logo
US Army rolls out $13M smart rifle scopes that auto-target and take down enemy drones in combat

US Army rolls out $13M smart rifle scopes that auto-target and take down enemy drones in combat

New York Posta day ago

The US Army is giving its soldiers a high-tech edge in the fight against drones, and it's called SMASH.
During a live-fire training exercise on June 6 in Germany, a soldier with the 3rd Squadron, 2nd Cavalry Regiment used the SMASH 2000L smart scope mounted on an M4A1 rifle to target drones in the sky.
The demo was part of Project Flytrap, a multinational training event.
The SMASH 2000L, made by Israeli company Smart Shooter Ltd., is no ordinary sight.
It uses cameras, sensors, and artificial intelligence to track targets and decides the perfect time to fire, according to reporting from Army Recognition.
Once a drone is locked in, the system controls the trigger and only fires when a hit is guaranteed.
In May, the Army awarded Smart Shooter a $13 million contract to begin delivering these scopes to troops under its Transformation In Contact (TIC 2.0) program.
The goal is to quickly get new, useful tech into soldiers' hands.
The smart scope weighs about 2.5 pounds and fits onto standard-issue rifles.
3 A soldier with the 3rd Squadron, 2nd Cavalry Regiment, tested a SMASH 2000L smart scope mounted on an M4A1 rifle during a training exercise on June 6.
U.S. Army photo by Spc. Elijah Magaña
It has already been used by NATO partners and tested in combat zones.
In the ongoing Ukraine war, both sides use less expensive drones to drop explosives or spy on troops. In Israel, terrorists have flown quadcopters into military positions.
These small drones are fast, quiet, and deadly.
3 The smart scope helps target drones in the sky.
U.S. Army photo by Spc. Elijah Magaña
3 Rifles with this new technology only fire when a hit is guaranteed.
U.S. Army photo by Spc. Elijah Magaña
Until now, stopping drones often meant using big, complex systems but SMASH changes that.
With SMASH, a single soldier can knock a drone out of the sky without needing backup.
The Army did not immediately respond to Fox News Digital's request for comment.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

National Guard Gets First Ever 'Electromagnetic Warfare' Unit
National Guard Gets First Ever 'Electromagnetic Warfare' Unit

Newsweek

timean hour ago

  • Newsweek

National Guard Gets First Ever 'Electromagnetic Warfare' Unit

Based on facts, either observed and verified firsthand by the reporter, or reported and verified from knowledgeable sources. Newsweek AI is in beta. Translations may contain inaccuracies—please refer to the original content. A branch of the National Guard has established a new unit dedicated to electronic warfare (EW), the first of its kind in the U.S. Army. Why It Matters Wielding the electromagnetic spectrum to one side's advantage while jeopardizing how the enemy can communicate or use its weapons is a crucial part of fighting a war. Military forces can use the electromagnetic spectrum to pick up on and track targets, communicate between soldiers or units and coordinate strikes with accurate location data. EW interferes with these functions, making it harder for an adversary to carry out missions like accurate strikes guided by reliable navigation data. Captain Caleb D. Rogers, commander of the 111th Electromagnetic Warfare Company, receives the recently uncased unit guidon from Lt. Col. Luke E. Gurley, commander of the 221st Intelligence and Electronic Warfare Battalion, assuming his new... Captain Caleb D. Rogers, commander of the 111th Electromagnetic Warfare Company, receives the recently uncased unit guidon from Lt. Col. Luke E. Gurley, commander of the 221st Intelligence and Electronic Warfare Battalion, assuming his new role as commander, June 7, 2025 in Forest Park, Ga. More Charles Emmons/ National Guard Russia and Ukraine have both used EW extensively in the more than three years of full-scale war in eastern Europe. EW has also figured heavily into fighting in the Middle East, including on Israel's northern border with Lebanon. What To Know The 111th Electronic Warfare Company, part of the 221st Intelligence and Electronic Warfare Battalion, "made history" by becoming the "first unit of its kind in the U.S. Army," the Georgia Army National Guard said on Monday. The unit's creation "marks a significant step in modernizing the Army's capabilities within a domain that is increasingly critical to national security," the Georgia Army National Guard added in a statement. The U.S. Army chief of staff, General Randy George, has said the modern battlefield is constantly changing, and the U.S. military must follow suit. "We have been watching what's happening in the battlefield here with Ukraine, the Middle East, really, around the world," he said during an appearance at the Council on Foreign Relations think tank in May. "All of our soldiers are expected to keep up with evolving technology," said company commander, Captain Caleb Rogers, who heads the new EW unit. "It's a great time to be in military intelligence and electromagnetic warfare," added Brigadier General Theodore Scott III, the head of the 78th Troop Command and former chief of the 221st Intelligence and Electronic Warfare Battalion. The 221st Intelligence and Electronic Warfare Battalion has previously deployed to the Middle East and has supported the U.S.'s Indo-Pacific Command. What People Are Saying Lieutenant Colonel Luke Gurley, commander of the 221st Intelligence and Electronic Warfare Battalion which oversees the 111th Electromagnetic Warfare Company, said the unit "will be at the forefront of our capabilities in the electromagnetic spectrum." "All of our Soldiers are expected to keep up with evolving technology, and the unit as a whole is remaining flexible with the expectation of receiving a growing number of mission types," said company commander, Captain Caleb Rogers. What Happens Next The 111th will carry out its first field exercise in August at the Chattahoochee National Forest, the Georgia Army National Guard said. Drills will focus on picking up and identifying both static and moving targets as well as training to use electromagnetic technology.

