25 mars 2020 | International, Aérospatial, Naval, C4ISR, Sécurité

Contract Awards by US Department of Defense - March 24, 2020

MISSILE DEFENSE AGENCY

Lockheed Martin Corp., Missiles and Fire Control, Dallas, Texas, is being awarded a $932,836,737 modification (P00026) to previously-awarded contract HQ0147-17-C-0032 to exercise an option for the production of Terminal High Altitude Area Defense (THAAD) interceptors and associated one-shot devices to support the U.S. government (USG) and the Kingdom of Saudi Arabia (KSA) Foreign Military Sales (FMS) case requirements. The THAAD interceptors and associated one-shot devices will be procured under fixed-price incentive (firm target) contract line items. The value of this contract is increased from $5,366,947,800 to $6,299,784,537. The work will be performed in Dallas, Texas; Sunnyvale, California; Huntsville, Alabama; Camden, Arkansas; and Troy, Alabama, with an expected completion date of April 1, 2026. Fiscal 2020 USG procurement funds in the amount of $327,498,097; and KSA FMS funds in the amount of $605,338,640 are being obligated at time of award. The Missile Defense Agency, Huntsville, Alabama, is the contracting activity.

NAVY

CACI Inc. - Federal, Chantilly, Virginia, is awarded $180,336,750 for a single award, indefinite-delivery/indefinite-quantity, performance based, cost-plus-fixed-fee, level-of-effort contract (N65236-20-D-8003) to provide special operations communications systems, satellite communications (SATCOM) and network support services. Work will be performed in Fayetteville, North Carolina (65%); continental U.S. (20%); outside continental U.S. (10%); and Tampa, Florida (5%). This contract will require command, control, communications, computers, combat systems, intelligence, surveillance and reconnaissance to exercise planning and evaluation, systems integration, operational systems, fielding, training, certification, maintenance, logistics, configuration management, systems engineering, network engineering, documentation and graphics support, program management, quality assurance and life-cycle sustainment management and support of deployable tactical SATCOM systems and military information, support operations and equipment for various joint warfighting customers at multiple locations within the global area of responsibility. Work is expected to be complete by March 2025. If the option is exercised, work may continue until September 2025. The contract includes a five-year ordering period and one six-month option with the cumulative value (ceiling) of this contract being $199,486,199. Fiscal 2019 procurement defense agency funding in the amount of $10,000 will be obligated at time of award. Funds will not expire at the end of the current fiscal year. The contract was competitively procured by full and open competition via the Naval Information Warfare Systems Command E-Commerce Central website and two offers were received. The Naval Information Warfare Center Atlantic, Charleston, South Carolina, is the contracting activity.

VT Halter Marine Inc., Pascagoula, Mississippi, is awarded a $39,906,609 firm-fixed-price modification to previously awarded contract N00024-18-C-2230 to exercise an option for the detail design and construction of an Auxiliary Personnel Lighter – Small (APL(S)). Work will be performed in Pascagoula, Mississippi (58%); Boca Raton, Florida (25%); Mandeville, Louisiana (5%); Metairie, Louisiana (5%); Gautier, Mississippi (4%); and Billerica, Massachusetts (3%), and is expected to be complete by May 2021. The initial contract was for the detail design and construction of the lead and second craft in the APL(S) 67 class; this option exercise is for the fourth craft. Construction of all APL(S) craft is firm-fixed-price. The contract also includes options for associated support efforts related to the craft design and construction for deployment spare parts, crew familiarization, international delivery and production-level technical data package and rights. Fiscal 2020 shipbuilding and conversion (Navy) funding in the amount of $39,906,609 will be obligated at time of award and will not expire at the end of the current fiscal year. The Naval Sea Systems Command, Washington, District of Columbia, is the contracting activity.

