United States Charges Dual Russian and Israeli National as Developer of LockBit Ransomware Group

Source: United States Department of Justice

Note: A copy of the superseding criminal complaint can be found here.

A superseding criminal complaint filed in the District of New Jersey was unsealed today charging a dual Russian and Israeli national for being a developer of the LockBit ransomware group.

In August, Rostislav Panev, 51, a dual Russian and Israeli national, was arrested in Israel pursuant to a U.S. provisional arrest request with a view towards extradition to the United States. Panev is currently in custody in Israel pending extradition on the charges in the superseding complaint.

“The Justice Department’s work going after the world’s most dangerous ransomware schemes includes not only dismantling networks, but also finding and bringing to justice the individuals responsible for building and running them,” said Attorney General Merrick B. Garland. “Three of the individuals who we allege are responsible for LockBit’s cyberattacks against thousands of victims are now in custody, and we will continue to work alongside our partners to hold accountable all those who lead and enable ransomware attacks.”

“The arrest of Mr. Panev reflects the Department’s commitment to using all its tools to combat the ransomware threat,” said Deputy Attorney General Lisa Monaco. “We started this year with a coordinated international disruption of LockBit — the most damaging ransomware group in the world. Fast forward to today and three LockBit actors are in custody thanks to the diligence of our investigators and our strong partnerships around the world. This case is a model for ransomware investigations in the years to come.”

“The arrest of alleged developer Ratislav Panev is part of the FBI’s ongoing efforts to disrupt and dismantle the LockBit ransomware group, one of the most prolific ransomware variants across the globe,” said FBI Director Christopher Wray. “The LockBit group has targeted both public and private sector victims around the world, including schools, hospitals, and critical infrastructure, as well as small businesses and multi-national corporations.  No matter how hidden or advanced the threat, the FBI remains committed to working with our interagency partners to safeguard the cyber ecosystem and hold accountable those who are responsible for these criminal activities.” 

“The criminal complaint alleges that Rotislav Panev developed malware and maintained the infrastructure for LockBit, which was once the world’s most destructive ransomware group and attacked thousands of victims, causing billions of dollars in damage,” said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division. “Along with our domestic and international law enforcement partner actions to dismantle LockBit’s infrastructure, the Criminal Division has disrupted LockBit’s operations by charging seven of its key members (including affiliates, developers, and its administrator) and arresting three of these defendants — including Panev. We are especially grateful for our partnerships with authorities in Europol, the United Kingdom, France, and Israel, which show that, when likeminded countries work together, cybercriminals will find it harder to escape justice.”

“As alleged by the complaint, Rostislav Panev for years built and maintained the digital weapons that enabled his LockBit coconspirators to wreak havoc and cause billions of dollars in damage around the world,” said U.S. Attorney Philip R. Sellinger for the District of New Jersey. “But just like the six other LockBit members previously identified and charged by this office and our FBI and Criminal Division partners, Panev could not remain anonymous and avoid justice indefinitely. He must now answer for his crimes. Today’s announcement represents another blow struck by the United States and our international partners against the LockBit organization, and our efforts will continue relentlessly until the group is fully dismantled and its members brought to justice.”

According to the superseding complaint, documents filed in this and related cases, and statements made in court, Panev acted as a developer of the LockBit ransomware group from its inception in or around 2019 through at least February 2024. During that time, Panev and his LockBit coconspirators grew LockBit into what was, at times, the most active and destructive ransomware group in the world. The LockBit group attacked more than 2,500 victims in at least 120 countries around the world, including 1,800 in the United States. Their victims ranged from individuals and small businesses to multinational corporations, including hospitals, schools, nonprofit organizations, critical infrastructure, and government and law-enforcement agencies. LockBit’s members extracted at least $500 million in ransom payments from their victims and caused billions of dollars in other losses, including lost revenue and costs from incident response and recovery.

