logo
#

Latest news with #F-18s

Democrat grills Hegseth on whether he'll take 'accountability' for Signal chat once DOD IG report drops
Democrat grills Hegseth on whether he'll take 'accountability' for Signal chat once DOD IG report drops

Yahoo

time12-06-2025

  • Politics
  • Yahoo

Democrat grills Hegseth on whether he'll take 'accountability' for Signal chat once DOD IG report drops

Rep. Seth Moulton, D-Mass., confronted Defense Secretary Pete Hegseth Thursday in a tense exchange over whether Hegseth improperly shared classified details about U.S. airstrikes against Houthi rebels. In what was the sharpest line of questioning during a week of congressional hearings, Moulton pressed Hegseth to take "accountability" if it's confirmed he disclosed sensitive operational timing on an unclassified chat app. "When you texted the launch time for F-18s going into combat over enemy territory, facing anti-aircraft missiles, on an unclassified Signal chat – did that launch time come from Central Command? Yes or no?" demanded Moulton, a Marine Corps veteran. Hegseth declined to give a direct answer, stating that any communication from the secretary of defense is inherently classified. "As you know, having served yourself, any way that the secretary of defense communicates or provides information in and of itself is classified and not to be discussed," Hegseth responded. Moulton pressed again for specifics: "So what was the classification marking of the launch time when it was sent to you? Because DoD regulations require classified information to be labeled. Was it secret or top secret?" Read On The Fox News App Hegseth sidestepped, emphasizing the mission's outcome. "What's not classified is that it was an incredibly successful mission against the Houthis," he said. "OK, so it was classified," Moulton replied. "Are you trying to say that the information was unclassified?" "I'm not trying to say anything," Hegseth said. California Dem Tells Hegseth He's An 'Embarrassment' To The Us, Should 'Get The Hell Out' Of The Dod Moulton then accused the secretary of receiving marked classified information from Central Command and allegedly sharing it outside secure channels. He also noted the Pentagon inspector general is expected to release a report "in a few days" on the matter. "If the DoD inspector general finds what is pretty obvious… that the information was, in fact, classified, do you plan to take any accountability for that?" Moulton asked. Hegseth pushed back, stating, "There were no names, targets, locations, units, routes, sources, methods – no classified information." When pressed again on whether he would accept accountability if the report finds a breach, Hegseth added: "Of course. I serve at the pleasure of the president, like everybody else." Moulton shifted gears to question the cost of the U.S. campaign against the Houthis, citing reports suggesting the operation topped $1 billion. "How many U.S.-flagged commercial ships have transited the Red Sea since your so-called successful operation?" he asked. "The answer is zero." The Pentagon IG probe, launched in April, will examine whether Hegseth improperly discussed operational plans for a U.S. offensive against the Houthis in Yemen and will also review "compliance with classification and records retention requirements," according to a memo from Inspector General Steven Stebbins. Hegseth's Signal messages to the president's principal advisers, leaked when former national security advisor Mike Waltz inadvertently added the Atlantic magazine's Jeffrey Goldberg to the chat, revealed F-18, Navy fighter aircraft, MQ-9s, drones and Tomahawks cruise missiles would be used in the strike on the Houthis. "1215et: F-18s LAUNCH (1st strike package)," Hegseth said in one message notifying the chat of high-level administration officials that the attack was about to kick off. Trump Team's Signal Snafu Sparks Debate Over Secure Comms: 'Russia And China Are Listening' "1345: 'Trigger Based' F-18 1st Strike Window Starts (Target Terrorist is @ his Known Location so SHOULD BE ON TIME – also, Strike Drones Launch (MQ-9s)" he added, according to the report. "1410: More F-18s LAUNCH (2nd strike package)" "1415: Strike Drones on Target (THIS IS WHEN THE FIRST BOMBS WILL DEFINITELY DROP, pending earlier 'Trigger Based' targets)" "1536 F-18 2nd Strike Starts – also, first sea-based Tomahawks launched." "MORE TO FOLLOW (per timeline)" "We are currently clean on OPSEC" – that is, operational security. Trump administration officials have long insisted that nothing classified was shared over the article source: Democrat grills Hegseth on whether he'll take 'accountability' for Signal chat once DOD IG report drops