Honeywell International Inc., Minneapolis, Minnesota, is awarded a $10,340,614 cost-plus-fixed-fee job order under basic ordering agreement N00164-18-G-GM66 for engineering sustainment support services of the strategic radiation-hardened microelectronics facility and production capability. Work will be performed in Plymouth, Minnesota, and is expected to be complete by March 2022. The sustainment services under the job order cover engineering efforts to sustain Honeywell International's strategic radiation-hardened microelectronics capability through researching extensions of existing products and technology, radiation testing and analysis, and sustaining existing application specific integrated circuit product support and multi-project wafer test/modeling capability. The services are required to maintain a domestic, trusted source for strategic radiation-hardened microelectronics to meet the Department of Defense certification to Congress, as stipulated by the fiscal 2018 National Defense Authorization Act Section 1670. Defense Production Act Title III funding in the amount of $10,340,614 will be obligated at time of award and will not expire at the end of the current fiscal year. This contract was not competitively procured in accordance with 10 U.S. Code 2304(c)(3), and was awarded to a particular source in order to maintain a facility, producer, manufacturer or other supplier available for furnishing property or services to achieve industrial mobilization. The Naval Surface Warfare Center, Crane Division, Crane, Indiana, is the contracting activity (N00164-20-F-G001).

Pratt and Whitney - United Technologies Corp., Hartford, Connecticut, is awarded a $7,681,734 firm-fixed-price delivery order (N00019-20-F-0658) against a previously issued basic ordering agreement (N00019-17-G-8008). This order provides for the production and delivery of seven Lift Fan Inter Stage Vane (LF ISV) kits for the Marine Corps in support of the Joint Strike Fighter program. Work will be performed in Indianapolis, Indiana. The new LF ISV will provide lift fan operations over an increased temperature range, improved trailing edge angle conformance and will address vibration and flutter concerns. Work is expected to be complete by July 2021. Fiscal 2020 aircraft procurement (Navy) funds in the amount of $7,681,734 will be obligated at time of award, none of which will expire at the end of the current fiscal year. The Naval Air Systems Command, Patuxent River, Maryland, is the contracting activity.

DEFENSE LOGISTICS AGENCY

Ceradyne Inc., Irvine, California, has been awarded a maximum $111,100,000 firm-fixed-price, indefinite-delivery/indefinite-quantity contract for enhanced small arms protective inserts. This was a competitive acquisition with two responses received. This is an 18-month base contract with two one-year option periods. Location of performance is California, with a Dec. 30, 2021, performance completion date. Using military services are Army and Air Force. Type of appropriation is fiscal 2020 through 2021 defense working capital funds. The contracting activity is the Defense Logistics Agency Troop Support, Philadelphia, Pennsylvania (SPE1C1-20-D-1242).

SupplyCore Inc.,* Rockford, Illinois, has been awarded a maximum $75,000,000 firm-fixed-price contract for facilities maintenance, repair and operations items. This was a sole-source acquisition using justification 10 U.S. Code 2304(c)(1), as stated in Federal Acquisition Regulation 6.302-1. This is an 18-month bridge contract with no option periods. Location of performance is Illinois, with a Sept. 24, 2021, performance completion date. Using military services are Army, Navy, Air Force, Marine Corps and Coast Guard. Type of appropriation is fiscal 2020 through 2021 defense working capital funds. The contracting activity is the Defense Logistics Agency Troop Support, Philadelphia, Pennsylvania (SPE8E3-20-D-0008).

TW Metals Inc., Carol Stream, Illinois, has been awarded a maximum $62,000,000 firm-fixed-price with economic-price-adjustment contract for commercial metal products. This was a sole-source acquisition using justification 10 U.S. Code 2304 (c)(1), as stated in Federal Acquisition Regulation 6.302-1. This is an 18-month bridge contract. Locations of performance are Connecticut, Delaware, District of Columbia, Maine, Maryland, Massachusetts, New Hampshire, New Jersey, New York, Ohio, Pennsylvania, Rhode Island, Vermont, Illinois and West Virginia, with a Sept. 24, 2021, performance completion date. Using military services are Army, Navy, Air Force and Marine Corps. Type of appropriation is fiscal 2020 through 2021 defense working capital funds. The contracting activity is the Defense Logistics Agency Troop Support, Philadelphia, Pennsylvania (SPE8E5-20-D-0001).

