21 janvier 2019 | Local, Terrestre

Tens of millions paid out due to bungled Canadian Forces procurement, but government says details are secret

DAVID PUGLIESE, OTTAWA CITIZEN

The case dates back to 2016 when the Canadian International Trade Tribunal ruled that the process which awarded a truck contact to Mack Defense of the U.S. was flawed

Taxpayers are on the hook for potentially tens of millions of dollars after federal bureaucrats bungled the purchase of trucks for the Canadian Forces and now must make good on the lost profits for a U.S. firm.

But Public Services and Procurement Canada, which oversaw the flawed defence procurement, has declined to provide details on just how much the penalties will cost the public.

Defence industry representatives, however, say the penalty being paid to the U.S. company, Oshkosh, could be as high as $60 million as it has to account for lost profit on the $834-million contract as well as other expenses the firm incurred.

The case dates back to 2016 when the Canadian International Trade Tribunal (CITT) ruled that the process, which awarded the truck contact to Mack Defense of the U.S., was flawed. The CITT supported the concerns of Mack's rival, Oshkosh, that there were significant issues with the evaluation of the vehicles. As a result, the tribunal called on Public Services and Procurement Canada to conduct a new evaluation of the trucks being purchased for the Canadian Forces.

The CITT recommended that Oshkosh be compensated for its lost opportunity to profit

But instead, the department continued with the process to buy the Mack trucks and went to federal court in 2017 to challenge the tribunal's ruling. It recently abandoned that appeal.

It was revealed by the tribunal that Public Services and Procurement Canada had failed to keep many key records to support its claim that the Mack trucks met the requirements for the Canadian military.

“The CITT recommended that Oshkosh be compensated for its lost opportunity to profit,” the department noted in a response to Postmedia about the settlement it reached with the firm.

The department, however, declined to provide details, claiming that the payout is confidential. It did not explain why the penalties that taxpayers must shoulder should be considered secret.

“This matter is now closed,” according to the department's statement.

The Conservative government announced in 2015 that Mack Defense had won the $834-million contract to provide the 1,500 standard military pattern trucks as well as in-service support for the vehicles.

“Truck deliveries are ongoing and expected to be completed during spring 2020,” Public Services and Procurement Canada noted. It stated that the Mack trucks meet the required standards.

Oshkosh said in a statement to Postmedia that it was pleased with the financial settlement that resulted from its challenge heard by the trade tribunal. “Oshkosh cannot comment further on the details of this confidential settlement,” noted Alexandra Hittle of Oshkosh Defense.

The program to purchase the trucks was originally announced in 2006 by the Conservatives but the acquisition was dogged by problems. The vehicles were supposed to be delivered in 2008 and the project was considered a priority because the vehicles they were to replace had become a safety hazard, with faulty brakes and excessive rust.

But in 2012 the Conservative government temporarily shut down the project after learning that the Department of National Defence increased the cost of the project by $300 million but hadn't received permission from government to do that. The government had approved an original budget of $430 million but department and military officials began adding more capabilities to what they wanted in the vehicles, bumping the estimated cost up. DND officials continued on with the acquisition without going back to Treasury Board for approval for the extra money, angering the Conservative government.

Delivery of the Mack trucks began last year and have continued to various bases throughout Canada. Earlier this month Defence Minister Harjit Sajjan highlighted the delivery of some of the trucks to a base in Quebec, noting that, “through our defence policy, Strong, Secure, Engaged, we are providing the women and men of our Canadian Armed Forces with the equipment they need to do their jobs.”

Sajjan did not mention that the trucks were ordered under the Conservative government.

dpugliese@postmedia.com

https://ottawacitizen.com/news/canada/tens-of-millions-paid-out-due-to-bungled-canadian-forces-procurement-but-government-says-details-are-secret

Sur le même sujet

  • Canada should think again about having the ability to use offensive cyber weapons: Expert

    13 juin 2019 | Local, Sécurité, Autre défense

    Canada should think again about having the ability to use offensive cyber weapons: Expert

