4 juin 2019 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité, Autre défense

Contract Awards by US Department of Defense - June 3, 2019

DEFENSE LOGISTICS AGENCY

HDT Expeditionary Systems Inc., Solon, Ohio, has been awarded a maximum $200,000,000 firm-fixed-priced, indefinite-delivery/indefinite-quantity contract for commercial off-the-shelf shelters and tents. This was a competitive acquisition with one response received. This is a one-year base contract with three one-year option periods. Locations of performance are Alabama, Ohio, Virginia and Kentucky, with a June 4, 2020, performance completion date. Using military services are Army, Navy, Air Force and Marine Corps. Type of appropriation is fiscal 2019 through 2020 defense working capital funds. The contracting activity is the Defense Logistics Agency Troop Support, Philadelphia, Pennsylvania (SPE1C1-19-D-1158).

NAVY

Accenture Federal Services LLC, Arlington, Virginia, is awarded a $79,074,099 firm-fixed-price, indefinite-delivery/indefinite-quantity contract to provide program and project management; support of the Navy Tele-Mentoring Program; system administration; training; communications support; data analytics; tele-radiology; and support of the Health Experts Online Portal and Pacific Asynchronous TeleHealth in support of the Bureau of Medicine and Surgery. Work will be performed in Falls Church, Virginia (83 percent); San Diego, California (10 percent); Portsmouth, Virginia (2 percent); Camp Pendleton, California (2 percent); Lemoore, California (1 percent); Twentynine Palms, California (1 percent); and Bremerton, Washington (1 percent). The contract will include a 60-month ordering period that will begin July 2019, and is expected to be completed by July 2024. Fiscal 2019 operations and maintenance (Defense Health Procurement) (O&MDHP) funds in the amount of $10,000 will be obligated to fund the contract's minimum amount and those funds will expire at the end of fiscal 2019. Subsequent task orders will be funded with the appropriate fiscal year O&MDHP funds. This contract resulted from a full and open competitive solicitation pursuant to the authority set forth in Federal Acquisition Regulation 16.504. The requirement was solicited through the Federal Business Opportunities and Navy Electronic Commerce Online websites, with 11 offers received. Naval Supply Systems Command Fleet Logistics Center Norfolk, Contracting Department, Philadelphia Office, Philadelphia, Pennsylvania, is the contracting activity (N00189-19-D-Z024).

Lockheed Martin Sippican Inc., Marion, Massachusetts, is awarded a $56,865,098 firm-fixed-price, cost, and cost-plus-fixed-fee modification to previously awarded contract N00024-16-C-6412 to exercise Option Year Three for the production of Mk 48 Mod 7 guidance and control (G&C) sections, Mk 48 Mod 7 Common Broadband Advanced Sonar System (CBASS) Functional Item Replacement (FIR) kits, spares, production support material, and related engineering services and hardware repair support for G&C sections and CBASS kits. Work will be performed in Marion, Massachusetts (88 percent); Braintree, Massachusetts (8 percent); and Lemont Furnace, Pennsylvania (4 percent), and is expected to be completed by March 2021. Fiscal 2019 and 2017 weapons procurement (Navy); Foreign Military Sales; fiscal 2019 research, development, test and evaluation (Navy); and fiscal 2018 shipbuilding and conversion (Navy) funding in the amount of $56,865,098 will be obligated at time of award and will not expire at the end of the current fiscal year. The Naval Sea Systems Command, Washington, District of Columbia, is the contracting activity.

Communication & Power Industries LLC, MPP Division, Palo Alto California, is awarded a $10,244,971 firm-fixed-price, indefinite-quantity contract for evaluation, repair, rebuild and new manufacture of L-Band Klystron microwave tubes required to support the AN/SPS-49 radar system. Work will be performed in Palo Alto, California, and is expected to be completed by June 2024. Working capital funds (Navy) funding in the amount of $905,658 will be obligated at time of award, and will not expire at the end of the current fiscal year. This contract was not competitively procured, in accordance with 10 U.S. Code 2304(c)(1) - only one responsible source and no other supplies or services will satisfy agency requirements. The Naval Surface Warfare Center, Crane Division, Crane, Indiana, is the contracting activity (N0016419DWP32).

