Defense News: Navy’s Third Operational F-35C Lightning II Squadron Achieves Safe For Flight Certification

Source: United States Navy

The F-35C enhances the carrier strike group’s ability to project power, supporting U.S. national security and integrating seamlessly with other carrier air wing assets.

“I couldn’t be more proud of the Winder Team for this achievement,” said Cmdr. Nathan Staples, VFA-86 Commanding Officer. “Our team has excelled since the transition began in February 2023, and I look forward to our future achievements and the standards we set for the Lightning II community.”

The squadron’s transition from the F/A-18E Super Hornet, flown for 36 years, began in September 2023. Nearly 200 personnel completed training at Eglin AFB, Fla., and NAS Lemoore, while nine pilots finished their flight syllabus with VFA-125, the Navy’s F-35C Fleet Replacement Squadron, while simultaneously executing tactical training events with Naval Aviation Warfighting Development Center and TOPGUN.

After achieving several key milestones, including a perfect score on the Conventional Weapons Technical Proficiency Inspection and the highest Maintenance Program Assist inspection score, VFA-86 earned Interim Safe for Flight certification in June 2024. In July, they conducted their first embarked operations aboard USS Nimitz (CVN 68), culminating in Full Safe for Flight certification.

“Our success is due to proactive management, engaged leadership, and a can-do attitude,” said AFCM Rich Brickey, VFA-86 Maintenance Master Chief. “Our Sailors have excelled in every metric and will continue to do so whenever called upon.”

Established in 1951, VFA-86 has flown nine different aircraft and supported combat operations in Vietnam, Bosnia, Iraq, Afghanistan, and Syria. As the Navy’s newest F-35C squadron, the Sidewinders remain committed to their motto: “When diplomacy fails… 86 ’em!”

Defense News: Navy Warfare Center Drives First Over-the-Horizon Install, Naval Strike Missile Launch Demonstration From Destroyer

Source: United States Navy

PORT HUENEME, California – Among the flurry of fleet activities in the recent Rim of the Pacific (RIMPAC) exercise in Hawaii was a milestone that Naval Surface Warfare Center, Port Hueneme Division (NSWC PHD) spearheaded — the first demonstration firing of a Naval Strike Missile (NSM) from a U.S. Navy destroyer.

Working under a compressed timeline, NSWC PHD and its partners installed the first Over-the-Horizon (OTH) Weapon System on a destroyer, USS Fitzgerald (DDG 62), in time for it to launch an NSM at a decommissioned ship on July 18 during RIMPAC.

Other major players in the effort included Program Executive Office Integrated Warfare Systems (PEO IWS) 3H, Naval Air Warfare Center Weapons Division (NAWCWD) China Lake, General Dynamics Mission Systems and Kongsberg Defence & Aerospace AS.

“This was a high-visibility requirement for the Navy,” said Eric Romero, customer advocate for OTH with NSWC PHD in Port Hueneme, California.

OTH is a long-range surface-to-surface warfare system that launches NSMs, which are anti-ship guided missiles. The Navy has added the system to about a dozen Independence-variant littoral combat ships over the past five years.

In late September 2023, the Office of the Chief of Naval Operations challenged PEO IWS, which in turn tasked NSWC PHD, with installing an OTH on Arleigh Burke-class destroyer USS Fitzgerald in time to demonstrate it at RIMPAC 2024. That left only about nine months before the biennial international fleet exercise.

“We knew we were working on an aggressive schedule, but we had all the right personnel on the team to make sure we were successful in executing it,” Romero said.

NSWC PHD employees took on various projects to pull off the endeavor at this accelerated pace, from developing ship installation drawings to getting cybersecurity approval to installing and testing the equipment.

The overall effort encompassed nearly 20 organizations, including five program offices, four warfare centers and a dozen external entities, according to Todd Jenkins, platform integration lead with NSWC PHD in San Diego.

“We were expecting a great deal of roadblocks due to the compressed timeline, but everyone came together to accomplish this monumental event,” Jenkins said.