    Howard Solomon Canada's electronic spy agency will soon get new authority to launch cyber attacks if the government approves legislation that is in the final stages of being debated. There's a good chance it will be proclaimed before the October federal election. But a discussion paper issued Wednesday by the Canadian Global Affairs Institute says Canadians need to debate the pros and cons of using this new power. “This direction not only opens up new possibilities for Canadian defence, it could also represent significant new risks,” says the report. “Without good answers to the difficult questions this new direction could raise, the country could be headed down a very precarious path.” Among the possible problems: Cyber retaliation. Another: While Canada might try to target a cyber attack, the impact might be bigger than expected — in fact, it might boomerang and smack us back. Third is the lack of international agreement on the use of cyber weapons (although this is a double-edged sword: Without an agreement there are no formal limits on what any country is forbidden from doing in cyberspace). “To move forward at this point to implement or even formally endorse a strategy of cyber attack would be risky and premature,” concludes the report's author, computer science professor Ken Barker, who also heads the University of Calgary's Institute for Security, Privacy and Information Assurance. “There are challenging technical controls that must be put in place as well as a critical international discussion on how cyber weaponry fits within the rules of war.” Barker's paper is in response to the 2017 strategy setting out Defence Department goals, where the possibility of Canada having a cyber attack capability first raised. It wasn't written with Bill C-59 in mind — now in its final stage before Parliament — which actually gives Canada's electronic spy agency, the Communications Security Establishment (CSE), the power to use what's called “active” as well as defensive cyber operations. In an interview Tuesday, Barker said “in the desire to push this thing they need to have more carefully thought about the questions I raise in this paper.” “Maybe it's late, but at least it's available.” He dismisses the argument that by announcing it has an offensive cyber capability Canada will cause other countries to think twice about attacking us with cyber weapons. “They would attempt to find out what Canada is doing to create cyber attack capabilities,” he argued. “One of the risks once we do endorse this,” he added, “is we open ourselves up to other countries to using Canada as a launching pad for cyber attacks to cover up their involvement, and [then] say ‘That was done by Canada.'” Nation states are already active in cyberspace. Ottawa has blamed China for the 2014 hack of the National Research Council, Washington suspects China was behind the massive hack of employee files at the Office of Personnel Management, and there is strong evidence that Russia mounted a sophisticated social media attack against the U.S. during the 2016 federal election. According to the Australian Strategic Policy Institute, The U.S. the U.K. and Australia say they have used offensive cyber operations against the Islamic State. The U.S.-based Council on Foreign Relations notes that Germany increased its offensive cyber capability after a 2016 attack on the country's legislature blamed on Russia. Last year the New York Times reported the U.S. Cyber Command has been empowered to be more offensive. Meanwhile in April the CSE warned it's “very likely” there will be some form of foreign cyber interference during the run-up to October's federal election here, The most commonly-cited interference in a country were two cyber attacks that knocked out electrical power in Ukraine — in December 2015 and again in December 2016 — largely believed to have been launched from Russia. All this is why some experts say Canada has to have an offensive cyber capability to at least keep up. In January, Ray Boisvert, former assistant director of the Canadian Security Intelligence Service (CSIS), told a parliamentary committee that “the best defence always begins with a good offense ... “When more than five dozen countries are rumoured to be developing active cyber capabilities, in my view that means we must develop capabilities to respond and in some cases that includes outside our borders.” Background In 2017 the Trudeau government announced a new defence strategy that included the promise of “conducting active cyber operations against potential adversaries in the context of government-authorized military missions.” The same year the government introduced Bill C-59, which in part would give the CSE, which is responsible for securing government networks, the ability to take action online to defend Canadian networks and proactively stop cyber threats before they reach systems here. This would be done as part of new legislation governing the CSE called the Communications Security Act. That act would give CSE the ability to conduct defensive and “active” cyber operations. Active operations are defined as anything that could “degrade, disrupt, influence, respond to or interfere with the capabilities, intentions or activities of a foreign individual, state, organization or terrorist group as they relate to international affairs, defence or security.” Both defensive and active cyber operations can't be used against any portion of the global information infrastructure within this country. And they have to be approved by the Minister of Defence. C-59 has been passed by the House of Commons and slightly amended by the Senate. It was scheduled back in the House last night to debate the Senate amendments. Despite all the cyber incidents blamed on nation states, Barker is reluctant to say we're in an era of low-level cyber war right now. Many incidents can be characterized as cyber espionage and not trying cause harm to another state, he argues. https://www.itworldcanada.com/article/canada-should-think-again-about-having-the-ability-to-use-offensive-cyber-weapons-expert/418912

