29 août 2024 | International, Terrestre

Lockheed-Raytheon JV secures $1.3 bln Javelin missile contract from U.S. Army

Sur le même sujet

  • Contract Awards by US Department of Defense - February 05, 2021

    8 février 2021 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    Contract Awards by US Department of Defense - February 05, 2021

    NAVY Sikorsky Aircraft Corp., a Lockheed Martin Co., Stratford, Connecticut, is awarded a $478,605,019 firm-fixed-price modification (P00102) to a previously awarded contract (N0001914C0050). This modification exercises options for the procurement of five Lot Three low rate initial production Presidential Helicopters Replacement Program (VH-92A) aircraft, and associated interim contractor support, two cabin interior reconfiguration kits, support equipment, initial spares, and system parts replenishment. Work will be performed in Stratford, Connecticut (50%); Coatesville, Pennsylvania (36%); Owego, New York (10%); Patuxent River, Maryland (2%); Phoenix, Arizona (1%); and Quantico, Virginia (1%), and is expected to be completed in December 2023. Fiscal 2021 aircraft procurement (Navy) funds in the amount $478,605,019 will be obligated at time of award, none of which will expire at the end of the current fiscal year. The Naval Air Systems Command, Patuxent River, Maryland, is the contracting activity. Invicta Global LLC,* Fort Worth, Texas, was awarded a $14,600,550 indefinite-delivery/indefinite-quantity modification for the exercise of Option Three under a contract for base operating support services at various installations in the Naval Facilities Engineering Systems Command (NAVFAC) Washington area of operations (AO). After award of this option, the total cumulative contract value will be $39,316,621. The work to be performed is all labor, material, equipment, management and administration for utilities, transportation and facility support services to include fire protection services, facilities management and investment, base support vehicles and equipment, urgent, emergency and routine services for facility support services. Work will be performed in NAVFAC Washington AO, including but not limited to Bethesda, Maryland (40%); Washington, D.C. (40%); Indian Head, Maryland (10%); and Dahlgren, Virginia (10%). This option period is from Feb. 1, 2021, to Jan. 31, 2022. No funds were obligated at time of award. Operation and maintenance, (Navy); and fiscal 2021 Navy working capital funds in the amount of $6,488,840 for recurring work will be obligated on individual task orders issued during the option period. NAVFAC Washington, Washington, D.C., is the contracting activity (N40080-19-D-0311). (Awarded: Jan. 29, 2021) Opal Soft, Inc., Sunnyvale, California, is awarded an $11,979,099 cost-plus-fixed-fee bridge contract for software support services in support of Naval Undersea Warfare Center Division, Keyport. Work will be performed in Keyport, Washington, and is expected to be completed by September 2021. This contract includes an option which, if exercised, would bring the cumulative value of this contract to $19,049,565. Work is expected to be completed by December 2021. Fiscal 2021 service cost center (Navy) $3,154,151 (82.12%); 2015 shipbuilding and conversion (Navy) $246,982 (6.43%); 2017 shipbuilding and conversion (Navy) $246,982 (6.43%); 2021 defense working capital fund (Navy) $84,895 (2.21%); 2021 other procurement (Navy) $42,474 (1.11%) 2019 shipbuilding and conversion (Navy) $37,996 (0.99%); and 2018 shipbuilding and conversion (Navy) $27,092.45 (0.71%) funding will be obligated at award. No contract funds will expire at the end of the current fiscal year. This contract was not competitively procured in accordance with 10 U.S. Code 2304(c) (1) (only one responsible source and no other supplies or services will satisfy agency requirements). The Naval Undersea Warfare Center Division, Keyport, Keyport, Washington, is the contracting activity. (N0025321C0004) DEFENSE LOGISTICS AGENCY US Foods, La Mirada, California, has been awarded a maximum $114,700,000 firm-fixed-price, indefinite-delivery/indefinite-quantity contract for full-line