29 mai 2020 | International, Aérospatial

Leonardo awarded a contract for FAA’s distance measuring equipment system

Rome May 28, 2020 - Leonardo's U.S. subsidiary, Selex ES Inc., developer of surveillance, en route navigation, and precision approach and landing systems, was recently awarded a contract by the Federal Aviation Administration (FAA) to continue to build USA's Distance Measuring Equipment (DME). The contract has a one-year base period and two one-year option periods. Along with the previous FAA Selex ES DME contract; Selex ES expects to provide more than 200 DMEs to the National Airspace (NAS). Work will be performed in Overland Park, Kansas.

The scope of the contract includes program management, systems engineering, design and development, system test and evaluation, training, production, Interim Contractor Depot Logistics Support (ICDLS), and site implementation. The DME system will help the FAA increase operational availability and performance of the NAS, supporting common and consistent interface requirements, and providing a modern system that complies with current FAA security standards.

Selex ES is the world's premiere vendor of DMEs, having delivered over 1200 DME systems over the last 25 years to key customers around the globe including FAA, DFS in Germany, Skeyes in Belgium, EANA in Argentina, and ANWS in Taiwan. The company is proud to be a trusted supplier to the FAA and grateful for the continued confidence that FAA has in its team and technology.

About Leonardo and its U.S. subsidiary, Selex ES Inc.
Leonardo is a global player in the high-tech sectors and a major operator worldwide in the Aerospace, Defense and Security sectors. Headquartered in Italy, Leonardo employs over 49,000 people in over 20 countries with offices and industrial plants across five continents. Leonardo's U.S. subsidiary, Selex ES Inc., is headquartered in Overland Park, Kansas, USA and is a leading supplier of surveillance, en route navigation, precision approach, and systems to Air Navigation Service Providers, airport authorities, militaries, government agencies, and commercial and industrial operators. In the heartland of the United States, Selex ES has designed, produced, delivered, and supported ground-based radio navigation aids and surveillance solutions for over 30 years on all seven continents. Selex ES provides complete design, development, production, test, installation, training, integration, maintenance, and customer service.

View source version on Leonardo: https://www.leonardocompany.com/en/press-release-detail/-/detail/28-05-2020-leonardos-u-s-subsidiary-selex-es-inc-awarded-a-contract-for-faas-distance-measuring-equipment-system