  • Guns from Iroquois-class destroyers up for sale

    24 septembre 2019 | Local, Naval

    Guns from Iroquois-class destroyers up for sale

    DAVID PUGLIESE, OTTAWA CITIZEN The Canadian government is looking for buyers for the OTO Melara 76mm guns removed from the Royal Canadian Navy's Iroquois-class destroyers. All Iroquois-class ships have been decommissioned, and systems that were strictly associated with that class, have been declared surplus, according to the Department of National Defence. The five 76mm gun systems and associated spare parts from these ships were declared surplus in 2015 and 2016 and are moving through the disposal process, noted DND spokesman Andrew McKelvey. But the DND has decided not to provide the guns to museums. Instead they are being sold. Two of the guns were sold last year to the French Defence Ministry for undisclosed amount. The sale of the other guns is being coordinated by Public Services and Procurement Canada. The guns are up for sale to Canadian allies or approved buyers within the defence industry. https://ottawacitizen.com/news/national/defence-watch/guns-from-iroquois-class-destroyers-up-for-sale

  • MQ-9B SkyGuardian proposed as the right choice for RPAS in Canada

    25 avril 2019 | Local, Aérospatial

    MQ-9B SkyGuardian proposed as the right choice for RPAS in Canada

    General Atomics Aeronautical Systems, Inc. (GA-ASI)–a leading designer and manufacturer of proven, reliable remotely piloted aircraft systems (RPAS), radars, and electro-optic and related mission systems–continues the on-time development of its latest RPAS, the MQ-9B SkyGuardian. GA-ASI is designing MQ-9B as the next generation of multi-mission Predator B fleet and has named its baseline MQ-9B aircraft SkyGuardian. As Canada looks to fulfil its RPAS project requirements, the multi-mission SkyGuardian stands out as the perfect solution. GA-ASI is collaborating with its Team SkyGuardian Canada teammates–CAE, MDA, and L3 Wescam–to deliver the perfect RPAS to Canada. The team combines the best of Canadian industry with the world's most advanced medium-altitude long-endurance (MALE) RPAS to fulfil Canada's RPAS project requirements. The Royal Air Force (RAF) is acquiring SkyGuardian as part of its Protector RG Mk1 program and is scheduled for first delivery in the early 2020s. Belgium also selected SkyGuardian for its defence needs. The RPA is being considered as an option for the Australian Defence Force, which chose GA-ASI to supply the RPA system for Project Air 7003. “MQ-9B is the world's only RPAS being developed to be certified to fly in non-segregated, controlled airspace,” said Linden Blue, CEO of GA-ASI. “The development is the result of a five-year, company funded program to deliver an unmanned aircraft to meet the stringent airworthiness type-certification requirements of NATO and various civil authorities.” As part of the certification effort, MQ-9B is being provisioned with a GA-ASI-developed detect and avoid (DAA) system. The DAA system consists of a due regard radar (air-to-air radar), coupled with a traffic alert and collision avoidance system (TCAS) and automatic dependent surveillance-broadcast (ADS-B). The first-ever transatlantic flight of a MALE RPAS was accomplished in July 2018 as part of the Royal Air Force's (RAF) centenary celebration (RAF100). SkyGuardian flew from Grand Forks, N.D., to RAF Fairford in Gloucestershire, U.K., covering 3,760 nautical miles in 24 hours. Other recent achievements include: Demonstration of SATCOM launch and recovery for MQ-9B using expeditionary command and control (XC2)–December 2018 First flight of the second MQ-9B SkyGuardian–September 2018 Integration of MQ-9B with GPS and GALILEO satellite systems–June 2018 Successful lightning tests on MQ-9B–May 2018 Demonstration of auto takeoff and landing using SATCOM for MQ-9B–December 2017 The MQ-9B set an endurance record for GA-ASI aircraft when it flew for more than 48 consecutive hours in April 2017. This is an unprecedented level of endurance that enables the MQ-9B to provide persistent intelligence, surveillance, and reconnaissance (ISR) around the clock with an operating cost well below most manned platforms. MQ-9B has a range of over 6,000 nautical miles and is equipped with nine hard-points for sensor or weapons carriage with over 4,000 pounds of available payload. SkyGuardian is capable of all-weather day/night operations. The cold weather engine start capability allows ground operations down to -41 C. These RPAS also have an electro-expulsive de-icing system (EEDS) for wing leading edges, anti-ice heated engine inlet, heated pitot tube and static ports, and lightning protection. Interoperable with the U.S., FVEY and NATO, SkyGuardian's multi-mission capability makes it a valued asset in a variety of scenarios–including environmental protection, humanitarian assistance/disaster relief, maritime domain awareness, search and rescue (SAR) and overland and overwater ISR. To date, GA-ASI has delivered over 850 aircraft and more than 300 ground control stations. Every second of every day, close to 70 GA-ASI-delivered RPA are airborne worldwide. https://www.skiesmag.com/press-releases/mq-9b-skyguardian-proposed-as-the-right-choice-for-rpas-in-canada/

Toutes les nouvelles