
NORAD Fighter Jets Stage Show of Force Near Russian Border
Newsweek AI is in beta. Translations may contain inaccuracies—please refer to the original content.
United States and Canadian fighter jets assigned to the North American Aerospace Defense Command (NORAD) recently conducted an exercise over Alaska, near the Russian border.
The drill took place on July 10 near Alaska's Little Diomede Island, located in the Bering Strait between mainland Alaska and Russia's Far East. The remote island lies 2.4 miles from Russia's Big Diomede Island, which sits on the opposite side of the international date line.
Newsweek has contacted the Russian Defense Ministry for comment via email.
Why It Matters
Formed by the U.S. and Canada, NORAD provides aerospace warning, aerospace control, and maritime warning in the defense of North America—including the detection, validation and caution of attacks against the continent whether by aircraft, missiles or space vehicles.
The Russian military—along with the Chinese military—has previously sent aircraft near U.S. and Canadian sovereign airspace, within both nations' air defense identification zones. These zones cover international airspace and require the identification of aircraft.
NORAD regularly conducts training to prepare for the interception of foreign military aircraft. In early March, the command's fighter jets and a U.S. bomber carried out a mock interception over Alaska, showcasing its ability to defend the continent at a moment's notice.
What To Know
According to photos released on July 16 by the Alaskan NORAD Region and Alaskan Command, U.S. F-16 and Canadian CF-18 fighter jets flew in formation near Little Diomede Island earlier this month during a "binational force integration" training exercise in Alaska.
North American Aerospace Defense Command CF-18 fighter jets, left, and F-16 fighter jets, right, flying in formation near Little Diomede Island, Alaska, on July 10.
North American Aerospace Defense Command CF-18 fighter jets, left, and F-16 fighter jets, right, flying in formation near Little Diomede Island, Alaska, on July 10.
U.S. Department of Defense
The Alaskan NORAD Region is one of three regions established under the binational command, alongside the Canadian NORAD Region and the Continental U.S. NORAD Region, the latter of which is divided into the Western and Eastern Air Defense Sectors.
In addition to Little Diomede Island, NORAD fighter jets conducted training over Adak in the Aleutian Islands. In the summer of 2023, the U.S. military intercepted 11 Russian and Chinese naval vessels near Alaska's island chain, which extends into the Bering Sea.
"Aircraft from the U.S. and Canada conducted training over Alaska demonstrating the flexibility of NORAD and the binational ability to integrate operations across regions to ensure the defense of North America in the High North," according to a photo caption.
The F-16 fighter jets were launched from Joint Base Elmendorf-Richardson in Alaska, while the CF-18 fighter jets were deployed from Canadian Forces Base Bagotville in Quebec—about 4,349 miles from Alaska, according to the Royal Canadian Air Force.
Canadian and U.S. @NORADCommand aircraft are flying training missions across AK to include over Adak in the Aleutian Islands demonstrating the close integration of forces supporting the defense of North America in the High North. #ArcticSecurity | #WeHaveTheWatch | @RCAF_ARC pic.twitter.com/HO3Q3IbzMd — Alaskan NORAD Region and Alaskan Command (@ANRALCOM) July 11, 2025
The exercise also involved U.S. Air Force KC-135 aerial refueling aircraft and E-3 airborne warning and control system aircraft. The former extends the flight range of fighter jets, while the latter provides battle management, surveillance, target detection and tracking.
What People Are Saying
The mission statement on NORAD's website said: "In close collaboration with homeland defense, security, and law enforcement partners, prevent air attacks against North America, safeguard the sovereign airspaces of the United States and Canada by responding to unknown, unwanted, and unauthorized air activity approaching and operating within these airspaces, and provide aerospace and maritime warning for North America."
The Royal Canadian Air Force said in a Facebook post on July 16: "Canadian and American forces worked shoulder-to-shoulder to integrate our forces, practice operational procedures, and demonstrate our ability to defend both countries in the Arctic through the NORAD partnership."
