20 janvier 2021 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

Turkey reports nearly 15% drop in defense exports

By:

ANKARA, Turkey — Turkey's defense and aerospace exports stood at $2.3 billion in 2020, marking a 14.8 percent decline in comparison to 2019, official figures have revealed.

The Turkish Exporters' Assembly, or TIM in its Turkish acronym, said disruption in production, supply and logistics processes due to restrictions imposed over the coronavirus pandemic caused the fall in exports.

In 2020, the defense and aerospace industry accounted for 1.3 percent of Turkey's overall exports.

TIM said the top market for Turkish manufacturers in 2020 was the United States, with $784.2 million in sales, or 4 percent less than in 2019.

Turkey's staunch political ally in the Caucasus, Azerbaijan, was the second-largest export market, with sales reaching $260.8 million, marking a 194 percent rise from the previous year.

Another major market was the United Arab Emirates, a Gulf rival to Turkey in foreign policy. Turkish exports to the UAE were at $200.2 million, up 51 percent from 2019.

Locally produced systems meet 70 percent of Turkey's military's requirements, compared to 35 percent in 2002. In that same period, the number of defense procurement programs rose from 66 to more than 700, or from $5.5 billion to $70 billion in contract value.

Similarly, defense and aerospace industry turnover went up from less than $1 billion to more than $9 billion, and exports from $248 million to $2.7 billion.

In 2020, there were seven Turkish companies on Defense News' list of the top 100 defense companies around the world.

The government has declared its defense and aerospace industry exports target as $10.2 billion by 2023.

https://www.defensenews.com/global/europe/2021/01/19/turkey-reports-nearly-15-drop-in-defense-exports/

Sur le même sujet

  • What’s changing in the cyber domain? We ask industry experts

    3 septembre 2019 | International, Sécurité

    What’s changing in the cyber domain? We ask industry experts

    By: Andrew Eversden “What are you talking about now in cybersecurity that you weren't talking about six months ago?” Fifth Domain posed this question to cybersecurity experts at Black Hat, a cybersecurity conference in Las Vegas, Nevada, that ran from Aug. 3-8. With the cyber domain rapidly evolving, we wanted to know how conversations within the cyber community are changing. Some pointed to a new focus on utility systems and web-connected devices that sit on critical infrastructure. “It's only a matter of time until there's another major disruption in an electric utility somewhere in the world, probably not in the U.S., but elsewhere,” Sergio Caltagirone, threat intelligence director at Dragos, said at the conference Aug. 5. “But oil and gas has the higher likelihood of a major destructive and loss-of-life event. And I think most people did not realize how close to that we actually were.” Caltagirone was referring to the TRISIS event, malware that struck industrial control systems at a Saudi Arabian petrochemical plant and could've caused physical harm. He said that in the aftermath of that attack, threat researchers diving into the details realized just how bad it could've been. “We started finding a lot of stuff which hadn't been found before,” Caltagirone said. “Which made us realize very quickly how close that space is to a major event.” Dave Weinstein, chief security officer at Claroty, pointed to an “explosion” of devices connected to the internet of things.. “It's really a product of this general consensus among industrial organizations that the benefits exceed the costs in terms of embracing this type of digital transformation," Weinstein said Aug. 8, adding that organizations must be “mindful” of these devices and have a plan to mitigate their potential vulnerabilities. Brian Costello, a senior vice president at Flashpoint, told Fifth Domain on Aug. 8 that he is more often than before focusing on targeted cyberattacks from bad actors. That's a shift away from “campaign-based” attacks that tracked. There's “more planning out, more scoping out of targets and taking long-term planning to go after [a] particular target with a specific asset in mind,” Costello said. Along that same vein, Julian Zottl, a senior cyber architect at Raytheon, said he's noticing more inclusion of all-source intelligence in threat analysis. “We're looking at ... all the sources and trying to figure out indicators,” Zottl said Aug. 7. “[We're] even trying to do predictive analytics now, where it's like, ‘Oh, we see this threat might be coming.' I think that's something that we're starting to talk about more and more.” Several cybersecurity professionals interviewed by Fifth Domain said the U.S. government is moving away from the classic cyber kill chain and over to the MITRE ATT&CK framework, which dives deeper into potential threats to information security. “They used to think the hackers would just come in to steal secrets, conduct espionage and then leave,” said Tom Kellermann, chief cybersecurity officer at Carbon Black and a former commissioner on the Commission on Cyber Security for then-President Barack Obama. “In fact, they're maintaining persistence in these systems. They're manipulating the integrity of data and then they're using federal government agencies themselves and personnel's devices themselves to target anyone who implicitly trusts that person, that agency, that department.” he told Fifth Domain on Aug. 6. Chris Kennedy, chief information security officer at AttackIQ and a former official with the Treasury Department and the Marine Corps, said these new frameworks in use along with federal continuous monitoring programs allow for more attacker emulation, essentially simulating the attack agencies could face. “Agencies are starting to realize the value of attacker emulation as a way to measure and benchmark the effectiveness of their security controls,” Kennedy said on Aug. 7. And with government agencies in different stages of cloud migration, agencies will need to learn how that fits into their cybersecurity posture. Marten Mickos, CEO of white hat hacking company HackerOne, said this a new discussion. He also said the conversation surrounding the use of ethical hackers in government environments has evolved: The word “hacker” is becoming more accepted. “I do think it signals a shift in mindset," Michos said. There's a realization that "those people who portray themselves as hackers are actually those who will rescue us, not those who will destroy us.” Despite all the changing technology and evolving threats, one aspect of cybersecurity remains set in stone, said M. K. Palmore, a field chief security officer for the Americas at Palo Alto Networks and a recently retired FBI cyber agent. “It's about adhering to cybersecurity fundamentals,” Palmore said. “That message hasn't changed regardless of my position or where I'm located.” https://www.fifthdomain.com/show-reporters/black-hat/2019/08/30/whats-changing-in-the-cyber-domain-we-ask-industry-experts