ARMY

General Dynamics Mission Systems Inc., Taunton, Massachusetts, was awarded a $36,850,696 modification (0125) to contract W15P7T-10-D-C007 for post-deployment software support services. Work locations and funding will be determined with each order, with an estimated completion date of June 1, 2020. U.S. Army Contracting Command, Aberdeen Proving Ground, Maryland, is the contracting activity.

TRAX International LLC, Las Vegas, Nevada, was awarded a $17,666,430 modification (P00312) to contract W9124Q-07-C-0504 for mission support services. Work will be performed in White Sands Missile Range, New Mexico, with an estimated completion date of Aug. 31, 2019. Fiscal 2019 research, development, test and evaluation funds in the amount of $2,100,000 were obligated at the time of the award. U.S. Army Mission and Installation Contracting Command, White Sands Missile Range, New Mexico, is the contracting activity.

CORRECTION: The contract announced on May 31, 2019, for DirectViz Solutions LLC (DVS),* Chantilly, Virginia (W91RUS-19-C-0014), was not awarded. No new award date has been set.

AIR FORCE

AAI Corp., doing business as Textron Systems, Hunt Valley, Maryland, has been awarded a $24,318,602 undefinitized contract action for AC-208 contract logistics support and maintenance training. This contract provides for contractor logistics support and maintenance training for the AC-208 aircraft. Work will be performed at Hamid Karzai International Airport, Kabul, Afghanistan, and is expected to be complete by May 31, 2020. Fiscal 2018 Foreign Military Sales funds in the amount of $7,406,993 are being obligated at the time of award. Air Force Life Cycle Management Center, Training Aircraft Division, Wright Patterson Air Force Base, Ohio, is the contracting activity (FA8617-19-C-6234).

Work Services Corp., Wichita Falls, Texas, has been awarded a $20,805,260 firm-fixed-price modification (P00002) to the previously awarded contract FA3020-18-C-0013 for food services. This contract modification provides full funding for the first option period. Work will be performed at Sheppard Air Force Base, Texas, and is expected to be complete by June 30, 2020. This modification brings the total cumulative face value of the contract to $36,010,315. Fiscal year 2019 operations and maintenance funds in the full amount are being obligated at the time of award. The 82nd Contracting Squadron, Sheppard Air Force Base, Texas, is the contracting activity.


*Small business

https://dod.defense.gov/News/Contracts/Contract-View/Article/1864933/source/GovDelivery/

Sur le même sujet

  • USAF Seeks Third-Party Vendors For F-22 Sensor, Capability Upgrades

    14 janvier 2022 | International, Aérospatial

    USAF Seeks Third-Party Vendors For F-22 Sensor, Capability Upgrades

    A long-range infrared search and track sensor, manned-unmanned teaming capability and a Thales Scorpion helmet-mounted display are on a list of new upgrades by third-party vendors sought by the U.S. Air Force for the Lockheed Martin F-22 Raptor.

