25 juin 2020 | International, Naval

Dutch leading role for German Frigate project MKS-180

June 19, 2020 - On June 19th Damen Shipyards Group and the German Bundesamt fur Ausrüstung, Informationstechnik und Nutzung der Bundeswehr signed the contract for the construction of four MKS-180 frigates for the German Navy. Damen is the main contractor for this complex project which it is undertaking, together with partners Blohm+Voss and Thales, in Germany.

The combination of companies was previously declared the winner of a European tender; the largest in the history of the German Navy. On 17 June, the necessary financial resources were released by the German Bundestag budget committee. The contract marks the start of the design and construction phase.

Approximately 80% of the project investment remains in Germany as added value. The vessels will be built at Blohm+Voss in Hamburg, but partly also at other shipyard locations in Germany, including Bremen, Kiel and Wolgast. Besides this, approximately 100 small and medium-sized companies from the maritime industry, mechanical engineering and plant construction sectors will be involved in the implementation. These companies originate from almost all German states.

Hein van Ameijden, Managing Director Damen Schelde Naval Shipbuilding: “I am convinced that with the MKS-180 project, we are building a high-quality frigate that meets all the wishes of the German Navy. It is a German-Dutch project. We are already working well with our partners in Germany; Luerssen, Blohm+Voss, and Thales.  The project also offers prospects for further European cooperation. The many years of cooperation between Damen and Thales as part of the Dutch golden ecosystem is an important factor in this success. If the Netherlands continues to invest in innovative projects for its own navy, we can further expand our role within European naval construction. That’s good for the Netherlands’ strategic role, which fits in with the Defence Industry Strategy.”

The German added value and knowledge development also apply to Thales’s mission systems acquired within the project. Approximately 70% is supplied by Thales’s German branches in Kiel and Wilhelmshaven. This is done in close cooperation with numerous subcontractors.

Gerben Edelijn, CEO of Thales Netherlands: “This historic contract for both the German Navy and Thales is a significant milestone in more than 50 years of cooperation, and confirms our worldwide leading position in the field of high-end naval mission systems. The women and men on board of these innovative frigates can rely on the latest technologies in the field of cyber defense, radar and fire control. The AWWS system, developed for the Netherlands and Belgian Navies, will soon also enable the German Navy to withstand threats of today and the coming decades.”

Damen, Lürssen, Bohm+Vos and Thales are delighted with the confidence that the German government places in it. The implementation of the project will begin soon and involves the delivery of four frigates between 2027 and 2031 for an amount of approximately 4.6 billion euros. There is also an option to supply two more frigates after 2032.

View source version on Damen Shipyards Group: https://nlnavy.damen.com/dutch-leading-role-for-german-frigate-project-mks-180/

Sur le même sujet

  • Audit finds cyber vulnerabilities in US missile defense system

    17 décembre 2018 | International, C4ISR

    Audit finds cyber vulnerabilities in US missile defense system

    By: Geoff Ziezulewicz  The Army, Navy and Missile Defense Agency are failing to take basic cybersecurity steps to ensure that information on America’s ballistic missile defense system won’t fall into nefarious hands, according to a Defense Department Inspector General audit released Friday. Investigators visited five sites that manage ballistic missile defense elements and technical information, but the names of the commands were redacted in the publicly released report. “The Army, Navy and MDA did not protect networks and systems that process, store, and transmit (missile defense) technical information from unauthorized access and use,” the declassified report states. Such inadequacies “may allow U.S. adversaries to circumvent (missile defense) capabilities, leaving the United States vulnerable to missile attacks,” the report states. They found officials failed to employ safeguards familiar to most people online in 2018, the latest development to raise questions about the U.S. military’s cybersecurity vulnerabilities. Among the shortcomings: Administrators for classified networks had no intrusion detection and prevention systems in place to watch for cyberattacks, much less stop them, according to the report. At one site, officials said they had requested to purchase those cyber safeguards in December 2017 but nine months later it still hadn’t been approved. “Without intrusion detection and prevention capabilities, (the site) cannot detect malicious attempts to access its networks and prevent cyberattacks designed to obtain unauthorized access and exfiltrate sensitive (missile defense) technical information,” the report states. Officials also failed to patch system flaws after receiving vulnerability alerts, one of which had first been identified in 1990 and had still not been fixed by April. Another vulnerability that could be exploited by an attacker was first identified in 2013 but also was never pathced, according to the report. “Countless cyber incident reports show that the overwhelming majority of incidents are preventable by implementing basic cyber hygiene and data safeguards, which include regularly patching known vulnerabilities,” the IG report states. “(Missile defense) technical information that is critical to national security could be compromised through cyberattacks that are designed to exploit these weaknesses.” Some facilities failed to force employees to use common access cards, or CAC, when accessing the classified system, a basic cybersecurity practice known as multi-factor identification. Instead, officials were able to access the sensitive information using just a username and password, the report states. Hackers use phishing and other tactics to exploit passwords and gain access to such systems. New hires are supposed to be allowed network access without a card for only their first two weeks on the job. But IG investigators found users on the systems without CAC cards for up to seven years. At one site, a domain administrator never configured the network to allow only CAC holder access. “Allowing users to access networks using single factor authentication increases the potential that cyber attackers could exploit passwords and gain access to sensitive (missile defense) technical information,” the report states. Investigators also found unlocked server racks at some locations, another key vulnerability to insider snoopers. “The insider threat risk necessitates that organizations implement controls…to reduce the risk of malicious personnel manipulating a server’s ability to function as intended and compromising sensitive and classified data,” the report states. External storage devices held unencrypted data and some sites failed to track who was accessing data, and why. Other administrators told investigators that they lacked the ability to record or monitor data downloaded from the network onto these devices. Unless these officials enforce the encryption of such removed data and monitor its downloading and transferring, “they will be at increased risk of not protecting sensitive and classified (missile defense) technical information from malicious users,” the report states. Investigators also found that some supposedly secure sites were failing to even lock their doors. One location had a security door that hadn’t worked for years. “Although security officials were aware of the problem, they did not take appropriate actions to prevent unauthorized personnel from gaining unauthorized access to the facility,” the report states. Other sites featured no security cameras to monitor personnel movement and security officers failed to conduct badge checks. While the report makes recommendations to fix the documented problems, officials for the inspected agencies offered no comments on the non-classified draft report of the audit. Friday’s scathing IG audit marked the latest in a string of reports detailing shoddy cybersecurity throughout the armed forces and defense contractors. During the same week, the Wall St. Journal reported that Chinese hackers are targeting military systems and those of defense contractors working on Navy projects. Beijing-linked cyber raids have attempted to steal everything from missile plans to ship-maintenance data in a series of hacks over the past 18 months, the Journal reports. As a result, Navy Secretary Richard Spencer has ordered a “comprehensive cybersecurity review” to assess if the Navy’s cyber efforts “are optimally focused, organized, and resourced to prevent serious breaches,” spokesman Capt. Greg Hicks said. The review will also look at authorities, accountability and if the efforts reflect and incorporate government and industry best practices, he said. “Secretary Spencer’s decision to direct a review reflects the serious to which the DoN prioritizes cybersecurity in this era of renewed great power competition,” Hicks said. https://www.navytimes.com/news/your-navy/2018/12/14/audit-finds-cyber-vulnerabilities-in-us-missile-defense-system


