Back to news

August 12, 2020 | International, C4ISR, Security

Pentagon requests 30-day extension for re-awarding JEDI

WASHINGTON — The U.S. Department of Defense has requested 30 extra days to review vendor proposals as it prepares to make another award decision for its massive enterprise cloud contract, according to a Monday night court filing.

The DoD is currently reviewing new revised proposals for its Joint Enterprise Defense Infrastructure contract, which it awarded to Microsoft over Amazon Web Services in October last year. In the filing, the DoD said that it “recently identified the need to reopen limited discussions related to certain aspects of the offerors' pricing proposals.”

The request, made in the Court of Federal Claims, is yet another delay for the controversial JEDI cloud. The department was supposed to re-award the contract by Aug. 17 after receiving a 120-day stay to take corrective action on the contract. It's now asking to delay that decision to Sept. 16.

“During the remand, DoD has identified areas of concern with respect to the revised proposals received from both offerors, resulting in multiple solicitation amendments, rounds of proposal revisions, and exchanges with the offerors,” the court filing said.

AWS, which filed the protest late last year in the Court of Federal Claims after losing the contract, argues that the department made several technical errors while evaluating its proposal and also accuses President Donald Trump of political interference in the contract.

AWS does not oppose the Pentagon's new motion, the court document said.

In late July, DoD CIO Dana Deasy told reporters that the DoD would “probably sometimes towards the very end of August, barring any last minute, unforeseen additional issues that are raised.” The court filing says that the department “anticipates” that the re-evaluation process will wrap up in early September.

The JEDI cloud has been delayed continuously throughout the entirety of the procurement process. Last year, the initial award decision was delayed for months due to a pre-award protest by Oracle. Earlier this year work on JEDI was further delayed when the court placed a temporary restraining order on any work on the JEDI cloud, finding that AWS was “likely to succeed” in proving DoD erred in the evaluation process.

https://www.c4isrnet.com/battlefield-tech/it-networks/2020/08/11/pentagon-requests-30-day-extension-for-re-awarding-jedi/

On the same subject

  • DoD SBIR/STTR Component BAA Open: Space Development Agency (SDA) HQ085021S0001

    March 25, 2021 | International, Aerospace, C4ISR

    DoD SBIR/STTR Component BAA Open: Space Development Agency (SDA) HQ085021S0001

    The DoD Small Business and Technology Partnerships Office announces the opening of the following Broad Agency Announcement (BAA) topics: Space Development Agency (SDA), HQ085021S0001 SBIR Topic HQ085021S0001-07: “Target Recognition and Acquisition in Complex Environments,” published at: https://beta.sam.gov/opp/8e5e2483aaac4ab9834601e7d2888581/view STTR Topic HQ085021S0001-08: “Target Recognition and Acquisition in Complex Environments,” published at: https://beta.sam.gov/opp/12f9af5e67a34384a5b0bd38dc3c079b/view IMPORTANT DATES: March 25, 2021: Topic Q&A opens; BAA opens, begin submitting proposals in DSIP April 13, 2021: Topic Q&A closes to new questions at 12:00 p.m. ET April 27, 2021: BAA closes, full proposals must be submitted in DSIP no later than 12:00 p.m. ET Full topics and instructions are available at the links provided above.

  • Disruptive technologies show why government needs data security standards now

    November 21, 2018 | International, C4ISR

    Disruptive technologies show why government needs data security standards now

    By: Justin Lynch Telepathy. Data uploading to the brain. Even humanoid sex robots. These are among the ideas that exist on a periodic table of disruptive technologies, a new visual guide that predicts what will alter human existence in the coming years. Created by Imperial College London, the table identifies what is set to change societies in the short term (smart controls and appliances), as well as fringe ideas that are decades away from existence, if they will exist at all (think force fields.) Yet the disruption could turn disastrous without proper data-security standards, according to one of the chart's creators, Richard Watson, the futurist in residence at Imperial College London. “There is very little here that is not in some way digital and connected, which makes it vulnerable,” Watson said. “Any kind of internet-of-everything device doesn't really work if you haven't got common standards — if Apple isn't sharing with Google and the French aren't sharing with the Germans.” Experts have long expressed concern about the lack of data standards for internet-connected devices. There is no international standard for data security. And U.S. government oversight of internet-connected devices is spread across at least 11 different federal agencies, according to a 2017 Government Accountability Office report. “As new and more ‘things' become connected, they increase not only the opportunities for security and privacy breaches, but also the scale and scope of any resulting consequences,” the report said. And there has been a flurry of cyberattacks using internet-connected devices. Some hackers are exploiting smart devices as an intermediary to attack computer networks, the FBI warned Aug. 2. Ninety-three percent of respondents told Armis, a security platform, in an August survey that they expected governments to exploit connected devices during a cyberattack. The Imperial College London chart offers a further glimpse at how important it may be to create these common regulations by imagining a wealth of potential breach points. Watson listed some of the table's future technologies that could be hacked. “Smart controls and appliances.” Hackable. “Autonomous robotic surgery.” Hackable. “Autonomous ships and submarines.” Hackable. “One of the issues with the stuff on here is that it relies on extremely good data security,” Watson said. The problem with having a developing ecosystem without global standards is that a single vulnerability could allow access to more than one network, and government officials and businesses are currently taking a strategy of letting the private sector debate how, or if, to regulate itself when it comes to internet-connected devices. One piece of bipartisan federal legislation, the 2017 Internet of Things Cybersecurity Improvement Act, mandates that “devices purchased by the U.S. government meet certain minimum security requirements," but it has stalled in Congress. As a first step, manufacturers should collaborate to establish device security baselines, Jing de Jong-Chen, general manager for global cybersecurity at Microsoft, said during a June conference hosted by the Woodrow Wilson Center, a Washington, D.C.-based think tank. One private solution is a set of common guidelines developed by the IEEE Standards Association, an industry trade organization. The trade association's voluntary standards is evidence of a fear of government regulation that the private sector is openly hostile to. During the June event, the idea of government regulation of smart devices was laughed at by private sector officials in the room. But that laughter may have been premature. In September 2018, California Governor Jerry Brown approved a bill that requires companies to install connected devices with “a reasonable security feature” protecting it against unauthorized access. The bill means that the periodic table of disruptive technologies may eventually be impacted by a modicum of public regulation, although it is not clear if that will be effective. Not making it any easier is that no amount of planning can compensate for every technological innovation. For example, when it comes to the most disruptive future technology, the chart is secretive. In position 100, predicted to be the most innovative idea, the chart says it is too dangerous to publish. “We can't talk about this one,” it reads. In this instance, however, a potential security risk is averted. When asked if this technology is the one that will literally “break the internet,” Watson is forced to make a confession: “It's a joke. It's just us dodging the ball because we couldn't think of what to put there.” https://www.fifthdomain.com/industry/2018/11/20/disruptive-technologies-show-why-government-needs-data-security-standards-now/

  • Lockheed, Northrop win US Army contract for spy gear on launched drones

    November 29, 2023 | International, Aerospace

    Lockheed, Northrop win US Army contract for spy gear on launched drones

    Launched effects — hurtling outward from vehicles and aircraft — are meant to complement equipment soldiers already rely on to scout, target, jam and kill.

All news