recommended reading

Three contractors tapped to develop smart Humvee replacements

Lockheed Martin

The Army and Marine Corps awarded three companies development contracts Wednesday for their next generation of wheeled tactical vehicles, which will require a gigabit speed local area network to support onboard computers, communications and electronic warfare systems.

AM General, Lockheed Martin Corp. and Oshkosh Corp. won 27-month engineering and development contracts valued at $64.5 million, $66.3 million and $56.4 million respectively to produce 22 prototype Joint Light Tactical Vehicles each. The services will evaluate the prototypes at Army test centers in Arizona, Maryland and New Mexico.

The services then will select a single contractor to manufacture up to 50,000 JLTVs for the Army and another 5,000 for the Marine Corps. The development contracts specify that the services will pay no more than $250,000 per JLTV, putting the value of the production contract for 55,000 vehicles at $13.8 billion.

The JLTV will replace the Humvee that AM General developed in 1981 with vehicles that have been designed from the ground up to deal with threats from the makeshift bombs, or improvised explosive devices, which took a heavy toll on the thin-skinned Humvees during the Afghanistan and Iraq wars. AM General has manufactured 240,000 Humvees at prices ranging from $65,000 to $140,000 for variants with added armor.

The Army and Marines want the JLTV to have a bomb-deflecting hull and enough armor to resist IED blasts. At the same time, the vehicles should be lightweight enough to be transported in the workhorse C-130 tactical airlifter or by helicopters in sling loads, the services said.

The design also calls for a built-in computers and high-speed local area network to support IED jammers, satellite and ground radios, Global Positioning System receivers, and vehicle diagnostic systems. The JLTV driver and commander will each be furnished with smart display units to manage these systems.

The JLTV systems architecture calls for the use of both Microsoft Windows and open source Linux operating systems and the Force XXI Battle Command Brigade-and-Below/Blue Force Tracking system, a Linux-based system designed to help commanders track friendly and hostile forces on a battlefield on satellite-linked digital map displays.

Security software is so integral to the operation of the JLTV that the contracts call for an information assurance strategy, including a detailed system design, a test strategy and scans of the software code library.

BAE Systems, General Dynamics and Navistar also competed for the JLTV contract; the Army tapped them in October 2008 for technology development contracts, which included tests of prototypes at the Army's Aberdeen Proving Ground in Maryland.

Spokesmen for General Dynamics and BAE Systems expressed disappointment at not winning the JLTV prototype development contract and declined further comment until they received a debriefing from the services. A Navistar spokeswoman said there may be an opportunity for the company to bid on the production contract.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.