With 13 participating companies and organizations, Israel will make an impressive presence in DEFEA Exhibition, in Athens, Greece. It should be noted that the close strategic relationship developed between Greece and Israel, now also expands in the field of defense industry.

DEFEA Exhibition

SIBAT, the International Defense Cooperation Directorate of the Israel MOD, will co-ordinate the country’s participation in a National Pavilion. SIBAT is positioned within the IMOD, while having a close, ongoing relationship with Israel's defense industry. This ensures that SIBAT maintains in-depth and updated knowledge of the defense world’s concepts, as well as a clear understanding of the Israel Defense Forces' (IDF) operational needs. SIBAT's facilitates international cooperation through various services:

  • Generating Government–to-Government agreements.
  • Initiating visits of official foreign delegations.
  • Identifying cooperation opportunities and joint ventures with Israel defense industries.
  • Locating technological solutions for specific requirements.
  • Marketing and sales of IDF inventory.
  • Organizing the Israel national pavilions at international exhibitions.

Israeli companies participating in DEFEA include:

  • Aeronautics Group - Aeronautics Group, a globally renowned developer and manufacturer of defense solutions, based on unmanned-aerial systems and advanced ISTAR systems. The group provides integrated turnkey solutions, based on unmanned solutions payloads and communications for defense, HLS and civil applications. Aeronautics broad product portfolio offers combat proven solutions for intelligence, surveillance and reconnaissance (ISR) missions, with demonstrated excellent performance and operability. Sustained by continuous research and development, these systems are on the outcome of three decades of technological and operational experience aeronautics group offers a one-stop shop, cost-effective solutions, for defense, HLS and civil missions.
  • Aitech Systems Ltd. - As a pioneer in the field of computing technologies, Aitech provides reliable, rugged COTS boards and embedded systems on industry-standard, open architectures VMEbus, VPX, CompactPCI and high-speed serial fabric-based computers and subsystems for use in defense, aerospace and space flight applications. Their products address the design challenges that system engineers face, by balancing the need for more computing performance and tighter system integration, with the appropriate risk mitigation and reliable system operation requirements. They offer cost-effective COTS boards and systems that meet the industry’s ever-evolving requirements, by offering design flexibility, optimal cost-to-performance ratios and continued technological advancements.
  • Astronautics C.A. Ltd. - Astronautics C.A. Ltd. Israel, established in 1971, is a hi-tech defense systems company, working directly with end customers, integrators and OEMs. Their solutions for aviation include integrated avionics systems, civil-certified glass cockpit avionics, multi-function cockpit displays, avionics & mission computers, engine data systems, air data systems, navigation solutions for GPS denied environment, and embedded-cyber protected systems. Their systems are used onboard the most advanced fighters, transports, and helicopters. Their solutions for land systems include automated tactical artillery fire control systems for various artillery platforms, artillery battle management systems, combat vehicle computers, displays, & controllers. Their solutions for naval platforms provide highly accurate onboard navigation systems with advanced real-time data distribution solutions, including predictive algorithms that improve overall system accuracy, prevent jamming and spoofing, and provide cyber-attacks protection. In addition, we supply Operator control stations with WECDIS / ECDIS applications. Their systems are used onboard the most advanced surface vessels and submarines.
  • Bet Shemesh Engines Ltd. (BSEL) - Bet Shemesh Engines Ltd (BSEL) has been Israel’s leading jet engines house since 1968, manufacturing & casting jet engine parts, providing MRO services, as well as delivering small jet engines self - developed for UAV’S. The maintenance repair & overhaul (MRO) division of BSEL, being OEM, FAA & EASA certified, provides overhaul, repair & engineering services to complete P & W F100 and PT6A engines, and Rolls Royce (Allison) M250 engines; as well as to modules, components and accessories.
  • Elbit Systems Ltd. - Elbit Systems Ltd is an international high technology company engaged in a wide range of defense, homeland security and commercial programs throughout the world. The company, which includes Elbit Systems and its subsidiaries, operates in the areas of aerospace, land, and naval systems, command, control, communications, computers, intelligence surveillance and reconnaissance (‘C4ISR’), unmanned aircraft systems, advanced electro-optics, electro-optic space systems, EW suites, signal intelligence systems, data links and communications systems, radios and cyber-based systems and munitions. The company also focuses on the upgrading of existing platforms, developing new technologies for defense, homeland security and commercial applications and providing a range of support services, including training and simulation systems.
  • EMTAN KARMIEL LTD. - EMTAN, is an Israeli manufacturer of small arms, guns and weapons with over 40 years of experience and knowledge. EMTAN employs over 120 skilled personals in a sophisticated computerize facilities that ensure optimized manufacturing and quality assurance all this in order to deliver the end-user a reliable robust weapon within budget. They manufacture the MZ Rifle range, which includes MZ-4 Fully Automatic rifle in caliber 5.56 NATO, MZ-4 P Piston operated Fully Automatic rifle in caliber 5.56 NATO, MZ-47 Fully Automatic rifle in caliber 7.62X39 to suite AK47 magazine and accessories, MZ-10/25 S Semi-Automatic rifle in caliber 7.62 NATO for snipers, MZ-300 Fully Automatic rifle in caliber 300 Blackout for operations with silencers, MZ-9 Fully Automatic sub machine gun in Caliber 9mm NATO, MZ-15 Sami Automatic DMR rifle in caliber 5.56 NATO and RAMON Pistol 9mm.
