22 septembre 2020 | International, Naval

Is the US Navy winning the war on maintenance delays?

WASHINGTON — The U.S. Navy, beset by maintenance delays, is making progress on getting its ships out of the shipyards on time, fleet officials say.

Over the past three years, the Navy is on track to more than double the percentage of ships getting out of maintenance on time, key to the service's efforts to make deployments more sustainable for its ships and sailors, Capt. Dave Wroe, U.S. Fleet Forces Command's deputy fleet readiness officer told Defense News in an email.

“On-time ship maintenance availability completion rates in private shipyards improved from 24% in FY18 to 37% in FY19,” Wroe said. “Current performance trends in FY20 are projected to be 65%.”

The improvement is a sign that the Navy may be turning the corner on a fight to restore readiness from its nadir in the early part of the last decade, when the Navy was running ragged filling unsustainable requirements for forces around the globe.

Getting ships through their maintenance cycles on time is the linchpin of what the Navy calls its “optimized fleet response plan,” which is the system through which the Navy generates deployable ships that are maintained, manned and trained.

Late last year and again in January, Chief of Naval Operations Adm. Michael Gilday told audiences that repeated delays in the shipyards was undermining the Navy's Optimized Fleet Response Plan, and turning that around was vital.

“We are getting 35 to 40 percent of our ships out of maintenance on time: that's unacceptable,” Gilday said at the USNI Defense Forum in December. “I can't sustain the fleet I have with that kind of track record.”

A recent Government Accountability Office report found that between 2015 and 2019, only 25 percent of the Navy's maintenance periods for ships and submarines.

Improvements

Getting out of that hole has been difficult for a number of reasons: High operational demand for Navy forces makes planning maintenance difficult, and inevitably when the ships go into maintenance after years of hard use, workers discover more work that needs to be done, creating delays. And those delays make executing OFRP difficult, Wroe said.

“OFRP provides the construct to best assess and optimize readiness production — down to a unit level — taking into account all the various competing factors to produced Navy readiness,” Wroe said. “Bottom line: OFRP helps mitigate fundamental points of friction, such as shipyard capacity and manning gaps at sea — but in itself doesn't solve key degraders like depot level maintenance delays and extensions.”

But some key factors in the delays have been identified and the Navy is working to mitigate them, Fleet Forces Commander Adm. Chris Grady said this week at this week's Fleet Maintenance and Modernization Symposium.

One area that has a tendency to drive delays is when workers discover things that need to be fixed, the fix may not cost much but the adjustment must go through an approval process that slows everything down. Those kinds of changes add up to about 70 percent of the so-called “growth work.”

Part of it is anticipating and building in ways to deal with growth work into every maintenance period, and the other part is making it easier to address small changes to the scope of the work, Grady said.

“When we began this initiative, cycle time for the small value changes averaged about 30 days,” he said “We're now at six and aim to bring it down further to only two days.”

Other things that have helped the problem has been bundling maintenance periods for ships, meaning that contractors bid on multiple ships to fix, and can plan hiring further out, Grady said. Additionally, improving base access for contractors has helped, as well.

“Last year, we averaged 110 days delayed per ship in private avails,” Grady said, using the short-hand term for “maintenance availability.”

“Things much better this year — even with COVID-19,” he continued. “We go from about one-third avails finishing on-time to two-thirds. That is great. But, again, each delay has real impact on our readiness, and we need to keep working together to do better.”

What happened?

Because the U.S. Navy is set up to meet standing presence requirements and missions around the world, it must cycle its ships through a system of tiered readiness.

That means ships go on deployment fully manned, trained and equipped. Then the ships come home, and after a period of sustained readiness where the ship can be redeployed, it goes into a reduced readiness status while undergoing maintenance. Following maintenance, the ship and crew goes into a training cycle for another deployment as an individual unit, then as a group, then returns to deployment.

The whole cycle takes 36 months: Rinse and repeat.

OFRP was designed in the 2013-2014 time-frame when the Navy was deploying well beyond its means, with carrier strike groups and amphibious ready groups going out for nine-to-10 months at a time.

The excess use wore hard on the ships and sailors who manned them and put more wear on the hulls than they were designed to sustain. That meant that when ships went in for maintenance they were more broken than they were supposed to be, and funding to fix them was hampered by spending cuts.

