logo
American Airlines is bringing private suites with sliding doors to fancy flying

American Airlines is bringing private suites with sliding doors to fancy flying

Yahoo02-05-2025
Suite dreams are made of this: American Airlines (AAL) just debuted a redesigned aircraft that features private suites with sliding doors and chaise lounge-style seating as part of a broader push to elevate its premium international travel experience.
The 'Flagship Suite' seats, introduced on American's latest Boeing (BA) 787-9 deliveries, represent a significant shift in the airline's long-haul strategy. With a focus on privacy, comfort, and luxury, the suites are part of American's plan to retire traditional international first class and compete more directly for premium travelers.
This new 'premium-focused' design will also appear on any deliveries of Airbus (AIR) A321XLRs and retrofitted Boeing 777-300ERs, the airline said. The updated 787-9 cabin will have 51 'Flagship Suite' seats, replacing the current international business class configuration of 30 seats.
Each suite is equipped with a sliding privacy door, more personal storage space, a wireless charging pad, and a chaise lounge-style seating option. Travelers booking the seats will receive access to a range of ground and inflight services including priority check-in, security, boarding, and baggage handling, as well as access to American's Flagship Lounge. In the air, passengers will be offered a multi-course meal curated to pair with premium wines, along with upgraded bedding and amenity kits featuring luxury skincare products.
American's suites will enter regular service on June 5 with a flight from Chicago to London. Additional routes with the suite seats include Philadelphia to London starting on Aug. 6, Philadelphia to Zurich on Sept. 3, and Dallas Fort Worth to Brisbane, Australia, on Oct.26.
On the airline's website, a roundtrip leaving Chicago for London on August 1 and returning August 8 in the Flagship business class costs $5,361.
American plans to introduce a total of 30 of these redesigned 787-9s to its fleet by 2029. By the end of the decade, American aims to grow its lie-flat and 'premium economy' seating by 50%.
In September 2022, American announced it would eliminate international first class on many aircraft and instead focus on a more luxurious business-class suite experience. The move was part of a broader industry trend where airlines are consolidating premium offerings into a single, more spacious and competitive business class — often with features that previously distinguished first class.
The airline is positioning the Flagship Suite product as a direct competitor to Delta's Delta One Suite and JetBlue's Mint, both of which feature sliding doors and enhanced privacy. United Airlines (UAL) is also expected to introduce an updated premium cabin product in the near future.
For the latest news, Facebook, Twitter and Instagram.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

How North Korea's IT army is hacking the global job market
How North Korea's IT army is hacking the global job market

