logo
#

Latest news with #F-18s

Strong action will be taken for planes, drones violating G7 no-fly zone, says RCMP
Strong action will be taken for planes, drones violating G7 no-fly zone, says RCMP

Yahoo

time2 days ago

  • General
  • Yahoo

Strong action will be taken for planes, drones violating G7 no-fly zone, says RCMP

CALGARY — The RCMP says air restrictions will be in place in two main areas during the upcoming G7 Leaders' Summit in Alberta this June and officials will make sure that no unwanted drones or aircraft enter airspace. Sgt. Mark Basanta from RCMP Protective Operations said the no-fly zones will include both the Calgary International Airport and Kananaskis, where the leaders will be. He said the radius at Kananaskis Village will be 30 nautical miles (56 kilometres), while it will be 20 nautical miles (37 kilometres) at the airport. The restrictions are set to begin at 6 a.m. June 14 and remain in effect until 11:59 p.m. on June 17. Basanta said unauthorized aircraft and drones will be met by RCMP or Canadian Forces aircraft and could be shot down as a last resort. "Shooting is an extreme measure, but yeah, we have the capability to take them down," Basanta said Friday in an aircraft hangar at the Springfield airport, located on Calgary's western edge. "Our hope is if they're heading towards it, there will be a broadcast over their frequency and basically they'll be told to change their heading," he added. "Short of doing that, they can expect to be intercepted by the Canadian Armed Forces that are flying. They will be met. They will be intercepted. We do have F-18s flying a combat air patrol. Hopefully that's enough of a deterrent." Canada will host leaders from the United States, France, Germany, Japan, the United Kingdom and Italy, as well as the European Union at the meeting scheduled from June 15 to 17. Basanta said his biggest concern is the use and popularity of drones. He said there will be a counter-drone team deployed in the Kananaskis region to curb their behaviours. "We have a lot of people in the country, a lot of drone enthusiasts that will be flying, but we do have measures where we can take them down," Basanta said. He didn't specify what the measures could be but said drones pose a "grave risk." "Our main concern is the hobbyists flying the drones inadvertently flying into the aircraft. A threat from a drone is one thing ... it's also ensuring the safety of our own aircraft that are in the air." In January, a California man was charged after operating a drone that crashed into a Quebec water bomber fighting the Palisades Fire in Los Angeles. The CL-415 plane was grounded after the small remote-controlled aircraft flew into it on Jan. 9, leaving a sizable hole in its wing. Basanta said the restrictions will not affect regularly scheduled commercial flights. This report by The Canadian Press was first published May 30, 2025. Bill Graveland, The Canadian Press Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

On protecting classified information, Pete Hegseth picks a fight he can't win
On protecting classified information, Pete Hegseth picks a fight he can't win

Yahoo

time20-05-2025

  • Politics
  • Yahoo

On protecting classified information, Pete Hegseth picks a fight he can't win

Defense Secretary Pete Hegseth covered a fair amount of ground in his latest interview with his former Fox News colleague, Will Cain, and the beleaguered Pentagon chief acknowledged that he's received a lot of criticism since joining the White House Cabinet. In fact, he even suggested he should 'get a medal' because journalists have reported on his many failures. But of particular interest were his comments about the one criticism that apparently bothers him. 'There's a reason why our nation's most closely held secrets are contained in certain places with only access from certain people,' the former Fox News personality said. 'Nobody takes that more seriously than me. 'If there's one thing I've sort of been offended by — I don't get offended by much; I'm here to do my job for the president, for the country — is this idea that I don't take classification or I don't take clearances seriously. Nobody takes it more seriously than me.' I can appreciate why Hegseth is eager to defend himself, especially on a network his boss watches, but all things considered, this was a subject he probably should've avoided. By now, the basic elements of the 'Signalgate' controversy are probably familiar: Top members of Donald Trump's national security team participated in an unsecured group chat about sensitive operational details of a foreign military strike — and they accidentally included a journalist, The Atlantic's Jeffrey Goldberg, in their online conversation. The final paragraph of Goldberg's piece on the fiasco read, 'All along, members of the Signal group were aware of the need for secrecy and operations security. In his text detailing aspects of the forthcoming attack on Houthi targets, Hegseth wrote to the group — which, at the time, included me — 'We are currently clean on OPSEC.'' 'OPSEC' refers to 'operations security.' In other words, the defense secretary was certain that he and his colleagues — while chatting on a free platform that has never been approved for chats about national security or classified intelligence — had locked everything down and created a secure channel of communication. Of course, we now know that Team Trump was most certainly not 'clean on OPSEC,' Hegseth's embarrassing boast notwithstanding. What's more, while there was some discussion of whether their discussion included classified information, there's no denying the chat did include highly sensitive information about times and targets, much of which was put there by Hegseth himself. '1215et: F-18s LAUNCH (1st strike package),' Hegseth told his colleagues in the chat. '1345: 'Trigger Based' F-18 1st Strike Window Starts (Target Terrorist is @ his Known Location so SHOULD BE ON TIME) — also, Strike Drones Launch (MQ-9s).' At one point, the defense secretary literally wrote, 'THIS IS WHEN THE FIRST BOMBS WILL DEFINITELY DROP.' As brutal as those revelations were, they were soon followed by a series of related controversies. The Wall Street Journal reported in late March, for example, that Hegseth brought his wife — who does not have a security clearance — 'to two meetings with foreign military counterparts where sensitive information was discussed.' The Journal also reported that Hegseth used the Signal messaging app for official Pentagon business more extensively than had been previously disclosed, 'engaging in at least a dozen separate chats.' Then, a few weeks ago, the Journal also reported that the Pentagon inspector general was investigating Hegseth's "sharing of military plans to a second Signal chat that included his wife and brother.' It was against this backdrop that Hegseth told a national television audience that 'nobody' takes the protection of classified information 'more seriously' than he does. Among the many unsettling angles to this incident: The defense secretary managed to deliver the line with a straight face. This article was originally published on

