9 décembre 2020 | International, Aérospatial, Naval

Macron kicks off French race to build a new nuclear-powered aircraft carrier

By:

PARIS – French President Emmanuel Macron announced on Dec. 8 that his country's next aircraft-carrier will be nuclear-powered and should be operational by 2038 in time to replace the Charles de Gaulle, which entered active service in 2001.

The new aircraft carrier is expected to be the biggest warship France has ever built. Florence Parly, the armed forces minister, said in October that the ship, whatever its propulsion, would be designed to deploy the future combat aircraft system (FCAS) and today her ministry confirmed that the vessel would deploy about 30 of these aircraft “which will be bigger than the Rafales.”

The ministry said the ship would be in the 75,000 tonne class (82,673 tons), be around 300 meters long (984 feet) and be able to sail at 27 knots (31 mph), even bigger than the second aircraft carrier that Naval Group was working on in the early 2000s until that program was shelved by the government for lack of money. In comparison, the Charles de Gaulle is 261m (856 feet) long and weighs 42,000 tonnes (46,297 tons) fully loaded. The new ship will have a crew of about 2,000, including the air group.

Speaking at Framatome, France's principal nuclear-power company headquartered at Le Creusot in the centre of France, Macron announced just four minutes before the end of his 28 minute speech that he had “decided that the future aircraft-carrier which will serve our country and our navy will, like the Charles de Gaulle, be nuclear-propelled.”

It will have two K22 power generators each generating 220 megawatts (hence the 22) derived from the K15 (that generate 150 MW each) that currently power the Charles de Gaulle.

Naval Group, which is the prime contractor for these major ship-building projects, immediately issued a statement hailing the decision, pledging to work with its major industrial partners Chantiers de l'Atlantique, TechnicAtome and Dassault Aviation.

Pierre Eric Pommellet, chairman and CEO of Naval Group, said, “We are delighted with the announcement (...) which will enable France to maintain its position in the very restricted circle of major powers holding a nuclear aircraft carrier.”

Echoing what Macron had said in his speech, Pommellet stressed the importance of projects like this to “ensure the continuity of our skills” and of developing innovative solutions “in the fields of propulsion and high added-value military systems, thus maintaining France's technological lead and its position as a key geostrategic player.”

Now that the nuclear option has been chosen to power France's new aircraft carrier, other major decisions will have to be taken, notably concerning the catapults which are a vital part of the project. France has no expertise in this highly specialized technology and so will have to import the catapults from the United States, as it has done for the past 60 years. Those on the Charles de Gaulle are steam-powered, but those on the new aircraft carrier will be electromagnetic.

Naval Group and its partners will now start a two-year preliminary design study, which sources said may use a number of the ideas that had been worked on for the aborted second aircraft carrier. That will be followed by more detailed plans with the development phase expected to finish at the end of 2025 at which point the ministry will order the ship. The design phase up to the end of 2025 is expected to cost some €900 million ($1.09 billion) of which €117 million ($142 million) will be spent in 2021.

https://www.defensenews.com/global/europe/2020/12/08/macron-kicks-off-french-race-to-build-a-new-nuclear-powered-aircraft-carrier/

Sur le même sujet

  • Millennium to apply Victus Nox lessons to missile warning satellites

    13 décembre 2023 | International, Aérospatial

    Millennium to apply Victus Nox lessons to missile warning satellites

    The company in November passed a key design review for the Missile Track Custody program, which aims to develop a constellation of satellites in MEO.

