Back to news

January 22, 2020 | International, Aerospace, C4ISR

With this upgrade, these aircraft will have anti-jamming comms

By: Nathan Strout

The Air Force awarded Raytheon a $442 million contract Jan. 16 to develop new technology that will allow the B-52 and RC-130 aircraft to utilize the nation's advanced anti-jamming communications satellites.

The contract is part of the Family of Advanced Beyond Line-of-Sight Terminals (FAB-T) program, an effort to replace legacy communication terminals with secure, nuclear-survivable terminals capable of utilizing the nation's most secure communications satellites for protected communications — including Presidential and National Voice Conferencing — and nuclear command and control. In 2015, the Department of Defense divided the FAB-T program into two segments: the Command Post Terminals (CPT) subprogram, which will provide terminals for ground posts and E-4 and E6 aircraft, and the Force Element Terminal (FET) subprogram, which will place new terminals in B-52 and RC-135 aircraft.

The $442,265,464 cost-plus-incentive-fee undefinitized contract will provide for the latter, with Raytheon designing, developing, testing, integrating and providing logistical support for force element terminals for the two aircraft.

Once in place, the terminals will allow airmen within those aircraft to utilize a trio of highly advanced satellites: the Advanced Extremely High Frequency satellites, the Enhanced Polar System satellites, and the legacy Milstar satellites. The FAB-T terminals will also allow command and control of those three constellations.

According to the Government Accountability Office, the force element terminals are essential to the FAB-T program — without them, the program “cannot achieve its planned capabilities that are based on the interaction of bomber aircraft with intelligence, surveillance, and reconnaissance aircraft and CPTs.” The GAO also reports that due to delays in the FAB-T program, all six AEHF satellites are expected to be on orbit before the system is in place, resulting in an underutilization of costly satellite capabilities.

The same day, The FAB-T contracting office award Raytheon a $36,848,806 cost-plus-fixed-fee contract modification to develop a software encryption platform for the system approved by the National Security Administration. Work is expected to be completed by March 2023.

The Air Force Life Cycle Management Center also issued a Request for Information Jan. 15 seeking industry sources that can support the installation of the FAB-T Command Post Terminals worldwide. According to a May 2019 Government Accountability Office report, the CPT subprogram is expected to reach initial operating capability in June 2021 and full operational capability by March 2023. Raytheon is also the primary contractor for the CPT subprogram. Responses to that RFI are due Jan. 22.

https://www.c4isrnet.com/battlefield-tech/c2-comms/2020/01/21/with-this-upgrade-these-aircraft-will-have-anti-jamming-comms/

On the same subject

  • Italy reveals plans for converting Gulfstream jets

    April 10, 2023 | International, Aerospace

    Italy reveals plans for converting Gulfstream jets

    The aircraft have spent the last year flying missions close to Ukraine to monitor the airspace.

