Back to news

December 4, 2019 | International, Aerospace, C4ISR

Coming in 2020: A new technology to link F-35 simulators across the globe

By: Valerie Insinna

ORLANDO, Fla. — Next year, U.S. Air Force F-35 pilots will be able to hop into a simulator and practice large-scale coordinated attacks with other F-35A users in simulators around the globe, Lockheed Martin's head of F-35 training said Tuesday.

The capability, called Distributed Mission Training, will allow an unlimited number of F-35 simulators to be networked, enabling high-end training, said Chauncey McIntosh, Lockheed's vice president for F-35 training and logistics.

“We've been testing to ensure that it's ready to go with our first customer at Nellis Air Force Base [in Nevada]. We've got hardware that's going up there this month and we're starting our test connections, and everything is looking very well [regarding] this product,” he said during a briefing at the Interservice/Industry, Training, Simulation and Education Conference.

“Essentially we're waiting just to get the accreditation from the government. We'll connect that [hardware] and then we'll start running tests on site with software. And then we'll go to our final delivery in spring of 2020," he told Defense News.

Currently, F-35 bases can only link as many simulators as they have on site — usually as many as four. However, the Distributed Mission Training capability, or DMT, will allow every U.S. Air Force base to connect up to four of its F-35 simulators with those of every other air base, McIntosh said.

At some point, F-35A simulators may also be able to regularly connect with any other aircraft simulator that can be supported on the same network.

“Here at Orlando, in our labs, we've already connected to the F-22, the F-16, as well as to [E-3] AWACS [airborne early warning and control aircraft],” McIntosh said. “Almost every week we are writing test scenarios with additional platforms.”

Lockheed is under contract to provide DMT to the U.S. Air Force, Navy and Marine Corps, as well as to the United Kingdom. However, because all of those entities run their F-35 simulators aboard different networks, they will be unable to connect with variants from other services, McIntosh said.

While Nellis is slated to receive DMT early next year, the F-35 Joint Program Office and Lockheed are still discussing the schedule for further deployments to other bases and services, McIntosh explained.

“Our initial efforts are for the Air Force,” he said.

https://www.defensenews.com/digital-show-dailies/itsec/2019/12/04/coming-in-2020-a-new-technology-that-will-link-f-35-simulators-across-the-globe

On the same subject

  • The Pentagon is handling cyber vulnerabilities inconsistently

    March 18, 2020 | International, C4ISR, Security

    The Pentagon is handling cyber vulnerabilities inconsistently

    Mark Pomerleau The Department of Defense has not consistently mitigated cyber vulnerabilities identified in a 2012 report, according to the department's inspector general. The DoD IG issued a follow-on report to its 2012 report, issued March 13 and made public March 17, that determined cyber red teams didn't report the results of assessments to organizations and components didn't effectively correct or mitigate the identified vulnerabilities. The new report discovered that components didn't consistently mitigate or include unmitigated vulnerabilities identified in the prior audit and during this audit by red teams during combatant command exercises, operational testing assessments and agency-specific assessments in plans of action and milestones. “Ensuring DoD Components mitigate vulnerabilities is essential to achieve a better return on investment,” the report stated. “In addition, we determined that the DoD did not establish a unified approach to support and prioritize DoD Cyber Red Team missions. Instead, the DoD Components implemented Component-specific approaches to staff, train and develop tools for DoD Cyber Red Teams, and prioritize DoD Cyber Red Team missions.” The report found that DoD didn't establish a unified approach because it didn't assign an organization with responsibility to oversee and synchronize red team activity based on priorities, it didn't assess the resources needed for each red team and identify requirements to train them to meet priorities and it didn't develop baseline tools to perform assessments. “Without an enterprisewide solution to staff, train and develop tools for DoD Cyber Red Teams and prioritize their missions, DoD Cyber Red Teams have not met current mission requests and will not meet future requests because of the increased demands for DoD Cyber Red Team services,” the report said. “Until the DoD assigns an organization to assess DoD Cyber Red Team resources, it will be unable to determine the number of DoD Cyber Red Teams and staffing of each team to support mission needs, which will impact the Do D's ability to identify vulnerabilities and take corrective actions that limit malicious actors from compromising DoD operations.” The DoD IG issued seven recommendations the secretary of defense assign an organization responsibility for. They include: Review and assess red team reports for systemic vulnerabilities and coordinate the development and implementation of enterprise solutions to mitigate them; Ensure components develop and implement a risk-based process to assess the impact of identified vulnerabilities and prioritize funding for corrective actions for high-risk vulnerabilities; Ensure components develop and implement processes for providing reports with red team findings and recommendations to organizations with responsibility for corrective actions; Develop processes and procedures to oversee red team activities, including synchronizing and prioritizing red team missions, to ensure activities align with priorities; Perform a joint DoD-wide mission-impact analysis to determine the number of red teams, minimum staffing levels of each team, the composition of the staffing levels needed to meet current and future mission requests; Assess and identify a baseline of core and specialized training standards, based on the three red team roles that team staff must meet for the team to be certified and accredited; and Identify and develop baseline tools needed by red teams to perform missions. https://www.fifthdomain.com/dod/2020/03/17/the-pentagon-is-handling-cyber-vulnerabilities-inconsistently/

