søndag 18. august 2019

Silver Spifire på vei - Oppdatering og video

Sjekk videoen her: https://tinyurl.com/yyzlaqve

Silver Spitfire pilot log week one: starry send-off propels record attempt into ice-cold skies 

In the first of our video updates on the progress of the Silver Spitfire, pilots Matt Jones and Steve Brooks report from the ground and the air as they head into the Arctic Circle

Last week, the Silver Spitfire project took off from Goodwood with a daring challenge ahead: to complete the wartime aircraft's first ever circumnavigation of the globe.
Helming a restored and slightly modified Mark IX, pilots Matt Jones and Steve Brooks flew north, stopping first in Scotland, then Iceland. Earlier this week, they made it to the Arctic Circle, where the Spitfire's polished silver regalia echoed the pristine white of Greenland's extensive glacier.
In the video above, Jones and Brooks speak of their send-off from Goodwood, where various celebrities including Rosamund Pike turned out to salute the aeroplane; and the challenge of flying through variable weather conditions in the Highlands and beyond. On the way, they've received an escort from a fighter jet, and spent a night partying with rock band Kaleo.
"We've crammed a year's worth of stuff into this week," says chief pilot Matt Jones in the video. "It's exciting – amazing – to have the opportunity see our world like this."
So far, the duo have racked up approximately 14 hours of flight time, and landed at seven different airfields. In the coming weeks, they will be updating Telegraph readers on their adventure, as they head through North America and into the wilderness of western Russia.
The next Silver Spitfire pilot's log will be published at midday on Friday 23 August.
The Telegraph is the official media partner of Silver Spitfire – The Longest Flight. To find out more about the project, visit telegraph.co.uk/silver-spitfire and silverspitfire.com

F-5 vinner Top Gun kontrakt i US Navy - Tyler Rogoway

The Government Accountability Office recently announced it had rejected a protest from the Airborne Tactical Advantage Company, or ATAC, over a U.S. Navy multi-million dollar contract award for “red air” aggressors that went to its less established competitor Tactical Air Support, Inc., or TacAir. The supporting documentation offers extremely interesting insights into the requirements the service had asked of prospective private contractors and the capabilities those firms offered. The information is especially enlightening as the U.S. Air Force is likely taking similar factors into account as they consider bids for their own massive adversary support deal.
GAO only posted its decision online in November 2018, despite having reached its conclusion on Sept. 28, 2018. The decision has been “subject to a GAO Protective Order” and now publicly available in a redacted form. Under the contract, worth $118.9 million over the next five years, TacAir will support the Naval Aviation Warfighting Development Center (NAWDC) and the Navy Strike Fighter Tactics Instructor program, better known as Topgun, both of which are located at Naval Air Station (NAS) Fallon in Nevada. They will also provide aggressor duties for carrier air wing workups which happen a few times throughout the year. A fleet of at least five modified F-5AT jets will fly a combined total of approximately 1,700 hours annually under the fixed-price deal.

F-15 kan hackes - Military Aviation

Hackers Find Serious Vulnerabilities in an F-15 Fighter Jet System

FILE -- An F-15C Eagle takes off from Kadena Air Base, Japan, Jan. 9, 2019. (U.S. Air Force/Airman 1st Class Matthew Seefeldt)
FILE -- An F-15C Eagle takes off from Kadena Air Base, Japan, Jan. 9, 2019. (U.S. Air Force/Airman 1st Class Matthew Seefeldt)
Hackers have successfully infiltrated a data system in an F-15 Eagle fighter jet. But it was with the approval of the Defense Department -- this time, at least.
An ethical hacker group, contracted through the U.S. Air Force and the Defense Digital Service (DDS), was able to infiltrate the fourth-gen jet's Trusted Aircraft Information Download Station, known as the TADS. The news was first reported by The Washington Post.
The TADS collects imagery and other information from the jet's sensors, Dr. Will Roper, assistant secretary of the Air Force for acquisition, technology and logistics, told the Post at the annual DEFCON hacker convention in Las Vegas.
The goal was to find the system's cyber weaknesses, he said in the interview.
Related content:
"They were able to get back in through the back doors they already knew were open," he said.
"There are millions of lines of code that are in all of our aircraft and, if there's one of them that's flawed, then a country that can't build a fighter to shoot down that aircraft might take it out with just a few keystrokes," Roper explained.
The group didn't hack an F-15 per se, explained Air Force spokeswoman Capt. Cara Bousie.
"It was an independent system that is used on an F-15, but it was the system, removed from aircraft, that they were operating on," she told Military.com on Friday. A DDS spokesperson was unable to identify the third-party hacker group by press time.
It is unknown whether the TADS could be hacked the same way in flight.
Bousie said the hacking effort gives the Defense Department a new way of looking at its technological systems and how it can best patch, harden or apply appropriate upgrades to subvert malign actors.
It's now up to the DoD "to see how to best protect against and fix these vulnerabilities," she said.
For the last several years, the Defense Department has weighed better cyber protections on its projects and networks in the face of increased hacking attempts from adversaries such as Russia, China, North Korea and Iran.
In 2016, officials started the "Hack the Pentagon" initiative, run by the DDS, in an attempt to discover where the DoD should beef up its cyber defenses.
The DoD in October expanded the program, awarding $34 million to three companies, HackerOne, Bugcrowd and Synack, to identify security flaws.
-- Oriana Pawlyk can be reached at oriana.pawlyk@military.com. Follow her on Twitter at @Oriana0214.