What Happens Next
The NORAD exercise comes as the U.S. pushes for the establishment of a Golden Dome missile defense system to protect North America. It remains to be seen whether Russia and China will conduct another joint aerial and naval operation near Alaska later this year.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


New York Post
16 minutes ago
- New York Post
Microsoft says China-backed cybercriminals hacked into US nuclear weapons agency
Microsoft has warned that Chinese state-sponsored hackers have breached its SharePoint software used by the US agency responsible for maintaining and modernizing the nation's stockpile of nuclear weapons, according to a report. The National Nuclear Security Administration, a semi-autonomous agency that operates under the auspices of the Department of Energy, was among the targets of a hack allegedly carried out by Chinese-backed cybercriminals, according to Bloomberg News. A Dutch cybersecurity company estimates that around 400 government agencies in the US, Mauritius, Jordan, South Africa and the Netherlands were impacted by the hack, according to Bloomberg News. Advertisement 4 A US government agency responsible for maintaining the nation's stockpile of nuclear weapons was reportedly targeted in a hack by Chinese-backed cybercriminals. U.S. DepartmentofDefense The Dutch firm, Eye Security, previously estimated that just 60 entities were impacted. A source familiar with the situation told the financial news site on Tuesday that no sensitive or classified information was known to have been stolen in the hack, which was made possible by exploiting a flaw in Microsoft's SharePoint document management software. 'On Friday, July 18th, the exploitation of a Microsoft SharePoint zero-day vulnerability began affecting the Department of Energy,' an agency spokesman told Bloomberg News. Advertisement 'The department was minimally impacted due to its widespread use of the Microsoft M365 cloud and very capable cybersecurity systems. A very small number of systems were impacted. All impacted systems are being restored.' The breaches have been ongoing since at least July 7, according to Adam Meyers, senior vice president at CrowdStrike, the cybersecurity firm that has partnered with Microsoft to ward off potential cyber threats. 'The early exploitation resembled government-sponsored activity, and then spread more widely to include hacking that 'looks like China',' Meyers told Bloomberg News. CrowdStrike's investigation into the campaign remains ongoing. Advertisement 4 In a blog post, Microsoft identified two reputed cybercriminal organizations, Linen Typhoon and Violet Typhoon, in the alleged scheme. Bloomberg via Getty Images The Post has sought comment from the NNSA, Microsoft, CrowdStrike and Eye Security. In a blog post, the tech giant identified two reputed cybercriminal organizations, Linen Typhoon and Violet Typhoon, in the alleged scheme to exploit flaws in Microsoft's software that is used by customers on their own networks rather than in the more secure cloud. These customers are at risk of having their data compromised by the hackers, according to Microsoft, which also fingered a third Chinese-based organization, Storm-2603, as doing the same. Advertisement Every morning, the NY POSTcast offers a deep dive into the headlines with the Post's signature mix of politics, business, pop culture, true crime and everything in between. Subscribe here! Microsoft SharePoint is a platform used to store, organize, share and manage internal web content across an organization — similar to intranets. The NNSA wasn't the only agency that was targeted in the alleged cyberattack. Among the victims are the US Department of Education, Florida's Department of Revenue and the Rhode Island General Assembly, which is the Ocean State's legislative body. Internationally, governments in Europe and the Middle East have also been targeted. Cybersecurity researchers have detected breaches on more than 100 servers, representing at least 60 victims across various sectors, including energy, consulting and academia. 4 The National Nuclear Security Administration is a semi-autonomous agency that operates under the auspices of the Department of Energy. Jarretera – Microsoft has patched the vulnerabilities in recent days, but the company expressed concern that hackers will continue to exploit these flaws in future attacks. 'We have high confidence that threat actors will continue to integrate them into their attacks,' Microsoft stated in its blog post. Advertisement 'China opposes and fights hacking activities in accordance with the law. At the same time, we oppose smears and attacks against China under the excuse of cybersecurity issues,' a spokesperson for the Chinese embassy said in a statement. Cybersecurity experts have expressed grave concerns about the severity of the threat. Michael Sikorski, chief technology officer and head of threat intelligence for Unit 42 at Palo Alto Networks Inc., described the situation as a 'high-severity, high-urgency threat.' Advertisement He emphasized the risks posed by SharePoint's deep integration with Microsoft's ecosystem, which includes services like Office, Teams, OneDrive and Outlook — all of which contain valuable data for attackers. 4 This archive picture shows the first B61-13 HiFi nuclear bomb unit completed at Sandia National Labs in Albuquerque earlier this year. Craig Fritz/Sandia National Labs / SWNS Eye Security reported that the flaws allow hackers to access SharePoint servers and steal authentication keys, enabling them to impersonate users or services even after patches are applied. 'We estimate that the real number might be much higher as there can be many more hidden ways to compromise servers that do not leave traces,' Eye Security's co-owner Vaisha Bernard said in an email to Bloomberg News. Advertisement 'This is still developing, and other opportunistic adversaries continue to exploit vulnerable servers.' Despite Microsoft's efforts to bolster its security measures, including hiring executives from government agencies and holding weekly security meetings, the recent breaches have drawn renewed scrutiny. The US government issued a report last year that was critical of Microsoft's lax security culture.