Typically, this type of first-of-class installation takes at least two years, according to Robert “Tony” Honeycutt, Alteration Installation Team manager at NSWC PHD’s Virginia Beach Detachment in Virginia. A key factor in speeding up the process was proposing the OTH as a temporary change to USS Fitzgerald, which reduced the requirements for documentation and drawings compared to a permanent change.

Beyond streamlining the paperwork, Honeycutt and Jenkins met frequently with stakeholders from PEO IWS 3H and NAWCWD China Lake to overcome obstacles and stay on schedule.

“Basically, we were just driving it as hard as we could,” Honeycutt said. “As soon as we ran into a problem, we had a group powwow and figured out the solution.”

Another task that the team sped up was securing the cybersecurity accreditation known as authority to operate (ATO) for the OTH software that would be installed on the ship. The rigorous six-step process typically takes about a year, but in this case it had to be completed much quicker so the installation could start.

“We had to do the cyber ATO in two months,” Romero said.

The team installed the OTH on USS Fitzgerald at Naval Base San Diego from mid-March to late May. The main components of the system are the launcher and an operator interface console. To make it compatible with the destroyer, the system also required a navigation adapter.

After installing the OTH, NSWC PHD trained crew members and helped them test the system while underway.

“We made sure they were trained up, such as to be self-sustaining as operators,” Romero said.

In Hawaii for RIMPAC in July, USS Fitzgerald participated with other ships and aircraft in a sinking exercise, known as a SINKEX. The target was a decommissioned amphibious ship about 50 nautical miles off the coast of Kauai.

With NSWC PHD team members monitoring remotely, USS Fitzgerald launched its first NSM from the OTH. The NSM successfully searched the target area, detected and prosecuted the target.

“It was a successful NSM live-fire shot launched from the OTH Weapon System,” Romero said.

Following the inaugural firing at RIMPAC, NSWC PHD personnel will help prepare USS Fitzgerald to go on deployment with the OTH.

While the new weapon system is still authorized as a temporary installation on USS Fitzgerald, the team is working to secure approval for it to stay on the ship indefinitely.

“We’re migrating the ship change document to a permanent change, as we want to keep the system aboard DDG 62,” Romero said.

The work done on DDG 62 will help inform the way forward on providing this capability to other DDGs.

Defense News: From the Streets to the Fleet: How Navy Training Transformed a Philadelphia Native’s Life

Source: United States Navy

“Growing up, I knew I wanted more,” Segarra recalled. “Where I come from, people don’t usually make it out. The Navy was my way out and my way forward, and joining was a decision that truly saved my life.”

As he approaches 10 years of Navy service, Segarra is the Systems Administration Course supervisor and leading petty officer at Information Warfare Training Command (IWTC) San Diego, a position that allows him to mentor young Sailors who might come from similar backgrounds. He also dedicates his free time to being an active father to his daughter and providing her with a caring childhood.

Turning a New Page with NETC

Segarra’s story is a testament to how Naval Education and Training Command (NETC) has the power to set Sailors on a new course. Through NETC’s robust training programs, Sailors like Segarra receive not only technical skills but also the discipline and support they need to change their lives. For Segarra, his first encounter with NETC came during boot camp at Recruit Training Command (RTC), an experience that he describes as transformative.

“Boot camp was the first time in my life that I experienced real silence,” he said. “Coming from a neighborhood where sirens and gunshots were constant, it was powerful to be in a place where I could focus and grow. That’s when I realized I was becoming part of something bigger than myself.”

From RTC, Segarra moved on to Information Technician “A” School, where he faced the challenge of intense coursework. He credits his instructor, Chief Information Systems Technician Kelley Torranto, for believing in him and pushing him to succeed.

“Chief Torranto was the first person outside of my uncle who truly believed in me,” he reflected. “She kept pushing me, even when I felt like giving up. I still have the challenge coin she gave me after I graduated—it reminds me every day of what I’ve overcome.”

A Career Defined by Service and Mentorship

Since those early days, Segarra’s career has been marked by rapid advancement and recognition. He served at the Naval Communications Security Material System in Washington, D.C., where he quickly advanced in rank, and earned titles like Bluejacket of the Year and Junior Sailor of the Year. Later, while serving aboard littoral combat ships, Segarra deployed on pioneering missions, including counter-drug operations in the U.S. 4th Fleet area of responsibility.