  • Nir-Or Israel Ltd. - Nir-Or Israel Ltd. designs develops, manufactures, and integrates innovative electronic systems and products for a vast range of military applications at land, air, and sea. Developing ideas into prototypes and prototypes into fielded, operational products, the company's wide-ranging capabilities cover all aspects of electronic-based military and para-military solutions. Nir-Or line of solutions includes Multi-dimensional Situational Awareness, AI-powered, Video System (Video Servers, Ruggedized Displays and Camera Clusters) for APC and designated military platforms. Nir-Or is also an important defense solutions provider of the IDF, providing its video systems to the new Namer APC.
  • Israel Aerospace Industries (IAI) - In a fast-evolving world, where adversaries constantly challenge national defense, you need experienced and skillful allies to rely on. A trusted partner, courageous and innovative to deliver the capabilities you need and afford. That's IAI – Where Courage Meets Technology. A renowned company in defense, aerospace, and commercial markets, IAI leverages state-of-the-art technology and decades of combat-proven experience, delivering solutions for national defense and security challenges. Delivering large turnkey projects, IAI acts as a prime contractor, subcontractor, and team members in dozens of large programs for the aerospace, land, sea, and cyber domains and multi-domain applications. They offer a vast portfolio producing air and missile defense, unmanned aerial systems (UAS), ground robotics, precision-guided weapons, and loitering munitions. They deliver special-mission aircraft, modernize military aircraft and helicopters, and convert passenger jets into cargo aircraft. Their technology expertise features systems and solutions from reconnaissance satellites and radars, to all aspects of command, control, and communications, computing and cyber, intelligence, surveillance, and reconnaissance systems.
  • Israel Weapon Industries Ltd. (IWI) - IWI has been a globally renowned company in the production, marketing, design and development of unrivaled weapons for over 85 years. Their weapon systems include the new CARMEL & ARAD AR, X95 (AR & SMG), TAVOR & GALIL ACE AR, NEGEV LMG, GALIL SNIPER, DAN Bolt Action Sniper Rifle, UZI PRO SMG and the JERICHO & MASADA pistols. IWI also provides Riot-Control solutions, including offensive and defensive products, top-level methodology, tailored training and integration of cutting-edge technologies. IWI customers are: Governmental, Military and Police Entities, as well as Law Enforcement Agencies around the world, along with commercial markets.
  • JV Plasan SK (Plasan) - Founded in 1985, JV Plasan SK is a global company in offering safer vehicle environments and survivability solutions for defense and security forces. Their solutions offer high-end protection and mission readiness for defense and security vehicles, while reducing operational costs. With extensive battlefield experience and expertise in automotive systems, and materials, Plasan deliver solutions to support even the most complex vehicle and team missions. Plasan offers a variety of vehicle protection solutions, including advanced kitted armor hulls, the Guarder and SandCat armored tactical vehicles, and a wide range of survivability and personal protection solutions. Plasan, a recognized innovator and international provider of state-of-the-art lightweight ballistic protection and survivability solutions for the war fighter, the peacekeeper and law enforcement personnel alike, provides customized survivability suites that offer a unique optimization between protection, mission adaptability, payload and cost. With its many design wins, Plasan has emerged as a global company in providing the right solution at the right price. With three decades of experience and over 32,000 vehicles across the globe fitted with our protection solutions, Plasan has a unique understanding of the challenges found on the modern battlefield. They translate operational needs into high-end protection solutions. With a comprehensive and creative approach to vehicle protection and armored vehicles, and the ability to provide customized solutions for a wide variety of missions, Plasan’s expertise in engineering, manufacturing, and system integration has been a major differentiator for their customers and partners. The company offers comprehensive solutions for the optimal balance of performance, survivability and safety. Plasan helps create a safer, mission-ready vehicle environment for defense and homeland security forces.
  • RAFAEL Advanced Defense Systems Ltd. - RAFAEL Advanced Defense Systems Ltd. is synonymous with Dynamic Defense, Daring Innovation, and Technological Ingenuity. For over 70 years, the company has pioneered advances in defense, cyber and security solutions for air, land, sea, and space. Their innovations are based on extensive operational experience and understanding of evolving combat requirements. They enable the rapid development of effective solutions for complex battlespace challenges. Always ahead, they ensure an ongoing advantage for their worldwide client base. They are dedicated to continuously enhancing their customer service, as well as expanding their global industrial cooperation program.
  • Smart Shooter Ltd. - Smart shooter develops intelligent fire control systems for small arms that significantly increase weapon accuracy and lethality, when engaging static and moving targets, on the ground and in the air, day and night. With proven ‘one shot - one hit’ precision, their SMASH product line empowers defense and security forces, by maximizing rifle effectiveness against enemy targets, while minimizing friendly casualties and collateral damage. Based on artificial intelligence (AI), computer vision and machine learning technologies, SMASH is also designed to interconnect with other operational resources to form a micro-tactical network that delivers real-time situational awareness.
Share with LinkedIn Share with Twitter Share with Facebook Share with What's App Share with Facebook
Download PDF version Download PDF version

