Back to news

October 12, 2018 | International, Aerospace

To up fighter readiness levels, Pentagon looks to retire older planes and fix supply chains

By:

WASHINGTON — With Secretary of Defense Jim Mattis issuing new guidancedemanding readiness for tactical air assets increase in just one year, the Pentagon is openly acknowledging that older planes will have to be retired and cannibalized for parts to make it happen.

The department will also look to overhaul how it handles its supply chain, according to the department's No. 2 official.

In a September memo, first reported by Defense News, Mattis ordered the Air Force, Navy and Marines to get the Pentagon's fleets of F-16, F-18, F-22 and F-35 fighters to a minimum of 80 percent mission ready. That would represent a major jump in readiness over a short period of time, raising skepticism amongst analysts.

From a pure numbers-on-paper standpoint, the easiest way for getting readiness rates up on the fleet would involve retiring older, less ready aircraft — essentially increasing the percentage of good-to-go planes by reducing the overall size of the fleets.

Such a move may not be popular on the Hill, which routinely complains about the size of the military compared with previous eras. But it's a logical step being endorsed by both Deputy Secretary of Defense Patrick Shanahan and Gen. Robert Neller, the Marine Corps chief of staff.

“You gotta get rid of airplanes. At some point, you gotta get rid of the old ones,” Neller told reporters Wednesday at a Defense Writer's Group event, when asked how he would hit that 80 percent mark.

Neller added that such a move has to be part of a broader spectrum of moves, including better quality parts from vendors, being more efficient with maintainers, and adjusting the flying hours for pilots to make sure the wings aren't being worn off on jets.

“It's not going to be a single thing, so we've got to do our part,” he added.

Speaking to reporters at the AUSA conference the same day, Shanahan seemed to zero in on the oldest Navy jets as ones that could be retired.

“Well, when you look at the size of the fleet of the F-18s, you got [F-18A models] out there, then you look at what it would take to restore them to a certain level of readiness, you might say it's much easier just to retire those,” he said. “So, I mean, there's a mix of answers.”

“It probably doesn't make sense to generate a lot of activity to make something that is older more reliable, but when you think about the joint strike fighter and the hundreds of those that we're going to take, 80 percent should be the minimum, OK? It shouldn't be some aspirational goal, it should be the minimum.”

However, he pushed back at the idea that anyone will “game the system” to get those readiness percentages up.

Commercial practices

In the memo, Mattis specifically notes the commercial aviation industry is able to maintain higher readiness rates and directs the service to look that way for inspiration.

“I am confident in our department's ability to generate additional capacity from our current aircraft inventory, alongside the commercial aviation industry's sustainment of high availability rates,” Mattis wrote. “As we seek to achieve our goals, we can learn from industry's benchmarks for measuring speed, cost and mission capability, as well as its best practices for implementing a sustainable, Department-wide system.”

Shanahan, who will be the overall leader of the readiness rate improvement efforts, is a longtime Boeing executive who worked directly on a number of commercial jet production programs. And to him, there are absolutely lessons that can be drawn from passenger aviation.

“A jet engine is a jet engine; no one will convince me otherwise,” he said. “I've lived in both worlds, I've been on more airplanes than anybody in the United States, I know these things, OK?”

The deputy said his focus was on helping the service develop “methods, systems and practices” that will lead to systemic changes in how maintenance is done and provide dividends for years to come.

“When you look at the F-18s, this is the same size of fleet as Southwest has. It's not a super-large fleet, they're all basically the same,” Shanahan noted. “So how do we put in place, you know, the support practices and the parts so that people aren't working as hard?”

The need to keep part quality and quantity up were on display just a day after Shanahan and Neller's comments. On Thursday, the Pentagon ordered a temporary stop to flying the F-35 as it investigated a fuel tube inside the engines of the fleet. That same day, an F-22 crashed on its side following a landing gear malfunction.

During his talk with reporters, the Navy was singled out as already having committed to improving their methodologies. And he called out the need to “restructure” how both the Navy and Air Force handle their supply chains — something he said will ultimately bleed over into maintenance beyond the four selected jet fleets.

“The real end game to me is as a department, how do we end up with a single sustainment system? And what was good about this is that once you get the F-18 right, it spills over into the P-8, because they're side-by-side, so [the P-8 maintainers] going to be like, ‘Those guys, they're working a lot less hard than we are and they're getting much better results, why don't we just do it that way?'

