Back to news

July 27, 2018 | International, C4ISR

The Pentagon just got one step closer to awarding its $10 billion cloud contract

  • The Pentagon released its final request for proposal for the Joint Enterprise Defense Infrastructure, or JEDI, contract.
  • The lucrative winner-take-all deal may be valued at as much as $10 billion.
  • Amazon is considered the front-runner for the contract since the tech giant already services the cloud system used by U.S. intelligence agencies.

The Defense Department took a large step forward Thursday in its march toward procuring a secure cloud software, an acquisition potentially worth up to $10 billion.

After a nearly two-month delay, the Pentagon released its final request for proposal for the Joint Enterprise Defense Infrastructure, or JEDI, contract. The long-awaited final request for proposal simply outlines what companies will have to deliver in order to get the lucrative deal.

The Pentagon's cloud project will transition massive amounts of data to a commercially operated secure cloud system. The deal is a "single-source" award, meaning that only one company will win the entirety of the contract.

Amazon is considered the front-runner for the contract since the tech giant already services the cloud system used by U.S. intelligence agencies.

Amazon's cloud boasts the highest possible security level, while many of its competitors' clouds do not. However, other cloud providers — such as IBM, Microsoft and Oracle — have worked with government agencies for many decades. That could help their chances of winning the decade-long JEDI contract.

The DoD "has an incredibly unique and complex technology estate and finite set of talent and resources," Pentagon Chief Information Officer Dana Deasy said in a statement. "We need help learning how to put in place an enterprise cloud and the JEDI Cloud is a pathfinder effort that will help Department of Defense do that."

Experts think the deal could be a seismic development in the defense-tech world.

"This award could be market-shaping," Andrew Hunter, director of the Defense-Industrial Initiatives Group at the Center for Strategic and International Studies, said in an interview.

"I think industry's concern is that this will be the premier cloud contract, the flagship one, and that other parts of DoD will gravitate to it," he added. "So, I think whoever wins the contract is likely to have a real advantage in the marketplace going forward but not necessarily a decisive one."

The desire to award a multibillion-dollar, two-year cloud contract was largely set into motion after Secretary of Defense James Mattis visited Silicon Valley last year.

Federal defense agencies widely use Microsoft's server software, which integrates easily with the company's Azure public cloud, and among employees, Windows is the most popular operating system, Leigh Madden, Microsoft's general manager of defense, told CNBC in a prior interview.

"I think it certainly should make a difference," he said.

Similarly, IBM has worked alongside the military for decades.

"We look forward to submitting a thoughtful, comprehensive proposal for a JEDI cloud that will serve the long-term needs of America's men and women in uniform," Sam Gordy, IBM's Federal general manager, said in a statement.

In the midst of all this, President Donald Trump has attacked Amazon on Twitter, particularly as he rails against The Washington Post, which is owned by Amazon CEO Jeff Bezos, for the newspaper's coverage of his administration.

A Vanity Fair report said the Trump administration might try to "cancel Amazon's pending contract" with the Pentagon, but the department maintains that there has been no political pressure from the White House on who should win the multibillion-dollar deal.

U.S. Navy Commander Patrick Evans, a Department of Defense spokesperson, reiterated that the Pentagon's process is "transparent" and will remain "a full and open competition."

"No companies were pre-selected. We have no favorites, and we want the best solution for the department," Evans said.

Similarly, chief Pentagon spokesperson Dana White also addressed speculation Thursday that Amazon was in the lead to take the lucrative defense contract.

"The secretary has been very clear that we need to be good stewards of the American people's money," White said. "So, nothing is taken for granted and nothing is presumed. We will get a full, open and transparent competition, and this is the first of many competitions with respect to the cloud."

The Pentagon is scheduled to award the contract in September.

