13 juillet 2020 | International, Terrestre

Russia and US jostle for arms sales to India after tensions with China over border

  • India is a top buyer of foreign weapons on the international market and Russia has been its main supplier since the Soviet era
  • The June 15 clash between China and India in the contested Galwan Valley lends an urgency to New Delhi's arms programme

Russia and the United States are racing to sell weapons to India as New Delhi seeks to boost arms supplies for its ongoing military tension with Beijing.
The Indian government last week rushed to approve a proposal to acquire 33 new Russian warplanes for US$2.4 billion and upgrade 59 more, in addition to an earlier US$5.43 billion deal for S-400 air defence missile systems, after the deadly skirmish with Chinese troops last month on their disputed border.
However, Russia's close relationship with China raised questions over Moscow's reliability by some in India, while the US, which has been stepping up ties with New Delhi through the Indo-Pacific strategy, has been pushing for arms sale to India.
“Many believe that India must not put all its eggs in one basket, rather continue to follow the middle path by pushing for engagement with both Russia as well as the United States,” said Rajeswari Pillai Rajagopalan, a distinguished fellow and head of the Nuclear and Space Policy Initiative at the Observer Research Foundation in New Delhi.

India is a top buyer in the international arms market, with billions of dollars of imports every year. In the past 10 years, it has spent more money on foreign weapons than any other country in the world, according to the Stockholm International Peace Research Institute.

Russia has been the main supplier to India since the Soviet era. Since 2000, it has sold about US$35 billion worth of weapons, accounting for more than two-thirds of India's arms procurement of US$51 billion.

Most of India's strategic weapons – from its only active aircraft carrier INS Vikramaditya with its ship-borne MiG-29 and Ka-31 aircraft, to its only nuclear attack submarine in service, the Chakra II, to its T-90 and T-72 main battle tanks – are from Russia. Additionally, Russia licensed Indian firm HAL to build the Su-30 MKI, the main fighter for the Indian Air Force, and contributed to India's only nuclear-capable supersonic cruise missile – the BrahMos.

In comparison, arms deals with the US have totalled just US$3.9 billion over the past 20 years but America has been rapidly catching up since 2010 to rise to number two vendor to India, surpassing Israel and France.

India has equipped its military with Boeing C-17 and C-130J airlifters. Earlier this year, Indian Prime Minister Narendra Modi pledged to US President Donald Trump to buy US$3 billion worth of US equipment, including helicopters, as the two converged on a course to counter China in the Indo-Pacific region, and gradually formed much closer military ties with a series of strategic military pacts

Then the tension between India and China suddenly escalated, culminating in a clash on June 15, in which at least 20 Indian soldiers were killed in the contested Galwan Valley between Indian-administered Ladakh and Chinese administered Aksai Chin. The continued stand-off added urgency to India's arms shopping.
“Russians profit from a Sino-India clash. I don't think the Americans would be so happy to see that,” said Zhou Chenming, a Beijing-based military analyst. “The Trump administration has been trying very hard to grab a bigger share in this market of billions every year, which they wouldn't want to miss.”
The US has leverage. The 2017 Countering America's Adversaries Through Sanctions Act (CAATSA) punishes whoever engages in “significant transactions” over US$15 million with the Russian state-owned defence industry. And Washington has remained non-committal despite the constant request for an exemption from the Indian side.
“I don't think the US will actually implement the sanction at the end of the day. That was part of the effort to pressure India to choose American arms over Russian,” said Song Zhongping, a military commentator in Hong Kong. “And Russia will not sit by. They will also take action to keep India on.”

