9 octobre 2018 | Local, Aérospatial

US clears armed helicopters for Iraq, surveillance aircraft for Canada

By:

WASHINGTON — The U.S. State Department has cleared a pair of proposed military sales — armed helicopters for Iraq and surveillance planes for Canada — with a joint price tag of more than $380 million.

The two notifications were posted on the website of the Defense Security Cooperation Agency on Thursday evening. Notifications are not guaranteed sales; members of the Senate could still choose to block the potential sale, and once it passes Congress, sale negotiations can change quantities and dollar figures.

The larger of the two packages is the Canadian one, which covers three King Air 350ER aircraft with “customer unique post-modifications for Intelligence, Surveillance and Reconnaissance” requirements.

Along with the platforms comes a package of equipment, including three WESCAM MX-15D electro-optical and infrared imaging sensors; three AN/AAR-47B(V)2 missile and laser warning systems; three AN/ALE-47 countermeasure dispenser systems; three VORTEX Dual RF Ku LOS transceivers; three COMSEC modules (KGV-135A); two APM-424(V)5 transponder test sets; five KIV-77 Mode 4/5 crypto applique computers for identification friend or foe (IFF); three AN/APX-119 IFF digital civil and military transponders; six ARC-210 multimode voice and data transceivers; and three KG-250X National Security Agency-certified type 1 inline network encryptors, per DSCA.

Work will primarily be done at the Wichita, Kansas, facility of Beechcraft, a subsidiary of Textron. There is expected to be an industrial offset included in the deal.

Iraq was cleared to purchase five Bell 407GX helicopters, configured with M240 7.62mm machine guns, with an estimated cost of $82.5 million. The DSCA notification notes these would help “compensate for the combat loss of seven IA407 helicopters in recent years and increase the Iraqi Security Forces' combat effectiveness against ISIS and other terrorist elements in Iraq.”

“The 407GX variant — an upgrade from the current IA407 configuration — includes Advanced Precision Kill Weapon System (APKWS) launchers,” DSCA writes. “Providing Iraq with this capability supports U.S. security goals by furthering the Iraqi Army Aviation Command's ability to counter terrorism and protect critical infrastructure.”

Also included in the package are five RF-7850A secure communications radios; five AN/AAR-60 MILDS automatic plume detectors; five AN/ALE-47 airborne countermeasure dispenser systems; five M3P .50-caliber machine guns; five M260 rocket launchers (APKWS configuration); five MX-15Di EO/IR sensors; five GAU-19 .50-caliber machine guns; and various other components.

Work will be done at Bell's Fort Worth, Texas, location; L3 WESCAM's location in Ontario, Canada; Tekfusion Global's Williamsburg, Virginia, location; Harris' Melbourne, Florida, facility; and Fulcrum Concepts' office in Mattaponi, Virginia. There are no known offsets.

https://www.defensenews.com/global/mideast-africa/2018/10/05/us-clears-helicopters-for-iraq-aircraft-for-canada

Sur le même sujet

  • Canada should think again about having the ability to use offensive cyber weapons: Expert

    13 juin 2019 | Local, Sécurité, Autre défense

    Canada should think again about having the ability to use offensive cyber weapons: Expert

