Defense Clients
Atum Solutions, Inc. has successfully completed projects for clients in the defense industry such as Lockheed Martin, General Dynamics, CSC/MSE, IT&T and Mykotronx to name a few.
 
Defense Programs:
 
Aegis Weapon System
The Aegis Weapon System is the world’s most capable naval defense system and the sea-based element of the United States’ Ballistic Missile Defense System. The Aegis Weapon System can simultaneously attack land targets, submarines and surface ships, while automatically implementing defenses to protect the fleet against aircraft and missiles.
 
Joint Direct Attack Monition (JDAM)
The Joint Direct Attack Munitions (JDAM) is a guidance kit that converts unguided bombs, or "dumb bombs" into all-weather "smart" munitions. JDAM-equipped bombs are guided by an integrated inertial guidance system coupled to a Global Positioning System (GPS) receiver, giving them a published range of up to 15 nautical miles (28 km).
 
AEW&C
An airborne early warning and control (AEW&C) system is an airborne radar system designed to detect aircraft. Used at a high altitude, the radars allow the operators to distinguish between friendly and hostile aircraft hundreds of miles away. AEW&C aircraft are used for defensive and offensive air operations. The system is used offensively to direct fighters to their target locations, and defensively to counter attacks. It can also be used to carry out surveillance, and C2BM (command and control, battle management) functions
 
F-22 Raptor
The Lockheed Martin/Boeing F-22 Raptor is a single-seat, twin-engine fifth-generation super maneuverable fighter aircraft that uses stealth technology. It was designed primarily as an air superiority fighter, but has additional capabilities that include ground attack, electronic warfare, and signals intelligence roles.
 
JSF aircraft (F-35)
The Lockheed Martin F-35 Lightning II is a family of single-seat, single-engine, fifth generation multirole fighters under development to perform ground attack, reconnaissance, and air defense missions with stealth capability. The F-35 has three main models; one is a conventional takeoff and landing variant, the second is a short take off and vertical-landing variant, and the third is a carrier-based variant.
 
Enhanced Crypto Card KSV-21
Cryptographic Engine for Secure Terminal Equipment with the following features:
  • High-performance, real-time command set.
  • Electronic key management and KMI compatible
  • Downloadable and programmable firmware
  • Standard 16-bit PC card interface
  • Tamper-resistant technology
  • Permanent lithium battery with 7-year (minimum) life
  • Multiple Community of Interest (COI) support
  • U.S. National Security Agency (KSV-21)
  • Combined Communications Electronics Board (CCEB) (KSV-30)
  • NATO/NATO Nations (KSV-40)
  • Coalition Partners (SSV-50)
  • Certified for protection of unclassified data through top secret/SCI data
 
Secure Terminal Equipment (L-3 STE)
The system has the following features
  • Secure Voice
  • Non-Secure Voice
  • Secure Data
  • NSA, Tempest and TSG Accredited
  • Interoperability with STU-III and SCIP equipment
 
Ellipso - Wireless/Mobile Satellite Communication System
Ellipso provides a global wireless network that extends the Internet, cellular and public telephone systems virtually anywhere on the planet. Aimed at providing a range of Internet, wireless voice, unified messaging, positioning and other value added services. The following technologies were used in system development and implantation:
  • CDMA IS95A
  • GSM
  • WCDMA
 
Other Programs BTI has worked on
 
RF and HF/UHF Communication System
Technology used:
  • HF Modem
  • HF/UHF Communication System
  • Antenna Coupler
 
Military Communication System
Technology used:
  • SATCOM:
    • SATCOM Gateway
  • HF Communication System Design and Simulation:
    • HF System Design
    • HF Channel Simulation
    • Ion Atmosphere Simulation
 
COMSEC and INFOSEC Engineering
Technology used:
  • Communication Security (COMSEC):
    • Secure Terminal (STU-III)
    • Secure Mobile Unit (SMU)
    • Mobile Scribe Equipment (MSE)
    • Secure ISDN (STE)
    • ECC (Enhance Crypto Graphic) Forterza Plus PCMCIA card
  • Information Security (INFOSEC)
    • Digital Signature Sign and Verify
    • Standard Hash
    • Statistical Algorithms Implementation
    • Secure Verification Process
    • Trusted Software
    • Authenticate Process
  • Cryptographic:
    • DES Encryption and Decryption
    • RSA
    • Elliptical
    • EDS
    • Crypto Verification Process
    • NSA Algorithms
Wire line Modems
Technology used:
  • ITU Modems
  • Bell 103
 
ECM and Tactical System
Technology used:
  • Low Probability Intercept (LPI)
  • Code Shift Key (CSK) Modem
  • Nap-on-Earth Communication
  • Frequency Hopping
  • Chirp Wave Form
  • CVSD
  • Direct Spread Spectrum
  • CW Jamming
  • Impulse Jamming
  • Partial Jamming
Home      |      Contacts
Copyright © Atum Solutions, Inc.  All rights reserved.