Back to news

December 10, 2018 | International, Aerospace, Naval, Land, C4ISR, Security

Contract Awards by US Department of Defense - December 7, 2018

NAVY

General Dynamics Electric Boat, Groton, Connecticut, is awarded a $346,500,311 cost-plus-fixed-fee modification to previously awarded contract N00024-16-C-2111 for fiscal 2019 lead yard support and development studies and design efforts for Virginia class submarines. This lead yard support will maintain, update, and support the Virginia class design and related drawings and data for each Virginia class Submarine, including technology insertion, throughout its construction and post shakedown availability period. The contractor will also provide all engineering and related lead yard support necessary for direct maintenance and support of Virginia class ship specifications. In addition, this contract modification provides development studies and design efforts related to the Virginia class submarine design and design improvements, preliminary and detail component and system design, integration of system engineering, design engineering, test engineering, logistics engineering, and production engineering. The contractor will continue development studies and design efforts related to components and systems to accomplish research and development tasks and prototypes and engineering development models required to fully evaluate new technologies to be inserted in succeeding Virginia class submarines. Work will be performed in Groton, Connecticut (91 percent), Newport News, Virginia (8 percent); and at other various sites throughout the U.S. (1 percent), and is expected to be completed by September 2019. Fiscal 2013, 2014, 2015, 2016, 2017, 2018 and 2019 shipbuilding and conversion (Navy); and fiscal 2019 research, development, test and evaluation (Navy) funding in the amount of $129,889,865 will be obligated at time of award and no funds will expire at the end of the current fiscal year. The Naval Sea Systems Command, Washington, District of Columbia, is the contracting activity.

BAE Systems Land & Armaments LP, Minneapolis, Minnesota, is awarded a $41,528,204 firm-fixed-price modification to previously-awarded contract N00024-13-C-5314 for Mk 21 mod 2 (SM-3); and Mk 21 mod 3 (SM-6) canisters in support of the Mk 41 Vertical Launching System (VLS). The Mk 41 VLS provides a missile launching system for CG 47- and DDG 51-class surface combatants of the Navy, as well as surface combatants of allied navies. This effort includes the manufacture, production and test of Mk 21 mod 2 and Mk 21 mod 3 canisters. The canisters provide rocket motor exhaust gas containment and a launch rail during missile firing. The canisters also serve as missile shipping and storage containers. Work will be performed in Aberdeen, South Dakota (90 percent); and Minneapolis, Minnesota (10 percent), and is expected to be completed by August 2021. Fiscal 2018 weapons procurement (Navy); fiscal 2018 Defense-wide procurement; and fiscal 2018 research, development, test and evaluation (Navy) funding in the amount of $41,528,204 will be obligated at time of award and will not expire at the end of the current fiscal year. The Naval Sea Systems Command, Washington, District of Columbia, is the contracting activity.

DRS Power & Control Technologies Inc., Milwaukee, Wisconsin, is awarded a $13,339,019 firm-fixed-price modification to previously-awarded contract N00024-14-C-4200 to exercise an option for DDG 51-class power conversion modules (PCM) for the Air and Missile Defense Radar (AMDR) production ship sets, engineering services and associated support. This contract provides for the AMDR PCM non-recurring engineering, long-lead-time material, low-rate initial production units for testing, associated engineering services and support, and up to 12 production ship sets for DDG 51-class ships. The requirements support the DDG 51 class flight III new construction program (PMS 400D) and the electric ships office (PMS 320). The AMDR PCM will supply power to the radar from the ship's service electrical system. Work will be performed in Milwaukee, Wisconsin, and is expected to be completed by April 2022. Fiscal 2017 and 2019 shipbuilding and conversion (Navy) funding in the amount of $13,339,019 will be obligated at time of award and will not expire at the end of the current fiscal year. The Naval Sea Systems Command, Washington, District of Columbia, is the contracting activity.

Progeny Systems Corp., Manassas, Virginia, is awarded a $12,739,130 cost-plus-incentive-fee contract modification to previously awarded contract (N00024-14-C-6220) to exercise options for engineering services and Navy equipment. Work will be performed in Manassas, Virginia, and is expected to be completed by September 2020. Fiscal 2017 shipbuilding and conversion (Navy); fiscal 2019 research, development, test and evaluation (Navy); and fiscal 2019 other procurement (Navy) funding in the amount of $12,739,130 will be obligated at time of award and will not expire at the end of the current fiscal year. The Naval Sea Systems Command, Washington Navy Yard, Washington, District of Columbia, is the contracting activity.

