Back to news

July 6, 2020 | International, Aerospace

US appears to confirm expanded F-15QA buy for Qatar

by Gareth Jennings

The United States appears to have confirmed an expanded procurement by Qatar of the Boeing F-15QA Advanced Eagle combat aircraft, with recent Department of Defense (DoD) articles and notifications referring to a larger number than officially contracted.

The Gulf state is currently contracted to receive 36 of the latest-generation multirole fighters, with a deal signed in December 2017. However, since at least late-May the DoD has issued no fewer than three official statements in which it has referred to a buy of 48 aircraft. The US State Department initially cleared Qatar to buy 72 aircraft, so this expanded procurement would be in line with current Congressional approvals.

On 23 May the DoD disclosed that the US Army Corps of Engineers had contracted Doha-based company BAH-ICM JV to build facilities for the Qatar Emiri Air Force's (QEAF's) new fleet. In the notification, the department said; “The Foreign Military Sales (FMS) purchase of forty-eight (48) F-15QA aircraft improves the State of Qatar's capability to meet current and future enemy air-to-air and air-to-ground threats”. Janes noted this discrepancy in the numbers at the time, but as it was the first such occurrence this suggested that it may have been in error.

https://www.janes.com/defence-news/news-detail/us-appears-to-confirm-expanded-f-15qa-buy-for-qatar

On the same subject

  • RFP Reveals Main Thrust Of U.S. Counter-Hypersonic Plan

    December 12, 2019 | International, Aerospace

    RFP Reveals Main Thrust Of U.S. Counter-Hypersonic Plan

    Steve Trimble The main thrust of the U.S. Missile Defense Agency's counter-hypersonic strategy has just been revealed. The Regional Glide Phase Weapon System (RGPWS) prototype project demonstrates an interception capability against a medium- or intermediate-range threat. The MDA revealed the existence of the program in a request for prototype proposals released to industry on Dec. 5. An industry day for the RGPWS prototype project is scheduled on Dec. 18 at an MDA facility on Redstone Arsenal, Alabama. The RGPWS shows the MDA is moving faster to field at least a prototype counter-hypersonic capability than previous efforts suggested. The MDA had previously defined a concept for a Hypersonic Defense Weapon System (HDWS). The agency selected 21 proposals from industry in September 2018 for concept definition studies. MDA then down selected to five concepts in late August and early September 2019 for a nine-month-long concept refinement phase. The selected proposals included four kinetic concepts based on existing boosters and one Raytheon-directed energy system. The RGPWS is a parallel effort by MDA to the HDWS. The companies selected for the HDWS concept refinement phase could submit separate proposals for RGPWS. But other companies that were rejected after the concept definition phase or did not participate in HDWS can participate in the RGPWS, says Tom Karako, director of the Missile Defense Project at the Center for Strategic and International Studies (CSIS), who was briefed on the program on Dec. 9. For example, Northrop Grumman's proposal was not down selected for the HDWS concept refinement phase, but it intends to compete for the RGPWS prototype project. “Northrop Grumman is engaged with MDA on Hypersonic Defense Regional Glide Phase Weapon System and will attend the upcoming industry day,” a spokesman says. Northrop has been developing kinetic and non-kinetic options for missile defense, including one concept in the latter category called the Terminal and Regional Electronic Attack Defense System. The acknowledgment of the RGPWS offers a limited glimpse into MDA's development strategy for the burgeoning counter-hypersonic capability. In July 2017, the agency first disclosed plans for funding a hypersonic defense demonstration. An item in the Selected Acquisition Reports for the Ballistic Missile Defense System added $508 million to the program's overall budget to pay for such a demonstration. In March 2019, the agency disclosed it would spend more than $600 million on hypersonic defense capabilities by the end of fiscal 2024. By emphasizing a “glide phase” weapon with a “regional” targeting area, the MDA also provided clues about the intent of the demonstration. It does not appear to be targeting an intercontinental ballistic missile with a nuclear hypersonic glide vehicle as the warhead, such as Russia's Avangard. It is more likely designed to target a hypersonic glide vehicle with regional range, Karako says. Options may include hypersonic glide vehicles on China's DF-17 and DF-21 missiles. “That's a good thing,” Karako says. “It's a smart move for MDA to start there.” Separately, the Defense Advanced Research Projects Agency continues to pursue the Glide Breaker program. It was revealed in July 2018 as a program with a particular interest in “component technologies that radically reduce risk for development and integration of an operational hard-kill system,” according to a DARPA solicitation document. But no further details about Glide Breaker have been released. https://aviationweek.com/defense/rfp-reveals-main-thrust-us-counter-hypersonic-plan

  • Air Force looks to boost electronic warfare with coding, tactics units

    May 1, 2024 | International, Aerospace

    Air Force looks to boost electronic warfare with coding, tactics units

    The 388th Electronic Warfare Squadron will open in Florida Thursday, one week after the 563rd EWS launched in Texas.