LockBit’s members comprised “developers,” like Panev, who designed the LockBit malware code and maintained the infrastructure on which LockBit operated. LockBit’s other members, called “affiliates,” carried out LockBit attacks and extorted ransom payments from LockBit victims. LockBit’s developers and affiliates would then split ransom payments extorted from victims.

As alleged in the superseding complaint, at the time of Panev’s arrest in Israel in August, law enforcement discovered on Panev’s computer administrator credentials for an online repository that was hosted on the dark web and stored source code for multiple versions of the LockBit builder, which allowed LockBit’s affiliates to generate custom builds of the LockBit ransomware malware for particular victims. On that repository, law enforcement also discovered source code for LockBit’s StealBit tool, which helped LockBit affiliates exfiltrate data stolen through LockBit attacks. Law enforcement also discovered access credentials for the LockBit control panel, an online dashboard maintained by LockBit developers for LockBit’s affiliates and hosted by those developers on the dark web.

The superseding complaint also alleges that Panev exchanged direct messages through a cybercriminal forum with LockBit’s primary administrator, who, in an indictment unsealed in the District of New Jersey in May, the United States alleged to be Dimitry Yuryevich Khoroshev (Дмитрий Юрьевич Хорошев), also known as LockBitSupp, LockBit, and putinkrab. In those messages, Panev and the LockBit primary administrator discussed work that needed to be done on the LockBit builder and control panel.

Court documents further indicate that, between June 2022 and February 2024, the primary LockBit administrator made a series of transfers of cryptocurrency, laundered through one or more illicit cryptocurrency mixing services, of approximately $10,000 per month to a cryptocurrency wallet owned by Panev. Those transfers amounted to over $230,000 during that period.

In interviews with Israeli authorities following his arrest in August, Panev admitted to having performed coding, development, and consulting work for the LockBit group and to having received regular payments in cryptocurrency for that work, consistent with the transfers identified by U.S. authorities. Among the work that Panev admitted to having completed for the LockBit group was the development of code to disable antivirus software; to deploy malware to multiple computers connected to a victim network; and to print the LockBit ransom note to all printers connected to a victim network. Panev also admitted to having written and maintained LockBit malware code and to having provided technical guidance to the LockBit group.

The LockBit Investigation

The superseding complaint against, and apprehension of, Panev follows a disruption of LockBit ransomware in February by the United Kingdom (U.K.)’s National Crime Agency (NCA)’s Cyber Division, which worked in cooperation with the Justice Department, FBI, and other international law enforcement partners. As previously announced by the Department, authorities disrupted LockBit by seizing numerous public-facing websites used by LockBit to connect to the organization’s infrastructure and by seizing control of servers used by LockBit administrators, thereby disrupting the ability of LockBit actors to attack and encrypt networks and extort victims by threatening to publish stolen data. That disruption succeeded in greatly diminishing LockBit’s reputation and its ability to attack further victims, as alleged by documents filed in this case.

The superseding complaint against Panev also follows charges brought in the District of New Jersey against other LockBit members, including its alleged primary creator, developer, and administrator, Dmitry Yuryevich Khoroshev. An indictment against Khoroshev unsealed in May alleges that Khoroshev began developing LockBit as early as September 2019, continued acting as the group’s administrator through 2024, a role in which Khoroshev recruited new affiliate members, spoke for the group publicly under the alias “LockBitSupp,” and developed and maintained the infrastructure used by affiliates to deploy LockBit attacks. Khoroshev is currently the subject of a reward of up to $10 million through the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

A total of seven LockBit members have now been charged in the District of New Jersey. Beyond Panev and Khoroshev, other previously charged LockBit defendants include:

  • In July, two LockBit affiliate members, Mikhail Vasiliev, also known as Ghostrider, Free, Digitalocean90, Digitalocean99, Digitalwaters99, and Newwave110, and Ruslan Astamirov, also known as BETTERPAY, offtitan, and Eastfarmer, pleaded guilty in the District of New Jersey for their participation in the LockBit ransomware group and admitted deploying multiple LockBit attacks against U.S. and foreign victims. Vasiliev and Astamirov are presently in custody awaiting sentencing.
  • In February, in parallel with the disruption operation described above, an indictment was unsealed in the District of New Jersey charging Russian nationals Artur Sungatov and Ivan Kondratyev, also known as Bassterlord, with deploying LockBit against numerous victims throughout the United States, including businesses nationwide in the manufacturing and other industries, as well as victims around the world in the semiconductor and other industries. Sungatov and Kondratyev remain at large.
  • In May 2023, two indictments were unsealed in Washington, D.C., and the District of New Jersey charging Mikhail Matveev, also known as Wazawaka, m1x, Boriselcin, and Uhodiransomwar, with using different ransomware variants, including LockBit, to attack numerous victims throughout the United States, including the Washington, D.C., Metropolitan Police Department. Matveev remains at large and is currently the subject of a reward of up to $10 million through the U.S. Department of State’s TOC Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

The U.S. Department of State’s TOC Rewards Program is offering rewards of:

Information is accepted through the FBI tip website at tips.fbi.gov.

Khoroshev, Matveev, Sungatov, and Kondratyev have also been designated for sanctions by the Department of the Treasury’s Office of Foreign Assets Control for their roles in launching cyberattacks.

Victim Assistance

LockBit victims are encouraged to contact the FBI and submit information at www.ic3.gov/. As announced by the Department in February, law enforcement, through its disruption efforts, has developed decryption capabilities that may enable hundreds of victims around the world to restore systems encrypted using the LockBit ransomware variant. Submitting information at the IC3 site will enable law enforcement to determine whether affected systems can be successfully decrypted.

LockBit victims are also encouraged to visit www.justice.gov/usao-nj/lockbit for case updates and information regarding their rights under U.S. law, including the right to submit victim impact statements and request restitution, in the criminal litigation against Panev, Astamirov, and Vasiliev.

The FBI Newark Field Office, under the supervision of Acting Special Agent in Charge Nelson I. Delgado, is investigating the LockBit ransomware variant. Israel’s Office of the State Attorney, Department of International Affairs, and Israel National Police; France’s Gendarmerie Nationale Cyberspace Command, Paris Prosecution Office — Cyber Division, and judicial authorities at the Tribunal Judiciare of Paris; Europol; Eurojust; the U.K.’s NCA; Germany’s Landeskriminalamt Schleswig-Holstein, Bundeskriminalamt, and the Central Cybercrime Department North Rhine-Westphalia; Switzerland’s Federal Office of Justice, Public Prosecutor’s Office of the Canton of Zurich, and Zurich Cantonal Police; Spain’s Policia Nacional and Guardia Civil; Japan’s National Police Agency; Australian Federal Police; Sweden’s Polismyndighetens; Canada’s Royal Canadian Mounted Police; Politie Dienst Regionale Recherche Oost-Brabant of the Netherlands; and Finland’s National Bureau of Investigation have provided significant assistance and coordination in these matters and in the LockBit investigation generally.

Trial Attorneys Debra Ireland and Jorge Gonzalez of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) and Assistant U.S. Attorneys Andrew M. Trombly, David E. Malagold, and Vinay Limbachia for the District of New Jersey are prosecuting the charges against Panev and the other previously charged LockBit defendants in the District of New Jersey.

The Justice Department’s Cybercrime Liaison Prosecutor to Eurojust, Office of International Affairs, and National Security Division also provided significant assistance.

Additional details on protecting networks against LockBit ransomware are available at StopRansomware.gov. These include Cybersecurity and Infrastructure Security Agency Advisories AA23-325A, AA23-165A, and AA23-075A. 

A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Defense News: USS Beloit (LCS 29) makes it home to Mayport

Source: United States Navy

After 15 locks, four Great Lakes, three port visits, and over 2,500 nautical miles traveled, USS Beloit (LCS 29) and her mighty crew at last arrived in the Atlantic Ocean, continuing her transit to its future homeport, Naval Station Mayport, Florida. 

