recommended reading

Army Awards No-Bid Cyber Range Deal to Lockheed Martin

John Amis/AP File Photo

Lockheed Martin has snagged a $14 million deal to help model hacks during cyber operation simulations, according to the Defense Department. 

During the 5-year contract period, the company will operate and sustain the National Cyber Range. The range is "designed to allow potentially virulent code to be introduced and studied on the range without compromising the range itself," Defense officials said in a contract notice released late Friday. 

Lockheed was the only company allowed to bid for the sole-source acquisition and is the incumbent contractor. The company joined the program in 2009, according to Lockheed's website

The work will be conducted in Orlando, Fla. The Army is using $5.6 million in fiscal 2014 research, development, test and evaluation funding to initiate payments.

In November 2012, Lockheed won an $80 million, 5-year contract to continue operating the range, which began as a Defense Advanced Research Projects Agency undertaking.

The system consists of proprietary Lockheed technology and custom-configured government equipment, according to 2012 contract documents.

The range mimics the Internet and other networks to model cyberattacks, as well as evaluate the impact of intrusions on those networks, according to the Pentagon. It can be reconfigured within less than a day and run simultaneous simulations at multiple security levels -- unclassified through Top Secret.  

In 2012, Defense officials indicated that Lockheed is the only vendor with the expertise and technology to sustain the range's activities.

Any reconstruction of the range "in the same or a different facility (even if established with the current equipment) would place the laboratory in a different electromagnetic environment with unknown effects on event repeatability and reproducibility," the 2012 documents stated. “The techniques and procedures to execute [range] testing are specific to this hardware/software mix, and must be continued. The government must also continue to obtain these highly specialized services from Lockheed Martin and the current [range] facility to avoid substantial duplication of cost not expected to be recovered through competition."

Threatwatch Alert

Social Media Takeover

Qatar News Agency Says Hackers Published Fake Stories

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.