For nuclear ships — submarines and aircraft carriers — the funding cuts were a double whammy of work stoppages and furloughs that contributed to a wave of retirements in the yards, meaning the public yards were understaffed and had to hire and train new workers. Work took longer, throwing a wrench into an already complicated system of generating readiness.

All that added up to significant delays in getting ships through their maintenance cycles and contributed to astonishing delays in attack submarine maintenance especially.

What OFRP was meant to do was create a system whereby the Navy could meet combatant commander demands but not break the system. That meant that the Navy would generate as much readiness as it possibly could but that the demand would have to be limited to what the Navy could reasonably maintain, man, train and equip.

But getting to that system has been immensely difficult because of the deep hole the Navy dug meeting requirements that well outstripped funding and supply.

For example, there was a two year period when the service was forced to supply two carrier strike groups to the Arabian Gulf at all times, a requirement only canceled when automatic across-the-board spending cuts in 2013 made it impossible for the Navy to fund the two-carrier requirement.

Adding to the difficulty: some of OFRP's founding requirements were nigh impossible to pull off. One was that the all the ships in group would go into and come out of their maintenance availabilities on time and together. Another was that a group would go into the first phase of their training, the so-called basic phase right after coming out of maintenance, fully manned.

Both have been immensely difficult to pull off. But Fleet Forces, headed then by OFRP architect Adm. Phil Davidson, was given ample warning that those assumptions would be difficult to achieve.

Then-NAVSEA head Vice Adm. William Hilarides told USNI News in January 2015 that getting ships to come out of the yards simultaneously would be hard.

“The challenge to me is, let's say you want four destroyers in a battle group, all to come out at the same time in one port? That's a real challenge,” Hilarides told USNI News.

The current head of NAVSEA, who at the time was in charge of the Regional Maintenance Center enterprise, backed up his boss to USNI News, saying it would be particularly challenging in places with less infrastructure.

“Your big rub there is, the challenge of OFRP is ... all those ships [in a carrier strike group], they go through maintenance together, they go through training together and they deploy together,” said then-Rear Adm. William Galinis. "So, what our challenge is, is to be able to take all that work from all those ships and try to schedule it for roughly about the same time, and to get all that work done on time. So that's our challenge.

“Now, in a port like Norfolk or San Diego, we have big shipyards, a lot of people, a lot of ships. You can kind of absorb that type of workload. When you go to Mayport, they've got like 10 ships down there [and typically cannot work on more than one or two destroyers at a time.],” he told USNI.

Galinis said that Fleet Forces would have to be responsive to the shipyards because at least that way they could plan for delays.

“They know if they give us all this work at one time, it's going to go long anyway,” he told USNI. “So they'd rather be able to plan that and at least know when they're getting the ship back, as opposed to, ‘nope, we're not going to talk to you, you've got to go do it,' and then the ships go long because we don't have enough people to do the work.”

Fleet Forces Command has been reviewing its assumptions this year and is preparing to release a revised OFRP instruction, but the core is likely to remain the same. In any case, Wroe said in the email, it was always going to take a long time to dig out of the hole the Navy found itself in when OFRP was implemented fully in 2015.

“It was clear at the inception of OFRP, and remains clear today, that it will take the entire 2015-2025 period to recover readiness and establish stable readiness production,” Wroe said. “That makes sense when readiness production is planned over 9-years and large blocks of time have already been scheduled for depot maintenance periods.”

Ultimately, if the process of OFRP is funded correctly and ships can get out of maintenance on time, it's a sound way of moving forward, Fleet Forces Commander Grady told the audience this week.

“My bottom line here is that, as a process, OFRP works,” he said. “If we are looking where to improve upon it, each of these studies came to the same conclusion: the biggest inhibitor to fleet readiness is maintenance and modernization performance in the shipyards. We simply must get better, and I know you share my concern.”

https://www.defensenews.com/naval/2020/09/19/is-the-us-navy-winning-the-war-on-maintenance/

