Back to news

June 8, 2021 | International, Aerospace, Naval, Land, C4ISR, Security

Contracts for June 4, 2021

On the same subject

  • For the Navy’s hospital ships, networking is yet another challenge

    April 22, 2020 | International, Naval, C4ISR

    For the Navy’s hospital ships, networking is yet another challenge

    Andrew Eversden When the Navy hospital ship Comfort deployed to Haiti in 2010 following devastating earthquakes, media organizations broadcasting in the area ate up so much satellite bandwidth that the ship had to revert to paper processes and adjust its satellite communications for some ship-to-shore messaging. While the outages weren't a widespread issue, said Sean Kelley, who served as the ship's top IT officer at the time, the problem highlighted a challenge these ships face: broadband. Now, the hospital ships Mercy and Comfort are deployed to Los Angeles and New York, respectively, and are in the national spotlight as symbols of the coronavirus pandemic relief effort. But security and IT experts say the ships' mission presents the Navy with distinct networking problems, from cybersecurity to network connection for patients. Onboard devices When disaster strikes, the Navy's hospital ships deploy in a matter of days, mobilizing with a crew of about 100-1,200 personnel. But the influx of staff also leads to an incursion of devices, all of which must be secure and require bandwidth. “You have a lot of different people going to a lot of different places that now have to be acclimated to this environment,” said Kelley, now executive vice president at Unissant, an IT and cybersecurity company. “So that's really one of the biggest challenges, is getting all those things turned on, all those things activated, making sure that they are all compliant with the latest patches and fixes, and making sure they're good.” This process can be a “nightmare,” said retired Rear Adm. Danelle Barrett, former deputy chief information officer of the Navy and cybersecurity division director. “The challenging part is always in the first couple days whenever this happens,” said Barrett, who oversaw communications and cyberspace for Operation Unified Response, the U.S. military's mission in Haiti following the 2010 earthquake. “The team is coalescing about how they want to operate, and they're getting their feet wet, getting new accounts on networks ... [getting] their logins.” Cybersecurity aboard the ships is also complex. Both ships have 1,000 beds, 12 operating rooms, blood banks, labs, medical devices and a multitude of other “internet of things” devices connected to hospital beds. According to a 2018 survey by health care IoT security company Zingbox, each bed can have as many as 10-15 IoT devices. “They have to be cyber-ready, or the mission of the Mercy is considered [degraded],” said Dean Hullings, global defense solutions strategist at Forescout, which handles Comply to Connect — a Defense Department framework created to ensure the cybersecurity of new devices — for the USNS Mercy. Ensuring connectivity For the devices to function, they need connectivity. When the ships arrived in ports in late March, technology firm CenturyLink “donated” connectivity to the Mercy, while Verizon provided connectivity to the Comfort. Former and current Navy officials told C4ISRNET that adequate broadband is the most challenging IT consideration faced by these ships. “Obviously you're going to be transferring imagery of X-rays or things like that that are more dense and require a ... higher data rate, so that bandwidth in port is important,” Barrett said. And with the introduction of patients, bandwidth needs become more complex. “The greatest communications challenge we are going to face during this deployment is the increased need for patients to communicate off the ship during their stay,” Tom Van Leunen, a spokesman for Military Sealift Command, told C4ISRNET. “Our hospital ships are designed to support official communication for the ship's crew and embarked medical community to complete their job. Adding a capability for patients to reach loved ones increases the risk of saturating the bandwidth off the ship.” Aboard both ships, the Navy doubled the bandwidth, he said, adding that Navy personnel also set up separate networks for patients' communications. While this solves one networking problem, it can also create an increased cybersecurity risk. Securing the ships Cybersecurity on the hospital ships follows the same standard practices as the rest of the Navy fleet. Since those aboard are largely Navy medical staff and personnel, they know what activities are acceptable on the network, Barrett said. “You can't just go and plug anything into that network because of potential vulnerabilities that that system may bring that could affect not just the ship, but remember, the ship is then connected to the rest of the [Department of Defense Information Network],” Barrett said. “So risk by one is shared by all.” ForeScout's Hullings said a hospital environment “epitomizes” why the Comply to Connect program is necessary. The ship has desktops, servers, routers, printers and other networks equipment, as well as mobile devices, such as tablets, that health care providers use to track patient care. “The truly unique stuff is the mission systems of the hospital, like X-ray machines, MRI machines, the beds themselves in the post-operative recovery rooms, that are all sensors. And they are all passing data. They have to be protected,” Hullings said. A spokesperson for the Navy told C4ISRNET that the ships are prepared for the cybersecurity challenges associated with their missions, but declined to address what additional cybersecurity challenges are introduced with the addition of private citizens. “These ships have routinely deployed in humanitarian assistance missions such as Pacific Partnership (USNS Mercy) and Continuing Promise (USNS Comfort) that required them to operate in partner nation ports, with foreign national patients being brought to and from the ship,” said Cmdr. Dave Benham, a spokesman for the Navy's 10th Fleet. “In all operating locations, we take appropriate precautions to keep our networks secure, and we do not discuss specific measures in order to protect operational security.” Cybersecurity on the hospital ships follow the same protocols as any other Military Sealift Command ship, said Benham. “Protecting our networks is a continuous challenge, and the overarching concern is to ensure that the right information gets to the right place at the right time with the right level of protection,” he explained. Cybersecurity aboard the hospital ships follow similar efforts to those recommendations made by the Centers for Disease Control and Prevention: Wash your hands. “It's ‘wash your hands' with your computer, too,” Barrett said. “Do good hygiene with your computer.” https://www.c4isrnet.com/it-networks/2020/04/21/for-the-navys-hospital-ships-networking-is-yet-another-challenge/