Other efforts include discussions earlier this year in which the US offered to develop for India a “super F-16”, and even transfer the production line to India as preferred by the Modi government, as well as other air defence missile alternatives to the S-400.
The US has delivered Apache and Chinook helicopters now deployed in Ladakh.
Song said India's buying spree could increase its strength against the Chinese army but only to a limited extent.
“India could buy some advanced weapons but cannot buy real combat capability. A modern military is an organic system,” he said.

https://www.scmp.com/news/china/diplomacy/article/3092710/russia-and-us-jostle-arms-sales-india-after-tensions-china

Sur le même sujet

  • US, Polish presidents sign pact to boost American military presence in Poland

    25 septembre 2019 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    US, Polish presidents sign pact to boost American military presence in Poland

    By: Jaroslaw Adamowski WARSAW, Poland — U.S. President Donald Trump and his Polish counterpart Andrzej Duda inked a joint declaration on advancing defense cooperation Sept. 23 in New York, paving the way for an increased U.S. military presence in Poland. The two countries “continue to develop the plan to bolster Polish–United States military ties and United States defense and deterrence capabilities in Poland. These capabilities presently include approximately 4,500 rotational United States military personnel. As noted, this enduring presence is expected to grow by approximately 1,000 additional United States military personnel in the near term,” according to the declaration. The partners have determined six locations for this designed enhanced military presence. Poznań, in western Poland, is to host the Division Headquarters and the U.S. Army area support group. Drawsko Pomorskie, in the country's northwest, will host the primary Combat Training Center for joint use by the Polish and U.S. Armed Forces. Wrocław-Strachowice, in southwestern Poland, is to host the U.S. Air Force aerial port of debarkation, and Łask, in the country's central part, will host the U.S. Air Force remotely piloted aircraft squadron. Powidz, in western Poland, is to host a combat aviation brigade, a combat sustainment support battalion, and a special operations forces facility, while Lubliniec, in the country's south, will host a special operations forces facility, according to the document. Warsaw and Washington are also in dialogue about “the most suitable location in Poland for an armored brigade combat team,” the declaration says. Warsaw has been seeking a permanent U.S. military presence in Poland, dubbed “Fort Trump,” amid rising security concerns over Russian activities in the region. As part of these efforts, the Polish government offered to earmark at least $2 billion toward the project under which the U.S. would establish a military base in the country. Last June, Duda met with Trump in Washington to discuss the initiative and sign a joint declaration on defense cooperation regarding U.S. force posture in Poland. https://www.defensenews.com/global/europe/2019/09/24/us-polish-presidents-sign-pact-to-boost-american-military-presence-in-poland/

