28 novembre 2018 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

Contract Awards by US Department of Defense - November 26, 2018

AIR FORCE

The Boeing Co., El Segundo, California, has been awarded a $383,421,855 cost-plus-incentive-fee, award-fee contract for the Protected Tactical Enterprise Service. This contract provides for a joint ground system to provide tactical satellite communications with enhanced anti-jam and low probability of intercept to tactical warfighters in contested environments. Work will be performed in El Segundo, California, and is expected to be completed by Dec. 31, 2025. This award is the result of a competitive acquisition and three offers were received. Fiscal 2018 and 2019 research, development, test and evaluation funds in the amount of $17,234,485 are being obligated at the time of award. Space and Missile Systems Center, El Segundo, California, is the contracting activity (FA8808-19-C-0001).

Raytheon Vision System, Goleta, California, has been awarded a $19,172,016 contract modification (P00012) to contract FA9453-17-C-0038 for the Fortress Program to push the state-of-the art infrared focal plane arrays. The contract modification is seeking to develop larger format and/or high operating temperature mid-wave infrared focal plane arrays for persistent surveillance applications. Work will be performed in Goleta, California, and is expected to be completed by Feb. 9, 2022. Fiscal 2018 and research, development, test and evaluation; and Title III funds are being obligated at the time of award. Total cumulative face value of the contract is $26,527,033. Air Force Research Laboratory, Kirtland Air Force Base, New Mexico, is the contracting activity.

Aerojet Rocketdyne Inc., Rancho Cordova, California, has been awarded a $9,452,398 cost-plus-fixed-fee contract for Advanced AF-M315E Engine Monopropellant Engine Development. This contract provides a contract vehicle the Air Force Research Laboratory, Aerospace Systems, and Rocket Propulsion Division can use to address technical needs for next-generation strategic, tactical, and spacecraft propulsion systems. Work will be performed in Redmond, Washington, and is expected to be completed by April 21, 2024. This award is the result of a competitive acquisition with five offers received. Fiscal 2018 research, development, test and evaluation funds in the amount of $900,000 are being obligated at the time of award. Air Force Test Center, Edwards Air Force Base, California, is the contracting activity (FA9300-19-C-0001).

DEFENSE INFORMATION SYSTEMS AGENCY

Qwest Government Solutions Inc., doing business as CenturyLink QGS, Herndon, Virginia, was awarded a non-competitive firm-fixed-price, indefinite-delivery/indefinite -quantity contract for a five-year period of performance for the continued operations and maintenance support for dark fiber and commercial facilities in the continental U.S. (CONUS) to support the Department of Defense. The guaranteed minimum amount is $1,000 and will be satisfied through task orders issued during the base year. The total amount of all orders placed against the contract shall not exceed $126,895,698. Performance will be at various locations within CONUS. The solicitation was issued on the basis of other than full and open competition pursuant to 10 U.S. Code 2304(c)(1), only one responsible source and no other type of supplies or services would satisfy agency requirements. The period of performance of this contract is Nov. 30, 2018, through Nov. 29, 2023. The Defense Information Technology Contracting Organization, Scott Air Force Base, Illinois, is the contracting activity (HC1013-19-D-0002).

ARMY

Lockheed Martin Corp., Orlando, Florida, was awarded a $79,383,886 modification (0006 03) to contract W52P1J-17-D-0043 for night vision sensor systems, subcomponent production and technical services for the Apache attack helicopter. One bid was solicited with one bid received. Work locations and funding will be determined with each order, with an estimated completion date of Oct. 31, 2021. U.S. Army Contracting Command, Rock Island Arsenal, Illinois, is the contracting activity.

Ludlow Construction Co. Inc.,* Ludlow, Massachusetts, was awarded a $24,401,154 firm-fixed-price contract for Durham Meadows waterline remedial design. Bids were solicited via the internet with four received. Work will be performed in Durham, Connecticut, with an estimated completion date of Dec. 20, 2021. Fiscal 2018 other environmental funds in the amount of $24,401,154 were obligated at the time of the award. U.S. Army Corps of Engineers, Concord, Massachusetts, is the contracting activity (W912WJ-19-C-0002).