food distribution. This was a competitive acquisition with two responses received. This is a five-year contract with no option periods. Locations of performance are California and Alaska, with a Feb. 4, 2026, ordering period end date. Using military services are Army, Navy, Air Force and Marine Corps. Type of appropriation is fiscal 2021 through 2026 defense working capital funds. The contracting agency is the Defense Logistics Agency, Troop Support, Philadelphia, Pennsylvania (SPE300-21-D-3307). ARMY Oshkosh Defense LLC, Oshkosh, Wisconsin, was awarded a $61,002,554 firm-fixed-price contract for 1,081 Underbody Armor Kit upgrade kits for the Family of Medium Tactical Vehicles. Bids were solicited via the internet with one received. Work will be performed in Oshkosh, Wisconsin, with an estimated completion date of June 30, 2022. Fiscal 2019, 2020 and 2021 European reassurance initiative funds in the amount of $61,002,554 were obligated at the time of the award. U.S. Army Contracting Command, Detroit Arsenal, Michigan, is the contracting activity (W56HZV-21-C-0084). Dyncorp International LLC, Fort Worth, Texas, was awarded a $42,000,000 modification (P00121) to contract W58RGZ-19-C-0025 for aviation maintenance services. Work will be performed in Afghanistan and Iraq, with an estimated completion date of Aug. 31, 2021. Fiscal 2021 operation and maintenance (Army) funds in the amount of $42,000,000 were obligated at the time of the award. U.S. Army Contracting Command, Redstone Arsenal, Alabama, is the contracting activity. Coastal Contractors Inc.,* Baton Rouge, Louisiana, was awarded a $9,450,839 firm-fixed-price contract for flood control of the Comite River. Bids were solicited via the internet with eight received. Work will be performed in Baton Rouge, Louisiana, with an estimated completion date of Apr. 8, 2022. Fiscal 2021 civil construction funds in the amount of $9,450,839 were obligated at the time of the award. U.S. Army Corps of Engineers, New Orleans, Louisiana, is the contracting activity (W912P8-21-C-0005). Escal Institute of Advanced Technologies Inc., North Bethesda, Maryland, was awarded a $9,443,000 modification (P00004) to contract W911S0-19-D-0009 to provide training and certifications as required to verify and validate student proficiency in cybersecurity roles. Work locations and funding will be determined with each order, with an estimated completion date of Feb. 5, 2022. U.S. Army Field Directorate Office, Fort Eustis, Virginia, is the contracting activity. Cottrell Contracting Corp., Chesapeake, Virginia, was awarded a $9,416,500 firm-fixed-price contract for maintenance dredging of Naval Submarine Base Kings Bay, Camden County, Georgia. Bids were solicited via the internet with two received. Work will be performed in Kings Bay, Georgia, with an estimated completion date of April 25, 2022. Fiscal 2021 operation and maintenance (defense-wide funds) in the amount of $9,416,500 were obligated at the time of the award. U.S. Army Corps of Engineers, Jacksonville, Florida, is the contracting activity (W912EP-21-C-0008). WASHINGTON HEADQUARTERS SERVICES Systems Planning and Analysis Inc., Alexandria, Virginia (HQ0034-21-F-0089), has been awarded a firm-fixed-price and time and materials contract in the amount of $34,891,509. This contract is to provide support to the Office of Industrial Policy in carrying out its mission to ensure robust, secure, resilient and innovative industrial capabilities within the Department of Defense. The contractor will provide program support for the Defense Production Act Titles I and III, Industrial Base Assessments, Industry Engagement/Outreach and Strategic Communications and Business Intelligence and Analytics. Work performance will take place at the Mark Center, Alexandria, Virginia; and the Pentagon, Washington, D.C. Appropriate fiscal 2021 operation and maintenance funds will be obligated at the award. The expected completion date is Feb. 6, 2026. Washington Headquarters Services, Arlington, Virginia, is the contracting activity. *Small business https://www.defense.gov/Newsroom/Contracts/Contract/Article/2495622/source/GovDelivery/

