Question : Programmes under ‘Make’ Category

(a) the Status of the first three programme under ‘Make’ Category of Acquisition as per Defence Procurement Procedure, namely, Battlefield Management Systems, Tactical Communication Systems and Futuristic Infantry Combat Vehicle;
(b) the number of years elapsed since issue of Expression of Interest by the Ministry of Defence and the reasons for the delay, if any;
(c) the amount of inflow of investment by private and public defence industry since issue of Expression of Interest till now for development of technology for timely delivery of programmes;
(d) the process followed by the Ministry of Defence for reimbursing private and public defence industry for investment made if delay/closure due to changed requirements of user; and
(e) the effect of delay/closure of the ‘Make’ programmme on the capability gap of the Services, and the steps being taken to mitigate the same?

Answer given by the minister

MINISTER OF STATE (SHRI SHRIPAD NAIK)
IN THE MINISTRY OF DEFENCE
????? ????? ?????? (???? ??????? ????)
(a) to (e): The status of the ‘Make’ programmes taken up by Ministry of Defence for Battlefield Management Systems (BMS), Tactical Communication Systems (TCS), Futuristic Infantry Combat Vehicle (FICV) is as under:

(i) Battlefield Management Systems (BMS). The project has been foreclosed in November, 2018.
(ii) Tactical Communication Systems (TCS). Two Development Agencies (DAs) have been shortlisted for prototype development.
(iii) Futuristic Infantry Combat Vehicle (FICV). DAs could not be shortlisted as the financial and technical criteria were found to be subjective in selection process.

2. Since no ‘Make’ project has been sanctioned, the question of investment by private and public defence industry for development of technology for timely delivery of the above projects does not arise.

3. Defence procurements for the Indian Defence Forces is based on the operational needs and stated requirements to keep the Indian Defence Forces in a state of readiness to meet the entire spectrum of security challenges.

*****


Download PDF Files