Back to news

August 14, 2018 | International, Aerospace

General Atomics Expands Presence At North Dakota R&D Park

General Atomics Aeronautical Systems (GA-ASI) will nearly quadruple the space it occupies at the Grand Sky research and development park in Grand Forks, North Dakota, the park announced Aug. ...

On the same subject

  • New tropical boots coming by the end of 2019

    September 6, 2019 | International, Naval

    New tropical boots coming by the end of 2019

    By: Shawn Snow The Corps' new tropical boots may be on the feet of some Marines by the end of 2019, according to Marine officials. The Corps awarded two contracts on Aug. 29 for up to 140,000 total pairs of two styles of tropical boots, according to Maj. Ken Kunze, a spokesman for Marine Corps Systems Command. Kunze said one contract was awarded to ADS Inc. for a maximum order of 70,000 pairs of the Rocky brand tropical boot. That contract award was valued at $11.1 million dollars, Kunze said. Another contract was awarded to Provengo LLC for 70,000 pairs of the Danner brand tropical boot, with a contract valued at $13.7 million, according to Kunze. Kunze said the initial order for the new tropical boots is being procured in September and they should start arriving in 60 days to 90 days. The boots have gone through rigorous training during the past several years. In 2017, Marines with 3rd Battalion, 3rd Marines, evaluated three tropical boot prototypes from boot manufacturers Danner, Bates and Rocky while training in a jungle environment. The new boots will not be part of a Marine's general seabag issue. The boots are headed for the for the Consolidated Storage Program, and will be issued to Marines in predeployment training before heading to a hot or tropical climate, Manny Pacheco, a spokesman for Marine Corps Systems Command, previously told Marine Corps Times.

  • La Suisse a reçu l’approbation du Département d’État pour acheter des combattants

    January 5, 2021 | International, Aerospace

    La Suisse a reçu l’approbation du Département d’État pour acheter des combattants

    Le Département d'État américain a approuvé la vente potentielle d'avions de combat et du système Patriot à la Suisse. Cette décision fait suite au référendum qui a eu lieu dimanche dernier en Suisse. Lors d'un vote national, les Helvètes ont accepté d'acheter de nouveaux avions de combat pour remplacer les machines Northrop F-5E / F Tiger II et Boeing F / A-18C / D Hornet en service. Deux fournisseurs d'outre-mer et trois européens se sont disputés le contrat. Les États-Unis proposent à la Suisse des avions Lockheed Martin F-35A Lightning II et Boeing F / A-18 Super Hornet. En prévision d'une éventuelle décision, les Américains ont déjà accepté d'exporter lesdites armes. Dans le cas des avions F-35A, on parle de la vente potentielle de 40 machines, ainsi que de pièces détachées et d'armes, pour un montant d'environ 6,58 milliards de dollars. 40 chasseurs F / A-18E / F Super Hornet avec un package similaire ont été évalués à 7,45 milliards de dollars. Parallèlement, le département d'État américain a également approuvé la vente de systèmes de missiles de défense aérienne et antimissile Patriot à la Suisse. Cinq batteries sont évaluées à 2,2 milliards de dollars. Aucune partie ou la totalité des œuvres contenues dans la revue ne peut être reproduite et diffusée ou diffusée ultérieurement sous quelque forme et par quelque moyen que ce soit (y compris électronique ou mécanique ou autre ou dans tout domaine d'utilisation), y compris la copie, la numérisation au sens large, la photocopie ou copie, y compris publication sur Internet – sans le consentement écrit de Gremi Media SA. Toute utilisation ou utilisation des œuvres en tout ou en partie sans le consentement de Gremi Media SA ou des auteurs en violation de la loi est interdite sous peine de sanction et passible de poursuites.

  • In chaos, there’s opportunity … and that’s bad news

    April 27, 2020 | International, Aerospace, Naval, Land, C4ISR, Security

    In chaos, there’s opportunity … and that’s bad news

    James Yeager This year is only four months old and it's already one for the history books — and not in a great way. As the defense community works in tandem with the broader government to keep citizens safe and healthy, cybersecurity threats are only becoming more aggressive. If we've learned anything about cyber adversaries, it's that they will seize on any opportunity to gain an advantage in targeting their victims, including exploiting the fears of the public during a global pandemic. As COVID-19 has moved from the East to the West, adversaries have followed suit, using lures that play into people's desperation for information on the disease. In “The Art of War,” Sun-Tzu said“In the midst of chaos, there is also opportunity.” The COVID-19 virus is infecting more than just people. The pandemic has created chaos and handed adversaries an irresistible opportunity to exploit the situation to gain entry into our networks, whether that's to steal intellectual property, disrupt operations, or gain a strategic advantage if they are a nation-state actor. Already, we are seeing an increase in phishing campaigns using COVID-19 as a hook to launch malware in emails disguised as alerts. Particularly vulnerable are the thousands of remote workers — government employees and contractors alike — who are using their own home networks, which are largely less sophisticated and secure than their work environments. The stakes are high, particularly for those in defense jobs, where an errant click can have devastating consequences. Coincidently, 2020 is the year when the DoD's Cybersecurity Maturity Model Certification has grown teeth and will force more than 300,000 defense contractors to up their cybersecurity game or face bottom-line consequences. Now is not the time to make mistakes. In CrowdStrike's recent Global Threat Report, we captured and analyzed real-world inputs from observed trends in cyber-attacks on commercial and government enterprises. The following are some of the notable attack vectors and trends we observed across the public sector during 2019: An escalation in ransom demands, including ransomware attacks on defense supply chain providers, schools and local municipalities. Surpassing the volume of malware attacks are malware-free attacks that use code which executes from memory or stolen login credentials. Continued state-sponsored targeted intrusions aimed at the government and defense sector. In fact, we have witnessed adversaries exploiting fear around COVID-19 to socially engineer their way to user credentials and sensitive data. In the months ahead, I contend we'll see many more of the same tactics from the same bad actors: Russia, China and newer players on the block, such as Iran, which has leveraged U.S. social media platforms to develop information operations campaigns. Amidst massive change, periodic chaos and long-term disruption, the defense community — government and industry — must put a premium on speed. Speed to detect. Speed to investigate. Speed to mitigate. We recommend that agencies and companies implement cybersecurity practices that follow the 1-10-60 Rule: detect intrusions within 1 minute; investigate and gain a comprehensive understanding of the attack within 10 minutes; and contain and remove the threatening adversary from the network within 60 minutes. This benchmark will limit the damage caused by inevitable attacks. Yes, inevitable. Cyberattacks are a constant and while building a bigger, wider and thicker wall may help keep bad actors out, they are persistent and determined enough to eventually get in, and when they do, you're on the clock. This year will only get worse as the impacts of COVID-19 will be deep, damaging and long-lasting. We're all faced with loss and uncertainty as we attempt to recover from the global pandemic. For the defense community, there is no time to recover and regroup. You are already on the clock, as those who wish to do our nation harm are already hard at work.

All news