2 février 2021 | International, Naval, Terrestre

BAE Systems to Sustain Air Traffic Control Systems Under $65.7M Navy Contract

MCLEAN, Virginia – The U.S. Navy selected BAE Systems for a five-year $65.7 million single-award indefinite delivery, indefinite quantity contract for air traffic control (ATC) platform sustainment and engineering services, the company said in a Feb. 1 release.

BAE Systems will continue to use its engineering, technical, and operational expertise to develop, produce, equip, test, evaluate, sustain, and update key expeditionary ATC aviation systems for the Naval Air Warfare Center Aircraft Division's Webster Outlying Field.

“With this win, BAE Systems will provide expeditionary forces with the capability to quickly establish an airfield with the radar and communications systems to safely recover and launch aircraft,” said Lisa Hand, vice president and general manager of BAE Systems' Integrated Defense Solutions business. “We serve as the automation expert and technical coordinator, responsible for development and improvement of real-time ATC computer systems. Our radar technicians deploy around the world to support the warfighter; their work is resulting in quicker turnover to the end user, improved hardware reliability, and more accurate installation and precision in the field.”

This new contract continues BAE Systems' more than a decade of supporting critical work on key systems, including the Standard Terminal Automation Replacement System (STARS); Air Traffic Navigation, Integration, and Coordination System (ATNAVICS); Airfield Mobile Tactical Air Navigation System (AMTAC); and ATNAVICS Data Link System (ADLS). Under the contract, the company will develop and maintain operational software and supporting test beds, field change programs, and supplies for ATC systems. These systems are integral ATC tools that enhance platform flight safety, especially when end users are operating in new or rough terrain airfields with no existing military base.

https://seapowermagazine.org/bae-systems-to-sustain-air-traffic-control-systems-under-65-7m-navy-contract

Sur le même sujet

  • US to offer cyberwar capabilities to NATO allies

    3 octobre 2018 | International, C4ISR

    US to offer cyberwar capabilities to NATO allies

    By LOLITA C. BALDOR BRUSSELS (AP) — Acting to counter Russia's aggressive use of cyberattacks across Europe and around the world, the U.S. is expected to announce that, if asked, it will use its formidable cyberwarfare capabilities on NATO's behalf, according to a senior U.S. official. The announcement is expected in the coming days as U.S. Defense Secretary Jim Mattis attends a meeting of NATO defense ministers on Wednesday and Thursday. Katie Wheelbarger, the principal deputy assistant defense secretary for international security affairs, said the U.S. is committing to use offensive and defensive cyber operations for NATO allies, but America will maintain control over its own personnel and capabilities. The decision comes on the heels of the NATO summit in July, when members agreed to allow the alliance to use cyber capabilities that are provided voluntarily by allies to protect networks and respond to cyberattacks. It reflects growing concerns by the U.S. and its allies over Moscow's use of cyber operations to influence elections in America and elsewhere. “Russia is constantly pushing its cyber and information operations,” said Wheelbarger, adding that this is a way for the U.S. to show its continued commitment to NATO. She told reporters traveling to NATO with Mattis that the move is a signal to other nations that NATO is prepared to counter cyberattacks waged against the alliance or its members. Much like America's nuclear capabilities, the formal declaration of cyber support can help serve as a military deterrent to other nations and adversaries. The U.S. has, for some time, considered cyber as a warfighting domain, much like air, sea, space and ground operations. In recent weeks the Pentagon released a new cybersecurity strategy that maps out a more aggressive use of military cyber capabilities. And it specifically calls out Russia and China for their use of cyberattacks. China, it said, has been “persistently” stealing data from the public and private sector to gain an economic advantage. And it said Russia has use cyber information operations to “influence our population and challenge our diplomatic processes.” U.S. officials have repeatedly accused Moscow of interfering in the 2016 elections, including through online social media. “We will conduct cyberspace operations to collect intelligence and prepare military cyber capabilities to be used in the event of a crisis or conflict,” the new strategy states, adding that the U.S. is prepared to use cyberwarfare along with other military weapons against its enemies when needed, including to counter malicious cyber activities targeting the country. The document adds that the Pentagon will “work to strengthen the capacity” of allies and partners. NATO has moved cautiously on offensive cyber capabilities. At the Warsaw Summit in 2016, allies recognized cyberspace as a warfighting domain. It has said that a computer-based attack on an ally would trigger NATO's commitment to defend its members. And last year the alliance agreed to create a new cyber operations center. But the focus has always been on defending NATO networks and those of its members, not offensive cyberwar. NATO Secretary-General Jens Stoltenberg said on Tuesday that the defense ministers will have a working session this week to address cyber and other risks, and how allies can cooperate to counter such threats. He did not provide details. https://www.apnews.com/292c4d08912c4e3f8ae29973e0ecfbbc/US-to-offer-cyberwar-capabilities-to-NATO-allies