Sur le même sujet

  • US Army awards air-launched effects contracts for future helicopters

    25 août 2020 | International, Aérospatial

    US Army awards air-launched effects contracts for future helicopters

    By: Jen Judson WASHINGTON — The U.S. Army has awarded 10 contracts worth a total of $29.75 million to companies to provide mature technologies in the realm of air-launched effects, or ALE, for future vertical lift aircraft that are expected to come online around 2030, service aviation officials have told Defense News. Raytheon, Alliant Techsystems Operations of Northridge, California, and Area-I of Marietta, Georgia, were awarded contracts to develop air vehicles. L3 Technologies, Rockwell Collins and Aurora Flight Services Corporation were awarded contracts to provide mission systems. And Raytheon, Leonardo Electronics US Inc., Technology Service Corporation of Huntsville, Alabama, and Alliant Techsystems Operations LLC of Northridge, California, received contracts to provide ALE payloads. Through ALE, the Army hopes to provide current and future vertical lift fleets with “the eyes and ears” to penetrate enemy territory while manned aircraft are able to maintain standoff out of range of enemy attack, Brig. Gen. Wally Rugen, who is in charge of the Army's FVL modernization efforts, said in an exclusive interview with Defense News. “To do that, that has a whole host of capabilities embedded in it, and I would say it's not just the eyes and ears, but it's also, what we are finding, is the mouth, so our ability to communicate by bringing mesh network capabilities, by bringing an ability to hear in the electronic spectrum, and, again, the ability to collect in that spectrum so we can find, fix and finish on pacing threats,” he added. The Army plans to take these already technically mature capabilities through additional technology maturation, Col. Scott Anderson, the unmanned aircraft systems project manager for the Army's Program Executive Office for Aviation, said in the same interview. “We're looking for high technology readiness levels, so best of breed,” he said, “that we can buy and then we don't have to develop, spend a lot of developmental dollars getting ready to get out the door in a prototype.” The air vehicle, payloads and missions systems will all fit into a government-owned architecture by fiscal 2024. The service will first look at each major component of ALE individually, rather than as a whole system, to assess readiness, Anderson said. That will run through most of 2021. Then in 2022, the Army will take those capabilities and bring them together into a full system prototype working with Georgia Tech, which is helping the service write the underpinnings of the reference architecture, he added. In the final phase, the Army will integrate the system onto a platform, first targeting the Gray Eagle and AH-64 Apache attack helicopter. Ultimately the ALE capabilities to come out of the effort will be targeted for the Future Attack Reconnaissance Aircraft (FARA) ecosystem, Anderson said. The Army is planning to field both FARA and a Future Long-Range Attack Aircraft (FLRAA) in the early 2030s. “We want to mature the [ALE] ecosystem and then have it ready to hand off to FARA in full bloom,” Rugen added. The Army has been looking at ALE since roughly late 2017, Rugen said, and has been working to refine the associated capabilities development documents for several years. Army Futures Command Commander Gen. Mike Murray signed an abbreviated capabilities development document in May. The service has been pleased with what it has seen so far in live prototype experimentation and physics-based modeling within the science and technology community and is prepared to move quickly on the effort, Rugen said. The Army selected Area-I's ALTIUS, the Air-Launched, Tube-Integrated Unmanned System, to launch from a rotary-wing test aircraft — a UH-60 Black Hawk — and was able to demonstrate the concept from a high altitude in August 2018. Then the service demonstrated the concept again during a ground robotic breach exercise at Yakima Air Base in Washington state in 2019 as well as a launch from a Black Hawk flying at a lower altitude — roughly 100 feet or less. In March, at Yuma Proving Ground, Arizona, the Army demonstrated multiple ALEs launched from a Black Hawk at very low altitudes to “maintain masking,” Rugen said. “We got our mesh network extended out to about 60 kilometers, so we were pretty happy with, again, the requirements pace and the experimentation pace with that.” The program will evolve beyond 2024 as the capability will align more closely with fitting into future formations. The Army could award future contracts to integrate the capability or could establish follow-on Other Transaction Authority contracts — which is the type of contract mechanism used for the 10 awardees that allows the Army to move faster to rapidly prototype. “We have the contractual mechanisms” to be “flexible and responsive,” which is key in a program like ALE, Joe Giunta, executive director of Army Contracting Command at Redstone Arsenal, Alabama, said. Instead of looking for a vendor that could deliver every aspect of a system, “we can harvest from across multiple different vendors, who bring, if you will, the best characteristics,” Patrick Mason, the deputy PEO for Army Aviation, added. “Then as they merge into our government reference architecture and our open system approach, we are then able to bring those together to create a much more capable product,” he said, that “fits into the longer term on how we can modify that as technology comes along and we can ramp on increases in technologies as we get out into the '23, '24 time frame and then further into the future as we look out to FY30 and the fielding of FARA, FLRAA and the full establishment of the FVL ecosystem.” The Army released a notice to industry Aug. 12 looking for input on technology that could further advance the capability of ALE against sophisticated adversaries with plans to host an industry day in September. While the service will prototype mature technologies in the near term, Mason said, “when you look at the '25 and '26 time frame, there will be better technologies that are developed around the payload side of the house, advancements in air vehicles or advancements in the missions systems.” The RFI is “looking at the next increment that is out there as we move from now in 2020 to what we would have as a residual capability in '24 to what we could move to in 2030,” Mason said. https://www.defensenews.com/land/2020/08/24/army-awards-air-launched-effects-contracts-for-future-helicopters/

