Back to news

April 17, 2020 | International, Aerospace

A key milestone of the Air Force One replacement program was conducted using virtual tools. It won’t be the last.

By: Valerie Insinna

WASHINGTON — The Air Force One replacement program has hit a major development milestone, and it did so without the in-person meetings that have become more risky in the age of the novel coronavirus, the U.S. Air Force's top acquisition official said on Thursday.

The Air Force recently completed the critical design review for the Presidential Aircraft Replacement program, which will replace the legacy VC-25A Air Force One planes with a new variant of the Boeing 747-8 known as the VC-25B.

Although the classified portions of the review still must be done via face-to-face meetings in secure spaces, much of it was accomplished using virtual tools and applications, said Will Roper, assistant secretary of the Air Force for acquisition, technology and logistics.

“I was really excited that the team was able to shift their CDR [critical design review] and go virtual,” he told reporters in an April 16 teleconference, adding that more programs will shift toward using virtual meetings to conduct key reviews and milestones even after the COVID-19 pandemic subsides.

“I don't know if it makes any sense to do CDRs, at least at an unclassified level, outside of tools like this. And we're working really hard to provide the same capabilities at the secret level,” he said.

While Roper did not detail which communication tools were used by the program office to conduct the CDR, he described it as being very similar to widely used applications like Zoom, where the briefer can share PowerPoint slides and participants can share thoughts and questions via a written chat function.

“It allows a greater level of productivity than a meeting itself,” he said. “In meetings, you have someone speaking and you want to get a question in, but you've got to wait for them to stop, and then everyone else wants to ask a question. It's hugely inefficient. It's just such an antiquated way of sharing information that is ingrained in us.”

The Air Force One replacement drew considerable attention in 2016 after then-President-elect Donald Trump tweeted that the program was too expensive at more than $4 billion and should be canceled. After Trump held numerous meetings with Dennis Muilenburg, who led Boeing at the time, the Air Force awarded Boeing a $3.9 billion contract to modify two 747s into VC-25B jets.

However, once all costs are included — such as buying a new hangar for the aircraft and the base cost of the 747s themselves — the Air Force will pay $5.3 billion, according to Defense One. That expense includes an $84 million contract awarded to Boeing on Wednesday to modify Boeing 747 technical specifications and manuals to the VC-25B configuration.

Roper doesn't project any schedule delays to the program as a result of COVID-19, which has pummeled prime contractor Boeing's commercial business and caused a temporary pause to certain defense production lines.

In February, Boeing began modifying the two 747s slated to become VC-25Bs at its facility in San Antonio, Texas. During the first part of the process, Boeing will cut out large pieces of the aircraft's skin and structure and replace that with two specially designed “superpanels,” according to an Air Force release. The VC-25Bs will also receive upgrades including enhanced electrical power, specialized communication systems, a medical facility, a customized executive interior and autonomous ground operations capabilities.

The new Air Force Ones are expected to be operational in 2024.

https://www.defensenews.com/air/2020/04/16/a-key-milestone-of-the-air-force-one-replacement-program-was-conducted-using-virtual-tools-it-wont-be-the-last/