  • Advanced Air and Missile Defense, in the Hands of Soldiers

    May 29, 2020 | International, Aerospace, Land

    Advanced Air and Missile Defense, in the Hands of Soldiers

    May 27, 2020 - It's a cold December morning at White Sands Missile Range in New Mexico, and two surrogate cruise missile targets have just been launched, one after the other. They are flying separate courses among the jagged San Andres and Sacramento mountains toward soldiers in a U.S. Army Air and Missile Defense unit at a test site called TAC-2 – Tactical Command Post 2. These sophisticated targets precisely mimic real cruise missile threats and can take advantage of this terrain to hide from the radars and sensors commanders have positioned in the area. This can create gaps in tracking that make the job of interceptor missiles or other defensive weapons more difficult – you can't hit what you can't see. Today, though, their maneuvers won't enable them to evade detection. This is Flight Test 5 (FT-5), the most sophisticated and difficult development test yet for the Army's Integrated Air and Missile Defense (IAMD) Battle Command System (IBCS), developed by Northrop Grumman. High above the range, sensors aboard U.S. Air Force F-35 fighter aircraft see and acquire the two surrogate missiles. IBCS integrates the aircraft sensor data with that of available ground sensors, including Sentinel, Patriot weapon system and U.S. Marine Corps TPS-59 radars. All share information via the IBCS Integrated Fire Control Network (IFCN). As one sensor loses sight of the threats – and each will at some point – the targets are acquired by other sensors on the IFCN, enabling IBCS to create a precise, uninterrupted composite track of each missile's movements. With data from every sensor, IBCS produces a single integrated air picture on the screens of the air defense soldiers at TAC-2. They see every change in altitude and direction as the two surrogate missiles paint tracks across their screens. Because IBCS enables joint weapons as well as joint sensors, the defenders at the controls can select the best effector to use against these targets. Today, the soldiers are about to launch two Patriot Advanced Capability 2 (PAC-2) interceptor missiles. “Without IBCS, all those different sensors operate independently, creating opportunities for threats to avoid detection as they fly to a target,” explained Northrop Grumman IBCS Program Director Mark Rist. “Without being integrated onto a network, these sensors produce a more ambiguous, less-clear air picture, making engagements of threat systems more challenging.” He is monitoring FT-5 from miles away, in the test's mission control room. The soldiers at TAC-2 can be heard on the radio, calm but urgent voices reporting “target acquired” by airborne sensor, and talking of the “IP” or intercept point, and “kill box.” It's only been moments since the threats were launched, but now comes “Free to engage ... Missile away ... Missile away ...” One, then another PAC-2 interceptor missile is launched by the soldiers. IBCS is not only able to launch the missiles, but also plays a critical role in the engagement by actively closing the fire control loop and providing in-flight updates as the PAC-2s converge on their targets. The surrogate cruise missile targets are closing in and can now be seen on video in the control room – and then suddenly they can't: One, then the other disappears in a ball of fire as the PAC-2s destroy them. Cheers erupted in the control room, and those of Rist and his team may have been loudest among the many generals, colonels and visiting officials that day at White Sands. After years of effort, working closely and constantly with soldiers, FT-5 fully demonstrated IBCS's unprecedented capability to integrate sensors and effectors to detect, track and simultaneously engage multiple targets in flight. “Information is ammunition, and IBCS is providing soldiers with more,” Rist said. “We brought a lot of things together in this development test. It was