Now, as an instructor at IWTC San Diego, Segarra focuses on preparing the next generation of Navy information warriors. He shares his background with new Sailors, especially those from difficult upbringings, offering hope and encouragement as someone who understands their challenges.

“I’ve been where they are, and I know what it’s like to think there’s no way out,” he said. “My goal is to help them see what’s possible with hard work and commitment.”

The Impact of NETC Training

Segarra’s story highlights the strengths of NETC’s training programs, which combine technical instruction with personal mentorship to create well-rounded, fleet-ready Sailors. He emphasizes that NETC’s focus on real-world skills and fleet-relevant training helps Sailors gain confidence and expertise.

“NETC isn’t just about teaching us the basics,” he explained. “It’s about setting us up for success, both on and off the ship. The Navy has given me stability, purpose and the ability to give my daughter a life I never had. For me, that’s worth everything.”

Looking Ahead

As he continues his Navy career, Segarra remains deeply grateful for the opportunities and experiences that have shaped his journey. He looks forward to furthering his career in the Navy and using the skills and values he has gained to inspire others.

“My peers sometimes joke about how motivated I am, but they don’t realize how much I feel indebted to the Navy for giving me this second chance,” Segarra said. “Thanks to the Navy, I can be the dad I always wanted to be, and I can provide a better future for my family. That’s something I never take for granted.”

Conclusion

Segarra’s story is a powerful reminder of how the Navy and NETC’s training programs can transform lives. From the streets of Philadelphia to his current role at IWTC San Diego, Segarra’s journey is a testament to resilience, dedication and the life-changing impact of military service. Through his continued work, he helps shape the next generation of Sailors, showing them that, with hard work and determination, they too can achieve their dreams.

For more information on how NETC prepares Sailors for success in the fleet, visit https://www.netc.navy.mil/.

Florida Man Pleads Guilty to Tax Evasion

Source: United States Department of Justice Criminal Division

A Florida man pleaded guilty today to evading the payment of more than $1.7 million he owed for tax years 2004 through 2014.

According to court documents and statements made in court, David Albert Fletcher, of Deltona, owned and operated several furniture liquidations businesses in Florida, including Century Liquidators. For tax years 2004 through 2013, Fletcher did not timely file his federal income tax returns or pay taxes. After an audit, the IRS assessed a total of $1.7 million in taxes, interest and penalties against him.

To evade collection of these taxes, Fletcher concealed his income and assets from the IRS. For example, Fletcher used nominees to hide his purchases of luxury vehicles, including Rolls Royces. Fletcher also filed false income tax returns that understated his income and when interviewed by an IRS special agent, falsely represented the amount of income he earned.

A sentencing hearing will be set at a later date. Fletcher faces a maximum penalty of five years in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

Acting Deputy Assistant Attorney General Stuart M. Goldberg of the Justice Department’s Tax Division and U.S. Attorney Roger B. Handberg for the Middle District of Florida made the announcement.

IRS Criminal Investigation investigated the case.

Trial Attorney Zachary A. Cobb and Charles A. O’Reilly of the Justice Department’s Tax Division and Assistant U.S. Attorney Sarah Megan Testerman for the Middle District of Florida are prosecuting the case.

The Pennsylvania State University Agrees to Pay $1.25M to Resolve False Claims Act Allegations Relating to Non-Compliance with Contractual Cybersecurity Requirements

Source: United States Department of Justice Criminal Division

The Pennsylvania State University (Penn State), located in University Park, Pennsylvania, has agreed to pay $1,250,000 to resolve allegations that it violated the False Claims Act by failing to comply with cybersecurity requirements in fifteen contracts or subcontracts involving the Department of Defense (DoD) or National Aeronautics and Space Administration (NASA).

