Engility Corp., Mount Laurel, N.J., is being awarded a $12,490,000 modification to a previously awarded cost-plus-fixed-fee contract to exercise an option for engineering services in support of the Joint Precision Approach and Landing Systems and the Navy Unmanned Combat Aerial Systems programs. Services to be provided include requirements definition and analysis; prototyping; test and evaluation; technical assistance; system analysis; engineering; software development, integration and maintenance; test data acquisition; reduction and analysis; technical logistic support; configuration management; training support; and program and project management. The Naval Air Warfare Center Aircraft Division, Patuxent River, Md. is the contracting activity.
Exelis Inc., Van Nuys, Calif., is being awarded a $20,285,451 modification to previously awarded contract for AN/SPS-48G(V) radar modification kits to support the Recovery Obsolescence Availability Radar. AN/SPS-48 radars are installed on USN ships for three-dimensional air search. The modification kits are expected to increase operational availability and decrease operating and support costs. The Naval Sea Systems Command, Washington,, D.C., is the contracting activity.
Northrop Grumman Corp., Electronic Systems, Linthicum Heights, Md., is being awarded a $24,502,359 modification under a previously awarded cost-plus-incentive-fee, firm-fixed-price contract to increase the estimated ceiling cost for the Ground/Air Task-Oriented Radar engineering and manufacturing development phase and associated other direct costs to reflect the anticipated cost growth. The Marine Corps Systems Command, Quantico, Va., is the contracting activity.
The United States is one of the best in the world at protecting civil liberties, Gen. Keith Alexander, USA, director of National Security Agency (NSA) and commander of the U.S. Cyber Command said at the AFCEA Cyber Symposium in Baltimore.
Edward Snowden, the NSA contractor who leaked reams of data about NSA monitoring activities to the press, has been called a hero whistleblower by some, but Gen. Alexander contends that the employees at the NSA, FBI, CIA and Defense Department, who protect the nation while protecting civil liberties, are the real heroes.
As he has before, Gen. Alexander said the leaks have done irreparable harm to national security. “Public discussion of the NSA’s trade craft or the tools that support its operation provides insights that our adversaries—to include terrorists—can and do use to hide their activities. Those who wish us harm now know how we counter their actions. These leaks have caused significant and irreversible damage to our nation’s security. Historically, every time a capability is revealed, we lose our ability to track those targets,” he said. “What is going on with these leaks is unconscionable in my opinion.”
Gen. Alexander pointed out that approved processes exist for whistleblowers to express concern, and he pointed out that Snowden leaked information to the press rather than following those approved processes. “There are lawful and legitimate mechanisms to raise concerns about these programs. The NSA, the Defense Department and the director of national intelligence all have investigator generals who are in a position to do this. An individual acting nobly would have chosen one of those to voice his concerns,” he declared.
He also repeated claims that the monitoring programs have helped protect the United States and its allies on 54 occasions. He added that a recent oversight report found zero instances where the monitoring programs led to civil liberty violations.
Maj. Gen. Burke Wilson, USAF, director, space operations, Headquarters U.S. Air Force, told the audience that cyber is all about improving operational effectiveness in other domains. “Mission outcome is the only reason we invest in this. We believe it will generate in better mission outcomes across the service,” he stated.
Additionally, the cyber force includes the entire force—not just those trained to operate, maintain and defend the networks, Gen. Wilson offered. “If we give you a keyboard, you are an operator in this domain,” Gen. Wilson said. He also maintained that cyber operations need to follow similar processes to other operational domains. “My experience with operational commanders is that if they’re not familiar with something, they don’t trust it, and they tend not to use it,” he said.
Lt. Gen. Rhett Hernandez, USA, commanding general, Army Cyber Command, talked about the convergence of cyber with other domains. “From a joint perspective but also from the Army perspective, we see that the land and cyber domains are converging. Land is impacted by cyber, and the reverse is true. Humans today operate on both,” Gen. Hernandez pointed out. He added that other areas also are converging and that the convergence of cyber and the electromagnetic spectrum capabilities is key because military systems increasingly rely on both.
Rear Adm. Margaret Klein, USN, chief of staff, U.S. Cyber Command, discussed the need for cyber forces to provide real, demonstrable support to the combatant commands rather than be seen as spreading “fairy dust and calling it cyber.”
The U.S. Navy will announce the winner of the Next Generation Enterprise Network (NGEN) tonight, according to Brig. Gen. Kevin Nally, USMC, Marine Corps director of command, control, communications and computers and chief information officer. Gen. Nally discussed the pending decision while participating in a panel discussion on the final day of the AFCEA International Cyber Symposium in Baltimore.
NGEN is expected to be a multi-billion contract and will replace the Navy/Marine Corps Intranet (NMCI) network implemented about a decade ago. The NGEN contract differs substantially from that of NMCI. The NMCI contract called for a commercial firm to determine and provide network services to the Navy and the U.S. Marine Corps. For NGEN, the government wields control over the network.
