful, as Anonymous publicized the taking down of ISIS websites and published ISIS database information. Will this suffice to take down Daesh, one of the most feared terrorist organizations of the 21st century? According to them, the answer lies in their identity. They represent everyone and everything:
“We Are: Muslims, Christians, Jews… We Are hackers, crackers, hacktivists, phishers, agents, spies, or just the guy from next door. We Are students, administrators, workers, clerks, unemployed, rich, poor. We are young, or old, gay or straight. We wear smart clothes or rugs, we are hedonists, ascetics, joy riders or activists. We come from all races, countries, religions, and ethnicity.” (taken from the Anonymous Official Youtube channel)
This is particularly important in the face of ISIS, an extremist organization claiming to represent one of the largest religions of the world and aiming to destroy all those who do not believe in the same God they do. Unlike national governments, which hide behind specific ideologies, languages, and other exclusionary factors, Anonymous has the power to attract anyone from anywhere in the world, regardless of their language or religion. ISIS has also often been known to make wide use of the Internet and social media in its recruiting campaigns, as well as in its mission to spread fear across the globe. This widespread use of social media such as Facebook, Twitter, and Youtube accounts, has been crucial in the war that Anonymous has waged, as seen with results of #OpIsis earlier in the year. Already, Operation Paris has resulted in the shutting down of multiple ISIS Twitter accounts, most likely used to recruit youth into the extremist group. Will Anonymous be able to maintain a strong identity and ideology as well as support in its endeavor to destroy ISIS? Please comment below. For more cyber warfare news please visit The Cyber Wire.


Sign Up For ATI Courses eNewsletter

U.S. NAVY: New Museum Drone and Strategic Malpractice

Applied Technology Institute (ATICourses) offers the following courses on Unmanned Aerial Technology: Unmanned Aircraft Systems-Sensing, Payloads & Products On Site Your Facility Unmanned Aerial Vehicle Guidance & Control On Site Your Facility Unmanned Air Vehicle Design Jul 14-16, 2015 Columbia, MD Unmanned Aircraft System Fundamentals On Site Your Facility 4,000 pounds of fuel from a […]
150422-N-CE233-377 PATUXENT RIVER, Md. (April 22, 2015) The Navy's unmanned X-47B receives fuel from an Omega K-707 tanker while operating in the Atlantic Test Ranges over the Chesapeake Bay. This test marked the first time an unmanned aircraft refueled in flight. (U.S. Navy photo/Released)
Applied Technology Institute (ATICourses) offers the following courses on Unmanned Aerial Technology:
Unmanned Aircraft Systems-Sensing, Payloads & Products On Site Your Facility
Unmanned Aerial Vehicle Guidance & Control On Site Your Facility
Unmanned Air Vehicle Design Jul 14-16, 2015 Columbia, MD
Unmanned Aircraft System Fundamentals On Site Your Facility
4,000 pounds of fuel from a KC-707 tanker aircraft. This historic achievement followed last year’s equally revolutionary series of carrier launch and recovery operations by the X-47B. You would think that the Navy, cognizant of the need to take advantage of the promise of robotics would be aggressively pushing to do further testing, to make unmanned carrier-based surveillance and strike aircraft real, and thus extend the reach and power of the aircraft carrier – the crown jewel of America’s conventional power projection forces. Instead, the Navy wants to decommission the two X-47Bs (named Salty Dog 501 and Salty Dog 502) and put them in museums, even though they have 80% of their approved flight hours left. Such an action flies in the face of the imperative to counter the most strategically troubling elements of the emerging set of anti-access/area-denial threats that Secretary of Defense Ash Carter and his team are aiming to offset. The need to take advantage of unmanned and increasingly autonomous systems to preserve the aircraft carrier’s operational relevance in anticipated threat environments is obvious. America’s potential adversaries are rapidly investing in capabilities designed to limit the ability of U.S. military forces to gain access to, and operate within, vast areas of the air and maritime domains. For instance, a recent report from the Office of Naval Intelligence, The PLA Navy: New Capabilities and Missions for the 21st Century (discussed in this War on the Rocks article) ably details China’s development and fielding of modern missile-armed strike aircraft and surface combatants, quieter submarines armed with advanced anti-ship cruise missiles and torpedoes, and land-based anti-ship ballistic missiles such as the DF-21D. And Moscow’s recent decision to supply Iran with the S-300 surface-to-air missile system is illustrative of the broader proliferation of increasingly capable integrated air defense systems that threaten to outmatch not only the F/A-18E/F but also the as-yet deployed F-35C. Cognizant of these emerging threats, as far back as the 2006 Quadrennial Defense Review, Pentagon leaders directed the Navy to “develop an unmanned longer-range carrier-based aircraft capable of being air-refueled to provide greater standoff capability, to expand payload and launch options, and to increase naval reach and persistence.” Last week’s demonstration of automated aerial refueling by an unmanned air system (UAS) was a critical component of proving that unmanned naval surveillance and strike operations are possible. While aviation buffs will emphasize its historical significance, astute strategists will zero in on the fact that the UAS in question – the Navy X-47B – is a prototype of a carrier-based, long-range surveillance-strike aircraft with the “broad-band/all-aspect” stealth design required for operating within air space defended by advanced integrated air defense systems. In combination, the X-47B’s successful carrier launch/recovery demonstration in 2013 and last week’s automated aerial refueling effectively prove that the system the Navy needs is technically feasible and within reach. With aerial refueling, carrier-based UAS will be capable of conducting missions measured not in hours, but in days. For the first time in history, this would allow carrier-based aircraft to operate at intercontinental distances, enabling both rapid global responsiveness and the ability to stage persistent surveillance-strike operations from well outside most threats to the carrier. While additional technology maturation and experimentation is surely needed before an advanced UAS can be fully integrated into carrier air wings, the Navy is at a strategic “tipping point” where a truly game-changing capability is within their grasp. The submarine-launched ballistic missile – which turned the Air Force’s nuclear “dyad” into the iconic Air Force-Navy triad that deterred the Soviets during the Cold War – is an apt analogue. Absent the submarine-launched ballistic missile, the Navy would have effectively ceded the critical strategic deterrence mission to the Air Force. Today is no different. Absent stealthy, air-refuelable, surveillance-strike UAS aboard its carriers, the Navy will invariably cede power projection – and thus the conventional deterrence mission – to the Air Force, which is developing a new stealth bomber and moving more aggressively on the UAS front. Inexplicably, however, the Navy plans to end the Unmanned Combat Air System Demonstration (UCAS-D) and permanently deactivate the two X-47B aircraft by sending them to museums – doing irreversible damage to them in the process – despite having utilized only a small fraction of their available flight hours. Owing to repeated Navy “de-scoping” of the UCAS-D program over the past several years, much work remains before the Navy is ready to acquire carrier-based UAS at acceptable technical risk. Given the roughly $1.5B invested in UCAS-D to date, and that more technology maturation and experimentation is clearly required, the obvious question is: Why stop now? The answer from the Navy, and from the naval aviation enterprise in particular, has been that there are no cost effective solutions for continued UCLASS risk mitigation with UCAS-D, and that a penetrating, air-refuelable, surveillance-strike unmanned aircraft would be too expensive. Both arguments are fundamentally flawed. First, there are, in fact, myriad executable options for continued work on UCAS-D that would not only mitigate technical risk for UCLASS, but also substantially enhance the Navy’s readiness to integrate an operational UAS into the carrier air wing. Key areas for future UCAS-D enabled risk reduction include carrier control-area operations, deck handling, aerial refueling, command and control, sensor and weapon integration, survivability, and fleet experimentation. The simple truth is that UCAS-D has only scratched the surface. While some have argued that continuing UCAS-D would create an un-level competitive playing field for UCLASS, it is hard to understand how requirements for “carrier suitability” set by the government in 2007 after a fair and open competition, and defined in detail in 2011, are now anti-competitive – especially when data collected during the program would be available to all contractors competing on UCLASS. Under current Navy plans, moreover, the UCLASS program is merely a Technology Demonstration effort slated to begin in roughly FY17, with first flight of the “UCLASS-D” aircraft planned for no earlier than FY20. To state the obvious, it would be much less costly and risky to utilize a flight-proven system during the technology and risk reduction phase of the procurement process rather than develop an entirely new demonstration aircraft. This is true even if continued utilization of the X-47B air vehicles required sustained, low-level investment in hardware and software modifications necessary to address different aspects of yet-to-be-finalized UCLASS requirements. Conversely, the five-year gap in carrier-based UAS flight-testing, demonstration, and experimentation inherent in the Navy’s current approach would likely delay the fielding of an operational aircraft. In other words, the Navy’s current path to carrier-based UAS acquisition is guaranteed not only to cost more and take longer, but also to introduce an unnecessary level of risk in both cost and schedule. Which brings us to the last argument that proponents of the current flawed approach are making inside the Pentagon: that a penetrating, air-refuelable, counter-anti-access/area denial UAS would be dramatically more expensive than the surveillance-focused “spotter” that the Navy currently prefers. For the latter, the Navy has specified a requirement of 14 hours of unrefueled endurance while carrying a sensor suite and at least 1,000 pounds of weapons internally in low-to-medium threat environments. Meeting that objective would require a large-wingspan aircraft with a roughly 45,000 to 65,000-pound gross takeoff weight. A carrier-based surveillance-strike aircraft with somewhat less unrefueled endurance (8-10 hours – still three to four times that of the F/A-18E/F), a higher cruise speed, significantly increased internal weapons payload (~4,000 pounds), and enhanced survivability (i.e., broadband, all-aspect radar cross section reduction) would likely be in the middle of that gross takeoff weight range. With unit cost correlating closely with gross takeoff weight, both aircraft would likely fall within a similar range for overall cost. Ironically, affordability in the age of austerity is perhaps the strongest argument for acquiring a stealthy, air-refuelable, surveillance-strike UAS. Whereas the “spotter” UAS – designed expressly to support manned fighters – would represent a purely additive air wing cost, a surveillance-strike UAS could replace the F/A-18E/F in lieu of a manned “F/A-XX” in the late 2020s. The potential cost savings are staggering. Owing to the elimination of pilot training as a driver of carrier-based aircraft force size and flight hours, if the Navy acquired a UAS instead of another manned aircraft to replace the Super Hornet, it could procure roughly half the number of aircraft (or less) and fly them fewer hours per year. Based on in-depth analysis of historical carrier-based aircraft life-cycle cost data, a forthcoming report by the Center for a New American Security projects a 25-year savings mounting into the tens of billions. This is a strategic-level cost offset that would allow the Navy to invest in additional aircraft, ships, and submarines. At a time when DoD needs to squeeze more capability out of reduced investment budgets to meet acute security challenges, a carrier-based UAS that transforms the carrier into a frontline global attack arm while dramatically reducing the overall cost of the air wing represents a historic opportunity. For the Navy to prematurely destroy the X-47B planes and forfeit the opportunity to reduce risk, experiment, and learn for the next five years constitutes strategic malpractice of the highest order. At least Congress has taken notice, with Senator John McCain, Congressman Randy Forbes, and others urging the Navy to right its course and ensure America’s aircraft carriers and their air wings can deter and defeat future adversaries. We recommend Congress add funding to the FY2016 budget to keep the UCAS-D air vehicles flying while the Pentagon completes its reevaluation of final requirements for a future carrier-based UAS and it enters into development. With Congressional leaders acting, it’s time for leaders in the Pentagon to do the same. Last year, the Office of the Secretary of Defense forestalled the Navy’s release of a flawed UCLASS request for proposals and launched a review to study UCLASS requirements in the context of the joint family of airborne surveillance and strike platforms. With the fate of UCAS-D in the balance, it is again time for the Pentagon’s civilian leaders to weigh in to keep the promise of carrier-based UAS operations alive. Secretary Carter, Deputy Secretary of Defense Robert Work, and Secretary of the Navy Ray Mabus need to act before a historic opportunity is squandered. Pentagon officials like to talk about innovation, experimentation, and halting the erosion of America’s military-technological edge. It’s time for their rhetoric to translate into action. Robert Martinage is Senior Fellow at the Center for Strategic and Budgetary Assessments. Shawn Brimley is Executive Vice President at the Center for a New American Security. Both former Pentagon officials, they testified before the House Armed Services Committee on this issue in June 2014.
Sign Up For ATI Courses eNewsletter

