21 septembre 2018 | International, Aérospatial

How does the US Air Force plan to keep bombers affordable?

By:

WASHINGTON — The U.S. strategic bomber program plays a vital role in U.S. nuclear and conventional posture, providing both penetrating and standoff capabilities that allow the U.S. to hit targets almost anywhere in the world. But as the Air Force expands from 312 to 386 operational squadrons — planning to increase the bomber squadron from nine to 14 — how can the service keep costs within reason?

A key to keeping down modernization costs will be the force's ability to field systems that can easily be updated as new technology develops, according to Gen. Timothy Ray, commander of Global Strike Command.

“What I really want to drive home is that if we have a force, whatever the size of the force, it has to be affordable,” Ray said at the Air Force Association's annual Air, Space and Cyber Conference on Sept. 18. Ray believes prices will be affordable depending on the service's “ability to field a relevant force as part of our integrated capabilities, both nuclear and conventional, that has a rapid capability to be updated and modified.”

Communications systems, weapons, sensors and defensive capabilities are very sensitive to technological change, which “is already going on much faster than what we can field right now using the old legacy processes,” Ray said. Ray pointed to the B-21 bomber as having "the right attributes that are going to set us up for success.”

Others suggest that looking at the unit price for bombers is deceptive and does not allow the Air Force to address its critical modernization needs.

“It is very easy to look at individual unit cost [per bomber], but that does not equate to value," Retired Lt. Gen David Deptula said. "People, particularly programmers, like to talk about cost, but they don't talk about the effectiveness piece.”

This sentiment was echoed by retired Lt. Gen. Bob Elder Jr., who feels the public and some military members do not appreciate the active role bombers play in defending the U.S. As busy as these bombers are, Edler said, “it's a bargain” for how much the Air Force pays for them.

Deptula also believes that if the Air Force is serious about modernization, it is past time that requirements for meeting U.S. strategic goals determine force structure, rather than depending on “arbitrary budget lines.”

“For way too long our force structure has been solely driven by the budget and not the war-fighting demands of our nation's security strategy,” he said. “I dare say no one will argue with the preamble of the Constitution, which basically talks about how we form government to provide for the common defense, and then to promote the general welfare. It doesn't say the other way around.”

“People will say the new enterprise is going to be too expensive, so don't keep it. I don't agree,” Ray said, adding that a more competitive approach will enable the Air Force to drive down procurement and modernization costs.

“I have got to know our competitive nature of our approach will draw the talent from industry; or if I'm not quite certain with a technical capability or the capability is so far advanced I can't draw the talent from industry, now I find myself with an important issue,” Ray noted.

In regard to ensuring the service can get the funding to grow its squadrons, Ray added: “Where you drop cost down and have a rapid modification capability or a relevant force for an extended period of time, then you begin to tell a more complete story,” which he explained should help dollars keep flowing into necessary programs.

https://www.defensenews.com/digital-show-dailies/air-force-association/2018/09/20/how-does-the-us-air-force-plan-to-keep-bombers-affordable

