Back to news

January 11, 2019 | International, Aerospace

SCAF : le démonstrateur devrait voler « autour de 2025 »

Jean-Dominique Merchet

Le démonstrateur du futur avion de combat franco-allemand devrait « voler autour de 2025 », nous a indiqué ce matin Eric Trappier, président du Gifas et PDG de Dassault-Aviation. « Notre ambition, c'est que le SCAF soit opérationnel en 2040. Il faut donc s'y mettre cette année », a-t-il ajouté. Dix-huit mois après l'annonce politique, le 13 juillet 2017, «une étude sera lancée dès janvier » 2019 et la décision de se doter d'un démonstrateur pour « valider les choix techniques et opérationnels » doit avoir lieu lors du salon du Bourget en juin prochain. Le président du Gifas a confirmé « la volonté affichée d'un leadership français » sur ce projet, qui sera un « système complet intégrant l'avion de combat ». Après le « partenariat historique entre Dassault et Airbus », Eric Trappier a assuré qu'il y aurait de la place pour « tous les autres » acteurs du secteur. Au-delà du SCAF, Eric Trappier a appelé la DGA à avoir une « politique ambitieuse » en matière de démonstrateurs. « On a besoin d'en faire voler un certain nombre afin de valider les choix techniques et opérationnels »

Le président du Gifas a jugé que 2018 avait été « une bonne année » pour l'aéronautique et le spatial français et que 2019 devrait l'être également, malgré l'environnement international « complexe ». Il a notamment insisté sur le « dynamisme » des Etats-Unis et de la Chine, ainsi que sur la nécessité de l'Europe de poursuivre ses efforts en vue de son « autonomie stratégique ».

Le 53e salon du Bourget se tiendra du 17 au 23 juin prochain, cette année étant marquée par un triple cinquantenaire : la création d'Airbus, le premier vol du Concorde et le premier pas d'un homme sur la Lune.

https://www.lopinion.fr/blog/secret-defense/scaf-demonstrateur-devrait-voler-autour-2025-174189

