5 octobre 2020 | International, Aérospatial

Pentagon's Lord blames KC-46A's fixed-price contract structure for further programme issues

Pat Host

The Pentagon's top acquisition executive blames the Boeing KC-46A Pegasus aerial refuelling tanker's fixed-price contract structure for the programme's ongoing issues.

Senator Jeanne Shaheen of New Hampshire said during a 1 October hearing that Boeing cancelled a 2 October KC-46A delivery to the 157th Air Refueling Wing (ARW) in New Hampshire due to electrical problems with the aircraft. Ellen Lord, under secretary of defense for acquisition and sustainment (A&S), said in response that the root cause of the KC-46A's problems is the contract type that was awarded to Boeing.

Lord said that one issue is the technical solution that was the aircraft's original design, which is now being redesigned. The programme, she said, also has a myriad of manufacturing issues including ongoing foreign object debris (FOD) problems. The programme, Lord said, has an engineering design and execution issue as well as a manufacturing problem.

Boeing's fixed-price contract structure, previously lauded as an example of improved government contracting, means the company pays the Pentagon for cost overruns. The contract structure was considered an improvement over cost-plus contracting, where the government reimburses the contractor for cost overruns.

One expert said that Boeing paying for cost overruns on the KC-46A disincentivises the company from improving its performance. Doug Birkey, Mitchell Institute for Aerospace Studies executive director, told Janes

https://www.janes.com/defence-news/news-detail/pentagons-lord-blames-kc-46as-fixed-price-contract-structure-for-further-programme-issues

Sur le même sujet

  • L3Harris to build prototype satellite capable of tracking hypersonic weapons

    18 janvier 2021 | International, Aérospatial

    L3Harris to build prototype satellite capable of tracking hypersonic weapons

    Nathan Strout WASHINGTON — The Missile Defense Agency awarded L3Harris Technologies a $121 million contract to build a prototype satellite capable of tracking hypersonic weapons, the agency announced Jan. 14. Under the contract, L3Harris is tasked with building an on-orbit prototype demonstration for the agency's Hypersonic and Ballistic Tracking Space Sensor, a proliferated constellation in low Earth orbit that is capable of detecting and tracking hypersonic weapons. The constellation is designed to fill the gap in the country's missile defense architecture created by hypersonic weapons, which are dimmer than traditional ballistic missiles, making them harder to see with the nation's infrared sensors based in geosynchronous orbit. In addition, they are able to maneuver around terrestrial sensors. With China and Russia developing these weapons, the Department of Defense is eager to develop a new constellation that can detect and track the threats anywhere in the world. And so is Congress — in December lawmakers set aside $130 million to fund the project. The HBTSS design solves the hypersonic weapon problem by placing the sensor much closer to the Earth's surface in the lower orbit, making it easier to see the threat. But because the sensors are closer to the Earth, they have a far more limited field of view than the sensors in geosynchronous orbit. In order to achieve global coverage, the Missile Defense Agency wants a proliferated constellation made up of dozens of satellites on orbit. L3Harris was one of four companies awarded $20 million contracts in 2019 to develop a prototype payload design and risk reduction demonstration for HBTSS, along with Northrop Grumman, Leidos and Raytheon Technologies. According to the initial contract announcements, work on those designs was due Oct. 31, 2020. With this most recent award, L3Harris has won the subsequent competition between the four companies to build the actual prototype. The company has also been selected to build satellites for the Space Development Agency that will track hypersonic threats and feed data to HBTSS. In October, L3Harris won a $193 million contract to build four of the agency's eight wide field of view (WFOV) satellites, with SpaceX building four more. According to Space Development Agency leaders, their satellites will work in conjunction with HBTSS satellites to track hypersonic threats. The WFOV satellites will provide initial detection and tracing of the weapons, passing custody from satellite to satellite as the threats traverse the globe. Then, the WFOV satellites will pass custody to the medium field of view HBTSS satellites, which can provide targeting solutions with their more accurate sensors. The WFOV satellites are scheduled for launch as early as September 2022. Work on the HBTSS prototype contract will be complete in July 2023. https://www.c4isrnet.com/battlefield-tech/space/2021/01/14/l3harris-to-build-prototype-satellite-capable-of-tracking-hypersonic-weapons/

  • KONGSBERG, Norway and Germany to develop new “Super Missile”

    27 novembre 2023 | International, Aérospatial

    KONGSBERG, Norway and Germany to develop new “Super Missile”

    Today's NSM was developed in the early 2000s and delivered to the Norwegian Armed Forces from 2011 to 2015