— CNBC's Jordan Novet contributed to this report.

https://www.cnbc.com/2018/07/26/pentagon-takes-step-closer-to-awarding-10-billion-cloud-contract.html

On the same subject

  • The new ways the military is fighting against information warfare tactics

    July 22, 2020 | International, C4ISR

    The new ways the military is fighting against information warfare tactics

    Mark Pomerleau One of the clearest examples of how the military wants to defeat adversaries using information warfare is by publicly disclosing what those enemies have been doing and what capabilities they have. Information warfare can be abstract, combining cyber, intelligence, electronic warfare, information operations, psychological operations or military deception as a way to influence the information environment or change the way an adversary think. “At our level, the most important thing we can do is to be able to expose what an adversary is doing that we consider to be malign activity, in a way that allows that to be put in the information environment so that now more scrutiny can be applied to it,” Lt. Gen. Timothy Haugh, commander 16th Air Force, the Air Force's newly established information warfare organization, told reporters during a media round table in late February. One of the first ways the Department of Defense has sought to test this is through U.S. Cyber Command's posting of malware samples to the public resource VirusTotal. Malware samples discovered in the course of operations by the Cyber National Mission Force are posted to the site to inform network owners. It also helps antivirus organizations of the strains build patches against that code and helps identify the enemies' tools being used in ongoing campaigns. Haugh, who most recently led the Cyber National Mission Force, explained how these cyber teams, conducting what Cyber Command calls hunt forward operations, were able to expose Russian tactics. U.S. military teams deploy to other nations to help them defend against malign cyber activity inside their networks. “Those defensive teams then were able to identify tools that were on networks and publicly disclose them, [and] industry later attributed to being Russian tools,” he said. “That was a means for us to use our unique authorities outside the United States to be able to then identify adversary activity and publicly disclose it.” Officials have said this approach changes the calculus of adversaries while also taking their tools off the battlefield. “Disclosure is more than just revealing adversary intent and capabilities. From a cyberspace perspective, disclosure is cost imposing as it removes adversary weapons from the ‘battlefield' and forces them to expend resources to create new weapons,” Col. Brian Russell, the commander of II Marine Expeditionary Force Information Group, told C4ISRNET in June. “Disclosure forces the adversary to ask: ‘How were those capabilities discovered?' It causes them to investigate the cause of the disclosure, forcing them to spend time on something other than attacking us. If I can plant a seed of doubt (messaging) that the disclosure might have been caused by someone working on the inside, it makes them question the system's very nature, perhaps spending more time and resources to fix the system.” The NSA has demonstrated a similar tactic when it created its cybersecurity directorate in late 2019. The entity was formed in part, due to the fact that adversaries were using cyberspace to achieve strategic objectives below the threshold of armed conflict. Now, the directorate uses its intelligence and cyber expertise to issue advisories to the network owners of cybersecurity threats so they can take the necessary steps to defend themselves. One recent advisory had direct bearing on a nation state's malicious activity, according to a senior intelligence official. In late May, the agency issued an advisory regarding a vulnerability in Exim mail transfer agent, which was being widely exploited by a potent entity of Russia's military