  • US Air Force nuclear, space programs take hit in border wall reprogramming

    14 mai 2019 | International, Aérospatial

    US Air Force nuclear, space programs take hit in border wall reprogramming

    By: Joe Gould , Aaron Mehta , and Valerie Insinna Correction: A previous version of this story contained an erroneous amount of reprogrammed money. The story has been updated to show the Pentagon reprogrammed $1.5 billion in FY19 funds. WASHINGTON — In the wake of the Pentagon reprogramming $1.5 billion in fiscal 2019 funds to support President Donald Trump's border wall with Mexico, only the U.S. Air Force appears to be losing money appropriated for equipment updates. The funding largely comes from personnel accounts in the Air Force, Navy and Army. But the Air Force is the only service to lose funding for hardware, including nuclear and conventional weapons, surveillance aircraft updates, and space programs. Overall, the Pentagon reprogrammed $818.465 million from FY19 defense appropriations, as well as $681.535 million from FY19 overseas contingency operations accounts, or OCO, to reach that $1.5 billion total. Lawmakers expressed concern that the use of military resources and manpower on the southern border will damage military readiness. However, acting Defense Secretary Patrick Shanahan said last week that ongoing deployments to support the Defense Department aren't doing so. “We've seen no degradation to readiness,” he told Senate appropriators May 8 at a defense budget hearing. “In fact, in some cases, it's enhanced our readiness because the troops get to perform certain functions.” Congressional Democrats and some Republicans have objected to the administration's use of this mechanism for funding the president's border wall, arguing it bypasses Congress' constitutional power of the purse. For the second time in recent weeks, the Pentagon ignored decades of precedent and carried out the transfer of funds without first consulting with the Senate Appropriations Committee. Sen. Patrick Leahy, the Senate Appropriations Committee's top Democrat, led a letter to Shanahan on May 10 to object to the latest instance, saying it harms hurricane cleanup at Tyndall Air Force Base, Florida. “We are dismayed that the Department has chosen to prioritize a political campaign promise over the disaster relief needs of our service members, given the finite reprogramming authority available," the lawmakers wrote. They noted that Shanahan's decision to notify Congress of the reprogramming came a day after he testified before the subpanel that oversees defense spending, and they wrote that they welcomed his views on “how you intend to repair the damaged relationship between the defense oversight committees and the [Defense] Department.” The letter was also signed by the Senate Armed Services Committee's top Democrat, Sen. Jack Reed, as well as Democratic Sens. Dick Durbin, Brian Schatz, Tom Udall , Patty Murray, Chris Murphy, Tammy Baldwin, Dianne Feinstein and Jon Tester. The reprogramming could be a topic at Shanahan's future confirmation hearing for the full job of defense secretary. A date for that hearing has not been set. Why the Air Force? About half of the non-OCO $818 million sum the Defense Department wants to redirect to the border comes from Air Force accounts, with space and missile programs taking the biggest hit. In total, the Pentagon expects the service to shear $402 million off its FY19 budget. About $210 million would be cut from Air Force space programs, specifically the Evolved Expandable Launch Vehicle program, which funds the use of rockets that send satellites and other capabilities into space. According to the reprogramming document, one rocket launch has been canceled due to the “Space Test Program (STP)-4 satellite provider termination of the Robotic Servicing of Geosynchronous Satellites (RSGS) spacecraft,” which is no longer necessary under the National Security Strategy. The Air Force's program for modernizing its E-3 Sentry early warning aircraft — more commonly called AWACS — also could lose funding that it no longer needs in FY19. The program, "Diminishing Manufacturing Sources Replacement of Avionics for Global Operations and Navigation,” or DRAGON, updates the E-3's avionics and brings it into compliance with future air traffic control requirements. But it is moving too slowly to use all of the funds it was appropriated in FY19, so the administration aims to have $57 million diverted for border protection. DRAGON has been delayed for two reasons, according to the reprogramming request. First, “aircraft have been available for programmed depot maintenance” at a slower-than-planned rate, dragging out the modification schedule. Additionally, DRAGON integration can only occur after AWACS are upgraded to the Block 40/45 configuration, and not all aircraft have gone through that process. The Air Force sees AWACS as a key part of its initial version of the Advanced Battle Management System, a family of systems that will provide ground surveillance across the different military services. Instead of retiring seven E-3s in FY18, Gen. Mike Holmes, head of Air Combat Command, said those planes could be upgraded with new sensors and communications gear. However, DRAGON isn't the only modernization effort for the Sentry that is moving slower than expected. In November, Bloomberg reported that the service terminated a contract with Boeing to upgrade the AWAC's characteristic disc-shaped radar due to repeated delays. Other Air Force programs that will take a hit include a planned upgrade to the Minuteman III intercontinental ballistic missile and the air-launched cruise missile programs. A number of top defense officials previously said nuclear modernization is the top priority for the Pentagon, including Ellen Lord, the department's acquisition head, who on May 1 told Congress: “We have weapons that are decades over what was supposed to be their useful life. And we are out of time. We need to continue on the path we're on, or we are going to fall behind and not have the nuclear deterrence that we enjoy today.” The document reprograms $24.3 million, of the $124.5 million appropriated in FY19, from the Minuteman III Launch Control Block Upgrade program; the document claims funds are available due to a “slip in the production schedule for FY 2020.” Meanwhile, $29.6 million — more than half of the $47.6 million appropriated for the air-launched cruise missile programs in FY19 — will be reprogrammed. The explanation for that change: “Funds are available due to contract savings from reduced guided missile flight controller modification requirements; and due to lack of executable requirements for Support Equipment and Low Cost Mods in FY 2019.” The reprogramming of funds for the Hellfire missile is also notable, as the Pentagon has identified a lack of munitions stockpiles as a major issue to address in its budget request. As an example, the FY20 budget called for the maximum rate of production possible on Hellfire: $730.8 million for 9,000 of the weapons. The document states that funds are “available due to contract savings from all variants that provide precision kill capabilities. Savings are attributed to negotiated lower unit costs per missile system.” https://www.defensenews.com/smr/federal-budget/2019/05/13/us-air-force-nuclear-space-programs-take-hit-in-border-wall-reprogramming/

