April 13, 2021 | International, Aerospace
Opinion: What Industry Can Teach the Military About Aircraft Sustainment | Aviation Week Network
The Pentagon needs a task force that can share best practices across services.
August 28, 2020 | International, Aerospace
WASHINGTON — The U.S. Space Force's Space and Missile Systems Center will host a Space Force Pitch Day in spring 2021. While the current plan is to host the event in person in Los Angeles, California, SMC noted that it may move to a virtual environment due to the ongoing coronavirus pandemic.
The Air Force first introduced its pitch days in March 2019, and has since held several to find “defense unicorns” — nontraditional companies with innovative solutions that lack the resources and know-how to secure Department of Defense contracts. Inspired by the popular television series “Shark Tank,” select companies are given the unique opportunity to present their solutions to acquisition leaders, who are then able to award Small Business Innovation Research grants.
“Space Force is committed to procuring things differently. We continue to recognize the need for faster and smarter methods to quickly identify, procure and develop military space solutions. Space Pitch Day is one way SMC is bridging the gap between small businesses and the military,” said Maj. Ryan Pennington, project lead of SMC's deputy space ventures.
A major draw of the events is the responsiveness, giving smaller companies the chance to forgo the traditional, lengthy DoD contracting process. The Air Force boasts that on its first pitch day, the service awarded a contract within three minutes of seeing the presentation. During the first Space Force Pitch Day in November 2019, the Air Force issued $9 million to 12 companies.
“The inaugural Air Force Space Pitch Day last year was very successful. Although SMC is hosting its second pitch day event, it really is the first under the USSF. We are excited to host another event that enables us to grow and leverage small-business innovation into thriving ecosystems,” said Roberta Ewart, SMC's chief scientist. “The next SMC Space Force Pitch Day event will have the same focus and that is to open doors for innovative technologies and ideas and then create transition on-ramps into the USSF enterprise and architecture. We are fielding tomorrow's Space Force faster and smarter and we do this by changing the way we buy things.”
SMC has laid out 11 focus areas for the upcoming Space Force Pitch Day:
Interested companies can register and submit their proposals at www.spaceforcepitchday.com.
April 13, 2021 | International, Aerospace
The Pentagon needs a task force that can share best practices across services.
December 17, 2018 | International, C4ISR
By: Geoff Ziezulewicz The Army, Navy and Missile Defense Agency are failing to take basic cybersecurity steps to ensure that information on America's ballistic missile defense system won't fall into nefarious hands, according to a Defense Department Inspector General audit released Friday. Investigators visited five sites that manage ballistic missile defense elements and technical information, but the names of the commands were redacted in the publicly released report. “The Army, Navy and MDA did not protect networks and systems that process, store, and transmit (missile defense) technical information from unauthorized access and use,” the declassified report states. Such inadequacies “may allow U.S. adversaries to circumvent (missile defense) capabilities, leaving the United States vulnerable to missile attacks,” the report states. They found officials failed to employ safeguards familiar to most people online in 2018, the latest development to raise questions about the U.S. military's cybersecurity vulnerabilities. Among the shortcomings: Administrators for classified networks had no intrusion detection and prevention systems in place to watch for cyberattacks, much less stop them, according to the report. At one site, officials said they had requested to purchase those cyber safeguards in December 2017 but nine months later it still hadn't been approved. “Without intrusion detection and prevention capabilities, (the site) cannot detect malicious attempts to access its networks and prevent cyberattacks designed to obtain unauthorized access and exfiltrate sensitive (missile defense) technical information,” the report states. Officials also failed to patch system flaws after receiving vulnerability alerts, one of which had first been identified in 1990 and had still not been fixed by April. Another vulnerability that could be exploited by an attacker was first identified in 2013 but also was never pathced, according to the report. “Countless cyber incident reports show that the overwhelming majority of incidents are preventable by implementing basic cyber hygiene and data safeguards, which include regularly patching known vulnerabilities,” the IG report states. “(Missile defense) technical information that is critical to national security could be compromised through cyberattacks that are designed to exploit these weaknesses.” Some facilities failed to force employees to use common access cards, or CAC, when accessing the classified system, a basic cybersecurity practice known as multi-factor identification. Instead, officials were able to access the sensitive information using just a username and password, the report states. Hackers use phishing and other tactics to exploit passwords and gain access to such systems. New hires are supposed to be allowed network access without a card for only their first two weeks on the