25 mars 2020 | International, C4ISR

Amazon Denounces DoD JEDI ‘Do-Over’

The Pentagon's request to reconsider narrow technical aspects of the award to Microsoft, Amazon argues, ignores a wide range of fundamental flaws.
By SYDNEY J. FREEDBERG JR.

WASHINGTON: Amazon Web Services has publicly denounced the Defense Department's latest legal maneuver in the months-long public battle over the JEDI cloud computing contract, awarded to Microsoft last year. No, Amazon said in a statement this morning, the Pentagon should not get to redo a particular piece of the award process the judge found flawed, because that was just one flaw among many and fixing it is a distraction from the larger issues.

“We're pleased to see the DoD recognize the need to take corrective action,” the Amazon statement began, “but we're concerned that the proposed approach is not designed to provide a complete, fair, and effective re-evaluation.”

“Both earlier in the adjudication process when we submitted 265 questions to the DoD that they refused to answer, and in our protest where we outlined numerous significant flaws in the evaluation, it's been clear that there were many problems with the DoD's initial decision,” the statement continues. “Instead of addressing the breadth of problems in its proposed corrective action, the DoD's proposal focuses only on providing Microsoft a ‘do-over' on its fatally flawed bid while preventing AWS from adjusting its own pricing in response to the DoD's new storage criteria.”

“This attempt to gerrymander the corrective action without fixing all of the serious flaws pointed out in our complaint raises significant questions,” the statement concludes.

DoD graphic

The Pentagon's plan to consolidate many — but not all — of its 500-plus cloud contracts into a single Joint Enterprise Defense Infrastructure (JEDI). Note the suggestion that the single “pathfinder” contract for JEDI might evolve into multiple JEDI contracts.

An email circulated by Amazon went further: “DoD's proposed corrective action seeks to resurrect Microsoft's award eligibility and directly and unreasonably benefits Microsoft's deficient approach. DoD's proposed corrective action does not meaningfully address the numerous errors identified in AWS's protest. These errors were pervasive, impacting all six of the technical evaluation factors” — that is, not just the one the Pentagon is asking to redo.

“From the President's order to ‘screw' Amazon out of the contract, to the Secretary halting the award for an 85-day ‘examination,' to the Secretary's bizarre recusal after an award decision had been made, to the numerous inexplicable evaluation errors, to the refusal to substantively address AWS's 265 post-award debriefing questions, to the blatant political interference which impacted the award decision – the history of this procurement casts serious doubt on the rationality and fairness of DoD's proposed correction action,” the email said bluntly.

Some backstory might help in parsing all this. (Click here for more detail). On Feb. 13, the court had granted Amazon a preliminary injunction, saying the company would “likely” be able to prove the Department of Defense had erred in one particular portion of its process – an evaluation of the two companies called Price Scenario 6 – when it awarded the potentially $10 billion contract to Microsoft Azure. On March 12th, DoD responded by asking the judge to “remand” the case back to DoD so it could correct and redo Price Scenario 6, giving Microsoft and Amazon the opportunity to submit updated bids – albeit with very strict limits on those updates.

“During the proposed remand,” DoD's motion said, “the agency potentially could make decisions that would moot this action, in whole or in part, and may obviate the need for further litigation in this Court.”

In other words, the Pentagon is asking the judge: let us fix this one thing, and then there might be nothing left for Amazon to object to, and you can dismiss the case. Today, Amazon replied: We have plenty more to object to – and we think the judge will side with us.

https://breakingdefense.com/2020/03/amazon-denounces-dod-jedi-do-over

Sur le même sujet

  • Romania pursues replacement MBT

    20 novembre 2018 | International, Terrestre

    Romania pursues replacement MBT

    Romania is seeking a replacement for its existing TR-85 M1 main battle tank (MBT), Lieutenant Colonel Valentin Torcica, chief of the Romanian Ministry of Defence's Armoured Office, announced on the last day of the Future Armoured Vehicles Survivability conference in London on 13-15 November. The TR-85 M1 has been service in 1997. The main requirements for the future Romanian MBT is to have a day/night all-weather hunter-killer capability, a 120 mm smoothbore main gun, and modern command, control, communications, computers, and intelligence mission systems. Other requirements include three or four crew members, a secondary armament with an elevation up to 70°, high survivability, and good sustainability. https://www.janes.com/article/84690/romania-pursues-replacement-mbt

