Acquisition

April 1, 2014
By George I. Seffers
The sensor data subsystem of the Common Aviation Command and Control System, which is being evaluated and tested by MCTSSA personnel, will fuse sensor input from a variety of sensors and weapon systems, including unmanned aerial vehicles and the F35B Joint Strike Fighter.

A tactical technology support organization that has been serving the U.S. Marines for decades is beginning to find a role in the cyber domain. The group offers a broad range of services, including test and evaluation, engineering and network integration. It also supports users across the Defense Department, U.S. government and allies.

March 11, 2014
By George I. Seffers

It is not surprising that cybersecurity would dominate the discussion on the second day of the AFCEA Homeland Security Conference in Washington, D.C. But the depth and breadth and variety of topics surrounding cybersecurity and information protection in all its forms indicates the degree to which the information security mission has engulfed every department and agency at all levels of government.

March 11, 2014
By George I. Seffers

Chief information security officials from various agencies voiced support for the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Program, which is designed to fortify computer networks across the federal government. The officials spoke out in support of the program while serving on a panel during the AFCEA Homeland Security Conference, Washington, D.C. Panel moderator John Streufert, director of Federal Network Resilience at the Department of Homeland Security, took the opportunity to put some rumors to rest.

March 10, 2014
George I. Seffers

The U.S. Customs and Border Protection (CBP) agency is only interested in mobile communication if it allows the agency to perform functions it could not perform otherwise, Mark Borkowski, component acquisition executive and assistant commissioner with the CBP Office of Technology Innovation and Acquisition, told the audience at the AFCEA Homeland Security Conference in Washington, D.C., on Monday.

February 28, 2014
By Rita Boland

As the U.S. Army’s Network Integration Evaluation continues to build on its positives and address its challenges, progress is being made in acquiring more capability from small business through efforts at the event.

February 21, 2014
By George I. Seffers

When I first contacted the Pentagon public affairs office for an interview on the Better Buying Power initiative, I was willing to interview any subject matter expert they could line me up with. Shortly after I sent in my query, the government shut down, the public affairs source I was working with was furloughed and my query was going nowhere fast. 

February 14, 2014
By Robert K. Ackerman
(r-l) Capt. Dale Rielage, USN; Capt. Stuart Belt, USN; Capt. David A. Adams, USN; Capt. James Fanell, USN; Dr. James R. Holmes; and panel moderator Rear Adm. James G. Foggo III, USN, exchange views in a panel titled “What About China?”

Internal change may be the key to managing external change as the U.S. Navy, the U.S. Marine Corps and the U.S. Coast Guard enter a new era of limited budgets and unlimited global challenges. From research and development to acquisition, these services are looking toward changing methods and technologies to keep the force viable and accomplish their missions. Meanwhile, a range of adversaries continue striving to find and exploit weaknesses in U.S. capabilities and operations.

March 1, 2014
By Al Mink

It’s impossible these days to attend a U.S. Defense Department information technology presentation without repeated mentions of the Joint Information Environment (JIE). But industry representatives often ask, “What does JIE mean to me?” I did some digging into the environment—leveraging the expertise of the AFCEA Technology Committee, discussions with several senior defense information technology leaders and insights from colleagues at my firm who participated in JIE Increment 1 in Europe.

March 1, 2014
By Robert K. Ackerman
Romanian land forces conduct a patrol in Afghanistan, where they have served as part of the International Security Assistance Force. As a member of NATO, Romania is modernizing its military to fulfill a role as a regional security force.

Romania has opted to extend its force modernization period rather than cut important purchases as it deals with its version of the global budget crisis. Despite suffering from the severe economic downturn that began more than five years ago, the Black Sea country continues to upgrade its military with the goal of being a significant security force in an uncertain region.

March 1, 2014
By Rita Boland
U.S. Immigration and Customs Enforcement’s Homeland Security Investigations (HSI) directorate is involved in a multilayer security approach to protecting U.S. interests.

Homeland security officials are battling privacy and technology issues amid the new social media era that offers both challenges and opportunities. Just as new technologies and information sharing architectures have improved interagency data sharing, new sources of potentially valuable information have emerged to vex planners who must handle technical obstacles and personal rights.

March 1, 2014
By George I. Seffers
U.S. Coast Guard Cutter Sapelo and Royal Netherlands Navy Offshore Patrol Vessel HNLMS Holland search Caribbean Sea waters for bales of contraband. SeaWatch is the Coast Guard’s next-generation command and control system for cutters.

