29 janvier 2020 | International, C4ISR

Next phase of Next Generation Jammer Mid-Band awarded

El Segundo, Calif., January 28, 2020 /PRNewswire/ - Raytheon Company (NYSE: RTN) was awarded a $403M System Demonstration Test Articles contract with the U.S. Navy for Next Generation Jammer Mid-Band. The SDTA pods will be delivered to the fleet once developmental and operational testing is complete.

"These test assets will be used to show NGJ-MB is ready for operation," said Dan Theisen, director at Raytheon Electronic Warfare Systems. "We're at the stage where testing is essential. The test program is on target to meet Initial Operating Capability in 2022."

NGJ-MB provides significantly improved radar and communication jamming performance and capacity, as well as improved reliability and maintainability, for EA-18G Growler crews. Commanders will use NGJ-MB to deny, degrade and deceive the enemy's use of the electromagnetic spectrum through advanced jamming techniques.

Raytheon delivered the first NGJ-MB pod to the U.S. Navy for testing in July of 2019.

About Raytheon
Raytheon Company, with 2018 sales of $27 billion and 67,000 employees, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 97 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I® products and services, sensing, effects and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Massachusetts. Follow us on Twitter.

Raytheon Company
Space and Airborne Systems
McKinney, Texas

Media Contact
Dana Carroll
+1.310.647.4352
saspr@raytheon.com

View original content to download multimedia:http://www.prnewswire.com/news-releases/next-phase-of-next-generation-jammer-mid-band-awarded-300994130.html

Sur le même sujet

  • For DoD cyber, 2019 is the year of doing

    31 janvier 2019 | International, C4ISR

    For DoD cyber, 2019 is the year of doing

    By: Mark Pomerleau Following a year of cyberspace strategizing, 2019 will be all about implementing rules and tools, according to the Department of Defense's top uniformed cyber policy adviser. Appearing Jan. 29 before the Senate Armed Services Subcommittee on Cybersecurity, Brig. Gen. Dennis Crall said the department knows where it needs to head following last year's DoD cyber strategy (the first in three years) and now is the time to show results. “This is the year of outcomes and that's what we're focused on — delivering the capabilities and improvements that we've discussed for some time,” he told the committee, adding that the strategy process allowed them to take a look at some departmental gaps and get after them. The strategy actually has actionable lines of effort and there are things they can do to measure progress, he said. The document lays out five objectives and five areas of interest under its strategic approach. The five objectives include: Ensuring the joint force can achieve its missions in a contested cyberspace environment; Strengthening the joint force by conducting cyberspace operations that enhance U.S. military advantages; Defending U.S. critical infrastructure from malicious cyber activity that alone, or as part of a campaign, could cause a significant cyber incident; Securing DoD information and systems against malicious cyber activity, including DoD information on non-DoD-owned networks; and Expanding DoD cyber cooperation with interagency, industry, and international partners. The five areas of interest under the guise of its strategic approach include building a more lethal joint force; competing and deterring in cyberspace; strengthening alliances and attracting new partners; reforming the department; and cultivating talent. The strategy also notes DoD must take action in cyberspace during day-to-day competition to preserve U.S. military advantages and defend U.S. interests. The focus will be on nation states that can pose strategic threats to the United States, namely China and Russia. “We will conduct cyberspace operations to collect intelligence and prepare military cyber capabilities to be used in the event of crisis or conflict,” the document says. Dana Deasy, the department's chief information officer, told the same committee that the threat from Russia and China is so acute he is briefed weekly from U.S. Cyber Command and the National Security Agency on them. This allows him to understand their offensive and defensive posture relative to the DoD. “Suffice to say that these are very strong, capable adversaries, but at the same time we have some strong, capable abilities ourselves,” he said. Cyber Command has now assembled a full force of cyberwarriors and received limited acquisition authority to start equipping them. However, there is much more work to be done. In fact, aside from individual tools, the force is still in need of a training range where cyberwarriors can do individual and collective training, as well as mission rehearsal, similar to rifle ranges or national training centers in the physical world. The Persistent Cyber Training Environment, being run by the Army for the joint force, will get after this; however, it is still in the prototype phase with a limited capability delivered to users. Additionally, the force needs a large-scale command-and-control platform that will house tools, provide commanders global situational awareness of forces and enable forces to plug into operations from remote locations. This is the goal of Unified Platform, which is also still in the prototype phase, though officials have said a limited product could be delivered as early as the spring. https://www.fifthdomain.com/dod/2019/01/30/for-dod-cyber-2019-is-the-year-of-doing

