23 juillet 2018 | International, Aérospatial

Avion de combat du futur : Dassault veut avancer

Par Véronique Guillermard

Tout comme son partenaire Airbus, le groupe attend des contrats d'études et de développement de démonstrateurs.

«Une bonne nouvelle.» La décision du Royaume-Uni de lancer, lundi 16 juillet, un nouvel avion de combat pour succéder à l'Eurofighter et au F-35 américain, qui équipent ses forces armées, est bien accueillie par Éric Trappier, PDG de Dassault Aviation*. «Cette décision prouve que l'aviation de combat est un sujet stratégique pour les pays européens, qu'elle suscite de l'enthousiasme et de la compétition face à la volonté hégémonique des États-Unis», a-t-il développé en marge de la publication des résultats semestriels du groupe ce jeudi.

Le programme britannique, baptisé Tempest, répond au projet d'avion de combat franco-allemand qui doit succéder au Rafale français, construit par Dassault Aviation, et à l'Eurofighter, fabriqué par Airbus Defence, BAE Systems et Leonardo.

L'Eurofighter équipe plusieurs armées européennes dont l'Allemagne. Plusieurs jalons ont été franchis depuis l'impulsion politique donnée par Emmanuel Macron et la chancelière Angela Merkel, en juillet 2017. Dernier en date, la signature, lors du sommet franco-allemand de juin dernier, de deux lettres d'intention commune: la première pour la réalisation du Système de combat aérien du futur (Scaf), qui sera mis en service à horizon 2040 ; la seconde pour la conception d'un char de combat opérationnel à partir de 2035.

Après cette étape importante, les deux grands partenaires du projet, Dassault Aviation, maître d'œuvre du futur avion de combat, et Airbus Defence attendent l'entrée en vigueur de contrats d'études et de développement de démonstrateurs. Il faut établir une feuille de route en balisant les développements et en passant par une réduction des risques gr'ce à la simulation et aux démonstrateurs.

Dassault Aviation attend «un engagement dans le temps long» et un budget sanctuarisé. Et «le plus tôt serait le mieux», souligne Éric Trappier. Il relève que le Royaume-Uni a annoncé un investissement de 2 milliards de livres (2,3 milliards d'euros) d'ici à 2025 dans le projet Tempest. Comme si les Britanniques tentaient de prendre de vitesse l'alliance franco-allemande. À terme, ces deux projets pourraient-ils converger? Trop tôt pour le dire. Si le Scaf franco-allemand a vocation à embarquer d'autres pays européens, au préalable, il «faut une locomotive. Et elle est formée de deux pays, la France et l'Allemagne», résume Éric Trappier.

À ce stade, Saab, qui construit le Gripen, le 3e avion de combat européen, n'a pas rendu publiques ses intentions. Le suédois modernise son appareil, tout comme Dassault Aviation, qui, parallèlement au Scaf qui prépare le long terme, améliore le Rafale avec le standard F3R et, demain, le standard F4.

12 Rafale pour le Qatar

Au cours du semestre écoulé, le groupe français a continué à livrer des Rafale dont deux à la France. Dassault Aviation a également signé un nouveau lot de 12 Rafale pour le Qatar. Doha a levé une option prise, en mai 2015, dans le cadre d'un premier contrat portant sur l'achat de 24 avions de combat français. Le Qatar a également pris une nouvelle option pour 36 appareils de plus.

L'activité militaire de Dassault est tirée par les livraisons du Rafale aux clients exports et à l'éventuelle concrétisation de nouveaux contrats à l'international. Le Rafale est notamment en lice en Belgique. Après trois années blanches (2019-2021), les livraisons aux armées françaises doivent reprendre en 2022. Quant aux jets d'affaires Falcon, ils évoluent sur un marché «qui va mieux et repart», souligne Éric Trappier. Les stocks de jets d'occasion ont décru et les ventes d'avions neufs se redressent (18 prises de commandes au 1er semestre). «L'embellie vient du marché américain et du redémarrage de l'Asie. Nous espérons que l'Europe va suivre», développe le PDG du groupe.

