Back to news

March 23, 2020 | International, Aerospace, Naval, Land, C4ISR, Security

Pentagon declares defense contractors ‘critical infrastructure,’ must continue work

By: Aaron Mehta

Updated 3/20 at 6:45 PM EST with new comment from Bialos.

WASHINGTON — The U.S. Defense Department has declared that defense contractors are “critical infrastructure” to national security, a designation that comes with an expectation to maintain a consistent, normal work schedule amid the outbreak of the new coronavirus, COVID-19.

In a Friday memo to industry, Undersecretary of Defense for Acquisition and Sustainment Ellen Lord made it clear that she wants defense companies to continue to deliver their products and services to the Pentagon on time.

“If you work in a critical infrastructure industry, as designated by the Department of Homeland Security, you have a special responsibility to maintain your normal work schedule,” Lord wrote. “We need your support and dedication in these trying times to ensure the security of this Nation. I understand that this national emergency presents a challenge and we are dedicated to working closely with you to ensure the safety of the workforce and accomplishments of the national security mission.”

Lord also spelled out large swaths of the industrial base for which this order applies, including the aerospace sector; mechanical and software engineers; manufacturing/production workers; IT support; security staff; security personnel; intelligence support; aircraft and weapon systems mechanics and maintainers; suppliers of medical suppliers and pharmaceuticals; and critical transportation.

Included in the designation are personnel working for companies as well as subcontractors who perform under contract for the department. Contractors who perform tasks such as providing office supplies, recreational support or lawn care are not considered essential.

By designating the defense industry in such a way, companies involved may be able to get around state-directed shutdowns such as the one in New York right now. Similarly designated workers include, among many others, law enforcement, health care providers, water and power authorities, and IT support for emergency services — all of whom are still on duty in the current crisis.

In the memo, Lord noted, companies involved should “follow guidelines from the Centers for Disease Control and Prevention as well as State and local government officials regarding strategies to limit disease spread.” Some companies have instituted work-from-home policies where applicable, although in cases such as production of defense equipment or work in secure facilities, that option appears unrealistic.

Force of law?

Things may not be as cut and dry as Lord's memo makes it seem, warned Jeff Bialos, a partner with the Eversheds-Sutherland law firm and former deputy under secretary of defense for industrial affairs.

He notes that Lord's memo is based on guidance, put out the day before by the Department of Homeland Security, which does not carry with it the force of law to override decisions on work stoppage that may come from a state.

“These are guidelines only. They do not have the force of effect of law,” Bialos warned.

Bialos thinks the memo may be a useful tool for industry to turn to local governments that are eyeing a work shutdown and say they should be given an exemption. But should the local government decide not to grant that exemption, how much force the memo may have is unclear.

“Thee's no slam dunk here. Everyone is struggling with these issues. And I think what this memo does is put another arrow in the quiver of a company that wants to keep doing business to meet defense needs. And it also is a document companies can provide to localities and states, and say ‘please give us an exemption.'”

In a statement released late Friday, Lt. Col. Mike Andrews, a spokesman for Lord, said the undersecretary met today with Senate Armed Services Committee chairman Sen. Jim Inhofe, R-Ok., on the memo and other issues.

Lord “remains committed to daily communication and collaboration with the defense industrial base, especially the defense industry trade associations. In addition, she'll be contacting several state Governors to discuss state-specific critical infrastructure and essential workforce efforts,” Andrews said, adding that a daily call between members of Lord's team and industry associations continues.

Jerry McGinn, a longtime official at the department's Office of Manufacturing and Industrial Base Policy, said the move was the right one to make.

“You're essentially trying to keep that workforce engaged and supporting that customer. This is trying to give DoD organizations flexibility to reduce contract disruptions, stop-work orders, and other actions that could impact the contractor workforce” said McGinn, now executive director of the Center for Government Contracting at George Mason University.

