recommended reading

Army Awards No-Bid Cyber Range Deal to Lockheed Martin

John Amis/AP File Photo

Lockheed Martin has snagged a $14 million deal to help model hacks during cyber operation simulations, according to the Defense Department. 

During the 5-year contract period, the company will operate and sustain the National Cyber Range. The range is "designed to allow potentially virulent code to be introduced and studied on the range without compromising the range itself," Defense officials said in a contract notice released late Friday. 

Lockheed was the only company allowed to bid for the sole-source acquisition and is the incumbent contractor. The company joined the program in 2009, according to Lockheed's website

The work will be conducted in Orlando, Fla. The Army is using $5.6 million in fiscal 2014 research, development, test and evaluation funding to initiate payments.

In November 2012, Lockheed won an $80 million, 5-year contract to continue operating the range, which began as a Defense Advanced Research Projects Agency undertaking.

The system consists of proprietary Lockheed technology and custom-configured government equipment, according to 2012 contract documents.

The range mimics the Internet and other networks to model cyberattacks, as well as evaluate the impact of intrusions on those networks, according to the Pentagon. It can be reconfigured within less than a day and run simultaneous simulations at multiple security levels -- unclassified through Top Secret.  

In 2012, Defense officials indicated that Lockheed is the only vendor with the expertise and technology to sustain the range's activities.

Any reconstruction of the range "in the same or a different facility (even if established with the current equipment) would place the laboratory in a different electromagnetic environment with unknown effects on event repeatability and reproducibility," the 2012 documents stated. “The techniques and procedures to execute [range] testing are specific to this hardware/software mix, and must be continued. The government must also continue to obtain these highly specialized services from Lockheed Martin and the current [range] facility to avoid substantial duplication of cost not expected to be recovered through competition."

Threatwatch Alert

Network intrusion / Stolen credentials

85M User Accounts Compromised from Video-sharing Site Dailymotion

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.