  • This training tool could be the answer to stop mass cyberattacks

    9 juillet 2020 | International, C4ISR, Sécurité

    This training tool could be the answer to stop mass cyberattacks

    Mark Pomerleau At air bases across Europe, networks are under attack. Malicious hackers have gained access to sensitive systems, information, controls and critical infrastructure. But cyber operators from U.S. Cyber Command, in concert with Five Eyes partners, have been called in to thwart these attempts in real time. This was the main scenario for this year's capstone cyber training exercise put on by Cyber Command, Cyber Flag 20-2. The exercise, which took place June 15-26 and was exclusively defensive in nature, saw more than 500 participants and 17 teams participating from five countries across nine time zones, and it included America's National Guard, the U.S. Energy Department and the Five Eyes alliance — Australia, Britain, Canada, New Zealand and the U.S. Australia, however, did not participate during this iteration. Officials told reporters this week that the purpose of Cyber Flag 20-2 was to continue building the community of defensive cyber operations and to improve the overall capability of the Five Eyes countries to defend against cyber aggressors. The drill involved teams defending IT and operational security networks against a live, opposing force trying to disrupt, deny and degrade the air bases' operations. The networks under attack were industrial control systems simulated to generate network traffic for an aviation fuel farm, power grid, air traffic control radars and electronic access control systems. The attacks came in the form of malware that targeted devices responsible for fuel and power. But the unique aspect of this year's exercise, as C4ISRNET previously reported, was the use of a new remote cyber training tool called the Persistent Cyber Training Environment. PCTE is an online client that allows Cyber Command's cyber warriors, as well as partner nations, to log on from anywhere in the world to conduct individual or collective cyber training as well as mission rehearsal, which to date had not existed for the cyber force as it does for physical troops. The program is run by the Army on behalf of the joint cyber force. The platform not only allowed the exercise to continue as planned amid the coronavirus pandemic, but it enabled collaboration and simultaneous training across the world. A new way to train Officials say PCTE is providing Cyber Command with an entirely new way to train cyber forces, which previously was difficult given a lack of infrastructure and the time needed to set up ranges and scenarios. It also allows Cyber Command and military units to conduct more frequent training. Cyber Flag typically was Cyber Command's largest and only holistic tactical training event, held annually during June. For units, aside from Cyber Flag, there were no other ways to stay sharp on their skills unless they built their own environments. Now, Cyber Command plans to hold more exercises, with Cyber Flag 20-3 occurring in the fall. “The delivery of the Persistent Cyber Training Environment absolutely allows us to increase the frequency and the complexity of exercises that are conducted by the command itself,” Coast Guard Rear Adm. John Mauger, director of exercises and training at Cyber Command, told reporters. “Going forward, I would expect you to see a series of exercises throughout the year where we are reaching out to the different teams to test their capabilities or to focus on specific issues that are of concern or interest to us. “Going forward, we're going to get the benefits of both those distributed exercises along with increasingly complex exercises as PCTE is instantiated across both the secret network and the top-secret network.” Scenarios and environments can be stored, saved, reused and modified if needed in the system for later exercises. Smaller units will also be able to leverage these scenarios to practice whenever needed. The PCTE virtual environment for this year's exercise included 25 interconnected ranges of more than 3,000 virtual machines — a high-fidelity network that simulated and emulated open internet traffic with more than 4,000 static websites that store and share data. The simulated air base networks created in PCTE had fully configured Windows active directory domains with over 100 nodes running more than 10 types of major operating systems, along with 35 simulated user control workstations actively surfing the internet and using Microsoft Office products to access, create and transfer files. Moreover, officials also explained PCTE can be integrated into larger, multi-combatant command-type exercises to simulate the cyber effects, such as Global Lightning and its companion Cyber Lightning. Global Lightning is an annual global exercise run by Strategic Command to test integration across several geographic and functional combatant commands. Cyber Lightning is Cyber Command's portion to the exercise. “We think that is the next evolution of the Persistent Cyber Training Environment and how we take to the tier 1 exercises, incorporate cyber effects. They're no longer white-carded,” Col. Tanya Trout, Cyber Command's PCTE director and acting director of the Joint Cyber Training Enterprise, told reporters. White carding involves telling exercise participants that a certain action has occurred. This was typical of cyber effects, given it was difficult to realistically simulate them, which diminished the training value in exercises because participants didn't experience the full breadth of these actions. Now, these activities can play a real role in exercises increasing the overall fidelity of training across the joint force and continuity of all operations of warfare. The system will also be able to be used for mission rehearsals. A Cyber Command official said the force can input prior operations, such as those used against the Islamic State group, to train against. Additionally, they'll be able to upload to the platform malware discovered in operations. The PCTE program office, which is in the prototyping phase despite delivering the first portion to Cyber Command in February 2020, also learned valuable lessons in Cyber Flag. Officials said the two-week exercise provided the program office with six months' worth of data it can use to make significant improvements. Prior to the February delivery, the program office leveraged several smaller-scale training events at the unit level to incrementally increase capabilities and scalability as well as help geographically dispersed teams prepare for tier 1 exercises like Cyber Flag. Overall, officials are happy with how the system performed in its first tier 1 exercise, pointing to little to no latency issues, though there were periodic improvement tickets. “What we found through the rapid development and use of the Persistent Cyber Training Environment is that we really have a unique capability to move forward with,” Mauger said. https://www.c4isrnet.com/dod/cybercom/2020/06/25/this-training-tool-could-be-the-answer-to-stop-mass-cyberattacks