“And that in general is a good thing. It's not something you want to do for six months, because then you might have trouble monitoring performance, but for this critical time it seems like a reasonable kind of thing to do.”

https://www.defensenews.com/pentagon/2020/03/20/pentagon-declares-defense-contractors-critical-infrastructure-must-continue-work/

On the same subject

  • Cyberdéfense : une France offensive et complètement décomplexée

    January 21, 2019 | International, C4ISR

    Cyberdéfense : une France offensive et complètement décomplexée

    Par Michel Cabirol Depuis plusieurs années, la France ne s'interdit pas de lancer des attaques cyber. Elle rend coup pour coup à ses adversaire dans le cyberespace. Et au-delà... Le ministère des Armées vient de terminer ses travaux doctrinaux en matière de lutte informatique offensive. Le monde est en guerre. Personne n'a vraiment conscience de l'ampleur de cette guerre très discrète à l'exception d'un cercle d'initiés. Vendredi lors d'un discours dans la droite ligne de celui en septembre 2015 de son prédécesseur Jean-Yves Le Drian, la ministre des Armées Florence Parly a dévoilé une attaque cyber de très grande ampleur contre son ministère, qui a commencé en 2017. Une attaque très sophistiquée à base du Malware Turla, un ver qui s'introduit dans les sites des administrations étatiques et des entreprise. Un ver qui s'est déjà introduit dans les sites de la Défense américaine et avait été décrit comme la plus grande brèche dans l'histoire des ordinateurs de l'armée US. "Nous sommes fin 2017, a raconté Florence Parly. Des connexions anormales sur le serveur de la messagerie internet du ministère des Armées sont constatées. Ces connexions ont révélé après analyse qu'un attaquant cherchait à accéder directement au contenu de boites mails de 19 cadres du ministère parmi elles, celles de quelques personnalités sensibles. Sans notre vigilance, c'est toute notre chaîne d'alimentation en carburant de la Marine nationale qui aurait été exposée. Surtout, cette tentative d'attaque a duré jusqu'en avril 2018. Nous avons pu patiemment et, en étroite collaboration avec nos partenaires, remonter la chaîne des serveurs et des adresses IP Derrière se cachait un mode d'attaque bien connu de nos services et que certains attribuent à Turla". Deux attaques par jour En 2017, le ministère des Armées a recensé 700 événements de sécurité, dont 100 attaques qui ont ciblé ses réseaux. En 2018, ce même nombre a été atteint dès septembre. "En moyenne, a précisé Florence Parly, ce sont donc plus de deux événements de sécurité par jour qui ont touché tout autant notre ministère, nos opérations, nos expertises techniques et même un hôpital d'instruction des Armées". Certaines de ces attaques, directes, ciblaient précisément le ministère. D'autres visaient les industriels de la défense. Par conséquent, confirme le chef d'état-major des armées (CEMA), le général François Lecointre, le cyberespace recèle "des potentialités de désorganisation massive qui ne doivent pas être ignorées mais au contraire intégrées dans une pensée stratégique renouvelée". Certaines attaques sont "le fruit de groupes malveillants,a précisé la ministre. D'autres de hackers isolés. Mais certaines, nous le savons, viennent d'Etats pour le moins indiscrets, pour le moins... décomplexés". Aujourd'hui, un certain nombre de nations incluent des effets cyber dans leurs stratégies militaires et leurs modes d'action. Elles s'y préparent à l'occasion d'exercices mêlant capacités conventionnelles et cyber. La France fait partie de ce club de nations. "Nos adversaires potentiels doivent savoir à quoi s'attendre" s'ils décident de passer à l'attaque dans le cyberespace, a précisé la ministre des Armées. "L'arme cyber est une arme d'emploi", a rappelé le général Lecointre. Les attaques cyber ont le plus souvent un caractère d'irrégularité. Le cyberespace favorise les actions de type guérilla ou de harcèlement en raison de la faible traçabilité des attaques cyber qui sont très difficilement attribuables. En outre, l'invulnérabilité du cyberespace est très difficile à conserver dans la durée compte tenu de l'étendue du milieu et de sa complexité. Enfin, l'accessibilité