Back to news

December 17, 2018 | International, Aerospace, Naval, Land, C4ISR, Security

Contract Awards by US Department of Defense - December 14, 2018

DEFENSE LOGISTICS AGENCY

Spacelabs Healthcare Inc., Snoqualmie, Washington, has been awarded a maximum $450,000,000 firm-fixed-price, indefinite-delivery/indefinite-quantity contract for patient monitoring systems, accessories and training. This is a five-year base contract with one five-year option period. This was a competitive acquisition with 36 responses received. Location of performance is Washington, with a Dec. 13, 2023, performance completion date. Using customers are Army, Navy, Air Force, Marine Corps and federal civilian agencies. Type of appropriation is fiscal 2018 through 2023 defense working capital funds. The contracting activity is the Defense Logistics Agency Troop Support, Philadelphia, Pennsylvania (SPE2D1-19-D-0008).

OrthoScan, Scottsdale, Arizona, has been awarded a maximum $125,000,000 firm-fixed-price, indefinite-delivery/indefinite-quantity contract for radiology systems, accessories and training. This is a five-year base contract with one five-year option period. This was a competitive acquisition with 50 responses received. Location of performance is Arizona, with a Dec. 13, 2023, performance completion date. Using customers are Army, Navy, Air Force, Marine Corps and federal civilian agencies. Type of appropriation is fiscal 2018 through 2023 defense working capital funds. The contracting activity is the Defense Logistics Agency Troop Support, Philadelphia, Pennsylvania (SPE2D1-19-D-0007).

UPDATE: Moridge Manufacturing Inc., Moundridge, Kansas (SPE8EC-19-D-0031) has been added as an awardee to the multiple-award contract for commercial agricultural equipment, issued against solicitation SPE8EC-17-R-0007, announced May 18, 2017.

NAVY

Textron Inc., New Orleans, Louisiana, is awarded a $314,288,369 modification to previously awarded letter contract N00024-17-C-2480 for the procurement of additional long lead time material (LLTM) for the Ship to Shore Connector program, Landing Craft, Air Cushion (LCAC) 100 Class Craft 109 through 118, for the continuation of pre-fabrication activities for LCAC 109 through 112, and for the initial procurement of LLTM for LCAC 119 through 123. The SSC Program is the functional replacement for the existing fleet of vehicles, which are nearing the end of their service life. It is an Air Cushion Vehicle designed for a 30-year service life. The SSC mission is to land surface assault elements in support of Operational Maneuver from the Sea, at over-the-horizon distances, while operating from amphibious ships and mobile landing platforms. SSC provides increased performance to handle current and future missions, as well as improvements which will increase craft availability and reduce total ownership cost. Work will be performed in New Orleans, Louisiana (46 percent); Leesburg, Virginia (18 percent); Mandal, Norway (8 percent); Gloucester, United Kingdom (7 percent); Livonia, Michigan (7 percent); Cincinnati, Ohio (4 percent); Eatontown, New Jersey (2 percent); Gold Beach, Oregon (2 percent); Riverdale, Iowa (2 percent); Huntington Beach, California (2 percent); Metairie, Louisiana (2 percent), and is expected to be complete by July 2023. Fiscal 2017, 2018 and 2019 shipbuilding and conversion (Navy) funding in the combined amount of $235,716,277 will be obligated at time of award and will not expire at the end of the current fiscal year. The Naval Sea Systems Command, Washington, District of Columbia, is the contracting activity.

Raytheon Missile Systems, Tucson, Arizona, is awarded a $149,435,507 cost-plus-incentive contract for the engineering, manufacturing, and development of Standard Missile-2 Block IIIC. Work will be performed in Tucson, Arizona (85 percent); Wolverhampton, England (6 percent); East Aurora, New York (6 percent); Middletown, Ohio (2 percent); and Englewood, Colorado (1 percent), and is expected to be completed by October 2022. Fiscal 2019 and 2018 research, development, testing and evaluation (Navy) funding in the amounts of $50,090,148 and $234,663 respectively will be obligated at time of award. Funding in the amount of $234,663 will expire at the end of the current fiscal year. This contract was not competitively procured in accordance with 10 U.S. Code 2304(c)(1) - only one responsible source and no other supplies or services will satisfy agency requirements. The Naval Sea Systems Command, Washington, District of Columbia, is the contracting activity (N00024-19-C-5412).