AIR FORCE

L-3 Communications Integrated Systems, Greenville, Texas, has been awarded a not-to-exceed $85,000,005 firm-fixed-price, undefinitized contract for engineering, procurement and fabrication which will result in Phase One modification to the mission aircraft. Work will be performed in Greenville, Texas, and is expected to be completed by October 2022. This contract involves 100% foreign military sales and is the result of a sole-source acquisition. Foreign Military Sales funds in the amount of $41,600,000 are being obligated at the time of award. The 645th Aeronautical Systems Group, Wright-Patterson Air Force Base, Ohio, is the contracting activity (FA8620-20-F-4837).

JW Clark Enterprises Inc., Chesapeake, Virginia, has been awarded a $16,000,000 modification (P00006) to previously awarded contract FA4800-16-D-0001 to exercise Option Year Four. This modification provides simplified acquisition of Base Civil Engineer Requirements support for Joint Base Langley-Eustis, Virginia. The contract provides all labor, tools, equipment, transportation, materials, supervision and all other necessary supplies and services required to perform a broad range of maintenance, repair, minor and new construction work on real property on Joint Base Langley-Eustis. Fiscal 2020 operations and maintenance funds will be used to fund individual task orders awarded. Zero funds will be obligated at time of exercising this option year modification. This modification brings the total cumulative face value of the contract to $75,000,000. Work will be performed on Fort Eustis and Langley Air Force Base, and is expected to be complete by March 24, 2021. The 633 Contracting Squadron, Joint Base Langley-Eustis, Virginia, is the contracting activity.

The Boeing Co., Layton, Utah, has been awarded an $8,330,128 firm-fixed-price contract modification (P00011) to previously award contract FA8204-19-C-0001 for the Intercontinental Ballistic Missile Cryptography Upgrade Increment II production. This modification exercises production Lot 3, Options 2, 4, 8 and 9, and provides the government 176 A-4 drawers. Work will be performed in Huntsville, Alabama; Huntington Beach, California; and Layton, Utah, and is expected to be completed by Feb. 17, 2023. The total cumulative face value is $112,543,853. Fiscal 2019 missiles procurement funds in the amount of $1,639,817; and fiscal 2020 missiles procurement funds in the amount of $6,690,311 are being obligated at the time of award. The Air Force Nuclear Weapons Center, ICBM (intercontinental ballistic missile) Contracting Division, Hill Air Force Base, Utah, is the contracting activity. (Awarded March 23, 2020)

ARMY

Vali Cooper International LLC,* Covington, Louisiana, was awarded a $30,000,000 firm-fixed-price contract for architect-engineer technical support services for the U.S. Department of Veterans Affairs Health Care System. Bids were solicited via the internet with received. Work locations and funding will be determined with each order, with an estimated completion date of March 23, 2030. U.S. Army Corps of Engineers, Omaha, Nebraska, is the contracting activity (W9128F-20-D-0027).

CORRECTION: A $19,940,157 firm-fixed-price contract announced yesterday, March 23, 2020, to SGS LLC,* Yukon, Oklahoma (W912BV-20-C-0005), for design-build construction of a fire rescue center, was actually awarded today, March 24, 2020.

*Small business

https://www.defense.gov/Newsroom/Contracts/Contract/Article/2123763/source/GovDelivery/

Sur le même sujet

  • Russian Su-57 Jet Controls Su-35 Aircraft ‘Swarm’ in Teaming Experiment

    30 juin 2020 | International, Aérospatial

    Russian Su-57 Jet Controls Su-35 Aircraft ‘Swarm’ in Teaming Experiment

    A Russian Su-57 stealth jet controlled a group of Su-35 front-line fighter in a teaming experiment designed to function as a ‘swarm' in a coordinated attack mission. "The experiment was carried out in real combat conditions. A group of Su-35 fighters was involved in the flock, the role of the command and control aircraft was performed by the Su-57," news agency TASS reported quoting sources from Russia's ‘military-industrial complex.' Sources explained to TASS that use of a "swarm” operating in a single information space, significantly increases the efficiency of combat missions. The place and date of the experiment was not specified. The report did not describe what ‘real combat conditions' meant. Whether the jet swarm was tested in simulated battle conditions at home or in Syria where Russia has previously conducted several tactical experiments involving the Su-57. Russia has a sizeable military presence in Syria and controls two military bases and has the skies protected by it air defence systems. In addition, foreign reconnaissance and fighter aircraft regularly fly in or near Syrian airspace providing ‘target aircraft' for a swarm experiment. During the experiment, information is exchanged between fighters in real time: the information-control system of each aircraft automatically processes data from its own sensors and sensors of other aircraft providing a comprehensive battle space picture. The command and control aircraft then guides the course of battle. While the Su-57 is not expected to be in Russian air force service till 2022, its manufacturer is ensuring that it offers topine features available in the best of Western made jets such as the F-35 and F-22 by the time it enters service. Another feature being studied is to have the aircraft control a group of drones. https://www.defenseworld.net/news/27298#.XvtaFihKiUk

