14 septembre 2023 | International, Terrestre

US State Department approves South Korea to buy 25 more F-35A jets

Sur le même sujet

  • Perspecta awarded $112 million contract to provide full-scope managed IT services for data center and cloud migration support to the U.S. Department of Homeland Security

    12 août 2020 | International, C4ISR

    Perspecta awarded $112 million contract to provide full-scope managed IT services for data center and cloud migration support to the U.S. Department of Homeland Security

    Chantilly, Va., August 6, 2020 /PRNewswire/ - Perspecta Inc. (NYSE: PRSP), a leading U.S. government services provider, announced today that it has been awarded a new Data Center Two (DC2) Support Services contract from the U.S. Department of Homeland Security (DHS). The indefinite delivery / indefinite quantity contract has a two-year base with two six-month option periods and a potential ceiling value of $112 million. Perspecta will provide DHS headquarters and all authorized components with full-scope managed services to support DC2 operations and consolidation. This includes baseline data center hosting and engineering services, as well as application and system migration, retirement, planning and execution support. "This award reinforces our standing as a premier provider of end-to-end next generation managed IT services," said Rocky Thurston, senior vice president and general manager of Perspecta's civilian, state and local business group. "It will also support DHS' strategic efforts to consolidate and optimize data centers. We have a long and proven history of supporting DHS on a multitude of programs, from agile DevSecOps to secure cloud migration and management, and we look forward to continuing that partnership in support DHS' long-term IT transformation goals." About Perspecta Inc. At Perspecta (NYSE: PRSP), we question, we seek and we solve. Perspecta brings a diverse set of capabilities to our U.S. government customers in defense, intelligence, civilian, health care and state and local markets. Our 280+ issued, licensed and pending patents are more than just pieces of paper, they tell the story of our innovation. With offerings in mission services, digital transformation and enterprise operations, our team of nearly 14,000 engineers, analysts, investigators and architects work tirelessly to not only execute the mission, but build and support the backbone that enables it. Perspecta was formed to take on big challenges. We are an engine for growth and success and we enable our customers to build a better nation. For more information about Perspecta, visit perspecta.com. This press release may contain forward-looking statements. These forward-looking statements are made on the basis of the current beliefs, expectations and assumptions of the management of Perspecta and are subject to significant risks and uncertainty. Readers are cautioned not to place undue reliance on any such forward-looking statements. All such forward-looking statements speak only as of the date they are made, and Perspecta undertakes no obligation to update or revise these statements, whether as a result of new information, future events or otherwise. Although Perspecta believes that the expectations reflected in these forward-looking statements are reasonable, these statements involve a variety of risks and uncertainties that may cause actual results to differ materially from what may be expressed or implied in these forward-looking statements. View original content to download multimedia:http://www.prnewswire.com/news-releases/perspecta-awarded-112-million-contract-to-provide-full-scope-managed-it-services-for-data-center-and-cloud-migration-support-to-the-us-department-of-homeland-security-301108087.html SOURCE Perspecta Inc.