  • GA-ASI Announces FY23 Congressional Funding of Gray Eagle 25M for Army National Guard Units

    27 avril 2023 | International, Aérospatial

    GA-ASI Announces FY23 Congressional Funding of Gray Eagle 25M for Army National Guard Units

    GE-25M is equipped with the new Eagle-Eye?multi-mode radar and electro-optical/infrared sensors, and can host a wide range of additional kinetic and non-kinetic payloads.

  • Pentagon needs access to defense companies’ networks to hunt cyberthreats, says commission

    31 juillet 2020 | International, C4ISR, Sécurité

    Pentagon needs access to defense companies’ networks to hunt cyberthreats, says commission

    Mark Pomerleau WASHINGTON — The Pentagon must be able to hunt cyberthreats on the private networks of defense companies in order to strengthen national cybersecurity, according to one of the leaders of the Cyber Solarium Commission. Rep. Mike Gallagher, R-Wis., who co-chairs the commission, said in testimony before the House Armed Services Subcommittee on Intelligence and Emerging Threats and Capabilities that there must be greater visibility of these networks, in which much sensitive and classified information is kept. “I think one of our biggest findings in the report was that while we are getting a better awareness of our own systems, we still — down to the level of some of our DoD contractors, subcontractors, all the small companies that work with the big defense primes — don't have the level of visibility on the threat picture and the security of their networks that we need,” he said July 30. “I just would argue that we need to figure that piece out because we just can't be in the process of reacting to cyber intrusions after the fact. We have to identify those threats at a quicker timeline at which our adversaries can break out on networks.” The Cyber Solarium Commission is a bipartisan organization created in the 2019 to develop a multipronged U.S. cyber strategy. The commission's report, released in March, recommended Congress require the defense industrial base participate in threat intelligence sharing programs and threat hunting on their networks. “Improving the detection and mitigation of adversary cyber threats to the DIB [defense industrial base] is imperative to ensuring that key military systems and functions are resilient and can be employed during times of crisis and conflict,” the report stated. China has been accused of pilfering reams of data from the networks of defense companies, including plans for the F-35 fighter jet and sensitive data on U.S. Navy programs that, while not classified by themselves, can collectively provide vast strategic insight into Navy plans and operations, officials claim. The commission's report recommended that a threat-hunting program include Department of Defense threat assessment programs on DIB networks; incentives for companies to feed data collected from threat hunting to the DoD and the National Security Agency's cybersecurity directorate; and coordination of DoD efforts with the Department of Homeland Security and the FBI. Congress is calling for the creation of a threat-sharing model in this year's defense authorization bill. The Senate's version includes a provision to direct the defense secretary to establish a threat intelligence program “to share threat intelligence with, and obtain threat intelligence from, the defense industrial base.” https://www.c4isrnet.com/cyber/2020/07/30/pentagon-needs-access-to-defense-companies-networks-to-hunt-cyberthreats-says-commission/

Toutes les nouvelles