US Weapons Program Under Cyber Seige: ATI’s Cyber Security Expert Gives His Opinion

Jason Christman, CISSP, PMP is teaching ATI’s Cyber Warfare – Global Trends course which will be offered on February 10-12, 2015 and April 14-17, 2015 in Columbia, MD. US Department of Defense has recently released a 2014 report that showed that nearly every U.S. weapons program tested in fiscal 2014 showed “significant vulnerabilities” to cyber […]

Jason Christman, CISSP, PMP is teaching ATI’s Cyber Warfare – Global Trends course which will be offered on February 10-12, 2015 and April 14-17, 2015 in Columbia, MD.

US Department of Defense has recently released a 2014 report that showed that nearly every U.S. weapons program tested in fiscal 2014 showed “significant vulnerabilities” to cyber attacks.

Here is Mr. Christman’s opinion on this subject:

When senior defense officials use phrases like “fight through” cyber attacks I think about the Hollywood portrayal of the heroic David character battling Goliath, or the clever outcast protagonist outsmarting the evil mega-corporation.  Remember that recently cancelled TV series about the US Cyber Command guy with the computer chip in his head?  Too often we rely on heroics and hope that our legacy of winning in conventional kinetic warfare will protect us.
Then I look at how the defense acquisition process pays lip service to cybersecurity and devalues genuine innovation.  Where is our Manhattan Project for Cyber?  There are pockets of hobby-shop activity going on in Gov/Industry labs but nothing on the order of what is needed to defend our nation.

On the positive side, there is some great work being done on cyberspace visualization, situational awareness, neurocognitive computing, and Software Defined X.  All are potential catalysts for much needed innovation.  Please, just not another smart firewall from a company whose name is the combination of a color + animal.

The problem goes far beyond analyzing vulnerabilities.  It’s a story the APL and other R&D innovators will thoroughly enjoy and be inspired by.  The challenge is changing the mindset of the people in policy, strategy, operations, and acquisition.