New York Post
an hour ago
- New York Post
Alleged killer dad Luciano Frattolin didn't like ‘being tied down' by daughter, former friend says
Alleged killer dad Luciano Frattolin didn't like being 'tied down' by his young daughter, whom he sometimes only saw once a year, according to a former friend. Frattolin, 45, who is charged with murdering his 9-year-old daughter Melina while on vacation in New York last week, spent most of his time in his birth country of Ethiopia, where he has stakes in a mine and hotel construction, the ex-associate told the Montreal Gazette. 'He loved his daughter, but he didn't like the idea of being tied down,' said the friend, who knew Frattolin when they both lived in Ethiopia. Advertisement 3 Police arrested Luciano Frattolin after he claimed his daughter Melina had been abducted. Essex County Sheriff's Office Melina lived in Canada with her mom, who split with Frattolin when he cheated, according to the former pal, who also fell out with him over a deal where 'some of the funds disappeared.' Frattolin was said to live in Canada but his 'real connection to Montreal was his daughter and his ex-partner, but he didn't have any real connections to Montreal,' said the insider, who asked not to remain anonymous. Advertisement 'From what [Frattolin] said, he truly loved [Melina]. He would visit at least once a year,' the friend said. 3 New York police released an image of Frattolin driving with his daughter on I-87. NYS Police Frattolin is a 'prominent' businessman in Ethiopia, where he was born to an Ethiopian mother and Italian father, the friend said. He founded an iron ore mine there in 2019 along with a Chinese-based company and secured a 20-year contract, according to a report published online and seen by the Montreal Gazette. But tragedy struck that same year when he was assaulted and suffered permanent damage to one of his eyes, the former friend claimed. Advertisement Melina's mother came to visit him in Ethiopia while he was recovering — and found he was seeing another woman, according to the pal. 'That is why they separated,' he said. 3 Melina Frattolin was found dead in a shallow pond after her father reported her missing. Instagram/Luciano Frattolin Frattolin hinted in a since-deleted bio that an 'unfortunate event' in 2019 that he said 'severely affected his well-being' and required a 'long and arduous' road to recovery. Advertisement The friend claimed Frattolin had money woes that forced him to leave Ethiopia for long stretches at a time, often traveling to Italy. 'He had a lot of bills, so any time things were about to blow up, he would travel, and go back [to Ethiopia] once things cooled down,' he said. Follow The Post's coverage on Melina Frattolin Frattolin maintained a luxury lifestyle and was 'very image conscious,' wearing expensive clothes and watches and never flying coach, as evidenced on his Instagram account, the former friend said. 'He was one of the first people to bring a Porsche into Ethiopia. He also had a Land Cruiser, the friend said. 'He had two [luxury] cars, so in Ethiopia, he would be considered a very well-off person.' Frattolin shared a video of his Porsche on his Instagram showing him driving the luxury car over the dirt roads of the East African country alongside an Ethiopian tribesperson. Frattolin pleaded not guilty to murder at a court in Ticonderoga, upstate New York, on Monday. He is due back in court on Friday.


Newsweek
2 hours ago
- Newsweek
China Spy Stole Secret US Missile Tech: DOJ
Based on facts, either observed and verified firsthand by the reporter, or reported and verified from knowledgeable sources. Newsweek AI is in beta. Translations may contain inaccuracies—please refer to the original content. An engineer pleaded guilty on Monday to stealing military trade secrets from a Southern California defense contractor. Newsweek contacted the Chinese Embassy in Washington, D.C., for comment by email outside office hours. Why It Matters The plea comes amid heightened mistrust of China among U.S. officials, fueled by the East Asian rival's state-linked hacking operations, theft of high-tech intellectual property and high-profile cases of espionage. China's policy of military-civil fusion—which ensures that technological advances and research in the civilian sector are shared with the People's Liberation Army—has also rattled Washington and driven counterefforts such as the current curbs on exports of advanced chips to the country. What To Know Chenguang Gong, 59, a dual citizen of the United States and China, admitted to transferring more than 3,600 files to personal devices during his brief tenure at the company, according to a statement from the U.S. Attorney's Office for the Central District of California. Gong was hired by the defense contractor in January 2023 as an application-specific integrated circuit design manager and was tasked with designing, developing and verifying infrared sensors. The unauthorized transfers occurred between March 30 and April 26, 2023, and included blueprints for advanced sensors intended for space-based systems to detect and monitor hypersonic, ballistic and nuclear missiles. Other files contained designs for sensors used to warn U.S. warplanes of incoming heat-seeking missiles and to jam their infrared tracking. The Chinese flag flutters in the wind against a clear blue sky in front of the Chongqing People's Auditorium in Chongqing, China, on June 16. The Chinese flag flutters in the wind against a clear blue sky in front of the Chongqing People's Auditorium in Chongqing, China, on June stolen trade secrets, worth millions of dollars, included files clearly marked "proprietary" and "for official use only." More than 1,800 files were transferred after Gong had already accepted a position with one of the company's competitors. While Gong pleaded guilty to one count of theft, prosecutors said that between 2014 and 2022, he worked at several major U.S. technology companies and repeatedly applied to Chinese government "Talent Programs." These initiatives recruit overseas scientists and engineers to help transfer expertise and technology back to China, including for military purposes. For instance, while employed at a U.S. technology firm in Dallas in 2015, Gong sent a business proposal to a high-tech Chinese organization focused on dual-use goods, detailing plans to develop sensors and analog-to-digital converters of the type being produced by his U.S. employer. He also traveled to China several times in an effort to secure Talent Program funding for the converters, emphasizing their military potential. In a 2019 email cited by the U.S. Attorney's Office, Gong said he "took a risk" with these China trips and stressed that he could "do something" to contribute to China's "high-end military integrated circuits." What People Are Saying The U.S. District Court for the Central District of California said in its February 2024 complaint: "These files describe the methods, designs, techniques, processes, specifications, testing, and manufacture of these technologies and would be extremely damaging economically if obtained by the victim company's competitors, and would be dangerous to U.S. national security if obtained by international actors." What Happens Next China has not commented publicly on the case. Gong is free on a $1.75 million bond, and his sentencing hearing is scheduled for September 29. He faces a maximum 10-year prison sentence.