Raytheon Co., Missile Systems, Tucson, Arizona, is awarded a $32,636,301 firm-fixed-price modification to previously awarded contract N00024-18-C-5432 for over-the-horizon weapon systems. Work will be performed in Kongsberg, Norway (75 percent); Tucson, Arizona (15 percent); Schrobenhausen, Germany (4 percent); Raufoss, Norway (3 percent); McKinney, Texas (2 percent); and Louisville, Kentucky (1 percent), and is expected to be complete by December 2020. Fiscal 2019 weapon procurement (Navy); fiscal 2019 research, development, testing, and evaluation (Navy); and fiscal 2019 other procurement (Navy) in the amount of $32,636,301 will be obligated at time of award and will not expire at the end of the current fiscal year. The Naval Sea Systems Command, Washington Navy Yard, District of Columbia, is the contracting activity.

Raytheon Missile Systems, Tucson, Arizona, is awarded a $32,162,533 cost-only contract for long lead material in support of fiscal 2019 Evolved Sea Sparrow Missile (ESSM) Block 2 low-rate initial production requirements. The ESSM program is an international cooperative effort to design, develop, test, and procure ESSM missiles. The ESSM provides enhanced ship defense. This contract combines purchases for the Navy (43 percent); and the governments of Canada, Australia, Germany, Norway, Turkey, the Netherlands, and Denmark under the NATO Sea Sparrow Consortium. Work will be performed in Raufoss, Norway (47 percent); Mississauga, Canada (32 percent); and Richmond, Australia (21 percent), and is expected to be complete by December 2022. Fiscal 2017 and 2018 other procurement (Navy); fiscal 2018 and 2019 weapons procurement (Navy); and non-expiring Other Funds funding in the amount of $21,991,327 will be obligated at time of award and funds in the amount of $216,649 will expire at the end of the current fiscal year. This contract was not competitively procured in accordance with the authority 10 U.S. Code 2304 (c)(4). The Naval Sea Systems Command, Washington, District of Columbia, is the contracting activity (N00024-19-C-5418).

Raytheon Missile Systems, Tucson, Arizona, is awarded a $24,717,120 cost-only contract for long lead material in support of fiscal 2019 Evolved Sea Sparrow Missile (ESSM) Block 1 production and spares requirements. The ESSM program is an international cooperative effort to design, develop, test, and procure ESSM missiles. The ESSM provides enhanced ship defense. This contract includes foreign military sales to the kingdom of Saudi Arabia. Work will be performed in Raufoss, Norway (44 percent); Mississauga, Canada (34 percent); and Richmond, Australia (22 percent), and is expected to be complete by December 2021. Foreign military sales funding in the amount of $23,846,439 will be obligated at time of award and will not expire at the end of the current fiscal year. This contract was not competitively procured in accordance with the authority 10 U.S. Code 2304 (c)(4). The Naval Sea Systems Command, Washington, District of Columbia, is the contracting activity (N00024-19-C-5410).

Austal USA, Mobile, Alabama, has been issued a fixed-price-incentive firm target modification to a previously awarded contract (N00024-17-C-2301) to exercise options for the construction of two fiscal 2019 littoral combat ships (LCS). The Navy has not completed the competition for fiscal 2019 LCS class ships, therefore, the specific contract award amount for these ships is considered source selection sensitive information (see 41 U.S. Code 2101, et seq., Federal Acquisition Regulation (FAR) 2.101 and FAR 3.104) and will not be made public at this time. Austal USA will perform and oversee all necessary design, planning, construction, and test and trials activities in support of delivery of these ships to the Navy. Work will be performed in Mobile, Alabama (50 percent); Pittsfield, Massachusetts (24 percent); Cincinnati, Ohio (5 percent); Henderson, Washington (2 percent), Kingsford, Michigan (1 percent); Bristol, Connecticut (1 percent), Slidell, Louisiana (1 percent); and various other locations of less than 1 percent each (totaling 16 percent), and is expected to be complete by September 2025. Fiscal 2019 shipbuilding and conversion (Navy) funding will be obligated at time of award and will not expire at the end of the current fiscal year. The Naval Sea Systems Command, Washington, District of Columbia, is the contracting activity.

