13 novembre 2020 | International, Naval

BAE Systems wins $30M in naval IT contracts

WASHINGTON — BAE Systems was awarded two task order contracts to provide and integrate an information warfare platform aboard five U.S. Navy vessels, the company announced Nov. 11.

Under the two task orders, worth more than $30 million, BAE will integrate the platforms into the Navy's Consolidated Afloat Network Enterprise Services — the Navy's tactical afloat network.

"These two task orders permit us to continue our high-quality, high volume production and integration service, assembling and delivering CANES to the Navy safely and affordably,” Mark Keeler, vice president and general manager of BAE Systems' Integrated Defense Solutions business, said in a statement. “CANES takes advantage of commercial-off-the-shelf insertion, which brings operational agility to the warfighter and savings to the U.S. Navy.”

Under the first task order, BAE will produce two fully integrated CANES racks for two Blue Ridge-class command ships, according to the release. That work is expected to be completed by February 2022.

The company will provide the same services for two Arleigh Burke-class destroyers and a Virginia-class submarine under the second task order, expected to be completed by March 2022.

Work will be performed at the BAE Systems facility in Summerville, South Carolina. Naval Information Warfare Systems Command in San Diego, California, awarded the contracts.

BAE Systems also announced earlier this week that it won a five-year, $94 million indefinite delivery, indefinite quantity contract to deliver engineering, test and evaluation support for sensors, in addition to communication, control, and weapons systems for manned and unmanned air platforms. The contract was awarded by the Naval Air Warfare Center Aircraft Division.

"We are bringing new advanced technologies such as artificial intelligence and autonomy to the Airborne Systems Integration Division,” Keeler said in a news release. “Our state-of-the-art digital engineering capabilities, and extensive experience in integrating airborne systems are further strengthening the warfighter's ability to meet mission requirements and ensuring combat readiness in the field.”

https://www.c4isrnet.com/battlefield-tech/it-networks/2020/11/12/bae-systems-wins-several-naval-it-contracts/

Sur le même sujet

  • Babcock secures MOD gun system automation contract

    9 octobre 2019 | International, Naval

    Babcock secures MOD gun system automation contract

    October 7, 2019 - Babcock International has secured a three year contract, with two year optional extension, for the Gun System Automation (GSA) 9 in-service support contract with the Ministry of Defence supporting the Royal Navy. Operating jointly from our South West facilities at Devonport and Portsmouth – specialising in warship support – this contract will provide support for all aspects of GSA9 support including Electro Optical Gunfire Control System (EOGCS), the Electro Optical Sensor Platforms (EOSPs), the Quick Pointing Devices (QPD) and below decks equipment of six Control Consoles, Gun Allocation Subsystem, Gunnery Check Fire System and two Maintenance and Analysis Facilities (MAF). Through GSA9, Babcock will deliver critical services to the Royal Navy's T45 Destroyers and manage a portfolio of sub-contractors and suppliers. Richard Drake, Managing Director Babcock DST, said: “Babcock is uniquely positioned to support the defence industry through our proven weapons expertise. By combining our comprehensive technical knowhow and joining multiple equipment's together, we are well placed to deliver a superior capability for the Royal Navy.” Babcock's end-to-end solution, backed by more than a century of maritime heritage, is trusted to deliver in support of naval gunnery programmes. View source version on Babcock: https://www.babcockinternational.com/news/babcock-secures-mod-gun-system-automation-contract/

  • Airbus reveals classified LOUT stealth testbed

    7 novembre 2019 | International, Aérospatial

    Airbus reveals classified LOUT stealth testbed

    Airbus Defence & Space has revealed a more than decade-long research and demonstration effort into very low observable (LO) technologies, conducted as a classified effort for the German defence ministry. Showing its LO UAV testbed – or LOUT – platform at Manching on 4 November, Airbus future combat air system (FCAS) programme manager Mario Hertzog said the company began initial concept work in 2007. This led to a contract award in 2010 to refine configuration and material choices, and the production of a diamond planform demonstrator was completed in 2014. Pointing to the company's long involvement with LO reseach, Hertzog says: “Bringing all our experience into one programme was a logical conclusion.” The chosen configuration used for aerodynamic and anechoic chamber testing since 2014 has a roughly 12m (39.3ft) wingspan and similar length, and is described as a 4t-class vehicle. The subsonic design would use a conventional engine concealed behind a diverterless inlet, and has twin intakes blended into its upper fuselage. A cockpit transparency and sensor apertures also formed part of the testing. The aircraft's exhaust nozzle also is shielded from beneath, with Hertzog noting that such a vehicle would be optimised for use against ground-based air-defence systems. This mission requirement also led the company to hone LO techniques for the vehicle's landing gear doors and centerline internal weapons bay, Hertzog notes. Focus areas have included testing LO materials, including a radar absorbent structure for engine intake ducts, and on assessing radar frequency and infrared signature performance. Modelling work has also been conducted to analyse the likely acoustic characteristics of such a design. Airbus confirms that it has completed contracted work on LOUT, but says additional activities could be conducted. However, Hertzog declines to say whether Berlin could seek a flight-test campaign with such a system. Lessons learned from the LOUT programme will be available for potential adaptation during a long-term evolution activity on the Eurofighter Typhoon, and on a proposed French-German-Spanish FCAS development, Hertzog says. "Stealth is and will remain an enabler for survivability," he notes. https://www.flightglobal.com/news/articles/pictures-airbus-reveals-classified-lout-stealth-tes-462003/

