FA50, Palace OKs payment scheme for S. Korean fighter jets


MANILA, Philippines – Malacañang has approved the payment scheme for the purchase of 12 lead-in fighter trainer jets from South Korea, taking the deal to acquire the air assets a step closer to completion.

The defense department has been allowed to make an advance payment of 15 percent of the total contract price to South Korean firm Korean Aerospace Industries (KAI).

The project has an approved budget of P18.9 billion and is one of the big-ticket items in the military’s upgrade program.

Malacañang has also granted the defense department’s request to tap a progress payment scheme, wherein the government will pay the supplier on a mutually-agreed upon schedule.

The approval of the payment scheme was contained in a memorandum signed by Executive Secretary Paquito Ochoa Jr. on Feb. 13.

Defense Undersecretary Fernando Manalo confirmed the approval of the payment scheme for the multibillion-peso project.

Headlines ( Article MRec ), pagematch: 1, sectionmatch: 1

Sources told The STAR the defense department is seeking to complete the negotiations with KAI within the week. Officials are now preparing a contract on the payment scheme.

The government is planning to spend P18.9 billion for the jets to boost the country’s territorial defense capabilities.

It will also spend P135.99 million for the basing support systems of the jets.

KAI initially wanted 52 percent down payment to cover manufacturing costs, but it dropped the payment scheme and agreed to a progressive payment.

Under the new scheme, the government would deliver payments upon completion of certain “milestones” or progress related to the construction of the jets.

Earlier, Defense Secretary Voltaire Gazmin said the delivery of the jets could start in June 2015.

Another issue that was settled was the turnaround time, the period required for the delivery of the jets’ spare parts under a two-year warranty.

It usually lasts 30 to 45 days but KAI initially wanted it prolonged it to 180 days. Both parties have agreed to 60 days.

Source: http://www.philstar.com/headlines/2014/02/21/1292810/palace-oks-payment-scheme-s.-korean-fighter-jets

Cyber Education – Online Security Center of the Defense News Daily PH


Tasking to defeat hacking attempts by external forces

It is important to remember to avoid clicking links and attachments in unfamiliar messages as well as suspicious looking messages that seem to be from someone you know.



For more Cyber Education visit the Online Security Center Defense News Daily PH – https://www.facebook.com/dndphosc

Figure 1.0 Online Security Threats


Botnet—a network of private computers, each of which is called a “bot”(short for “robot”) infected with malicious

software(malware) and controlled as a group without the owners’ knowledge for nefarious and, often, criminal

purposes; computers are typically infected when users open up an infected attachment or visit an infected

website. Infected computers are also referred to as “zombies”

Cloud computing—a technology that uses the Internet and remote servers to maintain data and applications,

allowing users to access applications without installation and access to their personal files from any computer with

Internet access; centralizes storage, memory, processing, and bandwidth; examples include Yahoo email or Gmail

with the software managed by the cloud service providers Yahoo and Google.

Denial of Service Attack/Distributed Denial of Service Attack (DDoS)—type of online computer attack

designed to deprive user or groups of users normally accessible online services; generally involves effort by hackers

to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.

Encryption—the conversion of digital information into a format unreadable to anyone except those possessing a

“key” through which the encrypted information is converted back into its original form (decryption), making it

readable again.

Firewall—software or hardware that, after checking information coming into a computer from the Internet or an

external network, either blocks the transmission or allows it to pass through, depending on the pre‐set firewall

settings, preventing access by hackers and malicious software ; often offered through computer operating


Geotagging—the process of adding geographical location, or label, to photographs, videos, Web sites, SMS

messages, QR Codes, or RSS feeds; a geotag usually consists of latitude and longitude coordinates, altitude,

distance, place names, and other details about the origin of the media being tagged helping users find a variety of

online location‐specific information.

HTTPS—Hypertext Transfer Protocol Secure, provides secure communication over a network, such as the

Internet; basically layers additional security measures over HTTP; used by financial and online commerce websites

to ensure the security of private information.

