15 octobre 2019 | International, Aérospatial

Sikorsky Unveils Raider-X Proposal For FARA Armed Scout

Graham Warwick

Sikorsky is emphasizing growth capability to stay ahead of evolving threats as it unveils its offering in the U.S. Army's Future Attack Reconnaissance Aircraft (FARA) competition, the Raider-X.

The coaxial rigid-rotor compound helicopter is a development of the S-97 Raider prototype now in flight testing.

The Raider-X is about 20% larger, with a 14,000-lb. gross weight compared with 11,000 lb. for the S-97, and a 39-ft. rotor diameter compared with 34 ft. for the Raider. The Army requires a rotor diameter of no more than 40 ft. so that FARA can fly between buildings in urban combat.

The Raider-X will exceed the FARA's threshold maximum speed of 180 kt. Sikorsky is not saying how fast it will fly, but notes the S-97 has reached 215 kt., and 207 kt. in level flight—exceeding the 205 kt. target in the Army's initial capability document, says Tim Malia, director of Future Vertical Lift - Light.

The Army subsequently reduced the threshold maximum speed to enable a wider competition for the FARA program. But Malia says the greater speed and payload capability of Sikorsky's X2 coaxial rigid-rotor compound configuration compared with a conventional helicopter provides growth capacity.

“We looked at a single main rotor helicopter for FARA, but it would be minimally compliant in the early 2020s. We need to be able to stay ahead of the threat into the 2030s and 2040s,” he says.

Bell is proposing a winged, single-main-rotor helicopter for FARA, while AVX Aircraft is offering a coaxial-rotor, ducted-fan compound. Boeing and Karem Aircraft have yet to unveil their concepts.

“Single main rotor will not be able to keep up. It's already tapped out meeting the minimal FARA requirements. It does not have the ability to grow capability over time,” Malia says. “We didn't want to pull out all the stops to be minimally compliant when we had X2 able to carry more payload and go faster.”

The Raider-X has four-blade rotors and a pusher propulsor. The coaxial rotors generate lift only on the advancing sides, eliminating retreating-blade stall and enabling higher speed. At high speed, 90% of the engine power goes to the propulsor, says Bill Fell, senior experimental test pilot. The propulsor is declutched at low speed to reduce noise.

The Raider-X closely resembles the S-97 prototype, with side-by-side seating. Compared with tandem seating, this improves crew coordination and situational awareness, Malia says. “And we can do it aerodynamically because of the robust performance inherent in X2. We are not trying to get out every last ounce of drag.”

Behind the cockpit is a large internal weapons bay. Internal carriage of missiles and unmanned aircraft—which the Army calls air-launched effects (ALE)—is a FARA requirement, but Malia says the cabin-like volume of Raider-X's bay provides growth space for future, larger systems. “The minimum threshold works now, but what if in 2030 there is a new ALE that can be decisive, but can't be carried?” he asks.

The Raider-X is powered by a single 3,000-shp-class General Electric T901 turboshaft—government-furnished equipment to all FARA bidders. “We do not have an additional engine to increase speed,” Malia says, referring to the supplemental power unit in Bell's 360 Invictus. This augments power from the single T901 to give the single-main-rotor, tandem-seat Invictus a 185-kt. maximum speed.

“We use the power available and have a solid design built around it,” he says. “The T901 provides speeds out of the chute in excess of requirements and, as it improves, we can take direct benefit. We have a growth path to additional speed and payload as the T901 power increases.”

Sikorsky is using the industry-funded S-97 prototype to reduce risk for its FARA bid, conducting flight testing to validate design models and optimize the Raider-X. This includes flying new rotor blades designed to reduce drag and vibration. “We are getting exactly the results the models said,” Malia says.

With two rotor systems and a propulsor, Sikorsky is paying close attention to the Raider-X's cost. “We have done a complete affordability analysis and design to cost. We are extremely confident we will come in under the cost goal,” he says.

