Back to news

June 8, 2020 | International, C4ISR, Security

GAO Chides DoD For Absence Of Cybersecurity Requirements

Overall, costs of major DoD acquisition programs have grown by 54 percent over their lifetimes and schedule delays average two years, GAO's annual report finds.

By

WASHINGTON: Five years after the Pentagon demanded every weapon system include the requirement that it be able to fight through Russian and Chinese cyber attacks expected on future battlefields, DoD “does not often include cybersecurity” in key performance parameters (KPP) for major programs, says GAO in its annual defense acquisition review.

Of the three services, the Air Force is the worst at fulfilling two of the three best cybersecurity practices, the report says. The congressional watchdog found “inconsistent implementation of leading software practices and cybersecurity measures” among high-dollar “major defense acquisition programs” (MDAPs) — 85 programs worth $1.80 trillion at the end of 2019.

“This included longer-than-expected delivery times for software and delays completing cybersecurity assessments— outcomes disruptive to DOD's efforts to keep pace with warfighters' needs for enhanced, software-dependent capabilities and protect weapon systems from increasingly sophisticated cybersecurity threats,” GAO said in the June 3 report.

Cybersecurity KPPs Left Out

The GAO report explains that KPP “are considered the most critical requirements by the sponsor military organization, while key system attributes (KSA) and other performance attributes are considered essential for an effective military capability.” In 2015, DOD modified its main requirements policy—the Joint Capabilities Integration and Development System Manual (JCIDS) rules on “survivability” requirements to include the ability to operate in a “degraded cyber environment.”

Yet, GAO found that, at the end of 2019, 25 of the 42 major acquisition programs reviewed regarding cybersecurity practices failed to include cybersecurity as a parameter in their KPPs; “even more programs reported that their KSAs did not address cybersecurity.”

GAO has targeted cybersecurity, software development and DoD-wide information technology (IT) improvement programs in its recent annual reviews because DoD weapon systems “are more networked than ever before — a change that while providing benefits for the warfighter also “has come at a cost” because “more weapon components can now be attacked using cybersecurity capabilities,” GAO explains. “Further, networks can be used as a pathway to attack other systems.”

The watchdog has found consistently that failing to bake in cybersecurity requirements to system design and development ends up costing more money and time when program offices struggle to re-engineer systems once they hit production. This is a problem that affects most types of software development; and similarly trying to upgrade or replace software to improve cybersecurity often proves impossible.

The 2019 report thus “looked at DOD's progress with developing:

  • (1) strategies that help ensure that programs are planning for and documenting cybersecurity risk management efforts (cybersecurity strategies),
  • (2) evaluations that allow testers to identify systems' weaknesses that are susceptible to cybersecurity attacks and that could potentially jeopardize mission execution (cybersecurity vulnerability evaluations), and
  • (3) assessments that evaluate the ability of a unit equipped with a system to support assigned missions (cybersecurity assessments).”

Most of the 38 MDAPs reviewed reported creation of cybersecurity strategies. However, of the 19 major programs that require cybersecurity vulnerability evaluations — under regulations set by the Office of the Undersecretary of Defense for Acquisition and Sustainment Ellen Lord — 11 have not completed them or failed to do so on time. Another three said they didn't have a schedule yet for doing so; and one — an unnamed Air Force program — told GAO it actually didn't know if it had undertaken the required evaluation. Indeed, the Air Force had the worst record on the evaluations, with none of its six programs having completed the evaluation processes.

Of the 42 programs, 14 told GAO they had not finished their cybersecurity assessments. GAO also “found variation among the military departments in the rates they had completed these assessments. Specifically, among the three military departments, the Army reported the best rate for programs conducting cybersecurity assessments, while the Air Force had the lowest rate.”

IT and Software Problems Plague Programs

“Over the years, weapon acquisition program officials, through their responses to our questionnaires, have consistently acknowledged software development as a risk item in their efforts to develop and field capabilities to the warfighter, and this year is no different,” GAO reported somewhat wryly.