Autre source de satisfaction, le lancement, en mars 2018, du 6X, le nouveau Falcon à long rayon d'action et large cabine, qui doit entrer en service en 2022. Son bon démarrage commercial a permis de tirer un trait sur le Falcon 5X, dont le carnet de commandes en a été totalement expurgé. Pour 2018, Dassault prévoit de livrer 12 Rafale et 40 Falcon et de réaliser un chiffre d'affaires proche de celui de 2017 (4,8 milliards d'euros).

http://www.lefigaro.fr/societes/2018/07/19/20005-20180719ARTFIG00320-avion-de-combat-du-futur-dassault-veut-avancer.php

Sur le même sujet

  • Raytheon/Lockheed Martin Javelin Joint Venture Awarded Contract For 2,100 F-Model Missiles, Marking Initial Full-Rate Production

    30 janvier 2019 | International, Terrestre

    Raytheon/Lockheed Martin Javelin Joint Venture Awarded Contract For 2,100 F-Model Missiles, Marking Initial Full-Rate Production

    ORLANDO, Fla., Jan. 30, 2019 /PRNewswire/ -- The Javelin Joint Venture was awarded a production contract for 2,100 F-Model (FGM-148F) missiles, following a successful and rigorous system qualification test program that included 21 successful flight tests. The contract launches the initial full-rate production agreement for the Javelin F-Model missile, replacing the Javelin FGM-148E (Block I). The Javelin FGM-148F missile features an advanced multipurpose warhead (MPWH) as part of the man portable, fire-and-forget Javelin missile system. The MPWH incorporates the latest generation shaped charged technology to defeat present and future advanced armored threats while adding a fragmenting steel warhead case to significantly improve lethality against soft targets and light armored vehicles. The Javelin F-Model round deliveries are planned for early 2020 and will be available for international allies, with U.S. government permission. There are also funded efforts underway to develop a higher performance Lightweight Command Launch Unit (CLU) and FGM-148G Model missile that will dramatically improve system performance while reducing weight and lowering system cost. First deployed in 1996, Javelin is the world's most versatile and lethal one-man-portable and platform-employed anti-tank and multi-target precision weapon system. To date, more than 45,000 missiles and 12,000 CLUs have been produced. The Javelin weapon system has experienced numerous technology insertions since its initial fielding to stay ahead of advancing threats. Javelin, which is produced by a joint venture between Raytheon and Lockheed Martin, has been used extensively and to great advantage in combat operations in both Afghanistan and Iraq. Over 5,000 engagements have been successfully conducted by U.S. and coalition forces. Current U.S. allies that have Javelin in inventory include France, Taiwan, Jordan, Qatar, Turkey, Lithuania, Czech Republic, Indonesia, Ireland, New Zealand, Norway, Oman, Ukraine, Georgia, Australia, Estonia, UAE and the United Kingdom. The Javelin Joint Venture is an award-winning enterprise recognized in 2015 by the Office of the Secretary of Defense for its outstanding achievements in providing operational support to warfighters with the highest level of mission success and tactical operational readiness. About Lockheed Martin Headquartered in Bethesda, Maryland, Lockheed Martin is a global security and aerospace company that employs approximately 105,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services. SOURCE Lockheed Martin https://news.lockheedmartin.com/2019-01-30-Raytheon-Lockheed-Martin-Javelin-Joint-Venture-Awarded-Contract-for-2-100-F-Model-Missiles-Marking-Initial-Full-Rate-Production

  • Exclusive: Boeing mulls shedding Airbus work in potential Spirit Aero deal
  • The Cybersecurity 202: Hackers just found serious vulnerabilities in a U.S. military fighter jet

    19 août 2019 | International, Aérospatial

    The Cybersecurity 202: Hackers just found serious vulnerabilities in a U.S. military fighter jet

