Back to news

September 5, 2018 | International, C4ISR

DoD extends deadline for its $10B cloud contract

By:

The Pentagon has pushed back the response deadline for its $10 billion, single-award Joint Enterprise Defense Infrastructure cloud contract by nearly a month, according to an Aug. 31 FedBizOpps posting.

The Department of Defense made amendments to five documents associated with the contract, which, according to the new posting, were part of the consideration for moving the request for proposal due date to Oct. 9, rather than the previous Sept. 17 deadline.

In addition to the amended documents, the DoD released 59 industry comments and corresponding government answers about the first RFP amendment made Aug. 23.

The contract has already received industry protest prior to award, after many criticized the DoD's intent to award the contract to a single cloud provider. The due date for that protest, moved to Dec. 3 after an update was made, is still well beyond the new bidding deadline.

https://www.federaltimes.com/govcon/2018/09/04/dod-extends-deadline-for-its-10b-cloud-contract

On the same subject

  • ‘We need to be impatient’: Estonia’s No. 2 defense official dives into NATO priorities

    June 27, 2018 | International, Aerospace, Naval, Land, C4ISR

    ‘We need to be impatient’: Estonia’s No. 2 defense official dives into NATO priorities

    By: Aaron Mehta WASHINGTON ― As a border state with Russia, Estonia is well aware it is ground zero for any potential conflict between Moscow and NATO. The country is hitting the target of spending 2 percent of gross domestic product on defense, as requested by the alliance, and it is trying to modernize and build up its military capabilities. But like many nations in Europe, Estonia faces tough budgetary realities. Jonatan Vseviov, the permanent secretary of the Estonian Ministry of Defence, serves as the point man in directing those investments ― and per local news reports, he is on the short list to be the next ambassador to the United States. He talked to Defense News about those issues, as well as cyber challenges, during a June visit to Washington. I want to start with the big picture. Estonia is going to the summit in a couple of weeks. What are some of the priorities you are looking at? NATO is the cornerstone of our security. We expect a lot, not only from this summit but from NATO in general. NATO has been doing a lot of good work on defense and deterrence, bolstering up its presence in the Baltic states as well as in other regions in the eastern part of the alliance. I think that work needs to continue, and we expect a good number of decisions from the summit regarding the readiness of alliance forces, regarding reinforcement, the ability of the alliance to reinforce different regions. Obviously burden-sharing is going to be a key topic for NATO. We, as you might know, are one of the nations that contribute more than 2 percent of our GDP towards national defense. That is going to be a topic that will be discussed, I'm sure at length, at the summit. We are obviously aware of the fact that output is as important as input. And what I mean by that is that what you actually get for your defense dollars or euros is what, at the end of the day, matters. But there is no output without sufficient input. So both input and output are important. We need to be impatient. We need to ask for more and faster results. And we've been doing that for the past few years, and I think we are on the right track. One of the things that is expected to come out of the summit is standing up a new Atlantic Command. There's been a lot of talk about something along those lines for the Baltic. Where is Estonia on the idea of a Baltic command? And can it happen, given how NATO resources are always constrained? When it comes to, for instance, reinforcement, there are several key elements to that. One is the readiness of all forces. Military mobility, which has become a very famous topic, which is obviously crucially important not only for the Baltic states but for the alliance in general. Discussion on pre-positioning, for instance, as part of the overall military mobility issue. Planning and exercise: It's something that we often talk about in the context of defense and deterrence and then obviously also command structure. The NATO command structure has been and will be adapted to make it more fit for the time we're in right now. There is also NATO force structure, which is crucially important. We do expect to see a divisional level or two-star HQ that would concentrate on the Baltic states. Discussions are underway between us and the Latvians and Danes to set up what is known as a Multinational Division North to complement what Multinational Division North East in Poland is already doing, to complement what the NATO force structure in general, as well as the command structure, is doing. So I think our command structure needs to evolve as the challenges evolve, and as the forces that we have available for our defense evolve. I think we're on the right path; and the Multinational