October 31, 2024 | International, C4ISR, Security
October 10, 2018 | International, Land
By: Jen Judson
WASHINGTON — The Army has entered the final stages of hashing out requirements for ramping up Stryker combat vehicle lethality and will make a decision in January on what it wants in order to increase its battlefield effectiveness.
The service in January will hold an Army Requirements Oversight Council meeting, with Army Chief of Staff Gen. Mark Milley, to cement requirements on how it will improve the Stryker fleet's lethality, according to Lt. Gen. James Pasquarette, the service's new G-8 lead, in charge of program development and justification.
The AROC will produce a “kind of ‘Y in the road' of what we think we are going to want to look at,” when it comes to making the Stryker more lethal, Pasquarette told Defense News in an interview ahead of the Association of the United States Army's annual meeting.
The Army conducted a test fire of one of its 30mm cannon solutions on Stryker at Aberdeen Proving Ground, Maryland, as recently as last month, he noted.
“We know we believe the Stryker has to have capability to defeat light armor,” Pasquarette said. “We are developing the concept more to validate that on the front-end.”
The Army is looking at roughly three different caliber weapons systems, he said. They include a couple of Common Remotely Operated Weapon Stations with different caliber weapons, as well as a 30mm cannon like what was outfitted on Strykers that went to the 2nd Cavalry Regiment in Germany earlier this year.
“We want to make sure the concept is tight, about what we think we need based on threat and capability we want to have, then we will have to see what direction we go,” which could include competitions to upgun the fleet — or parts of the fleet — in the future, Pasquarette said.
“We are still determining balance. Does everyone need to have this, or is it just parts of the fleet?” Pasquarette asked. “How do we want to fight Stryker units, if we have this capability in there?”
October 31, 2024 | International, C4ISR, Security
April 29, 2020 | International, C4ISR
Rochester, N.Y. Apr 28, 2020 - L3Harris Technologies (NYSE:LHX) has received a third low-rate initial production (LRIP) order valued at $95 million by the U.S. Army under the HMS (Handheld, Manpack & Small Form-Fit) IDIQ contract to bring AN/PRC-158 multi-channel radios to the battlefield. This LRIP will be followed by an Operational Test that will inform a Full Rate Production decision for the AN/PRC-158 and other HMS products. The IDIQ contract includes a five-year base and an additional five-year option with a ceiling of $12.7 billion. The Army expects to purchase approximately 65,000 HMS Manpack radios under the IDIQ. The L3Harris AN/PRC-158 radio features a two-channel, software-defined architecture with integrated cross-banding between waveforms, including Single Channel Ground and Airborne Radio System (SINCGARS), Mobile User Objective System (MUOS), Demand Assigned Multiple Access/Integrated Waveform (DAMA/IW) and ready for the Warrior Robust Enhanced Network (WREN) waveform, providing advanced capabilities while maintaining backward interoperability with legacy systems. The software-defined architecture enables flexibility to respond to new and emerging requirements and allows easy porting of new waveforms. The radio is capable of simultaneously handling classified and unclassified data. “L3Harris is proud to deliver the most critical part of the U.S. Army's Integrated Tactical Network, enabling secure multi-mission capability in the most challenging and contested environments,” said Dana Mehnert, President, Communication Systems, L3Harris. “The AN/PRC-158 will equip soldiers with cutting-edge waveforms, providing resilient SATCOM and advanced wideband networking at the tactical edge.” About L3Harris Technologies L3Harris Technologies is an agile global aerospace and defense technology innovator, delivering end-to-end solutions that meet customers' mission-critical needs. The company provides advanced defense and commercial technologies across air, land, sea, space and cyber domains. L3Harris has approximately $18 billion in annual revenue and 50,000 employees, with customers in 130 countries. L3Harris.com. Forward-Looking Statements This press release contains forward-looking statements that reflect management's current expectations, assumptions and estimates of future performance and economic conditions. Such statements are made in reliance upon the safe harbor provisions of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. The company cautions investors that any forward-looking statements are subject to risks and uncertainties that may cause actual results and future trends to differ materially from those matters expressed in or implied by such forward-looking statements. Statements about the value or expected value of orders, contracts or programs and about our system capabilities are forward-looking and involve risks and uncertainties. L3Harris disclaims any intention or obligation to update or revise any forward-looking statements, whether as a result of new information, future events, or otherwise. CONTACTS Natalie Ciao Communication Systems +1 585 242 4312 Natalie.Ciao@L3Harris.com Sara Banda Media Relations +1 321 674 4498 Sara.Banda@L3Harris.com View source version on L3Harris Technologies: https://www.l3harris.com/newsroom/press-release/2020/04/89746/l3harris-technologies-awarded-third-lrip-order-on-us-armys-hms-manpack-idiq-contract?utm_source=twitter&utm_medium=social&utm_campaign=cs-tcom-pr-158-lrip
July 31, 2020 | International, C4ISR, Security
Mark Pomerleau WASHINGTON — The Pentagon must be able to hunt cyberthreats on the private networks of defense companies in order to strengthen national cybersecurity, according to one of the leaders of the Cyber Solarium Commission. Rep. Mike Gallagher, R-Wis., who co-chairs the commission, said in testimony before the House Armed Services Subcommittee on Intelligence and Emerging Threats and Capabilities that there must be greater visibility of these networks, in which much sensitive and classified information is kept. “I think one of our biggest findings in the report was that while we are getting a better awareness of our own systems, we still — down to the level of some of our DoD contractors, subcontractors, all the small companies that work with the big defense primes — don't have the level of visibility on the threat picture and the security of their networks that we need,” he said July 30. “I just would argue that we need to figure that piece out because we just can't be in the process of reacting to cyber intrusions after the fact. We have to identify those threats at a quicker timeline at which our adversaries can break out on networks.” The Cyber Solarium Commission is a bipartisan organization created in the 2019 to develop a multipronged U.S. cyber strategy. The commission's report, released in March, recommended Congress require the defense industrial base participate in threat intelligence sharing programs and threat hunting on their networks. “Improving the detection and mitigation of adversary cyber threats to the DIB [defense industrial base] is imperative to ensuring that key military systems and functions are resilient and can be employed during times of crisis and conflict,” the report stated. China has been accused of pilfering reams of data from the networks of defense companies, including plans for the F-35 fighter jet and sensitive data on U.S. Navy programs that, while not classified by themselves, can collectively provide vast strategic insight into Navy plans and operations, officials claim. The commission's report recommended that a threat-hunting program include Department of Defense threat assessment programs on DIB networks; incentives for companies to feed data collected from threat hunting to the DoD and the National Security Agency's cybersecurity directorate; and coordination of DoD efforts with the Department of Homeland Security and the FBI. Congress is calling for the creation of a threat-sharing model in this year's defense authorization bill. The Senate's version includes a provision to direct the defense secretary to establish a threat intelligence program “to share threat intelligence with, and obtain threat intelligence from, the defense industrial base.” https://www.c4isrnet.com/cyber/2020/07/30/pentagon-needs-access-to-defense-companies-networks-to-hunt-cyberthreats-says-commission/