28 janvier 2021 | International, Aérospatial

Lockheed Overtakes Boeing as Largest US Aerospace and Defense Firm

Boeing, which saw no defense revenue growth last year, takes another financial hit from the tanker program.

Boeing ceded its long-held top spot as America's largest aerospace and defense firms to Lockheed Martin after reporting financial results from an abysmal 2020 on Wednesday.

The Chicago-based company also said it would lose another $275 million building Air Force KC-46 tankers because of “program primarily due to production inefficiencies including impacts of COVID-19 disruption.” The company has lost more than $4 billion on the project.

The company closed 2020 — a year that saw the collapse of passenger air travel from the coronavirus pandemic and the return to flight of the 737 Max airliner — with just under $58.2 billion in revenue, down 24 percent from the previous year.

While Lockheed — which on Tuesday reported $65.4 billion in 2020 sales — has long been the world's largest defense contractor, revenue from Boeing's commercial airplane business has combined with its military work to keep it atop the defense-and-aerospace category for decades.

Boeing's defense and space sales were flat year-over-year at just shy of $26.3 billion. Its services business, which includes defense work, made $15.5 billion, down 16 percent as thousands of aircraft remain grounded due to the pandemic.

“Overall, the government services and defense and space businesses remain significant and relatively stable and we continue to see solid global demand for our major programs,” CEO David Calhoun said on the company's quarterly earnings call Wednesday. “Nevertheless, the scale of government spending on COVID-19 response has the potential to add pressure to global defense spending in the years ahead.”

U.S. defense spending is expected to flatten or decline in coming years as the Biden administration and a Democrat-controlled Congress focus more on domestic issues.

Calhoun said the company expects its defense business to grow in the “lower end of the single digits” in coming years.

“It's hard to commit to a big uptick in any way on growth rates anytime soon, in light of what I think are the pressures,” he said.

Calhoun, who became CEO of the firm one year ago this month, said the coronavirus would continue to delay international defense contracts.

“The order activity in those international markets has pushed to the right, somewhat of an almost entirely because of COVID-related stuff, not because of any competitive issue one way or the other,” he said.

Like many of his colleagues in recent years, Calhoun touted Boeing's classified military work as being “incredibly encouraging and incredibly important to us.”

Despite the continued problems with the KC-46, the Air Force has purchased 94 of a planned 179 aircraft. Just this month, it placed two orders totaling $3.8 billion for 27 aircraft.

The FAA last month cleared the 737 Max for passenger flights in the United States. Some airlines have already resumed flights across North and South America. European regulators on Wednesday said the plane can resume flights across the continent.

Boeing also disclosed Wednesday that it would not deliver its first 777X, a larger, more efficient version of the popular 777 jetliner, until late 2023.

https://www.defenseone.com/business/2021/01/lockheed-overtakes-boeing-largest-us-aerospace-and-defense-firm/171684/

