Back to news

July 19, 2019 | International, Land, Other Defence

OSI Systems Awarded $8 Million Contract for Cargo and Vehicle Inspection Systems

HAWTHORNE, Calif.--(BUSINESS WIRE)--OSI Systems, Inc. (the “Company” or “OSI Systems”) (NASDAQ: OSIS) today announced that its Security division was awarded a contract valued at approximately $8 million by a U.S. government customer to provide cargo and vehicle inspection systems.

OSI Systems' Chairman and CEO, Deepak Chopra, stated, “We are pleased to receive this award and look forward to delivering our advanced technology solutions that are designed to provide enhanced imaging to help identify impermissible items.”

About OSI Systems

OSI Systems is a vertically integrated designer and manufacturer of specialized electronic systems and components for critical applications in the homeland security, healthcare, defense and aerospace industries. The Company combines more than 40 years of electronics engineering and manufacturing experience with offices and production facilities in more than a dozen countries to implement a strategy of expansion into selective end product markets. For more information on OSI Systems or its subsidiary companies, visit www.osi-systems.com. News Filter: OSIS-G

Forward-Looking Statements

This press release contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995, Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. Forward-looking statements relate to OSI Systems' current expectations, beliefs, and projections concerning matters that are not historical facts. Forward-looking statements are not guarantees of future performance and involve uncertainties, risks, assumptions, and contingencies, many of which are outside OSI Systems' control and which may cause actual results to differ materially from those described in or implied by any forward-looking statements. Undue reliance should not be placed on forward-looking statements, which are based on currently available information and speak only as of the date on which they are made. OSI Systems assumes no obligation to update any forward-looking statement made in this press release that becomes untrue because of subsequent events, new information, or otherwise, except to the extent it is required to do so in connection with its ongoing requirements under Federal securities laws. For a further discussion of factors that could cause OSI Systems' future results to differ materially from any forward-looking statements, see the section entitled "Risk Factors" in OSI Systems' most recently filed Annual Report on Form 10-K and other risks described therein and in documents subsequently filed by OSI Systems from time to time with the Securities and Exchange Commission.

SOURCE: OSI Systems, Inc.

https://www.businesswire.com/news/home/20190717005233/en

On the same subject

  • Four big questions for cybersecurity in 2019

    January 2, 2019 | International, C4ISR

    Four big questions for cybersecurity in 2019

    By: Justin Lynch How will cybersecurity experts remember 2018? In the past year, the Trump administration announced it would take more offensive hacking operations against foreign countries, the Department of Justice announcedsweeping indictments against Chinese hackers and the U.S. intelligence community reported that foreign countries continued to interfere in American elections. So what comes next? Here are four overarching questions for the cybersecurity community in 2019: What will the new Pentagon chief do with expanded cyber powers? In August, the president gave the secretary of Defense the ability to conduct cyberattacks against foreign countries so long as they do not interfere with the national interest of the United States, according to four current and former White House and intelligence officials. But the resignation of Jim Mattis, the Defense secretary, means the next Pentagon chief will have a broad arsenal of cyber authorities. For the cyber community, Patrick Shanahan, the current acting secretary, is a relative unknown. He has not given significant insight into how he views the role of offensive cyberattacks for the Pentagon, and his scheduled Jan. 1 elevation comes as some in the Trump administration and U.S. Cyber Command have pushed for even more authorities. However, he has spoken at length about the need for the defense industry to bolster its own cyber practices. Although the appointment of Shanahan as acting Pentagon chief is temporary, he is on the short list of officials who may take on the job full time. The new Pentagon chief may also have to decide when the National Security Agency and U.S. Cyber Command should split. Both bodies are led by Gen. Paul Nakasone, but that may change. Cyber Command is in the process of gaining its own infrastructure to conduct offensive cyberattacks, and a Pentagon official told Fifth Domain in November that it appeared the split was all but certain to happen in the coming years, although no formal decision as been made. What comes next in the U.S.-China cyber relationship? The Department of Justice released a flurry of indictments against Chinese hackers in 2018, accusing Beijing's cyber sleuths of infiltrating American government agencies and defense contractors. The most recent round of allegations came Dec. 18, and the legal action could continue in 2019. While announcing the most recent indictments, Deputy Attorney General Rod Rosenstein accused China of breaking an agreement not to use hacked materials for commercial use, although he did not offer evidence. The hacking allegations come amid a broader trade war between the United States and China. Experts have told Fifth Domain a trade war could increase digital tension between the two nations. If the trade war continues, experts say they see little incentive for China to limit its cyberattacks. Will America suffer blowback for more offensive cyber operations? When the Trump administration announced the United States would take more offensive actions in cyberspace, some in the federal cybersecurity community criticized the plan as faulty. “The side effects of the strategy of ‘persistent engagement' and ‘defend forward' are still ill-understood,” Max Smeets and Herb Lin, experts at Stanford University wrote for Lawfare. “A United States that is more powerful in cyberspace does not necessarily mean one that is more stable or secure.” Experts also warn of making any rush judgments about the effectiveness of these offensive cyberattacks. Current and former intelligence officials worry that uncovering and attributing a hack can take more than a year, and, even then, that process is not perfect. One former official pointed to the leaked documents about Russian targeting of American election infrastructure in 2016 that was sent to the news organization the Intercept. It took months for the intelligence community to understand the full extent of the hack, the official said, an example of how long it takes to detect a cyberattack. However, all of that means it is reasonable to expect that the merits of the new offensive cyber operations may not be known publicly for years. Will Congress take action to streamline cybersecurity contracting and research? Yes, changing the way government does business is ambitious. But experts argue that if the United States wants to keep up with digital innovations from China and other countries it is necessary to change the American government's relationship with the private sector and academia. The effort to streamline cybersecurity funding and research will fall to the new Congress, in which Democrats will take over the House of Representatives. But when it comes to the U.S. government's relationship with the cyber industry, structural barriers to innovation remain. On average, it takes roughly seven years for an idea to get a contract inside the U.S. government. In that length of time, a product is already two generations old. Former Pentagon officials have used the digital fight against the Islamic State as an example of how long the process takes. It took roughly two years for Cyber Command to receive the proper equipment and training after the order to digitally defeat the Islamic State, officials told Fifth Domain. In addition, the cybersecurity industry is watching a series of bills in Congress. Sen. Mark Warner, D-Va., has pushed for a streamlined security clearance process, and industry officials told Fifth Domain they expect him to continue the effort in the new year. The bill could make it easier and cheaper to get a security clearance. And many in the federal cybersecurity community have called for a change in academia's relationship with cybersecurity. The universities and research institutions in the United States focusing on quantum computing are “subpar,” George Barnes, deputy director at the NSA said in June. Experts say that quantum computers will make traditional cybersecurity methods obsolete because of the expansive computing power. However, new investments in artificial intelligence and a new Solarium Commission, which was created to help contextualize cyber in the broader national and economic security discussion, may provide solutions to these problems. https://www.fifthdomain.com/industry/2018/12/31/four-big-questions-for-cybersecurity-in-2019

