Iran Strikes, Israel Defends, US Navy Intervenes

Iran fired a salvo of ballistic missiles at Israel on Tuesday in retaliation for Israel’s campaign against Tehran’s Hezbollah allies in Lebanon. The Iranian ballistic missiles were engaged by Israel’s layered missile defense system and the US Navy. The US Navy released a statement that they fired interceptor missiles from USS Bulkeley against Iranian missiles … Read more

Leveraging Cell Phones for a Distributed Electronic Warfare Defense

  The widespread proliferation of cell phones presents a unique opportunity for a distributed, inexpensive, and adaptable counter to sophisticated electronic warfare (EW) tactics. These devices, equipped with specialized software, can form a dense network capable of detecting, identifying, and potentially mitigating various EW threats. The sheer number of cell phones in circulation provides a … Read more

Wild Hornet’s Drone Mounted Weapon

Ukraine’s Wild Hornets drone, armed with an AK assault rifle, has been deployed in combat for the first time following earlier testing. This was revealed in a footage released by the manufacturer Wild Hornets. While it’s unlikely to become a widespread system, it could be useful for clearing the battlefield of dismounted infantry after failed … Read more

Redefining Warfare: Tiltrotors as Force Multipliers

As NATO member nations contemplate new military helicopter designs, they are carefully examining Russia’s ongoing conflict in Ukraine for potential design and tactical advantages. Several NATO countries are in the preliminary stages of developing a versatile new helicopter to be operational by 2035. This planned Next Generation Rotorcraft Capability (NGRC) is intended to support allies … Read more

Counter UAS: The Fight Against Drone Threats

The increasing prevalence of drones in warfare is evident. For instance, Ukraine’s defense against Russian forces is hampered by the loss of thousands of drones monthly. The widespread availability of affordable commercial drones has exacerbated vulnerabilities in the traditional security perimeters of civilian and military assets, critical infrastructure, and public gatherings. This has compelled the … Read more