August 22, 2024 | International, C4ISR
Army not sold on new approach to radio acquisition
The effort would be a departure from the service’s traditional approach to buying and sustaining radios.
March 25, 2021 | International, Aerospace, Naval, Land, C4ISR, Security
The initial public offering on the stock exchange was meant to help drive down Leonardo’s billions of dollars in debt.
August 22, 2024 | International, C4ISR
The effort would be a departure from the service’s traditional approach to buying and sustaining radios.
December 9, 2020 | International, Naval
By: David B. Larter WASHINGTON – The name of the game in the Pacific is stand-off range. But with longer range torpedoes and anti-ship missiles in the arsenal, submariners are looking to a new domain to help them extend their deadly reach: The air. In an October request for information, Naval Sea Systems Command's Submarine Combat and Weapons Control Program Office asked industry for input into a “Submarine-Launched Unmanned Aerial System,” or SLUAS, currently in development. The Navy has been interested in sub-launched drones for some time and has been testing prototypes, but the RFI shows the service is getting serious about the idea as it adds longer-range torpedoes and anti-ship cruise missiles to the arsenal of its attack submarines. The idea for the SLUAS is an ambitious one. The drone would launch from a submerged submarine out of a 3-inch ejector tube used for sonobuoys, flares and countermeasures among other things. The battery-operated UAS would then deploy its wings and operate for an hour, well beyond the range visible from just the low-in-the-water periscope. Additionally, the UAS should have an “electro-optic capability with reliable target solution analysis,” the RFI said, adding that it should be able to “operate at ranges out to the line-of-sight radio horizon, and use a variable bandwidth encrypted datalink with at least 256-bit encryption strength. The drone should also have a degree of autonomy and “include the ability to operate in an emission-controlled environment and operate without constant radio communication links.” “Every submarine has a 3-inch launcher, so in theory, every submarine could operate with UASs,” said Bryan Clark, a retired submarine officer and senior fellow with The Hudson Institute. “The idea is that you would be about the size of a sonobuoy — it could be pretty long — and you'd put it inside a canister. Then you launch this in a canister, it floats to the surface and the USA deploys from there. “And from there it can either connect up with the submarine or it could connect with another unit, and it gives you the ability to have over-the-horizon surveillance.” “The demonstrations have been pretty successful,” Clark added. The responses to the RFI were due in November. https://www.defensenews.com/naval/2020/12/07/the-us-navy-wants-to-find-ships-to-kill-using-aerial-drones-launched-from-submarines/
December 19, 2018 | International, C4ISR
By: Justin Lynch The Pentagon has received more power to conduct cyber operations in the past 18 months. But for the top Army commander in the Middle East and Central Asia, the new authority is not enough. The head of U.S. Central Command, Gen. Joseph Votel, wrote in a Dec. 18 paper that the Pentagon must “normalize” electronic warfare and cyberattacks and incorporate them into daily operations. “Normalizing the cyberspace domain means broader authorities that are more responsive than current bureaucratic processes,” Votel wrote in the Army's Cyber Defense Review. “It also means we need simple and streamlined organizations and processes to increase lethality and enhance performance.” The paper was coauthored by Votel, Maj. Gen. Julazadeh and Maj. Weilun Lin. “Our failure to operationalize and normalize the cyberspace domain effectively cedes it to our adversaries, gives them a competitive advantage and, ultimately, creates an increased attack vector against our objectives,” the authors said. President Trump gave the Pentagon new authorities to conduct cyber operations in August and minimized the process where other agencies can object to cyberattacks, known as “deconfliction.” Secretary of Defense Jim Mattis can conduct hacking operations without approval from the White House so long as they do not interfere with the American “national interest,” according to four current and former White House and intelligence officials who were either part of internal deliberations or briefed on the changes. Yet some current and former U.S. officials are skeptical that the new authorities will mean more effective hacking operations for the Pentagon, because it does not solve the nuances of cyberattacks. But the new mandates do not go far enough for the three officer authors, who argued that cyberwarfare should be under the same authorities as other types of operations. “We must not see cyberspace as drastically different and separate from other domains that we create new processes to prepare, plan and fight in this new domain. We continue to seek processes that smooth and simplify operations, reducing friendly friction and accelerating decision-making.” Current and former Pentagon officials have pointed to conducting cyberattacks against enemies that use networks of neutral or partner nations as an area where the Pentagon has changed its decision-making process in recent years. Those officials also pointed to how the Pentagon was able to use hybrid warfare tactics during the 2016 liberation of Mosul, Iraq, as a textbook example of future hybrid operations. Votel, Julazadeh and Lin echoed the sentiment of other Pentagon officials who have advocated for cyberattacks, electronic warfare and other information operations to be integrated earlier in military operations. “We need to proactively execute cyberspace and information operations early in 'Phase 0 / steady state' of the planning process — well before operation execution. Only then can we shape the [information environment], hold our adversaries' capabilities at risk and execute at the speed of war,” the three wrote. For example, Pentagon officials say they closely monitored Russia's 2014 hybrid war in Ukraine and learned from Moscow's tactics. Votel, Julazadeh and Lin shed light on the changes, writing that information operations were previously “integrated as an afterthought.” Yet over the last two years, Central Command has incorporated cyberattacks, electronic warfare and military deception at the “strategic level.” And this hybrid warfare has driven new acquisition demands in the Pentagon. “We need technology and capabilities to keep pace with the operational environment and continue to build the partnerships to do so,” the three officers wrote. In recent years, Central Command has bolstered its hybrid warfare through new contracts. The centerpiece of that effort is a July 2017 contract worth $621 million to Science Applications International Corporation for IT support to Central Command that could last seven years. In August 2018, Vistra communications was also awarded a $22 million contract to support offensive and defensive cyber operations for Central Command. https://www.fifthdomain.com/dod/2018/12/18/centcom-chief-the-future-of-warfare-demands-more-cyber-authorities