  • HOW HACKED WATER HEATERS COULD TRIGGER MASS BLACKOUTS

    14 août 2018 | International, C4ISR

    HOW HACKED WATER HEATERS COULD TRIGGER MASS BLACKOUTS

    WHEN THE CYBERSECURITY industry warns about the nightmare of hackers causing blackouts, the scenario they describe typically entails an elite team of hackers breaking into the inner sanctum of a power utility to start flipping switches. But one group of researchers has imagined how an entire power grid could be taken down by hacking a less centralized and protected class of targets: home air conditioners and water heaters. Lots of them. At the Usenix Security conference this week, a group of Princeton University security researchers will present a study that considers a little-examined question in power grid cybersecurity: What if hackers attacked not the supply side of the power grid, but the demand side? In a series of simulations, the researchers imagined what might happen if hackers controlled a botnet composed of thousands of silently hacked consumer internet of things devices, particularly power-hungry ones like air conditioners, water heaters, and space heaters. Then they ran a series of software simulations to see how many of those devices an attacker would need to simultaneously hijack to disrupt the stability of the power grid. Their answers point to a disturbing, if not quite yet practical scenario: In a power network large enough to serve an area of 38 million people—a population roughly equal to Canada or California—the researchers estimate that just a one percent bump in demand might be enough to take down the majority of the grid. That demand increase could be created by a botnet as small as a few tens of thousands of hacked electric water heaters or a couple hundred thousand air conditioners. "Power grids are stable as long as supply is equal to demand," says Saleh Soltan, a researcher in Princeton's Department of Electrical Engineering, who led the study. "If you have a very large botnet of IoT devices, you can really manipulate the demand, changing it abruptly, any time you want." The result of that botnet-induced imbalance, Soltan says, could be cascading blackouts. When demand in one part of the grid rapidly increases, it can overload the current on certain power lines, damaging them or more likely triggering devices called protective relays, which turn off the power when they sense dangerous conditions. Switching off those lines puts more load on the remaining ones, potentially leading to a chain reaction. "Fewer lines need to carry the same flows and they get overloaded, so then the next one will be disconnected and the next one," says Soltan. "In the worst case, most or all of them are disconnected, and you have a blackout in most of your grid." Power utility engineers, of course, expertly forecast fluctuations in electric demand on a daily basis. They plan for everything from heat waves that predictably cause spikes in air conditioner usage to the moment at the end of British soap opera episodes when hundreds of thousands of viewers all switch on their tea kettles. But the Princeton researchers' study suggests that hackers could make those demand spikes not only unpredictable, but maliciously timed. The researchers don't actually point to any vulnerabilities in specific household devices, or suggest how exactly they might be hacked. Instead, they start from the premise that a large number of those devices could somehow be compromised and silently controlled by a hacker. That's arguably a realistic assumption, given the myriad vulnerabilities other security researchers and hackers have found in the internet of things. One talk at the Kaspersky Analyst Summit in 2016 described security flaws in air conditioners that could be used to pull off the sort of grid disturbance that the Princeton researchers describe. And real-world malicious hackers have compromised everything from refrigerators to fish tanks. Given that assumption, the researchers ran simulations in power grid software MATPOWER and Power World to determine what sort of botnet would could disrupt what size grid. They ran most of their simulations on models of the Polish power grid from 2004 and 2008, a rare country-sized electrical system whose architecture is described in publicly available records. They found they could cause a cascading blackout of 86 percent of the power lines in the 2008 Poland grid model with just a one percent increase in demand. That would require the equivalent of 210,000 hacked air conditioners, or 42,000 electric water heaters. The notion of an internet of things botnet large enough to pull off one of those attacks isn't entirely farfetched. The Princeton researchers point to the Mirai botnet of 600,000 hacked IoT devices, including security cameras and home routers. That zombie horde hit DNS provider Dyn with an unprecedented denial of service attack in late 2016, taking down a broad collection of websites. Building a botnet of the same size out of more power-hungry IoT devices is probably impossible today, says Ben Miller, a former cybersecurity engineer at electric utility Constellation Energy and now the director of the threat operations center at industrial security firm Dragos. There simply aren't enough high-power smart devices in homes, he says, especially since the entire botnet would have to be within the geographic area of the target electrical grid, not distributed across the world like the Mirai botnet. But as internet-connected air conditioners, heaters, and the smart thermostats that control them increasingly show up in homes for convenience and efficiency, a demand-based attack like the one the Princeton researchers describes could become more practical than one that targets grid operators. "It's as simple as running a botnet. When a botnet is successful, it can scale by itself. That makes the attack easier," Miller says. "It's really hard to attack all the generation sites on a grid all at once. But with a botnet you could attack all these end user devices at once and have some sort of impact." The Princeton researchers modeled more devious techniques their imaginary IoT botnet might use to mess with power grids, too. They found it was possible to increase demand in one area while decreasing it in another, so that the total load on a system's generators remains constant while the attack overloads certain lines. That could make it even harder for utility operators to figure out the source of the disruption. If a botnet did succeed in taking down a grid, the researchers' models showed it would be even easier to keepit down as operators attempted to bring it back online, triggering smaller scale versions of their attack in the sections or "islands" of the grid that recover first. And smaller scale attacks could force utility operators to pay for expensive backup power supplies, even if they fall short of causing actual blackouts. And the researchers point out that since the source of the demand spikes would be largely hidden from utilities, attackers could simply try them again and again, experimenting until they had the desired effect. The owners of the actual air conditioners and water heaters might notice that their equipment was suddenly behaving strangely. But that still wouldn't immediately be apparent to the target energy utility. "Where do the consumers report it?" asks Princeton's Soltan. "They don't report it to Con Edison, they report it to the manufacturer of the smart device. But the real impact is on the power system that doesn't have any of this data." That disconnect represents the root of the security vulnerability that utility operators need to fix, Soltan argues. Just as utilities carefully model heat waves and British tea times and keep a stock of energy in reserve to cover those demands, they now need to account for the number of potentially hackable high-powered devices on their grids, too. As high-power smart-home gadgets multiply, the consequences of IoT insecurity could someday be more than just a haywire thermostat, but entire portions of a country going dark. https://www.wired.com/story/water-heaters-power-grid-hack-blackout/

