25 mars 2020 | International, C4ISR

Amazon Denounces DoD JEDI ‘Do-Over’

The Pentagon's request to reconsider narrow technical aspects of the award to Microsoft, Amazon argues, ignores a wide range of fundamental flaws.
By SYDNEY J. FREEDBERG JR.

WASHINGTON: Amazon Web Services has publicly denounced the Defense Department's latest legal maneuver in the months-long public battle over the JEDI cloud computing contract, awarded to Microsoft last year. No, Amazon said in a statement this morning, the Pentagon should not get to redo a particular piece of the award process the judge found flawed, because that was just one flaw among many and fixing it is a distraction from the larger issues.

“We're pleased to see the DoD recognize the need to take corrective action,” the Amazon statement began, “but we're concerned that the proposed approach is not designed to provide a complete, fair, and effective re-evaluation.”

“Both earlier in the adjudication process when we submitted 265 questions to the DoD that they refused to answer, and in our protest where we outlined numerous significant flaws in the evaluation, it's been clear that there were many problems with the DoD's initial decision,” the statement continues. “Instead of addressing the breadth of problems in its proposed corrective action, the DoD's proposal focuses only on providing Microsoft a ‘do-over' on its fatally flawed bid while preventing AWS from adjusting its own pricing in response to the DoD's new storage criteria.”

“This attempt to gerrymander the corrective action without fixing all of the serious flaws pointed out in our complaint raises significant questions,” the statement concludes.

DoD graphic

The Pentagon's plan to consolidate many — but not all — of its 500-plus cloud contracts into a single Joint Enterprise Defense Infrastructure (JEDI). Note the suggestion that the single “pathfinder” contract for JEDI might evolve into multiple JEDI contracts.

An email circulated by Amazon went further: “DoD's proposed corrective action seeks to resurrect Microsoft's award eligibility and directly and unreasonably benefits Microsoft's deficient approach. DoD's proposed corrective action does not meaningfully address the numerous errors identified in AWS's protest. These errors were pervasive, impacting all six of the technical evaluation factors” — that is, not just the one the Pentagon is asking to redo.

“From the President's order to ‘screw' Amazon out of the contract, to the Secretary halting the award for an 85-day ‘examination,' to the Secretary's bizarre recusal after an award decision had been made, to the numerous inexplicable evaluation errors, to the refusal to substantively address AWS's 265 post-award debriefing questions, to the blatant political interference which impacted the award decision – the history of this procurement casts serious doubt on the rationality and fairness of DoD's proposed correction action,” the email said bluntly.

Some backstory might help in parsing all this. (Click here for more detail). On Feb. 13, the court had granted Amazon a preliminary injunction, saying the company would “likely” be able to prove the Department of Defense had erred in one particular portion of its process – an evaluation of the two companies called Price Scenario 6 – when it awarded the potentially $10 billion contract to Microsoft Azure. On March 12th, DoD responded by asking the judge to “remand” the case back to DoD so it could correct and redo Price Scenario 6, giving Microsoft and Amazon the opportunity to submit updated bids – albeit with very strict limits on those updates.

“During the proposed remand,” DoD's motion said, “the agency potentially could make decisions that would moot this action, in whole or in part, and may obviate the need for further litigation in this Court.”

In other words, the Pentagon is asking the judge: let us fix this one thing, and then there might be nothing left for Amazon to object to, and you can dismiss the case. Today, Amazon replied: We have plenty more to object to – and we think the judge will side with us.

https://breakingdefense.com/2020/03/amazon-denounces-dod-jedi-do-over

Sur le même sujet

  • Will the Thai Air Force get more Gripen jets?

    29 novembre 2018 | International, Aérospatial

    Will the Thai Air Force get more Gripen jets?

    By: Valerie Insinna SURAT THANI AIR FORCE BASE, Thailand — The Royal Thai Air Force's Wing 7, home to all of the country's Saab Gripen aircraft, wants more jets. The question is whether the country's defense budget will allow for it, one official said Tuesday. “As operators, we know that this is a very good aircraft, and we would love to have more,” said Group Capt. Prachya Tippayarat, deputy commander of the RTAF's Wing 7. “But it's just that I don't know when. The Air Force will have to think about that.” The RTAF currently operates 11 Gripen C/D fighter jets, bought from the Swedish government and manufactured by Saab. The Air Force lost one Gripen in a 2017 crash that destroyed the jet and killed the pilot. With 11 jets left, it is more difficult to accomplish both training and maintenance, Tippayarat said. “So of course we are looking for the replacement for the 12th one. It's just a matter of when. As the operator, we cannot tell when we are going to have that aircraft,” he said, adding that the service might have other budget priorities. Thailand's 11 Gripen aircraft are operated from Surat Thani Air Force Base, located about 328 miles south of Bangkok. Defense News visited the base Nov. 27-28 and accepted airfare and accommodations from Saab. Surat Thani plays a key role in defending southern Thailand. Although the nation also operates Northrop Grumman F-5s and Lockheed Martin F-16s, Wing 7's Gripens are the Royal Thai Air Force's premier fighters, used primarily for air-to-air and air-to-ground combat, and for secondary missions such as reconnaissance, Tippayarat said. The Thai government is also considering an upgrade of the RTAF Gripens' software suite, he added. The jets are currently configured to the MS19 standard, but the potential upgrade to MS20 would bring the jets into the most advanced configuration for the Gripen C/D. The MS20 software adds capabilities that make the Gripen a more formidable jet for air-to-ground attacks, including an electro-optical pod that allows the jet to drop laser-guided weapons, the addition of Boeing's Small Diameter Bomb and MBDA's Meteor missile, and new radar modes. One MS20 enhancement that the RTAF won't need is the addition of Link 16 capability, the data link used by NATO and its partner nations. The RTAF Gripens run on the Thai military's indigenous network, Link T. If Link 16 functionality is needed, the service can use its F-16s, but operating Link T on the Gripen allows Thailand to protect its homegrown capabilities and information, Tippayarat said. Saab delivered the first Gripens to Thailand in 2011. Other Gripen C/D users include Sweden, Hungary, the Czech Republic and South Africa. https://www.defensenews.com/global/asia-pacific/2018/11/28/will-the-thai-air-force-get-more-gripens