  • The largest cyber exercise you’ve never heard of

    25 février 2020 | International, Aérospatial, C4ISR, Sécurité

    The largest cyber exercise you’ve never heard of

    For years, the first time the Department of Defense's cyber forces faced high-end digital attacks was not in practice or in a classroom, but in actual operations. For the cyber teams that focused on offense, a playbook developed from years of National Security Agency operations guided their work. But on the defensive side, standards and processes needed to be created from scratch meaning, in part, there was a lack of uniformity and little tradecraft to follow. Because cyber leaders had focused on staffing, training opportunities for defensive cyber operators had been sparse. To help solve that problem, the Department of Defense is expected to award a contract worth roughly $1 billion later this year for a global cyber training environment. But in the meantime, some units across the joint force have gone so far as to create their own small-scale training events and exercises to keep their forces' skill sets sharp. Perhaps the best example of these efforts are the 567th Cyberspace Operations Group's “Hunt Event,” which has quickly grown to become one of the largest cyber exercises across the department. The bi-monthly exercise pits teams against each other in a competition for the coveted Goblet of Cyber trophy and bragging rights. The group aims to better train defensive hunters, improve defensive tactics, techniques and procedures and develop defensive tradecraft. “The point of this was that we didn't really have a good range space to play on that had an active and live adversary so we could, in theory, replay traffic and we could go in and generate some easy kill, low hanging fruit signatures for detection,” Capt. Reid Hottel, training flight commander at the 837th Cyber Operations Squadron, told Fifth Domain. “If we are supposed to be the primary counter to advanced persistent threats, the way that we were training was not like how we were fighting.” The exercises started roughly a year ago to teach operators how to hunt on networks. It's now evolved to where participants also work on leadership skills and build custom exploits on a large range with multiple stakeholders. In addition to the Air Force CPTs — the defensive cyber teams each service provides to U.S. Cyber Command — members from the Air Force Office of Special Investigations and Mission Defense Teams, specialized defensive cyber teams that will protect critical Air Force missions and local installations, also take part. At the most recent exercise in January, a representative from NASA participated. Now, the exercises have become so popular Hottel said other services are interested in participating in the future. This includes a Marine Corps CPT at Scott Air Force Base. Building better leaders and hunters To be the best, cyber leaders recognized their teams would have to beat the best and that meant training against the world's most advanced cyber threats. Some other forms of training — such as the popular capture the flag game, which involve teams trying to find “flags” such as files or scripts inside a network — are not always the most realistic form of training. “When we were fighting, we're up against advanced adversaries. We're up against adversaries that are using tactics, techniques and procedures that are just above and beyond what simple little [scripts] ... we were using in the past,” Hottel said. “This hunt exercise allows us to do that, whereas in the past, particularly in other flag exercises, we are not training at the APT level. We [were] training at the script kiddie kind of level and here we're training at a much higher difficulty, which stretches and grows our operators into being true hunters.” He added that the exercises are also helping develop tradecraft. “That's one thing that nobody really teaches, there's no commercial course that you can go buy that teaches tradecraft, that teaches the military away, that teaches the way that we use to find the APT, which in theory, should be ever evolving because our adversary is as well,” Hottel said. “These exercises have been really eye-opening to provide tradecraft development, to become hunters, to understand what it means to be a cyber protection team.” The exercise has evolved to include custom exploits, custom root kits, custom attacks and zero-day exploits within a real-world mission where in some cases hunters don't have any indictors of compromise that exist in the public domain. This means that there is no public reporting available on the exploits or tactics the adversary is using. Participants can hone their skills, by actively hunting on a network in order to find anomalies that could lead to trouble. “As hunters,” he said, “we don't necessarily have singular methodology, we don't necessarily have a unique way that we can go about finding advanced threats mostly because we haven't really been training like that.” The training is also helpful for new mission defense teams, which are just being officially resourced within the Air Force around local installations. By having those teams sit next to CPTs, who are using generally the same tools, they can learn about tradecraft and what to look for at the local level. During the most recent exercise, officials said it was the first time they intentionally tried to trip up participants. Organizers created fake attack chains to see how the players scoped an investigation into a network and deducted points for the amount of time they wasted following that lead. This technique helps teach teams how to scope investigations without going down “rabbit holes,” and not adequately planning, Lt. Christopher Trusnik, chief of training at the 835th Cyberspace Operations Squadron, told Fifth Domain. Beyond the technical hunting, this approach helped team leader to flex leadership muscles. “It was more of teaching that leadership technique of you plan for this, how do you investigate quickly and how do you triage your investigation,” Trusnik, whose unit ran the January exercise, said. Hottel explained that following this most recent event, teams focused on leadership and organization. At one point, someone on his team previously had been coached on what they needed to include such as specific indictors that might be valuable to their mission partners to understand. At this exercise, they included those indicators. In another instance, one team member who had never run a hunt mission struggled at first. Hottel stepped in and with just a little guidance, the leader became more disciplined and was able to find things much better in the last three days. Benefits of cyberspace in training Training in cyberspace has benefits that other domains don't offer. For one, forces don't need a dedicated battlespace such as the Army's National Training Center or the range used at Nellis Air Force Base for the Air Force's Red Flag. With cyber, a custom range can be built and forces from all across the world can come in and participate. The range used for the hunt exercises stays up weeks after the formal event so individuals or teams can try their hand, though they obviously won't be eligible for the Goblet of Cyber trophy. All of this could change with the Persistent Cyber Training Environment (PCTE). PCTE is a major program being run by the Army on behalf of Cyber Command and the joint force to provide a web-based cyber training environment where cyber warriors can remotely plug in around the world and conduct individual training, collective team training or even mission rehearsal — all of which does not exist on a large scale currently. Hottel said that his forces haven't been limited thus far without PCTE. Though, once the platform is online, they can upload the range they used for a competition and it can be accessed by anyone across the joint cyber mission force. Testing new concepts But in the meantime, smaller, unit level exercises like those run by the 567th allow forces to test concepts and learn from others. Unlike larger exercises that have requirements and stated objectives, smaller exercises can serve as a proving ground for staying sharp and pushing the envelope. This allows local units more control over what their personnel do but can also allow teams to test new concepts in a relatively risk-free environment. “Let's say that a national [cyber protection] team wants to test out ... whatever they're currently using because they feel like it would provide them an advantage so they want to test out something,” Hottel said. “We can throw that on the range as well and they can utilize an entirely defensive tool set. We're not trying to make people tool experts, we're trying to make them tradecraft, defensive hunters.” Hottel also said that personnel playing on the archived range can bring new ideas, which can then be tested during the next exercise. In some cases, they may come up with an idea on their own and bring it to the next exercise to see if it actually works. Ultimately, the event is designed to create better cyber warriors. “We're not trying to make people tool experts, we're trying to make them tradecraft, defensive hunters,” Hottel said. https://www.fifthdomain.com/dod/air-force/2020/02/21/the-largest-cyber-exercise-youve-never-heard-of/