Sur le même sujet

  • What new documents reveal about Cyber Command’s biggest operation

    22 janvier 2020 | International, C4ISR, Sécurité

    What new documents reveal about Cyber Command’s biggest operation

    Mark Pomerleau New documents provide insight into the growing pains U.S. Cyber Command faced in building a force while simultaneously conducting operations. The documents, which were released as part of a Freedom of Information Act request from the National Security Archive at George Washington University and later shared with journalists, are a series of internal briefings and lessons from the Defense Department's most complex cyber operation at the time, Operation Glowing Symphony. That operation was part of the larger counter-ISIS operations — Joint Task Force-Ares — but specifically targeted ISIS's media and online operations, taking out infrastructure and preventing ISIS members from communicating and posting propaganda. While Cyber Command described the operation, which took place in November of 2016, as a victory in the sense that it “successfully contested [ISIS] in the information domain,” the documents demonstrate the extent to which the command was still learning how to conduct operations and the exact steps to follow. “Process maturation is something they pull out a lot. Obviously, as CYBERCOM was standing up, it was pulling together plans for how they were going to operate. They actually hadn't operated that much,” Michael Martelle, cyber vault fellow at the National Security Archive, told reporters. “A lot of these frameworks were formed in theory. Now they go to try them out in practice.” Cyber Command leaders have stressed in public remarks for years that the command was building its force while operating. But the extent of those operations has been limited. Officials in recent years have explained that the command didn't undertake many offensive operations. One official said last year he could count on less than two fingers the number of operations, Cyber Command conducted in the last decade or so. One member of Congress said DoD didn't conduct an offensive cyber operation in five years. But when they were in action, in this case with Operation Glowing Symphony, Martelle said the documents show cyber leaders did not anticipate the amount of data they would access. “They actually weren't prepared for the amount of data they were pulling off of ISIS servers ... CYBERCOM was not set up for an operation of this magnitude from day one,” he said. “They had to learn on the fly, they had to acquire on the fly, they had to grow on the fly.” The documents note that Cyber Command's capability development group, is “developing USCYBERCOM data storage solutions.” The capabilities develop group, now known as the J9, serves as the advanced concepts and technology directorate and worked to plan and synchronizing cyber capability development and developed capabilities to meet urgent operational needs. Experts had noted that in the past the CDG/J9 had been stressed in recent years by a limited staff and burdened by developing tools for operational needs, namely Joint Task Force-Ares. Another example of potential growing pains the documents point to was the fact that updates to operations checklists were not made available readily to the team. Finally, the documents note that authorities and processes the command was operating under that the time were restrictive in some cases. “Absent of significant policy changes from [the office of the secretary of defense], USCYBERCOM is limited in its ability to challenge ISIS [redacted]. As a result, USCYBERCOM has [redacted] to achieve our objectives,” the executive summary of a 120-day assessment of Operation Glowing Symphony says. Those authorities and processes have been streamlined by the executive branch and Congress in recent years. Commanders now follow a process that defaults toward action, Maj. Gen. Dennis Crall, deputy principal cyber adviser and senior military adviser for cyber policy, said during an event Jan. 9. He explained the updated process provides continuity, tempo, pace and timing. Ultimately, Martelle noted that the real importance behind Operation Glowing Symphony is that Cyber Command used the experience from those events and Joint Task Force-Ares more broadly as a template for future operations. Cyber Command's top official, Gen. Paul Nakasone, who was also led Joint Task Force-Ares, has noted that the task force laid the foundation for the Russia Small Group, which was created to combat election interference in the 2018 midterms. “This concept of a task force lives on. A lot of that thinking came from what we were doing in 2016,” he told NPR. That task force has now evolved to be more all encompassing covering election threats more broadly. https://www.fifthdomain.com/dod/cybercom/2020/01/21/what-new-documents-reveal-about-cyber-commands-biggest-operation/

  • USAF issues RFI for directed energy C-UAS technologies

    2 novembre 2020 | International, Aérospatial

    USAF issues RFI for directed energy C-UAS technologies

    by Pat Host The US Air Force (USAF) is requesting information from industry about directed energy (DE) capabilities for counter-unmanned aerial system (C-UAS) technologies. The Air Force Life Cycle Management Center, Architecture and Integration Directorate (AFLCMC/XA) seeks to better characterise the technological, manufacturing, and performance capabilities of the industrial base to develop and produce upgrades to DE prototypes and related C-UAS subsystems. The directorate will use this information to inform its trade space analysis of solutions for engagement and mission level modelling and simulation (M&S), as well as programme cost estimates for potential future technical maturation of DE C-UAS systems. The USAF wants to research the industrial base for C-UAS capabilities related to fixed-site Air Base Air Defense (ABAD) against potential Group 1 and 2 UAS threats, which weigh 25 kg or less. These threats may have characteristics such as small size; low radar cross sections; low infrared (IR) or radio frequency (RF) signatures, or no RF signatures at all; the ability to hover; and low-altitude flight capabilities, which may render them difficult to detect and defeat. Additionally, these UASs are typically either controlled remotely from a ground control station (GCS) or can fly pre-programmed routes. Recent and pending procurements of DE C-UAS weapons require even further development and improvement, including connected and related, but not limited to, subsystems such as command-and-control (C2) suites, radar, and electronic warfare (EW). https://www.janes.com/defence-news/news-detail/usaf-issues-rfi-for-directed-energy-c-uas-technologies