  • The largest cyber exercise you’ve never heard of

    25 février 2020 | International, Aérospatial, C4ISR, Sécurité

    The largest cyber exercise you’ve never heard of

    For years, the first time the Department of Defense's cyber forces faced high-end digital attacks was not in practice or in a classroom, but in actual operations. For the cyber teams that focused on offense, a playbook developed from years of National Security Agency operations guided their work. But on the defensive side, standards and processes needed to be created from scratch meaning, in part, there was a lack of uniformity and little tradecraft to follow. Because cyber leaders had focused on staffing, training opportunities for defensive cyber operators had been sparse. To help solve that problem, the Department of Defense is expected to award a contract worth roughly $1 billion later this year for a global cyber training environment. But in the meantime, some units across the joint force have gone so far as to create their own small-scale training events and exercises to keep their forces' skill sets sharp. Perhaps the best example of these efforts are the 567th Cyberspace Operations Group's “Hunt Event,” which has quickly grown to become one of the largest cyber exercises across the department. The bi-monthly exercise pits teams against each other in a competition for the coveted Goblet of Cyber trophy and bragging rights. The group aims to better train defensive hunters, improve defensive tactics, techniques and procedures and develop defensive tradecraft. “The point of this was that we didn't really have a good range space to play on that had an active and live adversary so we could, in theory, replay traffic and we could go in and generate some easy kill, low hanging fruit signatures for detection,” Capt. Reid Hottel, training flight commander at the 837th Cyber Operations Squadron, told Fifth Domain. “If we are supposed to be the primary counter to advanced persistent threats, the way that we were training was not like how we were fighting.” The exercises started roughly a year ago to teach operators how to hunt on networks. It's now evolved to where participants also work on leadership skills and build custom exploits on a large range with multiple stakeholders. In addition to the Air Force CPTs — the defensive cyber teams each service provides to U.S. Cyber Command — members from the Air Force Office of Special Investigations and Mission Defense Teams, specialized defensive cyber teams that will protect critical Air Force missions and local installations, also take part. At the most recent exercise in January, a representative from NASA participated. Now, the exercises have become so popular Hottel said other services are interested in participating in the future. This includes a Marine Corps CPT at Scott Air Force Base. Building better leaders and hunters To be the best, cyber leaders recognized their teams would have to beat the best and that meant training against the world's most advanced cyber threats. Some other forms of training — such as the popular capture the flag game, which involve teams trying to find “flags” such as files or scripts inside a network — are not always the most realistic form of training. “When we were fighting, we're up against advanced adversaries. We're up against adversaries that are using tactics, techniques and procedures that are just above and beyond what simple little [scripts] ... we were using in the past,” Hottel said. “This hunt exercise allows us to do that, whereas in the past, particularly in other flag exercises, we are not training at the APT level. We [were] training at the script kiddie kind of level and here we're training at a much higher difficulty, which stretches and grows our operators into being true hunters.” He added that the exercises are also helping develop tradecraft. “That's one thing that nobody really teaches, there's no commercial course that you can go buy that teaches tradecraft, that teaches the military away, that teaches the way that we use to find the APT, which in theory, should be ever evolving because our adversary is as well,” Hottel said. “These exercises have been really eye-opening to provide tradecraft development, to become hunters, to understand what it means to be a cyber protection team.” The exercise has evolved to include custom exploits, custom root kits, custom attacks and zero-day exploits within a real-world mission where in some cases hunters don't have any indictors of compromise that exist in the public domain. This means that there is no public reporting available on the exploits or tactics the adversary is using. Participants