  • US State Dept okays defense sales to India, Italy, Romania for $965 million
  • French Air Force chief: France and Germany working on export controls for future fighter

    February 11, 2019 | International, Aerospace

    French Air Force chief: France and Germany working on export controls for future fighter

    By: Valerie Insinna WASHINGTON — The French Air Force chief of staff provided top cover for the future Franco-German fighter at a time when the French defense industry is increasingly concerned that cooperation with Germany could curtail its ability to export the system. “There is a real determination" at the highest levels of government — including French President Emmanuel Macron and German Chancellor Angela Merkel — to agree on export controls, said Gen. Philippe Lavigne during a Feb. 7 roundtable with reporters. "It's a need for our security, but it's also a need for our industry, and we have to develop this,” he said, adding that Spain has already signed on as an observer to the program and that others are expected to follow. The French government is generally seen as more supportive of arms sales than its partner in the sixth-generation fighter program, called the Future Combat Air System, or FCAS. While enthusiasm for the program remains high, some French defense industry officials are concerned that Germany's involvement could prevent sales to countries that Berlin considers rogue actors. But settling an export policy is just one of the many questions about the FCAS program that are still yet to be answered. So far, France and Germany's concept for FCAS involves a network of swarming UAVs, new weapons and a sixth-generation fighter that can exchange information with each other. FCAS would replace France's Rafale and Germany's Eurofighter around 2040. “We haven't decided what will be the architecture,” Lavigne said. “Will it be this type of aircraft? Will it be this type of [UAV]? Will it be this type of unmanned combat air vehicle? Will it be this type of missiles? But we know that we will share an architecture. “The gamechanger is the connectivity between different platforms.” Earlier this week, the French and German governments awarded €65 million (U.S. $74 million) to Dassault and Airbus for the two-year study that will solidify a path forward for FCAS, and the companies plan to announce demonstrator programs at the Paris Air Show this summer. Lavigne wasn't clear on how the governments would reconcile different requirements, like France's intention to launch FCAS from aircraft carriers, which could drive different design attributes than a fighter that takes off and lands conventionally. “Of course we will have national interests in France with the nuclear deterrence. Germany will have different national interests,” he said. However, he stopped short of saying how much commonality is expected between the two militaries. Until the study is complete, it is “too early to say” whether FCAS will be manned or unmanned. However, Lavigne said a human will continue to be in the loop — especially for nuclear deterrence missions — whether a human is in the cockpit or it is remotely piloted. “We are open to look at the technical solution,” he said. “For me, it's optionally piloted.” FCAS' system-of-systems approach is similar to the U.S. Air Force's vision for Penetrating Counter Air, its future air superiority concept. The Air Force hasn't shared which defense companies are involved in conceptualizing or prototyping future technologies that could be pulled into a PCA program of record, but it requested $504 million in fiscal 2019 to push the effort forward, with investments projected to hit $3 billion in FY22. https://www.defensenews.com/global/europe/2019/02/08/french-air-force-chief-france-and-germany-working-on-export-controls-for-future-fighter

All news