job. But IG investigators found users on the systems without CAC cards for up to seven years. At one site, a domain administrator never configured the network to allow only CAC holder access. “Allowing users to access networks using single factor authentication increases the potential that cyber attackers could exploit passwords and gain access to sensitive (missile defense) technical information,” the report states. Investigators also found unlocked server racks at some locations, another key vulnerability to insider snoopers. “The insider threat risk necessitates that organizations implement controls...to reduce the risk of malicious personnel manipulating a server's ability to function as intended and compromising sensitive and classified data,” the report states. External storage devices held unencrypted data and some sites failed to track who was accessing data, and why. Other administrators told investigators that they lacked the ability to record or monitor data downloaded from the network onto these devices. Unless these officials enforce the encryption of such removed data and monitor its downloading and transferring, “they will be at increased risk of not protecting sensitive and classified (missile defense) technical information from malicious users,” the report states. Investigators also found that some supposedly secure sites were failing to even lock their doors. One location had a security door that hadn't worked for years. “Although security officials were aware of the problem, they did not take appropriate actions to prevent unauthorized personnel from gaining unauthorized access to the facility,” the report states. Other sites featured no security cameras to monitor personnel movement and security officers failed to conduct badge checks. While the report makes recommendations to fix the documented problems, officials for the inspected agencies offered no comments on the non-classified draft report of the audit. Friday's scathing IG audit marked the latest in a string of reports detailing shoddy cybersecurity throughout the armed forces and defense contractors. During the same week, the Wall St. Journal reported that Chinese hackers are targeting military systems and those of defense contractors working on Navy projects. Beijing-linked cyber raids have attempted to steal everything from missile plans to ship-maintenance data in a series of hacks over the past 18 months, the Journal reports. As a result, Navy Secretary Richard Spencer has ordered a “comprehensive cybersecurity review” to assess if the Navy's cyber efforts “are optimally focused, organized, and resourced to prevent serious breaches,” spokesman Capt. Greg Hicks said. The review will also look at authorities, accountability and if the efforts reflect and incorporate government and industry best practices, he said. “Secretary Spencer's decision to direct a review reflects the serious to which the DoN prioritizes cybersecurity in this era of renewed great power competition,” Hicks said. https://www.navytimes.com/news/your-navy/2018/12/14/audit-finds-cyber-vulnerabilities-in-us-missile-defense-system
July 17, 2020 | International, Aerospace
Nathan Strout The Defense Innovation Unit has awarded Sierra Nevada Corporation a contract to build an orbital laboratory that would serve as a kind of unmanned space station, the company announced July 14. The unmanned orbital outpost will be placed in low Earth orbit to be used for experiments and demonstrations. The autonomous, free flying vehicle will be able to host payloads and support space assembly and manufacturing, microgravity experimentation, logistics, training, testing and evaluations. Under the contract, Sierra Nevada Corporation will repurpose their Shooting Star transport vehicle into a scalable, autonomous space station that can be used for experiments and demonstrations. The Shooting Star vehicle is a 16-foot attachment to the company's Dream Chaser space plane that was developed for NASA Commercial Resupply Services 2 missions. The vehicle was initially designed to provide extra payload storage and cargo disposal upon re-entry. “We're excited by the multi-mission nature of Shooting Star,” Fatih Ozmen, SNC's chief executive, said in a statement. “It was originally developed for NASA resupply missions to the International Space Station, and since then we keep identifying new capabilities and solutions it offers to a wide variety of customers.” The company's press release notes that while the initial orbital outpost will operate in LEO, future orbits could be placed in other orbits, including cislunar. “The current Shooting Star is already designed with significant capabilities for an orbital outpost and by adding only a few components we are able to meet Department of Defense needs.” added Steve Lindsey, senior vice president of strategy for SNC's space systems. “We are proud to offer our transport vehicle to DoD as a free-flying destination for experimentation and testing, expanding beyond its current payload service capabilities for Dream Chaser cargo missions.” According to the original DIU solicitation released June 2019, orbital outposts will need to be established in low Earth orbit within 24 months of the award. A DIU spokesperson told C4ISRNET at the time that the “the prototype will explore the military utility of exclusive DoD access to an unmanned orbital platform in order to perform experiments with no risk to human crew or other non-DOD payloads.” https://www.c4isrnet.com/battlefield-tech/space/2020/07/16/defense-innovation-unit-issues-contract-for-unmanned-orbital-outpost/