Detyens Shipyards Inc., North Charleston, South Carolina, was awarded a $9,062,606 firm- fixed-price contract for USNS Comfort (T-AH 20) mid-term availability commencing on Jan. 8, 2019. Work will include general steel and piping repairs, air conditioning plant installation, air conditioning plant maintenance, steam driven fire pump turbine inspection, bilge and ballast segregation, lifeboat and life raft davit falls replacement, and ventilation duct cleaning. This contract includes options which, if exercised, would bring the cumulative value of this contract to $11,323,572. Work will be performed in North Charleston, South Carolina, and is expected to be completed by Feb. 21, 2019. Fiscal 2019 operations and maintenance (Navy) funds in the amount of $9,062,606 and will expire at the end of the current fiscal year. This contract was competitively procured with proposals solicited via the Federal Business Opportunities website, with one offer received. The U.S. Navy's Military Sealift Command, Norfolk, Virginia, is the contracting activity (N3220519C6500). (Awarded Dec. 6, 2018)

AIR FORCE

Affordable Engineering Services, San Diego, California; Logmet LLC, Round Rock, Texas: Powerhouse Resources International, Oklahoma City, Oklahoma; and SkyQuest Aviation, Glendale, Arizona, have been awarded a ceiling $160,000,000 firm-fixed-price, multiple-award, five-year, indefinite-delivery/indefinite-quantity contract for maintenance with an option to extend the ordering period by one year. This contract will support maintenance and related tasks for Ogden Air Logistics Complex, Hill Air Force Base, Utah; Aerospace Maintenance and Regeneration Group, Davis-Monthan AFB, Arizona; Vandenberg AFB, California; Malmstrom AFB, Montana; Minot AFB, North Dakota; Randolph AFB, Texas; and Francis E. Warren AFB, Wyoming. Work is expected to be completed Dec. 6, 2025. This multiple-award is the result of a competitive acquisition and eight offers were received. Fiscal 2018 consolidated sustainment activity group - maintenance funds in the amount of $10,000 ($2,500 per awardee) are being obligated at the time of award. Air Force Sustainment Center, Hill AFB, Utah, is the contracting activity (FA8224-19-D-0011).

ARMY

Fluor Federal Solutions LLC, Greenville, South Carolina, was awarded a $145,720,840 firm-fixed-price contract for a weapons storage and maintenance facility. Bids were solicited with five received. Work will be performed in Laramie, Wyoming, with an estimated completion date of April 17, 2020. Fiscal 2016 military construction funds in the amount of $147,965,622 were obligated at the time of the award. U.S. Army Corps of Engineers, Omaha, Nebraska, is the contracting activity (W9128F-18-C-0029).

Intelligent Decisions LLC, Ashburn, Virginia, was awarded a $46,500,000 modification (P00005) to contract W912DY-18-F-0004 for information technology hardware, agnostic parts and accessories. Work will be performed in Ashburn, Virginia, with an estimated completion date of Dec. 11, 2019. Fiscal 2019 U.S. Army Corps of Engineers revolving funds in the amount of $46,500,000 were obligated at the time of the award. U.S. Army Corps of Engineers, Huntsville, Alabama, is the contracting activity.

Arrowpoint Corp.,* McLean, Virginia, was awarded a $17,022,960 modification (P00012) to contract W9133L-15-F-0011 for the management of the reserve component manpower system. Work will be performed in McLean, Virginia, with an estimated completion date of Dec. 15, 2019. Fiscal 2019 operations and maintenance, Army funds in the amount of $17,022,960 were obligated at the time of the award. National Guard Bureau, Arlington, Virginia, is the contracting activity.

FN America LLC, Columbia, South Carolina, was awarded a $13,273,603 modification (P00015) to contract W15QKN-15-D-0003 for work on the M240 series machine gun. One bid was solicited with one bid received. Work locations and funding will be determined with each order, with an estimated completion date of Dec. 8, 2019. U.S. Army Contracting Command, New Jersey, is the contracting activity.