    Howard Solomon Canada's electronic spy agency will soon get new authority to launch cyber attacks if the government approves legislation that is in the final stages of being debated. There's a good chance it will be proclaimed before the October federal election. But a discussion paper issued Wednesday by the Canadian Global Affairs Institute says Canadians need to debate the pros and cons of using this new power. “This direction not only opens up new possibilities for Canadian defence, it could also represent significant new risks,” says the report. “Without good answers to the difficult questions this new direction could raise, the country could be headed down a very precarious path.” Among the possible problems: Cyber retaliation. Another: While Canada might try to target a cyber attack, the impact might be bigger than expected — in fact, it might boomerang and smack us back. Third is the lack of international agreement on the use of cyber weapons (although this is a double-edged sword: Without an agreement there are no formal limits on what any country is forbidden from doing in cyberspace). “To move forward at this point to implement or even formally endorse a strategy of cyber attack would be risky and premature,” concludes the report's author, computer science professor Ken Barker, who also heads the University of Calgary's Institute for Security, Privacy and Information Assurance. “There are challenging technical controls that must be put in place as well as a critical international discussion on how cyber weaponry fits within the rules of war.” Barker's paper is in response to the 2017 strategy setting out Defence Department goals, where the possibility of Canada having a cyber attack capability first raised. It wasn't written with Bill C-59 in mind — now in its final stage before Parliament — which actually gives Canada's electronic spy agency, the Communications Security Establishment (CSE), the power to use what's called “active” as well as defensive cyber operations. In an interview Tuesday, Barker said “in the desire to push this thing they need to have more carefully thought about the questions I raise in this paper.” “Maybe it's late, but at least it's available.” He dismisses the argument that by announcing it has an offensive cyber capability Canada will cause other countries to think twice about attacking us with cyber weapons. “They would attempt to find out what Canada is doing to create cyber attack capabilities,” he argued. “One of the risks once we do endorse this,” he added, “is we open ourselves up to other countries to using Canada as a launching pad for cyber attacks to cover up their involvement, and [then] say ‘That was done by Canada.'” Nation states are already active in cyberspace. Ottawa has blamed China for the 2014 hack of the National Research Council, Washington suspects China was behind the massive hack of employee files at the Office of Personnel Management, and there is strong evidence that Russia mounted a sophisticated social media attack against the U.S. during the 2016 federal election. According to the Australian Strategic Policy Institute, The U.S. the U.K. and Australia say they have used offensive cyber operations against the Islamic State. The U.S.-based Council on Foreign Relations notes that Germany increased its offensive cyber capability after a 2016 attack on the country's legislature blamed on Russia. Last year the New York Times reported the U.S. Cyber Command has been empowered to be more offensive. Meanwhile in April the CSE warned it's “very likely” there will be some form of foreign cyber interference during the run-up to October's federal election here, The most commonly-cited interference in a country were two cyber attacks that knocked out electrical power in Ukraine — in December 2015 and again in December 2016 — largely believed to have been launched from Russia. All this is why some experts say Canada has to have an offensive cyber capability to at least keep up. In January, Ray Boisvert, former assistant director of the Canadian Security Intelligence Service (CSIS), told a parliamentary committee that “the best defence always begins with a good offense ... “When more than five dozen countries are rumoured to be developing active cyber capabilities, in my view that means we must develop capabilities to respond and in some cases that includes outside our borders.” Background In 2017 the Trudeau government announced a new defence strategy that included the promise of “conducting active cyber operations against potential adversaries in the context of government-authorized military missions.” The same year the government introduced Bill C-59, which in part would give the CSE, which is responsible for securing government networks, the ability to take action online to defend Canadian networks and proactively stop cyber threats before they reach systems here. This would be done as part of new legislation governing the CSE called the Communications Security Act. That act would give CSE the ability to conduct defensive and “active” cyber operations. Active operations are defined as anything that could “degrade, disrupt, influence, respond to or interfere with the capabilities, intentions or activities of a foreign individual, state, organization or terrorist group as they relate to international affairs, defence or security.” Both defensive and active cyber operations can't be used against any portion of the global information infrastructure within this country. And they have to be approved by the Minister of Defence. C-59 has been passed by the House of Commons and slightly amended by the Senate. It was scheduled back in the House last night to debate the Senate amendments. Despite all the cyber incidents blamed on nation states, Barker is reluctant to say we're in an era of low-level cyber war right now. Many incidents can be characterized as cyber espionage and not trying cause harm to another state, he argues. https://www.itworldcanada.com/article/canada-should-think-again-about-having-the-ability-to-use-offensive-cyber-weapons-expert/418912

  • Boeing surprised Canada changed rules of jet competition to allow Lockheed Martin bid

    31 mai 2019 | Local, Aérospatial

    Boeing surprised Canada changed rules of jet competition to allow Lockheed Martin bid

