7 août 2018 | International, Naval

The US Navy’s top acquisition priority stumbles out of the gate

By:

The U.S. Navy's $122.3 billion Columbia-class ballistic missile submarine program is off to an inauspicious start after faulty welding was discovered in several missile tubes destined for both the Columbia and Virginia-class programs, as well as the United Kingdom's follow-on SSBN program.

In all, 12 missile tubes manufactured by BWXT, Inc., are being scrutinized for substandard welds. Seven of the 12 had been delivered to prime contractor General Dynamics Electric Boatand were in various stages of outfitting, and five were still under construction. The Navy and Electric Boat have launched an investigation, according to a statement from Naval Sea Systems Command spokesman Bill Couch.

“All BWXT welding requiring volumetric inspection has been halted until the investigation is complete,” Couch said.

The bad welds came to light after discrepancies were discovered with the equipment BWXT used to test the welds before shipping them to GDEB, according to a source familiar with the issue.

The discovery of a significant quality control issue at the very outset of fabrication of Columbia injects uncertainty in a program that already has little room for delays. The issue is made even more troubling because it arises from a vendor with an excellent reputation, and raises questions about whether the Navy can deliver Columbia on time, something the Navy says is vital to ensuring continuous nuclear deterrent patrols as the Ohio class reaches the end of its service life.

Full Article: https://www.defensenews.com/breaking-news/2018/08/06/the-us-navys-top-acquisition-priority-stumbles-out-of-the-gate-after-bad-welds-discovered-in-missile-tubes/

Sur le même sujet

  • US Air Force reworks tanker modernization plans, slashes next buy

    7 mars 2023 | International, Aérospatial

    US Air Force reworks tanker modernization plans, slashes next buy

    “Our mobility fleet can no longer operate forward with relative impunity,” Air Force Secretary Frank Kendall said at the AFA Warfare Symposium.

  • The Pentagon is handling cyber vulnerabilities inconsistently

    18 mars 2020 | International, C4ISR, Sécurité

    The Pentagon is handling cyber vulnerabilities inconsistently

    Mark Pomerleau The Department of Defense has not consistently mitigated cyber vulnerabilities identified in a 2012 report, according to the department's inspector general. The DoD IG issued a follow-on report to its 2012 report, issued March 13 and made public March 17, that determined cyber red teams didn't report the results of assessments to organizations and components didn't effectively correct or mitigate the identified vulnerabilities. The new report discovered that components didn't consistently mitigate or include unmitigated vulnerabilities identified in the prior audit and during this audit by red teams during combatant command exercises, operational testing assessments and agency-specific assessments in plans of action and milestones. “Ensuring DoD Components mitigate vulnerabilities is essential to achieve a better return on investment,” the report stated. “In addition, we determined that the DoD did not establish a unified approach to support and prioritize DoD Cyber Red Team missions. Instead, the DoD Components implemented Component-specific approaches to staff, train and develop tools for DoD Cyber Red Teams, and prioritize DoD Cyber Red Team missions.” The report found that DoD didn't establish a unified approach because it didn't assign an organization with responsibility to oversee and synchronize red team activity based on priorities, it didn't assess the resources needed for each red team and identify requirements to train them to meet priorities and it didn't develop baseline tools to perform assessments. “Without an enterprisewide solution to staff, train and develop tools for DoD Cyber Red Teams and prioritize their missions, DoD Cyber Red Teams have not met current mission requests and will not meet future requests because of the increased demands for DoD Cyber Red Team services,” the report said. “Until the DoD assigns an organization to assess DoD Cyber Red Team resources, it will be unable to determine the number of DoD Cyber Red Teams and staffing of each team to support mission needs, which will impact the Do D's ability to identify vulnerabilities and take corrective actions that limit malicious actors from compromising DoD operations.” The DoD IG issued seven recommendations the secretary of defense assign an organization responsibility for. They include: Review and assess red team reports for systemic vulnerabilities and coordinate the development and implementation of enterprise solutions to mitigate them; Ensure components develop and implement a risk-based process to assess the impact of identified vulnerabilities and prioritize funding for corrective actions for high-risk vulnerabilities; Ensure components develop and implement processes for providing reports with red team findings and recommendations to organizations with responsibility for corrective actions; Develop processes and procedures to oversee red team activities, including synchronizing and prioritizing red team missions, to ensure activities align with priorities; Perform a joint DoD-wide mission-impact analysis to determine the number of red teams, minimum staffing levels of each team, the composition of the staffing levels needed to meet current and future mission requests; Assess and identify a baseline of core and specialized training standards, based on the three red team roles that team staff must meet for the team to be certified and accredited; and Identify and develop baseline tools needed by red teams to perform missions. https://www.fifthdomain.com/dod/2020/03/17/the-pentagon-is-handling-cyber-vulnerabilities-inconsistently/

  • Army’s plan to field its network could collapse under an extended continuing resolution

    30 octobre 2019 | International, C4ISR

    Army’s plan to field its network could collapse under an extended continuing resolution