Keylogger—also called keylogging and keystroke logging, is the action of tracking (or logging) the keys struck

on a computer keyboard; usually runs hidden in the background and automatically records all keystrokes so that users are unaware of its presence and that their actions are being monitored.

Malware—short for malicious software, software that disrupts or damages a computer’s operation, gathers

sensitive or private information, or gains access to private computer systems; may include botnets, viruses, worms,

Trojans, keyloggers, spyware, adware, and rootkits.

Botnet—a network of private computers, each of which is called a “bot” (short for “robot”)

infected with malicious software (malware) and controlled as a group without the owners’

knowledge for nefarious and, often, criminal purposes. Infected computers are also referred to

as “zombies.”

Virus—type of malware that has a reproductive capacity to transfer itself from one computer to

another spreading infections between online devices.

Worm—type of malware that replicates itself over and over within a computer.

Trojan—type of malware that gives an unauthorized user access to a computer.

Spyware—type of malware that quietly sends information about a user’s browsing and

computing habits back to a server that gathers and saves data.

Adware—type of malware that allows popup ads on a computer system, ultimately taking over

a user’s Internet browsing.

Rootkit—a type of malware that opens a permanent “back door” into a computer system; once

installed, a rootkit will allow more and more viruses to infect a computer as various hackers find

the vulnerable computer exposed and attack.

Phishing—sending emails that attempt to fraudulently acquire personal information, such as usernames,

passwords, social security numbers, and credit card numbers, by masquerading as a trustworthy entity, such as a

popular social web site, financial site, or online payment processor; often directs users to enter details at a fake

website whose look and feel are almost identical to the legitimate one.

SMiShing – An alternative form of phishing that occurs via text or SMS message.

Spam—the use of electronic messaging systems to send unsolicited bulk messages (usually advertising or other

irrelevant posts) to large lists of email addresses indiscriminately.

Spyware—a type of malware (malicious software) installed on computers that collects information about users

without their knowledge; can collect Internet surfing habits, user logins and passwords, bank or credit account

information, and other data entered into a computer; often difficult to remove, it can also change a computer’s

configuration resulting in slow Internet connection speeds, a surge in pop‐up advertisements, and un‐authorized

changes in browser settings or functionality of other software.

WiFi—a technology that allows an electronic device (personal computer, video game console, smartphone,

tablet, digital audio player) to exchange data wirelessly (using radio waves) over a computer network.

WiFi Hotspot—a wireless access point to the Internet or other computer network over a wireless local area

network through the use of a router connected to a link to an Internet service provider; frequently found in coffee

shops and other public establishments, a hotspot usually offers Internet access within a range of about 65 feet (20

meters) indoors and a greater range outdoors; many smartphones provide built‐in ability to establish a Wi‐Fi


Glossary Provided by Cyber Security Alliance & Stay Safe Online Organization

Article Provided by:


<p>Defense News Daily PH by <a href=”http://slide.ly?utm_source=embed_link&#8221; target=”_blank” title=”Go to Defense News Daily PH” >Slidely Slideshow</a></p>

NPA Surrenders anew in Bukidnon


NPA Surrenders anew in Bukidnon

NSFA, Panacan, Davao City– NPA team leader Adaser Linggay Dela Mansi Alias Flores 42 years old of Brgy. Canangaan, Cabanglasan, Bukidnoon voluntarily surrendered to 403rd Infantry Brigade Commander Col. Francisco L. Pabayo in Brgy Aglayan, Malaybalay City Thursday night bringing along with him a Carbine rifle, magazine and ammunition.

