Guard Chief Pushes Back on Proposed Cut to C-130 Fleet

Guard Chief Pushes Back on Proposed Cut to C-130 Fleet

Defense Department planners need to better understand how C-130s are used in domestic operations, the Chief of the National Guard Bureau said.

Gen. Daniel R. Hokanson told members of the House Appropriations defense subcommittee on May 4 that he needs to “retain every single one of those flying squadrons because of what they bring for our nation.” C-130s are used for airlift support, Antarctic resupply, aeromedical missions, weather reconnaissance, aerial spray missions, firefighting duties, and natural disaster relief missions. Those domestic missions, however, are not typically at the forefront of decision making, he added.

Hokanson pointed to the 2018 Mobility Capabilities Requirements Study from U.S. Transportation Command and the Cost Assessment and Program Evaluation office, which looked at the optimal size of airlift, sealift, and refueling fleets. That study prioritized refueling and sealift and contradicted Air Force planning that called for more airlift aircraft. Specifically, it called for 300 C-130s, a cut to USAF’s fleet of 325 C-130Hs and C-130Js. The 2020 study is still underway.

Hokanson said the 2018 study did not take into account the C-130’s domestic role, which was critical in 2020 when the National Guard was busier than it has ever been.

Within the last year, 75 different aircraft conducted more than 600 missions in 16 different states. Additionally, following the Jan. 6, 2021, insurrection at the U.S. Capitol, the Guard deployed more than 26,000 personnel from every state and territory, with many flown in on Guard aircraft. The use of Guard aircraft allowed for the activations to happen quickly.

“If you don’t account for that, it would give you a different picture that would make you think that you can reduce that capability,” Hokanson said.

If the “homeland is no longer a sanctuary,” the Guard needs its C-130s “resident in the nation” and modernized to be able to respond to those threats, Hokanson said.

“The overall intent we would like to do is see every one of our squadrons modernized so they remain relevant into the future,” he said.

Report: Militia Threats Forced U.S. Contractors to Leave Iraqi F-16 Base

Report: Militia Threats Forced U.S. Contractors to Leave Iraqi F-16 Base

Iranian-backed militias have focused attacks on key bases in Iraq, prompting U.S. contractors to leave the Iraqi Air Force’s major F-16 base as the country’s Fighting Falcons are working to increase their capacity to train and conduct airstrikes, according to a new report.

The militias continued to conduct harassment-style attacks on the U.S. Embassy, diplomatic facilities, and installations such as Balad Air Base, according to the Defense Department’s Lead Inspector General for Operation Resolute Support in a quarterly report released May 4. Balad does not host U.S. service members, but it does host contractors from Lockheed Martin who are critical to supporting Iraqi F-16 operations.

These contractors were forced to leave the base in March “due to security threats,” the IG report states. The situation comes after a tumultuous 2020, during which contractors at times could not directly support Iraqi F-16s at the base because of a “combination of regional threats and the impact of COVID-19,” the IG’s previous quarterly report states.

Though the contractors began to return in March, “the tactics employed by the militias this quarter suggest that they may be planning more attacks,” according to the report. This played out May 3, when rockets fell on Balad again but did not cause any damage.

“We’re concerned about any use of violence by any group in Iraq. … The purpose for the U.S. in Iraq, at the invitation of the government, is to continue to prosecute the war against ISIS, the operations against ISIS,” Pentagon spokesman John F. Kirby said in a briefing the same day, without linking his comments to that specific attack. “That’s what we’re there for: We’re there to help Iraqi Security Forces as they also prosecute operations against ISIS. So any violent attack on them, or us, is of concern, and it does show that … it’s still a dangerous mission.”

In addition to the contractors, U.S. Air Force air advisers regularly visit Balad to support the Iraqi Air Force’s 9th Fighter Squadron, which flies the aircraft. However, without a dedicated advising presence and secure communications at the base, the Iraqi F-16s have not been able to join the coalition air tasking order, the report states.