aisée pour les acteurs non-étatiques et les petits Etats offrent un outil offensif qui peut être volé, copié ou imité par des adversaires ou des acteurs tiers. Une doctrine de lutte informatique offensive Si une éventuelle riposte à l'attaque Turla n'a pas été révélée, Florence Parly a toutefois confirmé que la France s'octroierait le droit de riposter face à des cyber-attaques . "En cas d'attaque cyber contre nos forces, nous nous réservons le droit de riposter, dans le respect du droit, par les moyens et au moment de notre choix, a-t-elle expliqué. Nous nous réservons aussi, quel que soit l'assaillant, le droit de neutraliser les effets et les moyens numériques employés. Mais nous serons aussi prêts à employer en opérations extérieures l'arme cyber à des fins offensives, isolément ou en appui de nos moyens conventionnels, pour en démultiplier les effets". "La capacité à conduire des opérations militaires dans le cyberespace permet d'obtenir certains avantages sur les thé'tres d'opération des armées", a d'ailleurs reconnu le général Lecointre. "Nous considérons l'arme cyber comme une arme opérationnelle à part entière. C'est un choix nécessaire, en responsabilité. Nous en ferons un usage proportionné, mais que ceux qui sont tentés de s'attaquer à nos forces armées le sachent : nous n'aurons pas peur de l'utiliser", a averti la ministre. Une stratégie cyberdéfense offensive qui n'est pas nouvelle. Mais la France a affiné tout au long de ces derniers mois une doctrine de lutte informatique offensive à des fins militaires, qui est considérée comme une arme de supériorité opérationnelle. "La stratégie vise pour l'essentiel à acquérir et à conserver la supériorité (ou, tout au moins, une situation favorable) afin d'assurer la défense de nos intérêts et la préservation de notre souveraineté", a précisé le CEMA. L'arme cyber, un effet démultiplicateur C'est le commandant de la cyberdéfense, le général Olivier Bonnet des Paillerets, qui a été chargé de rédiger une doctrine de lutte informatique offensive. La France mis en place en mai 2017 le commandement de la cyberdéfense (COMCYBER). "Immédiateté de l'action, dualité des cibles, hyper-connectivité sont autant de facteurs de risques qui ont été pris en compte dans l'élaboration de la doctrine, tout comme la notion d'irrégularité", a précisé le CEMA. Une doctrine dont les éléments les plus sensibles resteront toutefois logiquement secrets. Ces attaques cyber seront conduites de façon autonome ou en combinaison des moyens militaires conventionnels. Selon le ministère, l'arme cyber vise à produire des effets à l'encontre d'un système adverse pour en altérer la disponibilité ou la confidentialité des données. Car la lutte informatique offensive permet de tirer parti des vulnérabilités des systèmes numériques adverses. "La lutte informatique offensive peut être un formidable démultiplicateur d'effets", a d'ailleurs estimé le chef d'état-major des armées. Pour le CEMA, la lutte informatique offensive élargit considérablement "le champ des possibles et la palette des options modulables que je suis susceptible de proposer au Président de la République". Elle peut se combiner et, si nécessaire, se substituer aux autres capacités militaires de recueil et d'action sur tout le spectre des missions militaires (renseigner, défendre, agir), a-t-il expliqué. "En réalité, les armes cyber apparaissent désormais comme des instruments incontournables de l'action militaire gr'ce à leur capacité à agir au profit des armes employées dans les autres milieux", a-t-il souligné. Les discours de Florence Parly, qui n'a rien annoncé de nouveau dans le domaine de la cyberdéfense, et du général François Lecointre préparent-ils à un nouveau changement de doctrine, cette fois-ci, dans la politique spatiale de défense, qui pourrait être dotée elle aussi d'une doctrine offensive,. Il semble qu'une France plus pragmatique mais pas forcément plus guerrière tourne la page d'une France romantique, voire naïve, dans les domaines cyber et de l'espace... https://www.latribune.fr/entreprises-finance/industrie/aeronautique-defense/cyberdefense-une-france-offensive-prete-a-rendre-coup-pour-coup-a-ses-adversaires-804456.html