Said returnee is a member of Section Committee 89 of the CPP/NPA/NDF operating in Cabanglasan and adjacent barangays in Malaybalay City Bukidnon. He admitted that he was a victim of NPA deceptions and he want to live in peace with his family. He is now undergoing interview and for proper disposition. Based on record, there were a total of 271 NPA returnees for the year 2013 and a total of 25 NPA returnees in EastMinCom area of responsibility as of 2014. Dela Mansi will be provided with firearms remuneration as per AFP Guns for Peace Program and livelihood assistance from concerned LGU to be facilitated by the 403rd Infantry Brigade.

Meanwhile, AFP/PNP joint operations continue in the areas of concern in Eastern Mindanao in order to protect the communities from NPA’s extortion, deception and attacks to civilians and civilian properties.

EASTMINCOM Commander Lt. Gen. Ricardo Rainier G. Cruz III earlier expressed confidence that there would be more NPA returnees in the coming days. “This is the result of the collaboration between our local officials, community and our Bayanihan teams on peace outreach in the far flung barangays”. Lt. Gen. Cruz said.

Press Release by the EASTMINCOM

Army AFP Opens its Doors to Civilian Employees

Army Job Opening for Civilians
Army Job Opening for Civilians

Army AFP Opens its Doors to Civilian Employees

Click to access CE.pdf

1. Information Tech Officer II     SG22     42,652.00

• Formulate and implement ICT policies, strategies and programs;
• Manage implementation of operation of Information Technology security controls and
relevant compliance systems;
• Deployment and installation of commercial and in‐house developed software and related
• Network administration including maintenance of hardware and the software systems;
• Good understanding of Windows Server, Linux Server and Active Directory & DNS
• Able to do management reporting, maintenance documentation related to installation,
configuration, maintenance, troubleshooting of systems.
• Good Technical, analytical and troubleshooting skills.

• Minimum of 10 years IT experience with Master’s Degree.
• Proficient in Network and Hardware Administration will be an added advantage.

2. Computer Maintenance Technologist III  SG18     31,351.00

• Plan, design, test, install and connect computers and workstations in a network;
• Troubleshoot hardware, network and software problems;
• Fix and repair PCs;
• Address security and performance issues and systems crashes in GHQ offices;
• Address help desk and Internet connectivity issues, and ensure that employees can
functions in a trouble‐free manner.
• Able to do management reporting, maintenance documentation related to installation,
configuration, maintenance, troubleshooting of systems.
• Good Technical, analytical and troubleshooting skills.

• Minimum of 10 years IT experience.
3. Computer ProgrammerIII     SG18 31,351.00

• Accomplishes programming project requirements by coaching programmers;
• Meets programming standards by following production, productivity, quality, and customer‐
service standards; identifying work process improvements; implementing new technology;
• Plans programming projects by confirming program objective and specifications with
• Arranges program specifications by confirming logical sequence and flowcharts; researching
and employing established operations;
• Verifies program operation by confirming tests;
• Designing complex Database Schema and complex Applications;
• Prepares programmers by providing educational opportunities;
• Updates job knowledge by participating in educational opportunities, reading professional
publications; maintaining LAN and WAN;
• Accomplishes department and organization mission by completing related results as
• Able to do management reporting, maintenance documentation related to installation,
configuration, maintenance, troubleshooting of systems.
• Good Technical, analytical and troubleshooting skills.

• Minimum of 8 years IT experience.

4. Information Systems Analyst II     SG16      26,878.00

• Develops and maintains applications and databases by evaluating client needs; analyzing
requirements; developing software systems;
• Enhances staff accomplishments and competence by planning delivery of solutions;
answering technical and procedural questions for less experienced team members; teaching
improved processes; mentoring team members;
• Arranges project requirements in programming sequence by analyzing requirements;
preparing a work flow chart and diagram using knowledge of computer capabilities, subject
matter, programming language, and logic;
• Confirms program operation by conducting tests; modifying program sequence and/or
• Maintains computer systems and programming guidelines by writing and updating policies
and procedures;
• Maintains professional and technical knowledge by attending educational workshops;
reviewing professional publications; establishing personal networks; participating in
professional societies;
• Able to do management reporting, maintenance documentation related to installation,
configuration, maintenance, troubleshooting of systems.
• Deep understanding on scripts and batch files;
• Committed, positive and hardworking and team player.