ARMY

AC FIRST LLC., Germantown, Maryland, was awarded a $129,918,292 modification (0002 37) to contract W52P1J-12-G-0048 for logistics support services, maintenance, supply, and transportation services. Work will be performed in Bagram, Afghanistan, with an estimated completion date of Dec. 21, 2019. Fiscal 2019 operations and maintenance, Army funds in the amount of $12,500,000 were obligated at the time of the award. U.S. Army Contracting Command, Rock Island Arsenal, Illinois, is the contracting activity.

Harper Construction Co. Inc., San Diego, California, was awarded a $59,467,470 firm-fixed-price contract for construction of a reception barracks complex. Bids were solicited via the internet with two received. Work will be performed in Fort Sill, Oklahoma, with an estimated completion date of Dec. 14, 2020. Fiscal 2015 and 2016 military construction funds in the amount of $59,467,470 were obligated at the time of the award. U.S. Army Corps of Engineers, Tulsa, Oklahoma, is the contracting activity (W912BV-19-C-0003).

Oshkosh Defense LLC, Oshkosh, Wisconsin, was awarded a $30,358,753 modification (P00001) to contract W56HZV-18-F-0153 for procurement of Family of Medium Tactical Vehicles. Work will be performed in Oshkosh, Wisconsin; and Liverpool, New York, with an estimated completion date of Dec. 31, 2020. Fiscal 2018 and 2019 other procurement, Army funds in the amount of $30,358,753 were obligated at the time of the award. U.S. Army Contracting Command, Warren, Michigan, is the contracting activity.

Gary Kubiak & Son Electric Inc.,* Robbinsville, New Jersey, was awarded a $12,898,760 firm-fixed-price contract for repair of the electrical distribution system (Buildings 194-194 and main base area) for Joint Base McGuire-Dix-Lakehurst. Bids were solicited via the internet with five received. Work will be performed in Trenton, New Jersey, with an estimated completion date of Dec. 13, 2020. Fiscal 2019 operations and maintenance, Army funds in the amount of $12,898,760 were obligated at the time of the award. U.S. Army Corps of Engineers, Philadelphia, Pennsylvania, is the contracting activity (W912BU-19-C-0004).

Lockheed Martin Corp., Orlando, Florida, was awarded a $10,219,884 hybrid (cost-plus-fixed-fee and firm-fixed-price) Foreign Military Sales (Qatar) contract for support services for the Modernized Target Acquisition Designation Sight/Pilot Night Vision Sensor for the Apache Attack helicopter. One bid was solicited with one bid received. Work will be performed in Orlando, Florida, with an estimated completion date of March 31, 2024. Fiscal 2019 foreign military sales funds in the amount of $10,219,884 were obligated at the time of the award. U.S. Army Contracting Command, Rock Island Arsenal, Illinois, is the contracting activity (W52P1J-19-D-0006).

CORRECTION: The Nov. 8 announcement that Deloitte & Touche LLP, Arlington, Virginia, was awarded an $18,056,941 firm-fixed-price contract to provide a cyberspace analytics capability was announced early, and incorrectly stated the estimated date of completion and amount of obligated funds. The contract was actually awarded Dec. 12, 2018; the estimated date of completion is Nov. 11, 2023; and fiscal 2019 research, development, test and evaluation funds in the amount of $8,736,000 were obligated at the time of the award. All other information in the announcement was correct.

AIR FORCE

Peraton Inc., Herndon, Virginia, has been awarded a $65,615,581 cost-type term order for Xdomain technology through research, evolution, enhancement, maintenance, and support software and report. The scope of this effort is to provide engineering, programmatic and technical expertise, to include: requirements definition/analysis, research, systems engineering, software engineering, development testing, software integration, quality control, configuration management, system integration, interoperability testing, security analysis/implementation, lab-based security assessment testing support, system installation planning, system component procurement, on-site installation/configuration, site security assessment testing support, system familiarization, and system operational support. Work will be performed in Herndon, Virginia; and Rome, New York, and is expected to be completed by Dec. 15, 2023. This award is the result of a competitive acquisition and one offer was received. Fiscal 2019 research, development, test and evaluation funds in the amount of $250,000; and fiscal 2019 operations and maintenance funds in the amount of $72,615 are being obligated at the time of award. Air Force Research Laboratory, Rome, New York, is the contracting activity (FA8750-19-F-0003).

Lockheed Martin Missiles and Fire Control, Orlando, Florida, has been awarded a $10,302,132 modification (P00001) to contract FA8682-19-C-0010 for Lot Two production of three Long Range Anti-Ship Missiles. Work will be performed in Orlando, Florida, and is expected to be completed by Feb. 28, 2020. The award is the result of sole-source acquisition. Fiscal 2018 research, development, test and evaluation funds will fund the contract. Air Force Life Cycle Management Center, Eglin Air Force Base, Florida, is the contracting activity.