Sur le même sujet

  • HOW HACKED WATER HEATERS COULD TRIGGER MASS BLACKOUTS

    14 août 2018 | International, C4ISR

    HOW HACKED WATER HEATERS COULD TRIGGER MASS BLACKOUTS

    WHEN THE CYBERSECURITY industry warns about the nightmare of hackers causing blackouts, the scenario they describe typically entails an elite team of hackers breaking into the inner sanctum of a power utility to start flipping switches. But one group of researchers has imagined how an entire power grid could be taken down by hacking a less centralized and protected class of targets: home air conditioners and water heaters. Lots of them. At the Usenix Security conference this week, a group of Princeton University security researchers will present a study that considers a little-examined question in power grid cybersecurity: What if hackers attacked not the supply side of the power grid, but the demand side? In a series of simulations, the researchers imagined what might happen if hackers controlled a botnet composed of thousands of silently hacked consumer internet of things devices, particularly power-hungry ones like air conditioners, water heaters, and space heaters. Then they ran a series of software simulations to see how many of those devices an attacker would need to simultaneously hijack to disrupt the stability of the power grid. Their answers point to a disturbing, if not quite yet practical scenario: In a power network large enough to serve an area of 38 million people—a population roughly equal to Canada or California—the researchers estimate that just a one percent bump in demand might be enough to take down the majority of the grid. That demand increase could be created by a botnet as small as a few tens of thousands of hacked electric water heaters or a couple hundred thousand air conditioners. "Power grids are stable as long as supply is equal to demand," says Saleh Soltan, a researcher in Princeton's Department of Electrical Engineering, who led the study. "If you have a very large botnet of IoT devices, you can really manipulate the demand, changing it abruptly, any time you want." The result of that botnet-induced imbalance, Soltan says, could be cascading blackouts. When demand in one part of the grid rapidly increases, it can overload the current on certain power lines, damaging them or more likely triggering devices called protective relays, which turn off the power when they sense dangerous conditions. Switching off those lines puts more load on the remaining ones, potentially leading to a chain reaction. "Fewer lines need to carry the same flows and they get overloaded, so then the next one will be disconnected and the next one," says Soltan. "In the worst case, most or all of them are disconnected, and you have a blackout in most of your grid." Power utility engineers, of course, expertly forecast fluctuations in electric demand on a daily basis. They plan for everything from heat waves that predictably cause spikes in air conditioner usage to the moment at the end of British soap opera episodes when hundreds of thousands of viewers all switch on their tea kettles. But the Princeton researchers' study suggests that hackers could make those demand spikes not only unpredictable, but maliciously timed. The researchers don't actually point to any vulnerabilities in specific household devices, or suggest how exactly they might be hacked. Instead, they start from the premise that a large number of those devices could somehow be compromised and silently controlled by a hacker. That's arguably a realistic assumption, given the myriad vulnerabilities other security researchers and hackers have found in the internet of things. One talk at the Kaspersky Analyst Summit in 2016 described security flaws in air conditioners that could be used to pull off the sort of grid disturbance that the Princeton researchers describe. And real-world malicious hackers have compromised everything from refrigerators to fish tanks. Given that assumption, the researchers ran simulations in power grid software MATPOWER and Power World to determine what sort of botnet would could disrupt what size grid. They ran most of their simulations on models of the Polish power grid from 2004 and 2008, a rare country-sized electrical system whose architecture is described in publicly available records. They found they could cause a cascading blackout of 86 percent of the power lines in the 2008 Poland grid model with just a one percent increase in demand. That would require the equivalent of 210,000 hacked air conditioners, or 42,000 electric water heaters. The notion of an internet of things botnet large enough to pull off one of those attacks isn't entirely farfetched. The Princeton researchers point to the Mirai botnet of 600,000 hacked IoT devices, including security cameras and home routers. That zombie horde hit DNS provider Dyn with an unprecedented denial of service attack in late 2016, taking down a broad collection of websites. Building a botnet of the same size out of more power-hungry IoT devices is probably impossible today, says Ben Miller, a former cybersecurity engineer at electric utility Constellation Energy and now the director of the threat operations center at industrial security firm Dragos. There simply aren't enough high-power smart devices in homes, he says, especially since the entire botnet would have to be within the geographic area of the target electrical grid, not distributed across the world like the Mirai botnet. But as internet-connected air conditioners, heaters, and the smart thermostats that control them increasingly show up in homes for convenience and efficiency, a demand-based attack like the one the Princeton researchers describes could become more practical than one that targets grid operators. "It's as simple as running a botnet. When a botnet is successful, it can scale by itself. That makes the attack easier," Miller says. "It's really hard to attack all the generation sites on a grid all at once. But with a botnet you could attack all these end user devices at once and have some sort of impact." The Princeton researchers modeled more devious techniques their imaginary IoT botnet might use to mess with power grids, too. They found it was possible to increase demand in one area while decreasing it in another, so that the total load on a system's generators remains constant while the attack overloads certain lines. That could make it even harder for utility operators to figure out the source of the disruption. If a botnet did succeed in taking down a grid, the researchers' models showed it would be even easier to keepit down as operators attempted to bring it back online, triggering smaller scale versions of their attack in the sections or "islands" of the grid that recover first. And smaller scale attacks could force utility operators to pay for expensive backup power supplies, even if they fall short of causing actual blackouts. And the researchers point out that since the source of the demand spikes would be largely hidden from utilities, attackers could simply try them again and again, experimenting until they had the desired effect. The owners of the actual air conditioners and water heaters might notice that their equipment was suddenly behaving strangely. But that still wouldn't immediately be apparent to the target energy utility. "Where do the consumers report it?" asks Princeton's Soltan. "They don't report it to Con Edison, they report it to the manufacturer of the smart device. But the real impact is on the power system that doesn't have any of this data." That disconnect represents the root of the security vulnerability that utility operators need to fix, Soltan argues. Just as utilities carefully model heat waves and British tea times and keep a stock of energy in reserve to cover those demands, they now need to account for the number of potentially hackable high-powered devices on their grids, too. As high-power smart-home gadgets multiply, the consequences of IoT insecurity could someday be more than just a haywire thermostat, but entire portions of a country going dark. https://www.wired.com/story/water-heaters-power-grid-hack-blackout/