On the same subject

  • Lawsuit threatens $23B weapons sale to UAE

    January 13, 2021 | International, Aerospace

    Lawsuit threatens $23B weapons sale to UAE

    By: Joe Gould WASHINGTON ― A small, 2-year-old nonprofit think tank has taken a step that most advocacy organizations never dare try: It has sued the U.S. State Department to derail a $23 billion arms sale to the United Arab Emirates. In a legal claim announced last month, the New York Center For Foreign Policy Affairs asserted that the Trump administration failed to provide a reasonable explanation for its decision to sell F-35 fighter jets and other weapons to the UAE, which places it in breach of the Administrative Procedure Act. It has asked the U.S. District Court for the District of Columbia to find the sale invalid. The case is unusual, as is the theory of the case, but so is the Trump administration's approach to the sale, said Brittany Benowitz, a legal expert on human rights and arms trade. Such legal challenges rarely succeed, but if this one does, it could halt the deal even if Washington and Abu Dhabi follow through with plans to sign contracts in the waning days of the Trump administration. “If you can say this deal was executed improperly and the contractor was on notice of that, which they are, then I think you can say it's possible to stop the sale before delivery,” Benowitz said. The State Department declined to comment on the pending litigation, in line with its policy. The new lawsuit against the State Department came after a failed attempt in Congress to block the sale of 50 Lockheed Martin-made F-35 aircraft, 18 General Atomics-made MQ–9B Reaper drones and Raytheon Technologies-made munitions. The Senate narrowly rejected a challenge to the sale amid arguments from the administration that the sales would make the UAE more interoperable with partners and defend itself from “heightened threats from Iran.” Opponents said the fast-tracked process was incomplete, leaving questions about the security of U.S. weapons technology, the potential of sparking a Middle Eastern arms race, and the potential for the weapons to be used in Yemen and Libya; these arguments were echoed in the lawsuit. The State Department came under scrutiny for irregularities in a previous sale. Its inspector general, who was later fired, found that a separate “emergency” sale of $8 billion in precision-guided bombs to Saudi Arabia and the UAE failed to “fully assess” or mitigate the risk of civilian casualties in Yemen. To boot, Saudi Arabia and the UAE reportedly breached arms sale agreements with the U.S. by transferring American materiel to al-Qaida-linked fighters and other militant factions in Yemen. Lawmakers have also called for an an investigation into reporting that the UAE may have transferred American-made Javelin anti-armor missiles to the Libyan National Army in violation of a United Nations arms embargo. “What we're saying is that the State Department rushed this through without congressional oversight, they didn't follow their own rules and they didn't apply the same metrics that would guide approval to others,” said Justin Russell, the director of the New York Center For Foreign Policy Affairs. The organization conducts advocacy and research on the conflicts in Libya and Yemen. “Congress tried to block [the sale] on the same merits and when that legislation failed, we said, ‘Wait a minute, we've got to stand up and do something.'” The Administrative Procedure Act allows a court to “hold unlawful and set aside any agency action ... found to be in arbitrary, capricious, an abseils of discretion or otherwise not in accordance with the law.” Here, the lawsuit argues the State Department didn't find, as required under the Arms Export Control Act, that the sale “will strengthen the security of the United States and promote world peace” ― or present “a reasoned explanation” for its actions as required by the Administrative Procedure Act. In 2019, the Campaign Against the Arms Trade won a U.K. Court of Appeal ruling to ban new arms sales to Saudi Arabia. The government has since renewed sales, and CAAT applied for judicial review into the legality of the U.K. government's decision to renew arms sales to Saudi Arabia. In the U.S., there has not been a successful court case of targeting government-to-government sales in recent years, according to Benowitz. What's also unusual about the New York Center For Foreign Policy Affairs' approach is that it doesn't rely on a human rights argument but rather points to aberrations in the process ― particularly past end-use violations that ought to have have disqualified the UAE, she said. “There have been court challenges to arms sales in the past on human rights grounds, but this challenge on national security grounds under the Administrative Procedure Act is unprecedented,” she said. “It's rare because we have never had a record of irregularities like the one we have now.” By Benowitz's reckoning, if a finalized deal is invalidated in the courts and it is found that the deal never should have been entered in the first place, its unlikely the U.S. could be penalized financially by the UAE. “To get a remedy, or damages, under contract law, you have to have ‘clean hands,' so it would be difficult for the Emiratis to recoup,” she said. https://www.defensenews.com/congress/2021/01/12/lawsuit-threatens-23b-weapons-sale-to-uae