  • US Army aims to speed up FLRAA’s major subsystem and weapons development

    March 31, 2021 | International, Aerospace

    US Army aims to speed up FLRAA’s major subsystem and weapons development

    The US Army has granted Bell and a Sikorsky-Boeing team contracts to speed up the time it ought to take to complete preliminary design reviews for major subsystems and conceptual weapon systems on their Future Long Range Assault Aircraft proposals.

  • Contract Awards by US Department of Defense - May 06, 2020

    May 7, 2020 | International, Aerospace, Naval, Land, C4ISR, Security

    Contract Awards by US Department of Defense - May 06, 2020

    DEFENSE LOGISTICS AGENCY Intuitive Surgical Inc., Sunnyvale, California, has been awarded a maximum $420,000,000 firm-fixed-price, indefinite-delivery/indefinite-quantity contract for surgical robots, instruments and their related accessories. This is a five-year contract with no option periods. This was a competitive acquisition with 105 responses received. Location of performance is California, with a May 5, 2025, performance completion date. Using customers are Army, Navy, Air Force, Marine Corps and federal civilian agencies. Type of appropriation is fiscal 2020 through 2025 defense working capital funds. The contracting activity is the Defense Logistics Agency Troop Support, Philadelphia, Pennsylvania (SPE2D1-20-D-0006). Hartford Provision Co., doing business as HPC Foodservice, South Windsor, Connecticut, has been awarded a maximum $49,473,750 fixed-price with economic-price-adjustment, indefinite-quantity contract for full-line food distribution. This was a competitive acquisition with one response received. This is a four-year contract with no option periods. Locations of performance are Massachusetts, Rhode Island and Connecticut, with a May 6, 2024, performance completion date. Using customers are Air Force, Army, Marine Corps, Navy and federal civilian agencies. Type of appropriation is fiscal 2020 through 2024 defense working capital funds. The contracting agency is the Defense Logistics Agency Troop Support, Philadelphia, Pennsylvania (SPE300-20-D-3271). The Will-Burt Co., Orrville, Ohio, has been awarded a maximum $43,186,213 fixed-price long term contract for masts. This was a competitive acquisition with one offer received. This is a five-year contract with no option periods. Location of performance is Ohio, with a May 5, 2025, performance completion date. Using military services are Army, Navy, Air Force and Marine Corps. Type of appropriation is fiscal 2020 through 2025 defense working capital funds. The contracting activity is the Defense Logistics Agency Land and Maritime, Columbus, Ohio (SPE7MX-20-D-0078). CORRECTION: The contract announced on April 29, 2020, for Raytheon Co., Andover, Massachusetts (SPRRA2-20-C-0023), for $13,688,190 was announced with an incorrect award date. The correct award date is May 4, 2020. NAVY Huntington Ingalls Industries Inc., Newport News, Virginia, is awarded an $187,126,853 modification to previously awarded contract N00024-18-C-2106 to prepare and make ready for the refueling complex overhaul (RCOH) of USS John C. Stennis (CVN 74). Work will be performed in Newport News, Virginia (65%); and Norfolk, Virginia (35%). This modification will extend the period of performance for continued advance planning efforts including material forecasting, long lead time material procurement, purchase order development, technical document and drawing development, scheduling, resource forecasting and planning, development of cost estimates for work to be accomplished, data acquisition, pre-overhaul tests and inspections, pre-overhaul preparations, refueling preparations and other technical studies as required to prepare and make ready for the CVN 74 RCOH accomplishment. Work is expected to complete by January 2021. This modification constitutes the award of an existing option for an additional six months of effort. The original contract and this modification will be accomplished by Huntington Ingalls Industries Inc., Newport News, Virginia, under the authority of 10 U.S. Code 2304(c)(1). Huntington Ingalls Industries