Over the first quarter of 2021, Iraqi F-16s flew 299 total sorties, 295 of which were training. This was a slight increase over the 271 total sorties during the previous quarter, the report states. The strike sorties used primarily GBU-12 guided bombs and Mk 82 unguided bombs.

Combined Joint Task Force-Operation Inherent Resolve said its focus is on improving the Iraqi Air Force’s ability to plan and task and to possibly allow the aircraft to join the air tasking order, the report states.

C-17s Fly Equipment Out of Afghanistan as Withdrawal Continues

C-17s Fly Equipment Out of Afghanistan as Withdrawal Continues

The retrograde from Afghanistan is underway, with U.S. Air Force C-17s carrying equipment and other materiel out of the country.

U.S. Central Command in a May 4 statement said about 60 C-17 loads have moved out of the country since President Joe Biden on April 14 announced the end of the war in Afghanistan. Additionally, more than 1,300 pieces of equipment have been turned over to the Defense Logistics Agency to be destroyed.

CENTCOM estimates it has completed between 2 and 6 percent of the entire retrograde process, with updates expected weekly.

U.S. forces in Afghanistan also have turned over one facility, New Antonik, to the Afghan National Army.

As the withdrawal continues, the Taliban is increasing attacks on both Afghan forces and locations with U.S. forces, including a May 1 rocket attack on Kandahar Airfield. U.S. aircraft destroyed a Taliban position in response.

Pentagon spokesman John F. Kirby, in a May 3 briefing, said the U.S. has seen “small, harassing attacks” that did not have any “significant impact” on personnel or resources.

“We’ve seen nothing thus far that has affected the drawdown or had any significant impact on the mission at hand in Afghanistan,” Kirby said.

Space Force, Guard Closer on ‘Two-component’ Construct for the New Service

Space Force, Guard Closer on ‘Two-component’ Construct for the New Service

Senior Department of the Air Force and National Guard officials will brief Defense Secretary Lloyd J. Austin III on plans for a combined Space Force Active and Reserve component and separate Space National Guard in the coming days.

National Guard Bureau Chief Army Gen. Daniel R. Hokanson told the House Appropriations defense subcommittee May 4 that the creation of a Space National Guard is among his most “pressing concerns” and he said he believes there is consensus among top leaders on the planned construct.

The proposed model will be a “two-component construct” with an Active/Reserve “combined component, then a Space National Guard,” Hokanson said.

Space Force leaders previewed the idea in February, as the Pentagon worked on a report on the possible Space Force structure. Lt. Gen. Nina M. Armagno, the staff director at Space Force headquarters, said at the time, “We’re really working on trying to figure out how to recruit the best and retain the best.”

The “dual componency,” combining the Active and Reserve forces, in theory could help create a better work-life balance in response to younger troops’ shifting career and family values.

Hokanson told lawmakers he believes leaders are “fairly close” on this proposal. He is meeting with acting Air Force Secretary John P. Roth and Chief of Space Operations Gen. John W. “Jay” Raymond on May 5 about the proposal. “Right now both the Secretary of the Air Force and the Chief of Space Operations are in agreement with us about a two-component construct,” Hokanson said. The May 5 meeting is “in preparation” for the meeting with Austin, Hokanson said.

The Congressional Budget Office last year studied two potential options for a Space National Guard. The first would transfer the existing 1,500 space personnel—of which about 1,100 are Airmen—into a new Space National Guard. This model, which the National Guard Bureau first pitched in February 2020, is estimated to cost an additional $100 million annually, plus a one-time $20 million cost for facilities construction, according to the CBO.

The second option studied by CBO would be a much larger Space National Guard, which could grow to about one-third the size of the overall Space Force, at 4,900 to 5,800 personnel. CBO estimates such a plan would cost up to an additional $490 million a year, plus a one-time construction and equipment cost of $400 million to $900 million.

