Quantum Research International, Huntsville, Ala., and BAE Systems Technology, Solutions and Services Inc., Rockville, Md., were each awarded a $85,500,000 cost-plus-fixed-fee contract modifications to provide research, development, test and evaluation services in support of the Future Warfare Center. The Army Space and Missile Defense Command, Peterson Air Force Base, Colo., is the contracting activity.
Lockheed Martin Corp., Orlando, Fla., was awarded an indefinite-delivery/indefinite-quantity, cost-plus-fixed-fee contract with a maximum value of $146 million. The award will provide for the services in support of the Joint Land Component Constructive Training Capability. The Army Program Executive Office for Simulation, Training and Instrumentation, Orlando, Fla., is the contracting activity.
L-3 KEO, Northampton, Mass., is being awarded a $13,396,095 firm-fixed-price modification to previously awarded contract for the production of 16 universal modular masts (UMM), a non-hull penetrating mast that is installed on Virginia class submarines and serves as a lifting mechanism for five different sensors including the Photonics Mast Program, high data rate mast, multi-functional mast, multi-functional modular mast and integrated electronic support measures mast. The Naval Sea Systems Command, Washington, D.C., is the contracting activity.
Cobham’s Brazilian subsidiary has secured its first major contract in Brazil to equip state police helicopters with high definition video surveillance downlinks, which will be used on helicopters in 12 cities during the 2013 Confederations Cup and the 2014 World Cup. The contract was developed with a local integration partner following the opening of the Cobham’s Sao Paulo office in August 2012 and includes both airborne and ground based equipment. This procurement was made through the newly-formed Extraordinary Secretariat for Security at Large Scale Events.
Lockheed Martin Mission Systems and Training, Syracuse, N.Y., is being awarded a $17,179,793 modification to previously awarded contract for the procurement of a one year option for fiscal 2013 AN/SQQ-89 anti-submarine warfare engineering services. This includes development and fielding of the AN/SQQ-89A(V)15 advanced capability builds 11 and 13 systems hosted on technical insertion 12 hardware. The Naval Sea Systems Command, Washington, D.C., is the contracting activity.
Lockheed Martin Corp., Liverpool, N.Y., is being awarded a $30,550,000 modification to previously awarded contract to exercise the firm-fixed-price options for the Surface Electronic Warfare Improvement Program (SEWIP) Block 2 System low-rate initial production units. The SEWIP is an evolutionary acquisition program to upgrade the existing AN/SLQ-32(V) Electronic Warfare System. The SEWIP Block 2 will greatly improve the receiver/antenna group necessary to keep capabilities current with the pace threats and to yield improved system integration. The Naval Sea Systems Command, Washington, D.C., is the contracting activity.
Northrop Grumman Corp., Aerospace Systems, San Diego, Calif., is being awarded an estimated $433,518,021 cost-plus-fixed-fee contract for contractor logistics support for the RQ-4 Global Hawk fielded weapon system. The contracting activity is the Air Force Life Cycle Management Center, Robins Air Force Base, Ga.
Sandia National Laboratories has signed an umbrella Cooperative Research and Development Agreement (CRADA) with Caterpillar Incorporated that covers multiple projects over the next three years. Though Caterpillar is best known for large construction and mining equipment, the CRADA authorizes work in computer and computational science, information and data analysis, mathematics, engineering science and high-performance computing. Technical categories covered by the agreement include simulation design exploration, advanced analytics, multiphysics engineering modeling and simulation, and high-performance computing. Caterpillar is seeking help from Sandia to develop advanced modeling and simulation technologies for virtual product development. Sandia has several technology partnership options that industry, nonprofits, government and academia can use to access the laboratories’ resources.
Interested in pursuing a career with the U.S. State Department? The department's Office of Recruitment, Examination and Employment released a free app in March, which educates aspiring Foreign Service candidates and others interested in diplomatic careers.
DOSCareers, available for both Android and iOS, includes career path descriptions; videos of employees in specific career tracks; sample questions from the Foreign Service Officer Tests; an overview of the hiring process; and free study resources, among other materials.
The State Department created the app to reach potential candidates with diverse backgrounds across the United States.
U.S. citizenship is required for State Department careers.
These sites are not affiliated with AFCEA or SIGNAL Magazine, and we are not responsible for the content or quality of the products offered. When visiting new websites, please use proper Internet security procedures.
The malware that infiltrated computer systems across South Korea’s banking and television broadcast industries on March 20 shares similarities with the Shamoon program used last year to wipe clean the hard drives of 30,000 Saudi Aramco workstations, according to experts at General Dynamics Fidelis Cybersecurity Solutions. Investigators at the company’s newly-opened cyber forensics laboratory in Columbia, Maryland, say the malware is not a Shamoon variant, but that the two programs share some characteristics.
Company officials acknowledge the speculation that North Korea launched the attacks but did not comment on the program’s origin. It is not unusual, they say, for a criminal group or nation to use malware that deliberately mimics attacks used by others. Doing so, of course, casts suspicion elsewhere, helping to mask the malware’s true origins. “A number of commercial firms were hit with a somewhat similar attack. It was not Shamoon. But the techniques were somewhat similar,” says Jim Jaeger, the company’s vice president of cybersecurity services.
Cyber lab personnel identified the South Korea malware as “239ed75323.exe,” a malicious file capable of wiping data in disk drives. One of the areas it targets is the disk’s master boot record, without which a computer cannot load its operating system. The program writes a pattern to the disk that repeats the word “HASTATI.” Hastati is an apparent reference to a class of infantry in the armies of the early Roman Republic that originally fought as spearmen and later as swordsmen. The malware did not overwrite the entire disk, so some data can be recovered. The cyber lab experts posted their initial findings in a blog the day after the attacks.