Back to news

January 30, 2019 | International, Land

With shutdown over, Japan cleared to spend $2.15 billion on Aegis Ashore

By:

WASHINGTON — The U.S. Defense Security Cooperation Agency announced Tuesday that Japan has been cleared to buy a pair of land-based Aegis ballistic missile defense systems, the first Foreign Military Sales announcement since the end of a government shutdown that stalled the FMS process.

The sale, worth an estimated $2.15 billion, would bolster Japan's existing sea-based Aegis capabilities. The island nation is in the process of increasing its missile defense capabilities, both through additional Aegis buys and through the co-development of the SM-3 missile with the U.S.

Although not specified in the DSCA announcement, a government official confirmed these two systems are for Japan's planned Aegis Ashore sites, which are expected to be operational by 2023.

Included in the potential package: two Aegis weapon systems, two multimission signal processors, and two command-and-control processor refreshes, alongside radio navigation equipment, ordnance, identification friend or foe systems, and construction services for six vertical launch system launcher module enclosures.

Tuesday's announcement is the first DSCA notification to be posted since Dec. 18, just days before the longest government shutdown in U.S. history began.

Speaking to reporters last week, Andrea Thompson, the U.S. State Department official who oversees the FMS process, said the shutdown was slowing down the process of clearing sales requests from foreign customers — notable, as the Trump administration has made increasing weapon sales abroad a key part of both its foreign policy and economic growth strategy.

“There will be a bit of a bump — a gap, if you will — just because we haven't had the engagement with [Capitol] Hill” normally seen in the process, Thompson said then. “We'll be able to make up some ground, but I am a realist. We have to work harder if we are going to have the numbers we had last year.”

Japan has recently spent heavily on American defense items. In September, the nation was cleared to spend $3.14 billion on nine E2-D Advanced Hawkeye aircraft, and in October it agreed to pay more than half a billion dollars for SM-3 missiles.

In the recently released Missile Defense Review, the U.S. Department of Defense identified that working with partners in the Pacific — notably Japan and South Korea — is the “cornerstone” of American security in the region.

“Japan is one of our strongest missile defense partners, and works together with the United States to strengthen cooperative missile defenses against regional missile threats,” the review states. “Going forward, DoD will work with allies and partners to prioritize these types of missile defense integration opportunities that contribute to more effective protection of the United States, its allies and deployed forces.”

DSCA announcements do not mean sales are final. The announcement serves as notification to Congress about the potential sale, which can be vetoed by the Senate; once cleared, negotiations between the customer and contractor can lead to changed quantities or dollar figures from the original announcement.

https://www.defensenews.com/global/asia-pacific/2019/01/29/with-shutdown-over-japan-cleared-to-spend-215-billion-on-aegis-ashore

On the same subject

  • Cyber Solarium Commission outlines recommendations for strengthening the supply chain

    October 21, 2020 | International, Aerospace, Naval, Land, C4ISR, Security, Other Defence

    Cyber Solarium Commission outlines recommendations for strengthening the supply chain