Division North ― not only is it necessary, it is also a decision that will come at a very, very right time. There are no silver bullets when it comes to security in general ― no silver bullets in policy and no silver bullets and capability. It's a complex picture, so we need to concentrate on alliance relationships. Part of your job is to figure out investments for the money you're spending ― the best way to build Estonian forces. What are some of the key investments that Estonia is making in the next couple years? And what are the areas that you're hoping to start investing in the next couple of years? Most of our procurement, a good portion of procurement, is relatively small stuff, but more than 20 percent [of defense spending] is major equipment. Some of the examples: We're mechanizing one of our battalions, which is a lengthy process. It started back in 2013 [and] will continue for the next few years. We are investing heavily in infrastructure not only for our own purposes but for the purposes of hosting allies. We are investing in ammunition. All of our acquisitions are targeted at making sure that we are not creating a hollow force. And the most important element of making sure that you don't have a hollow force is ammunition, whether you have it or you don't. So we're spending a lot out of our procurement budget on making sure that we actually have the ammunition for the weapon systems that we have in the armed forces. Self-propelled howitzers, one of the latest developments that we are about to procure together with Finland, which is a good example of a joint procurement. We spent a lot of money on intelligence early warning both within the military as well as within the civilian sector, and we're setting up a cyber command within the armed forces. We've been talking about cyber for a long time, we've been working on cyber. We are a very internet-dependent society, but only now are we creating a separate cyber command within the armed forces, so that will require additional investments. These are probably some of the key areas where we intend to spend our money on in the next few years. Since you mentioned it, let's talk cyber. If Estonia is known for anything worldwide, it might well be cyber capabilities. You're also home to the NATO Cooperative Cyber Defence Centre of Excellence. Where is NATO on cyber? Is it getting where it needs to be or lagging behind? How concerned should the allies be about where they stand on cyber? I think we should always be concerned when it comes to cyber, and this is a very fast, developing domain. During the summit in Warsaw, for instance, the heads of state and government declared cyber to be one of the domains in security. I think that was a very important decision. In theory, it could trigger Article 5 now. Well, there is a good level of what I would call “constructive ambiguity“ built into the wording of the Washington Treaty and also Article 5. So Article 5 is what we decide to be Article 5, and that is very useful. We don't want to give anybody a list of attacks that would trigger Article 5 because that would obviously mean that we automatically also create a list of potential attacks that would not trigger Article 5. Cyber is certainly a new domain. We are, I think, still scratching the surface of what it all means. It took us several years, perhaps even several decades, to think through, for instance, the air domain after airplanes arrived on the horizon and were used in major conflicts. We still didn't have an air force until, in most cases, in the late 1940s or 1950s. So it will take us time to figure out how best to operate, how best to organize ourselves in the cyber domain. What is certain, though, is that the government alone cannot defend the cyber society, if you will. And will require not only a whole-of-government but really a whole-of-society approach. And secondly, obviously, the physical borders do not matter in cyber. So national initiatives are important, but they are nothing if there is no international component to our efforts. So figuring out all of this, thinking through the legal aspects, the policy aspects, is one of the things that the center of excellence in Tallinn does. We're certain that we are again on the right path, in both NATO and the European Union, but I think it will take time for us to fully comprehend the best way to operate in this new domain. But how well, in your estimation, are the NATO allies integrating with cyber? I think there's still a long way to go. Cyber tends to be a very sensitive area for obvious reasons, oftentimes also harnessed within intelligence organizations. But we're making progress. There is more sharing, information sharing in NATO as well as between allies bilaterally, than there was a few years ago. So I think people are realizing that we need international cooperation; and without international cooperation, we simply cannot succeed in this new domain. https://www.defensenews.com/smr/nato-priorities/2018/06/26/we-need-to-be-impatient-estonias-no-2-defense-official-dives-into-nato-priorities/