In case you missed it

What You Need To Know About Open Source Intelligence (OSINT) For Emergency Preparedness?
What You Need To Know About Open Source Intelligence (OSINT) For Emergency Preparedness?

Have you ever stopped to consider the volume of new data created daily on social media? It’s staggering. Take Twitter, for instance. Approximately 500 million tweets are published every day, adding up to more than 200 billion posts per year. On Facebook, users upload an additional 350 million photos per day, and on YouTube, nearly 720,000 hours of new video content is added every 24 hours. While this overwhelming volume of information may be of no concern to your average social media user posting updates to keep up with family and friends, it’s of particular interest to corporate security and safety professionals who are increasingly using it to monitor current events and detect potential risks around their people and locations—all in real-time. Meet the fast-paced and oft-confusing world of open-source intelligence (OSINT). What is Open Source Intelligence (OSINT)? The U.S. Department of State defines OSINT as, “intelligence that is produced from publicly available information and is collected, exploited, and disseminated promptly to an appropriate audience to address a specific intelligence requirement.” The concept of monitoring and leveraging publicly available information sources for intelligence purposes dates back to the 1930s. The British Broadcast Corporation (BBC) was approached by the British government and asked to develop a new service that would capture and analyze print journalism from around the world. Monitoring and identifying potential threats Originally named the “Digest of Foreign Broadcast, the service (later renamed BBC Monitoring which still exists today) captured and analyzed nearly 1.25 million broadcast words every day to help British intelligence officials keep tabs on conversations taking place abroad and what foreign governments were saying to their constituents. OSINT encompasses any publicly accessible information that can be used to monitor and identify potential threats Today, OSINT broadly encompasses any publicly accessible information that can be used to monitor and identify potential threats and/or relevant events with the potential to impact safety or business operations. The potential of OSINT data is extraordinary. Not only can it enable security and safety teams to quickly identify pertinent information that may pose a material risk to their business or people, but it can also be captured by anyone with the right set of tools and training. OSINT for cybersecurity and physical threat detection Whether it be a significant weather event, supply chain disruptions, or a world health crisis few saw coming, the threats facing organizations continue to increase in size and scale. Luckily, OSINT has been able to accelerate how organizations detect, validate, and respond to these threats, and it has proved invaluable in reducing risk and informing decision-making – especially during emergencies. OSINT is typically shared in real-time, so once a situation is reported, security teams can then work on verifying critical details such as the location or time an incident occurred or provide the most up-to-date information about rapidly developing events on the ground. They can then continue to monitor online chatter about the crisis, increasing their situational awareness and speeding up their incident response times. OSINT applications OSINT can help detect when sensitive company information may have been accessed by hackers  Severe weather offers a good example of OSINT in action. Say an organization is located in the Great Plains. They could use OSINT from sources like the National Weather Service or National Oceanic and Atmospheric Administration (NOAA) to initiate emergency communications to employees about tornado warnings, high winds, or other dangerous conditions as they are reported. Another common use case for OSINT involves data breaches and cyber-attacks. OSINT can help detect when sensitive company information may have been accessed by hackers by monitoring dark web messaging boards and forums. In 2019, T-Cellphone suffered a data breach that affected more than a million customers, but it was able to quickly alert affected users after finding