Back to news

November 13, 2020 | International, Naval

BAE Systems Secures New Contracts for Production of the U.S Navy’s CANES

Posted on November 12, 2020 by Seapower Staff

MCLEAN, Va. — BAE Systems has been awarded contracts worth more than $30 million to produce and integrate a mission-critical information warfare platform for U.S Navy vessels to help Sailors execute their missions and remain connected while at sea, the company said in a Nov. 11 release.

The U.S Navy has issued two task orders for Consolidated Afloat Network Enterprise Services (CANES) for two Arleigh Burke-class destroyers, a Virginia-class submarine, and two Blue Ridge-class command ships.

“These two task orders permit us to continue our high-quality, high volume production and integration service, assembling and delivering CANES to the Navy safely and affordably,” said Mark Keeler, vice president and general manager of BAE Systems' Integrated Defense Solutions business. “CANES takes advantage of commercial-off-the-shelf insertion, which brings operational agility to the warfighter and savings to the U.S. Navy.”

Under the first task order from the Naval Information Warfare Systems Command (NAVWAR) San Diego, BAE Systems will produce fully integrated CANES racks for two command ships, which are expected to be completed by February 2022. Under the second task order, the company will produce fully integrated CANES racks for two destroyers and a submarine, which are expected to be completed by March 2022. Work will be performed at BAE Systems' 281,000 square-foot state-of-the-art production facility in Summerville, South Carolina.

CANES consolidates and enhances five existing legacy network programs and it serves as a single support framework for all command, control, communications, computers, and intelligence (C4I) applications that require dedicated infrastructure to operate.

https://seapowermagazine.org/bae-systems-secures-new-contracts-for-production-of-the-u-s-navys-canes/

On the same subject

  • French-British underwater drone proves de-mining ability, says Thales

    September 13, 2023 | International, Naval

    French-British underwater drone proves de-mining ability, says Thales

    The MMCM system is meant to detect, identify and neutralize mines up to 300 meters deep, compared to 120 meters today.

  • Afghanistan deployment proves One World Terrain is more than a training tool

    October 15, 2020 | International, Aerospace, Land, C4ISR

    Afghanistan deployment proves One World Terrain is more than a training tool

    Jen Judson WASHINGTON — The U.S. Army began building an entire virtual world a few years ago for its Synthetic Training Environment (STE) to bring accuracy and a real-life feel to training, but a deployment of One World Terrain in Afghanistan has proved it's not just a training tool, according to Maj. Gen. Maria Gervais, who is in charge of the service's STE development. One World Terrain, or OWT, compiles realistic and, in some cases, extremely accurate virtual maps of territory all over the globe. The idea is to be able to click on any place on a virtual globe and go there. Soldiers can then train virtually in an exact environment in which they can expect to operate in reality. “We're seeing now there are better uses for operational capability,” Gervais told Defense News in an Oct. 8 interview ahead of the Association of the U.S. Army's annual conference. “And it's helping us inform how do we now expand this to meet training, operational and also targeting requirements.” It all began with a unit that used OWT for training at the National Training Center on Fort Irwin, California, and saw value in it, Gervais said. When the unit deployed to Afghanistan, the soldiers asked to take the system — which included a drone and software — she said. The unit was able to capture terrain for the purpose of mission-planning rehearsal and route planning. But the soldiers also used it to take an in-depth look at the forward-operating base to see how it was set up and analyze it for vulnerabilities. “I will tell you from that usage, they figured out they had to make some changes,” Gervais said. “And then they went out and they started looking at other operating bases within their area. They expanded it.” The system “immediately started proving its utility to them,” she said, “but from that unit from what they were able to do, we then were able to take the next unit that was coming in behind them and provide all that information to them and allow them to understand how One World Terrain could be used.” The Army's 82nd Airborne Division also used the system prior to deploying to another theater. The division captured the terrain, using it for predeployment planning and mission rehearsals, including how and where to set up a base and where to position electronic warfare systems. OWT also helped the 25th Infantry Division out of Hawaii prepare for a Joint Training Readiness Center rotation, and its members also plan to use it during the exercise. These uses have led the Army to provide more drones and software for more units, Gervais said. Starting in December and January, the Army will begin fielding “a little bit more capability,” she added. In March, the STE team went to Germany to observe an assured position, navigation and timing exercise that included a sensor-to-shooter, live-fire drill. The team worked with the 1st Cavalry Division's intelligence analysts and put OWT on the Distributed Common Ground System-Army (DCGS-A) system, which is an intelligence analysis platform. “We showed them the capability, and what came out of there was pretty astounding,” Gervais said. With 3D terrain from OWT in the system, decisions could be made more quickly because there was no need to compare two different databases and reason against it, she said. That cut workload by about 60 percent, she added. OWT was on a DCGS-A system at Project Convergence at Yuma Proving Ground, Arizona, this year, Gervais said, and it showed the realm of the possible from a targeting perspective. While the STE had a limited scope during Project Convergence, “we're going to be more integrated in Project Convergence 21 next year,” she added, so that “everybody's kind of operating off the 3D terrain.” https://www.defensenews.com/digital-show-dailies/ausa/2020/10/14/afghanistan-deployment-proves-one-world-terrain-is-more-than-a-training-tool/

