recommended reading

Northrop Grumman snags a $782 million sole-source contract for Afghanistan communications

EQ-4 Global Hawk carrying the Battlefield Airborne Communications Node awaits takeoff.

EQ-4 Global Hawk carrying the Battlefield Airborne Communications Node awaits takeoff. // U.S. Air Force

The Air Force on Wednesday quietly disclosed it had awarded a $782 million sole source contract to Northrop Grumman Corp. to continue operating an airborne communications relay system in Afghanistan through September 2015, pushing the total value of the project to $1.7 billion.

Northrop Grumman began developing the Battlefield Airborne Communications Node in 2006 with two contracts valued at $50 million from the Advanced Technology Support Program managed by the Defense Microelectronics Activity. The Air Force deployed the first system, housed in a Bombardier BDS-700 business jet, in 2008.

Mountainous terrain in Afghanistan interferes with line-of-sight communications systems that ground troops use and BACN (pronounced “bacon”) functions as a high-altitude antenna. It incorporates gateway hardware and software that Northrop Grumman says can bridge the gap between multiple communications systems operating on different frequencies and modulation.

Northrop Grumman said BACN automatically provides translation services between incompatible radios, allowing a troop commander on the ground to use a radio operating on one frequency to easily communicate with the pilot of an aircraft who is operating on another.

The Air Force has deployed three BACN-equipped BD-700 aircraft to Afghanistan and two Northrop Grumman Global Hawk drones packed with BACN gear, with one drone lost in a crash in August 2011.

The Air Force said in a justification and approval document dated April 14 and posted to the FedBizOpps contracting website June 27 that it needed to extend the BACN contract because the current contract ends in June.

The new contract covers continued operation of the three BD-700s and two Global Hawks and ground control systems. The Air Force said it must operate BACN around-the-clock to support communications in Afghanistan and since Northrop Grumman owns the software, no other contractor could meet its requirements on time. The service said it is considering acquisition of a new system with full data rights to replace BACN.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.