Back to news

April 22, 2024 | Local, Land, Security

Minister Blair to visit the Northwest Territories to discuss Budget 2024 and Our North, Strong and Free: A Renewed Vision for Canada’s Defence

The Honourable Bill Blair, Minister of National Defence, will visit the Northwest Territories from April 23-25, 2024 to discuss Budget 2024 and Our North, Strong and Free: A Renewed Vision for Canada’s Defence

https://www.canada.ca/en/department-national-defence/news/2024/04/minister-blair-to-visit-the-northwest-territories-to-discuss-budget-2024-and-our-north-strong-and-free-a-renewed-vision-for-canadas-defence.html

On the same subject

  • Canadian Forces Snowbirds release performance schedule for RCAF centennial year - Skies Mag

    December 5, 2023 | Local, Aerospace

    Canadian Forces Snowbirds release performance schedule for RCAF centennial year - Skies Mag

    The CF Snowbirds begin their schedule May 18 in Comox, B.C., and zig-zag across the country and down to the U.S. before ending the season Oct. 6.

  • L3 WESCAM launches smarter imaging and processing technologies

    February 6, 2018 | Local, C4ISR

    L3 WESCAM launches smarter imaging and processing technologies

    SINGAPORE, February 6, 2018 – L3 WESCAM announced today that it has created smarter, more technologically advanced electro-optical and infrared (EO/IR) systems by incorporating highperforming imaging and processing technologies into its MX™-Series product line. These new technologies will enable MX operators to conduct missions with enhanced image processing and greater visual capabilities than ever before. “Today's environments are more complex, and missions need to be executed with more assurance,” said Paul Jennison, Senior Vice President of Strategy and Business Development for L3 WESCAM. “L3's newly incorporated smart technologies provide a portfolio of capabilities that will help operators succeed though a combination of ease-of-use and robust performance.” Newly launched imaging technologies include the addition of higher-sensitivity cameras that offer advanced imaging capabilities across a much wider range of illumination conditions, thereby advancing operator capabilities in low-visibility and no-visibility environments. Advancements to L3's MX image processing technologies include WESCAM's embedded Advanced Video Engine (WAVE) and a newly embedded Graphics Processing Unit (GPU). L3 WESCAM's new Automated Video Tracker (AVT) and embedded Moving Target Indicator (MTI) technologies are supported by this new architecture and provide automatic target acquisition of multiple targets with significantly improved target lock performance in challenging mission scenarios. L3's significant investment in its image processing technologies has made the MX product line smarter, as the WAVE's architecture supports future growth and allows for the rapid deployment of future image processing techniques. L3 has more than 40 years of experience in the design and delivery of stabilized imaging and targeting solutions. Systems range in size from 8 to 25 inches in diameter, portray clear sighting capabilities across the visible and infrared spectrums, and operate with outstanding stabilization and leading range performance. https://www.wescam.com/wp-content/uploads/L3-WESCAM_Launches_Smarter_More_Accurate_Imaging_Processing_Technologies.pdf

  • Online 'phishing' attacks expected to target housebound staffers as COVID-19 spreads

    March 17, 2020 | Local, C4ISR, Security

    Online 'phishing' attacks expected to target housebound staffers as COVID-19 spreads

    It's a 'huge opportunity' for online crime, one expert warns The number of "phishing" attacks meant to steal the online credentials of public servants and corporate sector employees now housebound due to the COVID-19 pandemic is on the rise, one cyber security expert warns. Many attempts are being made against employees who are working from home on virtual private works (VPNs). Cyber experts are still gathering data to establish a direct correlation between the pandemic crisis and the increase in malicious activity. But Rafal Rohozinski, chief executive officer of the SecDev Group of Companies, said this pandemic moment — when large numbers of employees are at home and receiving instructions from their workplaces on how to connect to internal networks — offers online thieves a "huge opportunity." Federal government and corporate sector systems were never designed to support a sudden, mass migration of employees from offices to their homes, he said. "The opening that creates for those who want to wreak havoc through ransomware and malware is really, really significant," said Rohozinski. "And I don't think we're anywhere near prepared for that. "What we're seeing is an increase in phishing being used as a means to get people's credentials." U.S. Health Department attacked The U.S. Health and Human Services Department's website was hit by a cyber attack over several hours on Sunday, an incident which involved overloading its servers with millions of hits. Officials said the system was not penetrated, although media reports in Washington described it as an attempt to undermine the U.S. government's response to the coronavirus pandemic — and may have been the work of a foreign actor. Rohozinski said that while the facts are not all in yet, his "professional guess" is that there's a link between the attack and the COVID-19 crisis. Last week, Canada's top military commander warned that he'd seen recent indications the country's adversaries intend to exploit the uncertainty, confusion and fear generated by the pandemic. Send in the trolls: Canada braces for an online disinformation assault on COVID-19 Gen. Jonathan Vance, chief of the defence staff, was not specific about the potential threats — but experts say they could range from hacking to online disinformation campaigns aimed at discrediting the federal government's response. Rohozinski said he's concerned about the federal government's technical capacity to support thousands of employees on private networks. "Everybody's moving on to VPNs. Everybody," he said. "This is an enormous pinpoint and an enormous vulnerability." Federal Digital Government Minister Joyce Murray's office was asked for a response Monday, but was unable to provide an immediate comment. Many of the country's leading information technology companies are part of the Canadian Cyber Threat Exchange (CCTE), a nonprofit centre where companies can swap information and insights. A CCTE spokeswoman said the corporate sector is better prepared to face the challenges posed by the mass movement of employees to home networks. Canada to bar entry to travellers who are not citizens, permanent residents or Americans Canadian military bans international travel in response to COVID-19 Still, there is reason for concern. "Given we are moving people to work from home now, companies need to ensure that the work from home environment is as safe as the corporate environment and that people are trained to notice these phishing campaigns, just like they were in the corporate environment," said Mary Jane Couldridge, director of business development at the CCTE. "It's a matter of keeping our community aware of what is impacting Canada daily so we know how to react to it and prevent it from spreading — and not chase rainbows." Most corporations have plans they'll activate now to cover the wholesale movement of employees to networks outside of the office, she added. https://www.cbc.ca/news/politics/online-hacking-phishing-covid-19-coronavirus-1.5499725

All news