U.S.-backed Israeli company's spyware used to target European journalists, Citizen Lab finds
U.S.-backed Israeli company's spyware used to target European journalists, Citizen Lab finds

Los Angeles Times

timean hour ago

  • Los Angeles Times

U.S.-backed Israeli company's spyware used to target European journalists, Citizen Lab finds

ROME — Spyware from a U.S.-backed Israeli company was used to target the phones of at least three prominent journalists in Europe, two of whom are editors at an investigative news site in Italy, according to digital researchers at Citizen Lab, citing new forensic evidence of the attacks. The findings come amid growing questions about what role the government of Italian Prime Minister Giorgia Meloni may have played in spying on journalists and civil society activists critical of her leadership, and raised new concerns about the potential for abuse of commercial spyware, even in democratic countries. 'Any attempts to illegally access data of citizens, including journalists and political opponents, is unacceptable, if confirmed,' the European Commission said in a statement Wednesday in response to questions from members of parliament. 'The Commission will use all the tools at its disposal to ensure the effective application of EU law.' Meloni's office declined to comment Thursday, but a prominent member of her Cabinet has said that Italy 'rigorously respected' the law and that the government hadn't illegally spied on journalists. The company behind the hacks, Paragon Solutions, has sought to position itself as a virtuous player in the mercenary spyware industry and won U.S. government contracts, The Associated Press found. Backed by former Israeli Prime Minister Ehud Barak, Paragon was reportedly acquired by AE Industrial Partners, a private investment firm based in Florida, in a December deal worth at least $500 million, pending regulatory approvals. AE Industrial Partners didn't directly respond to requests for comment on the deal. Paragon's spyware, Graphite, was used to target around 90 WhatsApp users from more than two dozen countries, primarily in Europe, Meta said in January. Since then, there's been a scramble to figure out who was hacked and who was responsible. 'We've seen first-hand how commercial spyware can be weaponized to target journalists and civil society, and these companies must be held accountable,' a spokesperson for WhatsApp told AP in an email. 'WhatsApp will continue to protect peoples' ability to communicate privately.' Meta said the vulnerability has been patched and they have not detected subsequent attacks. Meta also sent a cease-and-desist letter to Paragon. Last month, a California court awarded Meta $168 million in damages from Israel's NSO Group, whose spyware was used to hack 1,400 WhatsApp accounts, including of journalists, activists and government officials. The Citizen Lab's findings, released today, show that the use of spyware against journalists has continued, despite the backlash against NSO Group, and establish for the first time that Paragon was able to successfully infect Apple devices. Ciro Pellegrino, who heads the Naples newsroom of an investigative news outlet called received a notice on April 29 that his iPhone had been targeted. Last year, Fanpage secretly infiltrated the youth wing of Meloni's Brothers of Italy party and filmed some of them making fascist and racist remarks. Pellegrino's colleague, Fanpage editor-in-chief Francesco Cancellato, also received a notice from Meta that his Android device had been targeted by Paragon spyware, though forensic evidence that his phone was actually infected with Graphite hasn't yet surfaced, according to Citizen Lab. The Citizen Lab's report today also revealed a third case, of a 'prominent European journalist,' who asked to remain anonymous, but is connected to the Italian cluster by forensic evidence unearthed by researchers at the laboratory, which is run out of the Munk School at the University of Toronto. The Citizen Lab, which has analyzed all the devices, said the attack came via iMessage, and that Apple has patched the vulnerability. Apple did not respond immediately to requests for comment. 'Paragon is now mired in exactly the kind of abuse scandal that NSO Group is notorious for,' said John Scott-Railton, a senior researcher at the Citizen Lab. 'This shows the industry and its way of doing business is the problem. It's not just a few bad apples.' Paragon's spyware is especially stealthy because it can compromise a device without any action from the user. Similar to the NSO Group's notorious Pegasus spyware, which has been blacklisted by the U.S. government, Graphite allows the operator to covertly access applications, including encrypted messengers like Signal and WhatsApp. 'There's no link to click, attachment to download, file to open or mistake to make,' Scott-Railton said. 'One moment the phone is yours, and the next minute its data is streaming to an attacker.' COPASIR, the parliamentary committee overseeing the Italian secret services, took the rare step last week of making public the results of its investigation into the government's use of Paragon. The COPASIR report said that Italian intelligence services hadn't spied on Cancellato, the editor of Fanpage. The report did confirm the surveillance, with tools including Graphite, of civil society activists, but said they had been targeted legally and with government authorization — not as activists but over their work related to irregular immigration and national security. Giovanni Donzelli, vice president of COPASIR and a prominent member of Meloni's Brothers of Italy party, declined further comment Thursday, saying the parliamentary report was 'more relevant than an analysis done by a privately funded Canadian laboratory.' Citizen Lab says it's 'rigorously independent,' and doesn't accept research funding from governments or companies. Italy and Paragon both say they've terminated their relationship, but offer starkly different versions of the breakup. Paragon referred questions to a statement it gave to Israeli newspaper Haaretz, in which the company said that it stopped providing spyware to Italy after the government declined its offer to help investigate Cancellato's case. Italian authorities, however, said they had rejected Paragon's offer over national security concerns and ended the relationship following media outcry. Paragon has been keen to deflect reputational damage that could, in theory, impact its contracts with the U.S. government. A 2023 executive order, which so far hasn't been overturned by President Trump, prohibits federal government departments and agencies from acquiring commercial spyware that has been misused by foreign governments, including to limit freedom of expression and political dissent. The U.S. Department of Homeland Security awarded Paragon a one-year, $2 million contract last September for operations and support of U.S. Immigration and Customs Enforcement, public records show. The U.S. Drug Enforcement Administration has also reportedly used the spyware. In December 2022, Adam Schiff, the California Democrat who at the time chaired the House Intelligence Committee, wrote to the administrator of the U.S. Drug Enforcement Administration questioning whether the DEA's use of Graphite spyware undermined efforts to deter the 'broad proliferation of powerful surveillance capabilities to autocratic regimes and others who may misuse them.' Kinetz and Santalucia write for the Associated Press. Byron Tau in Washington, and Lorne Cook in Brussels, contributed to this report.