  • Bradley Replacement: Army Risks Third Failure In A Row

    8 octobre 2019 | International, Terrestre

    Bradley Replacement: Army Risks Third Failure In A Row

    With the surprise disqualification of the Raytheon-Rheinmetall Lynx, the Army has effectively left itself with one competitor for the Optionally Manned Fighting Vehicle, General Dynamics -- unless the Pentagon or Congress intervene. By SYDNEY J. FREEDBERG JR. WASHINGTON: Experts fear the Army has undermined a top priority program, the Optionally Manned Fighting Vehicle, by disqualifying one of the only two remaining competitors for not delivering its prototype on time. “I cannot believe that is the reason,” said a baffled Thomas Spoehr, a retired three-star who headed the Army's program analysis & evaluation office. There must be, he told me this morning, some more profound problem driving this decision: “Nobody wants to have this major program go forward with only one competitor.” The news was broken by our colleague Jen Judson on Friday and confirmed to us by several sources. The Army declined official comment. Manufacturer Rheinmetall could not physically ship their Lynx-41 prototype from Germany to the US — which is strange, since they've managed to do so before — by the October first deadline. While some Army officials were willing to offer them an extension, the recently created Army Futures Command refused. That leaves General Dynamics, offering an all-new design we describe below, as the sole competitor for the Engineering & Manufacturing Design (EMD) contract to be awarded early next year. A crucial caveat: Winning EMD does not guarantee General Dynamics will win the production contract, which will be awarded in 2023 in a competition open to all comers. But any 2023 contender would have to refine their design at their own expense, without the constant feedback from the Army that comes with being on the EMD contract. That's a hard risk for a board to justify, given GD's advantage. And without a second competitor, all the Army's eggs are in the basket of GD succeeding, with no backup. “I strongly suspect that [General Dynamics] has done a great job of tailoring a solution, developed over time through successes in other programs, for exactly what the US Army wants,” as expressed in roughly 100 detailed and rigid requirements, said George Mason scholar Jim Hasik. But, he said, that doesn't mean what the Army thinks it wants is the right solution, or that GD will deliver on budget and schedule. “I would prefer that two or three contractors were proceeding to some trials of truth at Aberdeen in some months,” Hasik told me. “I do not single out GDLS; I just expect lower likelihood of success in non-competitive contracting. Any given bid may have problems of which even the bidder does not know.” The timing of this news is particularly painful for the Army, because thousands of soldiers, contractors, and media will be heading to Washington for next-week's huge Association of the US Army conference. One of the highlights of last year's show was the Lynx prototype. Why? Disqualifying the Lynx doesn't make sense, said Spoehr, who as head of national defense studies at the Heritage Foundation has long urged the Army to replace its M2 Bradley troop carrier and other 1980s-vintage armored vehicle designs. “I have to believe the Army will take another look at this situation,” Spoehr said. Or, maybe not. The decision to disqualify the Rheinmetall-Raytheon team for missing the deadline is arguably, “the correct one when you consider schedule is the priority,” an industry source told me. But maybe schedule shouldn't be the priority, the source went on, because the current timeline — fielding the first combat-ready unit by 2026 — doesn't permit much innovation. “The vehicle they are asking for will not be significantly better than the current Bradley.” (General Dynamics disputes this hotly, not surprisingly, as we detail later in this story). “I think the Army is pretty short-sighted,” the industry source said. “Personally, I don't see how the program survives in future budgets.” Even before this news broke, skeptical Senate appropriators had already cut funding for Army Next Generation Combat Vehicles in their draft of the defense spending bill, although the House has not. But with the Hill so roiled by impeachment that it's unclear legislators will even be able to pass the annual defense bills — which were already headed for closed-door conferences in any case — we've not been able to get any but the most noncommittal comment from Congress. We'll update this story or write a sequel when we hear from the Hill. The underlying anxiety here is that the Army has tried and failed repeatedly to modernize its Reagan-era arsenal over the past 30 years — the problem Army Futures Command was created to fix. Armored fighting vehicle programs, above all replacements for the Bradley troop carrier, have been particularly fraught. The Future Combat Systems family of vehicles, which included a lightweight Bradley replacement, was canceled in 2009, while the Ground Combat Vehicle, a better-armored and correspondingly heavier Bradley replacement, was cancelled in 2014. The Optionally Manned Fighting Vehicle is the Army's third swing at this ball. That puts tremendous pressure on Army Futures Command and General Dynamics to deliver. Their balancing act is to make something different and better enough it's worth replacing the Bradley instead of just upgrading it again, without taking on so much new technology that the program risks major delays and overruns. The Army's modernization director for Next Generation Combat Vehicles, Brig. Gen. Richard Ross Coffman, spoke to me Friday just before the news broke about Rheinmetall. While he didn't speak to the number of competitors, he did emphasize that a company that doesn't win an Engineering & Manufacturing Design contract can still compete for Low-Rate Initial Production. “The LRIP award is FY23,” Coffman said. “That's a free and open competition. So let's say you didn't have the time or didn't feel you had the money ... to compete