The settlement resolves allegations that, between 2018 and 2023, Penn State failed to implement cybersecurity controls that were contractually required by DoD and NASA and did not adequately develop and implement plans of action to correct deficiencies it identified. DoD requires contractors to submit summary level scores reflecting the status of their compliance with applicable cybersecurity requirements on covered contracting systems used to store or access covered defense information. The United States alleged that Penn State submitted cybersecurity assessment scores to DoD that reflected it had not implemented certain controls, but misrepresented the dates by which it would implement them and did not pursue plans of action to do so. The United States also alleged that in performing certain of the contracts and subcontracts Penn State did not use an external cloud service provider that met DoD’s security requirements for covered defense information.

“Universities that receive federal funding must take their cybersecurity obligations seriously,” said Principal Deputy Assistant Attorney General Brian M. Boynton, head of the Justice Department’s Civil Division. “We will continue our efforts under the department’s Civil Cyber-Fraud Initiative to hold contractors accountable when they fail to honor cybersecurity requirements designed to protect government information.”

“Federal contractors who store or access covered defense information must take required steps to protect that sensitive information from bad actors,” said U.S. Jacqueline C. Romero for the Eastern District of Pennsylvania. “When they fail to meet their cybersecurity obligations, we and our law enforcement partners will use every available tool to remedy the situation.”

“As our cyber adversaries become increasingly sophisticated, the importance of cybersecurity in safeguarding Department of Defense research, development and acquisitions information cannot be overstated,” said Special Agent in Charge Greg Gross of the Naval Criminal Investigative Service Economic Crimes Field Office. “NCIS, along with our federal partners, are committed to investigating entities who fail to implement contractual requirements designed to protect Department of the Navy critical information.”

“Protecting the integrity of Department of Defense procurement activities is a top priority for the DoD Office of Inspector General’s Defense Criminal Investigative Service (DCIS),” said Special Agent in Charge Patrick J. Hegarty of the DCIS Northeast Field Office. “Failing to comply with DoD contract specifications and cybersecurity requirements puts DoD information and programs at risk.  We will continue to work with our law enforcement partners and the Department of Justice to investigate allegations of false claims on DoD contracts.”

“Safeguarding sensitive NASA and DoD data is crucial to ensuring that it does not fall into the hands of our adversaries or bad actors,” said Assistant Inspector General for Investigations Robert Steinau of NASA’s Office of Inspector General (NASA-OIG). “The University’s inability to adequately address known deficiencies not only put sensitive information at risk but also undermined the integrity of our government’s cybersecurity efforts. We remain committed to holding entities accountable when they fail to meet critical security standards, as demonstrated by this case.”

On Oct. 6, 2021, Deputy Attorney General Lisa Monaco announced the department’s Civil Cyber-Fraud Initiative, which aims to hold accountable entities or individuals that put sensitive information at risk by knowingly providing deficient cybersecurity products or services, knowingly misrepresenting their cybersecurity practices or protocols, or knowingly violating obligations to monitor and report cybersecurity incidents. Information on how to report cyberfraud can be found here.

The settlement resolves a lawsuit filed under the whistleblower provisions of the False Claims Act, which permit private parties to sue on behalf of the government when they believe that a defendant has submitted false claims for government funds and receive a share of any recovery. The settlement in this case provides for the whistleblower, Matthew Decker, the former chief information officer for Penn State’s Applied Research Laboratory, to receive a $250,000 share of the settlement amount. The qui tam case is captioned U.S. ex rel. Decker v. Pennsylvania State University, No. 2:22-cv-03895 (E.D. Pa.).

The resolution obtained in this matter was the result of a coordinated effort between the Civil Division’s Commercial Litigation Branch, Fraud Section, and the U.S. Attorney’s Office for the Eastern District of Pennsylvania, with assistance from NCIS, NASA-OIG, DCIS, Army Criminal Investigation Division, Naval Audit Service, the Defense Contract Management Agency’s Defense Industrial Base Cybersecurity Assessment Center and the Air Force Material Command.

Senior Trial Counsel Kimberly Friday and former Trial Attorney Melanie D. Hendry of the Justice Department’s Civil Division and Assistant U.S. Attorneys Peter Carr and Rebecca S. Melley for the Eastern District of Pennsylvania handled the case.  

The claims resolved by the settlement are allegations only. There has been no determination of liability.

Settlement