*Small business

https://dod.defense.gov/News/Contracts/Contract-View/Article/1714535/source/GovDelivery/

On the same subject

  • Raytheon developing microscopic bomb detector

    November 13, 2019 | International, Security

    Raytheon developing microscopic bomb detector

    Cambridge, Mass., November 12, 2019 /PRNewswire/ - Raytheon (NYSE: RTN) is using synthetic biology science to create a new method for detecting buried explosives, using bacteria as sensors. Under a contract from the U.S. Defense Advanced Research Projects Agency, Raytheon and partner Worcester Polytechnic Institute will program two bacterial strains to monitor ground surfaces for explosive materials. The first strain will detect the presence or absence of explosives buried underground. If the first strain detects explosives, the second strain will produce a glowing light on the ground's surface. Remote cameras or unmanned aerial vehicles can then be used to survey large areas for the telltale luminescence. "We already know that some bacteria can be programmed to be very good at detecting explosives, but it's harder underground," said Allison Taggart, Ph.D. and principal investigator for the Bio Reporters for Subterranean Surveillance program at Raytheon BBN Technologies. "We're investigating how to transport the reporting bacteria to the required depth underground, and then pushing the luminescence up to the surface so it's easily visible." Synthetic biology combines principles of electrical engineering with computer science to modify DNA. The Subterranean Surveillance program is one example in which advances in synthetic biology are being used to develop sensors that can reveal a variety of subterranean phenomena at a distance. "Using bio sensors underground could help us save lives as well as detect threats to air quality and the water supply," Taggart added. "The modular design of the system we're developing will allow us to swap in different components as needed to detect various kinds of threats and contaminants." About Raytheon Raytheon Company, with 2018 sales of $27 billion and 67,000 employees, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 97 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I™ products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Massachusetts. Follow us on Twitter. Raytheon Company Space and Airborne Systems BBN Technologies Cambridge, Mass. Media Contact Joyce Kuzmin +1.617.873.8120 joyce.kuzmin@raytheon.com SOURCE Raytheon Company View source version on Raytheon: http://raytheon.mediaroom.com/2019-11-12-Raytheon-developing-microscopic-bomb-detector

  • US State Dept OKs potential sale of Stinger missiles to Egypt for $740 mln
  • HOW HACKED WATER HEATERS COULD TRIGGER MASS BLACKOUTS