starting on 1 October, you can further mature your product, you can test that product, and then enter back in to the competition in '23.” We Have A Winner (By Default)? Assuming General Dynamics does win the production contract in 2023, what will their vehicle look like? It will not resemble the Griffin III concept vehicle that vied with the Lynx on the floor of last year's Association of the US Army mega-conference, company officials told me. In fact, they said, the GD OMFV shares no major components with the ASCOD/Ajax lineage of combat vehicles, widely used in Europe, on whose proven chassis and automotive systems GD build its Griffin series, including its offering for the Army's Mobile Protected Firepower light tank. “The suspension is a totally new design. The engine and transmission are totally different. Drive train is different. Exhaust placement is different,” Keith Barclay, director of global strategy for General Dynamics Land Systems, said in an interview. (The core of the engine is the same as MPF, but not the configuration, cooling, or transmission). That's remarkable because Army leaders had said they were willing to go with a proven, pre-existing chassis to reduce risk, as long as the weapons and electronics were cutting-edge. As with many weapons programs, the Army plans to field OMFV in successively more advanced increments: Increment 1 will only have to meet minimum or “threshold” requirements, while Increment 2 will go after higher “objective” requirements. “One of the problems we had with previous ground vehicle programs was we always tried to reach for technology that wasn't mature,” Coffman told me. “Now we've set the objective to those technologies that are on the cusp of maturation, so that if it does mature ... we can achieve[it] in Increment 2.” Barclay and other GD execs told me this morning that the prototype they just delivered to the Army already meets some of the objective requirements for Increment 2, particularly for the gun and fire control. (They declined to offer more specifics). Meeting those requirements was what drove the all-new design. “It had to be designed from the inside out,” Barclay told me. “Modifying an existing platform would not work.” That said, Barclay went on, this is not new unproven tech. “These are very high Technological Readiness Level (TRL) components that have been through quite a bit of testing, and we've just packaged them and designed them... into a new configuration.” (Of course, “quite a bit of testing” isn't the same as actually being deployed on hundreds of vehicles in Spanish, Austrian, and — soon — British service, as was the case for many of the Griffin's components). While the GD OMFV's components aren't the same as those on the ASCOD/Ajax/Griffin series, they do build on that experience, Barclay said, as well as on decades of General Dynamics R&D for the cancelled FCS and GCV programs. What's New? So what are the innovations in the GD OMFV that make it a significant improvement over an upgraded Bradley? Most visible from the outside is the weapon, the one component the OMFV shares with the Griffin III prototype at AUSA last year. It's a new 50mm quick-firing cannon, largely developed by the Army's Armaments Center, which is many times more powerful than the 25mm on the Bradley or the 30mm weapons on many Russian vehicles. Whereas the Bradley gunner and commander sit in the turret, the OMFV's turret is unmanned, remote-controlled from a well-protected and well-connected crew compartment in the hull. In fact, from the crew's perspective inside the vehicle, the most visible difference will probably be how much better their visibility is. Traditional armored vehicles rely on narrow viewports and periscopic sights, making them half-blind behemoths on the battlefield. But massive investments by the automotive industry — from backup cameras to self-driving cars — have driven down the cost and size of sensors. GD boasts their OMFV design offers “360 degree situational awareness” from cameras all around the vehicle. The sensor feeds are visible from screens at not only the crew stations but in the passenger area, so the infantry can know what kind of situation they may have to clamber out into. Currently, the vehicle is configured for three crew and five infantry soldiers, the same as the Bradley and the Army's minimum requirement for OMFV. (The seats are designed to buffer blasts from mines and roadside bombs). But all eight seats are together in the hull, rather than having some in the turret, and each crew station can control any function, rather than each being specially hard-wired for the commander, gunner, and driver respectively. So GD expects that, as automation technology improves, it'll be possible to go down to just two crewmembers, freeing up a seat for a sixth passenger. That ability to upgrade electronics is perhaps the single most important, if subtle, improvement over the Bradley. Designed in the 1970s and repeatedly upgraded since, the Bradley has repeatedly run into the limits of its electrical system. Troops in Iraq often had to turn equipment on and off because they couldn't run all of it at once. The Army is now increasing the Bradley's power, and they're even retrofitting it with an Active Protection System that uses electricity-hungry radars to detect and shoot down incoming anti-tank missiles. But the OMFV will have Active Protection as standard equipment, rather than tacked on. And the all-new design lets GD build in the power, wiring, and — most crucial — the standardized interfaces (aka a Modular Open Systems Architecture) to make future electronic upgrades much easier, from anti-missile jammers to reconnaissance mini-drones to AI-assisted targeting systems. “We have looked to the future about what power requirements will be,” Barclay told me. Their vehicle, he said, has “electrical power, both high voltage and low voltage, that will allow myriad capabilities that you could not put onto an existing combat vehicle today in the Army's inventory.” https://breakingdefense.com/2019/10/bradley-replacement-army-risks-third-failure-in-a-row