  • South Korean military to upgrade ‘friend or foe’ ID capability

    25 septembre 2018 | International, Aérospatial, Naval, Terrestre, C4ISR

    South Korean military to upgrade ‘friend or foe’ ID capability

    By: Jeff Jeong SEOUL — Thousands of South Korean jet fighters, helicopters, warships and missile systems will be fitted with sophisticated identifications technologies by the mid-2020s under a major weapons upgrade program, according to the military and defense companies. For the $2.2 billion deal to switch the decades-old Mode-4 Identification Friend or Foe, or IFF, system to the latest Mode-5, South Korea's arms procurement agency has started issuing a request for proposals. “The number of equipment eligible for the Mode-5 upgrade account approximately 2,000 related to 70 weapons systems,” according to a spokesman for the Defense Acquisition Program Administration. “The request for proposals will continued to be issued separately by the types of weapons systems over the coming weeks.” The upgrade program is in line with the transfer of IFF systems to the Mode-5 version by the U.S military, as the South Korean military conducts key operations with U.S. forces on the Korean Peninsula under the authority of the Combined Forces Command. By 2020, all NATO nations are required to introduce the Mode-5 systems, using advanced cryptographic techniques to secure their systems against electronic deception by adversaries. “This is a huge program as for the numbers and budget, and is strategically important to upgrading the battlefield capability of the South Korean military and its joint operations with allied forces,” said Kim Dae-young, a military analyst at the Korea Research Institute for National Strategy. “The new encrypted system will allow South Korean and its allied troops to work safely together, reducing the risk of friendly fire incidents, and it will also offer commanders a better view of the battlefield,” Kim added. IFF works by sending coded signals, with equipment on friendly planes and ships able to receive and instantly decode the encrypted challenge message, then send the appropriate response to identify themselves. Three South Korean defense manufacturers are competing for the IFF upgrade contract by teaming up with foreign IFF developers. They are Hanwha Systems, teaming up with U.S. company Raytheon and Hensoldt of Germany; LIG Nex1, with Italy's Leonardo and Thales of France; and Korea Aerospace Industries, joining hands with BAE Systems of the United Kingdom. Unlike the installation of the Mode-4, the technologies of which belong to foreign IFF makers, domestic companies are involved in the Mode-5 systems development and will locally produce the equipment for cost-effectiveness and sustainable integrated logistics support, according to Defense Acquisition Program Administration officials. Hanwha Systems, a leading defense electronics company formerly known as Samsung Thales, claims it has the advantage of having know-how related to IFF integration and design. “Our company was in charge of almost all Mode-4 upgrade programs in cooperation with foreign partners,” said Yoon Seok-joon, a consultant with Hanwha Systems' avionics business team. “Through the experience, we have much better knowledge of IFF design and functions than other local competitors. This is a clear advantage.” LIG Nex1, a precision missile developer, formed a task force in 2016 for Mode-5 upgrade work to seek related technology for localization. As a result, the company successfully localized a Mode-5 system for its KP-SAM Shin-Gung (or Chiron) shoulder-launched surface-to-air missiles with the help of Thales, which is contracted to provide Mode-5 technologies for ground weapons systems. “Based on the successful development of a Mode-5 device for Shin-Gung, we're now able to independently develop Mode-5 equipment for other weapons systems, such as Hybrid Biho air defense system; Chunma short-range surface-to-air missile; and TPS-830K low-altitude radar,” said Park Jung-ho, program manager of LIG Nex1's Mode-5 upgrade team. To help facilitate the certification of its Mode-5 systems by the U.S. Defense Department, LIG Nex1 recently signed an agreement with the U.S. defense system certification contractor KBR. Korea Aerospace Industries is expected to win contracts for Mode-5 devices to be fitted on advanced aircraft, including F-15K fighters, T-50 trainer jets and Surion utility helicopters. KAI develops the Surion platform. “We own thousands of platforms around the world with this product, so we have lots of experiences in the U.S. and other countries as well as with this IFF piece of equipment,” said Rob Peer, president of BAE Systems in Korea. “It's advanced technology with low weight, low power and cost effective. All of those things make it very effective.” Peer stressed that he feels BAE Systems' Mode-5 is the best fit for the systems of the F-35 fighter jet, which South Korea is to deploy in the coming years. https://www.defensenews.com/global/asia-pacific/2018/09/24/south-korean-military-to-upgrade-friend-or-foe-id-capability

Toutes les nouvelles