What's in your router? Compromised hardware threatens our national security.
What's in your router? Compromised hardware threatens our national security.

The Hill

time10-05-2025

  • The Hill

What's in your router? Compromised hardware threatens our national security.

Threats to national security are constantly changing. While cyberattacks and AI weaknesses often make the news, another hidden danger is compromised computer and network hardware. Bad actors may tamper with the equipment that runs U.S. defense and essential services. Most cybersecurity efforts focus on fixing software problems, but a serious threat lies in the hardware itself. Countries like Russia, China and Iran might carry out long-term 'subtle sabotage' plans by adding hidden weaknesses into key parts like computer boards, microchips and network devices. These hidden changes can stay inactive for years, avoiding regular security checks until they are turned on to cause significant disruptions. This secret risk shows that our hardware can be a weak spot that enemies use whenever they choose. Last fall's Israeli pager attack shows how dangerous this can be. In that case, explosive devices secretly placed by Israel resulted in the deaths and injuries of thousands of Hezbollah terrorists. This event shows how hidden, compromised hardware can be activated remotely to cause massive damage when a determined enemy uses it. The way global supply chains work makes this threat possible. The manufacture of computer chips and boards involves many suppliers worldwide, a complex distribution process, and ongoing maintenance. Every step offers a chance for bad actors to introduce compromised hardware. Enemies can take advantage of many points along the supply chain. Small changes made during design or chip production can hide dangerous flaws. These changes might be further hidden when parts are assembled and tested. As products pass through many hands and locations, it becomes increasingly difficult to check whether they are genuine and safe. This complex process allows fake or tampered hardware to sneak into systems — a 'ticking time bomb' waiting to go off. Fake and unauthorized parts have been found in sensitive systems: Fraudulent electronics sold to the Defense Logistics Agency, for example, were meant for a nuclear submarine and a missile system. Counterfeit Cisco gear was discovered in equipment for F-18s, F- 22s, Apache helicopters and B-52 bombers. These cases reveal a clear risk — if these were found, many more unsafe parts might be hidden in critical systems. The heart of this threat is the deliberate tampering with hardware components using advanced techniques. Bad actors can add hidden circuits, often called 'hardware trojans,' during the design or manufacturing stages, letting them stay hidden until activated to cause a breakdown. Counterfeit microchips that look normal but carry secret backdoors or weakened circuits are equally worrying. And harmful code can be placed in the device's firmware, remaining unseen until it is turned on remotely. All these tricks are designed to pass regular tests and checks, keeping the dangerous features hidden until they are deliberately exploited. Compromised hardware is very dangerous because it stays inactive until remote signals, timers or environmental changes deliberately turn it on. This hidden power can be used to disrupt key systems — to make missiles fail, to change controls in aircraft and submarines, to mess with data flows, and to upset satellites and GPS. Computer networks and data centers are also at risk of attack, which can lead to widespread failures across connected systems. Moreover, these issues break the trust in global supply chains and may create long-term instability in our security. Basically, dealing with compromised hardware forces expensive changes and makes us worry. The fight against this threat requires a strong, multi-layered plan. First, we must secure our supply chain by carefully checking suppliers, tracing every part from start to finish and using trusted manufacturing programs. Better testing methods — such as non-invasive imaging and side-channel analysis — and ongoing checks can ensure every component is safe before it is used. It is also essential for the government and private companies to work together, share information and develop new technology while cooperating with other countries. New rules are needed to enforce strict standards for buying hardware and to support local manufacturing. Finally, we must prepare by setting up dedicated response teams and building strong backup systems to lessen future problems. Compromised hardware is a serious and ever-growing threat to our national security. Its ability to hide in important systems puts us at great risk, and every moment we wait makes the danger worse. We must recognize the full extent of this threat and act now. By taking strong, proactive steps, we can only protect our essential systems and build a defense ready for relentless and smart attacks. Roei Ganzarski is the CEO of Alitheon, an optical-AI technology company focused on ensuring and securing supply chains.