  • HOW HACKED WATER HEATERS COULD TRIGGER MASS BLACKOUTS

    14 août 2018 | International, C4ISR

    HOW HACKED WATER HEATERS COULD TRIGGER MASS BLACKOUTS

    WHEN THE CYBERSECURITY industry warns about the nightmare of hackers causing blackouts, the scenario they describe typically entails an elite team of hackers breaking into the inner sanctum of a power utility to start flipping switches. But one group of researchers has imagined how an entire power grid could be taken down by hacking a less centralized and protected class of targets: home air conditioners and water heaters. Lots of them. At the Usenix Security conference this week, a group of Princeton University security researchers will present a study that considers a little-examined question in power grid cybersecurity: What if hackers attacked not the supply side of the power grid, but the demand side? In a series of simulations, the researchers imagined what might happen if hackers controlled a botnet composed of thousands of silently hacked consumer internet of things devices, particularly power-hungry ones like air conditioners, water heaters, and space heaters. Then they ran a series of software simulations to see how many of those devices an attacker would need to simultaneously hijack to disrupt the stability of the power grid. Their answers point to a disturbing, if not quite yet practical scenario: In a power network large enough to serve an area of 38 million people—a population roughly equal to Canada or California—the researchers estimate that just a one percent bump in demand might be enough to take down the majority of the grid. That demand increase could be created by a botnet as small as a few tens of thousands of hacked electric water heaters or a couple hundred thousand air conditioners. "Power grids are stable as long as supply is equal to demand," says Saleh Soltan, a researcher in Princeton's Department of Electrical Engineering, who led the study. "If you have a very large botnet of IoT devices, you can really manipulate the demand, changing it abruptly, any time you want." The result of that botnet-induced imbalance, Soltan says, could be cascading blackouts. When demand in one part of the grid rapidly increases, it can overload the current on certain power lines, damaging them or more likely triggering devices called protective relays, which turn off the power when they sense dangerous conditions. Switching off those lines puts more load on the remaining ones, potentially leading to a chain reaction. "Fewer lines need to carry the same flows and they get overloaded, so then the next one will be disconnected and the next one," says Soltan. "In the worst case, most or all of them are disconnected, and you have a blackout in most of your grid." Power utility engineers, of course, expertly forecast fluctuations in electric demand on a daily basis. They plan for everything from heat waves that predictably cause spikes in air conditioner usage to the moment at the end of British soap opera episodes when hundreds of thousands of viewers all switch on their tea kettles. But the Princeton researchers' study suggests that hackers could make those demand spikes not only unpredictable, but maliciously timed. The researchers don't actually point to any vulnerabilities in specific household devices, or suggest how exactly they might be hacked. Instead, they start from the premise that a large number of those devices could somehow be compromised and silently controlled by a hacker. That's arguably a realistic assumption, given the myriad vulnerabilities other security researchers and hackers have found in the internet of things. One talk at the Kaspersky Analyst Summit in 2016 described security flaws in air conditioners that could be used to pull off the sort of grid disturbance that the Princeton researchers describe. And real-world malicious hackers have compromised everything from refrigerators to fish tanks. Given that assumption, the researchers ran simulations in power grid software MATPOWER and Power World to determine what sort of botnet would could