the first including joint operations with the Air Force F-35 and Marine Corps radar systems, the first with Air Defense Artillery soldiers at the controls, and the first involving software developed using our Agile methodology.” FT-5 was the latest in a series of test successes, and further evidence of the program's maturity as soldiers train on IBCS equipment in preparation for an important Limited User Test (LUT) this spring. “I'm very proud of these soldiers and of the system's performance,” said Colonel Phil Rottenborn, Army IAMD project manager. “This was the first time soldiers conducted a live engagement using IBCS in a developmental test, and they showed we are ready to go into the operational test phase.” “Success!” said Col. Tony Behrens, Army Capability Manager for the Air and Missile Defense (AMD) Command, and a nearly 26-year career Air Defense Artillery (ADA) officer. “It showed me that an Army operator – not an engineer or software developer – can sit at that console and do his or her job. I am very comfortable and confident about the path we're on.” IBCS enables soldiers to be even more effective by integrating all the systems' data and providing a common command-and-control (C2). Soldiers will only need to learn to use the IBCS C2, instead of spending time becoming specialists on only one or two of a dozen different sensor and weapon systems. That enhances IBCS's already impressive battlefield survivability, because soldiers will be capable of using any of the available sensors with any available weapon systems at any command post connected to the self-connecting, self-healing IFCN. Also, less time will be spent in recurrent training, making more time available for teaching operators defense strategy and how to fight. The IBCS “every sensor; best effector” concept gives commanders greater flexibility in defense design, allowing them to position resources for greatest coverage in far less time essentially helping to change the way soldiers see and fight air battle. Northrop Grumman's open-architecture system-of-systems approach to IBCS eases the integration of any new or legacy sensor and effector systems, which is important for U.S. joint operations and to foreign governments. Poland has an agreement with the U.S. Army to purchase IBCS for modernization of the nation's WISLA medium-range air defense system, and other countries have expressed interest as well. With the success of FT-5, Northrop Grumman will now focus on the Army's Limited User Test planned for later this year, followed by the low-rate initial production and full-rate production phases of the system, to field IBCS to Army air defenders in fiscal year 2021. Behrens said the Army must have the IBCS capabilities to be effective and successful in future combat operations. “To me, it's beyond critical,” he said. “We're not just giving soldiers a new piece of equipment, a new piece of gear. We're going to give them an entirely new way of operating on the battlefield that is so much more efficient. But it has to start with the system that enables you to do that.” IBCS may also be the Army's first big step toward multi-domain convergence – the next level above integration. “Enabling multi-domain – or more accurately, all-domain – operations is vital to ensuring battlefield advantage and superiority,” said Brig. Gen. Brian Gibson, director of the Army's AMD Cross-Functional Team, at an Association of the U.S. Army event in early March. “When successfully fielded, IBCS will be one of the Army's pathfinder capabilities into what is becoming a top priority for our military leaders: joint, all-domain command and control.” Media Contact Kenneth Kesner 256-327-6889 Kenneth.Kesner@ngc.com View source version on Northrop Grumman: https://news.northropgrumman.com/news/features/advanced-air-and-missile-defense-in-the-hands-of-soldiers

  • CISA Announces Malware Next-Gen Analysis | CISA

    April 10, 2024 | International, Land, Security

    CISA Announces Malware Next-Gen Analysis | CISA

All news