Friday, April 22, 2011

Boeing, US Navy Mark Delivery of 500th Super Hornet/Growler

ST. LOUIS, April 21, 2011 -- Boeing [NYSE: BA] and the U.S. Navy celebrated a milestone delivery on April 20 in St. Louis: 500 F/A-18E/F Super Hornets and derivative EA-18G Growlers have joined the Navy's tactical aircraft fleet.
The Super Hornet Block II is the Navy's frontline strike fighter, deploying leading-edge technology and multirole strike capability around the globe. The EA-18G is now the premier airborne electronic attack platform in the Navy's arsenal and the United States' newest tactical aircraft, providing the ability to block enemy radar and electronic systems.
"The Super Hornet and Growler, both combat-deployed, have continuously increased capability for the warfighter while reducing cost for the Navy and the taxpayer," F/A-18 and EA-18 Programs Vice President Kory Mathews said at the ceremony. "Boeing has delivered every F/A-18E/F and EA-18G to the U.S. Navy on budget and ahead of schedule."
"Today is another significant milestone for a program that has by any measure exceeded expectations for cost, schedule and performance," said Capt. Mark Darrah, F/A-18 and EA-18G program manager (PMA-265). "The PMA-265/Hornet Industry Team has consistently delivered capable and reliable aircraft to our fleet customer."
The F/A-18E/F and EA-18G will operate from U.S. Navy aircraft carriers through 2035 and beyond, with the flexibility to seamlessly operate from land-based airfields.
"These aircraft were designed with extensive growth capacity, enabling evolutionary technology to be added throughout the life of the aircraft to expand capabilities and remain well ahead of changing threats," said Mathews.
The Boeing F/A-18E/F Super Hornet is a multirole aircraft able to perform virtually every mission in the tactical spectrum, including air superiority, day/night strike with precision-guided weapons, fighter escort, close air support, suppression of enemy air defenses, maritime strike, reconnaissance, forward air control and tanker missions. The Super Hornet Block II achieved Initial Operational Capability in 2007.
Boeing is on contract to deliver 24 two-seat F/A-18F Super Hornets to the Royal Australian Air Force. The Super Hornet also is a competitor in ongoing fighter competitions in Brazil, India, Malaysia and Japan.
The Boeing EA-18G Growler is the only air combat platform that delivers full-spectrum airborne electronic attack (AEA) capability along with the targeting and self-defense capabilities derived from the Block II Super Hornet. A derivative of the two-seat F/A-18F Block II, the EA-18G's highly flexible design enables warfighters to operate either from the deck of an aircraft carrier or from land-based airfields. It is replacing the Navy's current AEA platform, the EA-6B Prowler, which has been in service since 1971. The EA-18G joined the Navy's aircraft fleet in 2008, when it was introduced to fleet training squadron VAQ-129. The EA-18G achieved Initial Operational Capability in 2009.
A unit of The Boeing Company, Boeing Defense, Space & Security is one of the world's largest defense, space and security businesses specializing in innovative and capabilities-driven customer solutions, and the world's largest and most versatile manufacturer of military aircraft. Headquartered in St. Louis, Boeing Defense, Space & Security is a $32 billion business with 66,000 employees worldwide.

Indonesian Navy successfully tests Russian anti-ship missile

MOSCOW, April 21 (RIA Novosti) - The Indonesian Navy has successfully tested a Russian-made anti-ship missile for the first time, the Antara national news agency reported on Thursday.
The Yakhont anti-ship missile was launched on Wednesday from the Van Speijk class frigate, Oswald Siahaan, during naval exercises in the Indian Ocean. Russian observers oversaw the drills, which involved 12 ships and over 1,000 personnel.
It took six minutes for the missile to cover 250 nautical miles and destroy a designated target.
"The target ship was hit [by the missile] and sank," Navy spokesman Rear Admiral Iskandar Sitompul said. "We bought these missiles a long time ago, and have finally tested them."
Indonesia bought an undisclosed number of Russian SS-N-26 Yakhont supersonic anti-ship cruise missiles for $1.2-million apiece in 2007 to replace Harpoon missiles on its frigates.
The missile has a maximum range of 300 kilometers when cruising at high altitude. It flies at low level during the terminal phase, and between 5 and 15 meters in altitude.