  • Homeland Security announces new first response cyber center

    1 août 2018 | International, C4ISR

    Homeland Security announces new first response cyber center

    By: Justin Lynch In the face of increasing cyberattacks, the Department of Homeland Security is creating a new center to share threat information with private companies and kicking off a 90 day sprint to identify the country's digital “crown jewels" that may be especially vulnerable, the agency's secretary said July 31. The National Risk Management Center is expected to provide a centralized home where firms and local agencies can turn for cybersecurity solutions. “The next major attack is more likely to reach us online than on an airplane,” said Homeland Security Secretary Kirstjen Nielsen. She added that “intruders are in our systems” and “everyone and everything is now a target.” The announcement came during a cybersecurity summit that the Department of Homeland Security hosted in New York City. The event aimed to bridge the gap between the government and some of the top companies in the United States that make up the critical parts of American digital life. It was envisioned as the start of a new relationship between the private and public sector. Nielsen said that the threat center is “driven by industry needs” and is spurred by a ”re-emergence of the nation state threat” and the “hyperconnected environment” of the United States. She said that previously some local governments have called 911 during a cyberattack. In the future, they would call the new cyber center. “Nation-state actors attempt to infiltrate critical infrastructure operations across multiple sectors,” a Homeland Security fact sheet on the new center read. It added there is a “need for an agreed-upon playbook to integrate government and industry response efforts.” The center also provides a playbook for risk management and identifying critical cyber supply chain elements. Although there are already government-backed risk-sharing initiatives, DHS leaders hope that the private sector will be more willing to share their challenges and expertise. Jeanette Manfra, the assistant secretary for the Office of Cybersecurity and Communications at Homeland Security, told reporters that the new center is "going to start small, we don't want to sign up for all sorts of things and then fail.” The hope is for the national counterterrorism center to be able to focus on incident response, and the center announced on Tuesday will focus on identifying national risk. The risk center will pull staff from other parts of government, Manfra said. A leader has not been named, and it has not received an increased budget. Throughout the conference, government officials were eager to entice the private sector to work with the new risk center. It appears that business participation is a necessary condition for the centers' success. The announcement comes just one week after Homeland Security warned that the Russian government is conducting cyberattacks against critical infrastructure sectors that include energy, nuclear, water, aviation and critical manufacturing. “The warning lights are blinking red," Coats said during a July 13 event at the Hudson Institute. Current threat sharing portals have been described as ineffective. The Cybersecurity Information Sharing Act of 2015 already attempted to spur collaboration between the public and private sector. Some experts told Fifth Domain that they did not expect the new portal to be groundbreaking. Only six companies are currently sharing cyberthreats with government, according to Chris Krebs, head of the national protection and programs directorate at Homeland Security. “We have to age to establish a value proposition for an organization to share into the system,” said Krebs. He highlighted better supply chain risk management as an incentive that would set the new center apart from previous intelligence-sharing schemes. Companies can write into their contracts that their vendors must use the threat-sharing portal so they know that contractors are managing third-party risks, Krebs said. At the event in New York City, some of the largest corporations praised the new program while speaking onstage with top government officials. “This was an obvious thing to do for a decade but it didn't happen,” said John Donovan, the chief executive of AT&T. https://www.fifthdomain.com/critical-infrastructure/2018/07/31/homeland-security-announces-new-risk-management-center/

  • For Germany’s Scholz, Taurus missiles are a bridge too far in Ukraine

    13 mars 2024 | International, Terrestre

    For Germany’s Scholz, Taurus missiles are a bridge too far in Ukraine

    Critics have portrayed the powerful cruise missile as a defining, but lacking, element of German military assistance to Kyiv.

Toutes les nouvelles