  • The Cybersecurity 202: Hackers just found serious vulnerabilities in a U.S. military fighter jet

    19 août 2019 | International, Aérospatial

    The Cybersecurity 202: Hackers just found serious vulnerabilities in a U.S. military fighter jet

    By Joseph Marks LAS VEGAS — In a Cosmopolitan hotel suite 16 stories above the Def Con cybersecurity conference this weekend, a team of highly vetted hackers tried to sabotage a vital flight system for a U.S. military fighter jet. And they succeeded. It was the first time outside researchers were allowed physical access to the critical F-15 system to search for weaknesses. And after two long days, the seven hackers found a mother lode of vulnerabilities that — if exploited in real life — could have completely shut down the Trusted Aircraft Information Download Station, which collects reams of data from video cameras and sensors while the jet is in flight. They even found bugs that the Air Force had tried but failed to fix after the same group of hackers performed similar tests in November without actually touching the device. “They were able to get back in through the back doors they already knew were open,” Will Roper, the Air Force's top acquisition official, told me in an exclusive briefing of the results. The hackers lobbed a variety of attacks — including injecting the system with malware and even going at it with pliers and screwdrivers. When I saw it, the metal box that's usually secure on the aircraft had wires hanging out the front. The hackers briefed Roper on the findings on Saturday afternoon. He was surrounded by discarded pizza boxes, iced coffee drinks — and the hotel's drinking glasses filled with screws, nuts and bolts removed from five fully dismantled TADS devices, which run about $20,000 a pop. He'd expected the results to be about this bad, Roper told me on a private tour of the hacking event. He pinned the weaknesses on decades of neglect of cybersecurity as a key issue in developing its products, as the Air Force prioritized time, cost and efficiency. He's trying to turn that around, and is hopeful about the results of the U.S. government's newfound openness to ethical hackers. He'd come straight from Def Con's first-ever Aviation Village, which the Air Force helped establish, and was wearing a gray T-shirt with the words “No, Mr. Bond, I expect you to hack,” emblazoned on the front — a riff on a classic line from the 1964 James Bond film “Goldfinger.” This is a drastic change from previous years, when the military would not allow hackers to try to search for vulnerabilities in extremely sensitive equipment, let alone take a literal whack at it. But the Air Force is convinced that unless it allows America's best hackers to search out all the digital vulnerabilities in its planes and weapons systems, then the best hackers from adversaries such as Russia, Iran and North Korea will find and exploit those vulnerabilities first, Roper told me. “There are millions of lines of code that are in all of our aircraft and if there's one of them that's flawed, then a country that can't build a fighter to shoot down that aircraft might take it out with just a few keystrokes,” he said. Roper wants to put his military hardware where his mouth is. During next year's Def Con conference, he wants to bring vetted hackers to Nellis or Creech Air Force bases near Las Vegas where they can probe for bugs on every digital system in a military plane, including for ways that bugs in one system can allow hackers to exploit other systems until they've gained effective control of the entire plane. He also wants to open up the ground control system for an operational military satellite for hacker testing, he said. “We want to bring this community to bear on real weapons systems and real airplanes,” Roper told me. “And if they have vulnerabilities, it would be best to find them before we go into conflict.” Those hacking challenges will also be useful for the private sector because military planes and satellites share many of their computer systems with the commercial versions of those products, Roper said, and the Air Force can share its findings. The seven hackers probing the TADS devices were all brought to Vegas by the cybersecurity company Synack, which sells the Pentagon third-party vulnerability testing services, under a contract with the Defense Digital Service, a team of mostly private-sector technology stars who try to solve some of the Pentagon's thorniest technology problems during short-term tours. The Defense Digital Service started by organizing large-scale hacking competitions in 2016, with names such as “Hack the Pentagon” and, eventually, “Hack the Air Force.” These were open to almost anybody — but included only public-facing hacking targets such as military service websites and apps. Shortly after, they also began opening more sensitive systems to a smaller number of vetted hackers who sign nondisclosure agreements. DDS has run about a dozen of those more sensitive hacking competitions so far, but this is the first time it has offered up the same system for hacking twice, said Brett Goldstein, DDS's director, who earned a reputation in technology as Open Table's IT director and chief data officer for the city of Chicago. “That's important because security is a continuous process,” he told me. “You can't do an exercise and say, ‘Oh, we found everything' and check the box. You need to constantly go back and reevaluate.” They also allowed the hackers to be more aggressive this time and to physically disassemble the TADS systems to get a better idea of what kinds of digital attacks might be effective, Goldstein said. That meant the hackers could simulate a cyberattack from adversaries that had infiltrated the vast network of suppliers that make TADS components and had sophisticated knowledge about how to compromise those elements. They could also advise the Air Force about flaws in how the TADS hardware was built that make it more susceptible to digital attacks. Moving forward, Roper told me, he wants to start using that knowledge to mandate that Air Force vendors build better software and hardware security controls into their planes and weapons systems upfront so the Air Force doesn't have to do so much cybersecurity work on the back end. He's up against an arcane and byzantine military contracting process, however, that's going to make those sorts of fundamental reforms extremely difficult, he acknowledged. In some cases, the company that built an Air Force system owns the software embedded in that system and won't let the Air Force open it up for outside testing, he says. In other cases, the Air Force is stuck with legacy IT systems that are so out of date that it's difficult for even the best technologists to make them more secure. “It's difficult to do this going backward, but we're doing our best,” Roper told me. “I can't underscore enough, we just got into the batter's box for what's going to be a long baseball game.” https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/08/14/the-cybersecurity-202-hackers-just-found-serious-vulnerabilities-in-a-u-s-military-fighter-jet/5d53111988e0fa79e5481f68/

  • Cloud-friendly Air Force has eyes on Pentagon’s JWCC contract

    15 décembre 2022 | International, Aérospatial

    Cloud-friendly Air Force has eyes on Pentagon’s JWCC contract

    CTO Jay Bonci said U.S. defense leaders "have to think about cloud as being a part of a resilience baseline."

Toutes les nouvelles