  • Has the US Navy thought this new frigate through? New report raises questions.

    10 juillet 2018 | International, Naval

    Has the US Navy thought this new frigate through? New report raises questions.

    By: David B. Larter WASHINGTON ― The U.S. Navy is rapidly moving toward procuring the first hull in its new class of frigate in 2020, but a new report is raising questions about whether the Navy has done detailed analysis about what it needs out of the ship before barging ahead. The Navy may not have done an adequate job of analyzing gaps and capabilities shortfalls before it set itself on a fast-track to buying the so-called FFG(X) as an adaptation from a parent design, said influential Navy analyst Ron O'Rourke in a new Congressional Research Service report. In essence, the CRS report questions whether the Navy looked at what capabilities the service already has in the fleet, what capabilities it's missing and whether the FFG(X) is the optimal solution to address any identified shortfalls. O'Rourke suggests Congress push the Navy on “whether procuring a new class of FFGs is the best or most promising general approach for addressing the identified capability gaps and mission needs, and whether the Navy has performed a formal, rigorous analysis of this issue, as opposed to relying solely on subjective judgments of Navy or [Defense Department] leaders.” ““Subjective judgments, though helpful, can overlook counter-intuitive results regarding the best or most promising general approach,” the report reads. “Potential alternative general approaches for addressing identified capability gaps and mission needs in this instance include (to cite a few possibilities) modified LCSs, FFs, destroyers, aircraft, unmanned vehicles, or some combination of these platforms.” The Navy is looking to adapt its FFG(X) from an existing design such as Fincantieri's FREMM, one of the two existing littoral combat ships or the Coast Guard's national security cutter as a means of getting updated capabilities into a small surface combatant and into the fleet quickly. A better approach, O'Rourke suggests, would be to make a formal, rigorous analysis of alternatives to its current course. Failure to do so has led to a series of setbacks with the Navy's current small surface combatant program, the LCS. “The Navy did not perform a formal, rigorous analysis of this kind prior to announcing the start of the LCS program in November 2001, and this can be viewed as a root cause of much of the debate and controversy that attended the LCS program, and of the program's ultimate restructurings in February 2014 and December 2015,” O'Rourke writes. O'Rourke further suggests the Navy is relying too much on subjective opinions of Navy and Defense Department leaders, instead of a legitimate analysis. And indeed, the Navy has made rapid acquisition of the new ship the hallmark of the program. “Subjective judgments can be helpful, particularly in terms of capturing knowledge and experience that is not easily reduced to numbers, in taking advantage of the ‘wisdom of the crowd,‘ and in coming to conclusions and making decisions quickly,” O'Rourke argues. “On the other hand, a process that relies heavily on subjective judgments can be vulnerable to group-think, can overlook counter-intuitive results regarding capability gaps and mission needs, and, depending on the leaders involved, can emphasize those leaders' understanding of the Navy's needs.” Read the full report here. https://www.defensenews.com/naval/2018/07/09/has-the-us-navy-thought-this-new-frigate-through-new-report-raises-questions/