Is China Developing a VSTOL Fighter?

TAIPEI - China may have test-flown the J-18 Red Eagle vertical short takeoff and landing (VSTOL) fighter earlier this month, if chatter on Chinese-language military blogs is accurate.
China's defense industry is largely opaque and it is difficult to substantiate Internet chatter. However, Chinese-language military blogs reported the first test flight of the stealthy J-20 Black Eagle fighter in January, much to the surprise of the Western media.
Now there are reports emerging of a test flight of the J-18. Tests were supposedly conducted earlier this month and the fighter is similar to the Sukhoi Su-33 carrier-based fighter.
"In 2005, a Chinese aviation industry source told me the Chengdu Aircraft Corporation was considering a F-35B-like program," said Richard Fisher, vice president of the Washington-based International Assessment and Strategy Center. "Given the PLA's naval power projection ambitions, it is probable there is VSTOL or STOVL [short takeoff and vertical landing] fighter program."
There are "many alleged programs in the Chinese blogosphere," Fisher said.
These include a J-16 built by the Shenyang Aircraft Corporation (SAC), which is a stealthier dedicated attack version of the J-11B (Su-27) multirole fighter with active electronically scanned array radar and an internal weapons bay, which will "reportedly emerge this summer," he said.
China is expected to begin sea trials for its first aircraft carrier this summer. Analysts believe the J-15 Flying Shark, a copy of the Sukhoi Su-33, will be China's first carrier-based fighter. SAC procured an earlier prototype of the Su-33 from the Ukraine in 2001 and the J-15 reportedly conducted its first test flight in mid-2009.
There have also been questionable Chinese-language military blogs providing sketchy reporting on J-17 and J-19 fighter programs. Reportedly, the J-17 is long-range fighter-bomber based on the Russian Sukhoi Su-34 and the J-19 is a heavy multirole fighter based on the J-11B.

Thursday, April 21, 2011

Pakistan Air Force on track


Pakistan inducted the new Lockheed Martin F-16 Block 52+ fighters in their Air Force, while in the mean time the next two full-strength squadrons of Chengdu/Pakistan Aeronautical Complex JF-17 Thunders are close to becoming fully functional.
According to the service, the 17 F-16 Block 52+ fighters were inducted into the 5th Squadron on March 11. The final aircraft of the 18-unit deal is still being tested in the USA and is scheduled to arrive some time next month.
The new batch of the aircraft features 12 single-seat C-model versions and six two-sweat F-16Ds. The air force also states that it is negotiating with the USA for additional Block 52+ fighters due to a point in the contract which contained an option for extra 18 aircraft.
The new F-16s are being powered by Pratt & Whitney F100-229 engines. One of the other systems implemented in the F16 is Northrop Grumman’s mechanically scanned APG-68(V)9 radar and ITT’s ALQ-211(V)9 advanced integrated defensive electronic warfare suite.
The US Defense Security Cooperation Agency also offered a weapons package which included 500 Raytheon AIM-120C5 advanced medium-range air-to-air missiles, 200 short-range AIM-9M-8/9 Sidewinders, 1600 enhanced GBU-12/24 laser-guided bombs, 500 Boeing joint direct attack munitions and 700 BLU-109 penetrator bombs.
There is also a mid-life upgrade scheduled for the 34 F-16A/B Block 15 aircraft. Some of the fighters will be upgraded in Turkey, while others in Pakistan. The project is most likely to be completed by 2012.
Zeng Wen, vice-president of the China National Aero-Technology Import and Export Corporation (CATIC) stated at Air Show China, that Pakistan had 50 firm orders for the JF-17, but in the end they could buy up to 200.
The JF-17s will be used to replace fighters like the Dassault Mirage III, Mirage 5, Nanchang A-5 and the Chengdu F-7. All A-5s will be decommissioned in early April.
China and Pakistan have been known to cooperate on the development of the JF-17. Pakistan began the assembling in 2009 and can implement Western avionics, radars and various other systems in the JF-17 by 2012.

