7 octobre 2019 | International, Aérospatial

Boeing’s F-18 jet may have a leg up in Germany over Eurofighter


COLOGNE, Germany — The race between Boeing’s F-18 jet and the Airbus Eurofighter Typhoon aircraft to replace Germany’s Tornado fighter-bombers has tilted toward the American plane, according to a German media report.

That is after German defense officials received information from the Pentagon about the time needed to certify the Eurofighter to carry nuclear weapons, according to an article in the Süddeutsche Zeitung. Getting the Eurofighter approved for that mission would take between three and five years longer than the F-18, which is considered a nuclear weapons-capable aircraft in the U.S. military, the newspaper reported.

Germany has kept a subset of its approximately 80-strong Tornado fleet equipped to carry out the NATO nuclear-sharing doctrine. That means in the case of a hypothetical atomic war, German pilots would load their aircraft with U.S. nuclear bombs and drop them on their intended targets at the behest of the alliance.

While Germany’s nuclear mission periodically comes up as a source of controversy here, previous governments have left it untouched, portraying the largely symbolic assignment as a vital element of trans-Atlantic relations.

A spokeswoman for the Defence Ministry in Berlin declined to comment on the SZ report, saying only that American and German defense officials have been in “continuous conversations” on the issue.

The government is expected to announce a winner between the F-18 and the Eurofighter Typhoon early next year. In January 2019, defense officials eliminated the F-35 as a candidate, largely because picking an American plane would weaken the case for having such weapons be made by European companies in the future.

Such is the case with the Future Combat Air Systems program, led by Airbus and Dassault. Airbus says if Germany chooses the Eurofighter as a Tornado replacement, it would be easier for companies on the continent to transition to an eventual development of the German-Franco-Spanish platform.

The German defense minister’s visit to Washington last month put the spotlight back on the prospect of an American buy, however. “We want to treat this question jointly,” Annegret Kramp-Karrenbauer told reporters in the U.S. capital on Sept. 23. She added that Germany wants a “gap-less” continuation of the Tornado’s capabilities, adding that she envisions a “tight schedule” for the replacement.

Airbus, meanwhile, doesn’t see the need to rush. With 10 years or so left before ditching the Tornado, the reported nuclear-certification time seems to still fit into the overall replacement schedule, spokesman Florian Taitsch told Defense News.

Plus, he argued, it should be expected that, when given a choice, the Trump administration with its “America First” doctrine would be keen to push American-made weapons over European ones.

“For us, the situation hasn’t changed,” Taitsch said.


Sur le même sujet

  • New England guardsmen test their skills in Cyber Yankee 2020

    6 août 2020 | International, C4ISR, Sécurité

    New England guardsmen test their skills in Cyber Yankee 2020

    Mark Pomerleau Members of the National Guard from New England states concluded a two-week cyber exercise that sought to test the cyber skills of guardsmen and critical infrastructure operators. Cyber Yankee 2020, which took place July 21-31 in New Hampshire, involved more than 200 National Guard members and their civilian counterparts from across New England states, along with some active-duty partners and participants from local, state and federal agencies. In its sixth year, there was less attendance than previous years due to the coronavirus pandemic, but several were able to participate remotely. “Cyber Yankee is primarily a hands-on keyboard cyber incident response exercise for National Guard soldiers and airmen in FEMA Region 1, which are the six New England states,” said Lt. Col. Woody Groton, a member of the New Hampshire National Guard and the director for Cyber Yankee, according to a Facebook post by the New Hampshire Air National Guard. Groton said in a video that the exercise is primarily focused on the electrical and water sector. The exercise is “a great training opportunity for us to work with those people who would actually own the network that we would potentially respond on and for our soldiers and airmen to get that experience and for the engineers from those various entities, they get the training in working with us,” he said. The Guard units within the various states are a critical resource to defend against cyberattacks when they overwhelm localities. “If a large-scale attack happened against a power company, water company, or any other critical department around the state, we would be able to get activated and help them mitigate the threat,” Capt. Frederick Bond, 103rd Air Control Squadron cyberspace operator and exercise Team 3 lead from the Connecticut National Guard, said in a release. “It’s similar to when a storm comes and we help remove fallen trees or shovel snow from roofs to help get critical infrastructure going again.” The friendly blue team had to deal with simulated attacks from an opposing red team. Social media posts were used to simulate a real internet environment, where forces must sift through the noise and discern what information is needed to make decisions and identify threat actors. In one case, these actors defaced a public website. “We found some discrepancies including website, it looks like it may have been defaced. The team is digging into finding the source of that defacement and then making steps to correct it,” Master Sgt. Eric Lewis, a blue team member in the New Hampshire Air National Guard, said in a video. Other actions tested included protecting computer files from being stolen or manipulated. “We received intel that potential threat actors may be using a certain capability to transfer files,” said Senior Airman Stephen LaLuna, 103rd Communications Flight cyber systems operations specialist with the Connecticut National Guard. “We see the traffic that’s using it, that sets off a flag on our end to look deeper into that. If we determine it is malicious, we send it up the chain with our findings and recommendations to block it.” Officials explained that one of the most critical aspects of these training events is the partnerships built between Guard units, critical infrastructure operators and government entities so that when a crisis breaks out, everyone is acquainted. “We have built enduring partnerships with state government and the critical infrastructure sector. Something that if we did have a major cyberattack against one of those, we would be ready to respond and already know each other,” Groton said. Correction: An earlier version of this story misidentified Lt. Col. Woody Groton. He is with the Army National Guard. https://www.c4isrnet.com/cyber/2020/08/03/new-england-guardsmen-test-their-skills-in-cyber-yankee-2020