Jason Christman, CISSP, PMP, is a senior technology executive with an extensive background in strategic planning, operations management, and technology development across commercial and government sectors. He holds Master’s and Bachelor’s degrees in computer science and is a proponent of human-centered computing and the convergence of neuroscience technology with cyber systems. His subject matter expertise spans information and communication technologies, cyber operations, cyber planning, threat intelligence analysis, decision analytics, and information operations across multiple cyber mission areas for homeland defense, intelligence, and special operations. He is a Master Cyberspace Operations Officer serving as the Director of Cyber Operations on the Joint Staff for the State of Delaware and is a co-founder of the first Network Warfare Squadron in the Air National Guard.

Contact this instructor



Sign Up For ATI Courses eNewsletter

The FAA Won’t Release Drone Regulations Until 2017, Which Is Absurd and a Problem

Today there’s bad news for Amazon and all the other companies and individuals that are waiting for the FAA drone regulations: They’re not coming until 2017—at the earliest. Originally targeted for September 2015, the Government Accountability Office now says that it will realistically take about two more years to finalize the FAA’s plan for drones. […]
Today there’s bad news for Amazon and all the other companies and individuals that are waiting for the FAA drone regulations: They’re not coming until 2017—at the earliest. Originally targeted for September 2015, the Government Accountability Office now says that it will realistically take about two more years to finalize the FAA’s plan for drones. According to the Washington Post, the GAO’s director of civil aviation Gerald Dillingham said, “The consensus of opinion is the integration of unmanned systems will likely slip from the mandated deadline until 2017 or even later.” Even later?? FAA safety official Peggy Gilligan said at a congressional House panel Wednesday that there is a regulation proposal under executive review, but it will need a public comment period and months of revisions before it’s ready for prime time. Rep. Tom Massie, R-Ky., noted that the effort is moving forward on a “geological time scale.” Drones pose significant safety risks, and it’s reassuring that the FAA is taking its regulatory job seriously, but this is ridiculous. While the agency tries to figure out what to do, everyone else is finding ways to move ahead with drone use on an individual or industry scale. If the FAA waits too long to implement regulations it will at best stifle innovation and at worst struggle to maintain authority. If you would like to learn more about drones, register to attend one of the ATI courses below. Unmanned Aircraft Systems-Sensing, Payloads & Products Jan 26-29, 2015 Boston, MA Unmanned Air Vehicle Design Feb 17-19, 2015 Columbia, MD Unmanned Aircraft System Fundamentals Feb 24-26, 2015 Columbia, MD
Sign Up For ATI Courses eNewsletter

More Thoughts on the Mystery in the Malaysian Airlines Flight 17 Shoot Down

ATIcourses instructor John Parnell teaches the following courses: Aegis Combat System Engineering Aegis Ballistic Missile Defense Below are his thoughts on recent shoot down of Malaysian Airlines Flight 17 over Ukrane. The one that comes to mind is an Army AD battery called HAWK. It performs the same function, and consists of a Radar, Command […]
ATIcourses instructor John Parnell teaches the following courses: Aegis Combat System Engineering Aegis Ballistic Missile Defense Below are his thoughts on recent shoot down of Malaysian Airlines Flight 17 over Ukrane. The one that comes to mind is an Army AD battery called HAWK. It performs the same function, and consists of a Radar, Command and Control, and Weapon System.  So, the sequence of weapon system functions is what makes it sophisticated. John W. Parnell served as Chief Architect for Aegis Missile Defense, Naval Air Defense, and Intelligence & Instrumentation Radar System Synthesis and Analysis for Lockheed Martin at their Moorestown, NJ facility. He gained expertise in Aegis BMD Weapon System Engineering as Technical Lead on both the Navy Area Wide and the Aegis LEAP Intercept (ALI) Programs. His 35+ years- experience with Lockheed Martin includes: technical direction, system definition and design of multi-platform, multi-function weapon systems; system development of radar, missile fire control, BMC3, ECCM, & CEC. Mr. Parnell served on the MDA National Team from 2002-2007. Contact this instructor
Sign Up For ATI Courses eNewsletter

Thoughts on the Mystery in the Malaysian Airlines Flight 17 Shoot Down

Dr. Menachem Levitas teaches the following ATI courses: Radar Systems Design & Engineering course Advanced Developments in Radar course Radar 101 – Fundamentals of Radar course Radar 201 – Advances in Modern Radar course Fundamentals of Radar Technology course Principles Of Modern Radar course Principles of Naval Weapons course Here are his thoughts on the […]
Dr. Menachem Levitas teaches the following ATI courses:

Radar Systems Design & Engineering course

Advanced Developments in Radar course

Radar 101 – Fundamentals of Radar course

Radar 201 – Advances in Modern Radar course

Fundamentals of Radar Technology course

Principles Of Modern Radar course

Principles of Naval Weapons course

Here are his thoughts on the mystery in the Malaysian Airlines Flight 17 shoot down. Without being too technical, here are a number of comments on who may have fired the missile – the Ukrainian government or the rebels – which I have not seen discussed in the media: (a) The Ukrainian government knew which aircraft it was since it’s FAA equivalent, tasked with air traffic control, has been tracking it continually by radar and receiving its ID, origin, and destination information through its IFF; (b) The rebels could not know it since they do not have these resources, nor the knowhow and responsibility. (Whatever radar the rebels were using – probably just the radar that comes with the weapon system – they evidently did not have IFF communications capabilities, nor radar discrimination capabilities which is not yet an established technology). Clearly this evidence alone points to high likelihood that the aircraft was downed by the rebels. Dr. Menachem Levitas received his BS, maxima cum laude, from the University of Portland and his Ph.D. from the University of Virginia in 1975, both in physics. He has forty two years experience in science and engineering, thirty four of which in radar systems analysis, design, development, and testing for the Navy, Air Force, Marine Corps, and FAA. His experience encompasses many ground based, shipboard, and airborne radar systems. He has been technical lead on many radar efforts including Government source selection teams. He is the author of multiple radar based innovations and is a recipient of the Aegis Excellence Award for his contribution toward the AN/SPY-1 high range resolution (HRR) development. For many years, prior to his retirement in 2011, he had been the chief scientist of Technology Service Corporation / Washington. He continues to provide radar technical support under consulting agreements.


Sign Up For ATI Courses eNewsletter

From launch to kaboom, here’s the video of the missile test that launched a 1,000 smiles

Applied Technology Institute (ATI Courses) offers Aegis Ballistic Missile Defense and  is scheduled to present Aegis Combat System Engineering course on July 15-17, 2014 in Laurel, MD.  We think the news below would be of interest to our readers. On Sunday, a ground-based interceptor fired from Vandenberg Air Force Base destroyed a mock enemy warhead launched from […]
Applied Technology Institute (ATI Courses) offers Aegis Ballistic Missile Defense and  is scheduled to present Aegis Combat System Engineering course on July 15-17, 2014 in Laurel, MD.  We think the news below would be of interest to our readers. On Sunday, a ground-based interceptor fired from Vandenberg Air Force Base destroyed a mock enemy warhead launched from the Marshall Islands. View video. The EKV is supposed to detach, detect and destroy the incoming threat by flying into space and striking the target missile at velocities approaching 22,000 mph. The EKV that was tested on Sunday–the first test since 2008–is called the CE-II, and was designed to correct flaws with the earlier iteration, the CE-I.