    By Joseph Marks LAS VEGAS — In a Cosmopolitan hotel suite 16 stories above the Def Con cybersecurity conference this weekend, a team of highly vetted hackers tried to sabotage a vital flight system for a U.S. military fighter jet. And they succeeded. It was the first time outside researchers were allowed physical access to the critical F-15 system to search for weaknesses. And after two long days, the seven hackers found a mother lode of vulnerabilities that — if exploited in real life — could have completely shut down the Trusted Aircraft Information Download Station, which collects reams of data from video cameras and sensors while the jet is in flight. They even found bugs that the Air Force had tried but failed to fix after the same group of hackers performed similar tests in November without actually touching the device. “They were able to get back in through the back doors they already knew were open,” Will Roper, the Air Force's top acquisition official, told me in an exclusive briefing of the results. The hackers lobbed a variety of attacks — including injecting the system with malware and even going at it with pliers and screwdrivers. When I saw it, the metal box that's usually secure on the aircraft had wires hanging out the front. The hackers briefed Roper on the findings on Saturday afternoon. He was surrounded by discarded pizza boxes, iced coffee drinks — and the hotel's drinking glasses filled with screws, nuts and bolts removed from five fully dismantled TADS devices, which run about $20,000 a pop. He'd expected the results to be about this bad, Roper told me on a private tour of the hacking event. He pinned the weaknesses on decades of neglect of cybersecurity as a key issue in developing its products, as the Air Force prioritized time, cost and efficiency. He's trying to turn that around, and is hopeful about the results of the U.S. government's newfound openness to ethical hackers. He'd come straight from Def Con's first-ever Aviation Village, which the Air Force helped establish, and was wearing a gray T-shirt with the words “No, Mr. Bond, I expect you to hack,” emblazoned on the front — a riff on a classic line from the 1964 James Bond film “Goldfinger.” This is a drastic change from previous years, when the military would not allow hackers to try to search for vulnerabilities in extremely sensitive equipment, let alone take a literal whack at it. But the Air Force is convinced that unless it allows America's best hackers to search out all the digital vulnerabilities in its planes and weapons systems, then the best hackers from adversaries such as Russia, Iran and North Korea will find and exploit those vulnerabilities first, Roper told me. “There are millions of lines of code that are in all of our aircraft and if there's one of them that's flawed, then a country that can't build a fighter to shoot down that aircraft might take it out with just a few keystrokes,” he said. Roper wants to put his military hardware where his mouth is. During next year's Def Con conference, he wants to bring vetted hackers to Nellis or Creech Air Force bases near Las Vegas where they can probe for bugs on every digital system in a military plane, including for ways that bugs in one system can allow hackers to exploit other systems until they've gained effective control of the entire plane. He also wants to open up the ground control system for an operational military satellite for hacker testing, he said. “We want to bring this community to bear on real weapons systems and real airplanes,” Roper told me. “And if they have vulnerabilities, it would be best to find them before we go into conflict.” Those hacking challenges will also be useful for the private sector because military planes and satellites share many of their computer systems with the commercial versions of those products, Roper said, and the Air Force can share its findings. The seven hackers probing the TADS devices were all brought to Vegas by the cybersecurity company Synack, which sells the Pentagon third-party vulnerability testing services, under a contract with the Defense Digital Service, a team of mostly private-sector technology stars who try to solve some of the Pentagon's thorniest technology problems during short-term tours. The Defense Digital Service started by organizing large-scale hacking competitions in 2016, with names such as “Hack the Pentagon” and, eventually, “Hack the Air Force.” These were open to almost anybody — but included only public-facing hacking targets such as military service websites and apps. Shortly after, they also began opening more sensitive systems to a smaller number of vetted hackers who sign nondisclosure agreements. DDS has run about a dozen of those more sensitive hacking competitions so far, but this is the first time it has offered up the same system for hacking twice, said Brett Goldstein, DDS's director, who earned a reputation in technology as Open Table's IT director and chief data officer for the city of Chicago. “That's important because security is a continuous process,” he told me. “You can't do an exercise and say, ‘Oh, we found everything' and check the box. You need to constantly go back and reevaluate.” They also allowed the hackers to be more aggressive this time and to physically disassemble the TADS systems to get a better idea of what kinds of digital attacks might be effective, Goldstein said. That meant the hackers could simulate a cyberattack from adversaries that had infiltrated the vast network of suppliers that make TADS components and had sophisticated knowledge about how to compromise those elements. They could also advise the Air Force about flaws in how the TADS hardware was built that make it more susceptible to digital attacks. Moving forward, Roper told me, he wants to start using that knowledge to mandate that Air Force vendors build better software and hardware security controls into their planes and weapons systems upfront so the Air Force doesn't have to do so much cybersecurity work on the back end. He's up against an arcane and byzantine military contracting process, however, that's going to make those sorts of fundamental reforms extremely difficult, he acknowledged. In some cases, the company that built an Air Force system owns the software embedded in that system and won't let the Air Force open it up for outside testing, he says. In other cases, the Air Force is stuck with legacy IT systems that are so out of date that it's difficult for even the best technologists to make them more secure. “It's difficult to do this going backward, but we're doing our best,” Roper told me. “I can't underscore enough, we just got into the batter's box for what's going to be a long baseball game.” https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/08/14/the-cybersecurity-202-hackers-just-found-serious-vulnerabilities-in-a-u-s-military-fighter-jet/5d53111988e0fa79e5481f68/

Toutes les nouvelles