GAO found that more than a quarter of the 42 MDAPs reviewed reported cost growth from software changes but admitted that “details
are limited” in DoD reporting.

Part of that uncertainty might be due to the fact that GAO found a number of major programs are transitioning to commercial approaches to software development, such as “agile development” that involves introducing incremental improvements over time. However, GAO found, “deliveries often lag
behind industry standards.”

Indeed, Air Force acquisition czar Will Roper told a webinar yesterday sponsored by Dcode, a tech innovation hub connecting commercial industry to government agencies, that while the Air Force can't go back and re-do old programs, “every new contract we do has to include DevSecOps.”

“We are all in,” he added, “it's going to change the world.”

DevSecOps stands for “development, security and operations,” and is a framework and tools for “designing in” software and cybersecurity. Roper long has been a key champion within DoD for moving to commercial practices and has repeatedly said he wants the Air Force to become a “software company.”

GAO said that officials from 26 of the MDAPs regarding software development reported that software concerns had created risks at some point during their program's history.

The biggest problem faced was — you guessed it — changes necessitated to ensure cybersecurity. The second biggest program was that the software development simply was “more difficult than expected.” Hardware design changes also played a big role in creating software problems, requiring subsequent changes in software configurations.

Interestingly, while often bemoaned as a cause for program delays, requirements changes came in at the low of end of the reported issues troubling software development.

Of the 15 major DoD IT programs reviewed, worth $15.1 million, 10 had delays in their original baseline schedules. But on the bright side, 11 showed decreased life cycle cost estimates.

Further, all 15 have cybersecurity strategies as required by DoD regulations, and most reported having undertaken in 2019 at least one operational cybersecurity test.

That said, “less than half reported conducting developmental cybersecurity testing,” GAO found. And according to DoD's own “Cybersecurity Testing and Evaluation Guidebook,” GAO scolds, “not conducting developmental cybersecurity testing puts programs at an increased risk of cost and schedule growth and poor program performance.

Cost and Schedule Growth Stabilizes

As it does every year, GAO also reviewed all 85 MDAPs for cost and schedule growth, and on that front the news is good: GAO found that the programs DoD Overview “have generally stabilized non-quantity related — (i.e. meaning not related to buy more stuff) — cost growth and schedule growth.”

“Between 2018 and 2019, total acquisition cost estimates for DoD's 85 current MDAPs grew by a combined $64 billion (a 4 percent increase), growth that was driven by decisions to increase planned quantities of some weapon systems,” GAO found. “For example, DoD more than doubled in the past year the total number of missiles it plans to acquire through the Air Force's Joint Air-to-Surface Standoff Missile program.”

And some programs actually lowered their year-average costs. GAO found that 55 MDAPs (more than half) “had lower average procurement unit costs since last year. Examples of programs with lower unit costs include the Navy's Joint Precision Approach and Landing System (16 percent decrease) and the Air Force's F-22 Increment 3.2B Modernization (15 percent decrease).”

“Also between 2018 and 2019, capability delivery schedules for MDAPs increased, on average, by just over 1 month (a 1 percent increase),” GAO said.

However, the report cautioned that cost/schedule performance looks “less encouraging as measured against their original approved program baselines.”

The report found that the major acquisition programs “have accumulated over $628 billion (or 54%) in total cost growth since program start, most of which is unrelated to the increase in quantities purchased. Additionally, over the same time period, time required to deliver initial capabilities has increased by 30%, resulting in an average delay of more than two years.

https://breakingdefense.com/2020/06/major-dod-acquisition-programs-flounder-on-cybersecurity-gao

