Back to news

December 11, 2020 | International, Aerospace

Rheinmetall takes over maintenance of German Air Force’s CH-53G transport helicopter at Diepholz Air Base

December 9, 2020 - Rheinmetall has won an order from the German Bundeswehr to inspect, maintain and repair Sikorsky CH-53G transport helicopters. Starting in March 2021, the Düsseldorf-based Group will be operating two maintenance and repair bays belonging to the German Air Force's 64th Helicopter Squadron at Diepholz in Lower Saxony.

Worth a figure in the lower two-digit million-euro range, the contract with Rheinmetall Aviation Services GmbH runs for five years, with an option for a one-year extension.

In Diepholz, the 64th Helicopter Squadron is responsible for larger maintenance operations in a separate remote squadron, with a total of five Bundeswehr-owned maintenance and repair bays for the CH-53G – an aircraft that has been operated in the Bundeswehr since 1972.

An integrated high-tech enterprise dedicated to security and mobility, Rheinmetall's proposal won the tender, so that its subsidiary Rheinmetall Aviation Services GmbH (RAS) will soon be in charge of maintaining and repairing Bundeswehr helicopters in Diepholz. RAS will draw on organizational and aeronautical regulatory support from its sister company Rheinmetall Technical Publications GmbH, an approved aeronautical company located at Bremen Airport.

About Rheinmetall Aviation Services:

Rheinmetall Aviation Services GmbH, which is also based in Bremen, was founded at the beginning of 2019 as part of the Group's strategic cooperation with Sikorsky in the Heavy Transport Helicopter (STH) procurement programme, with responsibility for maintenance, repairs, training and documentation. Rheinmetall and Sikorsky have been cooperating together intensively in various procurement projects since 2009. Thanks to the new order, expertise gained through this partnership will now be profitably put to work on behalf of the Bundeswehr in Diepholz. Looking ahead, the Bundeswehr also stands to benefit in the long term from the partnership between Rheinmetall and Sikorsky in the STH procurement programme, coupled with experience accumulated at Diepholz Air Base.

Rheinmetall AG
Corporate Sector Defence
Press and Information
Oliver Hoffmann
Rheinmetall Platz 1
40476 Düsseldorf
Germany
Phone: +49 211 473-4748
Fax: +49 211 473-4157

View source version on Rheinmetall Group: https://www.rheinmetall.com/en/rheinmetall_ag/press/news/latest_news/index_22144.php

On the same subject

  • DARPA wants an AI system that can basically make sense of everything

    August 24, 2018 | International, C4ISR

    DARPA wants an AI system that can basically make sense of everything

    By: Daniel Cebul Defense Advanced Research Project Agency is looking for an artificial intelligence and machine-learning model that can help scientists and researchers push their work to new limits. The Automating Scientific Knowledge Extraction (ASKE) program, announced Aug. 17, is the first contract opportunity DARPA has released as part of its new AI exploration program. The goal is to establish the feasibility of new AI concepts and do it fast ― within 18 months of award ― to help DARPA outpace global AI science and technology discovery efforts. Specifically, the ASKE opportunity is looking to develop an AI system that can rapidly aggregate scientific data over a number of complex systems (physical, biological, social) and identify new data and information resources automatically. Science depends on equations and complex computations of large data sets. The proposed AI system would be able to interpret and expose scientific knowledge and underlying assumptions in existing computational models to extract useful information, like causal relationships, correlations and parameters. This information would then be integrated into a machine-curated model that generates more robust hypotheses. To ensure the system is working with the full-breadth of scientific information available, DARPA is interested in a system that automatically verifies published scientific results and can monitor “fragile economic, political, social and environmental systems undergoing complex events,” in real-time. For such a system to be viable, DARPA believes advanced AI techniques such as “natural language processing, knowledge-based reasoning, machine learning, and/or human-machine collaboration” are needed. Although rapid and real-time aggregation of data from a variety digital sources may have military applications, for now DARPA maintains its “overriding interest is in innovative approaches to extracting knowledge from scientific models.” The winner will be awarded a contract worth as much as $1 million for a prototype. Proposals are due Sept. 17. https://www.c4isrnet.com/it-networks/2018/08/23/darpa-wants-an-ai-system-that-can-basically-make-sense-of-everything