  • Lockheed to Offer 'Competitive Pricing' on T-50-Derived Advanced Fighter Trainer - Air Force Magazine

    16 décembre 2021 | International, Aérospatial

    Lockheed to Offer 'Competitive Pricing' on T-50-Derived Advanced Fighter Trainer - Air Force Magazine

    Lockheed Martin will offer a T-50A variant as the Air Force's Advanced Tactical Trainer, saying it will achieve “competitive pricing.

  • Securing the final frontier: Digital twins, satellites and cybersecurity

    3 novembre 2020 | International, Aérospatial, C4ISR, Sécurité

    Securing the final frontier: Digital twins, satellites and cybersecurity

    Kevin Coggins The United States and our allies are increasingly dependent on unfettered access to space. However, it has become abundantly clear that our space systems have significant cybersecurity vulnerabilities that our adversaries are eager to exploit. Earlier this year, William Akoto wrote about the growing constellations of satellites operated by private industry, led by SpaceX, Blue Origin and others: “If hackers were to take control of these satellites, the consequences could be dire. On the mundane end of scale, hackers could simply shut satellites down, denying access to their services. Hackers could also jam or spoof the signals from satellites, creating havoc for critical infrastructure. This includes electric grids, water networks and transportation systems.” Space Policy Directive 5, recently issued by the White House, notes that “cybersecurity principles and practices that apply to terrestrial systems also apply to space systems” and that we must integrate these principles and practices into every phase of the space system life cycle. SPD-5 is charting the right course toward assuring our cybersecurity in the space domain. This article highlights the unique vulnerabilities of space systems and how innovative solutions like “digital twins” can help us protect systems in orbit today and design more secure ones for the future. Cyberattacks on space systems — comprised of satellites, ground control stations, and user terminals (e.g., GPS receivers) — are appealing to nation-states, criminal groups, hackers and other bad actors. It's a tremendous opportunity to breach data and disrupt operations in a low-risk way with a low cost of execution. The different components that make up space systems each come with their own set of cyber vulnerabilities, the ground segment in particular. Some space systems were built with speed to market rather than cybersecurity in mind. In contrast, for traditional defense-focused space systems, a slower design and development process has introduced vulnerabilities as well. Space systems operating today may have taken a full 20 years to go from paper to launch and lack the capabilities to recognize or respond to today's cyberthreats. Space systems are increasingly interconnected — a malicious attack can easily spread from a single point of vulnerability in a ground station to the satellites. Cybersecurity in space systems has struggled to keep pace with the rapid evolution of threat actors and exploits. Given these challenges, how can organizations with space systems stay ahead of cyberthreats and protect their missions and users? The older approach of paper-based assessments has significant limitations, like the inability to duplicate reactions to all possible scenarios. At the other end of the spectrum, full-scale replicas are expensive and time-consuming to build. In the middle is the “digital twin” concept — a virtual mirror model that synchronizes a physical object with a cyber representation. With this approach, organizations can test a satellite in different scenarios to identify vulnerabilities and develop protection strategies, even before the satellite is built. One specific project that demonstrated digital twins' strengths and capabilities: testing Air Force GPS space systems for vulnerabilities after the passage of Section 1647 of the 2016 National Defense Authorization Act. Starting with a model-based system engineering review of thousands of pages of design documents, we built a digital replica of critical GPS Block IIR satellite components launched between 1987 and 2004 that ran on a single laptop with lightweight applications. Our digital twin created the foundation for a flexible cyber test bed — a suite of scalable software applications to demonstrate and validate cyber vulnerabilities and protection strategies as the system is designed or modified. The test bed can connect with assets beyond the network to generate data, provide war-gaming support and explore attack scenarios. We need this flexibility and functionality for future space system protection. The next generation of satellites will encounter more extreme service conditions and increased, simultaneous cyberattack vectors over longer periods of time. To respond to these challenges, these space systems will need increasingly complex designs, and with such complexity comes potentially greater vulnerability to cyberattacks and threats. Digital twins and model-based system engineering approaches can strengthen security throughout the acquisition and sustainment phases. Use them to: Develop system requirements and analyze design trades. Create test scenarios for requirements clarification and reference systems. Simulate threats, anomalies and impacts without risk to critical infrastructure. Assess the impact of new threats or operational scenarios on an on-orbit system design. What can space system acquisition professionals, developers and operators learn here? Digital twins offer an innovative approach that can streamline and strengthen the testing and design process of our space assets. They can also provide insights on as-built systems and enable the buydown of risks across the space system life cycle, enabling affordability across the entire system life cycle. Now is the time to leverage their capabilities, to ensure that the space infrastructure so vital to our security and American way of life has the protection it requires. https://www.c4isrnet.com/opinion/2020/11/02/securing-the-final-frontier-digital-twins-satellites-and-cybersecurity/

Toutes les nouvelles