On the same subject

  • US Air Force launches contest to replace the B-52 bomber’s engine

    May 21, 2020 | International, Aerospace

    US Air Force launches contest to replace the B-52 bomber’s engine

    By: Valerie Insinna   15 hours ago WASHINGTON — General Electric, Rolls-Royce, and Pratt & Whitney will compete for the chance to outfit the U.S. Air Force's B-52 bomber fleet with new engines, with a contract award projected for June 2021. The Air Force released a request for proposals for the B-52 Commercial Engine Replacement Program to the three companies on May 19. The engine makers are already under contract to create digital prototypes, and they have until July 22 to submit final proposals, the solicitation stated. The Air Force operates 76 B-52s, each outfitted with eight TF33 engines. The service plans to order 608 new engines, plus spares and support, from the winner of the competition. The public version of the RFP obscures the estimated value of the program, which is projected to extend from 2021 to 2035. Pratt & Whitney, which manufactured the TF33 currently onboard the B-52, has stated it will propose the PW800. “Its industry-leading reliability, robust sustainment infrastructure, and significant fuel efficiency savings will greatly improve the legendary bomber and keep it flying for decades to come,” said Chris Johnson, Pratt & Whitney's executive director for mobility and diverse engine programs. "Our unique experience with the B-52, coupled with our expertise integrating commercial engines onto military applications, will deliver a low-risk, high-performance engine to power the Stratofortress fleet through 2050.” GE Aviation will put forward the CF34-10 and Passport engines, spokesman David Wilson said. “GE is the only company to have been involved in re-engining U.S. Air Force aircraft three times over,” he said. “Add in our deep experience powering six strategic bombers, entrenched support of air combat and the reverence we have for the role we play in protecting this country, and GE is the clear partner to ensure the B-52 is ready at all times for mission critical.” Rolls-Royce intends to offer its F130 engine, the company confirmed. “Rolls-Royce is excited to move to the proposal stage of the campaign and ready to demonstrate that the Rolls-Royce F130 engine is the perfect fit for the B-52,” Craig McVay, senior vice president for Rolls-Royce Defense, said in a statement. “The F130 is a highly reliable and proven engine which is already in commercial production. Our team is focused and energized, and eager to compete for the B-52 Commercial Engine Replacement Program and provide the best possible solution for the U.S. Air Force and the key missions of the B-52 weapon system.” The Air Force plans to operate the B-52 into the 2050s and sees new commercial engines as a way to reduce fuel burn and the time it takes to maintain the bomber. Last year, B-52 maintainers at Barksdale Air Force Base, Louisiana, told Defense News that modern engines would make it easier for crews to diagnose problems and make needed repairs. “I would like to know if I need to take that aircraft down out of the schedule and give it a new engine ahead of time,” said Lt. Col. Tiffany Arnold, 2nd Maintenance Squadron commander. “We could prioritize, we could understand the patterns of the engines in a way that we could maintain them better. And hopefully the new motor, whoever designs it, will have a shorter mean time between failure, and we can fly them longer.” https://www.defensenews.com/air/2020/05/20/the-air-force-launches-a-contest-to-replace-the-b-52s-engine/