Thank You for Your Service, Dan Lollis
Thank You for Your Service, Dan Lollis

Yahoo

time06-05-2025

  • General
  • Yahoo

Thank You for Your Service, Dan Lollis

(SPARTANBURG, S.C. (WSPA) – Navy veteran Dan Lollis said he thought his time in the service would be a short stint. 'Obviously, at the time, I didn't know I was going to spend 20 years and then retire,' Lollis told 7 NEWS. 'I had no idea what I was going to do after high school, and I didn't have the means to go to college at the time. And obviously back then, Woodruff was not as built up as it is now.' His dad, an Army veteran, Lollis said he and a buddy signed up to join the Navy. 'I told the recruiter, I said I want something that would correlate to when I get out,' Lollis shared. And for him, that would be a Logistics Specialist First Class. 'When the plane breaks, they'll come to us, and they'll send this paperwork to order parts and stuff for the engines,' Lollis said. 'If anything breaks, it comes to us.' Lollis got his training for his specialty in Meridian, Mississippi. 'At Aviation Storekeeper Aid School, and I was there for two months,' Lollis said. 'And when I left there, then I went to Guam.' Then came deployment. 'I checked onboard the U.S.S. Ronald Reagan,' he said. It was on one of Lollis' many deployments that he would watch the Twin Towers come down. 'We're sitting there looking at the TV,' Lollis continued. 'And we saw the first plane hit the building and everybody at the table, our first reaction was, 'what movie is this?'' Lollis said he knew shortly that the United States would be going to war. 'We were the first carrier to launch airstrikes in Afghanistan,' he recounted. 'So all of us went up on the flight deck and watched the plane leave. F-18s. All the others loaded down with ammunition came back, and they were completely empty.' Lollis explained it was a lot of time away from family. 'My son was born when I was on the Reagan in 2007,' he said. 'And I missed its first two birthdays because I was gone on deployment.' Lollis said he couldn't have done it without his wife. 'As I say, a lot of military wives don't get enough recognition for taking care of the kids,' said Lollis. In 2012, he retired after a 20-year career. 'I enjoyed my time in, like, I went all over the western part of the world. I mean, Hong Kong travel times, Singapore. I went to Dubai Lollis says while it was hard at times, the Navy afforded him a lot. 'By the tail end of my career, I started going to college,' he said. 'And then after I retired, in 2015, I graduated with my bachelor's degree.' Lollis said the Navy gave him skills he still uses today. 'I'm still working in the logistics injury industry, and I'm a defense contractor,' Lollis explained. 'I would have to go around and audit parts and materials for the Department of Defense.' That, and being a dad and husband to his wife, Leanne, and kids, Kaiden and Danica. Dan Lollis, thank you for your service. To nominate a veteran like Dan Lollis to be featured in our Thank You for Your Service series, click here. Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. For the latest news, weather, sports, and streaming video, head to WSPA 7NEWS.

Signalgate: Trump's National Security Adviser to Step Down, Nominated as UN Ambassador
Signalgate: Trump's National Security Adviser to Step Down, Nominated as UN Ambassador

The Wire

time02-05-2025

  • Politics
  • The Wire

Signalgate: Trump's National Security Adviser to Step Down, Nominated as UN Ambassador

In March, Waltz claimed 'full responsibility' for erroneously adding a journalist to a group messaging chat in which senior members of President Donald Trump's administration discussed impending military strikes in Yemen. Waltz said he didn't personally know The Atlantic's editor-in-chief Jeffrey Goldberg, adding he wasn't sure how he ended up in the highly sensitive chat on Signal. At the time, Trump downplayed the lapse which he said 'turned out not to be a serious one' and 'the only glitch in two months,' while expressing his continued support for Waltz. In his Thursday announcement, Trump did not mention the scandal, instead saying: 'Mike Waltz has worked hard to put our Nation's Interests first. I know he will do the same in his new role.' It was not clear yet who would replace the 51-year-old former Republican lawmaker from Florida. One source suggested to Reuters that Steve Witkoff, who has been involved in both the Middle East and the war in Ukraine could be an option. However, Trump said that: 'In the interim, Secretary of State Marco Rubio will serve as National Security Advisor.' What was Signalgate? Signalgate, for which Waltz was considered the main person responsible, was a major embarrassment for the Trump administration. It revolved around a chat on the Signal messaging platform that was being used to discuss imminent military strikes in Yemen. Defense Secretary Pete Hegseth, one of the several top Trump administration officials who were in the chat, shared details of the timing of several strikes targeting a member of the Houthi militant group. The following is a part of the timeline he posted in the group, unaware that a journalist was also present: '1215et: F-18s LAUNCH (1st strike package)' '1345: 'Trigger Based' F-18 1st Strike Window Starts (Target Terrorist is @ his Known Location so SHOULD BE ON TIME.' The White House initially attacked Goldberg for publishing several details on the chat, with Trump calling it a 'hoax.' This led the editor-in-chief to publish the full transcript of the chat. Prior to the this, Waltz had said the chat contained 'no locations,' 'no sources and methods,' and 'no war plans.'

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store