  • Navy's Fire Scout Drone Helo May Be Sold to Allied Militaries Soon

    23 juillet 2018 | International, Naval

    Navy's Fire Scout Drone Helo May Be Sold to Allied Militaries Soon

    By Oriana Pawlyk RAF Fairford, England -- Northrop Grumman Corp. is looking to expand sales of its MQ-8C Fire Scout abroad as the unmanned helicopter preps for its anti-submarine warfare mission. Sitting buttoned-up on the flightline here, the Fire Scout drone -- complete with the U.K.-based Ultra Electronics' sonobuoy mission pod -- is receiving exposure just weeks after completing the first set of mission tests of its target identification, surveillance and surface warfare abilities aboard the USS Coronado. "They've matured it to a level now where [people are] recognizing the value in different missions it is able to do and the [U.S. Navy] is very excited about expanding that capability," said Brian Chappel, Northrop's sector vice president and general manager of autonomous systems. Military.com sat down with Chappel during the Royal International Air Tattoo here. Northrop did not showcase the UAS at Farnborough. "Some of those missions are going to be very interesting to customers around the world. Antisubmarine warfare, communication nodes, support to service action groups, and also with beginning to see a shift in the export policy around this class of system in the U.S., we think there's an opportunity now to take this system and its capability and what it does and find some fertile ground overseas," he said. Related content: US Still Hopes to Sway Turkey to Buy Patriot Missiles over S-400 Air Force Slowly Building Up in Eastern Europe: USAFE Commander Military.com Farnborough Airshow Coverage Chappel's comments come as the Trump administration on Monday finalized its Conventional Arms Transfer (CAT) Policy. The State Department recently approved the policy, which aims to relax export rules as well as create channels for U.S. defense industry to sell weapons and drones to international customers without U.S. government sign-off. "We're in various stages in providing information to [partners] through the Navy," Chappel continued. "And by bringing it here [during] the 100th anniversary of the Royal Air Force, a lot of different forces, a lot of people to talk to here that wouldn't normally think about a Fire Scout, and we get to ... tell them how it's a little bit different than just unmanning a helicopter that flies by itself." The Navy, which is set to use Fire Scout aboard its Littoral Combat Ships, is working with Northrop to add different capabilities, Chappel said. "There's a radar that's now being implemented on the system that when it goes operational, will extend the horizon [of it] hundreds of miles beyond," he said, referring to Leonardo's Osprey 30 lightweight active electronically scanned array radar, as well as common datalink Link 16. The UAS is a stripped-down version of the Bell 407. While the anti-sub mission pod would also be an enhancement, it is not currently used by the Navy. The Fire Scout also participated in the U.S. Navy-led RIMPAC exercises this month. The drone can stay airborne for 12 hours and fly at a ceiling of 16,000 feet. Its radar range lets it see roughly 100 miles out to detect a surface target. Chappel estimates that in 10 years additional U.S. units will be using the drone, as well as allies. He said it will evolve for different mission sets. "Do you want it to be an [anti-sub warfare] platform today, and a comms node tomorrow or mixing and matching ... in between?" he said, adding that additional sensors could be integrated for range. "That type of flexibility will make it very attractive." https://www.military.com/dodbuzz/2018/07/17/navys-fire-scout-drone-helo-may-be-sold-allied-militaries-soon.html

  • F-35 delivery delays frustrate European air force upgrade plans

    21 mars 2024 | International, Aérospatial

    F-35 delivery delays frustrate European air force upgrade plans

    Client governments early in the acquisition sequence could be the first to feel the ripple effects of a snag related to technology upgrades.

Toutes les nouvelles