  • France’s new cyber defense ‘conductor’ talks retaliation, protecting industry

    1 octobre 2019 | International, C4ISR, Sécurité

    France’s new cyber defense ‘conductor’ talks retaliation, protecting industry

    By: Christina Mackenzie PARIS — Maj. Gen. Didier Tisseyre is France's new cyber defense force commander — the “conductor” of an orchestra made up of military officials and the domestic defense industry, as he puts it. Cyber Defence Command was created in 2017 and was expanded in January when Armed Forces Minister Florence Parly announced France will develop and deploy offensive cyber weapons. Tisseyre took on the lead role Sept. 1 from his predecessor and most recently served as the deputy to that former commander. He spoke to Defense News earlier this month in a meeting room at the Armed Forces Ministry. What is your role as the head of Cyber Defence Command? I am a conductor, and my orchestra is made up of the Army, Navy and Air Force chiefs of staff, ANSSI [France's National Agency for the Security of Information Systems], and defense industry leaders. We must protect our systems, be robust, be resilient because if France's vital interests are attacked, then the armed forces must be able to react. Our weapons systems, our command systems are all computer-controlled. This makes them powerful and effective but also vulnerable, so we must be able to protect them. And today this protection must be as global and end-to-end as possible. This means that everyone in the Ministry of the Armed Forces must work together, and there must be a conductor to coordinate the protection and the defense of our interconnected networks. That is my job I have a staff and a number of specialized units who contribute to this defense and coordinate it. But within each armed force — the Navy, the Army, the Air Force — there are cyberwarriors who liaise with us to defend their systems. We work very closely with ANSSI, exchanging information so that we can anticipate future attacks. We also work closely with our fellow NATO members, our bilateral partners and other international organizations. The idea is to be able to anticipate and not just to react. What does France consider a top cyberthreat? Cyberspace is a very positive place for bringing people together and is wonderful for the economy, for arts and so on. But precisely because it brings thousands of people into contact with each other, it is also used to get money fraudulently, to influence, to destabilize, to spread ideologies. And even if we must maintain freedom of expression, there are certain things in France which cannot be said publicly — [incitement to ethnic and racial hatred, for example]. Our principle is that everything that happens in real life is transposable into cyberspace, so for France and many other countries, the law is just as applicable in cyberspace as it is in real life. But because there is a general impression that no rules apply in cyberspace, then individuals and groups use it for criminal activities, spying, destabilizing electoral processes. And the question arises as to whether these individual or groups are being backed by states. As a member of the armed forces, my duty is to be paranoid and assume that the cyber enemy may have a strong, state-backed criminal intent to prepare conflicts, and so that is what we must be prepared for. How do you anticipate the ways imaginative hackers will act? By hiring imaginative youngsters ourselves. Our cyberwarriors have to be extremely motivated to protect the ministry's systems and France, obviously. They must have very specialist IT technical or social media know-how, or be brilliant intelligence gatherers. A lot of what is said on social networks allows us to learn about our enemy, to anticipate possible attacks, or even enables us to hinder their propaganda, particularly on our theaters of operation in Africa or the Levant, for example, where part of our mission is to stop jihadist groups from recruiting. Our cyberwarriors have to have a particular frame of mind because we are not asking them to configure the network or equipment, we are really in a combat situation in cyberspace. We work on operations to defend or to undertake offensive actions to protect our systems, our freedom to act, to guarantee the sovereignty of our systems. Is France confronting specific threats that are different from those faced by other countries? Fundamentally, no, because we are all cyberattacked by people trying to block our computers, and attackers are becoming increasingly sophisticated in their ways of hacking. How does France respond? We must be prepared to react. But France considers that attributing an attack — notably where advanced persistent threats, [or APT], are concerned — is a very political, highly sensitive thing to do. APT can be the work of individuals seeking ways to make money, or being paid by others and potentially linked to intelligence services of other nations. If an organization such as NATO is attacked, then France is, by principle, against collective attribution. Each member of the organization must agree that the attacking individual or group is taking its orders from a state because attribution of blame, as I said, is highly political: You're designating a state as being responsible for attacking another one, and that has a very strong impact. You have to be able to prove it, and the state that has been blamed might not appreciate having the finger pointed at it. In the physical world when an aircraft crosses into another nation's airspace or a vehicle crosses a border, there is concrete proof: radar, photographs and so on. The difficulty in cyberspace is that it's very easy to pass oneself off as