  • This training tool could be the answer to stop mass cyberattacks

    9 juillet 2020 | International, C4ISR, Sécurité

    This training tool could be the answer to stop mass cyberattacks

    Mark Pomerleau At air bases across Europe, networks are under attack. Malicious hackers have gained access to sensitive systems, information, controls and critical infrastructure. But cyber operators from U.S. Cyber Command, in concert with Five Eyes partners, have been called in to thwart these attempts in real time. This was the main scenario for this year's capstone cyber training exercise put on by Cyber Command, Cyber Flag 20-2. The exercise, which took place June 15-26 and was exclusively defensive in nature, saw more than 500 participants and 17 teams participating from five countries across nine time zones, and it included America's National Guard, the U.S. Energy Department and the Five Eyes alliance — Australia, Britain, Canada, New Zealand and the U.S. Australia, however, did not participate during this iteration. Officials told reporters this week that the purpose of Cyber Flag 20-2 was to continue building the community of defensive cyber operations and to improve the overall capability of the Five Eyes countries to defend against cyber aggressors. The drill involved teams defending IT and operational security networks against a live, opposing force trying to disrupt, deny and degrade the air bases' operations. The networks under attack were industrial control systems simulated to generate network traffic for an aviation fuel farm, power grid, air traffic control radars and electronic access control systems. The attacks came in the form of malware that targeted devices responsible for fuel and power. But the unique aspect of this year's exercise, as C4ISRNET previously reported, was the use of a new remote cyber training tool called the Persistent Cyber Training Environment. PCTE is an online client that allows Cyber Command's cyber warriors, as well as partner nations, to log on from anywhere in the world to conduct individual or collective cyber training as well as mission rehearsal, which to date had not existed for the cyber force as it does for physical troops. The program is run by the Army on behalf of the joint cyber force. The platform not only allowed the exercise to continue as planned amid the coronavirus pandemic, but it enabled collaboration and simultaneous training across the world. A new way to train Officials say PCTE is providing Cyber Command with an entirely new way to train cyber forces, which previously was difficult given a lack of infrastructure and the time needed to set up ranges and scenarios. It also allows Cyber Command and military units to conduct more frequent training. Cyber Flag typically was Cyber Command's largest and only holistic tactical training event, held annually during June. For units, aside from Cyber Flag, there were no other ways to stay sharp on their skills unless they built their own environments. Now, Cyber Command plans to hold more exercises, with Cyber Flag 20-3 occurring in the fall. “The delivery of the Persistent Cyber Training Environment absolutely allows us to increase the frequency and the complexity of exercises that are conducted by the command itself,” Coast Guard Rear Adm. John Mauger, director of exercises and training at Cyber Command, told reporters. “Going forward, I would expect you to see a series of exercises throughout the year where we are reaching out to the different teams to test their capabilities or to focus on specific issues that are of concern or interest to us. “Going forward, we're going to get the benefits of both those distributed exercises along with increasingly complex exercises as PCTE is instantiated across both the secret network and the top-secret network.” Scenarios and environments can be stored, saved, reused and modified if needed in the system for later exercises. Smaller units will also be able to leverage these scenarios to practice whenever needed. The PCTE virtual environment for this year's exercise included 25 interconnected ranges of more than 3,000 virtual machines — a high-fidelity network that simulated and emulated open internet traffic with more than 4,000 static websites that store and share data. The simulated air base networks created in PCTE had fully configured Windows active directory domains with over 100 nodes running more than 10 types of major operating systems, along with 35 simulated user control workstations actively surfing the internet and using Microsoft Office products to access, create and transfer files. Moreover, officials also explained PCTE can be integrated into larger, multi-combatant command-type exercises to simulate the cyber effects, such as Global Lightning and its companion Cyber Lightning. Global Lightning is an annual global exercise run by Strategic Command to test integration across several geographic and functional combatant commands. Cyber Lightning is Cyber Command's portion to the exercise. “We think that is the next evolution of the Persistent Cyber Training Environment and how we take to the tier 1 exercises, incorporate cyber effects. They're no longer white-carded,” Col. Tanya Trout, Cyber Command's PCTE director and acting director of the Joint Cyber Training Enterprise, told reporters. White carding involves telling exercise participants that a certain action has occurred. This was typical of cyber effects, given it was difficult to realistically simulate them, which diminished the training value in exercises because participants didn't experience the full breadth of these actions. Now, these activities can play a real role in exercises increasing the overall fidelity of training across the joint force and continuity of all operations of warfare. The system will also be able to be used for mission rehearsals. A Cyber Command official said the force can input prior operations, such as those used against the Islamic State group, to train against. Additionally, they'll be able to upload to the platform malware discovered in operations. The PCTE program office, which is in the prototyping phase despite delivering the first portion to Cyber Command in February 2020, also learned valuable lessons in Cyber Flag. Officials said the two-week exercise provided the program office with six months' worth of data it can use to make significant improvements. Prior to the February delivery, the program office leveraged several smaller-scale training events at the unit level to incrementally increase capabilities and scalability as well as help geographically dispersed teams prepare for tier 1 exercises like Cyber Flag. Overall, officials are happy with how the system performed in its first tier 1 exercise, pointing to little to no latency issues, though there were periodic improvement tickets. “What we found through the rapid development and use of the Persistent Cyber Training Environment is that we really have a unique capability to move forward with,” Mauger said. https://www.c4isrnet.com/dod/cybercom/2020/06/25/this-training-tool-could-be-the-answer-to-stop-mass-cyberattacks

Toutes les nouvelles