Sur le même sujet

  • What’s changing in the cyber domain? We ask industry experts

    3 septembre 2019 | International, Sécurité

    What’s changing in the cyber domain? We ask industry experts

    By: Andrew Eversden “What are you talking about now in cybersecurity that you weren't talking about six months ago?” Fifth Domain posed this question to cybersecurity experts at Black Hat, a cybersecurity conference in Las Vegas, Nevada, that ran from Aug. 3-8. With the cyber domain rapidly evolving, we wanted to know how conversations within the cyber community are changing. Some pointed to a new focus on utility systems and web-connected devices that sit on critical infrastructure. “It's only a matter of time until there's another major disruption in an electric utility somewhere in the world, probably not in the U.S., but elsewhere,” Sergio Caltagirone, threat intelligence director at Dragos, said at the conference Aug. 5. “But oil and gas has the higher likelihood of a major destructive and loss-of-life event. And I think most people did not realize how close to that we actually were.” Caltagirone was referring to the TRISIS event, malware that struck industrial control systems at a Saudi Arabian petrochemical plant and could've caused physical harm. He said that in the aftermath of that attack, threat researchers diving into the details realized just how bad it could've been. “We started finding a lot of stuff which hadn't been found before,” Caltagirone said. “Which made us realize very quickly how close that space is to a major event.” Dave Weinstein, chief security officer at Claroty, pointed to an “explosion” of devices connected to the internet of things.. “It's really a product of this general consensus among industrial organizations that the benefits exceed the costs in terms of embracing this type of digital transformation," Weinstein said Aug. 8, adding that organizations must be “mindful” of these devices and have a plan to mitigate their potential vulnerabilities. Brian Costello, a senior vice president at Flashpoint, told Fifth Domain on Aug. 8 that he is more often than before focusing on targeted cyberattacks from bad actors. That's a shift away from “campaign-based” attacks that tracked. There's “more planning out, more scoping out of targets and taking long-term planning to go after [a] particular target with a specific asset in mind,” Costello said. Along that same vein, Julian Zottl, a senior cyber architect at Raytheon, said he's noticing more inclusion of all-source intelligence in threat analysis. “We're looking at ... all the sources and trying to figure out indicators,” Zottl said Aug. 7. “[We're] even trying to do predictive analytics now, where it's like, ‘Oh, we see this threat might be coming.' I think that's something that we're starting to talk about more and more.” Several cybersecurity professionals interviewed by Fifth Domain said the U.S. government is moving away from the classic cyber kill chain and over to the MITRE ATT&CK framework, which dives deeper into potential threats to information security. “They used to think the hackers would just come in to steal secrets, conduct espionage and then leave,” said Tom Kellermann, chief cybersecurity officer at Carbon Black and a former commissioner on the Commission on Cyber Security for then-President Barack Obama. “In fact, they're maintaining persistence in these systems. They're manipulating the integrity of data and then they're using federal government agencies themselves and personnel's devices themselves to target anyone who implicitly trusts that person, that agency, that department.” he told Fifth Domain on Aug. 6. Chris Kennedy, chief information security officer at AttackIQ and a former official with the Treasury Department and the Marine Corps, said these new frameworks in use along with federal continuous monitoring programs allow for more attacker emulation, essentially simulating the attack agencies could face. “Agencies are starting to realize the value of attacker emulation as a way to measure and benchmark the effectiveness of their security controls,” Kennedy said on Aug. 7. And with government agencies in different stages of cloud migration, agencies will need to learn how that fits into their cybersecurity posture. Marten Mickos, CEO of white hat hacking company HackerOne, said this a new discussion. He also said the conversation surrounding the use of ethical hackers in government environments has evolved: The word “hacker” is becoming more accepted. “I do think it signals a shift in mindset," Michos said. There's a realization that "those people who portray themselves as hackers are actually those who will rescue us, not those who will destroy us.” Despite all the changing technology and evolving threats, one aspect of cybersecurity remains set in stone, said M. K. Palmore, a field chief security officer for the Americas at Palo Alto Networks and a recently retired FBI cyber agent. “It's about adhering to cybersecurity fundamentals,” Palmore said. “That message hasn't changed regardless of my position or where I'm located.” https://www.fifthdomain.com/show-reporters/black-hat/2019/08/30/whats-changing-in-the-cyber-domain-we-ask-industry-experts

  • Hensoldt, ERA fuse passive sensing tech in bid for Luftwaffe deal

    1 septembre 2023 | International, Aérospatial

    Hensoldt, ERA fuse passive sensing tech in bid for Luftwaffe deal

    The German and Czech companies have combined two passive-sensing technologies, promising greater range and accuracy.

  • Contracts for May 6, 2021

    7 mai 2021 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    Contracts for May 6, 2021

    Today

Toutes les nouvelles