25 mai 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

The US needs to rethink its overseas supply chain

By: Thomas Ayres

As Americans respond to the COVID-19 pandemic, we have become acutely aware of the outsized impact of our dependence on China in the supply chain.

Pharmaceutical companies learned key chemicals and minerals are exclusively made or mined in China. For instance, reports show China produces 97 percent of the antibiotics, 95 percent of ibuprofen and 91 percent of hydrocortisone consumed in the U.S. market. Hospitals also learned that while China produces 50 percent of the world's face masks, they are of dubious reliability. There is cause for concern with the quantity or quality of ventilators.

In sum, we learned as citizens what we in the Department of Defense have known for some time: Our national security supply chain must be free from dependence on China.

The DoD's concern for its supply chain is not new. Congress spurred activity over a decade ago by questioning the DoD's supply chain risk management, or SCRM, policies. The National Defense Strategy‘s recognition of a new era of strategic, great power competition further sharpened the DoD's focus, propelling recent efforts to enhance regulations and procedures in addressing supply chain threats.

We are transitioning from analog to digital, with the goal of planes, ships, tanks and satellites all seamlessly sharing data — a lethal version of the ride-sharing app on your smartphone. Yet, even as the DoD builds this future, the threat of supply chain disruption and concerns about component quality within the electronic backbone are real. Counterfeit or planted microelectronic parts can be vectors for cybersecurity intrusions.

Recently, for instance, the DoD voiced concerns that Chinese telecommunications giant Huawei's 5G solution provided back doors, purposefully or negligently, for data corruption, data extraction, system failure or worse. Similarly, SCRM policies have increasingly addressed the concern of intellectual property theft enabled by subcomponents designed to allow information to flow back to larger architectures. The COVID-19 pandemic is giving new meaning to that threat, and the risk of disruption to both raw and manufactured materials from abroad has become apparent.

Our SCRM focus must broaden in response to COVID-19 to better address national production capacity and sustainability. Being able to assure access to the minerals, chemicals, subcomponents and components required to build weapon systems is essential. China supplies 80 percent of the rare earth minerals imported to the U.S., many of which are essential to electronic parts. Since 1933, the Buy American Act has required federal agencies, including the DoD, to purchase items manufactured in the U.S. Additionally, these items must be made from supplies mined or made in the U.S.

The act is implemented by regulations requiring analysis of the components — where they are mined or made, and where they are assembled. Companies that falsify “Made in America” designations can be debarred from the federal marketplace. In July 2019, months before the pandemic emerged, President Donald Trump issued an executive order seeking to increase the minimum domestic manufacture thresholds above the current 50 percent floors. The pandemic now shows even more needs to be done. We must increase to President Trump's mandated percentages, and we must also analyze where each of the subcomponents are manufactured.

This doesn't mean we need to back away from allied contributions or alliance-based weapon systems like the F-35 fighter jet, which benefits from the industrial cooperation of nine partner nations. But in light of COVID-19, it does mean that when we make risk-based and measured decisions to produce an alliance system, we program in several months' worth of component backlogs to allow continued production during future quarantines.

The majority of our weapon systems are made in the U.S. by American companies with greater than 50 percent of component production and assembly done domestically. Yet, what is less clear are the composition of the subcomponents in the components themselves. Not recognizing the risks of the subcomponents equally jeopardizes the new reality of disruptions to our supply chain and risks of data extraction, degradation and spying, about which we have increasingly been concerned.

Recently, I sought to buy a grapefruit spoon on the internet and found it exceedingly difficult to learn where the offered spoons were made. The harder it was to find, the more I suspected it was made in China. Perhaps Congress should pass a law making it easier to learn the source of manufacturing. Ensuring my access to an American-made grapefruit spoon is not nearly as vital as assuring our access to critical weapon systems, rare earth materials, and pharmaceuticals and medical supplies. A vital step is knowing the source countries of components and subcomponents. We must have deeper knowledge of the full supply chains of subcomponents, and how and where they are produced.

Trust can only come once we know all that is required to understand our supply chains and we seek even greater focus in our new normal. Our security depends on it.