On the same subject

  • CENTCOM chief: The future of warfare demands more cyber authorities

    December 19, 2018 | International, C4ISR

    CENTCOM chief: The future of warfare demands more cyber authorities

    By: Justin Lynch The Pentagon has received more power to conduct cyber operations in the past 18 months. But for the top Army commander in the Middle East and Central Asia, the new authority is not enough. The head of U.S. Central Command, Gen. Joseph Votel, wrote in a Dec. 18 paper that the Pentagon must “normalize” electronic warfare and cyberattacks and incorporate them into daily operations. “Normalizing the cyberspace domain means broader authorities that are more responsive than current bureaucratic processes,” Votel wrote in the Army's Cyber Defense Review. “It also means we need simple and streamlined organizations and processes to increase lethality and enhance performance.” The paper was coauthored by Votel, Maj. Gen. Julazadeh and Maj. Weilun Lin. “Our failure to operationalize and normalize the cyberspace domain effectively cedes it to our adversaries, gives them a competitive advantage and, ultimately, creates an increased attack vector against our objectives,” the authors said. President Trump gave the Pentagon new authorities to conduct cyber operations in August and minimized the process where other agencies can object to cyberattacks, known as “deconfliction.” Secretary of Defense Jim Mattis can conduct hacking operations without approval from the White House so long as they do not interfere with the American “national interest,” according to four current and former White House and intelligence officials who were either part of internal deliberations or briefed on the changes. Yet some current and former U.S. officials are skeptical that the new authorities will mean more effective hacking operations for the Pentagon, because it does not solve the nuances of cyberattacks. But the new mandates do not go far enough for the three officer authors, who argued that cyberwarfare should be under the same authorities as other types of operations. “We must not see cyberspace as drastically different and separate from other domains that we create new processes to prepare, plan and fight in this new domain. We continue to seek processes that smooth and simplify operations, reducing friendly friction and accelerating decision-making.” Current and former Pentagon officials have pointed to conducting cyberattacks against enemies that use networks of neutral or partner nations as an area where the Pentagon has changed its decision-making process in recent years. Those officials also pointed to how the Pentagon was able to use hybrid warfare tactics during the 2016 liberation of Mosul, Iraq, as a textbook example of future hybrid operations. Votel, Julazadeh and Lin echoed the sentiment of other Pentagon officials who have advocated for cyberattacks, electronic warfare and other information operations to be integrated earlier in military operations. “We need to proactively execute cyberspace and information operations early in 'Phase 0 / steady state' of the planning process — well before operation execution. Only then can we shape the [information environment], hold our adversaries' capabilities at risk and execute at the speed of war,” the three wrote. For example, Pentagon officials say they closely monitored Russia's 2014 hybrid war in Ukraine and learned from Moscow's tactics. Votel, Julazadeh and Lin shed light on the changes, writing that information operations were previously “integrated as an afterthought.” Yet over the last two years, Central Command has incorporated cyberattacks, electronic warfare and military deception at the “strategic level.” And this hybrid warfare has driven new acquisition demands in the Pentagon. “We need technology and capabilities to keep pace with the operational environment and continue to build the partnerships to do so,” the three officers wrote. In recent years, Central Command has bolstered its hybrid warfare through new contracts. The centerpiece of that effort is a July 2017 contract worth $621 million to Science Applications International Corporation for IT support to Central Command that could last seven years. In August 2018, Vistra communications was also awarded a $22 million contract to support offensive and defensive cyber operations for Central Command. https://www.fifthdomain.com/dod/2018/12/18/centcom-chief-the-future-of-warfare-demands-more-cyber-authorities

  • DoD SBIR/STTR Component BAA Open: Defense Advanced Research Projects Agency (DARPA) HR001121S0007 Topics 23-26

    September 9, 2021 | International, Aerospace, Naval, C4ISR, Security

    DoD SBIR/STTR Component BAA Open: Defense Advanced Research Projects Agency (DARPA) HR001121S0007 Topics 23-26

    The DoD Small Business and Technology Partnerships Office announces the opening of the following Broad Agency Announcement (BAA) topics: Defense Advanced Research Projects Agency (DARPA), HR001121S0007 SBIR Topic HR001121S0007-23: “Inexpensive Long Endurance Drone (ILED),” published at https://sam.gov/opp/f85609948e6e4e82b15699ef246ea86e/view SBIR Topic HR001121S0007-24: “DELTA (Defining and Leveraging digital Twins in Autonomous undersea operations),” published at https://sam.gov/opp/2435dcb17e1b4ef59845f040f800858c/view SBIR Topic HR001121S0007-25: “TARMAC (Topology-Agnostic Resource Management and Control),” published at https://sam.gov/opp/a6f2630be003491f828a1cb815439035/view SBIR Topic HR001121S0007-26: “Testing Hardware for Event BasEd Systems (THEBES),” published at https://sam.gov/opp/d3ac1041b03845dfb74da4ef86d6a14b/view IMPORTANT DATES: September 9, 2021: BAA opens, begin submitting proposals in DSIP October 12, 2021: BAA closes, full proposals must be submitted in DSIP no later than 12:00 p.m. ET Full topics and instructions are available at the links provided above.

