in ,

Boeing-Bell JV Secures $70M Navy Funds to Update MV-22 Aircraft Configuration

Boeing-Bell JV Secures $70M Navy Funds to Update MV-22 Aircraft Configuration - top government contractors - best government contracting event
https://executivebiz-media.s3.amazonaws.com/2022/08/19/30/9f/c3/a0/b7/6f/d4/64/Executive-Biz.png

Boeing-Bell JV Secures $70M Navy Funds to Update MV-22 Aircraft Configuration - top government contractors - best government contracting eventA joint venture of Bell Helicopter and Boeing has received a $69.6 million modification under a U.S. Navy contract to update the configuration of three MV-22 Osprey aircraft units.

Under the modification, the Bell-Boeing Joint Project Office will apply Block C upgrades to MV-22 aircraft as part of a common configuration-readiness and modernization effort for the V-22 fleet, the Defense Department said Tuesday.

The Navy will obligate the modification’s entire amount at the time of award from fiscal 2017 and fiscal 2018 aircraft procurement funds.

Bell-Boeing JPO will perform work at various locations in Pennsylvania, Texas and Utah, as well as in other various U.S.-based facilities.

Sign Up Now! ExecutiveBiz provides you with Daily Updates and News Briefings about Industry News

mm

Written by Nichols Martin

a staff writer at Executive Mosaic, produces articles on the federal government's technology and business interests. The coverage of these articles include government contracting, cybersecurity, information technology, health care and national security.

Frost & Sullivan: Space Industry Could See New Operators, 13K Satellite Launches by 2030 - top government contractors - best government contracting event
Frost & Sullivan: Space Industry Could See New Operators, 13K Satellite Launches by 2030
Robert Smith: Booz Allen to Help Safeguard US Ballistic Missile Defense System Through Cybersecurity Methods - top government contractors - best government contracting event
Robert Smith: Booz Allen to Help Safeguard US Ballistic Missile Defense System Through Cybersecurity Methods