  • This training tool could be the answer to stop mass cyberattacks

    9 juillet 2020 | International, C4ISR, Sécurité

    This training tool could be the answer to stop mass cyberattacks

    Mark Pomerleau At air bases across Europe, networks are under attack. Malicious hackers have gained access to sensitive systems, information, controls and critical infrastructure. But cyber operators from U.S. Cyber Command, in concert with Five Eyes partners, have been called in to thwart these attempts in real time. This was the main scenario for this year's capstone cyber training exercise put on by Cyber Command, Cyber Flag 20-2. The exercise, which took place June 15-26 and was exclusively defensive in nature, saw more than 500 participants and 17 teams participating from five countries across nine time zones, and it included America's National Guard, the U.S. Energy Department and the Five Eyes alliance — Australia, Britain, Canada, New Zealand and the U.S. Australia, however, did not participate during this iteration. Officials told reporters this week that the purpose of Cyber Flag 20-2 was to continue building the community of defensive cyber operations and to improve the overall capability of the Five Eyes countries to defend against cyber aggressors. The drill involved teams defending IT and operational security networks against a live, opposing force trying to disrupt, deny and degrade the air bases' operations. The networks under attack were industrial control systems simulated to generate network traffic for an aviation fuel farm, power grid, air traffic control radars and electronic access control systems. The attacks came in the form of malware that targeted devices responsible for fuel and power. But the unique aspect of this year's exercise, as C4ISRNET previously reported, was the use of a new remote cyber training tool called the Persistent Cyber Training Environment. PCTE is an online client that allows Cyber Command's cyber warriors, as well as partner nations, to log on from anywhere in the world to conduct individual or collective cyber training as well as mission rehearsal, which to date had not existed for the cyber force as it does for physical troops. The program is run by the Army on behalf of the joint cyber force. The platform not only allowed the exercise to continue as planned amid the coronavirus pandemic, but it enabled collaboration and simultaneous training across the world. A new way to train Officials say PCTE is providing Cyber Command with an entirely new way to train cyber forces, which previously was difficult given a lack of infrastructure and the time needed to set up ranges and scenarios. It also allows Cyber Command and military units to conduct more frequent training. Cyber Flag typically was Cyber Command's largest and only holistic tactical training event, held annually during June. For units, aside from Cyber Flag, there were no other ways to stay sharp on their skills unless they built their own environments. Now, Cyber Command plans to hold more exercises, with Cyber Flag 20-3 occurring in the fall. “The delivery of the Persistent Cyber Training Environment absolutely allows us to increase the frequency and the complexity of exercises that are conducted by the command itself,” Coast Guard Rear Adm. John Mauger, director of exercises and training at Cyber Command, told reporters. “Going forward, I would expect you to see a series of exercises throughout the year where we are reaching out to the different teams to test their capabilities or to focus on specific issues that are of concern or interest to us. “Going forward, we're going to get the benefits of both those distributed exercises along with increasingly complex exercises as PCTE is instantiated across both the secret network and the top-secret network.” Scenarios and environments can be stored, saved, reused and modified if needed in the system for later exercises. Smaller units will also be able to leverage these scenarios to practice whenever needed. The PCTE virtual environment for this year's exercise included 25 interconnected ranges of more than 3,000 virtual machines — a high-fidelity network that simulated and emulated open internet traffic with more than 4,000 static websites that store and share data. The simulated air base networks created in PCTE had fully configured Windows active directory domains with over 100 nodes running more than 10 types of major operating systems, along with 35 simulated user control workstations actively surfing the internet and using Microsoft Office products to access, create and transfer files. Moreover, officials also explained PCTE can be integrated into larger, multi-combatant command-type exercises to simulate the cyber effects, such as Global Lightning and its companion Cyber Lightning. Global Lightning is an annual global exercise run by Strategic Command to test integration across several geographic and functional combatant commands. Cyber Lightning is Cyber Command's portion to the exercise. “We think that is the next evolution of the Persistent Cyber Training Environment and how we take to the tier 1 exercises, incorporate cyber effects. They're no longer white-carded,” Col. Tanya Trout, Cyber Command's PCTE director and acting director of the Joint Cyber Training Enterprise, told reporters. White carding involves telling exercise participants that a certain action has occurred. This was typical of cyber effects, given it was difficult to realistically simulate them, which diminished the training value in exercises because participants didn't experience the full breadth of these actions. Now, these activities can play a real role in exercises increasing the overall fidelity of training across the joint force and continuity of all operations of warfare. The system will also be able to be used for mission rehearsals. A Cyber Command official said the force can input prior operations, such as those used against the Islamic State group, to train against. Additionally, they'll be able to upload to the platform malware discovered in operations. The PCTE program office, which is in the prototyping phase despite delivering the first portion to Cyber Command in February 2020, also learned valuable lessons in Cyber Flag. Officials said the two-week exercise provided the program office with six months' worth of data it can use to make significant improvements. Prior to the February delivery, the program office leveraged several smaller-scale training events at the unit level to incrementally increase capabilities and scalability as well as help geographically dispersed teams prepare for tier 1 exercises like Cyber Flag. Overall, officials are happy with how the system performed in its first tier 1 exercise, pointing to little to no latency issues, though there were periodic improvement tickets. “What we found through the rapid development and use of the Persistent Cyber Training Environment is that we really have a unique capability to move forward with,” Mauger said. https://www.c4isrnet.com/dod/cybercom/2020/06/25/this-training-tool-could-be-the-answer-to-stop-mass-cyberattacks

Toutes les nouvelles