Pakistan Navy foiled first-ever piracy attempt in Pak

Friday was a great day for the Pakistan Navy as they in cooperation with the multinational naval Combined Task Force, successfully stopped the first-ever piracy attempted in Pakistan’s territorial sea.The pirates attacked on the Philippine Commercial flag vessel MV FALCON TRADE-II which operates in the Southern extremity of the Pakistan Exclusive Economic Zone (EEZ).
An official spokesperson of the Pakistan Navy stated that this was the first time a piracy attempt was reported and countered in EEZ of Pakistan.
A spokesman for Pakistan Navy said that this was the first time a piracy attempt was recorded and countered in EEZ of Pakistan.
Earlier, at the multi-national naval exercise Aman-11 from March 8 to March 12, the Pakistan Navy reported that it has adopted special measures in order to tackle the issue of piracy attacks against merchant vessels in the Indian Ocean as this has become a frequent threat near the Exclusive Economic Zone (EEZ) of Pakistan.
The PN Spokesperson spoke further about the entire anti-piracy operation. On the 24th March, the PN intercepted communications of a pirates attack on a Philippine flag vessel with 20 personnel onboard. The PN immediately contacted the Pakistan Navy’s Ship Babur with embarked helicopter and Maritime Patrol Aircraft to acquire the position of the pirate boats.
Special Operating Force (SOF) onboard fast boats, specifically tuned for counter piracy operations were also sent to tackle the pirates. PNS Babur, in a close liaison with CTF-151 and the assistance of US Ship tasked by CTF-151, confined the pirates, who failed to enter the enclosed citadel boundary of the merchant ship.
Thanks to the fast action of the Pakistan Navy and CTF-151, the pirates were forced to abort the operation and flee. Currently the merchant vessel is safe and under control of its crew.
The PN said it continued to maintain a constant watch on its sea territories and it is ready to respond to any situation at sea.

Biden-Putin Talks Touch on Missile Defense

WASHINGTON - U.S. Vice President Biden and Russian Prime Minister Vladimir Putin on April 21 discussed Moscow's goal of joining the World Trade Organization and missile defense cooperation, the White House said.
Biden and Putin talked about "the Obama administration's commitment to terminate" the application to Russia of a Cold War-era U.S. law that blocks certain non-market economies that restrict emigration from joining the WTO.
They also discussed "next steps on missile defense cooperation" and "agreed on the importance of continuing momentum in relations between the United States and Russia," according to a White House statement.
"Vice President Biden underscored the continued need for cooperation between the United States and Russia on global security issues and pledged to continue to work with Russia on facilitating travel between our two countries," it said.
Moscow needs Washington to stop applying the so-called Jackson-Vanik law to Russia in order to gain U.S. "permanent normal trade relations" - and be cleared for WTO accession.
Russia is the last major economic power to lack WTO membership.
The conversation came a day after Putin needled the United States over its deficits and national debt and accused Washington of "behaving like a hooligan" by flooding world markets with devalued dollars.
"Look at their trade balance, look at the budget deficit, at the debt of the United States," Putin said in closing comments to his annual address to parliament.
"We have none of that - and, I hope, we never will," Putin said to a strong round of applause.