  • The new ways the military is fighting against information warfare tactics

    July 22, 2020 | International, C4ISR

    The new ways the military is fighting against information warfare tactics

    Mark Pomerleau One of the clearest examples of how the military wants to defeat adversaries using information warfare is by publicly disclosing what those enemies have been doing and what capabilities they have. Information warfare can be abstract, combining cyber, intelligence, electronic warfare, information operations, psychological operations or military deception as a way to influence the information environment or change the way an adversary think. “At our level, the most important thing we can do is to be able to expose what an adversary is doing that we consider to be malign activity, in a way that allows that to be put in the information environment so that now more scrutiny can be applied to it,” Lt. Gen. Timothy Haugh, commander 16th Air Force, the Air Force's newly established information warfare organization, told reporters during a media round table in late February. One of the first ways the Department of Defense has sought to test this is through U.S. Cyber Command's posting of malware samples to the public resource VirusTotal. Malware samples discovered in the course of operations by the Cyber National Mission Force are posted to the site to inform network owners. It also helps antivirus organizations of the strains build patches against that code and helps identify the enemies' tools being used in ongoing campaigns. Haugh, who most recently led the Cyber National Mission Force, explained how these cyber teams, conducting what Cyber Command calls hunt forward operations, were able to expose Russian tactics. U.S. military teams deploy to other nations to help them defend against malign cyber activity inside their networks. “Those defensive teams then were able to identify tools that were on networks and publicly disclose them, [and] industry later attributed to being Russian tools,” he said. “That was a means for us to use our unique authorities outside the United States to be able to then identify adversary activity and publicly disclose it.” Officials have said this approach changes the calculus of adversaries while also taking their tools off the battlefield. “Disclosure is more than just revealing adversary intent and capabilities. From a cyberspace perspective, disclosure is cost imposing as it removes adversary weapons from the ‘battlefield' and forces them to expend resources to create new weapons,” Col. Brian Russell, the commander of II Marine Expeditionary Force Information Group, told C4ISRNET in June. “Disclosure forces the adversary to ask: ‘How were those capabilities discovered?' It causes them to investigate the cause of the disclosure, forcing them to spend time on something other than attacking us. If I can plant a seed of doubt (messaging) that the disclosure might have been caused by someone working on the inside, it makes them question the system's very nature, perhaps spending more time and resources to fix the system.” The NSA has demonstrated a similar tactic when it created its cybersecurity directorate in late 2019. The entity was formed in part, due to the fact that adversaries were using cyberspace to achieve strategic objectives below the threshold of armed conflict. Now, the directorate uses its intelligence and cyber expertise to issue advisories to the network owners of cybersecurity threats so they can take the necessary steps to defend themselves. One recent advisory had direct bearing on a nation state's malicious activity, according to a senior intelligence official. In late May, the agency issued an advisory regarding a vulnerability in Exim mail transfer agent, which was being widely exploited by a potent entity of Russia's military intelligence arm the GRU called Sandworm. “Quickly thereafter, we saw five cybersecurity companies jumped on it and really used that to deepen and expand and publish information about the GRU's infrastructure that they use to conduct their cyberattacks and further information as well,” the official told reporters in early July. “That was terrific because we felt that that had a direct impact on a major nation state in terms of exposing their infrastructure ... and we saw significant patch rates go up on a vulnerability that we knew they were using. That's the kind of thing that we're looking for.” The military has had to think differently to combat for how adversaries are operating. “A central challenge today is that our adversaries compete below the threshold of armed conflict, without triggering the hostilities for which DoD has traditionally prepared,” Gen. Paul Nakasone, commander of Cyber Command, wrote in prepared testimony before the House Armed Services Committee in early March. “That short-of-war competition features cyber and information operations employed by nations in ways that bypass America's conventional military strengths.” These disclosures or efforts to call out malign behavior have also taken the forms of media interviews and press releases. For example, Gen. Jay Raymond, the head of U.S. Space Command and the commandant of Space Force, said in a February interview in which he detailed what he deemed unacceptable behavior by Russia in space, a surprising charge given how tight lipped the U.S. government typically is about its satellites. “We view this behavior as unusual and disturbing,” he said of Russian satellites creeping up to American ones. “It has the potential to create a dangerous situation in space.” Or consider that leaders from Africa Command on July 15 issued a press release detailing the activities of the Wagner Group, a Russian security company, as acting on behalf of the Russian state to undermine the security situation in Libya. “U.S. Africa Command (AFRICOM) has clear evidence that Russian employed, state-sponsored Wagner Group laid landmines and improvised explosive devices (IEDs) in and around Tripoli, further violating the United Nations arms embargo and endangering the lives of innocent Libyans,” the release said. “Verified photographic evidence shows indiscriminately placed booby-traps and minefields around the outskirts of Tripoli down to Sirte since mid-June. These weapons are assessed to have been introduced into Libya by the Wagner Group.” Moreover, Africa Command's director of operations called out Russia, noting that country's leaders have the power to stop the Wagner Group, but not the will. Sixteenth Air Force, at the request of C4ISRNET, provided a vignette of such behavior from Russia in the form of how it covered up the explosion of a radioactive rocket, dubbed Skyfall. According to the service, Russia took extreme steps to curb monitoring of the site where the explosion took place and sought to conceal the true nature of the explosion potentially hindering surrounding civilian populations from receiving adequate medical treatment and guidance. With new forces integrated under a single commander, using unique authorities to collect intelligence and authorities to disclose, 16th Air Force is now better postured to expose this type of malign activity, which previously the U.S. government just didn't do. Top Pentagon leaders have explained that the dynamic information warfare space requires a new way of thinking. “We've got to think differently. We've got to be proactive and not reactive with messaging,” Lt. Gen. Lori Reynolds, the Marine Corps' deputy commandant for information, told C4ISRNET in an interview in March. “We have been very risk averse with regard to the information that we have. You can't deter anybody if you're the only one who knows that you have a capability.” https://www.c4isrnet.com/information-warfare/2020/07/20/the-new-ways-the-military-is-fighting-against-information-warfare-tactics/