intelligence arm the GRU called Sandworm. “Quickly thereafter, we saw five cybersecurity companies jumped on it and really used that to deepen and expand and publish information about the GRU's infrastructure that they use to conduct their cyberattacks and further information as well,” the official told reporters in early July. “That was terrific because we felt that that had a direct impact on a major nation state in terms of exposing their infrastructure ... and we saw significant patch rates go up on a vulnerability that we knew they were using. That's the kind of thing that we're looking for.” The military has had to think differently to combat for how adversaries are operating. “A central challenge today is that our adversaries compete below the threshold of armed conflict, without triggering the hostilities for which DoD has traditionally prepared,” Gen. Paul Nakasone, commander of Cyber Command, wrote in prepared testimony before the House Armed Services Committee in early March. “That short-of-war competition features cyber and information operations employed by nations in ways that bypass America's conventional military strengths.” These disclosures or efforts to call out malign behavior have also taken the forms of media interviews and press releases. For example, Gen. Jay Raymond, the head of U.S. Space Command and the commandant of Space Force, said in a February interview in which he detailed what he deemed unacceptable behavior by Russia in space, a surprising charge given how tight lipped the U.S. government typically is about its satellites. “We view this behavior as unusual and disturbing,” he said of Russian satellites creeping up to American ones. “It has the potential to create a dangerous situation in space.” Or consider that leaders from Africa Command on July 15 issued a press release detailing the activities of the Wagner Group, a Russian security company, as acting on behalf of the Russian state to undermine the security situation in Libya. “U.S. Africa Command (AFRICOM) has clear evidence that Russian employed, state-sponsored Wagner Group laid landmines and improvised explosive devices (IEDs) in and around Tripoli, further violating the United Nations arms embargo and endangering the lives of innocent Libyans,” the release said. “Verified photographic evidence shows indiscriminately placed booby-traps and minefields around the outskirts of Tripoli down to Sirte since mid-June. These weapons are assessed to have been introduced into Libya by the Wagner Group.” Moreover, Africa Command's director of operations called out Russia, noting that country's leaders have the power to stop the Wagner Group, but not the will. Sixteenth Air Force, at the request of C4ISRNET, provided a vignette of such behavior from Russia in the form of how it covered up the explosion of a radioactive rocket, dubbed Skyfall. According to the service, Russia took extreme steps to curb monitoring of the site where the explosion took place and sought to conceal the true nature of the explosion potentially hindering surrounding civilian populations from receiving adequate medical treatment and guidance. With new forces integrated under a single commander, using unique authorities to collect intelligence and authorities to disclose, 16th Air Force is now better postured to expose this type of malign activity, which previously the U.S. government just didn't do. Top Pentagon leaders have explained that the dynamic information warfare space requires a new way of thinking. “We've got to think differently. We've got to be proactive and not reactive with messaging,” Lt. Gen. Lori Reynolds, the Marine Corps' deputy commandant for information, told C4ISRNET in an interview in March. “We have been very risk averse with regard to the information that we have. You can't deter anybody if you're the only one who knows that you have a capability.” https://www.c4isrnet.com/information-warfare/2020/07/20/the-new-ways-the-military-is-fighting-against-information-warfare-tactics/

