Will UK's aircraft carriers run on 'Windows for warships'?

BAE's command systems specialist may think it's a good idea


Last week UK Defence Secretary Geoff Hoon mounted an odd attack on the country's major defence contractor, BAE Systems, claiming that large foreign shareholdings in the company meant that it could no longer be viewed as British. The assault was seen by observers as perhaps being a pre-emptive strike in the run-up to Hoon's potential award of the contract for two aircraft carriers to French company Thales, rather than to maybe-not-so-local player BAE. But Register sources claim BAE's defeat may also save us from a real deployment of Windows for warships.

Although our sources suggest the Windows factor may be influencing the Ministry of Defence's decision-making process, we suspect this is largely wishful thinking. BAE's recent history on defence contracts has not been impressive from the MoD's perspective, and Thales has relatively recent experience of building large carriers. OK, they might have built the flight decks slightly too short, but they fixed that and they're bound to have bought a new tape measure in time for their next effort.

The Windows factor in the BAE bid is at the moment something that can be deduced, rather than absolutely established. BAE has expertise in naval command systems via its joint venture company, AMS, which in Hoonspeak is even more not-a-British-company than BAE. The AMS site is pretty, largely content-free, but we humbly direct you to the entry for STRAND, which makes ominous mention of "the latest standard desktop computing technology."

AMS, we are told, has decided to hitch its wagon to Windows. Whereas Microsoft seems at the moment to be talking up Windows use in the US Navy while actually delivering non mission-critical desktops, in the case of the Royal Navy the company's products really are achieving penetration of battle control systems, via AMS. AMS/BAE have long experience of delivering such systems using Unix, and this experience went into AMS when the jv company was set up.

But AMS is now committed to Windows, and says it intends to base future Combat Management Systems on Windows variants, describing Windows as a viable underlying operating system for operational systems.

The systems in question do not perform non-critical tasks such as allowing jolly jack tars to download porn while they hang around the Arabian Gulf waiting for something to happen. They control the combat picture in real-time, and deliver the information the vessels' commanders need in order to decide when to fire torpedoes, nuke Baghdad or whatever. And should BAE fail to win the carrier contract, that will not be the end of it, because the CMS AMS is building for the Royal Navy's next ships, the Type 45 destroyer, is already Windows-based.

The Type 45 (perhaps appropriately, the "Daring" class) is scheduled for delivery in 2007, so there is more than ample time for Windows to prove inadequate and for a hasty back-track to Unix. But that would merely produce more cost overruns and delays, and further bad blood between BAE and the MoD. Combat Management Systems, however, have potentially very long lives. They can be in service for 20 to 30 years, and locking yourself in to proprietary systems over this kind of period would perhaps be ill-advised.

The move to Windows has been criticised internally by some of AMS' engineers, to no avail. The justification for the move is that it will facilitate more portable systems using standard PC hardware. However, given the Unix experience at BAE/AMS, it would seem more logical to move over to Linux or BSD than to take the Windows route. And as anybody running mission-critical PC servers will tell you, you can chuck any notions of commodity PC pricing out of the window anyway - if you're running systems that really have to stay up, you can't afford to use commodity PC parts, and you need bulletproof failover systems. Possibly still cheaper than Sun, but nowhere near as cheap as you thought. ®


Other stories you might like

  • Lonestar plans to put datacenters in the Moon's lava tubes
    How? Founder tells The Register 'Robots… lots of robots'

    Imagine a future where racks of computer servers hum quietly in darkness below the surface of the Moon.

    Here is where some of the most important data is stored, to be left untouched for as long as can be. The idea sounds like something from science-fiction, but one startup that recently emerged from stealth is trying to turn it into a reality. Lonestar Data Holdings has a unique mission unlike any other cloud provider: to build datacenters on the Moon backing up the world's data.

    "It's inconceivable to me that we are keeping our most precious assets, our knowledge and our data, on Earth, where we're setting off bombs and burning things," Christopher Stott, founder and CEO of Lonestar, told The Register. "We need to put our assets in place off our planet, where we can keep it safe."

    Continue reading
  • Conti: Russian-backed rulers of Costa Rican hacktocracy?
    Also, Chinese IT admin jailed for deleting database, and the NSA promises no more backdoors

    In brief The notorious Russian-aligned Conti ransomware gang has upped the ante in its attack against Costa Rica, threatening to overthrow the government if it doesn't pay a $20 million ransom. 

    Costa Rican president Rodrigo Chaves said that the country is effectively at war with the gang, who in April infiltrated the government's computer systems, gaining a foothold in 27 agencies at various government levels. The US State Department has offered a $15 million reward leading to the capture of Conti's leaders, who it said have made more than $150 million from 1,000+ victims.

    Conti claimed this week that it has insiders in the Costa Rican government, the AP reported, warning that "We are determined to overthrow the government by means of a cyber attack, we have already shown you all the strength and power, you have introduced an emergency." 

    Continue reading
  • China-linked Twisted Panda caught spying on Russian defense R&D
    Because Beijing isn't above covert ops to accomplish its five-year goals

    Chinese cyberspies targeted two Russian defense institutes and possibly another research facility in Belarus, according to Check Point Research.

    The new campaign, dubbed Twisted Panda, is part of a larger, state-sponsored espionage operation that has been ongoing for several months, if not nearly a year, according to the security shop.

    In a technical analysis, the researchers detail the various malicious stages and payloads of the campaign that used sanctions-related phishing emails to attack Russian entities, which are part of the state-owned defense conglomerate Rostec Corporation.

    Continue reading

Biting the hand that feeds IT © 1998–2022