9 décembre 2019 | International, Aérospatial

Germany in talks with Lockheed Martin over ‘fragile’ missile defense program

By: Sebastian Sprenger

COLOGNE, Germany – German defense officials are negotiating with contractors Lockheed Martin and MBDA Deutschland about a bid proposal for a next-generation antimissile program that the government believes is missing crucial components, according to a new defense ministry report.

Information about the status of the high-profile TLVS program, short for Taktisches Luftverteidigungssystem, is included in the latest, unclassified portion of a biannual assessment by the defense ministry on the progress of key military acquisition programs.

The document constitutes the defense ministry's first public evaluation of the U.S.-German industry consortium's second and final bid, submitted in June.

“The analysis of the second offer shows that the proposal still falls short of the government's requirements because key elements and services were not included, some of which had been previously agreed,” the document states. Additionally, some performance requirements, which are left unexplained in the report, were not addressed in the industry bid, it adds.

Talks with the companies are ongoing to clarify outstanding issues by the end of 2019, the defense ministry wrote.

Overall, the government considers the program to be “fragile” based on a high degree of technological and managerial complexity. That is compared to a more upbeat assessment in the previous report, dated June, which found “significant progress” had been made over the previous six months.

The defense ministry did not respond to a request for comment on what elements the Lockheed Martin-MBDA proposal was lacking. A Lockheed spokesman referred questions to the German government, writing in an email, “It is a matter for the German MoD to comment on the content of its latest project report and position relating to TLVS.”

The report offers an explanation for why defense officials have been unable to articulate a time table for submitting the multibillion-dollar program to the German parliament for consideration.

For one, the government must first wait for a foreign military sales process to play out with the United States over access to key performance data of the Lockheed-made PAC-3 MSE interceptor, the primary missile of the TLVS system. Germany launched the petition for the requisite goods and services in April 2019.

In addition, officials are unable to formulate a path for integrating a secondary interceptor into the system, the IRIS-T SL, to be made by Germany's Diehl Defence, officials wrote. That is because the most recent Lockheed-MBDA proposal lacks the detailed interface documentation that would be needed to integrate such an interceptor into TLVS. Without that information, however, officials are unable to solicit a bid from Diehl, according to the report.

German officials consider the ability to use IRIS-T missile a must-have for TLVS because those missiles are domestically made and because they are cheaper.

Amid the runaway program complexity giving officials headaches, the government still appears to believe in the promise of the TLVS system as a replacement of the country's fleet of Patriot batteries. If it can be made to work, the military expects a “technological advantage” that will position the country as a NATO leader in missile defense, the report states.

Officials will make decisions about the way ahead after ongoing talks with industry come to an end, it adds.

https://www.defensenews.com/global/europe/2019/12/06/germany-in-talks-with-lockheed-martin-over-fragile-missile-defense-program

Sur le même sujet

  • Japan confirms single prime contractor for F-X

    4 août 2020 | International, Aérospatial

    Japan confirms single prime contractor for F-X

    by Jon Grevatt Japan's Defence Minister Taro Kono confirmed on 31 July plans to nominate a “single prime” Japanese contractor to oversee the development of the country's next-generation fighter aircraft. In comments in a media briefing in Tokyo, Kono said the prime contractor – almost certainly Mitsubishi Heavy Industries (MHI) – will be expected to act as the lead systems integrator on the project, which has been dubbed F-X. “The MoD will adopt a single-prime system. [The selected company] will be responsible for integrating systems and the engine,” said Kono in comments published by the Ministry of Defense (MoD). Kano indicated that the MoD had now commenced the process for selecting companies to be involved in the development project but did not elaborate. In the media briefing, Kono also confirmed that the MoD is currently considering developing the F-X alongside the United Kingdom and the United States. The latter is regarded as leading candidate, given its strong diplomatic, economic, strategic, and industrial ties with Japan. The F-X project is led within the MoD by a dedicated office set up in April. According to the MoD, its responsibilities include technical investigations, budget execution, information security issues, and the control of intellectual property. https://www.janes.com/defence-news/news-detail/japan-confirms-single-prime-contractor-for-f-x

  • Businesses reposition amid growing demand for solid rocket motors

    31 octobre 2023 | International, Naval, C4ISR

    Businesses reposition amid growing demand for solid rocket motors

    Companies in the rocket propulsion industry are making their own moves, reshuffling the market with potentially wide-ranging effects.