  • How the intel community could use machines and AI

    January 30, 2019 | International, C4ISR

    How the intel community could use machines and AI

    By: Mark Pomerleau The intelligence community has unveiled its multi-pronged plan to compete in the increasingly digital and data-centric world. The strategy, titled “Augmenting Intelligence using Machines (AIM)” and released Jan. 16, outlines how the intelligence community will adjust its investments, personnel and practices to better incorporate associated technologies “To meet its vision of ensuring intelligence advantage, the IC must adapt to the rapid global technological democratization in sensing, communications, computing, and machine analysis of data,” Sue Gordon, principal deputy director of national intelligence, said in the document. “These trends threaten to erode what were previously unique [IC] capabilities and advantages; going forward, we must improve our ability to analyze and draw conclusions from IC-wide data collections at scale.” During remarks at an August 2018 conference, Gordon said she wants the strategy to help focus on what the IC is trying to achieve rather than the technologies that they use.She described the need for getting machines as partners to help derive intelligence as one of the two most existential threats facing the community. The strategy lists four primary investment objectives ranked chronologically. They include: - Immediate and ongoing needs: Creating digital foundations, data and science and technical intelligence. - Short-term needs: Adopting commercial and open source narrow AI solutions, which are AI solutions that are designed with very specific tasks and functions. - Medium-term needs: Make investments in the gaps such as AI assurance and multimodal AI. - Long-term needs: Make investments in basic research focused on sense-making. The strategy notes that the “IC must be willing to rethink or abandon processes and mechanisms designed for an earlier era, establish disciplined engineering and operations practices, and maintain an absolute focus on assuring advantage in an intensely competitive global adversarial environment.” However, it also warns that artificial intelligence and associated technologies are not a panacea or a substitute for creating a digital foundation. Instead, the intelligence community must understand how AI algorithms may succeed and fail. The strategy also aims to bring together disparate efforts in artificial intelligence, process automation, and IC officer augmentation as a way to match investments in AI and data from other countries. One example includes the use of such technologies to create forgeries of audio and video, often referred to as deepfakes, which could lead to difficulties in deciphering fact from fiction. Gordon said in August that the National Geospatial-Intelligence Agency is using AI to automate image processing and the National Reconnaissance Office is using artificial intelligence tools to automate analysis of streaming multi-intelligence data for detecting activity and automating tasks of scarce and expensive collection resources. The strategy also focuses on the workforce. It notes that it is much more than technology and implementing the strategy will entail addressing workforce challenges and understanding and shaping the policies and authorities governing how the IC deploys and uses AI. https://www.c4isrnet.com/c2-comms/2019/01/28/how-the-intel-community-could-use-machines-and-ai

  • Cyberattack risk poses biggest threat to airports, aviation

    September 12, 2018 | International, C4ISR

    Cyberattack risk poses biggest threat to airports, aviation

    Ben Goldstein A senior official from Tampa International Airport (TPA) told US lawmakers the risk of cyberattack “without question represents the preeminent and persistent threat” to global aviation. The comments came during a Sept. 6 joint hearing of the House Homeland Security Committee's Cybersecurity and Transportation Security subcommittees, held to examine cyber threats to aviation. “In today's modern and technologically advanced airports, there are virtually no areas or functions that do not rely at some level on a digital network,” TPA EVP-IT and general counsel Michael Stephens said. “The operational importance of these systems ... makes airports immensely appealing targets and potentially vulnerable to malicious cyber threats, such as criminal organizations and state sponsored actors.” In his testimony, Stephens said US airports have reached a point “where voluntary compliance is no longer adequate,” and asked lawmakers to consider mandating the adoption of “uniform minimum cyber security standards and frameworks.” He also said the “human factor remains the most highly exploited vector” for breaching cyber defenses, and threat awareness and information security training programs for airport, airlines and aviation industry employees are “perhaps one of the most effective and cost-efficient ways of increasing airports' and airlines' cybersecurity readiness.” Lawmakers also heard from Christopher Porter, chief intelligence strategist at cybersecurity group FireEye, Inc., who testified that state-backed hackers are “routinely” targeting the US aviation industry through cyberespionage to steal industrial secrets from manufacturers, researchers and operators of military and civilian aircraft. Porter called cyberespionage the “most common cyber threat facing the aviation industry,” and said that hackers sponsored by China, Russia and more recently Iran have all “targeted the US or its close allies for theft of aviation secrets.” All three countries also routinely target ticketing and traveler data, shipping schedules and even partner industries like railways or hotels as part of their counterintelligence efforts, Porter added. However, Porter reminded lawmakers that, because cyber-espionage is routine, “it should not be viewed as destabilizing.” “When cyberespionage operators get a foothold on a system, they can often use that access for stealing information or to launch a disabling or destructive attack using the same technology,” Porter said. “But they rarely choose to do so, and in the US, there are significant redundancies in place to ensure safety. A crashed IT system does not mean a crashed plane, and it's important for the public to keep that in mind.” http://atwonline.com/security/cyberattack-risk-poses-biggest-threat-airports-aviation

All news