  • The US Navy’s ‘Manhattan Project’ has its leader

    October 16, 2020 | International, Aerospace, Naval, Land, C4ISR

    The US Navy’s ‘Manhattan Project’ has its leader

    David B. Larter WASHINGTON – The US Navy's top officer has tasked a former surface warfare officer turned engineering duty officer to create a powerful, all-connecting network service leaders believe they will need to fight and win against a high-end foe such as China. Chief of Naval Operations Adm. Michael Gilday tasked Rear Adm. Douglas Small to lead an effort that will “develop networks, infrastructure, data architecture, tools, and analytics that support the operational and developmental environment that will enable our sustained maritime dominance.” Calling the effort “Project Overmatch,” Gilday called it the Navy's top priority after the Columbia-class ballistic missile submarine. “Beyond recapitalizing our undersea deterrent, there is no higher developmental priority in the U.S. Navy,” Gilday said. “All other efforts are supporting you. Your goal is to enable a Navy that swarms the sea, delivering synchronized lethal and non-lethal effects from near-and-far, every axis, and every domain.” In the past, Gilday has referred to the effort to field a powerful network as its “Manhattan Project,” harkening back to the rapid development of the atomic bomb in the 1940s. The urgency behind the effort to create this network highlights the growing sense of unease the Navy has around its position in the world as China builds towards its goal of achieving first-rate military power status by 2049. “The Navy's ability to establish and sustain sea control in the future is at risk," Gilday said in his letter. “I am confident that closing this risk is dependent on enhancing Distributed Maritime Operations through a teamed manned/unmanned force that exploits artificial intelligence and machine learning. I am not confident we are building the Naval Operational Architecture connecting and enabling this future force as quickly as we must.” The network is to connect with the Air Force's Joint All-Domain Command and Control effort, which the services are all lining up behind. Breaking Defense first reported the memo. Small started his career as a surface warfare officer but became an engineering duty officer in 1997. He has a background in electronic warfare and above-water sensors, as well as work at the Missile Defense Agency. In the Oct. 1 memo, Gilday has tasked him to report after 60 days, then every 90 days after that. In a separate memo to Vice Adm. James Kilby, the Navy's top warfighting requirements officer, Gilday said he wanted the Navy to develop both a concept of operations and a coherent kill chain based on an “any-sensor, any-shooter,” construct, an idea that would mean that any track obtained by any sensor can be passed to any ship or platform with a missile with which to kill it, something that would be enabled by Small's network. ‘We don't have and adequate net' In comments last year, Gilday said the Navy needed to move out with urgency to create a powerful network. “The biggest challenge for us is to join all the main command and control,” Gilday said. “We're building netted weapons, netted platforms, and netted [command-and-control] nodes, but we don't have an adequate net, and that's a critical piece.” The Navy has been working toward a concept of operations that links its ships, aircraft and unmanned platforms by way of communications relay nodes — such as small drones — or whole ships — such as the future frigate or high-tech aircraft like the E-2D Hawkeye. The idea is to spread the force out over a wide area, as opposed to clustered around a carrier, to put a maximum burden on Chinese intelligence and reconnaissance assets. This spread-out, networked force would connect the various shooters so that if any individual node in the network sees something to kill, any Navy or Air Force asset with weapons within range can kill it. This has led to a push for ever-longer-range missiles. But to make it work, all the pieces must be linked on a reliable communications network. The current architecture, according to the Navy, is insufficient for the job, given Chinese and Russian investments in electronic warfare that can interfere with communications. https://www.c4isrnet.com/naval/2020/10/14/the-us-navys-manhattan-project-has-its-leader/

  • Does DoD know how to supply intel for cyber ops?

    July 3, 2018 | International, C4ISR

    Does DoD know how to supply intel for cyber ops?

    By: Mark Pomerleau Cyber has been an official domain of warfare for nearly a decade, yet the Department of Defense is still learning how to integrate it with operations. And some members of Congress are concerned the traditional military intelligence organs to this day don't understand intel support to cyber ops. The House Armed Services Committee is directing that a briefing on the subject must take place by December 1, 2018. The briefing — delivered by the under secretary of defense for intelligence, in coordination with the Defense Intelligence Agency and the military services — is expected, according to a provision in the committee's annual defense policy bill, to address multiple issues, including: Efforts to standardize a common military doctrine for intelligence preparation of the battlefield for cyber operations; Efforts to develop all-source intelligence analysts with the capability to support cyber operations; and Efforts to resource intelligence analysis support elements at U.S. Cyber Command and the service cyber components. “The committee is concerned about the Defense Intelligence Enterprise's ability to provide the cyber community with all-source intelligence support, consistent with the support provided to operations in other domains,” the provision, called an “item of special interest,” says. In some cases, other intelligence disciplines, such as human intelligence or signals intelligence, might be needed to help enable a cyber operation. A committee aide noted that the goal is to get DoD to think about cyber operations just as operations in any domain and build the infrastructure to support that. According to Gus Hunt, Accenture Federal Services cyber strategy lead, cyber as a domain is really no different than the others from an intelligence support perspective. The objective of intelligence, he told Fifth Domain in a recent interview, is to ensure it provides timely information about the adversary, who they are, the status of their capabilities and any information about the threats that are there. “I think what you're seeing ... is that people are asking the question are we appropriately structured or resourced and focused to be as effective as we possibly can in this new realm of cyber and cyber operations,” Hunt, who previously served as the chief technology officer at the CIA, said. “Because they're asking the question, I think the obvious answer is ... we're not structured as effectively as we possibly can be ... [but] it's really good that people are sitting there asking.” The Army is experiencing similar problems, especially when it comes to experimenting with force structure changes and bringing cyber effects to the tactical edge, which currently don't exist. “We're not seeing a corresponding growth in the intel organizational structure with the cyber and” electronic warfare, Lt. Col. Chris Walls, deputy division chief for strategy and policy in the cyber directorate of the Department of the Army G-3/5/7, said at the C4ISRNET conference in May. “The existing intel force structure is really going to be stressed when we put this EW and cyber capability into the field unless they have a corresponding growth and capability as well,” Walls said of tactical cyber effects and teams. https://www.fifthdomain.com/congress/2018/07/02/does-dod-know-how-to-supply-intel-for-cyber-ops/

All news