disrupt what size grid. They ran most of their simulations on models of the Polish power grid from 2004 and 2008, a rare country-sized electrical system whose architecture is described in publicly available records. They found they could cause a cascading blackout of 86 percent of the power lines in the 2008 Poland grid model with just a one percent increase in demand. That would require the equivalent of 210,000 hacked air conditioners, or 42,000 electric water heaters. The notion of an internet of things botnet large enough to pull off one of those attacks isn't entirely farfetched. The Princeton researchers point to the Mirai botnet of 600,000 hacked IoT devices, including security cameras and home routers. That zombie horde hit DNS provider Dyn with an unprecedented denial of service attack in late 2016, taking down a broad collection of websites. Building a botnet of the same size out of more power-hungry IoT devices is probably impossible today, says Ben Miller, a former cybersecurity engineer at electric utility Constellation Energy and now the director of the threat operations center at industrial security firm Dragos. There simply aren't enough high-power smart devices in homes, he says, especially since the entire botnet would have to be within the geographic area of the target electrical grid, not distributed across the world like the Mirai botnet. But as internet-connected air conditioners, heaters, and the smart thermostats that control them increasingly show up in homes for convenience and efficiency, a demand-based attack like the one the Princeton researchers describes could become more practical than one that targets grid operators. "It's as simple as running a botnet. When a botnet is successful, it can scale by itself. That makes the attack easier," Miller says. "It's really hard to attack all the generation sites on a grid all at once. But with a botnet you could attack all these end user devices at once and have some sort of impact." The Princeton researchers modeled more devious techniques their imaginary IoT botnet might use to mess with power grids, too. They found it was possible to increase demand in one area while decreasing it in another, so that the total load on a system's generators remains constant while the attack overloads certain lines. That could make it even harder for utility operators to figure out the source of the disruption. If a botnet did succeed in taking down a grid, the researchers' models showed it would be even easier to keepit down as operators attempted to bring it back online, triggering smaller scale versions of their attack in the sections or "islands" of the grid that recover first. And smaller scale attacks could force utility operators to pay for expensive backup power supplies, even if they fall short of causing actual blackouts. And the researchers point out that since the source of the demand spikes would be largely hidden from utilities, attackers could simply try them again and again, experimenting until they had the desired effect. The owners of the actual air conditioners and water heaters might notice that their equipment was suddenly behaving strangely. But that still wouldn't immediately be apparent to the target energy utility. "Where do the consumers report it?" asks Princeton's Soltan. "They don't report it to Con Edison, they report it to the manufacturer of the smart device. But the real impact is on the power system that doesn't have any of this data." That disconnect represents the root of the security vulnerability that utility operators need to fix, Soltan argues. Just as utilities carefully model heat waves and British tea times and keep a stock of energy in reserve to cover those demands, they now need to account for the number of potentially hackable high-powered devices on their grids, too. As high-power smart-home gadgets multiply, the consequences of IoT insecurity could someday be more than just a haywire thermostat, but entire portions of a country going dark. https://www.wired.com/story/water-heaters-power-grid-hack-blackout/

Toutes les nouvelles