Back to news

July 3, 2018 | International, Aerospace

Will the F-35 beat out ‘the usual suspects’ in Singapore’s search for F-16 replacement?

By:

MELBOURNE, Australia ― Singapore will decide in the next few months on a new fighter to replace its fleet of Lockheed Martin F-16 multirole fighters, with the F-35 Lightning II Joint Strike Fighter from the same manufacturer seen as the prime candidate.

In an interview with media ahead of the southeast Asian island nation's Armed Forces Day, Defence Minister Ng Eng Hen said that despite ongoing upgrades, the F-16s face obsolescence beyond 2030. He added the country will make a definitive decision on its replacement in the next few months based on interoperability with Singapore's current systems and platforms as well as the price.

Ng refused to be drawn into further details as to which fighter platforms Singapore is looking at, only saying that the BAE Systems Typhoon, the F-35, Russia's Sukhois, and Chinese-made stealth fighters are “the usual suspects that you have to look at” when air forces are choosing a new combat platform.

However, Singapore has been evaluating the F-35 since 2013 and Ng had previously suggested that the type was suited to be the replacement for Singapore's F-16s. Earlier reports suggested Singapore is keen on acquiring the F-35B short-takeoff-and-vertical-landing variant, with the B-model's STOVL capability seen as useful for Singapore, whose main island has an area of a mere 277 square miles and whose air bases are seen as vulnerable to a first strike.

Nevertheless, former head of the F-35 program Christopher Bogdan, said Singapore requested information on all three variants of the F-35, and the possibility of Singapore opting for the conventional takeoff and landing F-35A variant cannot be ruled out.

Singapore is a security cooperative participant of the F-35 program and is believed to have an eventual requirement of between 40 and 60 new fighters to replace its F-16s.

The Republic of Singapore Air Force, or RSAF, currently operates a fleet of 60 F-16C/D Block 52 and Advanced Block 52 aircraft delivered between 1998 and 2005. Twelve aircraft are currently assigned to a joint continuation training unit between the U.S. and Singapore air forces at Luke Air Force Base, Arizona, while the remaining are split between three Singapore-based squadrons.

Singapore's F-16s are currently being upgraded by Lockheed Martin with the upgrade program, which started in 2016 and is expected to be completed in 2022, including the addition of Northrop Grumman's AN/APG-83 active electronically scanned array radar, an improved identification, friend or foe system, as well as Link 16 data links.

During the interview, Ng also outlined some of the other upcoming procurement programs Singapore is looking at. These include new multirole combat vessels to replace six corvettes and new joint multimission ships to replace four amphibious ships in Singapore's Navy, while the Army will replace its towed 155mm howitzers with a new self-propelled high-mobility artillery system in the 2020s.

https://www.defensenews.com/air/2018/07/02/will-the-f-35-beat-out-the-usual-suspects-in-singapores-search-for-f-16-replacement/

On the same subject

  • Navy selects principal cyber advisor to replace St. Pierre

    February 14, 2024 | International, Naval

    Navy selects principal cyber advisor to replace St. Pierre

    “Each and everyone of us in this room today has a responsibility to cybersecurity,” said Scott St. Pierre, the service's current principal cyber advisor.

