Risk

2/26/2010
12:56 PM
50%
50%

Raytheon Lands $886 Million GPS Contract

The project aims to improve the accuracy, reliability, and security of data from GPS satellites.

Raytheon has won an $886 million contract to develop a new segment of the Global Positioning System aimed at improving the accuracy of information coming from GPS satellites.

The contract -- awarded by the Air Force Space and Missile Systems Center at Los Angeles Air Force Base -- covers initial development of what is called the advanced control segment, or OCX, which will include new capabilities that affect GPS control.

The satellite-controlled GPS has three major segments: user, space and control. The control segment includes a master control station and ground antennas. The OCX is meant to separate the control and space segments, according to Raytheon.

Specifically, the OCX will prevent information jamming and improve the security, reliability and accuracy of the GPS. It also will make it easier for the operations team to run both current and future GPS satellites.

OCX will be based on a service-oriented architecture and use both government and industry-accepted open standards, according to Raytheon.

Other companies that will be part of the project include Boeing, Braxton Technologies, Infinity Systems Engineering, and the Jet Propulsion Laboratory.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-2607
PUBLISHED: 2018-05-21
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting vulnerability in console notes (SECURITY-382). Jenkins allows plugins to annotate build logs, adding new content or changing the presentation of existing content while the build is running. Malicious Jenkins users...
CVE-2018-1108
PUBLISHED: 2018-05-21
kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
CVE-2018-11330
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. There is authenticated stored XSS because the character set for filenames is not properly restricted.
CVE-2018-11331
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. Remote PHP code execution is possible because the set of disallowed filetypes for uploads in missing some applicable ones such as .phtml and .htaccess.
CVE-2018-7687
PUBLISHED: 2018-05-21
The Micro Focus Client for OES before version 2 SP4 IR8a has a vulnerability that could allow a local attacker to elevate privileges via a buffer overflow in ncfsd.sys.