Federal Resources Supply Co.,* Stevensville, Maryland, was awarded a $19,569,771 firm-fixed-price contract for refilling of fire suppression bottles and systems. Bids were solicited via the internet with one received. Work locations and funding will be determined with each order, with an estimated completion date of Nov. 26, 2023. U.S. Army Contracting Command, Warren, Michigan, is the contracting activity (W56HZV-19-D-0017).

CORRECTION: The $15,837,195 contract (W52P1J-19-C-0005) announced on Nov. 8, 2018, to Parsons Government Services Inc., Pasadena, California, was not awarded until Nov. 23, 2018. Fiscal 2019 research, development, test and evaluation funds in the amount of $7,179,000 were obligated at the time of the award.

U.S. SPECIAL OPERATIONS COMMAND

The Boeing Co., Mesa, Arizona, was awarded a $100,000 minimum, $45,000,000 maximum indefinite-delivery/indefinite-quantity, firm-fixed-price contract (H92241-19-D-0001) for 56 upgraded primary airframe structures for the A/MH-6 rotary wing aircraft. Fiscal 2018 procurement funds in the amount of $5,173,400 shall be obligated at the time of award. The majority of the work will be performed in Mesa, Arizona. This contract is a non-competitive award and is in accordance with Federal Acquisition Regulation 6.302.1. U.S. Special Operations Command, Tampa, Florida, is the contracting activity.

NAVY

Raytheon Missile Systems, Tucson, Arizona, is being awarded a $37,253,983 cost-plus-fixed-fee modification to previously-awarded contract N00024-18-C-5407 for procurement of fiscal 2019 U.S. Navy Standard missile SM-2 and Standard missile SM-6 intermediate-level repair and maintenance. Work will be performed in Tucson, Arizona (88 percent); Camden, Arkansas (11 percent); and Huntsville, Alabama (1 percent), and is expected to be completed by November 2019. Fiscal 2019 operations and maintenance (Navy) funding in the amount of $19,047,890 will be obligated at time of award and will expire at the end of the current fiscal year. The Naval Sea Systems Command, Washington, District of Columbia, is the contracting activity.

BAE Systems Technology Solutions and Services Inc., Rockville, Maryland, is awarded a $13,903,935 firm-fixed-price contract for the operation and maintenance of Navy communication, electronic, and computer systems. The contract will include a 12-month base period and four 12-month option periods which if exercised, the total value of this contract will be $79,829,608. Work will be performed in Oahu, Hawaii (94 percent); and Geraldton, Australia (6 percent). Work is expected to be completed by November 2019; if all options are exercised, work will be completed by November 2023. Fiscal 2019 operations and maintenance (Navy) funds in the amount of $3,925,630 will be obligated at the time of award and funds will expire at the end of the current fiscal year. This contract was solicited on a full and open, unrestricted basis with two offers received. Naval Supply Systems Command Fleet Logistics Center Pearl Harbor, Regional Contracting Department, Pearl Harbor, Hawaii, is the contracting activity (N00604-19-C-4001).

Landscape Management Systems Inc.,* Tumon, Guam, is awarded an $11,426,341 modification under a previously awarded individual-delivery/indefinite-quantity contract (N40192-15-D-9008) to exercise the fourth option for base operations support services at Naval Base (NB) Guam and Naval Support Activity (NSA) Andersen, Guam. The work to be performed provides for all labor, supervision, management, tools, material, equipment, facilities, transportation and incidental engineering and other items necessary to accomplish work to perform all ground maintenance and tree trimming services for U.S. military facilities. After award of this option, the total cumulative contract value will be $48,598,810. Work will be performed in the Naval Facilities Engineering Command Marianas area of responsibility, including but not limited to, NB Guam (70 percent); and NSA Andersen, Guam (30 percent), and work is expected to be completed November 2019. No funds will be obligated at time of award. Fiscal 2019 operations and maintenance (Navy); fiscal 2019 operations and maintenance (family housing); and fiscal 2019 Navy working capital funds in the amount of $8,348,102 for recurring work will be obligated on individual task orders issued during the option period. The Naval Facilities Engineering Command Marianas, Guam, is the contracting activity.