  • £85M contract to boost Type-23 capabilities

    July 5, 2019 | International, Naval

    £85M contract to boost Type-23 capabilities

    The Ministry of Defence has signed an £85 million contract with Rolls-Royce to maintain the engines of the Royal Navy's Type-23 frigate fleet. The contract includes a comprehensive support package to Spey gas turbines, including the overhaul of engines, provision of spares, as well as engineering and safety support. Updates to the turbines are vital as they boost propulsion in the Type-23 Frigates. They are also key pieces of equipment for Anti-Submarine Warfare. The world-beating Type-23 frigate is able to carry out a wide variety of operations, from securing the UK's vital maritime trade routes East of the Suez Canal to safeguarding British interests in the South Atlantic. Defence Minister Stuart Andrew announced the contract at HMNB Devonport where he saw Thursday War training which prepares the Royal Navy for war-fighting, humanitarian relief and emergency situations through a variety of drills and exercises. Defence Minister Stuart Andrew said: This £85m contract demonstrates the UK's commitment to modernisation through the maintenance of our formidable Type-23s. This work continues the British tradition of supporting our closest allies and solidifying our global position as world-leaders in advanced maritime technology and development. The contract will see Rolls-Royce overhaul thirty Type-23 engines from the UK and NATO partners Belgium, Portugal and the Netherlands. The contract is expected to deliver a £35 million increase in savings to the MOD over the next eight years, by incentivising Rolls-Royce to improve repair schemes, minimise unnecessary work and procure spares at a lower cost. This will result in shorter, less expensive overhauls. Rolls-Royce will project manage the support contract, while the main overhaul and repair work will be carried out by RWG based in Aberdeen, supporting up to 25 UK jobs across both companies. Scotland benefits from MOD expenditure of £300 per person each year and a huge investment in local industry and commerce of £1.6 billion. UK Defence also supports over 10,000 industry jobs in Scotland and the nation is renowned for building the world's finest warships including the UK's new aircraft carriers and the Royal Navy's state-of-the-art Type-26 frigates. Defence Equipment and Support Chief of Materiel Ships Vice Admiral Chris Gardner said: The Type 23 frigate is central to Royal Navy operations around the world and keeping it at the forefront of operations is critical. This contract will ensure Rolls-Royce continues to innovate through improving repair schemes, minimising unnecessary work and procuring spares cheaper. This will result in shorter, less expensive overhauls, which is good news for the Royal Navy and good news for the tax payer. Matt Nadin, Director Naval Fleet Services at Rolls-Royce said: This vital support contract builds upon our Rolls-Royce target to achieve and sustain increased Spey engine availability to the Royal Navy and their NATO partners, The Netherlands, Belgium and Portugal. This contract highlights our successful collaboration with the UK Ministry of Defence to provide the technical support and repair activities required to not only keep these engines in-service with the Royal Navy and their NATO partners, but also to deliver increased value for money. https://www.gov.uk/government/news/85m-contract-to-boost-type-23-capabilities

All news