• 5 years and above.

5. Computer Maintenance Tech II     SG15     24,887.00

• Provide technical support to end users to resolve moderate to difficult computer software
and hardware problems
• Install, configure, maintain, modify and repair internal computer hardware and systems to
ensure minimum workstation downtime and maximum system availability for the end users
• Install new software packages and upgrades
• Provide routine to semi‐routine maintenance, diagnostics and repair on PC software,
hardware, network and peripherals
• Facilitate training for employees who operate new programs and/or systems
• Assist more senior IT technicians and/or engineers with the development of system
documentation and procedure manuals as required
• Maintain operational records of equipment and work performed • Compile reports onmaintenance, partsreplacement,repairs,modifications and systems
utilization and conduct periodic inventory ofsupplies,tools and spare parts.

• 5 years

6. Computer Programmer II      SG15     24,887.00

• Confirms project requirements by reviewing program objective, input data, and output
requirements with analyst, supervisor, and client.
• Arranges project requirements in programming sequence by analyzing requirements;
preparing a work flow chart and diagram using knowledge of computer capabilities, subject
matter, programming language, and logic.
• Encodes project requirements by converting work flow information into computer
• Programs the computer by entering coded information.
• Prepares reference for users by writing operating instructions.
• Deep understanding on scripts and batch files;
• Committed, positive and hardworking and team player.

• Min of 5 years

7. Information Systems Analyst I     SG12     19,940.00

• Design and suggest innovative changes in application systems.
• Perform various tasks associated with application programming.
• Develop efficiency in the design and maintenance of database resources besides managing
various tasks related to database management.
• Perform full range of works related to application analysis, design, and programming
• Work towards understanding and modifying operating interrelationships between business
applications and operating systems;
• Good understanding of scripts and batch files;
• Committed, positive and hardworking and team player.

• Proficient in Network and Hardware Administration will be an added advantage
• Minimum of 2 years

8. Computer Programmer I      SG11     18,549.00

• Design, code, test, troubleshoot and document software applications
• Provide technical expertise and recommendations in assessing IT software projects and
initiatives to support and enhance company products and service lines
• Investigate and resolve application functionality related issues and provide first level
support and troubleshooting of our systems
• Assist in troubleshooting software application issues
• Produce technical documentation for new and existing applications, and provide first level
system documentation on completed tasks
• Know how to collaborate with users to analyse and define user requirements for ICT
• Able to do management reporting, maintenance documentation related to installation,
configuration, maintenance, troubleshooting of systems.
• Good understanding of scripts and batch files;
• Committed, positive and hardworking and team player.

• Minimum of 1 year.

For inquiry please call (02‐9116001 Loc 4001/4027)


Armor: Filipino M113s Revived And Get Turrets


Armor: Filipino M113s Revived And Get Turrets

The Philippines has hired an Israeli firm (Elbit) to refurbish 24 of their M113 armored vehicles for $19.7 million. In addition to rebuilding the structural, mechanical and electrical elements of the M113s, Elbit will install new fire control systems as well as night vision sensors along with GPS, intercom and radios. The Philippines will also supply the turrets from 14 of its decommissioned Scorpion reconnaissance vehicles. These two man turrets are equipped with a 76mm gun that can provide excellent infantry support. Four of the M113s will be equipped to tow damaged vehicles or carry casualties.



National Security Development Needs Support of the Filipino People

Defense News Daily PH

National Security Development Needs Support of the Filipino People

If you want the 2nd AFP-M to get more funding, more equipment & be faster in acquisition, contact your representative in the congress, let him/her know the importance of a credible-modern Filipino-Military. Inform him/her to legislate more funding for the AFP.