Several divisions of parent company Lockheed Martin are part of Sikorsky's FARA team, Malia says, including Aeronautics, Missiles and Fire Control and Rotary and Mission Systems. Swift Engineering will build the airframe if Sikorsky wins one of two FARA competitive prototype contracts scheduled to be awarded in March 2020. The Army flyoff is planned for 2023, with the first unit to be equipped by 2028.

“There is a critical cap in vertical lift, in attack/reconnaissance, and that gap is really impactful to the Army in the 2020s, ‘30s, ‘40s, even ‘50s. So there is a need for a long-term solution,” Malia says. “The threat is projected to evolve rapidly, so we require significant capability growth on our side to stay ahead. Raider-X can provide an asymmetric advantage in the 2030s-50s.”

https://aviationweek.com/defense/sikorsky-unveils-raider-x-proposal-fara-armed-scout

Sur le même sujet

  • Russian air defence systems destroy 41 Ukraine-launched drones -Russian defence ministry | Reuters

    5 décembre 2023 | International, Aérospatial

    Russian air defence systems destroy 41 Ukraine-launched drones -Russian defence ministry | Reuters

    Russian air defence systems destroyed or intercepted a total of 41 Ukraine-launched drones overnight and early morning on Tuesday, the Russian defence ministry said.

  • DoD and Australia ink first-ever cyber training partnership

    9 décembre 2020 | International, C4ISR, Sécurité

    DoD and Australia ink first-ever cyber training partnership

    Mark Pomerleau WASHINGTON — The U.S. military and Australia announced a first-of-its-kind agreement to develop a virtual cyber training range together. U.S. Cyber Command will incorporate Australian Defence Force feedback into the Persistent Cyber Training Environment (PCTE), per a Cyber Training Capabilities Project Arrangement signed Nov. 3. This agreement is valued at $215.19 million over six years and provides the flexibility to develop cyber training capabilities for the future, Cyber Command said in a release Dec. 4. PCTE is an online client that allows Cyber Command's warriors to log on from anywhere in the world to conduct individual or collective cyber training and mission rehearsal. In the physical world, military forces regularly go to a training facility, such as the National Training Center at Fort Irwin, to work on particular concepts or rehearse before deploying. But a robust environment has not existed for the Department of Defense's cyber warriors, creating readiness gaps. The program is run by the Army on behalf of the joint cyber force. “Australia and the U.S. have a strong history of working together to develop our cyber capabilities and train our people to fight and win in cyberspace,” said Australian Army Maj. Gen. Marcus Thompson, the Australian signatory and head of Information Warfare for the Australian Defence Force. “This arrangement will be an important part of the ADF's training program, and we look forward to the mutual benefits it will bring.” In the past, the two countries created cyber training ranges separately, which could take months and stymied cooperation efforts, Cyber Command noted. U.S. officials have long held that the military will never fight alone, and this extends to cyberspace. “This project arrangement is a milestone for U.S.-Australian cooperation. It is the first cyber-only arrangement established between the U.S. Army and an allied nation, which highlights the value of Australia's partnership in the simulated training domain,” said Elizabeth Wilson, U.S. signatory and Deputy Assistant Secretary of the Army for Defense Exports and Cooperation. “To counter known and potential adversarial threats, the Army has recalibrated our strategic thinking; we've made smart decisions to refocus our efforts to invest in the new, emerging and smart technologies that will strengthen our ability to fight and win our nation's wars.” Gen. Paul Nakasone, head of Cyber Command and the National Security Agency, has made partnerships — with other nations, private sector actors and academia — a key pillar of his tenure. Cyber Command has deployed personnel to other nations to conduct what it calls hunt forward missions, which serve the dual role of helping shore up defenses of partners while allowing U.S. cyber personnel to potentially uncover tools used by adversaries to better understand their techniques. Congress, in the annual defense policy bill for fiscal 2021, also authorized a pilot program with Vietnam — which many cyber experts assert is rapidly growing its cyber capabilities — Thailand and Indonesia to enhance their cybersecurity, resilience and readiness of military forces. https://www.c4isrnet.com/cyber/2020/12/04/dod-and-australia-ink-first-ever-cyber-training-partnership/