Axios

time3 minutes ago

  • Axios

How North Korea's IT army is hacking the global job market

Nearly every Fortune 500 company is hiding the same uncomfortable secret: they have hired a North Korean IT worker. Why it matters: Despite how widespread the issue is, few companies are willing to talk publicly about it. Experts say reputational risk, legal uncertainty, and embarrassment all contribute to the silence — which in turn makes the problem harder to solve. Dozens of resumes, LinkedIn profiles, and fraudulent identity documents shared with Axios lay bare the scale and sophisticated of the scams. The big picture: For North Korea, this is a precious revenue stream that evades American sanctions — capitalizing on the wealth of high-paying remote worker roles in the U.S. to route cash back to Pyongyang. In the past two years, companies and their security partners have begun to grasp the scale of the problem — and now, they're sounding the alarm about where it's headed next. "They've been stealing intellectual property and then working on the projects themselves," Michael "Barni" Barnhart, principal investigator at DTEX Systems, told Axios. "They're going to use AI to magnify exponentially what they're already doing — and what they're doing now is bad." Between the lines: It sounds easy to simply weed out North Korean job applicants. But some of the world's biggest firms have found it devilishly difficult. That's because the North Korean operation has become as complex as a multi-national corporation. It involves several North Korean government offices, dozens of China-based front companies and Americans willing to facilitate the fraud. And the undercover North Korean IT workers are often exceptional at their jobs — at least until they start stealing sensitive data or extorting companies that try to fire them. Google Threat Intelligence VP Sandra Joyce recalled the response of one employer when told they likely had a North Korean fraudster on staff: "You guys better be right, because that is my best guy." The groups running the show North Korea has invested years into building up its remote IT labor force, providing training not just for remote job fraud but also corporate espionage and IP theft. Workers are selected and trained at elite institutions such as Kim Chaek University of Technology and the University of Sciences in Pyongsong — some with specializations in software development, AI or cryptography. Research from DTEX shows that the most advanced worker scams are often coordinated with units like APT 45, a notorious government hacking group known for infiltrating companies, running scams and laundering money. Other participants in the scheme include the Lazarus Group, which typically leads the regime's cryptocurrency hacks and has positioned insiders within crypto companies, and Research Center 227, a new AI research unit inside North Korea's intelligence agency. The intrigue: Cybersecurity companies have been discovering and naming new groups running these hacks, with names like Jasper Sleet, Moonstone Sleet and Famous Chollima. The scale Driving the news: Nine security officials who spoke with Axios all said they've yet to meet a Fortune 500 company that hasn't inadvertently hired a North Korean IT worker. Google told reporters at the RSA Conference in May that it had seen North Koreans applying to its jobs. SentinelOne and others have said the same. KnowBe4, a cybersecurity training company, admitted last year that it hired a North Korean IT worker. A smaller cryptocurrency startup told the WSJ that they accidentally had North Korean workers on their payroll for almost two years. In one case, Sam Rubin, senior vice president of Palo Alto Networks' Unit 42 consulting and threat intelligence team, told Axios that within 12 hours of a large client posting a new job, more than 90% of the applicants were suspected to be North Korean workers. "If you hire contract IT workers, this has probably happened to you," Rubin said. The intrigue: Even small-to-mid-sized companies that rely on remote IT talent or outsource their IT needs to a consulting firm have encountered this problem, Adam Meyers, senior vice president of counter adversary operations at CrowdStrike, said. CrowdStrike has investigated more than 320 incidents where North Korean operatives landed jobs as remote software developers, according to the company's annual threat hunting report published earlier this month. How it works Getting a job at a U.S. company — and going undetected — is a team effort that involves several North Korean IT workers, China-based companies and even a handful of Americans. Some of the North Korean workers are even stationed in China and other nearby countries to keep suspicions low. First, the workers identify potential identities they can assume. Those are often stolen from a real person, or even from a dead U.S. citizen. To pull off this deception, they create fake passwords, Social Security cards and utility bills. Many of them use the same recognizable tablecloth in the background of fake ID photos, Meyers said. For instance, in a December indictment of 14 North Koreans, the workers were found using stolen identities to apply to dozens of jobs. Second, the workers find open jobs in software development, technical support and DevOps posted on Upwork, Fiverr, LinkedIn, and third-party staffing platforms. Much of this is streamlined through AI tools that help track and manage their job applications. Many of them will use AI tools to help generate passable resumes and LinkedIn profiles, according to Trevor Hilligoss, senior vice president at SpyCloud Labs. "There's a hierarchy: There's a group of people who are the interviewers, and they're the ones with the really good English specialties," Hilligoss told Axios. "When they get hired, that gets turned over to somebody that's a developer." Those developers will often juggle several jobs and multiple different personas. Zoom in: Job interviews would seem like the obvious time to catch a fraudulent application. But the "applicants" — whether they're using their real faces and voices or AI-enabled personas — are practiced interviewers with the skills necessary to complete technical coding assignments. In multiple cases, hiring managers only realized something was wrong weeks later when employees looked or behaved differently than during the interview, Barnhart said. After landing the job, the developers step in and request that their company laptop be shipped to a U.S. address — often citing a last-minute move or family emergency. That address often belongs to an American accomplice, who typically operates what's known as a "laptop farm." These facilitators are told to install specific remote desktop software onto the laptops so the North Korean worker can operate the laptop from abroad. In July, the FBI said it executed searchers of 21 premises across 14 states that were known or suspected laptop farms, seizing 137 laptops. Then there's the challenge of ensuring the salaries actually reach the North Korean regime. That often requires the facilitators forward the paychecks to front companies across China or funnel it through cryptocurrency exchanges. In a report published in May, researchers at Strider Technologies identified 35 China-based companies linked to helping North Korean operations. Challenges Hiring processes are so siloed that it's difficult for managers to see all the signs of fraud until the North Korean workers start their roles, Kern said. Even if a company suspects something is wrong, the forensic signals can be subtle and scattered. Security teams may detect unusual remote access tools or strange browser behavior. HR might notice recycled references or resumes that reuse the same phone number. But unless those insights are pooled together, it rarely raises alarms. "There's not one giant red flag to point to," said Sarah Kern, a leading North Korea analyst at Sophos' Counter Threat Unit. "It is multiple technical forensic aspects and then such a human aspect of small things to pick up on that aren't necessarily going to be in telemetry data from an endpoint detection standpoint." Yes, but: Even when these workers are detected, they're not easy to fire. Many of them are so talented that managers are reluctant to even believe they could actually be in North Korea, Alexandra Rose, director at Sophos' Counter Threat Unit, told Axios. If these workers are caught, employers then face a litany of problems: Some workers will download sensitive internal data and extort the companies for a hefty sum in a last-ditch effort to bleed the company of whatever money they can. Some workers have filed legal complaints, including workers' compensation claims, Barnhart said. In one case, Barnhart said he had a worker try to claim domestic violence protections as they were being fired just to buy time. "There is a lot of focus on companies that cybersecurity shouldn't just be for the CISO," Rose said. "You want a bit of that security feel throughout the company, and this is the kind of case that really demonstrates why that is." The bottom line: Some companies also hesitate to report these incidents, fearing they could be penalized for unknowingly violating U.S. sanctions — even though law enforcement officials have said they're more interested in cooperation than prosecution. What's next Right now, the operations are predominantly focused on making money for North Korea's regime. Threat level: But the hacking groups involved are evolving into something more sophisticated and dangerous — including by potentially building their own AI models and feeding in sensitive U.S. company data. That's a particular concern in the defense sector. Barnhart says his teams have seen North Korean IT workers increasingly studying information about AI technologies, drone manufacturing and other defense contract work. What to watch: As U.S. companies become more alert, North Korean IT workers are shifting their focus abroad as they seek employment at other companies and set up laptop farms throughout Europe — suggesting the operation is only just now ramping up, instead of slowing down.