From Cyber Service to Product

Cybersecurity vendor Symantec is trying something new with its malware honey pots - selling them.
Like competitors McAfee and Sophos, the Mountain View, Calif., company has long owned and operated thousands of so-called honey pot PCs around the world. When one of these PCs is infected by a virus or probed by a hacker, the malware is captured and sent to a company lab, where analysts try to reverse-engineer it as the first step toward alerting government agencies, corporations or consumers.
In February, Symantec surprised its competitors by announcing that it would package up versions of its honey pot sensors and automated analytic tools and sell them to U.S. government agencies, NATO and major corporations.
These customers believe that keeping analysis in-house will keep the authors of malware in the dark as long as possible, allowing investigators the maximum time to track keystrokes, decipher tactics and ferret out motive and strategy. "When it's everyday kind of malware, [agencies and corporations] are still depending on us to do all the work for them," said Chet Wisniewski, senior security adviser for the cybersecurity firm Sophos, headquartered in Abingdon, England, and Burlington, Mass. "When it's something specific, that means that somebody was trying to get into their organization, they have a tendency to be a lot more cautious and to do a lot of that internally."
Symantec officials told reporters in February that the move would allow agencies to react more quickly to increasingly sophisticated, pinpoint malware attacks.
"We need to be able to give them a technology that they can house and own and operate sometimes in classified situations where they have access to all of the information that they need to move forward with their missions," said Joe Pasqua, vice president of research for Symantec.
Pasqua said the secret option is necessary for some customers. With the traditional approach of publishing a malware signature to help others spot the bad code, "the adversary will know, 'Aha. They've detected this exploit,'" he said. "If you're a government agency, you may not want to do that. You may want to protect some of the information you have."
It would be up to the customers to decide "what they want to keep public, what they want to keep private," he said.
But the company's competitors said Symantec's new approach wouldn't necessarily help customers.
Dave Marcus, director of security research for McAfee Labs, based in Santa Clara, Calif., said he understands the logic behind an agency's desire to have its own tools, but those tools are worthless in a vacuum, he said.
"If you're giving them tools to do their own analysis automatically, then what?" he said. "You can know what the threat is, you can know what the malware does, but unless you can write some content to protect against it, the analysis doesn't do a whole lot."
Wisniewski of Sophos said the products could be dangerous if they were leaked by a customer.
"The offensive cyber capabilities [of the U.S. military and intelligence community] could be tripped up by something like this," he said. "What happens if a foreign company or foreign government that we might want intelligence from captures our offensive techniques?" Symantec is "a well-respected vendor in the industry and all that, but at the same time, it seems like it's a complicated business to get into," Wisniewski said.
Symantec points out that the U.S. National Security Agency's Information Assurance Directorate is leading development of an anti-malware countermeasures standard, called the Security Content Automation Protocol. Agencies that find malware could draft their software responses to this standard. Baiting the Trap The core of the Symantec proposal is a product in its alpha development stage known internally as ScriptGenNet, or SGNet. It would consist of PC-sized honey pot computers programmed to look just like Web, mail or file transfer protocol (FTP) servers, attached to, say, the U.S. government's Nonclassified Internet Protocol Router Network, and the Secret Internet Protocol Router Network.
"We want to entice [malware users] to think that they are in a pristine network," said Rob Walters, senior director for Symantec Research Labs. "They can look around and go, 'Whoa, this has got some good stuff that I need.'" Software would scan incoming digital communications for evidence of computer language that is out of the norm - a possible indicator of malware. The system would automatically steer the digital conversation to a more powerful backend computer, which would continue the conversation using a more detailed simulation of the Web, mail or FTP server.
"It keeps that discussion going with the attacker. The attacker can't figure out that it's just a bait machine," Pasqua said.
All the while, the conversation would be automatically analyzed, and if malware were diagnosed, the code would be sent to another computer, called the Symantec Malware Analysis and Research Triage Harness.
Automation would be key.
"These government agencies don't want more data. They want more intelligence. You give them more data, and it's more stuff to swim around in," Pasqua said. "What they really want is to take these huge feeds of security information and whittle them down."
He said the security companies and government agencies have no choice but to automate. In a tactic called polymorphism, malware authors are using software to rapidly create new versions of their code so it cannot be easily picked up by security software.
"They want to keep us busy," Walters of Symantec said.