Thomas Ayres is general counsel for the U.S. Air Force.

https://www.defensenews.com/opinion/commentary/2020/05/22/the-us-needs-to-rethink-its-overseas-supply-chain/

Sur le même sujet

  • Air Force begins to roll out special cyber defense teams

    31 décembre 2018 | International, C4ISR

    Air Force begins to roll out special cyber defense teams

    By: Mark Pomerleau The Air Force is beginning to build specialized cyber teams across the service whose primary mission is to defend local installations and critical mission tasks from cyberattacks. These teams will ensure that a particular wing or smaller organization can complete their mission from a cyber perspective, Maj. Gen. Robert Skinner, commander of 24th Air Force/Air Forces Cyber, told Fifth Domain in a November interview. For example, Skinner said if a wing has an F-16 unit that's responsible for offensive counter air or defensive counter air support, mission defense teams will understand those weapon system and everything that goes into making those air sorties successful as a way to defend that mission from a cyber standpoint. As an example, an eight-man team at the 2nd Weather Group within the 557th Weather Wing monitors the network and recently discovered several “bogus” account requests. The commander, Col. Patrick Williams, said the team was able to figure out that many of the requests were either bots or foreign requests that “had no business being on that network.” By working with the Network Operations and Security Center to eliminate that activity, the number of requests dropped by 80 percent, a huge win, Williams said. He added this was done with just a nascent mission defense team given that the teams are just being filled out across the major commands now. Skinner said each major command is at a different point in activating the teams. In addition, Air Force leaders said the service hopes to achieve efficiencies within its entire IT and cyber defense enterprise. The officials pointed to the Air Force's “enterprise IT as a service” pilot, which examines what efficiencies can be gained by having commercial companies conduct the IT services as opposed to having airmen maintain the IT infrastructure. One benefit of such a move could be that it frees up personnel to spend more time on cyber defense. “Our core strategic theme is moving from IT focused delivery into mission defense teams,” Bill Marion, deputy CIO of the Air Force, said during a keynote presentation in early December. Skinner said the service will likely be able to “re-mission” workers from their IT positions and assign them to these more active defensive roles such as mission defense teams. These mission defense teams are different from cyber protection teams that the Air Force, and other services, provide to U.S. Cyber Command. “In my eyes the [mission defense team] is a [cyber protection team] lite,” Skinner said. "We're very proud of our cyber protection team training and I think that the more of that I can get with our mission defense teams, the more successful they'll be and then our cyber protection teams can be really focused on the high end, the big threats that we'll run into in a peer competition and peer adversaries.” https://www.fifthdomain.com/dod/air-force/2018/12/27/air-force-begins-to-roll-out-special-cyber-defense-teams

  • U.S. Army Reveals Mystery UAS Payload Called Blasphemy

    10 septembre 2020 | International, Aérospatial

    U.S. Army Reveals Mystery UAS Payload Called Blasphemy

    Steve Trimble September 09, 2020 The U.S. Army has revealed a mysterious new payload called Blasphemy for the General Atomics Aeronautical Systems Inc. MQ-1C Gray Eagle. The name of the payload appeared in public for the first time on a presentation slide displayed by a panel of Army unmanned aircraft systems (UAS) program managers during the virtual AUVSI Defense Systems conference on Sept. 9. Blasphemy appeared as one of several payloads listed on the slide, but no other information about it was provided. When asked a follow-up question during the question-and-answer period seeking details about the new payload, the Army program manager demurred. “I think we're going to skip that one,” said Lt. Col. David Benjamin, the Army's product development manager for the MQ-1C program. The slide showed the Blasphemy payload loaded on to the same pylon as the Multi-Function Electronic Warfare (MFEW) pod. The Army plans to deploy the MFEW-Air Large pod on the MQ-1C next year, but hasn't before revealed any plans for a payload called Blasphemy. The slide showed a list of “integrated capabilities” for the MQ-1C in fiscal 2020. https://aviationweek.com/defense-space/sensors-electronic-warfare/us-army-reveals-mystery-uas-payload-called-blasphemy

  • US Navy shipbuilders’ union approves labor pact at Bath Iron Works

    21 août 2023 | International, Naval

    US Navy shipbuilders’ union approves labor pact at Bath Iron Works

    Workers are receiving an increase in contributions to their national pension plan while health insurance costs will grow.

Toutes les nouvelles