  • What new documents reveal about Cyber Command’s biggest operation

    22 janvier 2020 | International, C4ISR, Sécurité

    What new documents reveal about Cyber Command’s biggest operation

    Mark Pomerleau New documents provide insight into the growing pains U.S. Cyber Command faced in building a force while simultaneously conducting operations. The documents, which were released as part of a Freedom of Information Act request from the National Security Archive at George Washington University and later shared with journalists, are a series of internal briefings and lessons from the Defense Department's most complex cyber operation at the time, Operation Glowing Symphony. That operation was part of the larger counter-ISIS operations — Joint Task Force-Ares — but specifically targeted ISIS's media and online operations, taking out infrastructure and preventing ISIS members from communicating and posting propaganda. While Cyber Command described the operation, which took place in November of 2016, as a victory in the sense that it “successfully contested [ISIS] in the information domain,” the documents demonstrate the extent to which the command was still learning how to conduct operations and the exact steps to follow. “Process maturation is something they pull out a lot. Obviously, as CYBERCOM was standing up, it was pulling together plans for how they were going to operate. They actually hadn't operated that much,” Michael Martelle, cyber vault fellow at the National Security Archive, told reporters. “A lot of these frameworks were formed in theory. Now they go to try them out in practice.” Cyber Command leaders have stressed in public remarks for years that the command was building its force while operating. But the extent of those operations has been limited. Officials in recent years have explained that the command didn't undertake many offensive operations. One official said last year he could count on less than two fingers the number of operations, Cyber Command conducted in the last decade or so. One member of Congress said DoD didn't conduct an offensive cyber operation in five years. But when they were in action, in this case with Operation Glowing Symphony, Martelle said the documents show cyber leaders did not anticipate the amount of data they would access. “They actually weren't prepared for the amount of data they were pulling off of ISIS servers ... CYBERCOM was not set up for an operation of this magnitude from day one,” he said. “They had to learn on the fly, they had to acquire on the fly, they had to grow on the fly.” The documents note that Cyber Command's capability development group, is “developing USCYBERCOM data storage solutions.” The capabilities develop group, now known as the J9, serves as the advanced concepts and technology directorate and worked to plan and synchronizing cyber capability development and developed capabilities to meet urgent operational needs. Experts had noted that in the past the CDG/J9 had been stressed in recent years by a limited staff and burdened by developing tools for operational needs, namely Joint Task Force-Ares. Another example of potential growing pains the documents point to was the fact that updates to operations checklists were not made available readily to the team. Finally, the documents note that authorities and processes the command was operating under that the time were restrictive in some cases. “Absent of significant policy changes from [the office of the secretary of defense], USCYBERCOM is limited in its ability to challenge ISIS [redacted]. As a result, USCYBERCOM has [redacted] to achieve our objectives,” the executive summary of a 120-day assessment of Operation Glowing Symphony says. Those authorities and processes have been streamlined by the executive branch and Congress in recent years. Commanders now follow a process that defaults toward action, Maj. Gen. Dennis Crall, deputy principal cyber adviser and senior military adviser for cyber policy, said during an event Jan. 9. He explained the updated process provides continuity, tempo, pace and timing. Ultimately, Martelle noted that the real importance behind Operation Glowing Symphony is that Cyber Command used the experience from those events and Joint Task Force-Ares more broadly as a template for future operations. Cyber Command's top official, Gen. Paul Nakasone, who was also led Joint Task Force-Ares, has noted that the task force laid the foundation for the Russia Small Group, which was created to combat election interference in the 2018 midterms. “This concept of a task force lives on. A lot of that thinking came from what we were doing in 2016,” he told NPR. That task force has now evolved to be more all encompassing covering election threats more broadly. https://www.fifthdomain.com/dod/cybercom/2020/01/21/what-new-documents-reveal-about-cyber-commands-biggest-operation/

Toutes les nouvelles