  • DARPA Announces ERI Summit 2019 Workshops

    June 3, 2019 | International, C4ISR, Other Defence

    DARPA Announces ERI Summit 2019 Workshops

    For the second year in a row, DARPA is convening the electronics community to discuss the ambitions and achievements of its five-year, upwards of $1.5 billion investment in U.S. microelectronics advancement. Attendees at the second annual Electronics Resurgence Initiative (ERI) Summit – being held July 15-17 in Detroit, Michigan – will hear from commercial and defense leaders as they share their insights on the domestic semiconductor industry and the applications driving next-generation electronics. The Summit will close on July 17 with 11 public workshops designed to demonstrate program accomplishments, shape future areas of research, and provide insights into working with DARPA as well as transitioning technologies to use. “Continued collaboration across industry, defense, and academia is critical to creating the next wave of microelectronics innovation,” said Dr. Mark Rosker, director of DARPA's Microsystems Technology Office (MTO). “Last year's Summit allowed these groups to come together and collectively work towards creating a more specialized, secure, heavily automated, and DoD-available electronics industry. This collaboration contributed to the formation of six new DARPA programs. With this year's expanded roster of workshops, we are again asking the community to share their perspectives, provide guidance, and foster the connections that will help define the future of an innovative and competitive domestic electronics enterprise.” In areas ranging from security and privacy to rapid circuit design, ERI's programs are already working to address both commercial and manufacturing realities as well as the needs of the defense enterprise. Several “Ongoing Efforts” workshops will provide updates on these active research efforts, including presentations on secure hardware and software architectures for high-risk transactions; trusted-by-design components and their impact on supply chain security; and novel atomic clock architectures. Attendees will also experience live demonstrations of autonomous chip design tools as well as open source IP and verification technology in development on two ERI programs – IDEA and POSH. Both programs are addressing the complexity and cost barriers that have limited the competitive field for circuit design by exploring novel approaches to automated circuit design and IP sharing. Shaping the future of microelectronics innovation requires research and development across a vast number of technical areas and applications. Several “Emerging Concepts” workshops will explore potential future areas of investment, and will seek input from the community to help define the most critical challenges to address. These workshops will focus on enhanced security for commercial hardware; energy-efficient computing for distributed machine intelligence; and novel approaches to designing and verifying distributed systems. A four-hour workshop will also focus on the challenges facing heterogeneous integration – a critical area of exploration for an emerging wave of alternatives to traditional transistor scaling. The workshop will cover problems associated with dense digital integration and mixing silicon with compound semiconductors, as well as potential solutions and paths forward. Finally, two “Enhancing Collaboration” workshops will provide guidance to attendees who are new to working with DARPA or are interested in transitioning DARPA-funded inventions out of the lab and into the commercial world. During the “DARPA/MTO Collaboration 101” workshop, Rosker will provide both a history of the agency and information about how to work with DARPA in the future. The deadline to register for the ERI Summit is Monday, June 24, 2019 at 11:59 PM EST. Registration information as well as a full agenda and workshop descriptions are available at www.eri-summit.com. All attendees must register in advance. Workshop headcount limits will be pre-determined based on attendee interest. https://www.darpa.mil/news-events/2019-05-31

  • Trump signs defense spending plan, with one more swipe at Democrats

    October 1, 2018 | International, Aerospace, Naval, Land, C4ISR, Security

    Trump signs defense spending plan, with one more swipe at Democrats

    By: Leo Shane III WASHINGTON — President Donald Trump finalized an $854 billion spending bill on Friday that fully funds the military for fiscal 2019 and prevents a government shutdown next week, accomplishments that congressional leaders have called important and laudable. But Trump's signature came with one final attack on Democrats over the spending measure, lamenting lawmakers' decision not to include extra money in the appropriations package for his planned wall along the southern U.S. border. “Unfortunately, the radical Democrats refuse to support border security and want drugs and crime to pour into our country,” he said in a statement after signing the bill. The comments came just a week after Trump took to social media to blast “this ridiculous Spending Bill,” raising fears of a presidential veto on Capitol Hill. Instead, Trump largely praised the measure on Friday, calling it “important legislation to rebuild our military” and promote other domestic priorities. The appropriations measure includes $674 billion in defense funding for fiscal 2019, and marks the first time in a decade Congress has finalized the spending measure before the start of the new fiscal year. The measure funds a 2.6 percent pay raise for troops starting next January and a boost in military end strength of 16,400 spread across the active-duty and reserve forces. Trump, in his statement, praised the measure for including “93 new F-35 Lightning Joint Strike Fighters, 142 Apache and Black Hawk helicopters, and 13 Navy battle force ships — made right here in the USA.” In a statement after the signing, House Armed Services Committee Chairman Mac Thornberry, R-Texas, praised the president for pushing for the funding increases in his budget request and past public statements. “By funding our military in full and on time, we can begin to restore its strength, agility, and effectiveness,” he said. “As I have said before, the task before us now is to make full, on time funding of our military the rule in Washington, and not the exception.” The spending bill also includes full-year funding for the departments of Health and Human Services, Education and Labor, as well as bridge funding for a handful of other government agencies to keep them operational through Dec. 7. Last week, Trump signed into law a separate package that included full-year funding for the Department of Veterans Affairs and for military construction projects. https://www.militarytimes.com/news/your-military/2018/09/28/trump-signs-spending-plan-avoiding-shutdown

All news