Back to news

June 18, 2018 | International, Aerospace

Work on Dutch F-35s kicks off in Italy

ROME — Assembly is underway in Italy on a F-35 Joint Strike Fighter destined for the Netherlands Air Force, Dutch and Italian officials have said.

The Netherlands is planning to assemble most of its F-35s at the line at Cameri in northern Italy, where Italian Air Force and Navy F-35s are already being assembled.

Dutch secretary of state for defense, Barbara Visser, attended a ceremony at Cameri on Thursday to mark the start of the work on Dutch aircraft.

“She was there as the aircraft, ‘AN9,' went to the mating station as assembly got under way,” said Dutch Air Force spokesman, Sidney Plankman.

The aircraft is the ninth of the Netherlands' order of 37 F-35As. The first eight are being assembled at Lockheed Martin's Fort Worth facility in the U.S.

The first Dutch F-35 assembled in the U.S. will roll off the Fort Worth line in January 2019 and will head to Luke Air Base for pilot training, said Plankman. “Six or seven of those assembled in the U.S. will go to Luke,” he added.

Under a deal struck with the Italian government, the remaining 29 Dutch aircraft will all be assembled at Cameri, which is owned by the Italian government and operated by Italian state-controled defense firm Leonardo in partnership with Lockheed Martin.

AN9 will be completed in February 2019 before undertaking test flights in Italy and heading to the Netherlands around October 2019. “It will be the first F-35 to arrive in the Netherlands,” said Plankman.

Cameri has already delivered F-35As to the Italian Air Force, which are flying from Italy's Amendola Air Base.

In January, the first F-35B to be assembled outside the U.S., which is destined to fly with the Italian Navy, was handed over to Italy at Cameri.

Italy is currently due to purchase 60 F-35 As and 30 F-35Bs.

https://www.defensenews.com/global/europe/2018/06/15/work-on-dutch-f-35s-kicks-off-in-italy/

On the same subject

  • The Corps just slapped a counter-drone system on an MRZR all-terrain vehicle

    September 20, 2018 | International, Aerospace, Land

    The Corps just slapped a counter-drone system on an MRZR all-terrain vehicle

    By: Shawn Snow In yet another sign the Corps is becoming increasingly concerned about air defense, the Corps decided to slap a counter-drone system on a Polaris MRZR all-terrain vehicle. It's called the Light Marine Air Defense Integrated System, or LMADIS, and it's comprised of two MRZR vehicles, a command node and a sensor vehicle. The system is a “maneuverable ground-based sensor, electronic attack, C2 [ command and control] system," 1st Lt. Ariel Cecil, the commander of the Low Altitude Air Defense detachment for Marine Medium Tiltrotor Squadron 166, said in a video posted by the 13th Marine Expeditionary Unit. The LMADIS can detect, track, identify and take down drones with electronic attack, according to Cecil. The MRZR counter drone system is currently deployed with the 13th Marine Expeditionary Unit where it recently participated in the Theater Amphibious Combat Rehearsal exercise in Djibouti. The Corps has been investing heavily in counter air and drone threats. It's an issue the Marines really haven't had to focus on for some time now. But as the Corps begins to face down more sophisticated hostile actors there's no guarantee Marines will always operate on a battlefield where they own the airspace. That means enemy air or drone attacks are now a reality the Corps must plan for. And increasingly, drone technology has found its way into the hands of terrorist groups and ragtag militias. ISIS fighters in Iraq and Syria have been known to weaponize small commercial quadcopter drones, dropping small munitions and hand grenades on Iraqi and partner nation forces. Even the Taliban in Afghanistan have gotten in the game, using small drones to film attacks on remote Afghan army outposts. But the big threat, according to the Commandant of the Marine Corps Gen. Robert B. Neller, is that adversaries will eventually learn how to control these small attack drones in massive swarms. “When you think about enemy air attacks, you think about jets and bombers and stuff,” Neller said at the Atlantic Council in April. “I think the real future in enemy air attack is going to be swarming drones.” So, the Corps has embarked on an ambitious plan to field a new suite of tech to bolster the Corps' air defense and counter drone capabilities. Two such systems are the Ground Based Air Defense-Transformation, or GBAD, and the Ground/Air Task-Oriented Radar, or G/ATOR. The GBAD systems is basically a detection system with laser weapon that can track and destroy drones, and it's mountable on the Corps' new Joint Light Tactical Vehicle or Humvee. That program is still undergoing testing and evaluation. The G/ATOR system has been in the Corps' arsenal since 2013 and it can detect rockets, mortars, artillery cruise missiles, and drones. The system is highly mobile making it integral to the Corps' distributed operations plan in the Pacific should a conflict come between the U.S. and China. And the Corps is also dishing out money to modify Stinger missiles as part of Service Life Extension Program. https://www.marinecorpstimes.com/news/2018/09/19/the-corps-just-slapped-a-counter-drone-system-on-an-mrzr-all-terrain-vehicle

  • Germany’s TKMS buys Brazilian shipyard as production hub for local frigate program

    May 25, 2020 | International, Naval

    Germany’s TKMS buys Brazilian shipyard as production hub for local frigate program