somebody else and to hide one's tracks; [just] because an APT is perpetrated by attackers physically present in one country, that [doesn't mean] they were taking their orders from that country. Here's an example to illustrate my point: They could use a server in Germany to send the data to the U.K., which then rebounds in France and finally attacks the United States. So Washington would try and work back to see where the attack came from and would eventually discover that it came from Germany, but that doesn't mean the order to attack came from Germany. In cyberspace, leads very quickly get entangled. So we really have to be extremely careful about a hack-back before thorough due diligence has been undertaken. What France wants is that each member state validates the blame before the finger is pointed. We are against the idea that just because one member blames a state for attacking it, that NATO takes it as a given and invokes Article 5 of the NATO treaty, [which calls for collective action if a member state is attacked]. What would happen if France is attacked? It depends. If France thinks that the attack came from a state and wants a collective reaction from NATO, then there'd be a whole lot of discussions about the risk of escalation, Article 5, the right to self-defend and so on. These notions involve significant commitments for countries, and so we want things to be clearly defined where cyberspace is concerned: What is an attack? Who was targeted? What are the consequences of the attack? Did it touch the physical integrity of nationals of the country? Were the operating systems of a hospital or a power station impacted? We want to take into account the economic or human impact of the attack and the nature of the attacker: Was it an individual having fun? Was it a group, and what were its motivations? Was it a jihadist group with terrorist intent, or was it outright a state pre-positioning itself for future conflicts or trying to wield influence? France wants things to be clear. We want to establish how international laws apply to cyberspace, and as I mentioned earlier, we insist on due diligence. Could you explain what you mean by “due diligence”? If, for example, France sees that it has been attacked via a server in Germany, then “due diligence” means that instead of us simply hacking Germany back, we would ask the authorities in Berlin to act to stop that server being used. So even if, within NATO, a member state is attacked, then France holds that that state is not authorized to hack back without due diligence being undertaken first. It's a bit complex, but we've listed the types of attack, the principle of digital sovereignty, the references to the Tallinn Manual — [the independent academic research product authored by an international group of about 20 experts to guide how international law applies to cyber conflicts and cyberwarfare]. And we've positioned ourselves with regards to this, and in certain particular cases have said, “Be careful, our interpretation of X is slightly different for these reasons,” and we explain why. We also explain that we consider an attack on information systems in France is an attack on our national sovereignty. That gives us the right to riposte, not necessarily in a cyber way but it could be a diplomatic response or an economic one ― it depends on the nature of the attack and the impact it has and on the attacker himself, what his motivations were and in what framework the attack took place. How does the ministry work with industry? The ministry knows how to defend itself, and we have the right, within a very strict framework, to undertake offensive cyberattacks in foreign operations. The attacker knows that a direct attack on us is thus likely to fail. So he will ruse. He'll attack the weak link: the defense industry, notably the subcontractors that may only make a small component of a weapon or an IT system. He'll put a virus or malware in that subcontractor's system, and it will progressively make its way into the major contractor's system and then into the weapon system. And as all these are interconnected, then this is how we would be attacked. So we need to have confidence in the entire supply chain, and we are on the verge of signing a convention with industry aimed at raising general awareness of this risk at every level of industry. France has allocated €1.6 billion (U.S. $1.8 billion) to cyber defense in its 2019-2025 military program law. What are the main spending priorities? To ensure that the system is protected and defendable. Until recently, we concentrated on the functionality of the system: what it was designed to do and who for (the Air Force, the Navy, the Army, etc.). And making the systems secure was an additional layer to the basic functions, so if funds ran out, then sometimes the layer would be only half done or had holes in it. Today we are aware that there is such vulnerability in computer systems that security has to be built in by design. It's part and parcel of the functionality of the system. We're also spending money on the detection of attacks. Our network has sensors in it to detect whether anyone is using the network who shouldn't be. We're working on the characterization of attacks, which means we're collecting data on malware — a bit like a laboratory that might keep a sort of library of viruses and bacteria — to be able to quickly establish what type of attack is being undertaken and therefore what the best “medicine” is for it. And of course we'll be hiring another 1,000 cyberwarriors between now and 2025. https://www.fifthdomain.com/international/2019/09/30/frances-new-cyber-defense-conductor-talks-retaliation-protecting-industry/

Toutes les nouvelles