Eight states—Alaska, Arkansas, California, Colorado, Florida, Hawaii, New York, and Ohio—and Guam have National Guard space units. Some of those service members have jobs like flying the Milstar constellation from California, and others are part of expeditionary units who deploy to support combat operations overseas.

Raytheon Awarded $228 Million OCX 3F Contract

Raytheon Awarded $228 Million OCX 3F Contract

Raytheon Intelligence and Space on April 30 received a $228 million contract for the Global Positioning System Next-Generation Operational Control System Follow-On from Space Force’s Space and Missile Systems Center.

Known as OCX 3F, the program builds on ground control station improvements made in Blocks 1 and 2, now planned for delivery in 2022. This includes better cybersecurity, improved anti-jamming capability, and enhanced signal strength and accuracy, as well as the ability to connect to more satellites and shrink operations crew sizes.

“OCX is an adaptive architecture designed to evolve to combat emerging threats,” said Barbara Baker, SMC Production Corps Command and Control Systems Division’s senior materiel leader, in a press release.

The $5.6 billion OCX system will be used to command and control newer GPS III and IIIF satellites being built by Lockheed Martin. The program was first slated to enter operations in 2016, but it was delayed multiple times as costs nearly doubled. However, program officials now tout improvements made under the Defense Department’s oversight.

Work on OCX 3F will be performed at Raytheon Intelligence and Space’s facilities in Aurora, Colorado, with delivery expected in July 2025.

“The OCX 3F program office is looking forward to working with Raytheon on this new GPS ground control program. We are ready to take on any challenges and to work full bore to deliver the critical regional high-powered signals and GPS IIIF launch and control capabilities in support of joint warfighters,” said Lt. Col. Grant Spear, SMC OCX 3F materiel leader, in the release.

The fourth GPS III satellite launched for Cape Canaveral Air Force Station, Florida, in November 2020. Lockheed Martin is on contract to build 10 of the satellites. The company also received a $7.2 billion contract for up to 22 additional GPS IIIF Follow-on satellites with launch expected to start in 2026.  

C-5Ms, C-17 Continue to Airlift COVID-19 Aid to India

C-5Ms, C-17 Continue to Airlift COVID-19 Aid to India

Air Force airlift of aid to India continued in recent days, with three C-5Ms and one C-17 delivering COVID-19 testing kits, protective masks, and oxygen to the country.

The third aircraft was set to arrive May 3, with another set to arrive the next day, Pentagon spokesman John F. Kirby said during a May 3 briefing.

“Once all four missions are complete, four aircraft will have delivered tons of very needed critical supplies,” he said.

U.S. Transportation Command said on Twitter that the deliveries included more than one million N95 masks, more than 440 oxygen cylinders, and more than 1 million rapid diagnostic test kits. The U.S. Agency for International Development in a May 1 statement said one of the flights also carried a Deployable Oxygen Concentration System, donated by the state of California.

Oxygen has been in dire need in India as the country faces a rapidly spreading COVID-19 outbreak. The country on May 1 reported more than 400,000 new cases of COVID-19 for the first time, as the U.S. government announced it was taking steps to restrict travel from India, CNN reported. The aid flights to India began April 28. The Pentagon, through the Defense Logistics Agency and TRANSCOM, will “continue to assess” the need for additional aid going forward, Kirby said.

Space Force, SPACECOM Working on New Communication Strategy to Fight Overclassification

Space Force, SPACECOM Working on New Communication Strategy to Fight Overclassification

U.S. Space Command and the Space Force are working on new ways to openly discuss capabilities in orbit while ensuring the military can still deter adversaries who are improving their own capabilities there.

Top leaders of the Space Force, SPACECOM, and elsewhere in the Pentagon have repeatedly said the overclassification of space systems is problematic, especially in the area of deterrence. Maj. Gen. DeAnna M. Burt, the commander of SPACECOM’s Combined Force Space Component Command and deputy commander of Space Operations Command in the U.S. Space Force, said May 3 that the organizations are determining a new strategy for what can be announced publicly.