    By: Jen Judson ABERDEEN PROVING GROUND, Md. — Critical fielding plans for major elements of the Army's revamped network could fall apart if Congress does not reach a budget deal soon, according to service leaders in charge of network modernization. Should Congress opt to extend the current continuing resolution, which funds the government at fiscal 2019 budget levels, past the Nov. 21 deadline, the Army will struggle to get more capable radios and other elements of its new and improved network to units. While a shorter extension would be less painful, a yearlong continuing resolution, or CR, would derail the efforts. “The whole fielding plan will collapse without a budget,” Army Secretary Ryan McCarthy said during a recent trip to Aberdeen Proving Ground, Maryland, where he was briefed on the service's efforts to deliver a modernized network to the force. “The longer [the CR] goes, I think it can definitely impact the schedule. If it bleeds into the next calendar year, you can look at a day-for-day slip” until a budget is passed, he said, adding that the longer a CR exists, the more likely the Army will have to reformulate its fielding plan because the units originally intended to receive the equipment won't be available to test the new capabilities and train with them. The Army is scheduled to conduct three major test events next year of its network. The 1st Brigade of the 82nd Airborne Division will assess the first capability set of the new Integrated Tactical Network, or ITN, in February. The manpack and leader radio operational test, which is part of the Handheld, Manpack, and Small Form Fit radio program, is scheduled for the third quarter of FY20. Furthermore, at next year's Defender Europe military exercise, the Army will use the Command Post Computing Environment, the Tactical Server Infrastructure and a number of ITN's initial capabilities to assess interoperability with partners and allies. If a CR extends past the first quarter of the fiscal year, the Army will be unable to test radios with a new waveform, known as TSM, as part of its HMS radio program. The current plan is for the 1st Brigade of the 82nd to test the radios in the third quarter of FY20. The TSM waveform is critical to a modernized network because it provides greater capability than what is currently fielded. The radios with the TSM waveform are more secure, can connect a larger number of radios on a single network, can easily tie into coalition partners' communications, and can more effectively push voice and data. If the Army is faced with a yearlong CR, the HMS radio program would be limited to a $3.7 million budget out of $35.6 million requested in FY20. Without the funding, the manpack and leader radio operational test won't happen until FY21, and the Army will likely have to shift to a different unit to conduct the test because of the operational tempo of the 82nd, according to Maj. Gen. Peter Gallagher, who is in charge of the Army's network modernization. Additionally, if testing can't begin until FY21, the Army's full-rate production schedule will slip. “We're confident that our radios will support the waveform, but we're talking about maybe a situation where we couldn't ramp up production to meet the capability set fieldings without essentially ordering stuff in the absence of that operational test, which is not exactly a best practice,” Gallagher said. The Army is planning to field the radios to four units in 2021: the 1st Brigade of the 82nd; the 173rd Airborne Brigade Combat Team; the 3rd Brigade of the 25th Infantry Division; and the 2nd Brigade of the 82nd. A long-term CR would also prevent the procurement of critical ITN communication enhancement equipment that will also be delivered to the four planned brigade combat teams in FY21. Without the equipment, the Army would have to delay communication patches for light infantry formations. A yearlong CR would affect the fielding of the Tactical Server Infrastructure, or TSI, which is also facing a potential FY20 budget cut. The Senate Appropriations Committee's Defense Subcommittee cut its procurement line by more than half, and it's unclear whether that decrement will survive conference committee. The TSI would only have 26 percent of its funding under a yearlong CR, which means the procurement of TSI servers, both small and large versions, will be delayed. A $45.86 million reduction in FY20 would prevent the fielding of 101 large variant servers and 184 small variants, which means two corps, three divisions and 10 brigade combat teams — including units like the 18th Airborne Corps, the 1st Cavalry Division, the 101st Airborne Division, III Corps and 4th Infantry Division — wouldn't get the updated server hardware needed to run the Command Post Computing Environment, Gallagher said during a briefing with McCarthy. And because the servers used to run the Command Post Computing Environment will be delayed, so will the rollout of the CPCE itself. Units like the 10th Mountain Division and the 335th Theater Signal Command have requested accelerated fielding of the CPSE and TSI capability. Currently fielded servers are cumbersome to initialize and are not appropriately protected to deal with emerging cyberthreats. The Tactical Defensive Cyber Operations Infrastructure capability, which protects the servers, will also be delayed. As the Army's first capability set due for fielding in 2021 would be delayed under a CR, its next capability set slated for 2023 would also be pushed back. The Army wouldn't have the funds to conduct experimentation and soldier evaluation because those are considered new start programs with no funding lines in FY19. Those efforts include experiments with low-Earth and medium-Earth orbit constellations, data management, new waveforms, command post mobility, and network management tools. This early research and development is meant to inform preliminary design and further larger-scale experimentation leading up to 2023. https://www.c4isrnet.com/2019/10/29/army-network-fielding-plan-could-collapse-under-extended-continuing-resolution/

Toutes les nouvelles