The road to make it to the Atlantic Ocean included months of preparation from the crew. In less than two months after moving onboard in August, the crew certified in several mission areas required to safely operate and get underway including: Search and Rescue, Navigation, Damage Control, Communications and Engineering.

“The Beloit Badger crew are some of the best Sailors I have served with. They are resilient, strong, flexible and dedicated, and I am blessed to be their Commanding Officer. Almost everything we have done in the past five months has been ‘high risk’ and ‘first time’, but that’s what makes us so unique,” said Cmdr. LeAndra Kissinger, Beloit’s commanding officer. We work hard, pray hard, and lean on each other as a team. We truly are a family, and when a family wants to accomplish a mission, it’s hard to stop them.”

Each evolution, although involving different departments on the ship, required careful coordination and support from each division and Sailor onboard and was necessary for the crew to be able to set sail from Marinette, Wisconsin, towards the site of its commissioning ceremony in Milwaukee, Wisconsin. 

On November 23, the crew took the order to “man the ship and bring her to life.” Amongst thousands of onlookers, the ship made its much anticipated transition from pre-commissioned unit to United States Ship and began her sail around home. 

Her commissioning festivities included a crew visit to their namesake town of Beloit, a Chairman’s dinner hosted by the Commandant, and a commissioning ceremony who’s audience was filled with veterans from many significant battles. Along the way, she stopped in Cleveland, Ohio, Quebec City, Quebec and Halifax, Nova Scotia, and Norfolk for refueling, stores replenishment and liberty for the crew.  

“This crew has shown tremendous resilience in overcoming the last 4 months. Completing difficult consecutive certifications while learning a new ship and being away from family. This team made it look easy and brought a whole new meaning to the term “Beloit Proud,” said Senior Chief David Chisholm, Beloit’s Senior Enlisted Leader. “Watching them perform under pressure and overcoming every obstacle with grace shows just how awesome our team is and their readiness to face the challenges ahead after some much needed and well-deserved family time. It is an honor to be sailing with them and representing the city of Beloit.”

Capt. James Lawrence said it best, “Don’t give up the ship.” And that’s exactly what this crew did to get us home on time!” said Operation Specialist first class petty officer Ernesto Sanchez, USS Beloit’s Sailor of the Year!

With the last port fading in the rear only a few hundred nautical miles remain before Jacksonville is within view, the crew is eagerly awaiting returning to their families and friends, and ready to take on the next mission that will come their way as the Navy’s newest warship join the fleet!  

LCS is a fast, agile, mission-focused platform designed for operation in near-shore environments yet capable of open-ocean operation. It is designed to defeat asymmetric “anti-access” threats and is capable of supporting forward presence, maritime security, sea control, and deterrence. 

For more news from Commander, Littoral Combat Ship Squadron Two, visit https://www.surflant.usff.navy.mil/lcsron2/ or follow on Facebook at https://www.facebook.com/comlcsron2/

Defense News: NAVAIR issues V-22 bulletin and interim flight clearance

Source: United States Navy

Aircraft with PRGBs that currently meets or exceeds a predetermined flight-hour threshold will resume flights in accordance with controls instituted in the March 2024 interim flight clearance (IFC).

A new IFC, containing additional risk mitigation controls, has been issued to address aircraft with PRGBs below the flight-hour threshold. These controls will remain in place until the aircraft’s PRGBs are upgraded, or the predetermined threshold is exceeded.

NAVAIR collaborated with the Navy, Air Force Special Operations Command and the Marine Corps to implement the bulletin and IFC.

Due to operational security concerns, the specifics of the V-22 flight-hour threshold, number of aircraft affected and additional flight controls will not be released.

NAVAIR remains committed to transparency and safety regarding all V-22 operations. The V-22 plays an integral role in supporting our nation’s defense. Returning these vital assets to flight is critical to supporting our nation’s interests.