  • Pentagon’s CIO shop teams with armed services to prep for move to JEDI cloud

    2 octobre 2020 | International, C4ISR

    Pentagon’s CIO shop teams with armed services to prep for move to JEDI cloud

    Andrew Eversden WASHINGTON — The Pentagon's top IT official said Wednesday that his office has spent the last few months preparing the armed services to migrate to the department's long-delayed enterprise cloud as soon as it becomes available. “We're doing a lot of work with the services on getting them prepared to move their [software] development processes and cycles to DevOps so when the [Joint Enterprise Defense Infrastructure] cloud finally does get awarded, we're not starting at Day One,” Dana Deasy, Pentagon chief information officer, said during a Defense Writers Group roundtable. The JEDI cloud contract was originally awarded to Microsoft over Amazon Web Services 11 months ago, and then was halted by a federal judge in February. Though the court case remains unresolved, Deasy said the services must now identify tools, integration environments and directories that need set up to connect users into the cloud when it's available. Despite the judge's decision, “that's all work that we can do because it sits inside our ownership all ready,” Deasy said. While the Department of Defense has faced criticism for its single-award structure, particularly as cloud technologies have advanced during the yearslong delay, Deasy insisted the JEDI cloud still fills a critical capability gap the department needs to deliver to the war fighter: data at the tactical edge and DevOps. The JEDI cloud is the platform the department still envisions for those needs and is an important piece of the Joint All-Domain Command and Control concept, an initiative through which the services want to connect sensors and shooters. Deasy said the DoD has solutions in place to form that connection, but still needs “that tactical cloud out at the tactical edge.” “JADC2 is going to point out, time and time again, about the need of being able to swiftly bring data together. And guess what? That data is going to be of different classifications, and bringing that together in a cross-domain way in a very quick-to-need [way] is something that is still a need we have across the Department of Defense that JEDI was specifically designed to solve for,” Deasy said. Cloud, data and artificial intelligence are core elements to enabling JADC2. Using data for joint war fighting is the top priority of the department's forthcoming data strategy, which Deasy said he expects will be released in the next 30 days. The department has a lot of data, but it is not necessarily prepared or stored in a way that is ready to be used for any sort of operations. The data strategy is expected to outline how to approach those challenges. The DoD's new chief data officer, Dave Spirk, will finalize the data strategy. After he started in June, Spirk went on a “listening tour” across the department to inform the strategy. Deasy said Spirk was told by many components that the department needs to set goals to ensure data is visible, understandable and trustworthy, while also easily within classification levels. They also said the data needs to be interoperable and secure, while also linked and integrated between sensors and shooters. The Pentagon's Joint Artificial Intelligence Center, the department's AI hub that's situated under Deasy's office, is tackling joint war fighting this year under a new project that uses AI to link intelligence gathering systems to operations and effects systems for commanders. The JAIC recently awarded its Joint Common Foundation contract to Deloitte. The company is to provide an environment for an enterprisewide AI development platform. That platform, which uses the Air Force's Cloud One enterprise cloud, was originally supposed to operate inside the JEDI cloud. Therein lies the challenge for the DoD: Components that have been waiting for the JEDI cloud have had to look elsewhere — a problem Deasy recognizes he'll have to grapple with. Right now, Deasy is encouraging components that are waiting for JEDI but have an “urgent war-fighting need” to look elsewhere for platforms. “That is obviously OK in the short term, but over time that starts to become problematic because now you're starting to set up a lot of different solutions in different environments where you're going to have to go back and sort out in an enterprise way,” Deasy said. https://www.c4isrnet.com/battlefield-tech/it-networks/2020/09/30/pentagons-cio-shop-teams-with-armed-services-to-prep-for-move-to-jedi-cloud/

Toutes les nouvelles