7 octobre 2019 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

Here’s how many foreign military sales the US State Department OK’d in FY19

By: Aaron Mehta

WASHINGTON — The U.S. State Department cleared $67.9 billion in weapons in fiscal 2019, in an indication that America's position in the global arms trade remains strong.

The number, spread across 64 individual procurement requests from 28 different countries and a NATO consortium, represents the second year in a row that the overall value of foreign military sales requests have slightly declined. But the total still represents almost double the total cleared by the State Department in fiscal year 2016.

These numbers represent potential arms sales that the State Department cleared internally, then passed on to Congress through the Defense Security Cooperation Agency. The notifications do not represent final sales; if Congress does not reject the potential sale, it then goes into negotiations, during which dollar figures and quantities of equipment can change. In some cases, as highlighted by the large FMS request notification for Turkey to buy Patriot batteries, those sales will never happen.

However, while not solid dollars, notifications are a notable way of tracking interest in procuring American arms from foreign partners, and can be a leading indicator of final sales to come.

Geographically, the Pacific region led the way with 21 requests, totaling $24.8 billion in potential sales – notable given the emphasis put forth by the Trump administration that the Pacific represents a priority theater for the future. Following that was the Middle East, with 18 requests totaling $15.2 billion. Europe had 18 requests for $19.8 billion; the only nation from Africa, Morocco, put in six requests totaling $7.26 billion; and Canada put in three requests, for $731 million.

The biggest potential customer, at a time of a whole-of-government effort against China is underway, is Taiwan. Over four different requests, Taiwan requested $10.7 billion in sales, driven primarily by $8 billion for long-sought F-16 aircraft, as well as $2 billion for Abrams tanks.

In second place was Japan, with $7.54 billion in requested sales, spread over six requests. That was driven by three different tranches of SM-3 missiles and an Aegis Ashore missile defense system. Morocco, which was cleared for six separate requests totaling $7.26 billion on U.S. arms, came in third. Their procurement was driven mainly by its purchase of new F-16 fighter jets and the associated equipment, as well as a request for Abrams tanks.

As always with FMS notifications, a few large sales can drive the overall total. Sixteen of the 63 sales requests topped $1 billion, led by Taiwan's F-16 request ($8 billion), Poland's F-35 request ($6.5 billion), Morocco's F-16s ($3.79 billion), the U.K's procurement of Chinook helicopters ($3.5 billion), Turkey's Patriot request ($3.5 billion) and Japan's largest SM-3 request ($3.3 billion).

The F-16 was a significant driver of FMS requests this year, showing the Lockheed Martin legacy plane remains popular around the world. Eight requests, with a potential total of $15.8 billion in sales, involved the F-16, raging from the request for tranches of fighters from Taiwan, Morocco and Bulgaria to $125 million for Pakistan security support related to their F-16 fighters.

While the numbers are strong, Roman Schweizer, an analyst with Cowen, notes that political realities could upend an unusual number of these potential deals in the coming year.

“Notably, for FY19, there are a number of large sales that may be unlikely for political or other reasons: these include a $3.5B sale to Turkey of Raytheon's Patriot missile system, a $2B sale to Taiwan of General Dynamics' M1 Abrams tanks, and an $8B sale to Taiwan of Lockheed Martin F-16s,” he wrote in a note to investors. “We don't think a Turkish Patriot purchase is possible as they continue to own/operate Russian-made S-400s. And while Taiwan needs U.S. weapons (fighters, tanks and more), there is a legitimate concern that those sales could be halted if there is a broader strategic agreement with China on trade and economic issues.

“If that's the case, about 20% of this year's potential deals aren't viable, meaning this would be a step-down year but not quite as low as FY16's $37B in announcements.”

From a corporate level, Schweizer estimates Lockheed Martin is the big winner for the year with $32 billion, followed by Raytheon at $15 billion, Boeing at $9 billion, General Dynamics at $3 billion, Northrop Grumman at $1.2 billion and Textron $600 million.

A specific wrinkle for FY19's accounting was the inclusion of $3.9 billion as part of a controversial emergency package pushed through by the Trump administration for Saudi Arabia and the UAE. For the better part of a year, those weapons were tied up in Congress over concerns of how they will be used as part of the Saudi-led actions against Iranian-backed fighters in Yemen, an operation that has contributed to a humanitarian crisis in that country. The issue escalated following the death of columnist Jamal Khashoggi, which has been tied to the Saudi royal family.

In May, the State Department announced that an emergency exemption would be used to push those arm sales through; while the administration cited a broad threat from Iran in the region as the reason, the move received bipartisan rebuke from both the Senate and the House, with some members expressing concern this was a precedent-setting move to take away arms sale veto powers from Congress.

That $3.9 billion was divided among seven FMS notifications, four for the UAE and three for Saudi Arabia.

https://www.defensenews.com/global/2019/10/04/heres-how-many-foreign-military-sales-the-state-department-okd-in-fy19/

Sur le même sujet

  • Hackers Exploit PHP Vulnerability to Deploy Stealthy Msupedge Backdoor

    20 août 2024 | International, C4ISR, Sécurité

    Hackers Exploit PHP Vulnerability to Deploy Stealthy Msupedge Backdoor

    Msupedge, a new backdoor exploiting a PHP flaw, targets a Taiwanese university using DNS tunneling for communication.