The 106 Group Ltd.,* St. Paul, Minnesota (W912PP-19-D-0003); Brockington and Associates Inc.,* Peachtree Corners, Georgia (W912PP-19-D-0004); Desert Archaeology Inc.,* Tucson, Arizona (W912PP-19-D-0005); R. Christopher Goodwin & Associates Inc.,* Las Cruces, New Mexico (W912PP-19-D-0006); Harris Environmental Group Inc.,* Tucson, Arizona (W912PP-19-D-0007); Keres SEAS JV,* Albuquerque, New Mexico (W912PP-19-D-0008); Northland Research Inc.,* Tempe, Arizona (W912PP-19-D-0009); North Wind Resource Consulting LLC,* Phoenix, Arizona (W912PP-19-D-0010); Statistical Research Inc.,* Redlands, California (W912PP-19-D-0011); and Stell Environmental Enterprises Inc.,* Exton, Pennsylvania (W912PP-19-D-0012), will share in a $9,900,000 firm-fixed-price contract for tribal consultation, cultural resources, and environmental services. Bids were solicited with 12 received. Work locations and funding will be determined with each order, with an estimated completion date of Dec. 6, 2023. U.S. Army Corps of Engineers, Albuquerque, New Mexico, is the contracting activity.

DEFENSE LOGISTICS AGENCY

Parker-Hannifin Corp., Irvine, California, has been awarded a maximum $14,202,759 firm-fixed-price, indefinite-delivery/indefinite-quantity delivery order (SPRRA1-19-F-0113) against a three-year contract (SPRRA1-19-D-0031) for hydraulic manifolds. This was a sole-source acquisition using justification 10 U.S. Code 2304 (c)(1), as stated in Federal Acquisition Regulation 6.302-1. Location of performance is California, with a Nov. 30, 2023, performance completion date. Using military service is Army. Type of appropriation is fiscal 2019 Army working capital funds. The contracting activity is the Defense Logistics Agency Aviation, Redstone Arsenal, Alabama.

Aurora Industries LLC,* Camuy, Puerto Rico, has been awarded a maximum $36,835,535 indefinite-delivery/indefinite-quantity contract for duffle bags. This is a two-year contract with no option periods. This was a competitive 8(A) set-aside acquisition with three responses received. Location of performance is Puerto Rico, with a Dec. 6, 2020, performance completion date. Using military services are Army, Navy, Air Force, Marine Corps and Coast Guard. Type of appropriation is fiscal 2019 through 2021 defense working capital funds. The contracting activity is the Defense Logistics Agency Troop Support, Philadelphia, Pennsylvania (SPE1C1-19-D-1117).

*Small business

https://dod.defense.gov/News/Contracts/Contract-View/Article/1708175/source/GovDelivery/

On the same subject

  • The Cybersecurity 202: Hackers just found serious vulnerabilities in a U.S. military fighter jet

    August 19, 2019 | International, Aerospace

    The Cybersecurity 202: Hackers just found serious vulnerabilities in a U.S. military fighter jet