Inc. is the original building yard contractor for all ships of the CVN-68 class, the reactor plant planning yard, the lead design refueling yard and the only private shipyard capable of refueling and overhauling nuclear powered aircraft carriers. Therefore, it is the only source with the knowledge, experience and facilities required to accomplish this effort in support of the CVN 74 RCOH. Fiscal 2020 shipbuilding and conversion (Navy) funding in the amount of $187,126,853 will be obligated at time of award and will not expire at the end of the current fiscal year. The Naval Sea Systems Command, Washington, D.C., is the contracting activity. The Boeing Co., Seattle, Washington, is awarded a $29,059,944 modification (P00172) to previously awarded firm-fixed-price contract N00019-14-C-0067 for the production and delivery of 10 P-8A A-kits, 10 turret deployment units and eight mechanism units in support of Lot 10 P-8A production aircraft. Work will be performed in Seattle, Washington (91%); and Mesa, Arizona (9%), and is expected to be complete by January 2024. Fiscal 2019 aircraft procurement (Navy) funds in the amount of $29,059,944 will be obligated at time of award, none of which will expire at the end of the current fiscal year. The Naval Air Systems Command, Patuxent River, Maryland, is the contracting activity. W.M. Jordan Co. Inc., Newport News, Virginia, is awarded $26,929,000 for firm-fixed-price task order N40085-20-F-5271, under a multiple award construction contract for the design-build repair and renovation of Bachelor Enlisted Quarters Building (BEQB) 3609, Joint Expeditionary Base, Little Creek-Fort Story, Virginia. Work will be performed in Virginia Beach, Virginia. The work will provide for the design and construction renovation of BEQB 3609 to meet current quality standards and facility criteria for unaccompanied housing for the Navy. The site and building will be modified to meet anti-terrorism force protection requirements. Major building systems such as plumbing, heating, ventilation, and air condition, electrical and fire protection will be replaced with new systems. Work is expected to be complete by October 2022. Fiscal 2020 operations and maintenance (Navy) contract funds in the amount of $26,929,000 are obligated on this award and will expire at the end of the current fiscal year. Three proposals were received for this task order. The Naval Facilities Engineering Command, Mid-Atlantic, Norfolk, Virginia, is the contracting activity (N40085-19-D-9089). L3 Adaptive Methods Inc., Centreville, Virginia, is awarded a $12,719,770 cost-plus-fixed-fee and cost contract for engineering services and capability development in support of the Undersea Warfare and Surface Warfare systems. Work will be performed in Keyport, Washington (30%); Centreville, Virginia (25%); Rockville, Maryland (15%); Manassas, Virginia (10%); Herndon, Virginia (5%); Dahlgren, Virginia (5%); Newport, Rhode Island (5%); Austin, Texas (1%); Moorestown, New Jersey (1%); Honolulu, Hawaii (1%); Fairfax, Virginia (1%); and Laurel, Maryland (1%), and is expected to be complete by April 2021. If all options are exercised, work will continue through April 2025. This contract includes options which, if exercised, would bring the cumulative value of this contract to $69,458,660. This contract combines purchases for the Navy (98%) and the government of Japan (2%) under the Foreign Military Sales (FMS) program. Fiscal 2020 research, development, test and evaluation (Navy); 2020 operations and maintenance (Navy); 2020 shipbuilding and conversion (Navy); and FMS Japan funding in the amount of $6,142,292 will be obligated at time of award. Funding in the amount of $1,191,829 will expire at the end of the current fiscal year. This contract was not competitively procured in accordance with Section 1709 of the 2018 National Defense Authorization Act that modifies 15 U.S. Code 638(r), this Small Business Innovative Research Phase (SBIR) III contract is being awarded to L3 Adaptive Methods Inc., which is the same firm that was competitively selected for the SBIR Phase I and II awards. The Naval Sea Systems Command, Washington, D.C., is the