The Marine Corps officially took full control of its network from contractors this month, and feedback from around the world has been positive, Gen. Nally indicated. “As of June 1, we became a government-owned, government-operated environment. That means we have more control of the network. We tell the contractors what to do, when to do it and how to do it. The perception throughout the Marine Corps from Okinawa to Europe, Korea, and around the world is that we’re getting things done more efficiently and effectively, and we’ve given flexibility back to the commanders,” Gen. Nally said.
The Marine general reminded the audience that the service started a few years ago to collapse five major unclassified networks into one under the Marine Corps Network Unification Plan. The plan should be complete in the next few years. “That is in full support of the Joint Information Network effort. We’re key players in that,” Gen. Nally said.
Robots slightly shorter than the average human may be able to connect portions of the offline world to the online world digitally. Knightscope Incorporated will soon be testing the K5 and K10 robots, which can autonomously prowl through large areas and small spaces, collecting significant amounts of data from their immediate surroundings. Applications include perimeter surveillance of military bases and inspection of power plants.
An integrated machine operating system autonomously guides each robot through defined boundary conditions; the sensor operating system collects data from the immediate surroundings. During beta testing scheduled for the end of this year, this data will be fed into the company’s network operations center. Use of the robots will be offered to customers through a machine-as-a-service subscription business model.
The K5 and K10 feature omnidirectional cameras, microphones, optical character recognition, thermal imaging and air quality detection.
Although pockets of resistance still exist, leaders in the Defense Department and military services largely agree on the need for a Joint Information Environment, according to panelists at the AFCEA International Cyber Symposium in Baltimore. The JIE will one day consolidate all of the department’s myriad networks into one while providing enterprise services, such as email, Internet access, common software applications and cloud computing. It is expected to increase operational efficiency, enhance network security and provide cost savings through reduced infrastructure and manpower.
Anthony Valletta, an independent consultant, led the panel with lessons he learned while serving as the assistant secretary of defense for command, control, communications and intelligence the Pentagon. “Don’t tell anyone about the savings you’re going to get because the comptrollers will take the money within two minutes after you’ve made the announcement,” and “get the buy-in from the services,” he warned.
The panelists agreed that buy-in mostly exists already. Lt. Gen. Mark Bowman, USA, director of command, control, communications and computers for the joint staff, offered some blunt comments on the JIE. He indicated that the joint environment is his highest priority and described the joint environment as the way to the future. “We have no choice. We have to be interoperable day one, phase one, to plug into any operation anywhere in the world, whether it be for homeland defense, disaster relief here in the United States or some combat operation somewhere around the world with coalition partners,” Gen. Bowman declared.
Lt. Gen. Susan Lawrence, U.S. Army chief information officer, spoke passionately about the need for JIE, calling it “absolutely essential.” Gen. Lawrence said the real attraction of JIE for the warfighter is that “we’ve got to be able to deploy on little notice into any austere environment.”
The Defense Information Systems Agency (DISA) is undergoing a substantial organizational restructuring, which is mostly complete and will be “set in concrete” July 15th. The reorganization will ensure the agency can support the military services, the joint staff, and all warfighting customers as the military moves to the Joint Information Environment, said Lt. Gen. Ronnie Hawkins, USAF, DISA director.
The reorganization includes consolidating budgeting-related organizations under the office of the comptroller. The agency also has established a customer resource management office for customer outreach and is looking to optimize operational offices. Additionally, DISA has created a Joint Technical Synchronization Office that will “work hand-in-glove” with the agency’s JIE office that is designed to help the agency move toward the JIE as expeditiously as possible.
The moves have taken place over the past month and will be complete next month.
Gen. Hawkins made the announcement while during his luncheon keynote address on the second day of the AFCEA International Cyber Symposium.
The U.S. Defense Department is building a single security architecture that ultimately will eliminate firewalls in the future, according to Lt. Gen. Ronnie Hawkins Jr., USAF, Defense Information Systems Agency (DISA) director.
The future architecture, the plans for which are not yet set in stone and will likely change, the general cautioned, will be designed to protect data rather than networks. “In the past, we’ve all been about protecting our networks—firewall here, firewall there, firewall within a service, firewall within an organization, firewalls within DISA. We’ve got to remove those and go to protecting the data. You can move that data in a way that it doesn’t matter if you’re on a classified or unclassified network, depending on someone’s credentials and their need to know,” he declared.
“We want to be able to normalize our networks to where you can have the collaboration and information moving over our networks and you don’t have to have the different firewalls, the separate networks, to get those things done,” he added. Additionally, the department can realize significant savings in instrumentation—for example, by moving from “hard phones” to “soft phones,” he said.
Gen. Hawkins stressed the importance of getting “the information to the soldier, sailor, airman, Marine, Coast Guardsman, wherever it is they may be.”
The single security architecture will improve command and control capabilities, including cyber command and control, he said.
He also discussed the importance of cloud computing. The Defense Department is in the infant stage of deciding how to build the cloud and whether to use a private, public or Defense Department-owned cloud. “We want to do that in fiscal year 14 so that all of this can be automated, and we’re working feverishly to get that done,” he said.