“If I can’t talk about what I have to hold your capabilities at risk, then I really can’t deter,” Burt said during an AFA Mitchell Institute for Aerospace Studies Space Power Forum. “So, we’ve been working really hard on a conceal, reveal, obfuscate strategy. How are we going to talk about our capabilities? What are the things we’re willing to talk about? What are we not willing to talk about? And how will that then translate into our deterrence strategies and how we operate.”

Maj. Gen. DeAnna M. Burt, commander of U.S. Space Command’s Combined Force Space Component Command, and deputy commander of the Space Force’s Space Operations Command speaks with retired Lt. Gen. David A. Deptula, dean of AFA’s Mitchell Institute for Aerospace Studies, during its virtual Space Power Forum series on May 3, 2021.

Historically, the way space systems are built has fed into this culture of overclassification, Burt said. For example, when a new aircraft comes online, the service buys a small number and takes them out to its test sites, “and we really wring them out. … [Then] we go back to the vendor and say, ‘Hey, this, this, and this doesn’t meet specs, and we need you to update them.’” The process will go through iterations until mass production starts. For space, however, that process is very different. A new constellation could include six aircraft. The first launches, enters orbit, and then gets tested, but it is still the first operational satellite for that constellation—it doesn’t return to the vendor to be updated, Burt said.

“Once you launch it, you own it. And you’re now working with those capabilities,” she said. “So sometimes I think we’ve overclassified because we believe that if I tell you about it, or you know too much about it, then you can defeat it quickly or you have a way to counter it.”

But with new space acquisition strategies and capabilities, such as common buses, digital payloads, and other ways to modernize both the satellite and the receiver, “we can actively respond as the enemy changes, to change the software on board to include crypto,” she said.

This means U.S. space-based capabilities will be more resilient and responsive, freeing up leaders to talk about it more “because … we have the ability to quickly upgrade the capabilities as the enemy gets a vote,” she said.

Data Security and Real-time Data Sharing Co-exist to Support ABMS

Data Security and Real-time Data Sharing Co-exist to Support ABMS

Driving the success of every mission is one key factor: knowledge. The quality, the quantity, and the immediacy of information can make the crucial difference in responses and outcomes. That’s the rationale behind the Air Force’s Advanced Battle Management System (ABMS)—that more complete, timely information leads to better, faster decision making and that sharing vital data is crucial to the success of joint and multi-domain operations. But as cyber is now one of the most used threat vectors, balancing the need for access to data with the realities of the threat environment requires vigilance and agility.

In the first article of this three-part series, we looked at the obstacles to enterprise-wide, multi-domain data access and how Elastic enables near real-time answers from data wherever it is stored. Now, in part two, Elastic looks at the critical issues of security and how the ability to analyze data enterprise-wide can also support smarter responses to cyber threats.

The Perimeter is Always in Flux

The formerly well defined network perimeter has blurred. The Internet of Battlefield Things (IoBT) has grown the number of sensors exponentially and turned objects into endpoints, while mobile users frequently move in and out of secure areas, creating new challenges for secure connectivity.

Truly assessing the military’s cyber stance requires a holistic view of the complete environment, from the network core to the edge. Point solutions that can protect specific resources don’t recognize a crucial element — how attacks interact with each other. Does an event in one segment have implications for other resources? Are there patterns that could provide insight into other attacks? Can anomalies be identified and categorized quickly and accurately? And can users understand the nature of the issue fast enough and clearly enough to respond before damage is done?

By viewing all data across all sources, security-focused teams gain the ability to identify previously unseen connections. But doing so goes beyond securing IT systems alone.

OT Data is Crucial, Yet Vulnerable

Complicating security is that the lines between physical and virtual domains are blurring — kinetic actions can impact the digital domain and vice versa. Attacks on operational technology (OT) devices, such as aircraft, robots, sensor mesh, and IoBT instruments, use IT means.