  • Japan confirms details of F-15J upgrade program worth $5.6 billion

    18 février 2022 | International, Aérospatial

    Japan confirms details of F-15J upgrade program worth $5.6 billion

    A government spokesman confirmed to Defense News that the 68 F-15s in line for the upgrade will be single-seat F-15Js that have previously gone through the Multi-Stage Improvement Program. That leaves the fate of 34 jets still up in the air.

  • On the new battlefield, the Navy has to get software updates to the fleet within days, acquisition boss says

    26 septembre 2018 | International, Naval, C4ISR

    On the new battlefield, the Navy has to get software updates to the fleet within days, acquisition boss says

    By: David B. Larter The Navy has to get software updates and patches to the fleet within days if it's going to win in the future, the Department of the Navy's acquisition boss said Sept. 25 at Modern Day Marine. James Geurts, assistant secretary of the Navy for research, acquisition and development, said the fleet has been working on the rapid development of software to get needed upgrades to the ships ahead of pier-side availabilities, a pace he said was too slow for the modern battlefield. “We recently did one of our proof-of-principles to say: ‘How do you take ... software, get it system certified, get it cyber certified then get it out over the airwaves, uploaded on to a ship and into the combat system in 24 hours,” Geurts said. “My view is unless we get to the point where I can identify a software requirement, whether it's an [artificial intelligence] algorithm or something, find the solution, get it checked out on the network, give it whatever cyber-proofing it needs and get it into the fight in less than a week, we are not going to be successful in the long run.” The Navy has increasingly found that its current systems are capable of adjusting to new threats through software upgrades rather than buying new systems and installing them, a time-consuming and cripplingly expensive process that has been the norm in years past. Geurts said the Navy had to have a software architecture that was amenable to rapid upgrades so that developers would not need to re-test the underlying architecture each time a patch or fix is uploaded. Furthermore, the service also has to develop cyber security standards that don't just weigh whether or not something can be compromised but begin to think of it more in terms of risks associated. “The answer isn't yes or no, it's ‘Commander here is your risk.' And then weigh the risk of doing that [upgrade] versus a potential cyber impact so that commanders can make reasonable command decisions. Because there is always a risk to not doing something. We often talk about the risk of doing something, we don't often talk about the risk of not doing it.” Geurts told a gaggle with reporters after the talk that he was not talking about uploading whole new programs that sailors might be unfamiliar with but more iterative upgrades. "Don't take that to an extreme to where we will load on something that nobody has ever seen before, but it could be that there is a particular issue or new need, and you can envision us testing and training that shore-side, making sure it's right – we don't want to wait for the ship to come home we could potentially blast that out [to the fleet.]" The Navy is also working more with having digital doppelgangers of its combat system on board its ships so that new technologies can be tested by the crew and commanders before its uploaded into the main combat system, a hedge against reaping unintended consequences by uploading a feature or patch without knowing exactly how it will fit into the ship's systems. "The other thing we are doing a lot with is digital twins, where [the ship] might have the combat system that it's fighting with as well as a digital twin,” Geurts explained. “So you might be able to upload that new feature in the digital twin so you could have both, then it's up to the commander whether it's something you adopt or not.” https://www.c4isrnet.com/digital-show-dailies/modern-day-marine/2018/09/25/on-the-new-battlefield-the-navy-has-to-get-software-updates-to-the-fleet-within-days-acquisition-boss-says

Toutes les nouvelles