  • B-21 Development Applying Tough Lessons From B-2

    August 22, 2019 | International, Aerospace

    B-21 Development Applying Tough Lessons From B-2

    By Lee Hudson PALMDALE, California— The U.S. Air Force is taking lessons learned from the plagued B-2 Spirit bomber development program and applying them to the next-generation B-21 Raider. While it is unknown when the B-2 will retire, the aging stealth bomber may end up flying alongside the B-21. The B-2 bomber flew its inaugural flight 30 years ago from the Plant 42 runway here. Today, the Northrop Grummansite is preparing for development of the Raider and two newly erected beige buildings have popped up, likely tied to the next-generation bomber. Although technical and acquisition problems inundated B-2 development, the classified B-21 is taking a different approach. Many details remain classified, but the company and service officials acknowledge the team is being run by the Rapid Capabilities Office instead of a traditional program office. B-21 development appears to be progressing; the Air Force's No. 2 officer—Air Force Vice Chief of Staff Gen. Stephen Wilson—has said first flight is slated for December 2021. But House Armed Services seapower and projection forces subcommittee Ranking Member Rep. Rob Wittman (R-Va.) alerted the public last year that there was a problem with the inlet design for the B-21's Pratt & Whitney-manufactured engines. Wittman says those issues were fully addressed and the program has made tremendous progress. “I've been pretty impressed by what both the Air Force and what Northrop Grumman have done in addressing these particular issues and I think we're on the right course,” he says. “Getting those things right to begin with and setting the tone and path I think is critically important.” An Air Force illustration issued in 2016 of the B-21 design suggests it may closely resemble the B-2. “The B-2 will be setting the path course for the B-21,” says Janis Pamiljans, aerospace systems sector president at Northrop Grumman. “What we've learned on B-2 are finding themselves baselined in the design for B-21 for supportability, sustainability, [and] mission capable rate.” The aging B-2s must be overhauled every nine years and are taken off the flight line for up to 12 months. Maintenance includes modifications and upgrades to antenna technology, avionics and software systems, costing U.S. taxpayers an average of $60 million for each aircraft, says Richard Sullivan, vice president and B-2 program manager at Northrop Grumman. Separately, the Air Force is funding the $3 billion B-2 Defensive Management System Modernization (DMS-M) program to enhance the aircraft's direct attack capability and upgrade its integrated air defense systems. The current DMS was designed in the 1980s and has not received any upgrades. “By leveraging ‘state-of-the-art' electronic warfare antennae, processors, controller and displays, B-2 aircrews will realize unprecedented situational battlespace awareness and dynamic, real-time threat avoidance in the most complex radio frequency emitter environments,” the Air Force says. “The inherent increased sensitivity of the modernized DMS over the legacy system, with increased processing power, will build a battlespace picture that could be shared with joint force platforms by onboard communication systems.” DMS-M is facing a possible eight-month delay as the service works with Northrop Grumman to implement an agile software development framework, Air Force acquisition executive Will Roper told lawmakers in March. Engineering and manufacturing development for the effort goes through July 2022, according to fiscal 2020 budget documents. Lawmakers acknowledge it is important that the nation's only operational stealth bomber remain relevant. But the House Armed Services Committee is concerned about DMS-M schedule delays, according to a report accompanying the lower chamber's mark of the fiscal 2020 defense policy bill. “Unless the B-2 DMS-M program makes significant changes, there may continue to be delays that will impact the success of the program,” the report says. The committee directs the Air Force to brief members on sufficient government software development expertise; contract definitization schedule; delivery schedule; determination of software baseline; and an assessment of related DMS-M-related program support. The Senate Armed Services Committee also is asking for answers regarding the U.S. bomber force. The upper chamber is requesting a brief on an updated bomber road map and plans for B-2 life cycle sustainment, among other items, according to a report accompanying the Senate's mark of the fiscal 2020 defense authorization bill. The upper chamber also would require details on Raider basing. To date, the service has been “real[ly] happy with the way Northrop has approached” the B-21 program, says Maj. Gen. James Dawkins, Eighth Air Force commander and overseer of the Joint-Global Strike Operations Center. The next-generation bomber completed a successful critical design review in December. “Everything I hear is that cost, schedule and performance is right on expectations,” Dawkins says. https://aviationweek.com/defense/b-21-development-applying-tough-lessons-b-2

  • New Wright-Pat facility aims to improve cyber defenses of fighters and bombers

    July 19, 2019 | International, Aerospace, Other Defence

    New Wright-Pat facility aims to improve cyber defenses of fighters and bombers

    By: Diana Stancy Correll The Air Force has opened a $1.5 million facility designed to improve the fighter and bomber fleets' cyber defenses against adversaries. The new work area will provide a collaborative space for acquisition professionals to learn about current and emerging threats and better protect against them. The Air Force Life Cycle Management Center's Fighters and Bombers Directorate at Wright-Patterson Air Force Base in Ohio unveiled the facility during a July 9 ribbon cutting ceremony. “We are in an age where we have a very sophisticated threat and an adversary that is really trying to get into all of our systems,” Brig. Gen. Heath Collins, fighters and bombers program executive officer, said in a recent Air Force news release. “This facility is absolutely going to be at the core of how we protect our systems moving forward.” Joseph Bradley, director of the Cyber Resiliency Office for Weapons Systems, which provided funding and expertise for the project, called it a “key component of the CROWS mission” and said it will boost the Air Force's collaboration and ability to tackle challenges. The facility isn't the only one that CROWS intends to help launch. According to the Air Force, CROWS wants to set up similar facilities at development, acquisition and sustainment centers over the next five years. https://www.airforcetimes.com/news/your-air-force/2019/07/16/new-wright-pat-facility-aims-to-improve-cyber-defenses-of-fighters-and-bombers/

All news