  • Three shipbuilding teams shortlisted to build new warships in UK

    14 décembre 2018 | International, Naval

    Three shipbuilding teams shortlisted to build new warships in UK

    Teams will receive contracts worth up to £5 million to push ahead with plans to build five new Type 31e warships. Three shipbuilding teams have been awarded multi-million-pound contracts to push ahead with plans to build five new Type 31e warships in the UK for the Royal Navy, Defence Minister Stuart Andrew has announced today in Portsmouth. The Minister revealed that teams led by BAE Systems, Babcock and Atlas Elektronik UK have been shortlisted for the competition to build the five frigates for £1.25 billion. Each group has today been awarded a contract worth up to £5 million to fund the next stage of their plans, with the preferred bidder for the design and manufacture of the ships due to announced by the end of next year. The MOD want the first ship delivered in 2023. Speaking at Her Majesty's Naval Base in Portsmouth, Defence Minister Stuart Andrew said: This is the first frigate competition the UK has run in a generation, and today we are funding three shipbuilding teams with extremely exciting concepts to continue developing their plans. Next year we will announce the winning bidder, and one of these designs will go on to bolster our future fleet with five new ships, creating UK jobs and ensuring our Royal Navy maintains a truly global presence in an increasingly uncertain world. The awarding of the contracts is a key milestone in the National Shipbuilding Strategy, which was launched in September 2017. The Strategy met the challenges set by an independent report written by Sir John Parker, a figure with a wealth of leadership and boardroom experience in shipbuilding, and was underpinned by the commitment to build the new Type 31e ships. The bold Type 31e programme will move through procurement at an unprecedented pace: the vessel will commence production within 3 years of the launch of the programme, far quicker than similar programmes of this type. The ships will make up the next generation of the Royal Navy fleet, along with eight Type 26 warships which will start being delivered from the mid-2020s. The names of all eight Type 26 frigates have now been announced, and the Defence Secretary Gavin Williamson has also outlined that they will be homed in Devonport. The decision on where the Type 31e frigates will be based is still to be made. The Minister made the announcement on-board HMS Diamond, which returned to Portsmouth last month having been in the Mediterranean. https://www.gov.uk/government/news/three-shipbuilding-teams-shortlisted-to-build-new-warships-in-uk

  • US military targets deepfakes, misinformation with AI-powered tool

    1 août 2023 | International, C4ISR

    US military targets deepfakes, misinformation with AI-powered tool

    Discerning fact from fiction is vital to military operations. The task is increasingly complex as bad information floods social media and other channels.

Toutes les nouvelles