NAVAIR continuously monitors data and trends from all aircraft platforms to provide service members the safest, most reliable aircraft possible.

Defense News: USS Spruance returns home after five-month deployment to 5th and 7th Fleet

Source: United States Navy

Spruance departed San Diego with the ABECSG and deployed to the 7th and 5th fleet area of operations, July 17, 2024.

“The Spruance crew continues to impress – there is no other team that I would rather be a part of. I am immensely proud of all that the team has accomplished and will continue to accomplish. This deployment was a test of our readiness, and our Sailors exceeded every expectation,” said Cmdr. Thomas “Matt” Adams, commanding officer, Spruance. “Facing advanced missile threats and attack drones in a high-stakes environment, they demonstrated exceptional tactical precision and a war fighter mindset. From identifying incoming threats to controlling aircraft to executing flawless missile engagements, our crew neutralized every danger with unwavering focus and discipline.”

ABECSG initially deployed to the Indo-Pacific region to support regional security and stability, and to reassure our allies and partners of the U.S. Navy’s unwavering commitment, highlighted by the first-ever U.S.-Italy multi-large deck event (MLDE) with the Italian Navy’s ITS Cavour Carrier Strike Group held in the Indo-Pacific on Aug. 9, 2024.

The strike group was ordered to the U.S. Central Command area of responsibility to bolster U.S. military force posture in the Middle East, deter regional escalation, degrade Houthi capabilities, defend U.S. forces, and again sailed alongside our Italian allies and other partners to promote security, stability and prosperity. Assigned destroyers of the ABECSG, to include Spruance, were essential to providing a layer of defense to U.S. forces and ensuring the safe passage of commercial vessels and partner nations transiting in international waterways like the Red Sea, Bab el-Mandeb Strait and the Gulf of Aden.

The destroyers worked alongside U.S. Central Command forces in successfully repelling multiple Iranian-backed Houthi attacks during transits of the Bab el-Mandeb strait. During the transits, the destroyers were attacked by one-way attack uncrewed Aerial systems, anti-ship ballistic missiles and anti-ship cruise missiles which were successfully engaged and defeated. The vessels were not damaged and no personnel were hurt. The ships were well prepared, supported, and the well-trained Sailors successfully defended the ship.

“I am so proud of our team. Our Sailors met every challenge on this deployment with professional excellence. Sailors displayed the highest levels of teamwork, adaptability, and courage—qualities that make our Navy the finest in the world,” said Cmdr. Leigh R. Tate, executive officer, Spruance. “There is no other group of Sailors who have more grit and tenacity for mission success, and they proved it.”

Throughout deployment, Spruance traveled 37,200 nautical miles, conducted 12 replenishments-at-sea, 28 sea and anchor details, Anti-Submarine Tactical Air Controller (ASTAC) controlled over 800 hours of rotary air wing control and the Air Intercept Controllers (AIC) controlled 50 live runs with Carrier Air Wing (CVW) 9 and U.S. Air Force assets. Spruance also achieved 36 re-enlistments, 37 advancements and seven officer promotions. Spruance Sailors were awarded the Global War on Terrorism (GWOT) Expeditionary Medal and Combat Action Ribbon (CAR) for their actions in the Bab el-Mandeb.

Spruance was led by their commanding officer, Cmdr. Thomas “Matt” Adams, executive officer, Cmdr. Leigh R. Tate, and Command Master Chief Kurtiss Vervynckt.

The ABECSG is the most capable CSG comprised of the air wing of the future, the most advance Arleigh Burke-class guided-missile destroyer USS Frank E. Peterson Jr. (DDG 121) as Integrated Air and Missile Defense Commander, and the Arleigh Burke destroyers assigned to Destroyer Squadron (DESRON) 21, representing more than 6,000 Sailors, deployed from their homeports of San Diego and Pearl Harbor since July 2024.