The good news is that, even with the additional risk factors, there are opportunities to understand and defend against attacks. By analyzing OT data in relation to IT data, it becomes easier to spot vulnerabilities and mitigate potential threats before they affect systems, personnel and the mission itself. Again, the holistic approach is essential to comprehensive security.

Barriers to a Comprehensive View

If it makes sense to assess data from multiple sources to support both operations and security, why isn’t this approach widespread? There are three main obstacles, each of which affects the others.

First, there are technical considerations. In the past, some data lake attempts were not successful. They led to higher cost and complexity without enough benefit to justify the effort. Speed and scalability issues were significant and led to an inability to produce comprehensive answers in time to make a difference.

The policy aspect presents another challenge. Of course, compliance with standards is absolute. In addition, the issue of data ownership needs to be addressed to ensure that those with the responsibility to protect, maintain, and share data also have the authority to do so effectively.

Lastly, there is a cultural component to consider. There are legitimate concerns that not all data should be shared. This is partly a matter of whether access can be segmented by classification, but also due to a truism that too much data can cause more problems than it solves. But these are no longer issues, as it is now possible to enable both policy-driven segmentation and near-instant answers from across petabytes of data. The solution lies in an approach that combines data management with security and enterprise-wide visibility.

Complete Security Demands Complete Real-time Information

At its most basic, cyber defense requires identifying and defending against known attack signatures. The next step is to use machine learning to assess if suspicious activity resembles those known signatures to a degree, then alert users to those potential threats. To be effective, the security system needs both enterprise-wide data and a way to monitor activity across all interconnected systems—data management plus security plus visibility, all working together.

This is the model Elastic employs, for example, where its security and observability solutions coordinate to spot both bottlenecks and potential threats in near real-time. Since Elastic indexes data as it is ingested, answers and analyses can be delivered in seconds, which can contain a cyber attack before it spreads throughout the network.

Elastic’s holistic approach also assures system, application, and data owners that segmentation is possible, limiting access to those with a specific, legitimate need—enabling policy-driven access controls for a Zero Trust ecosystem that manages and protects data and the shared environment.

As a result, security teams can identify issues and respond faster and gain the insight needed to head off potential threats before they become active attack vectors. Alerts can be defined to include next steps, enabling personnel at all skill levels to understand events and take remedial action in the least amount of time.

Security as a Force Enabler

ABMS establishes data sharing as a standard that can create a common operational picture, but security naturally remains paramount. Cyber security can do more than protect assets from threats, even inadvertent ones. It can provide confidence that data is uncorrupted, provide easy access for those who need it, and keep users from creating more risk. In short, securing data must balance access with accountability.

The holistic approach, championed by Elastic, frees critical data from sharing constraints while maintaining high levels of access control and security—and is crucial to achieving mission velocity that allows our forces to outpace adversaries in both the physical and digital domains.

Seymour Johnson Receives USAF’s 45th KC-46

Seymour Johnson Receives USAF’s 45th KC-46

The 916th Air Refueling Wing at Seymour Johnson Air Force Base, North Carolina, on April 30 received the Air Force’s 45th KC-46 Pegasus. Boeing had missed multiple deadlines to deliver the tanker in the weeks beforehand.

The KC-46, tail number 18-6055, brings the wing’s total fleet of KC-46s to six, the wing announced. The delivery—the first since early February—means the Air Force has accepted three of the aircraft so far this year.

The Air Force Life Cycle Management Center told Air Force Magazine on April 13 that Boeing had not been able to “present aircraft in a delivery configuration to support planned/potential delivery dates for March and April” and said there was “moderate risk” for the April 30 delivery.

Boeing, in a statement, said it was “working to deliver KC-46 aircraft at a pace that meets the needs of the U.S. Air Force.”

Air Mobility Command said in February it had slowed the rate by which it would accept the aircraft because they are not yet fully operational and there is a lack of qualified crews to fly them. Meanwhile, the command announced that it would free up some KC-46s for limited operational missions as assigned by U.S. Transportation Command. TRANSCOM has said this could happen as soon as June.