Back to news

May 13, 2020 | International, Aerospace

Delays Cause Two-Year, $1.5B Extension For F-35 Block 4

Steve Trimble

The U.S. Government Accountability Office (GAO) said on May 12 that the Lockheed Martin F-35 Block 4 program must be extended two years due to development delays, adding $1.5 billion to the overall price tag.

The original schedule called for completing the Block 4 modernization program in 2024, but the timeline must be extended to 2026, GAO said in the watchdog agency's annual review of the F-35 program.

The F-35 Joint Program Office initially estimated the cost to develop all 66 new capabilities in Block 4 would be $10.6 billion. The two-year extension to deliver Block 4 raises the development cost to $12.1 billion, with another $3.4 billion budgeted to procure and insert the capabilities in future U.S. F-35s, GAO said.

The Block 4 delays started in 2019. Lockheed planned to deliver the first eight Block 4 capabilities last year, but only one—the automatic ground collision avoidance system—entered service, GAO said. In another example, Lockheed delivered software last year to enable the interim full-motion video capability for the Marine Corps F-35Bs, but failed to deliver the associated hardware, the report said.

As Block 4 capabilities have entered testing, the Defense Department's operational testers have noticed other problems. Some of the new capabilities have “caused issues” with existing F-35 functions that previously worked, GAO said.

“The contractor had not performed adequate testing of the software before delivering it to the test fleet,” GAO said. For its part, the contractor acknowledged the issues and said they would conduct additional testing in software laboratories before releasing future software blocks, GAO added.

https://aviationweek.com/aerospace/aircraft-propulsion/delays-cause-two-year-15b-extension-f-35-block-4

On the same subject

  • Navy certifying virtualized Aegis Combat System on its first destroyer

    December 21, 2023 | International, Naval

    Navy certifying virtualized Aegis Combat System on its first destroyer

    The Navy is certifying its virtualized Aegis Combat System on destroyer Winston Churchill for the first time after months of hardware and software testing.

  • DARPA Wants to Find Botnets Before They Attack

    September 12, 2018 | International, C4ISR

    DARPA Wants to Find Botnets Before They Attack

    By Jack Corrigan The defense agency awarded a contract to develop a tool that scours the internet for dormant online armies. The military's research branch is investing in systems that automatically locate and dismantle botnets before hackers use them to cripple websites, companies or even entire countries. The Defense Advanced Research Projects Agency on Aug. 30 awarded a $1.2 million contract to cybersecurity firm Packet Forensics to develop novel ways to locate and identify these hidden online armies. The award comes as part of the agency's Harnessing Autonomy for Countering Cyber-adversary Systems program, a DARPA spokesperson told Nextgov. To build botnets, hackers infect internet-connected devices with malware that allows them to execute orders from a remote server. Because the virus sits dormant most of the time, the owners of infected devices rarely know their computer, smartphone or toaster has been compromised. Through the HACCS program, DARPA aims to build a system that can automatically pinpoint botnet-infected devices and disable their malware without their owners ever knowing. Launched in 2017, the program is investing in three main technologies: systems that uncover and fingerprint botnets across the internet, tools that upload software to infected devices through known security gaps, and software that disables botnet malware once it's uploaded. Packet Forensics' technology falls under that first category, the DARPA spokesperson said. Eventually DARPA plans to integrate each of those technologies into a single system that can spot, raid and neutralize botnet-infected devices without any human involvement. Because the tool would only target botnet malware, people could continue using the devices just as they had before, the agency said in the program announcement. During phase one of the three-part project, Packet Forensics will build a technology capable of scanning some five percent of global IP addresses and detecting botnets with 80 percent accuracy. By the end of the program, DARPA anticipates the system to analyze 80 percent of the global internet and correctly spot botnets 95 percent of the time. The effort is scheduled to last to four years, with the first phase running 16 months. Later phases include additional funding. https://www.nextgov.com/cybersecurity/2018/09/darpa-wants-find-botnets-they-attack/151182/

  • 10 Critical Endpoint Security Tips You Should Know

    May 1, 2024 | International, Security

    10 Critical Endpoint Security Tips You Should Know

    Unlock Endpoint Security with our top 10 must-know tips! From MFA to EDR, discover how to protect your digital kingdom.

All news