Grand Caravan gikk av banen - Indonesia - ASN

Type:Silhouette image of generic C208 model; specific model in this crash may look slightly different
Cessna 208B Grand Caravan
Owner/operator:Dimonim Air
C/n / msn:208B2066
Fatalities:Fatalities: 0 / Occupants: 11
Other fatalities:0
Aircraft damage:Minor
Location:Mulia Airport, Papua -    Indonesia
Departure airport:Jayapura Airport, Papua
Destination airport:Mulia Airport, Papua
A Dimonim Air Cessna 208B Grand Caravan veered off the side of the runway on landing at Mulia Airport, Papua. It came to rest when the nose landing gear ran into a drainage ditch. 
Preliminary information suggests the left hand main gear tyre had burst/deflated.

GA ulykke i USA - ASN

Type:Silhouette image of generic C303 model; specific model in this crash may look slightly different
Cessna T303 Crusader
Owner/operator:Pegasus Aviation Inc
C/n / msn:T30300286
Fatalities:Fatalities: 1 / Occupants: 4
Other fatalities:1
Aircraft damage:Written off (damaged beyond repair)
Location:near Hudson Valley Regional Airport (POU/KPOU), Montgomery, NY -    United States of America
Departure airport:Montgomery-Orange County Airport, NY (MGJ/KMGJ)
Destination airport:Sky Acres Airport (44N)
A Cessna T303 Crusader impacted a residential structure in Dutchess County, about 2 miles away on the approach to Hudson Valley Regional Airport (POU/KPOU), Montgomery, NY, when trying to make an emergency landing. 
The aircraft was destroyed during the accident sequence. One of the four occupants onboard was fatally injured. The three remaining occupants survived. The residential structure was occupied by three people, one is unaccounted for, one received fatal injuries, and the last one was not injured.

GA - Goodies fra Garmin - AVweb

Aviation News

lørdag 17. august 2019

Drone - Russisk hybrid løsning - UAS Vision

Russian Hybrid Drone to Appear at MAKS-2019 Airshow

The new “Fixar” drone, set to be presented at Russia’s MAKS-2019 airshow in late August, is a hybrid of sorts, a quadcopter with fixed wings. With limited moving parts and a flexible design, it’s the kind of dual-use technology worth watching and, perhaps, even imitating.

“Many companies and UAV manufacturers will present their aircraft, concepts and models” at the MAKS-2019 airshow, said Samuel Bendett, an adviser at the Center for Naval Analyses. “This Fixar UAV is a ‘self-initiated’ project by the manufacturer, with the hope of getting attention from potential civilian and military customers at the air show.”
Unlike the more eponymous tilt-rotor craft, which switch distinctly from rotor-powered takeoff and landing to propeller-driven level flight, the Fixar instead has its four rotors in a permanently fixed position. The engines remain in position while the whole frame of the aircraft can lean backwards for more traditional vertical flights or stay level to operate as a fixed-wing machine.
While the Fixar’s marketing photos show it working in fields of crops, manufacturer IKS also bills it as designed specifically to operate in windy conditions and in mountains, suggesting that the whole machine might have a role in ISR and cargo transport.
“What caught my attention in particular was that the drone can operate in ‘mountainous conditions’ due to its unique design,” said Bendett. “In fact, Russian military has been practicing the operation of different UAVs at high altitudes and in high wind — so this Fixar UAV can prove useful right away.”
Like all dual-use platforms, a drone is only as useful as the payloads put on it. Cameras and supply storage are likely options, though nothing yet suggests any new demand on the airframe. An ability to fly fast and from small patches of land without a runway is valuable, but it needs to have a certain range and speed to be a better choice than the baseline low cost and simplicity of civilian quadcopters. A large internal security market might support that and could easily lead to the Fixar in police roles, as well.
“At present, there is no UAV in the Russian military that has characteristics similar to the Fixar, but given a steady rate of UAS acquisition by the MOD — at 300 UAVs per year for the next several years — it’s safe to assume that the Russian military is looking to diversify its UAV fleet beyond the workhorses like Eleton or Orlan,” said Bendett.