31 juillet 2020 | International, Aérospatial

Japan commits to local F-35 production

by Jon Grevatt

The Japanese Ministry of Defense (MoD) has confirmed plans to continue the local production of Lockheed Martin F-35 Lightning II Joint Strike Fighter aircraft.

The move reverses a decision in late 2018 to cease local production at Japan's final assembly and checkout (FACO) facility in Nagoya and instead focus on the localised maintenance, repair, overhaul and upgrade (MRO&U) of F-35s. That move was previously prompted by the high cost of building the F-35s at the facility.

However, a spokesperson from the MoD told Janes that the new decision to continue building the aircraft at the Japanese FACO facility was influenced by the declining costs of producing the F-35 locally. Producing the aircraft locally, said the spokesperson, is now cheaper than importing the F-35 from the United States.

The spokesperson was speaking to Janes nearly three weeks after the United States government approved a potential USD23 billion deal to sell Japan an additional 105 F-35s.

This Foreign Military Sale means Japan will operate a total of 147 F-35s, becoming the second-largest operator of the aircraft in the world.

These aircraft will comprise 105 conventional take-off and landing (CTOL) F-35A aircraft and 42 units of the short take-off and vertical landing (STOVL) F-35B.

The spokesperson said, “For the acquisition of F-35As in fiscal years (FY) 2019 and 2020... the Japanese MoD has decided to use domestic manufacturing at the FACO... It is confirmed that the unit cost of aircraft produced at the domestic FACO [facility] is less, compared to the unit cost of imported aircraft.”

https://www.janes.com/defence-news/news-detail/japan-commits-to-local-f-35-production

Sur le même sujet

  • Norway plans to purchase NASAMS air defence and new missiles

    19 novembre 2023 | International, Aérospatial, Terrestre

    Norway plans to purchase NASAMS air defence and new missiles

    The proposed investments include eight launcher units and four fire control centers for NASAMS, replacing equipment donated to Ukraine earlier this year.

  • Leonardo, Elbit units to prototype targeting device for US Army

    30 octobre 2023 | International, Terrestre

    Leonardo, Elbit units to prototype targeting device for US Army

    The U.S. Army published a request for prototype proposal for the Joint Effects Targeting System II in late 2022.

  • The Air Force sends good guys in to hack its cloud

    8 août 2019 | International, Sécurité

    The Air Force sends good guys in to hack its cloud

    By: Andrew Eversden The Air Force invited ethical hackers into its IT networks again this spring, allowing good guys the chance to infiltrate its enterprise-wide Air Force Common Computing Environment in search of vulnerabilities, the white hat hacking company Bugcrowd announced Aug. 6. The bug bounty program, done in a partnership with Bugcrowd and the Air Force's CCE program office, found 54 vulnerabilities. Bug bounties work under the assumption that the customer, in this case the Air Force, will now close the loopholes the hackers found, making the system more secure. The CCE cloud uses Amazon Web Services and Microsoft's Azure commercial cloud. The service plans to migrate more than 100 applications to that cloud environment, Bugcrowd executives said. The largest payout from the bug bounty totaled $20,000. The event ran from March 18 to June 21 at Hanscom Air Force Base in Massachusetts. Casey Ellis, Bugcrowd founder and CTO, said it was the first time Bugcrowd has worked with the Air Force. The Air Force has completed several other white hat hacking events with the firm HackerOne. Ellis said that moving to the cloud from on-premise environment represents a “paradigm shift” for many organizations. Penetration testing is an important part of keeping that environment secure, he said. Bugcrowd conducted such tests in six phases: source code analysis, AWS environment testing, Azure environment testing, black box network authentication assessment, social engineering engagement and Air Force portal testing. Bugcrowd declined to discuss how many vulnerabilities were found throughout each stage of the process. According to a news release from the Air Force from April, the CCE currently houses 21 Air Force applications and "has room for countess more.” The computing environment allows the Air Force to have a cloud to host its applications that reside on its Global Combat Support System, which is a centralized, cohesive enterprise resource planning system. The Air Force said in the April release that each migration costs $446,000 and that the service has spent more than $136 million on the program since 2016. https://www.fifthdomain.com/dod/air-force/2019/08/06/the-air-force-sends-good-guys-in-to-hack-its-cloud/

Toutes les nouvelles