    David Ljunggren OTTAWA (Reuters) - Boeing Co is surprised Canada softened the rules of a competition for new fighters to allow Lockheed Martin Corp to submit a bid, but is still confident it has a chance, a top executive said on Wednesday. Following a U.S. complaint, Ottawa this month said it planned to drop a clause stipulating that bidders in the multibillion dollar race to supply 88 jets must offer a legally binding guarantee to give Canadian businesses 100% of the value of the deal in economic benefits. The original clause would have excluded Lockheed Martin's F-35 fighter, the plane the Canadian air force wants. The contract is worth between C$15 billion and C$19 billion ($11.1 billion to $14.1 billion). “I was surprised by the recommended change ... why would you deviate from a policy that's been so successful to accommodate a competitor?” said Jim Barnes, the Boeing official in charge of trying to sell the company's F-18 Super Hornet jet to Canada. The change in the rules around economic benefits was the latest wrinkle in a decade-long troubled-plagued effort to replace Canada's CF-18 jets, some of which are 40 years old. The final list of requirements for the new fleet of jets is due to be issued in July. “Right now we feel like we can put a very compelling offer on the table even with this change,” Barnes told reporters on the margins of a defense and security conference in Ottawa. Innovation Minister Navdeep Bains - in overall charge of the benefits aspect of procurement - said in response to Barnes's comment that Ottawa would ensure the competition was fair. Compelling bidders to offer watertight guarantees of economic benefits contradicts rules of the consortium that developed the F-35, a group to which Canada belongs. Boeing is offering a binding commitment and Barnes said the firm would stress to Canadian officials the potential economic disadvantages of entertaining a non-binding bid. An official from Sweden's Saab AB, another contender, told reporters that Canadians could lose out by ignoring contenders that had made firm investment commitments. “I am concerned that the ability to respond to a non-binding environment may not necessarily give Canadians the best value at the end of the day,” said Patrick Palmer, head of sales and marketing for Saab Canada. Airbus SE, the fourth firm in the race, declined to comment. Reporting by David Ljunggren; Editing by Susan Thomas https://www.reuters.com/article/us-canada-fighterjets/boeing-surprised-canada-changed-rules-of-jet-competition-to-allow-lockheed-martin-bid-idUSKCN1SZ2AA

  • Nouvelle opportunité pour les étudiants canadiens de construire et lancer leurs propres satellites

    20 septembre 2022 | Local, Aérospatial

    Nouvelle opportunité pour les étudiants canadiens de construire et lancer leurs propres satellites

    L'honorable François-Philippe Champagne, ministre de l'Innovation, des Sciences et de l'Industrie, a annoncé aujourd'hui le lancement de CubeSats, une initiative canadienne en STIM (CUBICS), une nouvelle occasion pour les professeurs et les élèves de niveau postsecondaire de participer à une véritable mission spatiale. Dans le cadre de CUBICS, les équipes ont le défi de réaliser des projets qui contribuent à l'avancement des connaissances scientifiques dans des domaines prioritaires, comme les changements climatiques. L'Agence spatiale canadienne (ASC) prévoit d'accorder des subventions totalisant 3,4 millions de dollars à un maximum de 12 équipes pour la conception, la construction et le lancement d'un CubeSat, ou pour le développement d'un instrument scientifique ou d'une expérience autonome. S'appuyant sur les leçons tirées de l'Initiative canadienne CubeSats, l'ASC a l'intention de lancer une nouvelle opportunité CUBICS tous les trois ans afin de continuer à stimuler l'apprentissage des étudiants pour des années à venir. L'initiative CUBICS vise à bien refléter les besoins des équipes d'étudiants dirigées par un professeur, nouvelles ou expérimentées en leur permettant de s'engager dans une mission adaptée à leur niveau, à l'expertise qu'ils ont déjà et à leur degré de préparation. CUBICS est l'une des initiatives de l'ASC qui visent à doter les étudiants de l'expérience, des connaissances et des compétences nécessaires pour devenir des candidats recherchés pour occuper des postes dans le secteur spatial canadien. Des experts de l'ASC guideront les équipes dans la mise au point de leurs missions. https://www.canada.ca/fr/agence-spatiale/nouvelles/2022/09/cubics--des-satellites-pour-passionner-les-etudiants-pour-les-stim-et-former-la-main-duvre-de-demain.html

Toutes les nouvelles