Trump's drone deal with Ukraine is a path to U.S. military reindustrialization
Trump's drone deal with Ukraine is a path to U.S. military reindustrialization

The Hill

time3 minutes ago

  • The Hill

Trump's drone deal with Ukraine is a path to U.S. military reindustrialization

President Trump has long promised to deliver better deals — ones that put American interests, industry and strength first. Coming on the heels of his Alaska meeting with Vladimir Putin, a historic drone megadeal between the U.S. and Ukraine — reportedly valued between $10 billion and $30 billion — offers Trump the chance to pressure Moscow while securing a deal that advances U.S. strategic interests. This deal isn't just a defense contract. It is a strategic bridge between America's current industrial limitations and the wartime production capacity the we need to deter future conflict. It is also a warning shot to China that the U.S. is getting serious about scaling military drone innovation at speed and cost. America's unmanned drone arsenal is not ready for a prolonged fight in the Indo-Pacific. Despite advances in AI and autonomous systems, we face a dangerous gap — we lack the industrial base to produce the volume of smart, expendable and networked uncrewed systems required for high-intensity, multi-domain conflict. That's where this deal comes in. America's industrial base needs time to build factories, establish supply chains that are compliant with Pentagon rules and iterate on product designs to deliver the necessary unmanned systems needed for a fight in the Indo-Pacific. Ukraine, out of sheer necessity, has become the world's most advanced proving ground and manufacturer for uncrewed military systems. In 2024 alone, it produced over 1.7 million drones — fielded, iterated and improved in combat conditions that mirror the future of warfare far more closely than American test ranges in Hawaii or Arizona ever could. From low-cost first-person vehicles to strategic sea drones and long-range deep-strike capabilities, Ukrainian engineers have led the charge for uncrewed systems and what Secretary of Defense Pete Hegseth rightly called 'the biggest battlefield innovation in a generation.' The U.S. shouldn't try to reinvent the wheel. Instead, we should springboard off Ukraine's hard-earned experience to accelerate our own industrial and technological transformation. (Full disclosure: My firm does consulting work in Ukraine, but I have no financial ties to Ukrainian drone companies.) This deal offers three critical advantages. First, it is a strategic bridge to reindustrialization. Building a new defense industrial base in America will take years, if not decades. The Ukrainian drone deal buys us time, capability and breathing room. It delivers operationally relevant drones at scale today, while we rebuild factories, train workers and realign acquisition models to fit a 21st-century fight. It's not a handout — it's a hedge against our current vulnerabilities. Second, the operational gains generated by this deal will have applicability in a potential war in the Pacific. Ukraine's drones, as successful as they have been in trench warfare, won't map one-to-one to a theater characterized by vast maritime distances and denied environments. But Ukraine's deep-strike and naval drone programs — already disrupting Russia's dominance in the Black Sea — have direct applications for U.S. Indo-Pacific Command. Integrating these capabilities into U.S. doctrine will enhance our lethality, expand the kill chain and signal to Beijing that American deterrence is not theoretical. Third, this deal gives us access to the world's best combat-proven drone engineers. And this is where the real opportunity lies. Through long-term partnerships, American companies — from major defense contractors to venture-backed disruptors — can tap into Ukraine's top-tier talent. These are engineers who have lived through a decade's worth of research-and-development cycles over the last two years. Given the multi-year scope of the deal, this isn't a one-off purchase — it's a pipeline of talent, innovation and battlefield iteration aligned to U.S. warfighting priorities. If the U.S. partners deeply with Ukraine on drone innovation, it also denies Beijing access to a combat-proven technology base. It ensures that battlefield-proven AI, swarming tactics and electronic warfare capabilities stay in U.S.-aligned hands. And it turns Ukraine into an asset to help anchor American technological and industrial advantage in a world increasingly defined by great-power competition. Some will argue this is just another foreign entanglement. That is a misread. This is not about subsidizing a foreign war — it's about integrating battlefield-tested systems into American force design, doctrine and war-fighting functions. It's about readiness. And it's about building the industrial muscle to back up our strategy with actual mass. Trump has a unique opportunity to redefine American defense procurement — not as a bureaucratic bottleneck, but as a competitive advantage. This deal embodies his 'Peace Through Strength' doctrine: hard power, smart economics and global signaling all in one move. If Trump leans in, he won't just be supporting Ukraine. He'll lay the groundwork for America's reindustrialization, reshaping deterrence in the Pacific and putting the U.S. back in command of the battlefield technologies of tomorrow. The deal is on the table. The question is, will he seize it?