their personal data online. OSINT is a well-established field with countless applications. Unfortunately, in an ever-changing digital world, it’s not always enough to help organizations weather a crisis. Why OSINT alone isn’t enough? One of the core challenges with leveraging OSINT data, especially social media intelligence (SOCMINT), is that much of it is unstructured and spread across many disparate sources, making it difficult to sort through, manage, and organize. Consider the social media statistics above. Assuming a business wanted to monitor all conversations on Twitter to ensure all relevant information was captured, it would need to both capture and analyze 500 million individual posts every day. Assuming a trained analyst spent just three seconds analyzing each post, that would amount to 1.5 billion seconds of labor—equivalent to 416,666 hours—just to keep pace. While technology and filters can greatly reduce the burden and help organizations narrow the scope of their analysis, it’s easy to see how quickly human capital constraints can limit the utility of OSINT data—even for the largest companies. Challenges with OSINT OSINT data collection includes both passive and active techniques, each requiring a different level of effort and skill Additionally, collecting OSINT data is time-consuming and resource-intensive. Making sense of it remains a highly specialized skill set requiring years of training. In an emergency where every second count, the time required to sift through copious amounts of information takes far longer than the time in which an organization must take meaningful action to alter the outcome. Compounding the issue, OSINT data is noisy and difficult to filter. Even trained analysts find the need to constantly monitor, search, and filter voluminous troves of unstructured data tedious. Artificial intelligence and machine learning have helped weed through some of this data faster, but for organizations with multiple locations tasked with monitoring hundreds or thousands of employees, it’s still a challenging task. Adding to the complexity, collecting OSINT data isn’t easy. OSINT data collection includes both passive and active techniques, each requiring a different level of effort and skill. Passive vs Active OSINT Passive OSINT is typically anonymous and meant to avoid drawing attention to the person requesting the information. Scrolling user posts on public social media profiles is a good example of passive OSINT. Active OSINT refers to information proactively sought out, but it often requires a more purposeful effort to retrieve it. That may mean specific login details are needed to access a website where information is stored. Lastly, unverified OSINT data can’t always be trusted. Analysts often encounter false positives or fake reports, which not only take time to confirm accuracy, but if they act on misinformation, the result could be damage to their organization’s reputation or worse. So, how can companies take advantage of it without staffing an army of analysts or creating operational headaches? A new path for OSINT Organisations can leverage the benefits of OSINT to improve situational awareness and aid decision-making Fortunately, organizations can leverage the benefits of OSINT to improve situational awareness and aid decision-making without hiring a dedicated team of analysts to comb through the data. By combining OSINT data with third-party threat intelligence solutions, organizations can get a cleaner, more actionable view of what’s happening in the world. Threat intelligence solutions not only offer speed by monitoring for only the most relevant events 24/7/365, but they also offer more comprehensive coverage of a wide range of threat types. What’s more, the data is often verified and married with location intelligence to help organizations better understand if, how, and to what extent each threat poses a risk to their people, facilities, and assets. In a world with a never-ending stream of information available, learning how to parse and interpret it becomes all the more important. OSINT is a necessary piece to any organization’s threat intelligence and monitoring system, but it can’t be the only solution. Paired with external threat intelligence tools, OSINT can help reduce risk and keep employees safe during emergencies and critical events.