Deploying units of the strike group include the flagship USS Abraham Lincoln (CVN 72), DESRON 21, Carrier Air Wing (CVW) 9, and Frank E. Petersen Jr. While the Arleigh Burke-class guided-missile destroyer, assigned to DESRON 21, USS Michael Murphy (DDG 112) returned to its homeport, Arleigh Burke-class guided-missile destroyers USS O’Kane (DDG 77) and USS Stockdale (DDG 106) remain deployed in the 5th Fleet area of operations supporting global maritime security operations.

As an integral part of U.S. Pacific Fleet, Commander, U.S. 3rd Fleet operates naval forces in the Indo-Pacific and provides the realistic and relevant training necessary to execute the U.S. Navy’s timeless role across the full spectrum of military operations—from combat missions to humanitarian assistance and disaster relief. U.S. 3rd Fleet works together with our allies and partners to advance freedom of navigation, the rule of law, and other principles that underpin security for the Indo-Pacific region.

Defense News: NIWC Atlantic drives strategic collaboration, alignment at Eastern Defense Summit

Source: United States Navy

NORTH CHARLESTON, S.C. — Naval Information Warfare Center (NIWC) Atlantic served as a primary contributor during the 2024 Eastern Defense Summit on Dec. 11-12, as the command sought to help the defense industry better understand some of the Navy’s biggest technical challenges.

Sponsored by the Charleston Defense Contractors Association (CDCA), the Eastern Defense Summit saw more than 2,000 individuals and 150 vendors descend on the Charleston Area Convention Center to participate in tech-based panel discussions, breakout sessions, strategic engagements and exhibit hall demonstrations, which included NIWC Atlantic STEM activities with students from school robotics teams in the local area.

During his welcome to summit attendees, NIWC Atlantic Commanding Officer Capt. Matt O’Neal explained how the Navy engineering and information technology command he leads relies on industry partners to address the warfighter’s top technology challenges.

“The ideas discussed at this week’s summit, the foundational connections made, the innovation opportunities pursued, (they are very) meaningful,” O’Neal said. “They ensure that when our nation calls on our men and women serving around the world, they are ready, because the technology in their hands is relevant, reliable and effective.”

The theme of this year’s summit was “Collaborating on Actionable Solutions for Our Nation’s Pacing Threats.”

During the two-day event, military leaders talked about lessons learned in the Red Sea and Black Sea while leading discussions centering on joint interoperability, zero trust, AI, rapid contracting strategies, unmanned systems, expeditionary maritime operations and preparing for conflict.

NIWC Atlantic leaders sitting on various panels typically paused to first highlight Chief of Naval Operations Adm. Lisa Franchetti’s recently released Navigation Plan (NAVPLAN) for America’s Warfighting Navy, which prioritizes making the Navy ready for potential conflict with the People’s Republic of China by January 2027.

The message to the defense industry was clear: We cannot do this without you.

Whether leveraging rapid contracting strategies or working traditional acquisition channels, the theme of government-industry collaboration during the summit teemed with a sense of urgency.

“I think the trend that we are all seeing is this demand to ‘go faster with good enough,’” said Greg Hays, senior scientific technology manager at NIWC Atlantic for rapid prototyping, experimentation and fleet exercises. “We can’t sit around and wait for the 100% solution if there are viable options both inside and outside of government.”

Hays said NIWC Atlantic wants to accelerate critical capabilities to the warfighter by rapidly assessing commercial and non-traditional solutions that lower risk, adopting what works, integrating into the warfighting family of systems and then ultimately letting the warfighter adapt to maximize the utility.

Capt. Andrew Gibbons, senior military acquisition advisor to the Assistant Secretary of the Navy for Research, Development and Acquisition, also emphasized commercial technologies that the Navy might be able to leverage in a military fashion.

“I’m very passionate about these dual-use technologies,” Gibbons said. “We need to mine from sources of the brilliant folks out in our country, who are doing things they do not know can actually help the military.”

One reason the Department of Defense (DoD) needs to look externally is because industry far outpaces government spending in research and development (R&D), according to Jim Rabuck, Defense Innovation Unit (DIU) southwest regional director.