  • Contract Awards by US Department of Defense - October 24, 2018

    October 25, 2018 | International, Aerospace, Naval, Land, C4ISR, Security

    Contract Awards by US Department of Defense - October 24, 2018

    DEFENSE LOGISTICS AGENCY Honeywell International Inc., Phoenix, Arizona, has been awarded an estimated $1,036,726,575 firm-fixed-price requirements contract for support of the following platforms: Ground Start Carts, C-130 Auxiliary Power Units (APU), B-2 APU, F-15 components, A-10 APU, E-3 APU, B-1 APU and F-16 turbine power units. This was a sole-source acquisition using justification 10 U.S. Code 2304(c)(1), as stated in Federal Acquisition Regulation 6.302-1. This is a three-year, six-month base contract with one three-year option, and one three-year and six-month option period. Using military service is Air Force. Location of performance is Utah, with a July 31, 2028, performance completion date. Type of appropriation is fiscal 2019 through 2029 Air Force working capital funds. The contracting activity is the Defense Logistics Agency Aviation, Philadelphia, Pennsylvania (SPRPA1-18-D-001U). NAVY Sikorsky Aircraft Corp., Stratford, Connecticut, is awarded a $717,410,825 firm-fixed-priced, performance-based logistics requirements contract for logistics and repair support for 98 components in support of CH-53 and MH-53 aircraft weapon replaceable assembly components and their related shop replaceable assembly components. This contract includes a 50-month base period with no options. Work will be performed in Stratford, Connecticut (75 percent); and Cherry Point, North Carolina (25 percent). Work is expected to be completed by December 2022. Working capital (Navy) funds in the amount of $142,662,162 will be issued for delivery order (N00383-19-F-0U00) that will be awarded concurrently with the contract. Fiscal 2018-2022 working capital (Navy) funds will be obligated to fund delivery orders as they are issued, and funds will not expire at the end of the current fiscal year. One source was solicited for this non-competitive requirement pursuant to the authority set forth in 10 U.S. Code 2304 (c)(1), in accordance with Federal Acquisition Regulation 6.302-1, with one offer received. Naval Supply Systems Command Weapon Systems Support, Philadelphia, Pennsylvania, is the contracting activity (N00383-19-D-U001). Canadian Commercial Corp., Ontario, Canada, is awarded a $27,673,372 firm-fixed-price, indefinite-delivery/indefinite-quantity single-award contract for the Mk 200 Mod 0 Propelling Charge. This contract includes options which, if exercised, would bring the cumulative value of the contract to $74,920,000. This contract involves foreign military sales to Australia and India. Work will be performed by General Dynamics Ordnance and Tactical Systems in Quebec, Canada, and is expected to be completed by November 2019. Fiscal 2018 procurement of ammunition (Navy and Marine Corps) funding in the amount of $15,001,914; fiscal 2019 procurement of ammunition (Navy and Marine Corps) funding in the amount of $7,337,384; and foreign military sales (Australia) funding in the amount of $5,334,074 will be obligated on the first delivery order at time of award and will not expire at the end of the current fiscal year. This contract was competitively procured via the Federal Business Opportunities website, with three offers received. The Naval Surface Warfare Center, Indian Head Explosive Ordnance Disposal Technology Division, Indian Head, Maryland, is the contracting activity (N00174-19-D-0002). Northrop Grumman Systems Corp., Charlottesville, Virginia, is awarded an $18,118,858 firm-fixed-price contract to provide common Integrated Bridge and Navigation Systems (IBNS) for the DDG-51 New Construction Ship Program and DDG-51 Midlife Modernization Program. The IBNS is a hull, mechanical and electrical upgrade and part of the comprehensive plan to modernize the DDG-51 class to ensure the ships remain combat relevant and affordable throughout their life. This contract will serve as the base hardware production contract for IBNS systems. The contract includes options which, if exercised, would bring the cumulative value to $163,963,639. Work will be performed in Charlottesville, Virginia, and is expected to be completed by February 2020. Fiscal 2018 other procurement (Navy); and fiscal 2018 and 2016 shipbuilding and conversion (Navy) funding in the total amount of $18,118,858 will be obligated at time of award and will not expire at the end of the current fiscal year. This contract was competitively procured via the Federal Business Opportunities website, with one offer received. The Naval Sea Systems Command, Washington, District of Columbia, is the contracting activity (N00024-19-C-4101). AIR FORCE KIRA Training Services LLC, Boulder, Colorado, has been awarded a $221,379,030 firm-fixed-price contract for civil engineering services. This contract provides for engineering services, installation management services, facilities/infrastructure maintenance and repair services, emergency management services, and housing management services. Work will be performed at the U.S. Air Force Academy, Colorado, and is expected to be completed by Nov. 30, 2025. This award is the result of a competitive acquisition with 12 proposals received. Fiscal 2019 operations and maintenance funds in the amount of $100,134 will be obligated on Oct. 1, 2018. The 10th Contracting Squadron, U.S. Air Force Academy, Colorado, is the contracting activity (FA7000-19-C-0001). United Launch Services, Centennial, Colorado, has been awarded a $152,429,417 firm-fixed-price contract for Evolved Expendable Launch Vehicle Delta IV heavy launch services. This contract provides launch vehicle production services for National Reconnaissance Office Launch Mission One. Work will be performed in Centennial, Colorado; and Decatur, Alabama, and the launch will occur in Cape Canaveral Air Force Station, Florida; or Vandenberg Air Force Base, California. The work is expected to be completed by June 30, 2021. This award is the result of a sole-source acquisition. Fiscal 2018 missile procurement funds in the amount of $152,429,417 are being obligated at the time of award. Space and Missile Systems Center Los Angeles Air Force Station, California, is the contracting activity (FA8811-19-C-0002). L3 Technologies Inc., Salt Lake City, Utah, has been awarded a $55,382,155 firm-fixed-price, cost-plus fixed-fee, cost-reimbursable contract for the Organic Depot Activation of the MQ-9 communications and data link parts at Tobyhanna Army Depot, Pennsylvania; and Warner-Robins Air Logistics Complex, Georgia. Work will be performed at Tobyhanna Army Depot and Warner-Robins Air Logistics Complex, and is expected to be completed by Oct 21, 2021. This award is the result of a sole-source acquisition. Fiscal 2017 and 2018 aircraft procurement funds in the amount of $44,425,521 are being obligated at time of award. The Air Force Life Cycle Management Center, Wright-Patterson Air Force Base, Ohio, is the contracting activity (FA8620-19-C-2008). DynCorp International LLC, McLean, Virginia, has been awarded a $22,500,000 indefinite-delivery/indefinite-quantity contract for Egypt personnel support services. This contract provides for housing, transportation, security, vehicles and labor to support defense contractor employees and department of defense employees. Work will be performed in Egypt and is expected to be completed by Sept. 24, 2023. This contract involves foreign military sales (FMS) to Egypt and is the result of a sole-source acquisition. FMS funds in the amount of $2,742,237 are being obligated at the time of award. Air Force Life Cycle Management Center, Wright-Patterson Air Force Base, Ohio, is the contracting activity (FA8630-19-D-5016). TF Powers Construction Co., Fargo, North Dakota, has been awarded a $12,374,000 firm-fixed-price contract for construction services. Contractor will provide all plant, labor, materials, equipment, supplies and supervision necessary for the construction and renovation of building 541 for the Ground Segment Modernization Program: to replace building systems and construct server rooms, offices, auditoriums and conference rooms, a mission control/operation center, remote equipment control rooms, and substantial communications infrastructure all built to security standards. Work will be performed at Grand Forks Air Force Base, North Dakota, and is expected to be completed by Dec. 12, 2019. This award is the result of a competitive acquisition and four offers received. Fiscal 2019 operations and maintenance funds in the amount of $12,374,000 are being obligated at the time of award. The 319th Contracting Flight, Grand Forks AFB, North Dakota, is the contracting activity (FA4659-19-C-C001). ARMY HDR Engineering, Omaha, Nebraska (W912UM-19-D-0001); Jacobs Government Services Co., Pasadena (W912UM-19-D-0002); Stanley-WSP JV, Muscatine, Iowa (W912UM-19-D-0003); Tetra Tech Inc., Marlborough, Massachusetts (W912UM-19-D-0004); and Thomas J. Davis Inc.,* Seguin, Texas (W912UM-19-D-0005), will compete for each order of the $100,000,000 firm-fixed-price contract for architect and engineer services. Bids were solicited via the internet with 10 received. Work locations and funding will be determined with each order, with an estimated completion date of Oct. 23, 2023. U.S. Army Corps of Engineers, Seoul, Republic of Korea, is the contracting activity. Norfolk Dredging Co., Chesapeake, Virginia, was awarded a $13,501,500 firm-fixed-price contract for maintenance dredging of the Delaware River. Bids were solicited via the internet with one received. Work will be performed in New Castle, Delaware, with an estimated completion date of March 13, 2019. Fiscal 2016, 2017, 2018 and 2019 operations and maintenance, Army funds in the amount of $13,501,500 were obligated at the time of the award. U.S. Army Corps of Engineers, Philadelphia, Pennsylvania, is the contracting activity (W912BU-19-C-0002). West Consultants Inc.,* San Diego, California (W912BV-19-D-0001); and Halff Associates Inc., Fort Worth, Texas (W912BV-19-D-0002), will compete for each order of the $8,000,000 firm-fixed-price contract for engineering, design, and construction phase services for hydrologic and hydraulic engineering, design, modeling and manual development services. Bids were solicited via the internet with six received. Work locations and funding will be determined with each order, with an estimated completion date of Oct. 21, 2021. U.S. Army Corps of Engineers, Tulsa Oklahoma, is the contracting activity. *Small Business https://dod.defense.gov/News/Contracts/Contract-View/Article/1671864/

  • RAND calls for reexamination of surface connectors’ survivability

    October 5, 2023 | International, Naval

    RAND calls for reexamination of surface connectors’ survivability

    RAND warns surface connectors, including the LCU and Ship-to-Shore Connector, weren't designed with today's naval threats in mind.

All news