The legalization of funding is done through legislation, through the House of Representatives & then Senate, afterwards the President can have it signed, once legalization is done the only executive branches to hold funds will be the DND & AFP.

– https://www.facebook.com/ArmedForcesofthePhilippineRepublic

Two NPA Leaders Arrested in Separate Incidents



Two NPA Leaders Arrested in Separate Incidents

Two NPA Leaders Arrested in Separate Incidents


Bookmark and Share

Camp Aguinaldo, Quezon City—Two high-ranking leaders of the New People’s Army fell in the hands of government authorities in separate law enforcement operations undertaken by the Philippine National Police and the Armed Forces of the Philippines in Naga City and Quezon Province last February 8 and 9, 2014.

Police elements of Gumaca, Quezon and intelligence operatives of the Southern Luzon Command, AFP under LtGen Caesar Ronnie P Ordoyo arrested NPA leader George Geluz, also known as Ka Mario, in a checkpoint in Gumaca Quezon at 11 p.m. yesterday.

Secretary of the Bicol Regional Party Committee (BRPC), Geluz was arrested by virtue of warrants of arrest for the crimes of robbery in band with arson and double frustrated murder issued in Camarines Norte. Geluz is now detained under custody of Gumaca Police.

Meanwhile, at 2:50 p.m. today, NPA leader Sylvestre Layones, head of the Regional Urban Committee and Executive Committee member of the BRPC, was arrested joint police and military elements by virtue of a warrant of arrest for murder issued in Legazpi City, Albay.

Layones was taken into custody by the police along with Christopher Edrinal another ranking leader of the BRPC.

Source: http://www.afp.mil.ph/index.php?option=com_content&view=article&id=95:two-npa-leaders-arrested-in-separate-incidents&catid=8:afp-news&Itemid=435


3 ranking NPA leaders bagged in Southern Luzon


Two ranking New People’s Army (NPA) leaders were nabbed following operations by the Armed Forces of the Philippines (AFP) and Philippine National Police (PNP) over the weekend in Naga City, Bicol and Gumaca, Quezon.

Police elements of Gumaca, Quezon and intelligence operatives of the Southern Luzon Command under Lt. Gen. Caesar Ronnie P. Ordoyo arrested NPA leader George Geluz, also known as Ka Mario, in a checkpoint in Gumaca at 11 p.m. Saturday.

Galuz, who is the Secretary of the Bicol Regional Party Committee (BRPC), was arrested by virtue of warrants of arrest for the crimes of robbery in band with arson and double frustrated murder issued in Camarines Norte.

He is now under custody of Gumaca Police.

Meanwhile, at 2:50 p.m. Sunday, joint police and militry elements arrested NPA leader Sylvestre Layones, head of the Rodante Urtal Command and Executive Committee member of the BRPC, by virtue of a warrant of arrest for murder issued in Legazpi City, Albay. Also arrested with Layones was Christopher Edrinal, another BRPC ranking leader.

Layones and Edrinal were taken into custody by the police. PNA

Source: http://manilatimes.net/74501/74501/

AFP to pay tribute to artist killed in Bontoc mishap


AFP to pay tribute to artist killed in Bontoc mishap
By Alexis Romero (philstar.com) | Updated February 10, 2014

MANILA, Philippines – The military is paying tribute to an artist who died in the bus mishap in Bontoc, Mountain Province last Friday.

Andrew David Sicam, 35, was one of the artists who led the painting of peace murals around Camp Aguinaldo in Quezon City.

The four-kilometer mural, which depicts scenes of soldiers and civilians working together to achieve lasting peace, is a candidate for the Guinness world record for longest peace mural.

Lt. Col. Harold Cabunoc, chief of the Armed Forces 7th Civil Relations Group, said they have offered the spacious Civil Relations Service multi-purpose hall for Sicam’s wake.

Read more @ http://www.philstar.com/nation/2014/02/10/1288808/afp-pay-tribute-artist-killed-bontoc-mishap

%d bloggers like this: