recommended reading

Army Awards No-Bid Cyber Range Deal to Lockheed Martin

John Amis/AP File Photo

Lockheed Martin has snagged a $14 million deal to help model hacks during cyber operation simulations, according to the Defense Department. 

During the 5-year contract period, the company will operate and sustain the National Cyber Range. The range is "designed to allow potentially virulent code to be introduced and studied on the range without compromising the range itself," Defense officials said in a contract notice released late Friday. 

Lockheed was the only company allowed to bid for the sole-source acquisition and is the incumbent contractor. The company joined the program in 2009, according to Lockheed's website

The work will be conducted in Orlando, Fla. The Army is using $5.6 million in fiscal 2014 research, development, test and evaluation funding to initiate payments.

In November 2012, Lockheed won an $80 million, 5-year contract to continue operating the range, which began as a Defense Advanced Research Projects Agency undertaking.

The system consists of proprietary Lockheed technology and custom-configured government equipment, according to 2012 contract documents.

The range mimics the Internet and other networks to model cyberattacks, as well as evaluate the impact of intrusions on those networks, according to the Pentagon. It can be reconfigured within less than a day and run simultaneous simulations at multiple security levels -- unclassified through Top Secret.  

In 2012, Defense officials indicated that Lockheed is the only vendor with the expertise and technology to sustain the range's activities.

Any reconstruction of the range "in the same or a different facility (even if established with the current equipment) would place the laboratory in a different electromagnetic environment with unknown effects on event repeatability and reproducibility," the 2012 documents stated. “The techniques and procedures to execute [range] testing are specific to this hardware/software mix, and must be continued. The government must also continue to obtain these highly specialized services from Lockheed Martin and the current [range] facility to avoid substantial duplication of cost not expected to be recovered through competition."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.