“And then as people see the methods they apply to shipbuilding or ship maintenance,” he added.

Shawn Snow of Marine Corps Times contributed to this report.

https://www.defensenews.com/air/2018/10/11/to-up-fighter-readiness-levels-pentagon-looks-to-retire-older-planes-and-fix-supply-chains

On the same subject

  • Raytheon UK wins contract in $1.3B Royal Navy modernization plan

    January 14, 2021 | International, Naval

    Raytheon UK wins contract in $1.3B Royal Navy modernization plan

    By Ed Adamczyk Jan. 13 (UPI) -- Raytheon UK won a $200 million contract to improve the Royal Navy's training, it announced on Wednesday, part of a $1.3 billion transformation of the nation's navy. The British subsidiary of the U.S. company will "provide the Royal Navy with transformative technology, training and learning solutions over the next 12 years," a Raytheon statement said. Led by the London-based outsourcing and professional services company Capita LLC, a consortium of companies will transform and modernize the Royal Navy's shore-based training at 16 sites across Britain. The contract with Capita was announced in December. Raytheon, Elbit Systems UK and Fujitsu are also among the suppliers, according to British officials. Raytheon UK will "play a key role in modernizing and transforming the Royal Navy's training analysis, design, delivery, assurance, and management/support services, helping to make the UK Armed Forces more agile and adaptable than ever to tackle future challenges," the company said in a press release. Modernization of the British military has been a key element in recent national policy. Defense Minister Ben Wallace noted on Monday that an "integrated review that we will publish in 2021 will make the most of new technologies, improve integration across the domains and demonstrate that we remain the international partner of choice." An example is Britain's Queen Elizabeth-class aircraft carriers, the first of which was commissioned in 2017 and capable of carrying helicopters and F-35 fighter planes. The HMS Queen Elizabeth is currently undergoing testing in advance of its first deployment with a carrier strike group of destroyers, cruisers and other vessels. https://www.upi.com/Defense-News/2021/01/13/Raytheon-UK-wins-contract-in-13B-Royal-Navy-modernization-plan/1181610560382/

  • Boeing’s cost overruns on KC-46 now exceed initial contract with US Air Force

    January 28, 2021 | International, Aerospace

    Boeing’s cost overruns on KC-46 now exceed initial contract with US Air Force

    By: Valerie Insinna Edited on 1/27/21 at 1:44 p.m. to provide more details on the cost overrun. WASHINGTON — With the Jan. 27 announcement of a new $275 million charge on the KC-46, Boeing has now paid as much in cost overruns for the troubled program as the U.S. Air Force invested in the tanker's development. The new charge, which the company reported as part of fourth-quarter 2020 earnings, means Boeing has now paid more than $5.0 billion out of pocket to pay for the myriad technical problems and production issues that have cropped up since the company won the program in 2011. Under the firm, fixed-price contract signed then, Boeing is responsible for paying for any costs in excess of the contract's $4.9 billion ceiling. The latest KC-46 overrun occurred “primarily due to production inefficiencies including impacts of COVID-19 disruption,” the company said. Steve Trimble of Aviation Week put together a list of KC-46 charges by year, finding that the program documented its largest overrun in 2020 despite seeing charges decrease to only $148 million in 2019. The company previously attributed $494 million in charges to the ongoing pandemic during the first, second and third quarters of 2020. The KC-46 is a commercial-derivative plane based on the Boeing 767 airliner. Because it is manufactured on the 767 production line in Everett, Washington, before undergoing military-specific upgrades, any slowdown in commercial plane volume also makes it more expensive to produce the KC-46. Boeing President and CEO Dave Calhoun said in October he believed the KC-46 had moved past the technical problems that plagued the program over the past few years, and the tanker would prove to be an asset for the company after the pandemic had run its course. “The tanker has been a drag on us for three or four years in every way you can think of with respect to investors,” he said at the time. “But we are continuing to clear the hurdle with our customers with respect to its performance in their fleet and their need for that tanker. “That whole relationship, I believe, will begin to transition next year, and opposed to being a drag on our franchise — which it's been — I believe it will become a strength in our franchise.” In an message to Boeing employees on Wednesday, Calhoun pointed to some key wins in the defense and space sector, including the first flight of the MQ-25 tanker drone with an aerial refueling store, and the demonstration of the F/A-18 Super Hornet's ski jump launch capability for the Indian Navy. Over the past month, Boeing has inked contracts with the U.S. Air Force for the sixth and seventh lots of KC-46 production, raking in $3.8 billion for an additional 27 tankers. However, during the earnings call, Calhoun noted that analysts should not count on Boeing's defense business to generate a massive amount of near-term growth in the wake of the pandemic. “We continue to believe that we're going to have stable growth, admittedly at the lower end of the single digits. That's the best guidance that we can talk about because we do believe there is pressure that will ultimately come down as a result of all of the COVID spending here in the United States,” he said. “But a large part of our business now is international market, and the order activity in those international markets is pushed to the right somewhat — and almost entirely because of COVID-related stuff,” he said. “We still like our position because we have a lot of ongoing programs that the military and of course our defense [spending] bills have been kind to.” The Air Force plans to buy 179 KC-46 aircraft over the program of record. The first KC-46 was delivered to the service in 2019. https://www.defensenews.com/industry/2021/01/27/boeings-cost-overruns-on-kc-46-now-exceed-its-initial-contract-with-the-air-force