US-backed Israeli company's spyware used to target European journalists, Citizen Lab finds
US-backed Israeli company's spyware used to target European journalists, Citizen Lab finds

Yahoo

time2 hours ago

  • Yahoo

US-backed Israeli company's spyware used to target European journalists, Citizen Lab finds

ROME (AP) — Spyware from a U.S.-backed Israeli company was used to target the phones of at least three prominent journalists in Europe, two of whom are editors at an investigative news site in Italy, according to digital researchers at Citizen Lab, citing new forensic evidence of the attacks. The findings come amid a growing questions about what role the government of Italian Prime Minister Giorgia Meloni may have played in spying on journalists and civil society activists critical of her leadership, and raised new concerns about the potential for abuse of commercial spyware, even in democratic countries. 'Any attempts to illegally access data of citizens, including journalists and political opponents, is unacceptable, if confirmed,' the European Commission said in a statement Wednesday in response to questions from members of parliament. 'The Commission will use all the tools at its disposal to ensure the effective application of EU law.' Meloni's office declined to comment Thursday, but a prominent member of her Cabinet has said that Italy 'rigorously respected' the law and that the government hadn't illegally spied on journalists. Mercenary spyware industry The company behind the hacks, Paragon Solutions, has sought to position itself as a virtuous player in the mercenary spyware industry and won U.S. government contracts, The Associated Press found. Backed by former Israeli Prime Minister Ehud Barak, Paragon was reportedly acquired by AE Industrial Partners, a private investment firm based in Florida, in a December deal worth at least $500 million, pending regulatory approvals. AE Industrial Partners didn't directly respond to requests for comment on the deal. Paragon's spyware, Graphite, was used to target around 90 WhatsApp users from more than two dozen countries, primarily in Europe, Meta said in January. Since then, there's been a scramble to figure out who was hacked and who was responsible. 'We've seen first-hand how commercial spyware can be weaponized to target journalists and civil society, and these companies must be held accountable,' a spokesperson for WhatsApp told AP in an email. 'WhatsApp will continue to protect peoples' ability to communicate privately.' Meta said the vulnerability has been patched and they have not detected subsequent attacks. Meta also sent a cease-and-desist letter to Paragon. Last month, a California court awarded Meta $168 million in damages from Israel's NSO Group, whose spyware was used to hack 1,400 WhatsApp accounts, including of journalists, activists and government officials. Journalists targeted The Citizen Lab's findings, released today, show that the use of spyware against journalists has continued, despite the backlash against NSO Group, and establish for the first time that Paragon was able to successfully infect Apple devices. Ciro Pellegrino, who heads the Naples newsroom of an investigative news outlet called received a notice on April 29 that his iPhone had been targeted. Last year, Fanpage secretly infiltrated the youth wing of Meloni's Brothers of Italy party and filmed some of them making fascist and racist remarks. Pellegrino's colleague, Fanpage editor-in-chief Francesco Cancellato, also received a notice from Meta that his Android device had been targeted by Paragon spyware, though forensic evidence that his phone was actually infected with Graphite hasn't yet surfaced, according to Citizen Lab. The Citizen Lab's report today also revealed a third case, of a 'prominent European journalist,' who asked to remain anonymous, but is connected to the Italian cluster by forensic evidence unearthed by researchers at the laboratory, which is run out of the Munk School at the University of Toronto. The Citizen Lab, which has analyzed all the devices, said the attack came via iMessage, and that Apple has patched the vulnerability. Apple did not respond immediately to requests for comment. 