  • Four big questions for cybersecurity in 2019

    2 janvier 2019 | International, C4ISR

    Four big questions for cybersecurity in 2019

    By: Justin Lynch How will cybersecurity experts remember 2018? In the past year, the Trump administration announced it would take more offensive hacking operations against foreign countries, the Department of Justice announcedsweeping indictments against Chinese hackers and the U.S. intelligence community reported that foreign countries continued to interfere in American elections. So what comes next? Here are four overarching questions for the cybersecurity community in 2019: What will the new Pentagon chief do with expanded cyber powers? In August, the president gave the secretary of Defense the ability to conduct cyberattacks against foreign countries so long as they do not interfere with the national interest of the United States, according to four current and former White House and intelligence officials. But the resignation of Jim Mattis, the Defense secretary, means the next Pentagon chief will have a broad arsenal of cyber authorities. For the cyber community, Patrick Shanahan, the current acting secretary, is a relative unknown. He has not given significant insight into how he views the role of offensive cyberattacks for the Pentagon, and his scheduled Jan. 1 elevation comes as some in the Trump administration and U.S. Cyber Command have pushed for even more authorities. However, he has spoken at length about the need for the defense industry to bolster its own cyber practices. Although the appointment of Shanahan as acting Pentagon chief is temporary, he is on the short list of officials who may take on the job full time. The new Pentagon chief may also have to decide when the National Security Agency and U.S. Cyber Command should split. Both bodies are led by Gen. Paul Nakasone, but that may change. Cyber Command is in the process of gaining its own infrastructure to conduct offensive cyberattacks, and a Pentagon official told Fifth Domain in November that it appeared the split was all but certain to happen in the coming years, although no formal decision as been made. What comes next in the U.S.-China cyber relationship? The Department of Justice released a flurry of indictments against Chinese hackers in 2018, accusing Beijing's cyber sleuths of infiltrating American government agencies and defense contractors. The most recent round of allegations came Dec. 18, and the legal action could continue in 2019. While announcing the most recent indictments, Deputy Attorney General Rod Rosenstein accused China of breaking an agreement not to use hacked materials for commercial use, although he did not offer evidence. The hacking allegations come amid a broader trade war between the United States and China. Experts have told Fifth Domain a trade war could increase digital tension between the two nations. If the trade war continues, experts say they see little incentive for China to limit its cyberattacks. Will America suffer blowback for more offensive cyber operations? When the Trump administration announced the United States would take more offensive actions in cyberspace, some in the federal cybersecurity community criticized the plan as faulty. “The side effects of the strategy of ‘persistent engagement' and ‘defend forward' are still ill-understood,” Max Smeets and Herb Lin, experts at Stanford University wrote for Lawfare. “A United States that is more powerful in cyberspace does not necessarily mean one that is more stable or secure.” Experts also warn of making any rush judgments about the effectiveness of these offensive cyberattacks. Current and former intelligence officials worry that uncovering and attributing a hack can take more than a year, and, even then, that process is not perfect. One former official pointed to the leaked documents about Russian targeting of American election infrastructure in 2016 that was sent to the news organization the Intercept. It took months for the intelligence community to understand the full extent of the hack, the official said, an example of how long it takes to detect a cyberattack. However, all of that means it is reasonable to expect that the merits of the new offensive cyber operations may not be known publicly for years. Will Congress take action to streamline cybersecurity contracting and research? Yes, changing the way government does business is ambitious. But experts argue that if the United States wants to keep up with digital innovations from China and other countries it is necessary to change the American government's relationship with the private sector and academia. The effort to streamline cybersecurity funding and research will fall to the new Congress, in which Democrats will take over the House of Representatives. But when it comes to the U.S. government's relationship with the cyber industry, structural barriers to innovation remain. On average, it takes roughly seven years for an idea to get a contract inside the U.S. government. In that length of time, a product is already two generations old. Former Pentagon officials have used the digital fight against the Islamic State as an example of how long the process takes. It took roughly two years for Cyber Command to receive the proper equipment and training after the order to digitally defeat the Islamic State, officials told Fifth Domain. In addition, the cybersecurity industry is watching a series of bills in Congress. Sen. Mark Warner, D-Va., has pushed for a streamlined security clearance process, and industry officials told Fifth Domain they expect him to continue the effort in the new year. The bill could make it easier and cheaper to get a security clearance. And many in the federal cybersecurity community have called for a change in academia's relationship with cybersecurity. The universities and research institutions in the United States focusing on quantum computing are “subpar,” George Barnes, deputy director at the NSA said in June. Experts say that quantum computers will make traditional cybersecurity methods obsolete because of the expansive computing power. However, new investments in artificial intelligence and a new Solarium Commission, which was created to help contextualize cyber in the broader national and economic security discussion, may provide solutions to these problems. https://www.fifthdomain.com/industry/2018/12/31/four-big-questions-for-cybersecurity-in-2019

Toutes les nouvelles