  • The new ways the military is fighting against information warfare tactics

    July 22, 2020 | International, C4ISR

    The new ways the military is fighting against information warfare tactics

    Mark Pomerleau One of the clearest examples of how the military wants to defeat adversaries using information warfare is by publicly disclosing what those enemies have been doing and what capabilities they have. Information warfare can be abstract, combining cyber, intelligence, electronic warfare, information operations, psychological operations or military deception as a way to influence the information environment or change the way an adversary think. “At our level, the most important thing we can do is to be able to expose what an adversary is doing that we consider to be malign activity, in a way that allows that to be put in the information environment so that now more scrutiny can be applied to it,” Lt. Gen. Timothy Haugh, commander 16th Air Force, the Air Force's newly established information warfare organization, told reporters during a media round table in late February. One of the first ways the Department of Defense has sought to test this is through U.S. Cyber Command's posting of malware samples to the public resource VirusTotal. Malware samples discovered in the course of operations by the Cyber National Mission Force are posted to the site to inform network owners. It also helps antivirus organizations of the strains build patches against that code and helps identify the enemies' tools being used in ongoing campaigns. Haugh, who most recently led the Cyber National Mission Force, explained how these cyber teams, conducting what Cyber Command calls hunt forward operations, were able to expose Russian tactics. U.S. military teams deploy to other nations to help them defend against malign cyber activity inside their networks. “Those defensive teams then were able to identify tools that were on networks and publicly disclose them, [and] industry later attributed to being Russian tools,” he said. “That was a means for us to use our unique authorities outside the United States to be able to then identify adversary activity and publicly disclose it.” Officials have said this approach changes the calculus of adversaries while also taking their tools off the battlefield. “Disclosure is more than just revealing adversary intent and capabilities. From a cyberspace perspective, disclosure is cost imposing as it removes adversary weapons from the ‘battlefield' and forces them to expend resources to create new weapons,” Col. Brian Russell, the commander of II Marine Expeditionary Force Information Group, told C4ISRNET in June. “Disclosure forces the adversary to ask: ‘How were those capabilities discovered?' It causes them to investigate the cause of the disclosure, forcing them to spend time on something other than attacking us. If I can plant a seed of doubt (messaging) that the disclosure might have been caused by someone working on the inside, it makes them question the system's very nature, perhaps spending more time and resources to fix the system.” The NSA has demonstrated a similar tactic when it created its cybersecurity directorate in late 2019. The entity was formed in part, due to the fact that adversaries were using cyberspace to achieve strategic objectives below the threshold of armed conflict. Now, the directorate uses its intelligence and cyber expertise to issue advisories to the network owners of cybersecurity threats so they can take the necessary steps to defend themselves. One recent advisory had direct bearing on a nation state's malicious activity, according to a senior intelligence official. In late May, the agency issued an advisory regarding a vulnerability in Exim mail transfer agent, which was being widely exploited by a potent entity of Russia's military intelligence arm the GRU called Sandworm. “Quickly thereafter, we saw five cybersecurity companies jumped on it and really used that to deepen and expand and publish information about the GRU's infrastructure that they use to conduct their cyberattacks and further information as well,” the official told reporters in early July. “That was terrific because we felt that that had a direct impact on a major nation state in terms of exposing their infrastructure ... and we saw significant patch rates go up on a vulnerability that we knew they were using. That's the kind of thing that we're looking for.” The military has had to think differently to combat for how adversaries are operating. “A central challenge today is that our adversaries compete below the threshold of armed conflict, without triggering the hostilities for which DoD has traditionally prepared,” Gen. Paul Nakasone, commander of Cyber Command, wrote in prepared testimony before the House Armed Services Committee in early March. “That short-of-war competition features cyber and information operations employed by nations in ways that bypass America's conventional military strengths.” These disclosures or efforts to call out malign behavior have also taken the forms of media interviews and press releases. For example, Gen. Jay Raymond, the head of U.S. Space Command and the commandant of Space Force, said in a February interview in which he detailed what he deemed unacceptable behavior by Russia in space, a surprising charge given how tight lipped the U.S. government typically is about its satellites. “We view this behavior as unusual and disturbing,” he said of Russian satellites creeping up to American ones. “It has the potential to create a dangerous situation in space.” Or consider that leaders from Africa Command on July 15 issued a press release detailing the activities of the Wagner Group, a Russian security company, as acting on behalf of the Russian state to undermine the security situation in Libya. “U.S. Africa Command (AFRICOM) has clear evidence that Russian employed, state-sponsored Wagner Group laid landmines and improvised explosive devices (IEDs) in and around Tripoli, further violating the United Nations arms embargo and endangering the lives of innocent Libyans,” the release said. “Verified photographic evidence shows indiscriminately placed booby-traps and minefields around the outskirts of Tripoli down to Sirte since mid-June. These weapons are assessed to have been introduced into Libya by the Wagner Group.” Moreover, Africa Command's director of operations called out Russia, noting that country's leaders have the power to stop the Wagner Group, but not the will. Sixteenth Air Force, at the request of C4ISRNET, provided a vignette of such behavior from Russia in the form of how it covered up the explosion of a radioactive rocket, dubbed Skyfall. According to the service, Russia took extreme steps to curb monitoring of the site where the explosion took place and sought to conceal the true nature of the explosion potentially hindering surrounding civilian populations from receiving adequate medical treatment and guidance. With new forces integrated under a single commander, using unique authorities to collect intelligence and authorities to disclose, 16th Air Force is now better postured to expose this type of malign activity, which previously the U.S. government just didn't do. Top Pentagon leaders have explained that the dynamic information warfare space requires a new way of thinking. “We've got to think differently. We've got to be proactive and not reactive with messaging,” Lt. Gen. Lori Reynolds, the Marine Corps' deputy commandant for information, told C4ISRNET in an interview in March. “We have been very risk averse with regard to the information that we have. You can't deter anybody if you're the only one who knows that you have a capability.” https://www.c4isrnet.com/information-warfare/2020/07/20/the-new-ways-the-military-is-fighting-against-information-warfare-tactics/

All news