  • The new strategy from Navy’s cyber command

    17 août 2020 | International, Naval

    The new strategy from Navy’s cyber command

    Mark Pomerleau The Navy’s primary cyber outfit released its strategic plan for the next five years, a document that calls for using the service’s networks as a warfighting platform. The document, released by 10th Fleet/Fleet Cyber Command in late July, covers the range of responsibility of the command, which is the only fleet with a global footprint in all the military domains, to include cyberspace operations, signals intelligence and recently, the Navy’s component to U.S. Space Command. Much has changed since the last strategic plan was published in 2015, namely, the rampant activity of adversaries on a daily basis below the threshold of armed conflict to strategically harm the United States. “The long term competition we face today is between democracies and authoritarian regimes, freedom of navigation, and access to shared world markets. Our long-term strategic competitors are executing strategic cyber activities to alter the international order. This will not let up,” the document read. It added that adversaries learned the military’s game but now the military must learn the adversary’s game and play it on their terms. “Historically, to undermine a state’s power required territorially-focused, overt armed attacks or physical invasion. While that is and will always remain a possibility, technology has provided our adversaries with the ability to achieve their objectives without traditional military force,” the document read. “Currently, our adversaries are engaging us in cyberspace and the costs are cumulative – each intrusion, hack or leak may not be strategically consequential on its own, but the compounding effects are tantamount to what would have been considered an act of war.” The Navy, and military by extension, must be prepared to contest this activity. “I am certain the opening rounds of a 21st century great power conflict, particularly one impacting the maritime domain, will be launched in the electromagnetic, space, or cyber domains. If the Navy is to fight and win, Navy networks must be able to survive those hits and ‘fight hurt,’” Vice Adm. Timothy White, who rarely speaks publicly, said in the forward to the strategy. “Our people must be trained and exercised to fight through those hits. This contest spans the continuum of competition and conflict. We must win this contest during the day-to-day competition of ‘peacetime operations,’ where our networks are already in close contact, under constant probing and attack. If we do not, we will be at a severe disadvantage during crisis and lethal combat.” The plan, which continues to nest within the Navy’s overarching vision of Distributed Maritime Operations, features a three pronged vision; acting first in full spectrum information warfare, fighting and winning in a fully contested battlespace and promoting modernization and innovation. Moreover, the plan tweaks the five goals outlined in the previous strategic plan 2015-2020. They include: Operating the network as a warfighting platform: Following several high profile network breaches, the Navy must tighten the screws on its IT. Fleet Cyber is responsible for operating, maintaining and defending the network and as part of that, service leaders recognize they must “fight hurt” when networks are strained. They are also working ton establish greater cyber situational awareness across the service and reduce the intrusion attack surface. Conducting fleet cryptologic warfare: Fleet Cyber published its cryptologic cyber warfare vision in 2019. As part of the new strategy, command officials said they will seek to expand and enhance capabilities in distributed signals intelligence as part of its contribution to Distributed Maritime Operations. Delivering warfighting capabilities and effects: Fleet Cyber wants to expand how it delivers effects on the battlefield to include accelerating and synchronizing information warfare capabilities across Maritime Operations Centers, advancing integration of cyber effects into Navy and Marine Corps concepts and creating tactical cyber teams along with a maritime fires cell to provide expertise across the fleet for delivering cyber effects. Accelerate Navy’s cyber forces: Fleet Cyber needs to develop a plan to meet increased demand, both for its joint force requirements through U.S. Cyber Command and Navy specific requirements. Leaders are also looking to mature organizational structures and command and control relationships between various cyber entities that control forces across the globe such as Joint Forces Headquarters–DoDIN, Joint Force Headquarters–Cyber and Cyber Operations–Integrated Planning Elements. Moreover, with the additional importance of the space domain, Fleet Cyber will look to exploit the increasing convergence between space, cyberspace and electromagnetic spectrum. Establish and Mature Navy Space Command: The document states that Fleet Cyber’s goal is to “maintain maritime superiority from the sea floor to space with a core emphasis on lethality, readiness and capacity,” and so officials must re-focus to provide the best space integration possible as the service component to Space Command. The strategy also articulates Fleet Cyber’s role in enabling Distributed Maritime Operations, which is underpinned by assured command and control, battlespace awareness and integrated fires. All of those require robust networks, information and completion of the kill chain. https://www.c4isrnet.com/cyber/2020/08/13/the-new-strategy-from-navys-cyber-command/

  • Sept des principales entreprises britanniques de l'aérospatiale et de la défense, dont Thales UK, ont rejoint le consortium Tempest

    22 juillet 2020 | International, Aérospatial

    Sept des principales entreprises britanniques de l'aérospatiale et de la défense, dont Thales UK, ont rejoint le consortium Tempest

    Sept des principales entreprises britanniques de l'aérospatiale et de la défense ont rejoint «Team Tempest», le consortium qui vise à développer un avion de combat de haute technologie de nouvelle génération pour la RAF. Il s’agit de Bombardier Belfast, Collins Aerospace, GE Aviation UK, GKN Aerospace, Martin Baker, QinetiQ et Thales UK. Ces entreprises vont maintenant travailler aux côtés des principaux partenaires de «Team Tempest» : BAE Systems, Leonardo UK, MBDA UK, Rolls-Royce et le ministère de la défense, afin d'accélérer le développement de nouvelles technologies aériennes de combat.  Flightglobal et Defense-aerospace.com du 20 juillet 

Toutes les nouvelles