In Sunday’s test, MDA officials said all components appear to have performed as designed.


Sign Up For ATI Courses eNewsletter

Malaysia Airlines flight MH370’s black-box pingers. Technical acoustic information that may be useful to reporters and researchers

The mystery of the missing Malaysia Airline flight MH370 is closer to being solved as authorities have revealed that they have tracked the final unexplained signal emitted by the jet, to the same point in the Indian Ocean, where the jet was believed to have crashed. Time will tell whether this is a definitive lead […]
The mystery of the missing Malaysia Airline flight MH370 is closer to being solved as authorities have revealed that they have tracked the final unexplained signal emitted by the jet, to the same point in the Indian Ocean, where the jet was believed to have crashed. Time will tell whether this is a definitive lead or a false alarm. We all hope it is the beginning to a successful answer. Calling the latest development a promising lead, retired Air Chief Marshal Angus Houston, who is leading the search, said that an Australian navy ship had detected two sets of pulse signals that sounded just like an emergency locator beacon. While the first set was heard on Saturday and lasted for two hours and 20 minutes, the Ocean Shield ship then lost contact with the “pings” but turned around and later heard further signals for 13 minutes, the Sydney Morning Herald reported. However, the ship lost contact again and has been trying to relocate the signals. Houston said that in the search so far it is probably the best information that the team has had, adding that the search team is encouraged that it is very close to where it needs to be. He added that he would want more confirmation before he could say ‘this is it’. Here is a list of the equipment that is being employed by the searchers. If you find this information useful, please mention ATICourses.if you use the materials that we have gathered. ATIcourses has a strong set of courses in underwater acoustics and oceanography that provide additional information. Some of our instructors are willing to provide more in-depth information to reporters who are actively covering the Malaysian flight MH370 investigation to provide accurate, in-depth information. Contact us at ati@ATIcourses.com More info
1. Beacon Black Box Locator Acoustic 37.5 KHz Pingers An underwater locator beacon (ULB) or underwater acoustic beacon, also known informally as a pinger, is a device fitted to aviation flight recorders such as the cockpit voice recorder (CVR) and flight data recorder (FDR). ULBs are also sometimes required to be attached directly to an aircraft fuselage. ULBs are triggered by water immersion; most emit an ultrasonic 10ms pulse once per second at 37.5 kHz ± 1kHz. Maximum detection range A 37.5 kHz (160.5 dB re 1 μPa) pinger can be detectable 1–2 kilometres (0.62–1.24 mi) from the surface in normal conditions and 4–5 kilometres (2.5–3.1 mi) in good conditions. A 37.5 kHz (180 dB re 1 μPa) transponder pinger can be detected 4–5 kilometres (2.5–3.1 mi) in normal conditions and 6–7 kilometres (3.7–4.3 mi) in good conditions. SPECIFICATION: • Operating Frequency: 37.5 kHz  ± 1 kHz (Doppler can shift the measured frequency) • Operating Depth: Surface to 20,000 feet (6100 m or 3.33 nmi) • Pulse Length: Not less than 9 milliseconds (10 millisecond nominal) • Pulse Repetition Rate: Not less than 0.9 pulse per second (1 pulse per second nominal) • Acoustic Output, Initial: 1060 dynes/cm2rms pressure at 1 meter (160.5 dB re 1 UPa/ meter) • Acoustic Output, After 30 days: 700 dynes/cm2rms pressure at 1 meter (157.0 dB re 1 UPa/meter or about 70 % of the nominal range as it degrades) • Radiation Pattern: Rated output over 80 percent of sphere, near omni-directional • Size: 1.3″ diameter x 4″ long (DK100/DK120) • 1.3″ diameter x 2.97″ long (DK130/DK140) • Weight: Less than 7 oz (including battery) (DK100/DK120) • Less than 4.9 oz (including battery)(DK130/DK140) • Power Source: Lithium Battery • Expected range: about 2 nmi slant range radius from source for 37.5 KHz Expected Transmission Loss at 37.5 Khz assuming absorption of 4.2 dB per KIM plus spreading loss of 20 log R or 60 dB + 10 log r for R> 1000 meters 37.5 KHz ———————— 0.31 mi .62 mi 1.25 mi 3.25 mi 6.2 mi 10 mi 100 mi mi Range in KM ———————— 0.5 1 2 5 10 16 160 KM TL =20 log Rkm*1000+ alpha*Rkm 56.1 64.2 74.4 95.0 122.0 151.3 776.1 TL (dB) TL =20 log Rkm*1000+ alpha*Rkm for RKM <1 Km 56.1 64.2 71.4 88.0 112.0 139.2 754.0 TL (dB) TL =60 +10*log Rkm+ alpha*Rkm for RKM.>1 2. Autonomous Underwater Vehicle – Bluefin-21 Search Vehicle   The Bluefin-21 is a highly modular autonomous underwater vehicle able to carry multiple sensors and payloads at once. It boasts a high energy capacity that enables extended operations even at the greatest depths. The Bluefin-21 has immense capability but is also flexible enough to operate from various ships of opportunity worldwide.
Depth Rating 14,763 ft (4,500 m)
Endurance 25 hours @ 3 knots with standard payload
EdgeTech 2200-M 120/410 kHz side scan sonar for search Reson 7125 400 kHz multibeam echosounder for site mapping   http://www.bluefinrobotics.com/products/bluefin-21/   3 Side Scan Sonar Option – EdgeTech 2200   The Full Spectrum chirp side scan sonar is a calibrated wide band digital FM sonar that provides quantitative and qualitative, high resolution, low-noise side scan imagery. It simultaneously transmits linearly swept FM pulses and the user may select the combination of these frequencies dual simultaneous as follows:   120/410 kHz, (most likely for Malaysia Airline Flight 370 Search) 75/410 kHz, 75/120 kHz or 300/600 kHz.   A Digital Signal Processor (DSP) in the Full Spectrum (FSDW) electronics on the AUV or ROV holds the two chirp waveforms to be transmitted.   ATI thinks the side scan frequency is likely to be 120/410 KHz which will give ranges of 250 m to 500m at 120 KHz and 130M to 200m at 400 Khz.   That will imply short detection ranges even for the 120 KHz sonar, say 250 – 500 m per side. The 410 KHz is then used at shorter range (130 – 200 m) to get a higher resolution image. The search pattern must overlap to leave no coverage holes, so the offsets in range between passes may be at most 90 percent of the assured range.   Expected Operational Ranges for the EdgeTech 2200- side scan sonar, depending on Water temperature and salinity. The absorption factor is estimated based on a model from Francois and Garrison, JASA 1982, and a depth of 50m. Absorption decrease slightly as the side scan is towed deeper. The range is to each side and the search rate is likely to be limited to 2.5 or 3.0 knots to keep the autonomous underwater vehicle (AUV) near the bottom on a long cable scope. Quoted from http://www.edgetech.com/docs/app_note_range.pdf  
  • Freq : 120Khz, Range: 250 to 500m
  • Freq: 410kHz, Range: 130 to > 200m
 