S&P expects 'meaningful tariff revenue' to offset Trump tax bill impact, maintains U.S. credit rating
S&P expects 'meaningful tariff revenue' to offset Trump tax bill impact, maintains U.S. credit rating

CNBC

time4 minutes ago

  • CNBC

S&P expects 'meaningful tariff revenue' to offset Trump tax bill impact, maintains U.S. credit rating

S&P Global said it expects "meaningful" federal government revenue from President Donald Trump's broad tariff policies to "generally offset weaker" revenue expected from Trump's recently enacted major tax-and-spending bill. S&P Global cited that outlook on Monday as it maintained its AA+ rating on long-term U.S. sovereign debt and its A-1+ rating on "short-term unsolicited sovereign credit." But the company warned, "We could lower the rating over the next two to three years if already high deficits increase, reflecting political inability to contain rising spending or to manage revenue implications from changes in the tax code." It also cautioned that the ratings could "come under pressure if political developments weigh on the strength of American institutions and the effectiveness of long-term policymaking or independence of the Federal Reserve." "This, in turn, could jeopardize the dollar's status as the world's leading reserve currency--a key credit strength," S&P Global said. Trump has imposed wide-ranging and often high tariffs on imports from other countries since regaining the White House in January. In July, Trump's so-called "Big Beautiful Bill" became law. The legislation imposes cuts to federal government spending, while also cutting tax rates. On July 21, the Congressional Budget Office estimated that the law will result in a net increase in the federal budget deficit of $3.4 trillion from 2025 through 2034. "That increase in the deficit is estimated to result from a decrease in direct spending of $1.1 trillion and a decrease in revenues of $4.5 trillion," the CBO said at the time. On Monday, S&P Global said, "Amid the rise in effective tariff rates, we expect meaningful tariff revenue to generally offset weaker fiscal outcomes that might otherwise be associated with the recent fiscal legislation, which contains both cuts and increases in tax and spending." Last week, the Treasury Department said that in July, there was a nearly $21 billion increase in U.S. customs duty collections as a result of Trump's tariff policy. However, the federal budget deficit grew by almost 20% for the same month, according to the department. But S&P Global said its "outlook remains stable, reflecting our expectation of continued resilience in the U.S. economy; credible, effective monetary policy execution; high, but not rising, fiscal deficits that underpin the increase in net general government debt; and the $5 trillion increase in the debt ceiling." "The stable outlook indicates our expectation that although fiscal deficit outcomes won't meaningfully improve, we don't project a persistent deterioration over the next several years," S&P said. "This incorporates our view that changes underway in domestic and international policies won't weigh on the resilience and diversity of the U.S. economy," the company said. "And, in turn, broad revenue buoyancy, including robust tariff income, will offset any fiscal slippage from tax cuts and spending increases."

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store