  • The DoD needs data-centric security, and here’s why

    September 30, 2020 | International, C4ISR, Security

    The DoD needs data-centric security, and here’s why

    Drew Schnabel The U.S. Department of Defense is set to adopt an initial zero-trust architecture by the end of the calendar year, transitioning from a network-centric to a data-centric modern security model. Zero trust means an organization does not inherently trust any user. Trust must be continually assessed and granted in a granular fashion. This allows defense agencies to create policies that provide secure access for users connecting from any device, in any location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. How does the Pentagon's AI center plan to give the military a battlefield advantage? The Pentagon's artificial intelligence hub is working on tools to help in joint, all-domain operations as department leaders seek to use data to gain an advantage on the battlefield. Andrew Eversden To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. “This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July. To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats. Evolving DoD information security The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures. Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location. Initially, the JIE was an innovative concept that took the DoD from a highly fragmented architecture, in which each agency managed its own cybersecurity strategy, to an architecture in which there is a unified SSA. However, one of the early challenges identified for the JIE was managing cloud cybersecurity as part of the SSA. The components in the JIE — the Joint Regional Security Stacks family's internet access points and cloud access points — have traditionally focused on securing the network, rather than the data or user. As more DoD employees and contractors work remotely and data volumes increase, hardware cannot scale to support them. This has created ongoing concerns with performance, reliability, latency and cost. A cloud-first approach In response, the DoD leverages authorized solutions from the Federal Risk and Authorization Management Program, and it references the Secure Cloud Computing Architecture guidance for a standard approach for boundary and application-level security for impact Level 4 and 5 data hosted in commercial cloud environments. The purpose of the SCCA is to provide a barrier of protection between the DoD Information Services Network and the commercial cloud services that the DoD uses while optimizing the cost-performance trade in cybersecurity. Defense agencies are now exploring enterprise-IT-as-a-service options to move to cloud, and reduce the need for constant updates and management of hardware. Through enterprise-IT-as-a-service models, defense agencies will be able to scale easily, reduce management costs and achieve a more competitive edge over their adversaries. Before the pandemic hit, defense agencies were already moving to support a more mobile workforce, where employees can access data from anywhere on any device. However, a cyber-centric military requires security to be more deeply ingrained into employee culture rather than physical protection of the perimeter. The next evolution to secure DISA and DoD networks is to embrace a secure access edge model with zero-trust capabilities. The SASE model moves essential security functions — such as web gateway firewalls, zero-trust capabilities, data loss prevention and secure network connectivity — all to the cloud. Then, federal employees have direct access to the cloud, while security is pushed as close to the user/data/device as possible. SP 800-27, zero-trust guidance from the National Institute of Standards and Technology, provides a road map to migrate and deploy zero trust across the enterprise environment. This guidance outlines the necessary tenants of zero trust, including securing all communication regardless of network location, and granting access on a per-session basis. This creates a least-privilege-access model to ensure the right person, device and service have access to the data they need while protecting high-value assets. As the DoD transforms the JIE architecture to an as-a-service model with zero-trust capabilities, defense agencies will experience cost savings, greater scalability, better performance for the end user and war fighter, improved visibility, and control across DoD networks — and ultimately a stronger and more holistic cybersecurity capability moving forward. https://www.c4isrnet.com/opinion/2020/09/29/the-dod-needs-data-centric-security-and-heres-why/

All news