  • DARPA Seeks Secure Microchip Supply Chain

    1 juin 2020 | International, C4ISR

    DARPA Seeks Secure Microchip Supply Chain

    "Once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible," explains a DARPA spokesperson. By THERESA HITCHENSon May 29, 2020 at 2:46 PM WASHINGTON: DARPA has launched a four-year project to find ways to design security features into microchips as they are being made to help ensure the future supply chain. While the name of the project is daunting — Automatic Implementation of Secure Silicon (AISS) — and the technical requirements are a serious challenge, the concept is pretty simple. “AISS aims to automate the process of incorporating security into chip designs, making it easier and potentially more cost effective for any organization with even a small design team (start-ups, mid-size companies, etc.) to build security measures into their designs,” a DARPA spokesperson told Breaking D today. “Overall, with AISS DARPA aims to bring greater automation to the chip design process to profoundly decrease the burden of including security measures,” the spokesperson said. The two winning teams, according to a May 27 DARPA press release, are: The two AISS research teams are: Synopsys, Arm, Boeing, Florida Institute for Cybersecurity Research at the University of Florida, Texas A&M University, UltraSoC, and the University of California, San Diego Northrop Grumman, IBM, University of Arkansas, and University of Florida “Research and development on the $75 million program was commenced two weeks ago and incremental capabilities are expected to roll out to the chip design community over the next four years,” the spokesperson said in an email. “Our hope is that many of the capabilities will start appearing as features in commercial design automation software before the program completion.” Digital integrated circuits are the engines that drive modern computers, and everyday digital devices such as smart phones. They are critical to the evolution of the Internet of Things (IoT). As such, they increasingly have become a key target of hacking by US adversaries and cyber criminals alike, DARPA explains. “Threats to IC chips are well known, and despite various measures designed to mitigate them, hardware developers have largely been slow to implement security solutions due to limited expertise, high cost and complexity,” the DARPA release says. “Further, when unsecure circuits are used in critical systems, the lack of embedded countermeasures exposes them to exploitation.” Indeed, the Department of Commerce on May 15 took another swipe at Chinese telecoms behemoth Huawei and tightened its earlier efforts to block it from exporting its semiconductors and products to the US and allies. The Trump administration alleges that Huawei's hardware and software, in particular that related to 5G wireless technology, are full of deliberate security holes in order to enable Chinese government spying. The ruling by Commerce's Bureau of Industry and Security, which will take effect in September, seeks to prevent companies around the world from using American-made software and machinery develop chips for Huawei or its subsidiary firms. The problem for device-makers, particularly in the IoT world where the market is largely for commercial products (think smart refrigerators), is that fixing potential security holes often isn't seen as worth the time, effort and most importantly, money. “The inclusion of security also often requires certain trade-offs with the typical design objectives, such as size, performance, and power dissipation,” the DARPA spokesperson said. “For example, something like a sprinkler isn't likely to require the highest level of security protections. Investing in security mechanisms that take up a lot of space on the underlying chip, or significantly impact chip performance likely doesn't make sense based on the sprinkler's expected use and application.” And yet, that future IoT sprinkler also will be other IoT devices and computer networks in operation by an individual, a company or a facility, such as a weapons depot. Even more unfortunately, the spokesperson explained, “modern chip design methods are unforgiving – once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible.” Thus, the AISS program is aimed at spurring research into two areas that can address four types of microchip vulnerability, the release says: “side channel attacks, hardware Trojans, reverse engineering, and supply chain attacks, such as counterfeiting, recycling, re-marking, cloning, and over-production.” The first area of research will be focusing on “development of a ‘security engine' that combines the latest academic research and commercial technology into an upgradable platform that can be used to defend chips against attacks, and provide an infrastructure to manage these hardened chips as they progress through their lifecycle,” DARPA said. The second area, led by software specialists Synopsys, “involves integrating the security engine technology developed in the first research area into system-on-chip (SOC) platforms in a highly automated way,” the DARPA release said. The Synopsys team also will be working on how to integrate new security designs and manufacturing tools with currently available off-the-shelf products. Nicholas Paraskevopoulous, sector VP for emerging capabilities development at Northrop Grumman, said in a May 27 press release that the firm's “design tools will enable the development of secure and trusted integrated circuits with reduced costs.” Northrop Grumman is involved in the first AISS research area. Synopsis could not be reached for comment by press time. https://breakingdefense.com/2020/05/darpa-seeks-secure-microchip-supply-chain/

  • US Air Force may replace 3 types of aircraft with a single platform

    2 août 2018 | International, Aérospatial

    US Air Force may replace 3 types of aircraft with a single platform

    By: Jeff Martin WASHINGTON — The U.S. Air Force is looking to replace three aircraft — the E-4B command post, the C-32A executive airlifter and the Navy's E-6B command post — under the purview of a single program known as NEAT. Air Force Materiel Command posted the request for information Tuesday for NEAT — otherwise known as National Airborne Operations Center (NAOC), Executive Airlift, Airborne Command Post (ABNCP), Take Charge and Move Out (TACAMO). The RFI comes after an April Senate hearing where Gen. Robin Rand, the commander of Air Force Global Strike Command, said it was time to get “very serious” about replacing the E-4B and E-6B. While the RFI provides little information into what is specifically sought, it does ask for companies' experience in commercial derivative military aircraft and joint work with other businesses. It also asks companies to propose a “recommended technical solution” for the NEAT program. Full article: https://www.defensenews.com/newsletters/daily-news-roundup/2018/08/01/us-air-force-may-replace-3-types-of-aircraft-with-a-single-platform/

Toutes les nouvelles