  • Coming in 2021: The B-21 Raider’s first flight?

    26 juillet 2019 | International, Aérospatial

    Coming in 2021: The B-21 Raider’s first flight?

    WASHINGTON — The Air Force's No. 2 officer has a countdown on his iPhone for the first B-21 Raider flight, and it may happen sooner than you think: December 2021, to be exact. “Don't hold me to it, but it's something like 863 days to first flight,” said Air Force Vice Chief of Staff Gen. Stephen Wilson, according to Air Force Magazine. Wilson, who spoke July 24 at an AFA Mitchell Institute event, said he had recently visited B-21 prime contractor Northrop Grumman's facilities in Melbourne, Fla., and that the company was “moving out on that pretty fast.” The 863-day countdown — if it is accurate — would peg the Raider's inaugural flight to Dec. 3, 2021. And while there's still ample time for design problems and budget setbacks to delay that schedule, analysts said the Air Force's disclosure of the first flight date means that the secretive bomber program is likely moving along smoothly. “A lot can happen in two years. But if they feel that confident about the schedule it's a good sign that things are on course,” said Richard Aboulafia, an aerospace analyst with the Teal Group. The short timeline between the contract award to Northrop Grumman in 2015 — which withstood a Boeing-Lockheed protest in 2016 — and first flight in 2021 could be a sign the B-21's air vehicle design is a smaller version of the B-2 Spirit, he said. “Which, of course, would mean a lot less risk and reasonably fast schedule,” Aboulafia said. “There's not a reason for the airframe itself to have to change radically. It's everything else about it that needs to be modernized, and it seems they think they can make do with a smaller system with less range. If you accept that thinking as the likely reality, then that would make for less risk and a relatively short development schedule. That all makes sense.” However, it is possible that there have been major design changes, in which case it's likely that several sub-scale or even full-scale demonstrators will fly before 2021, he added. Roman Schweizer, an analyst of Cowen Washington Research Group, said a 2021 first flight is a “significant new data point” that meshes well with the company's projected schedule of the program. “We believe the next major milestone for the program will be a Production Readiness Review that will clear the way for manufacturing the first prototype aircraft. Based on the program's next R&D funding step-up, we expect this could happen sometime later this calendar year to allow manufacturing to begin in FY20,” he wrote in an email to investors on Wednesday. In March, Bloomberg reported that procurement spending for the B-21 program would start in FY22 with $202 million in funding, shooting up to $2.4 billion the following year and $3.3 billion in FY24. “That could mean Low-Rate Production in FY23,” Schweizer wrote. “That would also make sense after flight test evaluations of the prototype (and possibly several others).” The Air Force has kept tight hold on details related to the Raiders development, keeping much of its budget in the “black” or classified portion of the funding request. The last major B-21 related disclosure was the December 2018 announcement that the program had completed its critical design review. Wilson's statements follow Acting Secretary of the Air Force Matt Donovan's visit to Northrop's B-21 Design and Development Headquarters in Melbourne., on July 19. Donovan was accompanied by Randy Walden, director of the Air Force Rapid Capabilities Office, which is responsible for executing the program. “We look forward to receiving the B-21 on time and incorporating it into our future force,” Donovan said after the visit. “The B-21 will be a significant component of our Air Force as we continue to modernize to meet the National Defense Strategy and is a game-changing capability to win the high-end fight.” By Valerie Insinna https://www.defensenews.com/air/2019/07/25/coming-in-2021-the-b-21-raiders-first-flight/

Toutes les nouvelles