Hannah Waddingham and Tom Cruise are 'similar-minded geeks'
Hannah Waddingham and Tom Cruise are 'similar-minded geeks'

Perth Now

time08-06-2025

  • Entertainment
  • Perth Now

Hannah Waddingham and Tom Cruise are 'similar-minded geeks'

Hannah Waddingham and Tom Cruise hit it off because they are "similar-minded geeks". The 50-year-old actress appears in Mission: Impossible — The Final Reckoning, the eighth and final film in the franchise, and she got on well with her co-star because they both behave like "ridiculous 12 year olds". She told The Sunday Times magazine: 'We're like ridiculous 12 year olds. Me, him and [the film's director] Chris McQuarrie are very similar-minded geeks. On the aircraft carrier, I was spending hours a day filming F-18s landing and taking off.' Hannah plays a naval admiral and she and Tom, who reprises his role as Ethan Hunt, filmed on the George HW Bush aircraft carrier off the coast of Italy, sleeping alongside 4,500 navy personnel and before they had even arrived, the Ted Lasso star realised just how much of a "lunatic" her co-star could be. She said: 'I was in the admiral's quarters; he'd cleared out to some cot bed somewhere. Tom was in the captain's quarters. 'We'd arrived on a Black Hawk helicopter while the carrier was moving.' As they came into land, Tom told Hannah to film it on his phone. She added: 'He went, 'Welcome to Mission.' I was, like, you're a lunatic.' Hannah has previously been told she was "too big on camera" to be cast and though Jason Sudeikis wasn't worried about hiring the 5ft 11in star for Ted Lasso, she admitted some of the cast, who were not programme regulars, weren't as comfortable filming with her. She said: 'I even had a couple of day players in Ted Lasso going, 'Is it all right if she doesn't wear shoes in this scene?' ' Hannah went to drama school and when she was 19, one female teacher warned her she'd never work on TV because she looked "like one side of her face has had a stroke" and the cruel comments deterred her away from the small screen for a long time. She admitted: 'She really knocked my confidence so much that I then didn't audition for things for years on telly. 'I hope she's rotting somewhere. Silly cow. People like that it's their own insecurities and I know that now.'

Strong action will be taken for planes, drones violating G7 no-fly zone, says RCMP
Strong action will be taken for planes, drones violating G7 no-fly zone, says RCMP

Yahoo

time30-05-2025

  • General
  • Yahoo

Strong action will be taken for planes, drones violating G7 no-fly zone, says RCMP

CALGARY — The RCMP says air restrictions will be in place in two main areas during the upcoming G7 Leaders' Summit in Alberta this June and officials will make sure that no unwanted drones or aircraft enter airspace. Sgt. Mark Basanta from RCMP Protective Operations said the no-fly zones will include both the Calgary International Airport and Kananaskis, where the leaders will be. He said the radius at Kananaskis Village will be 30 nautical miles (56 kilometres), while it will be 20 nautical miles (37 kilometres) at the airport. The restrictions are set to begin at 6 a.m. June 14 and remain in effect until 11:59 p.m. on June 17. Basanta said unauthorized aircraft and drones will be met by RCMP or Canadian Forces aircraft and could be shot down as a last resort. "Shooting is an extreme measure, but yeah, we have the capability to take them down," Basanta said Friday in an aircraft hangar at the Springfield airport, located on Calgary's western edge. "Our hope is if they're heading towards it, there will be a broadcast over their frequency and basically they'll be told to change their heading," he added. "Short of doing that, they can expect to be intercepted by the Canadian Armed Forces that are flying. They will be met. They will be intercepted. We do have F-18s flying a combat air patrol. Hopefully that's enough of a deterrent." Canada will host leaders from the United States, France, Germany, Japan, the United Kingdom and Italy, as well as the European Union at the meeting scheduled from June 15 to 17. Basanta said his biggest concern is the use and popularity of drones. He said there will be a counter-drone team deployed in the Kananaskis region to curb their behaviours. "We have a lot of people in the country, a lot of drone enthusiasts that will be flying, but we do have measures where we can take them down," Basanta said. He didn't specify what the measures could be but said drones pose a "grave risk." "Our main concern is the hobbyists flying the drones inadvertently flying into the aircraft. A threat from a drone is one thing ... it's also ensuring the safety of our own aircraft that are in the air." In January, a California man was charged after operating a drone that crashed into a Quebec water bomber fighting the Palisades Fire in Los Angeles. The CL-415 plane was grounded after the small remote-controlled aircraft flew into it on Jan. 9, leaving a sizable hole in its wing. Basanta said the restrictions will not affect regularly scheduled commercial flights. This report by The Canadian Press was first published May 30, 2025. Bill Graveland, The Canadian Press Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