  • Lockheed: F-35 upgrade delays will lead to fewer  2023 deliveries

    April 18, 2023 | International, Aerospace

    Lockheed: F-35 upgrade delays will lead to fewer 2023 deliveries

    The vendor said putting Technology Refresh 3 into the F-35 has been very difficult, but that the company is now "in the very late innings."

  • The DoD needs data-centric security, and here’s why

    September 30, 2020 | International, C4ISR, Security

    The DoD needs data-centric security, and here’s why

    Drew Schnabel The U.S. Department of Defense is set to adopt an initial zero-trust architecture by the end of the calendar year, transitioning from a network-centric to a data-centric modern security model. Zero trust means an organization does not inherently trust any user. Trust must be continually assessed and granted in a granular fashion. This allows defense agencies to create policies that provide secure access for users connecting from any device, in any location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. How does the Pentagon's AI center plan to give the military a battlefield advantage? The Pentagon's artificial intelligence hub is working on tools to help in joint, all-domain operations as department leaders seek to use data to gain an advantage on the battlefield. Andrew Eversden To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. Initially, the JIE was an innovative concept that took the DoD from a highly fragmented architecture, in which each agency managed its own cybersecurity strategy, to an architecture in which there is a unified SSA. However, one of the early challenges identified for the JIE was managing cloud cybersecurity as part of the SSA. The components in the JIE — the Joint Regional Security Stacks family's internet access points and cloud access points — have traditionally focused on securing the network, rather than the data or user. As more DoD employees and contractors work remotely and data volumes increase, hardware cannot scale to support them. This has created ongoing concerns with performance, reliability, latency and cost. A cloud-first approach In response, the DoD leverages authorized solutions from the Federal Risk and Authorization Management Program, and it references the Secure Cloud Computing Architecture guidance for a standard approach for boundary and application-level security for impact Level 4 and 5 data hosted in commercial cloud environments. The purpose of the SCCA is to provide a barrier of protection between the DoD Information Services Network and the commercial cloud services that the DoD uses while optimizing the cost-performance trade in cybersecurity. Defense agencies are now exploring enterprise-IT-as-a-service options to move to cloud, and reduce the need for constant updates and management of hardware. Through enterprise-IT-as-a-service models, defense agencies will be able to scale easily, reduce management costs and achieve a more competitive edge over their adversaries. Before the pandemic hit, defense agencies were already moving to support a more mobile workforce, where employees can access data from anywhere on any device. However, a cyber-centric military requires security to be more deeply ingrained into employee culture rather than physical protection of the perimeter. The next evolution to secure DISA and DoD networks is to embrace a secure access edge model with zero-trust capabilities. The SASE model moves essential security functions — such as web gateway firewalls, zero-trust capabilities, data loss prevention and secure network connectivity — all to the cloud. Then, federal employees have direct access to the cloud, while security is pushed as close to the user/data/device as possible. SP 800-27, zero-trust guidance from the National Institute of Standards and Technology, provides a road map to migrate and deploy zero trust across the enterprise environment. This guidance outlines the necessary tenants of zero trust, including securing all communication regardless of network location, and granting access on a per-session basis. This creates a least-privilege-access model to ensure the right person, device and service have access to the data they need while protecting high-value assets. As the DoD transforms the JIE architecture to an as-a-service model with zero-trust capabilities, defense agencies will experience cost savings, greater scalability, better performance for the end user and war fighter, improved visibility, and control across DoD networks — and ultimately a stronger and more holistic cybersecurity capability moving forward. https://www.c4isrnet.com/opinion/2020/09/29/the-dod-needs-data-centric-security-and-heres-why/

All news