26 septembre 2018 | International, Naval, C4ISR

On the new battlefield, the Navy has to get software updates to the fleet within days, acquisition boss says

By:

The Navy has to get software updates and patches to the fleet within days if it's going to win in the future, the Department of the Navy's acquisition boss said Sept. 25 at Modern Day Marine.

James Geurts, assistant secretary of the Navy for research, acquisition and development, said the fleet has been working on the rapid development of software to get needed upgrades to the ships ahead of pier-side availabilities, a pace he said was too slow for the modern battlefield.

“We recently did one of our proof-of-principles to say: ‘How do you take ... software, get it system certified, get it cyber certified then get it out over the airwaves, uploaded on to a ship and into the combat system in 24 hours,” Geurts said.

“My view is unless we get to the point where I can identify a software requirement, whether it's an [artificial intelligence] algorithm or something, find the solution, get it checked out on the network, give it whatever cyber-proofing it needs and get it into the fight in less than a week, we are not going to be successful in the long run.”

The Navy has increasingly found that its current systems are capable of adjusting to new threats through software upgrades rather than buying new systems and installing them, a time-consuming and cripplingly expensive process that has been the norm in years past.

Geurts said the Navy had to have a software architecture that was amenable to rapid upgrades so that developers would not need to re-test the underlying architecture each time a patch or fix is uploaded.

Furthermore, the service also has to develop cyber security standards that don't just weigh whether or not something can be compromised but begin to think of it more in terms of risks associated.

“The answer isn't yes or no, it's ‘Commander here is your risk.' And then weigh the risk of doing that [upgrade] versus a potential cyber impact so that commanders can make reasonable command decisions. Because there is always a risk to not doing something. We often talk about the risk of doing something, we don't often talk about the risk of not doing it.”

Geurts told a gaggle with reporters after the talk that he was not talking about uploading whole new programs that sailors might be unfamiliar with but more iterative upgrades.

"Don't take that to an extreme to where we will load on something that nobody has ever seen before, but it could be that there is a particular issue or new need, and you can envision us testing and training that shore-side, making sure it's right – we don't want to wait for the ship to come home we could potentially blast that out [to the fleet.]"

The Navy is also working more with having digital doppelgangers of its combat system on board its ships so that new technologies can be tested by the crew and commanders before its uploaded into the main combat system, a hedge against reaping unintended consequences by uploading a feature or patch without knowing exactly how it will fit into the ship's systems.

"The other thing we are doing a lot with is digital twins, where [the ship] might have the combat system that it's fighting with as well as a digital twin,” Geurts explained. “So you might be able to upload that new feature in the digital twin so you could have both, then it's up to the commander whether it's something you adopt or not.”

https://www.c4isrnet.com/digital-show-dailies/modern-day-marine/2018/09/25/on-the-new-battlefield-the-navy-has-to-get-software-updates-to-the-fleet-within-days-acquisition-boss-says

Sur le même sujet

  • Raytheon awarded $17.8M for computers to launch Navy's anti-radiation missiles

    15 juillet 2019 | International, Aérospatial

    Raytheon awarded $17.8M for computers to launch Navy's anti-radiation missiles

    By Allen Cone July 11 (UPI) -- Raytheon was awarded a $17.8 million contract to deliver 114 computers to launch the U.S. Navy's high-speed anti-radiation missiles. The contract for the system, known as HARM, will include two pre-production units, one first article test unit and 111 production units in support of the Navy, the Defense Department announced Wednesday. Work will be performed at Raytheon's plant in Tucson, Ariz., and is expected to be completed in October 2021. Naval working capital, and fiscal 2017, 2018 and 2019 aircraft procurement funds in the full amount will be obligated at time of award, $6.2 million of which will expire at the end of the current fiscal year. The CP-1001B/C HARM Command Launch Computer is an electronics subsystem installed on the airframe to interface with the AGM-88 A/B/C HARM Missile. "Continued hardware and software upgrades have allowed HARM to counter advanced radar threats. HARM has proven itself in both reliability and combat performance," Raytheon said on its website. HARM's primary mission is designed to suppress or destroy an enemy's surface-to-air missile radar and radar-directed air defense artillery systems. When it is airborne, the 800-pound missile can operate in preemptive, missile-as-sensor and self-protect modes. The AGM-88 HARM is a joint U.S. Navy and Air Force program developed by the Navy and Raytheon. The system is employed on a variety of Navy, Air Force and Marine Corpsaircraft, including the EA-6B, F-16 and F/A-18. In addition, the HARM is available to nations through foreign military sales. The AGM-88 HARM was first involved in combat against Libyan targets in the Gulf of Sidra in 1986. During Operation Desert Storm, U.S. aircraft fired 1,961 missiles against Iraqi targets. https://www.upi.com/Defense-News/2019/07/11/Raytheon-awarded-178M-for-computers-to-launch-Navys-anti-radiation-missiles/9561562846921/

  • AC-130J lands at Kirtland as US Air Force streamlines gunship training

    16 septembre 2024 | International, Aérospatial

    AC-130J lands at Kirtland as US Air Force streamlines gunship training

    Consolidating AC-130J Ghostrider training into one location will reduce gunship training by 30 days, the U.S. Air Force said.

  • Brazilian Hacker Charged for Extorting $3.2M in Bitcoin After Breaching 300,000 Accounts

    26 décembre 2024 | International, C4ISR, Sécurité

    Brazilian Hacker Charged for Extorting $3.2M in Bitcoin After Breaching 300,000 Accounts

    Brazilian hacker charged with $3.2M Bitcoin extortion for stealing data from 300,000 users in 2020.

Toutes les nouvelles