Baltimore Is The Latest U.S. City To Target Facial Recognition Technology
Baltimore Is The Latest U.S. City To Target Facial Recognition Technology

The city of Baltimore has banned the use of facial recognition systems by residents, businesses and the city government (except for police). The criminalization in a major U.S. city of an important emerging technology in the physical security industry is an extreme example of the continuing backlash against facial recognition throughout the United States. Facial recognition technology ban Several localities – from Portland, Oregon, to San Francisco, from Oakland, California, to Boston – have moved to limit use of the technology, and privacy groups have even proposed a national moratorium on use of facial recognition. The physical security industry, led by the Security Industry Association (SIA), vigorously opposed the ban in Baltimore, urging a measured approach and ‘more rational policymaking’ that preserve the technology’s value while managing any privacy or other concerns. Physical security industry opposes ban In such cases, it is local businesses and residents who stand to lose the most" “Unfortunately, an outright ban on facial recognition continues a distressing pattern in which the clear value of this technology is ignored,” said SIA’s Chief Executive Officer (CEO) Don Erickson, adding “In such cases, it is local businesses and residents who stand to lose the most.” At the national level, a letter to US President Biden from the U.S. Chamber of Commerce Coalition asserts the need for a national dialog over the appropriate use of facial recognition technology and expresses concern about ‘a blanket moratorium on federal government use and procurement of the technology’. (The coalition includes Security Industry Association (SIA) and other industry groups.) The negativity comes at a peak moment for facial recognition and other biometric technologies, which saw an increase of interest for a variety of public and business applications, during the COVID-19 pandemic’s prioritization to improve public health hygiene and to promote ‘contactless’ technologies. Prohibition on banks, retailers and online sellers The ordinance in Baltimore prohibits banks from using facial recognition to enhance consumer security in financial transactions. It prevents retailers from accelerating checkout lines with contactless payment and prohibits remote online identity document verification, which is needed by online sellers or gig economy workers, according to the Security Industry Association (SIA). At a human level, SIA points out that the prohibition of facial recognition undermines the use of customized accessibility tools for disabled persons, including those suffering with blindness, memory loss or prosopagnosia (face blindness). Ban out of line with current state of facial recognition Addressing the Baltimore prohibition, the Information Technology and Innovation Foundation reacted to the measure as ‘shockingly out of line with the current state of facial recognition technology and its growing adoption in many sectors of the economy’. Before Baltimore’s decision to target facial recognition, Portland, Oregon, had perhaps the strictest ban, prohibiting city government agencies and private businesses from using the technology on the city’s grounds. San Francisco was the first U.S. city to ban the technology, with Boston, Oakland; Cambridge, Massachusetts; and Berkeley, California, among others, following suit. Police and federal units can use biometrics Unlike other bans, the Baltimore moratorium does not apply to police uses Unlike other bans, the Baltimore moratorium does not apply to police uses, but targets private uses of the technology. It also includes a one-year ‘sunset’ clause that requires city council approval for an extension. The measure carves out an exemption for use of biometrics in access control systems. However, violations of the measure are punishable by 12 months in jail. The law also establishes a task force to evaluate the cost and effectiveness of surveillance tools. Transparency in public sector use of facial recognition Currently, the state of Maryland controls the Baltimore Police Department, so the city council does not have authority to ban police use of facial recognition, which has been a human rights concern driving the bans in other jurisdictions. A measure to return local control of police to the city could pass before the year lapses. SIA advocates transparency in public-sector applications of facial recognition in identity verification, security and law enforcement investigative applications. SIA’s CEO, Don Erickson stated, “As public sector uses are more likely to be part of processes with consequential outcomes, it is especially important for transparency and sound policies to accompany government applications.”

What Are The Security Challenges Of Protecting Critical Infrastructure?
What Are The Security Challenges Of Protecting Critical Infrastructure?

Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerized systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks. The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting critical infrastructure?