Back to news

May 28, 2020 | International, Aerospace

How U.S. Open Skies Exit Could Undermine Arms Control

Tony Osborne Jen DiMascio May 28, 2020

The decision by the U.S. government to withdraw from the Open Skies Treaty signed two decades ago is creating ripples of discontent within the U.S. and in Europe.

Washington announced on May 22 that it would end its obligations to the arms control treaty in six months, saying that it was “no longer in the United States' best interest to remain a party to this Treaty when Russia does not uphold its commitments,” in a statement put out by the Defense Department.

The Open Skies Treaty permits its 34 signatories to conduct observation flights over each other's territory. Aircraft with four types of sensors—-optical panoramic and framing cameras, real-time video cameras, infrared line-scanners and sideways-looking synthetic aperture radar—may make observations anywhere over a country's national territory. Treaty rules say that the flight may only be restricted for reasons of flight safety, not for reasons of national security.

NATO and European nations may share U.S. concerns about inconsistent flight restrictions imposed by Moscow but see a U.S. departure from the agreement, in place since 1992, as regrettable.

According to the U.S. and NATO, Russia has imposed restrictions on the treaty, in particular those flying near Kaliningrad, Russia's enclave on the Baltic Sea, and near the country's border with Georgia. The Pentagon also says Moscow blocked the overflight of a major military exercise in September 2019, “preventing the exact transparency the treaty is meant to provide.”

In an op-ed in The New York Times, Tim Morrison, a senior fellow at the Hudson Institute and a former member of this administration's National Security Council, added that Russia has been using its overflights to collect “military relevant intelligence on the other parties, like the means to target critical infrastructure.”

NATO Secretary General Jens Stoltenberg, during the May 22 meeting of alliance members, called on the Russian government to return to compliance as soon as possible, noting that the U.S. could reconsider its position if Russia complied.

European Open Skies Treaty member states—including Belgium, the Czech Republic, Finland, France, Germany, Italy, Luxembourg, Netherlands, Spain and Sweden—said they would continue to implement the treaty, saying it has a “clear added value” for conventional arms control architecture and cooperative security.

Russia rejects the claims of flight restrictions and contends that the U.S. had limited Russia's own Open Skies flights over Hawaii and the Aleutian Islands. Senior Russian officials, including Dmitry Medvedev, deputy chairman of the Russian Security Council, denounced Washington's decision. Medvedev said the U.S. had taken another step down the “path of dismantling the international security architecture that took decades to lay down.”

Moscow believes Washington's decision could also affect other arms control treaties, with negotiations on the next New Strategic Arms Reduction Treaty potentially at risk.

In Washington, the leaders of the House Armed Services and Foreign Affairs committees (both Democrats) have written a letter to Defense Secretary Mark Esper and Secretary of State Mike Pompeo contending that withdrawal from the treaty is illegal. They say it violates the fiscal 2020 National Defense Authorization Act, which requires Esper and Pompeo to notify Congress 120 days before the intent to withdrawal is presented.

“This notification must be based on your joint conclusion that withdrawal is in the best interests of the United States and that other states parties to the treaty have been consulted. To date, this requirement has not been fulfilled,” wrote Reps. Adam Smith (Wash.), the Armed Services chairman, and Eliot Engel (N.Y.), the Foreign Affairs chairman.

President Donald Trump and his administration have support from Repub-licans who lead the Senate for their decision to exit the treaty.

Sen. James Inhofe (R-Okla.), who chairs the Senate Armed Services Committee, asserts that the U.S. should withdraw if Russia is not complying with the agreement. “It will be critical for the Trump administration to continue working with our allies and partners, especially those in Eastern Europe, to ensure they have access to the intelligence they need to protect their security. That includes facilitating access to high-quality imagery.”

The U.S. had planned to upgrade the two Boeing OC-135 aircraft delivered to the Air Force in 1996. Late last year, the U.S. issued a request for information saying it was considering awarding two contracts—one for the purchase of two commercial aircraft and another to modify the airframe and provide logistics support. But the Pentagon did not include funding for OC-135 upgrades in its fiscal 2020 budget request. And in March, Esper told Congress he was not prepared to authorize funding for those upgrades until a path forward is clear.

Several signatories to the treaty have dedicated aircraft for the mission; others share or lease platforms from other nations for the task. Germany is the latest country to dedicate an aircraft for the mission, using an Airbus A319 converted by Lufthansa Technik.

https://aviationweek.com/defense-space/budget-policy-operations/how-us-open-skies-exit-could-undermine-arms-control

On the same subject

  • DARPA: Expediting Software Certification for Military Systems, Platforms

    May 6, 2019 | International, Aerospace, Naval, Land, C4ISR, Security, Other Defence