    By Joseph Marks LAS VEGAS — In a Cosmopolitan hotel suite 16 stories above the Def Con cybersecurity conference this weekend, a team of highly vetted hackers tried to sabotage a vital flight system for a U.S. military fighter jet. And they succeeded. It was the first time outside researchers were allowed physical access to the critical F-15 system to search for weaknesses. And after two long days, the seven hackers found a mother lode of vulnerabilities that — if exploited in real life — could have completely shut down the Trusted Aircraft Information Download Station, which collects reams of data from video cameras and sensors while the jet is in flight. They even found bugs that the Air Force had tried but failed to fix after the same group of hackers performed similar tests in November without actually touching the device. “They were able to get back in through the back doors they already knew were open,” Will Roper, the Air Force's top acquisition official, told me in an exclusive briefing of the results. The hackers lobbed a variety of attacks — including injecting the system with malware and even going at it with pliers and screwdrivers. When I saw it, the metal box that's usually secure on the aircraft had wires hanging out the front. The hackers briefed Roper on the findings on Saturday afternoon. He was surrounded by discarded pizza boxes, iced coffee drinks — and the hotel's drinking glasses filled with screws, nuts and bolts removed from five fully dismantled TADS devices, which run about $20,000 a pop. He'd expected the results to be about this bad, Roper told me on a private tour of the hacking event. He pinned the weaknesses on decades of neglect of cybersecurity as a key issue in developing its products, as the Air Force prioritized time, cost and efficiency. He's trying to turn that around, and is hopeful about the results of the U.S. government's newfound openness to ethical hackers. He'd come straight from Def Con's first-ever Aviation Village, which the Air Force helped establish, and was wearing a gray T-shirt with the words “No, Mr. Bond, I expect you to hack,” emblazoned on the front — a riff on a classic line from the 1964 James Bond film “Goldfinger.” This is a drastic change from previous years, when the military would not allow hackers to try to search for vulnerabilities in extremely sensitive equipment, let alone take a literal whack at it. But the Air Force is convinced that unless it allows America's best hackers to search out all the digital vulnerabilities in its planes and weapons systems, then the best hackers from adversaries such as Russia, Iran and North Korea will find and exploit those vulnerabilities first, Roper told me. “There are millions of lines of code that are in all of our aircraft and if there's one of them that's flawed, then a country that can't build a fighter to shoot down that aircraft might take it out with just a few keystrokes,” he said. Roper wants to put his military hardware where his mouth is. During next year's Def Con conference, he wants to bring vetted hackers to Nellis or Creech Air Force bases near Las Vegas where they can probe for bugs on every digital system in a military plane, including for ways that bugs in one system can allow hackers to exploit other systems until they've gained effective control of the entire plane. He also wants to open up the ground control system for an operational military satellite for hacker testing, he said. “We want to bring this community to bear on real weapons systems and real airplanes,” Roper told me. “And if they have vulnerabilities, it would be best to find them before we go into conflict.” Those hacking challenges will also be useful for the private sector because military planes and satellites share many of their computer systems with the commercial versions of those products, Roper said, and the Air Force can share its findings. The seven hackers probing the TADS devices were all brought to Vegas by the cybersecurity company Synack, which sells the Pentagon third-party vulnerability testing services, under a contract with the Defense Digital Service, a team of mostly private-sector technology stars who try to solve some of the Pentagon's thorniest technology problems during short-term tours. The Defense Digital Service started by organizing large-scale hacking competitions in 2016, with names such as “Hack the Pentagon” and, eventually, “Hack the Air Force.” These were open to almost anybody — but included only public-facing hacking targets such as military service websites and apps. Shortly after, they also began opening more sensitive systems to a smaller number of vetted hackers who sign nondisclosure agreements. DDS has run about a dozen of those more sensitive hacking competitions so far, but this is the first time it has offered up the same system for hacking twice, said Brett Goldstein, DDS's director, who earned a reputation in technology as Open Table's IT director and chief data officer for the city of Chicago. “That's important because security is a continuous process,” he told me. “You can't do an exercise and say, ‘Oh, we found everything' and check the box. You need to constantly go back and reevaluate.” They also allowed the hackers to be more aggressive this time and to physically disassemble the TADS systems to get a better idea of what kinds of digital attacks might be effective, Goldstein said. That meant the hackers could simulate a cyberattack from adversaries that had infiltrated the vast network of suppliers that make TADS components and had sophisticated knowledge about how to compromise those elements. They could also advise the Air Force about flaws in how the TADS hardware was built that make it more susceptible to digital attacks. Moving forward, Roper told me, he wants to start using that knowledge to mandate that Air Force vendors build better software and hardware security controls into their planes and weapons systems upfront so the Air Force doesn't have to do so much cybersecurity work on the back end. He's up against an arcane and byzantine military contracting process, however, that's going to make those sorts of fundamental reforms extremely difficult, he acknowledged. In some cases, the company that built an Air Force system owns the software embedded in that system and won't let the Air Force open it up for outside testing, he says. In other cases, the Air Force is stuck with legacy IT systems that are so out of date that it's difficult for even the best technologists to make them more secure. “It's difficult to do this going backward, but we're doing our best,” Roper told me. “I can't underscore enough, we just got into the batter's box for what's going to be a long baseball game.” https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/08/14/the-cybersecurity-202-hackers-just-found-serious-vulnerabilities-in-a-u-s-military-fighter-jet/5d53111988e0fa79e5481f68/

  • Peerless joint venture wins $9 million contract to support nuclear weapons arsenal

    September 23, 2021 | International, Aerospace

    Peerless joint venture wins $9 million contract to support nuclear weapons arsenal

    Local joint venture pulls in $9 million contract to support nation's nuclear weapons arsenal

  • Rafael intercepts drone with newly combined Spyder air defense systems

    January 10, 2024 | International, Aerospace

    Rafael intercepts drone with newly combined Spyder air defense systems

    Rafael Advanced Defense Systems had combined the short-range and medium-range variants of the Spyder surface-to-air system.

All news