On protecting classified information, Pete Hegseth picks a fight he can't win
On protecting classified information, Pete Hegseth picks a fight he can't win

Yahoo

time20-05-2025

  • Politics
  • Yahoo

On protecting classified information, Pete Hegseth picks a fight he can't win

Defense Secretary Pete Hegseth covered a fair amount of ground in his latest interview with his former Fox News colleague, Will Cain, and the beleaguered Pentagon chief acknowledged that he's received a lot of criticism since joining the White House Cabinet. In fact, he even suggested he should 'get a medal' because journalists have reported on his many failures. But of particular interest were his comments about the one criticism that apparently bothers him. 'There's a reason why our nation's most closely held secrets are contained in certain places with only access from certain people,' the former Fox News personality said. 'Nobody takes that more seriously than me. 'If there's one thing I've sort of been offended by — I don't get offended by much; I'm here to do my job for the president, for the country — is this idea that I don't take classification or I don't take clearances seriously. Nobody takes it more seriously than me.' I can appreciate why Hegseth is eager to defend himself, especially on a network his boss watches, but all things considered, this was a subject he probably should've avoided. By now, the basic elements of the 'Signalgate' controversy are probably familiar: Top members of Donald Trump's national security team participated in an unsecured group chat about sensitive operational details of a foreign military strike — and they accidentally included a journalist, The Atlantic's Jeffrey Goldberg, in their online conversation. The final paragraph of Goldberg's piece on the fiasco read, 'All along, members of the Signal group were aware of the need for secrecy and operations security. In his text detailing aspects of the forthcoming attack on Houthi targets, Hegseth wrote to the group — which, at the time, included me — 'We are currently clean on OPSEC.'' 'OPSEC' refers to 'operations security.' In other words, the defense secretary was certain that he and his colleagues — while chatting on a free platform that has never been approved for chats about national security or classified intelligence — had locked everything down and created a secure channel of communication. Of course, we now know that Team Trump was most certainly not 'clean on OPSEC,' Hegseth's embarrassing boast notwithstanding. What's more, while there was some discussion of whether their discussion included classified information, there's no denying the chat did include highly sensitive information about times and targets, much of which was put there by Hegseth himself. '1215et: F-18s LAUNCH (1st strike package),' Hegseth told his colleagues in the chat. '1345: 'Trigger Based' F-18 1st Strike Window Starts (Target Terrorist is @ his Known Location so SHOULD BE ON TIME) — also, Strike Drones Launch (MQ-9s).' At one point, the defense secretary literally wrote, 'THIS IS WHEN THE FIRST BOMBS WILL DEFINITELY DROP.' As brutal as those revelations were, they were soon followed by a series of related controversies. The Wall Street Journal reported in late March, for example, that Hegseth brought his wife — who does not have a security clearance — 'to two meetings with foreign military counterparts where sensitive information was discussed.' The Journal also reported that Hegseth used the Signal messaging app for official Pentagon business more extensively than had been previously disclosed, 'engaging in at least a dozen separate chats.' Then, a few weeks ago, the Journal also reported that the Pentagon inspector general was investigating Hegseth's "sharing of military plans to a second Signal chat that included his wife and brother.' It was against this backdrop that Hegseth told a national television audience that 'nobody' takes the protection of classified information 'more seriously' than he does. Among the many unsettling angles to this incident: The defense secretary managed to deliver the line with a straight face. This article was originally published on

What's in your router? Compromised hardware threatens our national security.
What's in your router? Compromised hardware threatens our national security.