  • Freq : 75kHz, Range: 700 to 800m. 1000m is possible at extreme depths and with special pulses
  • Freq : 270kHz, Range : 150 to 300m
  • Freq : 540kHz, Range: 100 to 150m
  • Freq : 850kHz, Range: 50 to 75m
  http://www.edgetech.com/docs/2200-m_brochure_073107.pdf   4. SeaBat 7125 – Reson 7125 400 kHz multibeam echosounder   The fundamental acoustics with 400 kHz for high resolution, high density surveying which exceeds the most stringent of specifications, and 200kHz for greater range performance. The SeaBat 7125 can be installed on any platform from survey vessels to ROVs and AUVs down to 6000m water depth.   The 400 kHz multibeam echosounder is a multibeam mapping sonar. ATI would expect that it will need to be towed about 150 – 400 m off the bottom to get good signal to noise. It is likely used to map the wreckage after it has been found using the side scan sonar.   Then ATI expects some short range video to confirm and map the wreckage.   http://www.teledyne-reson.com/products/seabat-feature-packs/fp3-frdh/  
Sign Up For ATI Courses eNewsletter

US to send first element of anti-missile system in Europe to Romania

ATIcourses offered a broad range of both open enrollment and on-site courses related to radar and ballistic missile defense using the AEGIS system. Electronic Warfare- Introduction 101 Electronic Warfare- Advanced Missile System Design Modern Infrared Sensor Technology Modern Missile Analysis Multi-Target Tracking & Multi-Sensor Data Fusion Network Centric Warfare – An Introduction Principles of Naval […]
ATIcourses offered a broad range of both open enrollment and on-site courses related to radar and ballistic missile defense using the AEGIS system.
We thought the news below could be or interest to our readers. The firsts components of a US-made anti-missile system are being assembled in New Jersey ahead of their shipping to Romania in a few weeks, reports DefenseNews. In about a year, all the pieces will be reassembled to become the first operational shore-based element of the European Phased Adaptive Approach anti-missile system. According to DefenseNews, the system is the first land-based version of the Aegis combat system, a sophisticated collection of phased-array radars, fire control directors, computers and missiles. The deployment of the Aegis Ashore system in Romania to provide ballistic missile coverage for southern Europe represents the second phase of the European Phased Adaptive Approach, and will also use enhanced SM-3 Block IB interceptor missiles. A second Aegis Ashore site will be built in Poland in the third phase of the project. A ceremony for the USD 134 million Aegis Ashore installation was held in late-October 2013 at Deveselu Air Base in Romania. The local component of the shield at Deveselu will cover 175 hectares and around 200 American staff and troops will be stationed in Romania once the base becomes functional, in 2015. According to the agreement signed in 2011, Deveselu remains under Romania’s property and sovereign jurisdiction.


Sign Up For ATI Courses eNewsletter

Lockheed Martin Vs Raytheon or Who Gets Navy Air and Missile Defense Radar AMDR contract

Applied Technology Institute (ATI Courses) offers a variety of courses on Radar, Missiles & Combat Systems.  The news below would be of interest to our readers. Lockheed Martin has filed a protest over competitor Raytheon Oct. 10 award of the Navy’s Air and Missile Defense Radar (AMDR) contract , Lockheed Martin officials confirmed to USNI News on […]
Applied Technology Institute (ATI Courses) offers a variety of courses on Radar, Missiles & Combat Systems.  The news below would be of interest to our readers. Lockheed Martin has filed a protest over competitor Raytheon Oct. 10 award of the Navy’s Air and Missile Defense Radar (AMDR) contract , Lockheed Martin officials confirmed to USNI News on Wednesday. The protest — filed on Tuesday — will now begin a process that could stop work on the new radar until the Government Accountability Office (GAO) decides on the validity of the protest. The process can take up to 100 days before the GAO renders a decision. Lockheed’s move follows the $386 million award to Raytheon for an S-band AMDR and radar suite controller (RSC) planned for the Navy’s Flight III Arleigh Burke guided missile destroyers. Additional options in the contract could grow the final contract to $1.6 billion. Lockheed has supplied radars for the Navy’s guided missile destroyers throughout the Aegis program — primarily with its SPY-1 line of radars — back to the early 1980s. Given Lockheed’s longevity with the program, the protest did not come as a surprise. Naval Sea Systems Command would not comment on the protest other than saying the AMDR the award was the result of, “a full and open competition” Lockheed said the company, “submitted a technically compliant solution at a very affordable price,” read a company statement on the protest provided to USNI News on Wednesday. “We do not believe the merits of our offering were properly considered during the evaluation process.”
Sign Up For ATI Courses eNewsletter

What is the Future of Cyber Security?

Author Bio: Jack is interested in everything to do with technology and has recently purchased secure web hosting with JaguarPC so he can launch his own analysis and opinion website related to the industry. In his spare time, Jack enjoys painting. As far back as the 1990s, technology analysts were saying that wars of the […]
Author Bio: Jack is interested in everything to do with technology and has recently purchased secure web hosting with JaguarPC so he can launch his own analysis and opinion website related to the industry. In his spare time, Jack enjoys painting. As far back as the 1990s, technology analysts were saying that wars of the future wouldn’t be fought with tanks on the battlefield. Instead, war would rely on technology experts being able to hack computer systems and access and extract data for analysis by individuals in various fields. While there are still plenty of examples today of ‘traditional’ wars being fought around the world, there is no question that the level of cybercrime has increased. Increased Problems There are many reasons why cybercrime occurs. The most common appears to be when cybercriminals deliberately target a specific organisation with the objective of stealing data or accessing personal details with a view to committing fraud of some type. However, cybercrime, or a cyber-attack, might be committed by an individual or a group who mean to expose how flawed a system is. These people aren’t hacking to necessarily cause harm, but to raise awareness and say “This is what would happen if…” although critics of this approach often scald such initiatives, as they are perceived to be an open invitation to criminals. Cyber Security Priorities Because of these issues, cyber security is an increasingly large priority both for governments and for companies around the world. At the beginning of 2013, we saw high profile hacking cases involving the New York Times, while Google have also been a target and, in recent days, Adobe have admitted that details of nearly three million customers have potentially been compromised. The Chinese Government have also publicly admitted in recent weeks that they have been victims of a cyber-attack, while it is thought Western governments “legally” target so-called rogue states like Iran and North Korea to get information about potential nuclear development, among other things. When names such as these are being targeted, it is clear the size of the problem is gargantuan. The important thing with cyber security is that it is seen as a continuous priority and that it is accepted that the job is never done. As soon as an update is released or a website or database protected and made more robust, there is someone somewhere trying to break it, and history tells us that eventually they will do.   Small Business Risks In recent months, analysts have been pointing out the dangers of not having adequate cyber security to small businesses. Although a small business might not have the depth of data a large corporation or a government will hold, they could be seen as an easy target, particularly if security is seen as lax by criminals and they’re able to get all the information they need almost unnoticed. The lesson for all webmasters to heed is that, if it can happen to Google and Adobe, for example, it can happen to them. An attitude of “I have nothing to offer so I’m not at risk” is a dangerous one to have. Even a large company would struggle to maintain its reputation if it was compromised to the extent that large-scale fraud was carried out based on data gleaned from them, so how would a small one survive? The importance of cyber security is clear, what matters now is that everyone acts on it and ensures they’re in the best position not to be compromised.
Sign Up For ATI Courses eNewsletter

