South African Company Tried to Sell P-8A Poseidon Simulators to China

South African Company Tried to Sell P-8A Poseidon Simulators to China
Boeing P-8A Poseidon patrol aircraft. Photo credits: US Navy

The United States has charged the South African company Test Flying Academy of South Africa (TFASA) with attempting to transfer two P-8A Poseidon maritime patrol aircraft simulators to China, according to the U.S. Department of Justice.

In 2022, reports indicated that the People’s Liberation Army (PLA) used TFASA to recruit former military pilots from NATO countries. The goal was to obtain instructors and gain access to NATO aviation tactics, procedures, and operational knowledge, as reported by opex360.

Despite countermeasures taken by several countries, including France, TFASA reportedly continued its cooperation with China.

The U.S. Department of Justice stated that TFASA developed the simulators under Project Elgar, using U.S.-origin software and technical data related to the Boeing P-8A Poseidon. The project aimed to train Chinese pilots in anti-submarine warfare, improving their ability to detect and track U.S. submarines in the Pacific Ocean.

The two simulators, packed in shipping containers, were seized in Singapore aboard a COSCO vessel bound for China. The interception took place in 2024 under U.S. export control laws.

Render of the P-8A Poseidon maritime patrol aircraft for the Royal Canadian Air Force. Photo credits: Boeing

In response, TFASA rejected all allegations, calling the U.S. Department of Justice’s claims “factually inaccurate and misleading.”

The company stated that the containers held only basic training modules, not tactical simulators or classified systems, and cited the results of an “independent investigation” conducted by China’s COSCO.

Share this post:

SUPPORT MILITARNYI

PrivatBank ( Bank card )
5169 3351 0164 7408
Bank Account in UAH (IBAN)
UA043052990000026007015028783
BTC
bc1qg0z99m95fte7kj8faa7h2kvnq92wvc53exe8gm
USDT
0x8676644fA7B6d328310283cAC1065Ae01d97CEe7
ETH
0xfD02863D3289416fcF50975c9DFda13623f97758
Popular
Button Text