    August 14, 2018 | International, C4ISR

    HOW HACKED WATER HEATERS COULD TRIGGER MASS BLACKOUTS

    WHEN THE CYBERSECURITY industry warns about the nightmare of hackers causing blackouts, the scenario they describe typically entails an elite team of hackers breaking into the inner sanctum of a power utility to start flipping switches. But one group of researchers has imagined how an entire power grid could be taken down by hacking a less centralized and protected class of targets: home air conditioners and water heaters. Lots of them. At the Usenix Security conference this week, a group of Princeton University security researchers will present a study that considers a little-examined question in power grid cybersecurity: What if hackers attacked not the supply side of the power grid, but the demand side? In a series of simulations, the researchers imagined what might happen if hackers controlled a botnet composed of thousands of silently hacked consumer internet of things devices, particularly power-hungry ones like air conditioners, water heaters, and space heaters. Then they ran a series of software simulations to see how many of those devices an attacker would need to simultaneously hijack to disrupt the stability of the power grid. Their answers point to a disturbing, if not quite yet practical scenario: In a power network large enough to serve an area of 38 million people—a population roughly equal to Canada or California—the researchers estimate that just a one percent bump in demand might be enough to take down the majority of the grid. That demand increase could be created by a botnet as small as a few tens of thousands of hacked electric water heaters or a couple hundred thousand air conditioners. "Power grids are stable as long as supply is equal to demand," says Saleh Soltan, a researcher in Princeton's Department of Electrical Engineering, who led the study. "If you have a very large botnet of IoT devices, you can really manipulate the demand, changing it abruptly, any time you want." The result of that botnet-induced imbalance, Soltan says, could be cascading blackouts. When demand in one part of the grid rapidly increases, it can overload the current on certain power lines, damaging them or more likely triggering devices called protective relays, which turn off the power when they sense dangerous conditions. Switching off those lines puts more load on the remaining ones, potentially leading to a chain reaction. "Fewer lines need to carry the same flows and they get overloaded, so then the next one will be disconnected and the next one," says Soltan. "In the worst case, most or all of them are disconnected, and you have a blackout in most of your grid." Power utility engineers, of course, expertly forecast fluctuations in electric demand on a daily basis. They plan for everything from heat waves that predictably cause spikes in air conditioner usage to the moment at the end of British soap opera episodes when hundreds of thousands of viewers all switch on their tea kettles. But the Princeton researchers' study suggests that hackers could make those demand spikes not only unpredictable, but maliciously timed. The researchers don't actually point to any vulnerabilities in specific household devices, or suggest how exactly they might be hacked. Instead, they start from the premise that a large number of those devices could somehow be compromised and silently controlled by a hacker. That's arguably a realistic assumption, given the myriad vulnerabilities other security researchers and hackers have found in the internet of things. One talk at the Kaspersky Analyst Summit in 2016 described security flaws in air conditioners that could be used to pull off the sort of grid disturbance that the Princeton researchers describe. And real-world malicious hackers have compromised everything from refrigerators to fish tanks. Given that assumption, the researchers ran simulations in power grid software MATPOWER and Power World to determine what sort of botnet would could disrupt what size grid. They ran most of their simulations on models of the Polish power grid from 2004 and 2008, a rare country-sized electrical system whose architecture is described in publicly available records. They found they could cause a cascading blackout of 86 percent of the power lines in the 2008 Poland grid model with just a one percent increase in demand. That would require the equivalent of 210,000 hacked air conditioners, or 42,000 electric water heaters. The notion of an internet of things botnet large enough to pull off one of those attacks isn't entirely farfetched. The Princeton researchers point to the Mirai botnet of 600,000 hacked IoT devices, including security cameras and home routers. That zombie horde hit DNS provider Dyn with an unprecedented denial of service attack in late 2016, taking down a broad collection of websites. Building a botnet of the same size out of more power-hungry IoT devices is probably impossible today, says Ben Miller, a former cybersecurity engineer at electric utility Constellation Energy and now the director of the threat operations center at industrial security firm Dragos. There simply aren't enough high-power smart devices in homes, he says, especially since the entire botnet would have to be within the geographic area of the target electrical grid, not distributed across the world like the Mirai botnet. But as internet-connected air conditioners, heaters, and the smart thermostats that control them increasingly show up in homes for convenience and efficiency, a demand-based attack like the one the Princeton researchers describes could become more practical than one that targets grid operators. "It's as simple as running a botnet. When a botnet is successful, it can scale by itself. That makes the attack easier," Miller says. "It's really hard to attack all the generation sites on a grid all at once. But with a botnet you could attack all these end user devices at once and have some sort of impact." The Princeton researchers modeled more devious techniques their imaginary IoT botnet might use to mess with power grids, too. They found it was possible to increase demand in one area while decreasing it in another, so that the total load on a system's generators remains constant while the attack overloads certain lines. That could make it even harder for utility operators to figure out the source of the disruption. If a botnet did succeed in taking down a grid, the researchers' models showed it would be even easier to keepit down as operators attempted to bring it back online, triggering smaller scale versions of their attack in the sections or "islands" of the grid that recover first. And smaller scale attacks could force utility operators to pay for expensive backup power supplies, even if they fall short of causing actual blackouts. And the researchers point out that since the source of the demand spikes would be largely hidden from utilities, attackers could simply try them again and again, experimenting until they had the desired effect. The owners of the actual air conditioners and water heaters might notice that their equipment was suddenly behaving strangely. But that still wouldn't immediately be apparent to the target energy utility. "Where do the consumers report it?" asks Princeton's Soltan. "They don't report it to Con Edison, they report it to the manufacturer of the smart device. But the real impact is on the power system that doesn't have any of this data." That disconnect represents the root of the security vulnerability that utility operators need to fix, Soltan argues. Just as utilities carefully model heat waves and British tea times and keep a stock of energy in reserve to cover those demands, they now need to account for the number of potentially hackable high-powered devices on their grids, too. As high-power smart-home gadgets multiply, the consequences of IoT insecurity could someday be more than just a haywire thermostat, but entire portions of a country going dark. https://www.wired.com/story/water-heaters-power-grid-hack-blackout/

All news