  • Congressional commission wants more cyberwarriors for the military

    January 8, 2020 | International, C4ISR, Security

    Congressional commission wants more cyberwarriors for the military

    Mark Pomerleau The U.S. Cyberspace Solarium Commission, a bipartisan organization created in 2019 to develop a multipronged U.S. cyber strategy, will recommend the Department of Defense add more cyberwarriors to its forces, the group's co-chair said Jan. 7. The cyber mission force was established in 2013 and includes 133 teams and roughly 6,200 individuals from across the services that feed up to U.S. Cyber Command. These forces reached a staffing milestone known as full operational capability in May 2018, however, some on the commission believe the cyber landscape has changed so that the force needs to adapt as well. In a final report that's expected in the coming months, the solarium will recommend adding more cyberwarriors. “It's fair to say that force posture today in cyber is probably not adequate," said Rep. Mike Gallagher, R-Wisc., co-chair of the U.S. Cyberspace Solarium Commission. Gallagher spoke at an event hosted by the Council on Foreign Relations in Washington Jan. 7. Within the last two years, Cyber Command has described a philosophy called persistent engagement, which is a means of constantly contesting adversary behavior in cyberspace before it can be disruptive. Persistent engagement is viewed as a means of meeting the 2018 DoD cyberspace strategy's direction to “defend forward.” That action seeks to position U.S. cyber forces outside of U.S. networks to either take action against observed adversary behavior or warn partners domestically or internationally of impending cyber activity observed in foreign networks. It is under this new approach that Gallagher and other commission members said the Pentagon must ensure its forces are capable of meeting the burgeoning challenges from bad actors. “We need to figure out what's the right size” of the force, Mark Montgomery, executive director of the commission, said at an event in November. “In my mind, the CMF probably needs to be reassessed. It might be that the assessment [says] that the size is the right size. I find that hard to believe with the growth in adversary.” The cyber mission force is made up of about 5,000 service members out of a full staff of about 6,200, Dave Luber, Cyber Command's executive director said in November. According to a defense official, it's normal that staffing will fall below 100 percent but leaders are confident in DoD's cyber forces' readiness and ability to defend the nation. During a February 2019 hearing before the Senate Armed Services Committee, Cyber Command's leader, Gen. Paul Nakasone, said the force is the right size for the threats they currently face, but as it continues to operate and adversaries improve, it will need to grow beyond the 133 teams. However, Nakasone told a defense conference in California in December that the force has been built to execute the persistent engagement strategy. “Within U.S. Cyber Command, the National Security Agency, it's about persistent engagement; this idea that we will enable our partners with information and intelligence and we will act when authorized,” he said. “This is the way forward for us ... This is the way that we've structured our force. This is the way that we developed our doctrine. This is the way that we engage our adversaries ... this is our method upon which we look at the future and say this is how we have an impact on our adversaries.” Aside from the Cyberspace Solarium Commission, Congress now requires the Department of Defense to provide quarterly readiness briefings on the cyber mission force. In the annual defense policy bill, signed into law in December, Pentagon officials must brief members of Congress on the abilities of the force to conduct cyber operations based on capability, capacity of personnel, equipment, training and equipment condition. The secretary of defense must also establish metrics for assessing the readiness of the cyber mission force, under the provision. https://www.fifthdomain.com/dod/2020/01/07/congressional-commission-wants-more-cyberwarriors-for-the-military/

All news