22 septembre 2024 | International, C4ISR, Sécurité
US close to sending $567 million in immediate security aid to Taiwan
The package, awaiting final approval, would be almost double the size of a tranche sent last year.
11 juin 2021 | International, Terrestre
Textron announced its Cottonmouth 6×6 armoured vehicle as an entrant for the US Marine Corps' (USMC) Advanced Reconnaissance Vehicle (ARV) requirement in May, revealing that the vehicle had entered validation testing at the National Automoti...
22 septembre 2024 | International, C4ISR, Sécurité
The package, awaiting final approval, would be almost double the size of a tranche sent last year.
19 juillet 2019 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité, Autre défense
DEFENSE LOGISTICS AGENCY Seqirus Inc., Summit, New Jersey, has been awarded a maximum $68,777,956 firm-fixed-price, indefinite-quantity contract for the injectable influenza vaccine. This was a competitive acquisition with two offers received. This is a one-year contract with no option periods. Location of performance is New Jersey, with a performance completion date of July 15, 2020. Using customers are Army, Air Force, Navy and Coast Guard. Type of appropriation is fiscal 2019 through 2020 defense working capital funds. The contracting activity is the Defense Logistics Agency Troop Support, Philadelphia, Pennsylvania (SPE2DP-19-D-0002). Bell Helicopter Textron Inc., Fort Worth, Texas, has been awarded a maximum $27,515,180 modification (P00018) against a five-year contract (SPE4AX-17-D-9410) adding five national stock numbers for stabilizer bar assemblies, pylon mast assemblies, trans case assemblies, quill assemblies and rotary wing blades in support of UH-1N and TH-1H helicopters. This is a fixed-price, requirements contract. Location of performance is Texas, with a Sep. 30, 2023, performance completion date. Using military service is Air Force. Type of appropriation is fiscal 2019 through 2023 defense working capital funds. The contracting activity is the Defense Logistics Agency Aviation, Philadelphia, Pennsylvania. CORRECTION: The contract announced on June 28, 2019, for Valley Apparel LLC, Knoxville, Tennessee (SPE1C1-19-D-1172) for $10,794,000 was announced with an incorrect award date. The correct award date is July 15, 2019. NAVY Raytheon Co., Integrated Defense Systems, Marlborough, Massachusetts, is awarded a $40,211,517 modification to previously awarded contract N00024-16-C-5370 to exercise an option for fiscal 2019 production long lead material in support of the production of two AN/SPY-6(V) configuration variants – the SPY-6(V)2 Rotator Radar and the SPY-6(V)3 Fixed Face Radar. Work will be performed in Marlborough, Massachusetts, and is expected to be complete by June 2020. Fiscal 2018 and 2017 shipbuilding and conversion (Navy) funding in the amount of $40,211,517 will be obligated at time of award and will not expire at the end of the current fiscal year. The Naval Sea Systems Command, Washington, District of Columbia, is the contracting activity. AIR FORCE Agile Defense Inc., Reston, Virginia, has been awarded a $21,044,844 firm-fixed-price contract for combined air operations center communication services. This contract provides for operations and maintenance of all air operations center communication systems. Work will be performed in the Air Force Central Command's area of responsibility and is expected to be complete by June 2, 2020. This award is the result of a sole source acquisition. Fiscal 2019 operations and maintenance funds in the amount of $8,627,758 are being obligated at the time of award. The Air Combat Command Acquisition Management and Integration Center, Langley Air Force Base, Hampton, Virginia, is the contracting activity (FA4890-19-F-A050). ARMY Relyant Global LLC,* Maryville, Tennessee, was awarded a $15,000,000 firm-fixed-price contract for repair or replacement of historic windows and doors at Fort Riley, Kansas. Bids were solicited via the internet with two received. Work locations and funding will be determined with each order, with an estimated completion date of July 14, 2024. U.S. Army Corps of Engineers, Kansas City, Missouri, is the contracting activity (W912DQ-19-D-4012). *Small Business https://dod.defense.gov/News/Contracts/Contract-View/Article/1906928/source/GovDelivery/
19 décembre 2018 | International, C4ISR
By: Justin Lynch The Pentagon has received more power to conduct cyber operations in the past 18 months. But for the top Army commander in the Middle East and Central Asia, the new authority is not enough. The head of U.S. Central Command, Gen. Joseph Votel, wrote in a Dec. 18 paper that the Pentagon must “normalize” electronic warfare and cyberattacks and incorporate them into daily operations. “Normalizing the cyberspace domain means broader authorities that are more responsive than current bureaucratic processes,” Votel wrote in the Army's Cyber Defense Review. “It also means we need simple and streamlined organizations and processes to increase lethality and enhance performance.” The paper was coauthored by Votel, Maj. Gen. Julazadeh and Maj. Weilun Lin. “Our failure to operationalize and normalize the cyberspace domain effectively cedes it to our adversaries, gives them a competitive advantage and, ultimately, creates an increased attack vector against our objectives,” the authors said. President Trump gave the Pentagon new authorities to conduct cyber operations in August and minimized the process where other agencies can object to cyberattacks, known as “deconfliction.” Secretary of Defense Jim Mattis can conduct hacking operations without approval from the White House so long as they do not interfere with the American “national interest,” according to four current and former White House and intelligence officials who were either part of internal deliberations or briefed on the changes. Yet some current and former U.S. officials are skeptical that the new authorities will mean more effective hacking operations for the Pentagon, because it does not solve the nuances of cyberattacks. But the new mandates do not go far enough for the three officer authors, who argued that cyberwarfare should be under the same authorities as other types of operations. “We must not see cyberspace as drastically different and separate from other domains that we create new processes to prepare, plan and fight in this new domain. We continue to seek processes that smooth and simplify operations, reducing friendly friction and accelerating decision-making.” Current and former Pentagon officials have pointed to conducting cyberattacks against enemies that use networks of neutral or partner nations as an area where the Pentagon has changed its decision-making process in recent years. Those officials also pointed to how the Pentagon was able to use hybrid warfare tactics during the 2016 liberation of Mosul, Iraq, as a textbook example of future hybrid operations. Votel, Julazadeh and Lin echoed the sentiment of other Pentagon officials who have advocated for cyberattacks, electronic warfare and other information operations to be integrated earlier in military operations. “We need to proactively execute cyberspace and information operations early in 'Phase 0 / steady state' of the planning process — well before operation execution. Only then can we shape the [information environment], hold our adversaries' capabilities at risk and execute at the speed of war,” the three wrote. For example, Pentagon officials say they closely monitored Russia's 2014 hybrid war in Ukraine and learned from Moscow's tactics. Votel, Julazadeh and Lin shed light on the changes, writing that information operations were previously “integrated as an afterthought.” Yet over the last two years, Central Command has incorporated cyberattacks, electronic warfare and military deception at the “strategic level.” And this hybrid warfare has driven new acquisition demands in the Pentagon. “We need technology and capabilities to keep pace with the operational environment and continue to build the partnerships to do so,” the three officers wrote. In recent years, Central Command has bolstered its hybrid warfare through new contracts. The centerpiece of that effort is a July 2017 contract worth $621 million to Science Applications International Corporation for IT support to Central Command that could last seven years. In August 2018, Vistra communications was also awarded a $22 million contract to support offensive and defensive cyber operations for Central Command. https://www.fifthdomain.com/dod/2018/12/18/centcom-chief-the-future-of-warfare-demands-more-cyber-authorities