By the end of this fiscal year, the next-generation command and control system for much of the cutter fleet should be installed on the U.S. Coast Guard’s 270-foot cutter class, and the system is now being considered for inclusion on 225-foot and 110-foot vessels. The system, called SeaWatch, combines navigational and tactical, optical surveillance and communications into one situational awareness picture; provides commonality across the fleet; and replaces an aging system that has outlived its usefulness.

February 11, 2014
By Robert K. Ackerman

Business as usual will weaken rather than strengthen the U.S. military in this time of budget cuts. The force must rely on technology development to ensure that it does not maintain current force sizes at the expense of enablers.

February 11, 2014
By Robert K. Ackerman

The U.S. military must make difficult decisions that will define the force for years to come amid a substantial risk to readiness and effectiveness, according to a Defense Department official. The nation faces new challenges throughout the world coupled with severe budget cuts at home, and the response to these issues must be taken carefully with a long-term strategic look.

February 1, 2014
By Col. Herbert Kemp, USAF (RET.)

As the national security establishment emerges from more than a decade of counterinsurgency warfare in Iraq and Afghanistan and refocuses on other global priorities, the means by which intelligence, surveillance and reconnaissance (ISR) supports those priorities must change as well. ISR operations in Iraq and Afghanistan have been conducted in relatively permissive air environments that have allowed the use of long-dwell airborne platforms to provide sustained surveillance of targets of interest. This has led to an imagery-, and more specifically, full motion video (FMV)-intensive pattern of collection. While these conditions may be present in some future conflicts, they do not describe many of the scenarios envisioned for potential contested environments in the future.

February 1, 2014
By George I. Seffers
An H-60S helicopter conducts deck landing qualifications on USS Milius destroyer off the coast of Guam. Milius was the first ship to begin installing CANES and will serve as the operational testing platform for the next-generation afloat network.

U.S. Navy officials expect to award a full-deployment contract for a new shipboard network this spring, and they plan to install the system on nine ships this year. The network provides commonality across the fleet, replacing multiple aging networks, improving interoperability and driving down costs. The Common Afloat Networks and Enterprise Services (CANES) program represents a new business model for delivering capability to the fleet, Navy officials say. The program consolidates five legacy networks into one, which enhances operational effectiveness and provides better quality of life for deployed sailors.

February 1, 2014
By George I. Seffers
The USCGC Waesche, the second of the National Security Cutter class, was outfitted in 2013 with a suite of technologies procured under the Coast Guard’s C4ISR project.

When the U.S. Coast Guard fields its newest cutter next year, the ship will be equipped with an information technology package that offers common tools and capabilities among the cutter and aviation fleets. The technology suite will improve interoperability across the service and with other agencies, and it enhances situational awareness while providing flexibility for future upgrades.

January 1, 2014
By Paul A. Strassmann

The U.S. Defense Department now is advancing into the third generation of information technologies. This progress is characterized by migration from an emphasis on server-based computing to a concentration on the management of huge amounts of data. It calls for technical innovation and the abandonment of primary dependence on a multiplicity of contractors.

January 1, 2014
By Rita Boland

Fiscal constraints and technology evolution are forcing the government to re-evaluate procurement efforts with a renewed vigor. Industry has suggestions for improving processes, but progress will require a different level of dialogue between companies and their public-sector clients. Company leaders believe they can help government overcome some of its issues because they understand both realistic technical solutions as well as the effect policies have on acquisition cycles. But they need the opportunity to show what is available.

January 1, 2014
By Rita Boland
A 2nd Brigade, 1st Armored Division Soldier stands before a Stryker vehicle integrated with Warfighter Information Network-Tactical Increment 2 mobile network equipment and receives data from his handheld Nett Warrior device during last fall’s Network Integration Evaluation 14.1.

The U.S. Army is adjusting its Network Integration Evaluations to facilitate acquisitions more rapidly. Calls from industry and soldiers themselves have precipitated the moves. As companies face reduced funding streams, and technology advances in increasingly shorter intervals, implementing briefer time frames between testing and deployment is imperative to remaining viable on and off the field.

January 1, 2014
By George I. Seffers
Historical trends indicate that major defense programs like the Joint Strike Fighter could be endangered by deeper than expected budget cuts.

Historical trends during military drawdowns indicate that current Defense Department budget cuts could last for more than a decade. This situation could endanger major acquisition programs and negatively impact the ability of the United States both to pivot forces to the Asia-Pacific region and to maintain a presence in the Middle East, experts say. But the department may have a short window of opportunity to reconcile strategy with lower budgets.

Pages