    Mark Pomerleau WASHINGTON — On the heels of its capstone March report, the Cyberspace Solarium Commission has released a detailed follow-up with recommendations for how to secure the information and communications technologies supply chain. The commission is a bipartisan organization created by Congress in 2019 to develop a multipronged U.S. cyber strategy. It delivered a report in March, advocating for multiple cyber deterrence efforts. The whitepaper, released Monday, is one of several add-ons to the original report that go into greater depth on a particular topic or recommendation from the March report. This specific whitepaper solely focuses on the recommendation that Congress should direct the U.S. government to develop and implement a strategy for the information and communications technology industrial base to ensure more trusted supply chains and the availability of critical information and communications technologies. The whitepaper frames in stark terms that the United States lacks a strategy vis-a-vis China. “Over the past two decades, China has mobilized state-owned and state-influenced companies to grab a dominant position in markets for several emerging technologies, including the market for telecommunications equipment,” the report noted. “This is no accident but rather the result of a concerted, strategic effort by the Chinese government to capture these markets through a mix of government-led industrial policy; unfair and deceptive trade practices, including state-led intellectual property theft; the manipulation of international standards and trade bodies; a growing network of influence built on the back of diplomatic and trade negotiations; and significant investments in research and development in ICT.” As a result, the whitepaper is the commission's effort to help lay out a strategy for the government to better compete in this space, become less reliant upon manufacturing and resources in Asia, and thus spur greater security. “We're doing a lot but we lack a north star or a strategic approach that weaves or stiches it all together,” Robert Morgus, senior director for the commission, told C4ISRNET ahead of the whitepaper's release. “Without that north star, U.S. federal government efforts are uncoordinated.” The paper lists a five-pronged strategy to build trusted supply chains: Identify key technologies and equipment through government reviews and public-private partnerships to identify risk. Ensure minimum viable manufacturing capacity through strategic investment. Protect supply chains from compromise through better intelligence, information sharing and product testing. Stimulate a domestic market through targeted infrastructure investment, and ensure the ability of companies to offer products in the United States similar to those in foreign markets. Ensure global competitiveness of trusted supply chains, including American and partner companies, in the face of Chinese anti-competitive behavior in global markets. Moreover, the paper lists a series of recommendations to achieve the strategy, which include a variety of ways to streamline information sharing and efforts that could be taken within the federal government. The report couches supply chain security in both economic and national security terms, which Morgus noted cannot be decoupled. “The simple fact that we aren't competing with China on that front creates that security issue. ... The economic issue here is leading to a national security and a cybersecurity issue, and the two issues really can't be disentangled,” he said. “The fact that we don't have trusted suppliers or a robust network of trusted suppliers that can compete has created a security issue where we are reliant on Chinese manufacturing or companies with manufacturing presence in China, which is a potential security issue from the trustworthiness and the availability of those goods and services.” Among one of the key pillars of the strategy to build a stronger supply chain, the report suggests greater intelligence sharing between allies and partners to disseminate intelligence on risks, which is also beneficial to the private sector. The paper recommends Congress direct the president to create or designate a national supply chain intelligence center that would integrate supply chain intelligence efforts from across the government with other members of the public and private sectors. It would also serve as the shared knowledge center for threats to the supply chain. https://www.c4isrnet.com/cyber/2020/10/19/cyber-solarium-commission-outlines-recommendations-for-strengthening-the-supply-chain/

  • Northrop Grumman lifts 2024 earnings forecast on weapons demand
  • These companies are teaming up to pursue a $1B cyber contract

    December 6, 2019 | International, C4ISR, Security

    These companies are teaming up to pursue a $1B cyber contract

    By: Mark Pomerleau ManTech and General Dynamics are joining forces to compete for the Pentagon's top cyber training contract, a deal that is thought to be worth nearly $1 billion. In a Dec. 5 Facebook post, ManTech announced the partnership with General Dynamics Information Systems and General Dynamics Mission Systems for the Cyber Training, Readiness, Integration, Delivery and Enterprise Technology (TRIDENT) contract. Raytheon, Lockheed Martin and Northrop Grumman have previously said they will also compete for the award. The primary component of the contract is the Persistent Cyber Training Environment (PCTE), an online client in which members of U.S. Cyber Command's cyber mission force can log on from anywhere in the world for training and to rehearse missions. Pentagon leaders view PCTE as one of the more critical needs for Cyber Command. Currently, no integrated or robust cyber training environment exists. ManTech and General Dymanics will “will develop a Persistent Cyber Training Environment (PCTE) platform that empowers holistic, enterprise-wide U.S. cyber training capabilities for the U.S. Department of Defense (DoD), delivering cyber threat-informed services, regional compute and data storage capabilities, and real-time #DevSecOps on a global scale,” the Facebook post stated. An award for the contract is expected in late 2020. https://www.fifthdomain.com/dod/2019/12/05/these-companies-are-teaming-up-to-pursue-a-1b-cyber-contract

All news