    DARPA: Expediting Software Certification for Military Systems, Platforms

    Military systems are increasingly using software to support functionality, new capabilities, and beyond. Before a new piece of software can be deployed within a system however, its functional safety and compliance with certain standards must be verified and ultimately receive certification. As the rapid rate of software usage continues to grow, it is becoming exceedingly difficult to assure that all software considered for military use is coded correctly and then tested, verified, and documented appropriately. “Software requires a certain level of certification – or approval that it will work as intended with minimal risks – before receiving approval for use within military systems and platforms,” said Dr. Ray Richards, a program manager in DARPA's Information Innovation Office (I2O). “However, the effort required to certify software is an impediment to expeditiously developing and fielding new capabilities within the defense community.” Today, the software certification process is largely manual and relies on human evaluators combing through piles of documentation, or assurance evidence, to determine whether the software meets certain certification criteria. The process is time consuming, costly, and can result in superficial or incomplete evaluations as reviewers bring their own sets of expertise, experiences, and biases to the process. A lack of a principled means of decomposing evaluations makes it difficult to create a balanced and trustworthy process that applies equally to all software. Further, each subsystem and component must be evaluated independently and re-evaluated before it can be used in a new system. “Just because a subsystem is certified for one system or platform does not mean it is unilaterally certified for all,” noted Richards. This creates additional time delays and review cycles. To help accelerate and scale the software certification process, DARPA developed the Automated Rapid Certification Of Software (ARCOS) program. The goal of ARCOS is to create tools and a process that would allow for the automated assessment of software evidence and provide justification for a software's level of assurance that is understandable. Taking advantage of recent advances in model-based design technology, “Big Code” analytics, mathematically rigorous analysis and verification, as well as assurance case languages, ARCOS seeks to develop a capability to automatically evaluate software assurance evidence to enable certifiers to rapidly determine that system risk is acceptable. “This approach to reengineering the software certification process is well timed as it aligns with the DoD Digital Engineering Strategy, which details how the department is looking to move away from document-based engineering processes and towards design models that are to be the authoritative source of truth for systems,” said Richards. To create this automated capability, ARCOS will explore techniques for automating the evidence generation process for new and legacy software; create a means of curating evidence while maintaining its provenance; and develop technologies for the automated construction of assurance cases, as well as technologies that can validate and assess the confidence of an assurance case argument. The evidence generation, curation, and assessment technologies will form the ARCOS tools and processes, working collectively to provide a scalable means of accelerating the pathway to certification. Throughout the program's expected three phases, evaluations and assessments will occur to gauge how the research is progressing. ARCOS researchers will tackle progressively more challenging sets of software systems and associated artifacts. The envisioned evaluation progression will move from a single software module to a set of interacting modules and finally to a realistic military software system. Interested proposers will have an opportunity to learn more during a Proposers Day on May 14, 2019, from 8:30AM to 3:30PM (EST) at the DARPA Conference Center, located at 675 N. Randolph Street, Arlington, Virginia, 22203. The purpose of the Proposers Day is to outline the ARCOS technical goals and challenges, and to promote an understanding of the BAA proposal requirements. For details about the event, including registration requirements, please visit: https://www.fbo.gov/index?s=opportunity&mode=form&id=6a8f03472cf43a3558456b807877f248&tab=core&_cview=0 Additional information will be available in the forthcoming Broad Agency Announcement, which will be posted to www.fbo.gov. https://www.darpa.mil/news-events/2019-05-03

  • Leonardo awarded contract for 32 TH-73A helicopters by U.S. Department of Defense

    January 15, 2020 | International, Aerospace

    Leonardo awarded contract for 32 TH-73A helicopters by U.S. Department of Defense

    Rome January 14, 2020 - Leonardo, through AgustaWestland Philadelphia Corp., has been awarded a firm-fixed-price contract valued at USD 176,472,608 for the production and delivery of 32 TH-73A helicopters, initial spares, support and dedicated equipment, and specific pilot and maintenance training services. This contract, as Fiscal 2020 aircraft procurement (Navy) funds, was competitively procured via a request for proposal of various offers. Work will be mainly performed at Leonardo's Philadelphia facility and is expected to be completed in October 2021. Alessandro Profumo, Chief Executive Officer Leonardo said, “On the cusp of celebrating nearly 40 years of operating in Philadelphia, Leonardo is thrilled the U.S. Navy has selected our TH-119-based offer and us as a local and long term partner. We are proud to be a core contributor to the future of U.S. defense.” Gian Piero Cutillo, Managing Director of Leonardo Helicopters added, “Today's brilliant news is a ringing endorsement for our solutions setting new industry standards for training. We are committed to working with the U.S. Navy to ensure future pilots meet all evolving service requirements.” William Hunt, Managing Director of Leonardo Helicopters Philadelphia said, “Our plan since day one has been to offer the U.S. Navy the training capabilities they asked for, without compromise. We are honored to deliver on that promise, build the new fleet in Philadelphia and maintain it from Milton, Florida.” View source version on Leonardo: https://www.leonardocompany.com/en/press-release-detail/-/detail/14-01-2020-leonardo-awarded-contract-for-32-th-73a-helicopters-by-u-s-department-of-defense

  • State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage

    April 25, 2024 | International, Security

    State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage

    A new stealthy malware campaign leveraging two zero-day flaws in Cisco networking gear has been uncovered, allowing covert data collection and reconna

All news