Large Displacement Unmanned Undersea Vehicle (LDUUV)- Experts To Report On October 16, 2013

The rise of Unmanned Aerial Vehicles (UAVs) is driving the development on unmanned technologies in other areas.  Unmanned aerial vehicles (UAVs) are becoming so commonplace that the FAA is hard-pressed to come up with regulations to control their operations. Unmanned marine vehicles, meanwhile, are becoming a hot technology topic, as military researchers push a program […]
The rise of Unmanned Aerial Vehicles (UAVs) is driving the development on unmanned technologies in other areas.  Unmanned aerial vehicles (UAVs) are becoming so commonplace that the FAA is hard-pressed to come up with regulations to control their operations. Unmanned marine vehicles, meanwhile, are becoming a hot technology topic, as military researchers push a program forward to develop a long-endurance unmanned underwater submarine. The experts are scheduled to report on this project on October 16 at Alion Science and Technology Inc. On the schedule of the briefings: LDUUV vision and missions program schedule budget technology risks and payoff technology development and transfer employment operations testing requirements Q & A session You can register by emailing Navy’s Ron Merlene at ronald.merlene@navy.mil Read more here.


Sign Up For ATI Courses eNewsletter

Navy commissions new submarine: USS Minnesota

The Navy commissioned its 10th Virginia-class submarine on Saturday in a ceremony at Naval Station Norfolk. During the formal ceremony, Pre-Commissioning Unit Minnesota officially became the USS Minnesota. The Minnesota was built in Newport News, with construction beginning in February 2008 and finishing 11 months ahead of schedule in June. Minnesota is 377 feet in […]
The Navy commissioned its 10th Virginia-class submarine on Saturday in a ceremony at Naval Station Norfolk. During the formal ceremony, Pre-Commissioning Unit Minnesota officially became the USS Minnesota. The Minnesota was built in Newport News, with construction beginning in February 2008 and finishing 11 months ahead of schedule in June. Minnesota is 377 feet in length and has a beam of 34 feet. It displaces 7,800 tons and can operate at more than 25 knots submerged. Its reactor plant is designed to last the entire planned 33-year life of the ship, which helps reduce lifecycle cost while increasing the time the ship is available to perform missions. Take a look inside!  


Sign Up For ATI Courses eNewsletter

Look! Up in the sky! 10,000 drones in US by 2020

Applied Technology Institute (ATICourses) offers Unmanned Air Vehicle Design and Unmanned Aircraft System Fundamentals courses.  The information below could be of interest to our readers. The idea of thousands of drones buzzing high above Main Street, USA may sound just a bit too odd for most people. But according to the FAA, the future is already here. […]
Applied Technology Institute (ATICourses) offers Unmanned Air Vehicle Design and Unmanned Aircraft System Fundamentals courses.  The information below could be of interest to our readers. The idea of thousands of drones buzzing high above Main Street, USA may sound just a bit too odd for most people. But according to the FAA, the future is already here. The Federal Aviation Administration (FAA) predicts that swarms of unmanned aircraft systems could be taking to the skies of America in the next five years, with up to 10,000 active commercial unmanned aircraft systems (UAS) patrolling from above by 2020. Looking at aeronautical trends up to 2032, the FAA projects rapid growth of the UAS industry. “In the United States alone, over 50 companies, universities, and government organizations are developing and producing some 155 unmanned aircraft designs,” according to the agency. In February, the FAA said it had issued 1,428 permits to domestic drone operators since 2007, a number that far exceeds previous certifications. Meanwhile, some 327 permits are listed as active. This startling rate of growth of a potentially pervasive technology has rights groups expressing concern over privacy issues and the potential for abuse of power. Also, Even when controlled by skilled, well-intentioned operators, drones can pose a hazard—that’s what the FAA is concerned about. The safety record of military drones is not reassuring. Since 2001, according to the Air Force, its three main UAVs—the Predator, Global Hawk, and Reaper—have been involved in at least 120 “mishaps,” 76 of which destroyed the drone. What is your opinion on the drones?  Please comment below.


Sign Up For ATI Courses eNewsletter

Earth’s Surface Examined By Aerial Vehicle Synthetic Aperture Radar (UAVSAR)

ATI offers Synthetic Aperture Radar- Fundamentals course on June 10-11, 2013(Chantilly, VA) and Synthetic Aperture Radar- Advanced on June 12-13, 2013 (Chantilly, VA)  course.  We thought the news below could be of interest to our visitors. NASA aircraft carrying the Uninhabited Aerial Vehicle Synthetic Aperture Radar (UAVSAR) is finishing up a month-long mission to address a broad […]
ATI offers Synthetic Aperture Radar- Fundamentals course on June 10-11, 2013(Chantilly, VA) and Synthetic Aperture Radar- Advanced on June 12-13, 2013 (Chantilly, VA)  course.  We thought the news below could be of interest to our visitors. NASA aircraft carrying the Uninhabited Aerial Vehicle Synthetic Aperture Radar (UAVSAR) is finishing up a month-long mission to address a broad range of questions over the Americas, including the dynamics of the Earth’s crust, glaciers and the carbon cycle. The flights began on March 7 from NASA’s Dryden Aircraft Operations Facility in Palmdale, CA and observed areas of the Earth from the Gulf Coast to South America, including Argentina, Bolivia, Chile, Colombia, Costa Rica, El Salvador, Ecuador, Guatemala, Honduras, Nicaragua and Peru. The UAVSAR, which was designed, built and is managed by NASA’s Jet Propulsion Laboratory (JPL) in Pasadena, CA, uses a technique called interferometry that sends microwave energy pulses from the sensor on the aircraft to the ground. The technique has the ability to detect and measure the most subtle changes in Earth’s surface, like those caused by earthquakes, volcanoes and glacier movements. The radar’s L-band microwaves can penetrate clouds and forest canopies, giving scientists a better look at cloud-covered tropical environments, and allowing for the mapping of flooded ecosystems. Besides conducting iresearch over South America, NASA has directed the instrument at sites in the US as well. UAVSAR has been monitoring seasonal land subsidence and uplift in groundwater basins in Arizona’s Cochise County for the Arizona Department of Water Resources, and has conducted similar studies in New Orleans and the Mississippi Delta. These studies are aimed at offering scientists a better understanding of what causes Gulf Coast subsidence and allowing for better predictions of future subsidence rates. The data will help agencies better manage the protection of infrastructure, including the levee system in the New Orleans region.
Sign Up For ATI Courses eNewsletter

No More Blue Angels Zooming Through Annapolis Skies

Yes, it appears that sequester is unavoidable.  According to the Department of the Navy press release we won’t be marveling at the flight of Blue Angels above our heads.  If you are one of those who seen them fly, consider yourself lucky.  It won’t be happening for a while. Among other things, he release says the […]
Sequester results: No More Appearances by Blue Anges
Yes, it appears that sequester is unavoidable.  According to the Department of the Navy press release we won’t be marveling at the flight of Blue Angels above our heads.  If you are one of those who seen them fly, consider yourself lucky.  It won’t be happening for a while. Among other things, he release says the Navy plans to shut down Carrier Air Wing Two in April. The air wing is based California, but one of the squadrons VFA-34  is based at Oceana. The Navy also intends to cancel four appearances by the Blue Angels. The Navy will cancel or defer the deployment of up to six ships throughout the month April. The Navy will also defer USNS Comfort’s humanitarian deployment to Central and South America. The USNS Comfort just came into Naval Station Norfolk on Friday. The Navy press release states these actions are being taken to “preserve support for those forces stationed overseas and currently forward-deployed. “We made these choices careful while trying to preserve the ability to reverse or quickly restore negative effects if and when funding is restored.” Find out more http://navylive.dodlive.mil/2013/03/02/department-of-the-navy-response-to-sequestration/
Sign Up For ATI Courses eNewsletter

USS Freedom Still Slated To Deploy Next Month Despite Sequestration

ATI offers many courses or Radar, Defense & Combat Systems.  We think the news below would be of interest to our readers. Despite the looming threat of sequestration, the USS Freedom is still scheduled to deploy from San Diego in March, according to a recent memo to the Chief of Naval Operations. In that memo, Vice […]
ATI offers many courses or Radar, Defense & Combat Systems.  We think the news below would be of interest to our readers. Despite the looming threat of sequestration, the USS Freedom is still scheduled to deploy from San Diego in March, according to a recent memo to the Chief of Naval Operations. In that memo, Vice Adm. Richard W. Hunt outlined specific achievements of the Littoral Combat Ship (LCS) Council, including the scheduled deployment of the Freedom- the Navy’sfirst Littoral Combat Ship. On Thursday, USS Freedom departed San Diego to conduct sea trials. The littoral combat ship (LCS) is a class of relatively small surface vessels intended for operations in the littoral zone (close to shore) by the United States Navy. It was “envisioned to be a networked, agile, stealthy surface combatant capable of defeating anti-access and asymmetric threats in the littorals.” The Freedom class and the Independence class are the first two variants of LCS by the U.S. Navy. LCS designs are slightly smaller than the U.S. Navy’s guided missile frigates, and have been likened to corvettes of other navies. However, the LCS designs add the capabilities of a small assault transport with a flight deck and hangar large enough to base two SH-60 Seahawkhelicopters, the capability to recover and launch small boats from a stern ramp, and enough cargo volume and payload to deliver a small assault force with armoured fighting vehicles to a roll-on/roll-off port facility. The standard armament for the LCS are Mk 110 57 mm guns and Rolling Airframe Missiles. It will also be able to launch autonomous air, surface, and underwatervehicles. Although the LCS designs offer less air defense and surface-to-surface capabilities than comparable destroyers, the LCS concept emphasizes speed, flexible mission module space and a shallow draft.
Sign Up For ATI Courses eNewsletter

The lives of Michigan residents are about to improve: nearly $1 billion in defense contracts granted!

Michigan could expect an economic impact of nearly $1 billion from new defense contracts awarded to eight companies in the closing days of the federal government’s budget year. $395.5 million for General Dynamics Land Systems for research and development and testing on a next-generation version of its signature Abrams main battle tank. The U.S. Department […]
Michigan could expect an economic impact of nearly $1 billion from new defense contracts awarded to eight companies in the closing days of the federal government’s budget year. $395.5 million for General Dynamics Land Systems for research and development and testing on a next-generation version of its signature Abrams main battle tank. The U.S. Department of Defense often sees an acceleration of contract awards shortly before the government’s fiscal year ends Sept. 30, and Army Contracting Command Executive Director recently said that the command could allocate nearly $1 billion worth of contracts in its last few weeks for a total of $10 billion in fiscal 2012. $55.9 million for BAE Systems Inc. for engineering design, logistics, and testing and evaluation to update the Army’s current fleets of Bradley Fighting Vehicles. General Dynamics has also teamed up with Raytheon Co. and Bethesda, Md.-based Lockheed Martin Corp. on a separate $439.7 million pre-production contract for Ground Combat Vehicle. Science Applications International Corp. plans to source part of its work on a one-year, $82.1 million contract in Warren for logistics support on the Mine Resistant Ambush Protected vehicle family. The company was the sole bidder on the logistics contract that runs through December 2013 and will provide services in Warren, Afghanistan and Kuwait. Chicago-based Boeing Co. also expects to source 84 percent of its work in Grand Rapids on a two-year, $15.4 million delivery order from the U.S. Naval Air Systems Command in Maryland for engineering to replace and integrate hardware and software components for the P-8A Multi-Mission Maritime Aircraft, also called the Poseidon, by September 2014. Boeing expects to source the remaining 16 percent of that contract work in Seattle and to source a small portion of a $74.1 million contract in Ann Arbor for a joint venture company to produce seven V-22 Block C Containerized Flight Training Devices for the Naval Air Warfare Center Training Systems Division. Elsewhere in Michigan, Rockford-based Wolverine World Wide Inc. will divide a five-year, $48.7 million contract award from the Army Contracting Command in Natick, Mass., with Illinois-based Belleville Shoe Manufacturing Co. The two companies won the award out of three bids to provide Army mountain combat boots through September 2017, but the amount of work for each company will be determined by future procurement task orders. Armor Express Inc., a body-armor products maker in Antrim County’s Central Lake, also received a three-year, fixed-price, multiple-award contract from the Army’s Aberdeen Proving Ground in Maryland with a ceiling value of $24.6 million to procure up to a maximum 142,857 Concealable Body Armor Vests by September 2015. Finally, Navistar Defense LLC, a business unit of Illinois-based Navistar International Corp. with defense vehicle engineering and program management offices in Madison Heights, received a two-year, $138.2 million, fixed-price modification to a previous contract from Tacom to provide upgrade kits to improve the Army’s fleet of MaxxPro MRAP vehicles previously produced by Navistar.
Sign Up For ATI Courses eNewsletter

Do You Know the Key Differences between Gimballing and Strapdown Intertial Navigation Systems?

Video Clip: Click to Watch Maybe You Should Find Your Way to ATI’s Strapdown and Integrated Navigation Systems Course In this highly structured 4-day short course – specifically tailored to the needs of busy engineers, scientists, managers, and aerospace professionals – Thomas S. Logsdon will provide you with new insights into the modern guidance, navigation, and […]
Strapdown Algorithm Design for Strapdown Inertial Navigation Systems
Video Clip: Click to Watch
Maybe You Should Find Your Way to ATI’s Strapdown and Integrated Navigation Systems Course
In this highly structured 4-day short course – specifically tailored to the needs of busy engineers, scientists, managers, and aerospace professionals – Thomas S. Logsdon will provide you with new insights into the modern guidance, navigation, and control techniques now being perfected at key research centers around the globe
The various topics are illustrated with powerful analogies, full-color sketches, block diagrams, simple one-page derivations highlighting their salient features, and numerical examples that employ inputs from today’s battlefield rockets, orbiting satellites, and deep-space missions. These lessons are carefully laid out to help you design and implement practical performance-optimal missions and test procedures
Why not take a short course? ATI short courses are less than a week long and are designed to help you keep your professional knowledge up-to-date. Our courses provide a practical overview of space and defense technologies which provide a strong foundation for an understanding the issues that must be confronted in the use, regulation and development of complex systems. What You Will Learn • What are the key differences between gimballing and strapdown Intertial Navigation Systems? • How are transfer alignment operations being carried out on modern battlefields? • How sensitive are today’s solid state accelerometers and how are they currently being designed? • What is a covariance matrix and how can it be used in evaluating the performance capabilities of Integrated GPS/INS Navigation Systems? • How do the Paveway IV smart bombs differ from their predecessors? • What are their key performance capabilities in practical battlefield situations? • What is the deep space network and how does it handle its demanding missions? Course Outline, Samplers, and Notes Our short courses are designed for individuals involved in planning, designing, building, launching, and operating space and defense systems. Determine for yourself the value of this course before you sign up. Click here for the sample Course video on YouTube You will receive a full set of detailed notes at the beginning of the class for future reference and you can add notes and more detail based on the in-class interaction. After attending the course you will also receive a certificate of completion. Please visit our website for more valuable information. About the Applied Techinolgy Institute (ATI) Since 1984, the Applied Technology Institute (ATI) has provided leading-edge public courses and onsite technical training to DoD and NASA personnel, as well as contractors. Whether you are a busy engineer, a technical expert or a project manager, you can enhance your understanding of complex systems in a short time. You will become aware of the basic vocabulary essential to interact meaningfully with your colleagues. If you or your team is in need of more technical training, then boost your career with the knowledge needed to provide better, faster, and cheaper solutions for sophisticated DoD and NASA systems. Our mission here at ATI is to provide expert training and the highest quality professional development in space, communications, defense, sonar, radar, and signal processing. We are not a one-size-fits-all educational facility. Our short classes include both introductory and advanced courses. About the Instructors ATI’s instructors are world-class experts who are the best in the business. They are carefully selected for their ability to clearly explain advanced technology. Thomas S. Logsdon has accumulated more than 30 years experience with the Naval Ordinance Laboratory, McDonnell Douglas, Lockheed Martin, Boeing Aerospace, and Rockwell International. His research projects and consulting assignments have included the Tartar and Talos shipboard missiles, Project Skylab, and various deep space interplanetary probes and missions. Mr. Logsdon has also worked extensively on the Navstar GPS, including military applications, constellation design and coverage studies. He has taught and lectured in 31 different countries on six continents and he has written and published 1.7 million words, including 29 technical books. His textbooks include Striking It Rich in Space, Understanding the Navstar, Mobile Communication Satellites, and Orbital Mechanics: Theory and Applications. Dr. Walter R. Dyer is a graduate of UCLA, with a Ph.D. degree in Control Systems Engineering and Applied Mathematics. He has over thirty years of industry, government and academic experience in the analysis and design of tactical and strategic missiles. His experience includes Standard Missile, Stinger, AMRAAM, HARM, MX, Small ICBM, and ballistic missile defense. He is currently a Senior Staff Member at the Johns Hopkins University Applied Physics Laboratory and was formerly the Chief Technologist at the Missile Defense Agency in Washington, DC. He has authored numerous industry and government reports and published prominent papers on missile technology. He has also taught university courses in engineering at both the graduate and undergraduate levels. Dates and Locations For the dates and locations of all of these short courses, please see below: Sep 24-27, 2012 Columbia, MD Jan 21-24, 2013 Cape Canaveral, FL
Sincerely, The ATI Courses Team P.S Call today for registration at 410-956-8805 or 888-501-2100 or access our website at www.ATIcourses.com. For general questions please email us at ATI@ATIcourses.com
 


Sign Up For ATI Courses eNewsletter

Raytheon to upgrade US Navy’s 20-year-old analog air traffic control radars with modern, digital technology

The U.S. Navy has purchased two more radar systems from Raytheon Company RTN as part of a continuing effort to replace outdated analog air traffic control systems with digital technology. The new radars will be installed at military bases in New River, N.C., and Quantico, Va. The Digital Airport Surveillance Radar (DASR) ASR-11 is the […]
The U.S. Navy has purchased two more radar systems from Raytheon Company RTN as part of a continuing effort to replace outdated analog air traffic control systems with digital technology. The new radars will be installed at military bases in New River, N.C., and Quantico, Va. The Digital Airport Surveillance Radar (DASR) ASR-11 is the first fully digital, solid-state radar to be implemented in the U.S. National Airspace System (NAS). The radars have been deployed to more than 130 sites throughout the world, and will eventually be in more than 150 sites total. The ASR-11 provides primary surveillance radar coverage up to 60 miles and secondary surveillance radar coverage up to 120 miles. It provides the air traffic controller with improved aircraft detection, lower support costs and better weather display. The primary radar is being manufactured in Waterloo, Canada, while the secondary radar will be made in the United States and United Kingdom. “This radar technology is raising the bar even higher on safety,” said Mike Prout, vice president of Security and Transportation Systems for Raytheon’s Network Centric Systems business. “Our radars will help controllers maintain safety in an increasingly busy airspace.” Analog radars are steadily being replaced as part of the NAS Modernization Program, which involves upgrading legacy air traffic control systems with modern digital technology to enable the Navy to keep pace with changing Federal Aviation Administration guidelines and standards for terminal radar approach controls. The digital radar is also an integral part of Raytheon’s recently introduced Mobile Air Traffic Control system, which provides critical air traffic services when existing infrastructure has been damaged or does not exist.


Sign Up For ATI Courses eNewsletter

New Northrop radar passes key tests

Northrop Grumman’s Air and Missile Defense Radar program for the U.S. Navy has passed two technology development program reviews conducted by the company. The first review was the System Functional Review. The second was a Test Readiness Review. “These reviews demonstrate that our AMDR is on course to meet the Navy’s anti-air warfare and ballistic […]
Northrop Grumman’s Air and Missile Defense Radar program for the U.S. Navy has passed two technology development program reviews conducted by the company. The first review was the System Functional Review. The second was a Test Readiness Review. “These reviews demonstrate that our AMDR is on course to meet the Navy’s anti-air warfare and ballistic missile defense needs for decades to come,” said Dave Perry, vice president and general manager of Northrop Grumman’s Naval and Marine Systems Division. “Northrop Grumman has the experience and skill to deliver the lowest-risk AMDR solution with the lowest total cost of ownership.” Northrop said that in the SFR, digital beam forming and advanced tactical software modes were demonstrated using the system’s pathfinder radar with a prototype radar suite controller. The pathfinder system was developed by Northrop for early testing of critical AMDR hardware and software technologies. “The successful reviews showed that the AMDR design is properly defined to meet the simultaneous performance requirements of anti-air warfare and ballistic missile defense,” Perry said. “The manufacturing schedule is on track and integration and test are ahead of schedule.” AMDR is being developed to provide enhanced ability to detect, track and engage ballistic missiles “in high clutter environments.”


Sign Up For ATI Courses eNewsletter