  • Audit finds cyber vulnerabilities in US missile defense system

    December 17, 2018 | International, C4ISR

    Audit finds cyber vulnerabilities in US missile defense system

    By: Geoff Ziezulewicz The Army, Navy and Missile Defense Agency are failing to take basic cybersecurity steps to ensure that information on America's ballistic missile defense system won't fall into nefarious hands, according to a Defense Department Inspector General audit released Friday. Investigators visited five sites that manage ballistic missile defense elements and technical information, but the names of the commands were redacted in the publicly released report. “The Army, Navy and MDA did not protect networks and systems that process, store, and transmit (missile defense) technical information from unauthorized access and use,” the declassified report states. Such inadequacies “may allow U.S. adversaries to circumvent (missile defense) capabilities, leaving the United States vulnerable to missile attacks,” the report states. They found officials failed to employ safeguards familiar to most people online in 2018, the latest development to raise questions about the U.S. military's cybersecurity vulnerabilities. Among the shortcomings: Administrators for classified networks had no intrusion detection and prevention systems in place to watch for cyberattacks, much less stop them, according to the report. At one site, officials said they had requested to purchase those cyber safeguards in December 2017 but nine months later it still hadn't been approved. “Without intrusion detection and prevention capabilities, (the site) cannot detect malicious attempts to access its networks and prevent cyberattacks designed to obtain unauthorized access and exfiltrate sensitive (missile defense) technical information,” the report states. Officials also failed to patch system flaws after receiving vulnerability alerts, one of which had first been identified in 1990 and had still not been fixed by April. Another vulnerability that could be exploited by an attacker was first identified in 2013 but also was never pathced, according to the report. “Countless cyber incident reports show that the overwhelming majority of incidents are preventable by implementing basic cyber hygiene and data safeguards, which include regularly patching known vulnerabilities,” the IG report states. “(Missile defense) technical information that is critical to national security could be compromised through cyberattacks that are designed to exploit these weaknesses.” Some facilities failed to force employees to use common access cards, or CAC, when accessing the classified system, a basic cybersecurity practice known as multi-factor identification. Instead, officials were able to access the sensitive information using just a username and password, the report states. Hackers use phishing and other tactics to exploit passwords and gain access to such systems. New hires are supposed to be allowed network access without a card for only their first two weeks on the job. But IG investigators found users on the systems without CAC cards for up to seven years. At one site, a domain administrator never configured the network to allow only CAC holder access. “Allowing users to access networks using single factor authentication increases the potential that cyber attackers could exploit passwords and gain access to sensitive (missile defense) technical information,” the report states. Investigators also found unlocked server racks at some locations, another key vulnerability to insider snoopers. “The insider threat risk necessitates that organizations implement controls...to reduce the risk of malicious personnel manipulating a server's ability to function as intended and compromising sensitive and classified data,” the report states. External storage devices held unencrypted data and some sites failed to track who was accessing data, and why. Other administrators told investigators that they lacked the ability to record or monitor data downloaded from the network onto these devices. Unless these officials enforce the encryption of such removed data and monitor its downloading and transferring, “they will be at increased risk of not protecting sensitive and classified (missile defense) technical information from malicious users,” the report states. Investigators also found that some supposedly secure sites were failing to even lock their doors. One location had a security door that hadn't worked for years. “Although security officials were aware of the problem, they did not take appropriate actions to prevent unauthorized personnel from gaining unauthorized access to the facility,” the report states. Other sites featured no security cameras to monitor personnel movement and security officers failed to conduct badge checks. While the report makes recommendations to fix the documented problems, officials for the inspected agencies offered no comments on the non-classified draft report of the audit. Friday's scathing IG audit marked the latest in a string of reports detailing shoddy cybersecurity throughout the armed forces and defense contractors. During the same week, the Wall St. Journal reported that Chinese hackers are targeting military systems and those of defense contractors working on Navy projects. Beijing-linked cyber raids have attempted to steal everything from missile plans to ship-maintenance data in a series of hacks over the past 18 months, the Journal reports. As a result, Navy Secretary Richard Spencer has ordered a “comprehensive cybersecurity review” to assess if the Navy's cyber efforts “are optimally focused, organized, and resourced to prevent serious breaches,” spokesman Capt. Greg Hicks said. The review will also look at authorities, accountability and if the efforts reflect and incorporate government and industry best practices, he said. “Secretary Spencer's decision to direct a review reflects the serious to which the DoN prioritizes cybersecurity in this era of renewed great power competition,” Hicks said. https://www.navytimes.com/news/your-navy/2018/12/14/audit-finds-cyber-vulnerabilities-in-us-missile-defense-system

  • «Le Fonds européen de la défense est essentiel» : entretien avec Hélène Conway-Mouret, vice-présidente du Sénat, membre de la commission des Affaires étrangères, de la Défense et des Forces armées

    June 4, 2020 | International, Aerospace, Naval, Land, C4ISR, Security

    «Le Fonds européen de la défense est essentiel» : entretien avec Hélène Conway-Mouret, vice-présidente du Sénat, membre de la commission des Affaires étrangères, de la Défense et des Forces armées

    DEFENSE «Le Fonds européen de la défense est essentiel» : entretien avec Hélène Conway-Mouret, vice-présidente du Sénat, membre de la commission des Affaires étrangères, de la Défense et des Forces armées Dans un entretien accordé à L'Usine Nouvelle, Hélène Conway-Mouret, vice-présidente du Sénat, membre de la commission des Affaires étrangères, de la Défense et des Forces armées, souligne l'importance du secteur de la défense pour le plan de relance : «Il ne faut absolument pas que l'industrie de défense française soit abandonnée. C'est l'une des plus performantes en Europe», déclare-t-elle, soulignant : «la relance économique passe par un soutien à l'industrie de défense. Le caractère stratégique de cette industrie, qui représente 200 000 emplois directs, peu exposés aux délocalisations, est au cœur de notre souveraineté. Qui plus est, tous les efforts en matière d'innovation et de recherche militaires ont un effet dual et profitent au secteur civil». Quant au Fonds européen de la défense, «c'est le premier outil de l'Union destiné à soutenir fortement l'innovation et la recherche militaire. Il n'est pas simplement utile, mais absolument essentiel», insiste Mme Conway-Mouret. L'Usine Nouvelle du 4 juin

All news