*Small business

https://dod.defense.gov/News/Contracts/Contract-View/Article/1698166/

Sur le même sujet

  • Estonia’s drone-buying spree finds local vendors eager for deals

    22 février 2023 | International, Aérospatial

    Estonia’s drone-buying spree finds local vendors eager for deals

    Officials in Tallinn have previously looked abroad when it comes to finding suppliers of high-tech weaponry.

  • Audit finds cyber vulnerabilities in US missile defense system

    17 décembre 2018 | International, C4ISR

    Audit finds cyber vulnerabilities in US missile defense system

    By: Geoff Ziezulewicz The Army, Navy and Missile Defense Agency are failing to take basic cybersecurity steps to ensure that information on America's ballistic missile defense system won't fall into nefarious hands, according to a Defense Department Inspector General audit released Friday. Investigators visited five sites that manage ballistic missile defense elements and technical information, but the names of the commands were redacted in the publicly released report. “The Army, Navy and MDA did not protect networks and systems that process, store, and transmit (missile defense) technical information from unauthorized access and use,” the declassified report states. Such inadequacies “may allow U.S. adversaries to circumvent (missile defense) capabilities, leaving the United States vulnerable to missile attacks,” the report states. They found officials failed to employ safeguards familiar to most people online in 2018, the latest development to raise questions about the U.S. military's cybersecurity vulnerabilities. Among the shortcomings: Administrators for classified networks had no intrusion detection and prevention systems in place to watch for cyberattacks, much less stop them, according to the report. At one site, officials said they had requested to purchase those cyber safeguards in December 2017 but nine months later it still hadn't been approved. “Without intrusion detection and prevention capabilities, (the site) cannot detect malicious attempts to access its networks and prevent cyberattacks designed to obtain unauthorized access and exfiltrate sensitive (missile defense) technical information,” the report states. Officials also failed to patch system flaws after receiving vulnerability alerts, one of which had first been identified in 1990 and had still not been fixed by April. Another vulnerability that could be exploited by an attacker was first identified in 2013 but also was never pathced, according to the report. “Countless cyber incident reports show that the overwhelming majority of incidents are preventable by implementing basic cyber hygiene and data safeguards, which include regularly patching known vulnerabilities,” the IG report states. “(Missile defense) technical information that is critical to national security could be compromised through cyberattacks that are designed to exploit these weaknesses.” Some facilities failed to force employees to use common access cards, or CAC, when accessing the classified system, a basic cybersecurity practice known as multi-factor identification. Instead, officials were able to access the sensitive information using just a username and password, the report states. Hackers use phishing and other tactics to exploit passwords and gain access to such systems. New hires are supposed to be allowed network access without a card for only their first two weeks on the job. But IG investigators found users on the systems without CAC cards for up to seven years. At one site, a domain administrator never configured the network to allow only CAC holder access. “Allowing users to access networks using single factor authentication increases the potential that cyber attackers could exploit passwords and gain access to sensitive (missile defense) technical information,” the report states. Investigators also found unlocked server racks at some locations, another key vulnerability to insider snoopers. “The insider threat risk necessitates that organizations implement controls...to reduce the risk of malicious personnel manipulating a server's ability to function as intended and compromising sensitive and classified data,” the report states. External storage devices held unencrypted data and some sites failed to track who was accessing data, and why. Other administrators told investigators that they lacked the ability to record or monitor data downloaded from the network onto these devices. Unless these officials enforce the encryption of such removed data and monitor its downloading and transferring, “they will be at increased risk of not protecting sensitive and classified (missile defense) technical information from malicious users,” the report states. Investigators also found that some supposedly secure sites were failing to even lock their doors. One location had a security door that hadn't worked for years. “Although security officials were aware of the problem, they did not take appropriate actions to prevent unauthorized personnel from gaining unauthorized access to the facility,” the report states. Other sites featured no security cameras to monitor personnel movement and security officers failed to conduct badge checks. While the report makes recommendations to fix the documented problems, officials for the inspected agencies offered no comments on the non-classified draft report of the audit. Friday's scathing IG audit marked the latest in a string of reports detailing shoddy cybersecurity throughout the armed forces and defense contractors. During the same week, the Wall St. Journal reported that Chinese hackers are targeting military systems and those of defense contractors working on Navy projects. Beijing-linked cyber raids have attempted to steal everything from missile plans to ship-maintenance data in a series of hacks over the past 18 months, the Journal reports. As a result, Navy Secretary Richard Spencer has ordered a “comprehensive cybersecurity review” to assess if the Navy's cyber efforts “are optimally focused, organized, and resourced to prevent serious breaches,” spokesman Capt. Greg Hicks said. The review will also look at authorities, accountability and if the efforts reflect and incorporate government and industry best practices, he said. “Secretary Spencer's decision to direct a review reflects the serious to which the DoN prioritizes cybersecurity in this era of renewed great power competition,” Hicks said. https://www.navytimes.com/news/your-navy/2018/12/14/audit-finds-cyber-vulnerabilities-in-us-missile-defense-system