'Paragon is now mired in exactly the kind of abuse scandal that NSO Group is notorious for,' said John Scott-Railton, a senior researcher at the Citizen Lab. 'This shows the industry and its way of doing business is the problem. It's not just a few bad apples.' Stealthy spyware Paragon's spyware is especially stealthy because it can compromise a device without any action from the user. Similar to the NSO Group's notorious Pegasus spyware, which has been blacklisted by the U.S. government, Graphite allows the operator to covertly access applications, including encrypted messengers like Signal and WhatsApp. 'There's no link to click, attachment to download, file to open or mistake to make,' Scott-Railton said. 'One moment the phone is yours, and the next minute its data is streaming to an attacker.' Parliamentary oversight COPASIR, the parliamentary committee overseeing the Italian secret services, took the rare step last week of making public the results of its investigation into the government's use of Paragon. The COPASIR report said that Italian intelligence services hadn't spied on Cancellato, the editor of Fanpage. The report did confirm the surveillance, with tools including Graphite, of civil society activists, but said they had been targeted legally and with government authorization — not as activists but over their work related to irregular immigration and national security. Giovanni Donzelli, vice president of COPASIR and a prominent member of Meloni's Brothers of Italy party, declined further comment Thursday, saying the parliamentary report was 'more relevant than an analysis done by a privately funded Canadian laboratory.' Citizen Lab says it's 'rigorously independent,' and doesn't accept research funding from governments or companies. Italy and Paragon both say they've terminated their relationship, but offer starkly different versions of the breakup. Paragon referred questions to a statement it gave to Israeli newspaper Haaretz, in which the company said that it stopped providing spyware to Italy after the government declined its offer to help investigate Cancellato's case. Italian authorities, however, said they had rejected Paragon's offer over national security concerns and ended the relationship following media outcry. U.S. contracts Paragon has been keen to deflect reputational damage that could, in theory, impact its contracts with the U.S. government. A 2023 executive order, which so far hasn't been overturned by U.S. President Donald Trump, prohibits federal government departments and agencies from acquiring commercial spyware that has been misused by foreign governments, including to limit freedom of expression and political dissent. The U.S. Department of Homeland Security awarded Paragon a one-year, $2 million contract last September for operations and support of U.S. Immigration and Customs Enforcement, public records show. The U.S. Drug Enforcement Administration has also reportedly used the spyware. In December 2022, Adam Schiff, the California Democrat who at the time chaired the House Intelligence Committee, wrote to the administrator of the U.S. Drug Enforcement Administration questioning whether the DEA's use of Graphite spyware undermined efforts to deter the 'broad proliferation of powerful surveillance capabilities to autocratic regimes and others who may misuse them.' ___ Byron Tau in Washington, and Lorne Cook in Brussels, contributed to this report. Erika Kinetz And Paolo Santalucia, The Associated Press

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store