He said for every DoD dollar invested in R&D back in the 1950s, commercial industry was spending only half of that. Today, companies spend $10 or more to every DoD research dollar.

“In certain industries, like AI or quantum computing, you’re looking at $100 to every dollar we spend — some, even $1,000 more.”

Rabuck explained DIU was specifically set up to figure out how to work with Silicon Valley and other commercial tech solutions that might have application in DoD.

The challenge for military labs, noted Tom Rondeau, director of the DoD’s FutureG Office, is in trying to figure out what solutions exist in a sector of commerce where everyone is quickly out-innovating everyone else.

“Ukraine looked like a tank war for the first few months,” Rondeau said. “It is an innovation war. How they are competing with an adversary that is larger than they are is by innovating. They are using technology and applying it rapidly to their problem set, making adjustments within days or weeks as opposed to the traditional acquisitions model of months and years.”

During one panel discussion, Steve Harnig, NIWC Atlantic director of contracts, said one way the Navy acquires commercial solutions and partners with non-traditional vendors is through various Other Transaction Authority (OTA) vehicles, such as the Information Warfare Research Project (IWRP).

Administered by NIWC Atlantic, IWRP is a rapid-prototyping initiative aimed at advancing information warfare solutions. To date, the collaborative acquisition process has executed more than $2.5 billion in prototype project awards and follow-on production awards.

“As we think about what’s out there in the commercial sector, we have seen a large ramp-up of our OTAs,” he said. “We also use our NASA SEWP (Solutions for Enterprise-Wide Procurement) contract for commercial solutions. The goal of any DoD acquisition model is to get technology into the warfighters hands as quickly as possible.”

Dr. Laura Taylor-Kale, assistant secretary of defense for industrial base policy, also told summit attendees about the burgeoning Defense Industrial Base Consortium (DIBC), one of the most powerful OTAs the DoD has ever stood up.

“The DIBC is precisely designed to accelerate awards under the Defense Production Act and allows an innovative way to engage and partner with industry,” she said.

Alongside several Navy commands, joint force components of this year’s summit included high-level U.S. Coast Guard leadership, U.S. Marine Corps commanding officers and the 628th Air Base Wing // Joint Base Charleston commander. Each leader weighed in on their service’s contributions to joint force planning and collaboration ahead of the nation’s next potential conflict.

Throughout the summit, NIWC Atlantic highlighted other creative acquisition tools as well, such as the culminating speed-round of its Palmetto Tech Bridge Prize Challenge rodeo totaling $200,000 in prize money.

More than 100 companies competed in NIWC Atlantic’s Palmetto Tech Bridge competition. Eight companies at the summit’s Innovation Pitch Jam would ultimately receive checks for their solutions in the areas of AI, Autonomy and LVC. The Pitch Jam portion of the prize challenge was a collaborative event of the CDCA that joined NIWC Atlantic, Naval Surface Warfare Center Crane and PEO Manpower, Logistics and Business.

This year, summit organizers also offered a bonus workshop for small businesses interested in the latest NAVSEA 25.1/A Small Business Innovation Research and Small Business Technology Transfer (SBIR/STTR) Topic Releases, which was hosted by the NIWC Atlantic Palmetto Tech Bridge. The next day, NIWC Atlantic’s first breakout session was a full rundown of the command’s small business goals.

Peter Woodhull, CDCA vice president and Eastern Defense Summit chair, called this year’s summit a resounding success.

“NIWC Atlantic played a significant role in that success,” he said. “The CDCA is proud of our continued partnership with NIWC Atlantic.”

About NIWC Atlantic

As a part of Naval Information Warfare Systems Command, NIWC Atlantic provides systems engineering and acquisition to deliver information warfare capabilities to the naval, joint and national warfighter through the acquisition, development, integration, production, test, deployment, and sustainment of interoperable command, control, communications, computer, intelligence, surveillance, and reconnaissance, cyber and information technology capabilities.