    17 novembre 2020 | International, Aérospatial


    Par Caroline Bruneau  Les parlementaires allemands ont voté l’achat de 38 Typhoon d’Eurofighter pour remplacer la première génération de l’avion de combat européen. Le remplacement de leurs Tornado vieillissants, par un panachage de Super Hornet américains et d’Eurofighter européens reste en suspens. La commande est passée le 11 novembre. Après plusieurs années d’atermoiements, la commission du budget du Bundestag avait finalement approuvé le 5 novembre l’achat de 38 Eurofighter Typhoon de dernière génération, dont huit en version biplace. La tranche 4 « Quadriga » du programme pourra monter à 93 avions in fine, si une autre commande est passée lors de la prochaine législature, donc après les élections qui auront lieu normalement à l’automne prochain. Ces 55 appareils supplémentaires doivent permettre le remplacement des chasseurs-bombardiers Tornado, hérités de la Guerre froide. Ils seront complétés par un total de 45 F/A-18 Super Hornet et EA-18 Growler de Boeing pour les missions stratégiques nucléaires et de guerre électronique dans le cadre de l’Otan, inaccessibles au Typhoon. Une pré-commande a été notifiée en avril dernier à l’avionneur américain par le ministre de la Défense allemand Annegret Kramp-Karrenbauer, coupant court à toute velléité de choisir le F-35 comme successeur au Tornado. À moins d’un an des élections, la coalition gouvernementale allemande est dans la position difficile d’avoir à la fois à ménager son industrie et ses partenaires européens, tout en donnant des gages de fidélité au grand allié américain (cf. encadré). Dans ces conditions, il est tentant de laisser la « patate chaude » du remplacement du Tornado – avec la question connexe des armes nucléaires américaines en Allemagne – à la législature suivante. https://www.aerospatium.info/luftwaffe-renouvelle-ses-eurofighter/

  • Croatia backtracks on decision to buy Israeli jets. What went wrong?

    15 janvier 2019 | International, Aérospatial

    Croatia backtracks on decision to buy Israeli jets. What went wrong?

    By: Jaroslaw Adamowski  WARSAW, Poland — The Croatian government has canceled its decision to purchase used F-16C/D Barak fighters from Israel, the Defence Ministry said in a Jan. 14 statement. The move follows a recommendation by the Croatian Defence Council that authorities relaunch the procurement step of its fighter jet acquisition program, set up to replace the country’s outdated Mikoyan MiG-21 fighters. The council is comprised of President Kolinda Grabar-Kitarovic, Prime Minister Andrej Plenkovic, and a number of senior government, parliamentary and military officials. After a thorough analysis of the canceled procurement, Plenkovic’s cabinet will “define a new model” of acquiring fighter jets for the Croatian Air Force, the prime minister said. Prior to the cancellation, Croatian Defence Minister Damir Krstičević said in a statement that “Israel has … unfortunately officially informed the Ministry of Defence that it is unable to receive the adequate [third-party transfer] approval for the delivery of Israeli F-16 Barak aircraft to the Republic of Croatia.” Earlier this month, the Croatian government said it had given “Israel a deadline on its capability to deliver the aircraft offered at the international tender” and that Israel was “responsible for obtaining the approval from the United States for the supply of the aircraft.” Croatian officials have told local media the U.S. government accused its Israeli counterpart of unfair competition in the tender, in which the U.S. had offered Croatia secondhand F-16s. Other bidders included Greece, which offered used F-16s, and Sweden, which offered JAS 39 Gripen fighters. https://www.defensenews.com/air/2019/01/14/croatia-backtracks-on-decision-to-buy-israeli-jets-what-went-wrong

Toutes les nouvelles