  • NATO official warns EU force would be ‘unwise’

    19 novembre 2018 | International, Aérospatial, Naval, Terrestre, C4ISR

    NATO official warns EU force would be ‘unwise’

    By: Joe Gould HALIFAX, Canada — A top uniformed NATO official warned Friday the European Union army concept endorsed by French President Emmanuel Macron and German Chancellor Angela Merkel would be “duplicative” and “unwise.” In an interview at the Halifax International Security Forum, UK Air Marshal Sir Stuart Peach, chairman of the NATO Military Committee, pointed to NATO's strength as a single set of forces, with a unique command and control network and planning process. “It's not rhetoric based. It's real planning based on real data,” Peach said. “And therefore, why would you wish to duplicate or replicate the strengths of an existing strong alliance.” The comments came after Merkel on Tuesday floated the idea of a “real, true European army,” to compliment NATO during a speech before a session of the European Parliament. Those remarks virtually echoed Macron's call a week earlier, in an interview with Europe 1. U.S. President Donald Trump called Macron's comments “very insulting” in a spate of Twitter posts as the two held a meeting last week in Paris. Trump himself has tested the strained bonds with some of America's closest allies by pressuring NATO allies to rely less on the U.S. and dedicate a greater percentage of their gross domestic products to defense. On Tuesday, NATO Secretary General Jens Stoltenberg alluded the proposal of a European force at a NATO conference in Berlin, saying he welcomed, “increased EU efforts on defense, because I think that can actually help to strengthen NATO.” European allied militaries can act without the U.S. so long as they use NATO command structures, Stoltenberg said. “It will be not a wise decision by all those nations who are members of both NATO and the European Union to start to have two sets of command structures, or duplicate what NATO is doing,” Stoltenberg said. On Friday, Peach referred to Stoltenberg's remarks, saying, “Of course, as chairman of the military committee, I agree with [Stoltenberg]. It's unwise to duplicate.” Peach emphasized that NATO has a, “single set of forces, and in our processes, those forces are trained, and assured and certified by NATO.” At the conference, Peach had a broader message that the alliance's 29 members member remain committed to it — and that it is adapting with the times. “Throughout the history of the alliance there have been inevitable tussles about how to go forward,” Peach said. “But throughout as a military alliance, we have adapted our command and control structure, responded to new challenges, embraced new members and continued to adapt to new types of warfare and new threats.” Separately, Finland and Norway intend to launch diplomatic discussions with Moscow over suspected GPS signal-jamming by Russia's military, which overlapped with NATO's Trident Juncture exercises, the largest maneuvers in the High North since the end of the Cold War. Peach on Friday would not confirm the interference took place, but called the principle of freedom of navigation, “very, very important, both to NATO and the International community.” “Freedom of navigation is not just freedom of navigation at sea, so we need to analyze claims with data. And anything that interrupts freedom of navigation is important to be reported," he said. How to manage and operate within the electromagnetic spectrum are important topics that deserve more attention, he said. https://www.defensenews.com/global/europe/2018/11/17/nato-official-warns-eu-force-would-be-unwise/

Toutes les nouvelles