contracting activity (N00024-20-C-5211). The Boeing Co., Seattle, Washington, is awarded a $7,039,596 cost-plus-fixed-fee order (N00019-20-F-0647) against previously issued basic ordering agreement N00019-16-G-0001. This order procures non-recurring engineering for the design, fabrication and correction of deficiencies required for the delivery and installation of retrofit kits for Navy P-8A aircraft with Increment 3 Engineering Change Proposal (ECP) 6 capabilities. Work will be performed in Puget Sound, Washington. The P-8A ECP 6 provides a significant modification to the baseline aircraft, installing new airframe racks, radomes, antennas, sensors and wiring, while incorporating a new combat system suite with an improved computer processing and security architecture capability at the higher than secret level, a wide band satellite communication system, an anti-submarine warfare signal intelligence capability, a minotaur track management system and additional communications and acoustics systems to enhance search, detection and targeting capabilities. Work is expected to be complete by May 2021. Fiscal 2020 aircraft procurement (Navy) funds in the amount of $7,039,596 will be obligated at time of award, none of which will expire at the end of the current fiscal year. The Naval Air Systems Command, Patuxent River, Maryland, is the contracting activity. ARMY Stantec Consulting Services Inc., Lexington, Kentucky, was awarded a $45,000,000 firm-fixed-price contract for U.S. Army Corps of Engineers Dam Safety Modification Mandatory Center of Expertise, national dam and levee safety, and geotechnical services. Bids were solicited via the internet with two received. Work locations and funding will be determined with each order, with an estimated completion date of May 5, 2025. U.S. Army Corps of Engineers, Huntington, West Virginia, is the contracting activity (W91237-20-D-0010). Thomas Instrument Inc.,* Brookshire, Texas, was awarded an $8,788,301 firm-fixed-price contract for maintenance and overhaul of UH-60 Blackhawk helicopters. Bids were solicited via the internet with five received. Work locations and funding will be determined with each order, with an estimated completion date of May 6, 2025. U.S. Army Contracting Command, Redstone Arsenal, Alabama, is the contracting activity (W58RGZ-20-F-0368). AIR FORCE Space Exploration Technologies Corp., Hawthorne, California, has been awarded an $8,904,146 firm-fixed-price modification (P00007) to contract FA8811-19-C-0004 for non-National Security Space (NSS) Fleet surveillance. This contract provides for non-NSS Fleet surveillance efforts across the Space Exploration family of launch vehicles for non-NSS missions. The location of performance is Hawthorne, California; Vandenberg, California; and Cape Canaveral Air Force Space Station, Florida. The work is expected to be completed by Nov. 8, 2020. Fiscal 2019 missile procurement funds in the amount of $2,226,037; and fiscal 2019 space procurement funds in the amount of $6,678,110 will be obligated at the time of award. Space and Missile Systems Center, Los Angeles Air Force Base, California, is the contracting activity (FA8811-19-C-0004). AT&T Government Solutions Inc., Oakton, Virginia; and El Segundo, California, has been awarded a $8,449,798 modification (P00047) to contract FA8819-15-F-0005 for continued mission support services to the Space Force, Air Force Space and Missile Systems Center, Special Programs Directorate. Work will be performed at Los Angeles Air Force Base, California; and Colorado Springs, Colorado, and is expected to be completed by Jan. 31, 2021. Fiscal 2020 research, development, test and evaluation funds in the amount of $1,976,668; fiscal 2020 operations and maintenance funds in the amount of $453,295; and fiscal 2019 Space production funds in the amount of $76,500 are being obligated at the time of award. Total cumulative face value of the contract is $54,074,819. The Air Force Space and Missile Systems Center, Los Angeles Air Force Base, California, is the contracting activity. *Small business https://www.defense.gov/Newsroom/Contracts/Contract/Article/2178741/source/GovDelivery/

All news