can hone their skills, by actively hunting on a network in order to find anomalies that could lead to trouble. “As hunters,” he said, “we don't necessarily have singular methodology, we don't necessarily have a unique way that we can go about finding advanced threats mostly because we haven't really been training like that.” The training is also helpful for new mission defense teams, which are just being officially resourced within the Air Force around local installations. By having those teams sit next to CPTs, who are using generally the same tools, they can learn about tradecraft and what to look for at the local level. During the most recent exercise, officials said it was the first time they intentionally tried to trip up participants. Organizers created fake attack chains to see how the players scoped an investigation into a network and deducted points for the amount of time they wasted following that lead. This technique helps teach teams how to scope investigations without going down “rabbit holes,” and not adequately planning, Lt. Christopher Trusnik, chief of training at the 835th Cyberspace Operations Squadron, told Fifth Domain. Beyond the technical hunting, this approach helped team leader to flex leadership muscles. “It was more of teaching that leadership technique of you plan for this, how do you investigate quickly and how do you triage your investigation,” Trusnik, whose unit ran the January exercise, said. Hottel explained that following this most recent event, teams focused on leadership and organization. At one point, someone on his team previously had been coached on what they needed to include such as specific indictors that might be valuable to their mission partners to understand. At this exercise, they included those indicators. In another instance, one team member who had never run a hunt mission struggled at first. Hottel stepped in and with just a little guidance, the leader became more disciplined and was able to find things much better in the last three days. Benefits of cyberspace in training Training in cyberspace has benefits that other domains don't offer. For one, forces don't need a dedicated battlespace such as the Army's National Training Center or the range used at Nellis Air Force Base for the Air Force's Red Flag. With cyber, a custom range can be built and forces from all across the world can come in and participate. The range used for the hunt exercises stays up weeks after the formal event so individuals or teams can try their hand, though they obviously won't be eligible for the Goblet of Cyber trophy. All of this could change with the Persistent Cyber Training Environment (PCTE). PCTE is a major program being run by the Army on behalf of Cyber Command and the joint force to provide a web-based cyber training environment where cyber warriors can remotely plug in around the world and conduct individual training, collective team training or even mission rehearsal — all of which does not exist on a large scale currently. Hottel said that his forces haven't been limited thus far without PCTE. Though, once the platform is online, they can upload the range they used for a competition and it can be accessed by anyone across the joint cyber mission force. Testing new concepts But in the meantime, smaller, unit level exercises like those run by the 567th allow forces to test concepts and learn from others. Unlike larger exercises that have requirements and stated objectives, smaller exercises can serve as a proving ground for staying sharp and pushing the envelope. This allows local units more control over what their personnel do but can also allow teams to test new concepts in a relatively risk-free environment. “Let's say that a national [cyber protection] team wants to test out ... whatever they're currently using because they feel like it would provide them an advantage so they want to test out something,” Hottel said. “We can throw that on the range as well and they can utilize an entirely defensive tool set. We're not trying to make people tool experts, we're trying to make them tradecraft, defensive hunters.” Hottel also said that personnel playing on the archived range can bring new ideas, which can then be tested during the next exercise. In some cases, they may come up with an idea on their own and bring it to the next exercise to see if it actually works. Ultimately, the event is designed to create better cyber warriors. “We're not trying to make people tool experts, we're trying to make them tradecraft, defensive hunters,” Hottel said. https://www.fifthdomain.com/dod/air-force/2020/02/21/the-largest-cyber-exercise-youve-never-heard-of/

Toutes les nouvelles