  • 3 ways the Navy wants to protect its weapons from cyberattacks

    January 8, 2019 | International, Naval, C4ISR

    3 ways the Navy wants to protect its weapons from cyberattacks

    By: Justin Lynch They have been hacked, tricked and stolen from. Now the message is clear -- no more. The Navy is looking to support research in 36 areas that can help protect weapons systems from cyberattacks, Naval Air Systems Command said in a Jan. 7 update to a broad agency announcement. “It's not necessarily cutting edge research, but it is the first step in cybersecurity quality control that should have already been done,” said Bryson Bort, the founder and chief executive officer of Scythe, a cybersecurity platform. The Navy had admitted as much. Research into protecting the department's weapons comes amid reports that the American military suffers from sustained cyberattacks. In December, an Inspector General report found that some in the Pentagon were not taking basic cybersecurity steps to protect its ballistic missile system. Although the Pentagon's weapons are worth roughly $1.66 trillion, an October report from the Government Accountability Office found that “nearly all” American missiles, jets, ships and lethal equipment in development are vulnerable to cyberattacks. The announcement comes after Congress has mandated the Pentagon address its cyber vulnerabilities. Three of the research areas the Navy is interested are commonly described as the pillars of strong cybersecurity, no matter the institution. They include: Dynamic reconfiguration In an effort to confuse attackers, the Navy wants to research “dynamic reconfiguration.” The National Institute of Standards and Technology defines the term as “changes to router rules, access control lists, intrusion detection/prevention system parameters, and filter rules for firewalls and gateways.” "Organizations perform dynamic reconfiguration of information systems, for example, to stop attacks, to misdirect attackers, and to isolate components of systems, thus limiting the extent of the damage from breaches or compromises,” NIST officials wrote. Research by the University of Maryland's Christian Johnson found that pairing predictive analytics with dynamic reconfiguration tactics, the new approach can lead to the "successful development of learning models that identify specific classes of malware such as ransomware,” Johnson wrote in a paper for the RSA conference. Deception tactics Experts have long used strategies of physical war in digital battles, including with the use of denial and deception tactics. The Navy wants to boost understanding of this area to better secure its weapons systems. In 2015, researchers at MITRE, which conducts federally funded research, advocated for a 10-step process for planning and executing deception operations. “Leveraging classical denial and deception techniques to understand the specifics of adversary attacks enables an organization to build an active, threat-based cyber defense,” a team of researchers wrote. But the Intelligence Advanced Research Project Activity, the intelligence community's research arm, says that the use of deceptive software and hardware in cybersecurity is still in its infancy. “Many techniques lack rigorous experimental measures of effectiveness,” the organization said, adding that “information is insufficient to determine how defensive deception changes attacker behavior.” Artificial intelligence If there was a common denominator of the federal government's investment in cybersecurity it is the use or artificial intelligence. The Navy has embraced artificial intelligence since its Task Force Cyber Awakening project in 2015. “We see that the more we automate our networks and the more we use machines to do the heavy lifting, the better. Our brains do not have the intellectual capacity to process all of that information,” Rear Adm. Danelle Barrett, Navy Cyber Security Division Director,told Defense Systems, a trade publication, in a 2017 interview. More than half of the challenges and research opportunities announced by IARPA in 2018 involved machine learning, according to an analysis by Fifth Domain. Cyber Command has embraced the technology in a short time period, Capt. Ed Devinney, director of corporate partnerships at the body, said during the November Cyber Con conference hosted by Fifth Domain. “If you talked to anyone at the command two or three years ago about a system that would be all autonomous, you probably wouldn't get much traction. But I think there is a growing understanding and consensus that we need to operate at machine speed, especially when talking about active defense of the network,” Devinney said. He said that everyone likes to use the phrases “artificial intelligence” and “machine learning,” however “there aren't that many people who do AI very well.” https://www.fifthdomain.com/dod/2019/01/07/3-ways-the-navy-wants-to-protect-its-weapons-from-cyberattacks

All news