    By: Sebastian Sprenger COLOGNE, Germany — German shipbuilder ThyssenKrupp Marine Systems will buy the Oceana shipyard in the southern Brazilian state of Santa Catarina to manufacture Tamandaré-class frigates for Brazil's Navy, the company announced this week. The German vendor heads the Águas Azuis consortium, which is building an initial set of four ships based on its MEKO vessel design. The industry team also includes Embraer Defence and Security as well as its subsidiary Atech. TKMS, based in Kiel, Germany, has no production facilities for surface ships, which means the company must make arrangements for local production when selling its flagship vessel design overseas. The pick of the Oceana yard, which specializes in offshore support vessels and is owned by CBO Group of Rio de Janeiro, was the result of the TKMS' own economic and logistical analyses and turned out to be an “ideal option,” according to a spokesman. “The shipyard also offers us the prospect of taking on follow-on orders — not only locally, but also in other countries of South America,” CEO Rolf Wirtz was quoted as saying in a statement. The acquisition is subject to approval by Brazilian antitrust authorities, and it is contingent on the frigate contract going into effect sometime in the “middle of the year,” the statement read. A company spokesman declined to name a date. Parties involved in the planned transaction would not disclose a price. The Águas Azuis consortium aims to deliver the Tamandaré-class frigates between 2025 and 2028. The companies aim to train 800 local employees for the job. “This means that ships with a very high domestic added value can be built in Brazil,” the company said. Embraer is slated to be the systems integrator for weapons and sensors on the new ships. Atech, with help from TKMS subsidiary Atlas Elektronik, will supply the combat management system. https://www.defensenews.com/global/europe/2020/05/22/germanys-tkms-buys-brazilian-shipyard-as-production-hub-for-local-frigate-program/

  • How tensions with Iran could test a new cyber strategy

    January 10, 2020 | International, C4ISR, Security

    How tensions with Iran could test a new cyber strategy

    Mark Pomerleau In 2018, the Department of Defense began following a new philosophy for cyber operations to better protect U.S. networks and infrastructure. Known as “defend forward,” the approach allows U.S. cyber forces to be active in foreign network outside the United States to either act against adversaries or warn allies of impending cyber activity that they've observed on foreign networks. After the U.S. military killed an Iranian general in a Jan. 2 drone strike and after national security experts said they expect Iran might take some retaliatory action through cyber operations, the specter of increased cyber attacks against U.S. networks puts Cyber Command and its new approach front and center. “This Iran situation today is a big test of the ‘defend forward' approach of this administration,” James Miller, senior fellow at Johns Hopkins Applied Physics Laboratory and former undersecretary of defense for policy, said at a Jan. 7 event hosted by the Council on Foreign Relations. “Will [Cyber Command] take preventative action? Will they do it in a way that our allies and partners support and that can be explained to the public?” While Iran fired several missiles Jan. 7 at a base in Iraq where U.S. troops lived as an initial response to the drone strike, many national security experts expect Iran could continue cyber actions as further retaliation for the strike. Iran could also ratchet up its cyber operations in the United States following the collapse of portions of the 2015 nuclear deal between the United States, Iran and five other nations to curb Iran's nuclear weapons capability in return for sanctions relief. Over the past 12 months, the White House and Congress streamlined many of the authorities used to conduct cyber operations to help cyber forces to get ahead of threats in networks around the world. One such provision in last year's annual defense policy bill provides the Pentagon with the authority to act in foreign networks if Iran, among other named nations, is conducting active, systematic and ongoing campaigns of attacks against the U.S. government or people. Cyber Command declined to comment on what, if anything, they were doing differently since the drone strike. Some experts, however, have expressed caution when assessing how well this defend forward approach has worked thus far given it is still relatively new. “The jury is very much still out here,” Ben Buchanan, assistant professor and senor faculty fellow at Georgetown University, said at the same event. “We don't have a lot of data, there's been a lot of hand-wringing ... about these authorities and about how Cyber Command may or may not be using them. I just don't think we've seen enough to judge whether or not ... [it is] meaningfully changing adversary behavior.” Others have also expressed reservations about how effective Iran can even be in cyberspace toward U.S. networks. “Iran is a capable cyber actor, Iran is a wiling cyber actor. That means Iran will conduct cyberattacks,” said Jacquelyn Schneider, Hoover fellow at the Hoover Institution at Stanford University. “It's not like they have this capability and they've been deterred in the past and maybe now they're going to turn it on. I think they've been trying this entire time.” Complicating matters further could be other actors trying to take advantage of U.S.-Iran imbroglio for their own interests. Priscilla Moriuchi, senior principal researcher and head of nation-state research at threat intelligence firm Recorded Future, said over the past several months, there have been reports of Russian state-affiliated actors hijacking Iranian cyber infrastructure to conduct operations masquerading as Iranians. “That creates its own uncertainty,” she said at the same event. “Another level of potential what we call inadvertent escalation if a country perceives that they are attacked by Iran but in reality, it” wasn't. https://www.fifthdomain.com/dod/2020/01/09/how-tensions-with-iran-could-test-a-new-cyber-strategy/

All news