  • The case for robust defense spending

    17 juillet 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    The case for robust defense spending

    By: Rep. Rob Wittman President John Adams once wrote: “National defense is one of the cardinal duties of a Statesman.” These words are as true now as they were when they were written in 1815. However, unlike in 1815, the weight of these words seems lost on some in Congress. As Congress moves forward with the National Defense Authorization Act and the passage of the defense appropriations bill, there are irresponsible calls for blanket cuts to defense spending that are either misguided or willfully ignorant of the role the U.S. military plays in maintaining global stability. In a time where China continues its unprecedented aggressive actions, such as pushing into contested territory in India, attempting to subdue Hong Kong and continuing to antagonize partner nations in the South China Sea; where Russia advances its malign global state-building agenda through overt means while simultaneously using paramilitary mercenaries such as the Wagner Group to do the Kremlin's more insidious bidding; where Iran continues to terrorize the Middle East; and where North Korea remains a global nuclear threat, our response cannot be to cut our defense budget by nearly 50 percent, as suggested by some members of Congress. Simply put, there is no shortage of global powers who wish to see the United States, our partners and allies falter and fail. Ultimately, national defense is not just about protecting the homeland — it is about preventing conflicts from escalating, eliminating future threats and deterring those who have malicious intent toward the American people. Unfortunately, the world is not a benevolent place. The United States isn't fighting terrorism in Syria and Iraq for fun, we aren't protecting shipping lanes in the Pacific Ocean because we have nothing else to do, and we aren't working to bring the structural change needed to protect human rights against oppression across the African continent because of boredom. The United States military engages in these operations because no one else will, and we take up the mantle to bring stability to this dangerous world because we support peace and democratic institutions. Bringing stability to the globe and protecting our homeland comes at a price — it requires strong, robust funding of the Department of Defense. This does not mean to suggest there isn't waste, excess or duplicative programs within the Department of Defense. However, we are fortunate right now to have Pentagon leadership in Secretary Mark Esper and Deputy Secretary David Norquist who are tackling this problem head-on through their departmentwide review that has already yielded at least $5.7 billion to be reallocated for higher priorities. On top of this, every year the congressional Armed Services committees continue to work to refine, streamline and root out waste in the Pentagon through reformative NDAA provisions. For example, I led the aircraft carrier block-buy contract that saved nearly $4 billion for the taxpayers, and I have a bill out right now to do multiyear procurement on amphibious ships that would save at least $1 billion. While these are just two examples, one can imagine the type of savings that are to be found if we continue to extrapolate these types of actions out to our defense acquisitions at large. Additionally, Congress must work with the department to examine the audit and eliminate and reduce functions that are redundant or deemed no longer mission-critical, which will save the taxpayers billions of dollars. This is how Congress must address the defense budget — to make it streamlined and effective, and to find the mechanisms and authorities needed to make sure our dollar works harder than the yuan or the ruble. While this anti-defense spending rhetoric may play well for a certain form of politics, we must remember blanket cuts don't cut out the waste, it eliminates the programs that are easiest to cut, necessary training exercises, and emerging programs that are going to make the difference between life and death on the battlefield for our service members. https://www.defensenews.com/opinion/commentary/2020/07/16/the-case-for-robust-defense-spending/

Toutes les nouvelles