The Hill

time10-05-2025

  • The Hill

What's in your router? Compromised hardware threatens our national security.

Threats to national security are constantly changing. While cyberattacks and AI weaknesses often make the news, another hidden danger is compromised computer and network hardware. Bad actors may tamper with the equipment that runs U.S. defense and essential services. Most cybersecurity efforts focus on fixing software problems, but a serious threat lies in the hardware itself. Countries like Russia, China and Iran might carry out long-term 'subtle sabotage' plans by adding hidden weaknesses into key parts like computer boards, microchips and network devices. These hidden changes can stay inactive for years, avoiding regular security checks until they are turned on to cause significant disruptions. This secret risk shows that our hardware can be a weak spot that enemies use whenever they choose. Last fall's Israeli pager attack shows how dangerous this can be. In that case, explosive devices secretly placed by Israel resulted in the deaths and injuries of thousands of Hezbollah terrorists. This event shows how hidden, compromised hardware can be activated remotely to cause massive damage when a determined enemy uses it. The way global supply chains work makes this threat possible. The manufacture of computer chips and boards involves many suppliers worldwide, a complex distribution process, and ongoing maintenance. Every step offers a chance for bad actors to introduce compromised hardware. Enemies can take advantage of many points along the supply chain. Small changes made during design or chip production can hide dangerous flaws. These changes might be further hidden when parts are assembled and tested. As products pass through many hands and locations, it becomes increasingly difficult to check whether they are genuine and safe. This complex process allows fake or tampered hardware to sneak into systems — a 'ticking time bomb' waiting to go off. Fake and unauthorized parts have been found in sensitive systems: Fraudulent electronics sold to the Defense Logistics Agency, for example, were meant for a nuclear submarine and a missile system. Counterfeit Cisco gear was discovered in equipment for F-18s, F- 22s, Apache helicopters and B-52 bombers. These cases reveal a clear risk — if these were found, many more unsafe parts might be hidden in critical systems. The heart of this threat is the deliberate tampering with hardware components using advanced techniques. Bad actors can add hidden circuits, often called 'hardware trojans,' during the design or manufacturing stages, letting them stay hidden until activated to cause a breakdown. Counterfeit microchips that look normal but carry secret backdoors or weakened circuits are equally worrying. And harmful code can be placed in the device's firmware, remaining unseen until it is turned on remotely. All these tricks are designed to pass regular tests and checks, keeping the dangerous features hidden until they are deliberately exploited. Compromised hardware is very dangerous because it stays inactive until remote signals, timers or environmental changes deliberately turn it on. This hidden power can be used to disrupt key systems — to make missiles fail, to change controls in aircraft and submarines, to mess with data flows, and to upset satellites and GPS. Computer networks and data centers are also at risk of attack, which can lead to widespread failures across connected systems. Moreover, these issues break the trust in global supply chains and may create long-term instability in our security. Basically, dealing with compromised hardware forces expensive changes and makes us worry. The fight against this threat requires a strong, multi-layered plan. First, we must secure our supply chain by carefully checking suppliers, tracing every part from start to finish and using trusted manufacturing programs. Better testing methods — such as non-invasive imaging and side-channel analysis — and ongoing checks can ensure every component is safe before it is used. It is also essential for the government and private companies to work together, share information and develop new technology while cooperating with other countries. New rules are needed to enforce strict standards for buying hardware and to support local manufacturing. Finally, we must prepare by setting up dedicated response teams and building strong backup systems to lessen future problems. Compromised hardware is a serious and ever-growing threat to our national security. Its ability to hide in important systems puts us at great risk, and every moment we wait makes the danger worse. We must recognize the full extent of this threat and act now. By taking strong, proactive steps, we can only protect our essential systems and build a defense ready for relentless and smart attacks. Roei Ganzarski is the CEO of Alitheon, an optical-AI technology company focused on ensuring and securing supply chains.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store