Editor’s note: Hugh Montgomery, a legendary longtime officer in the intelligence community and a diplomat, died April 6. Just two weeks ago, he gave an interview to SIGNAL Magazine comparing global threats decades ago and now. We would like to honor his service in the cause of freedom by publishing this excerpt from that article about his experiences over the years. The complete article will appear in the May issue of SIGNAL.
Volant Associates LLC,* Chantilly, Virginia, has been awarded a $14,005,098 cost-plus-fixed-fee completion contract for Defense Intelligence Information Enterprise (DI2E) Framework Integrated Collaborative Environment. Contractor will foster interoperability and collaboration of mission systems and capabilities within the Department of Defense and intelligence community by planning, analyzing, evaluating, designing, developing and testing a feasibility demonstration model of a collaborative framework for members of the DI2E community. Work will be performed at Chantilly, Virginia, and is expected to be complete by April 13, 2019.
Booz Allen Hamilton Inc., McLean, Virginia (HHM402-15-D-0014), was awarded a five-year time and materials task order with a maximum ceiling value of $268,000,000 if all options are exercised. The task order is incrementally funded, with $796,000 funded in fiscal 2016. The task order will provide infrastructure engineering and operation services to support Defense Intelligence Agency and intelligence community information technology requirements under the previously awarded Enhanced Solutions for the Information Technology Enterprise (E-SITE), multiple award, indefinite-delivery/indefinite-quantity contract vehicle.
The world of intelligence sharing has gone from on a need-to-know basis between federal agencies to one in which those key players must, by necessity, combine disparate pieces of intel to ascertain a complete picture of potential threats.
Sierra Nevada Corp., Sparks, Nevada, has been awarded a $9,516,004 cost-plus-fixed-fee completion contract for enterprise engine software and hardware prototype system. Contractor will provide design and develop the technology and operational prototypes to satisfy the undersecretary of defense for intelligence goals of optimizing information sharing within the intelligence community (IC), and to enable decision making while maximizing IC capabilities to discover, access, retain, store, share, and exploit information.
U.S. lawmakers launched a bipartisan bid to boost the Department of Homeland Security's powers to better oversee cybersecurity compliance by federal agencies and intervene when they might fail to safeguard their networks.
The Senate bill would strengthen the department's ability to enforce cybersecurity standards governmentwide, and “in the event that a federal agency chooses not to do so, [the] DHS would have the authority to stand in … and prevent worse damages from occurring,” Sen. Susan Collins (R-ME) said in announcing her plans to submit the bill to the full Senate on Tuesday.
Every now and then a poll result pops up that surprises me. Results sometimes are counter-intuitive, or at least counter-narrative from what we're led to believe in major media coverage.
Case in point: An early 2015 poll shows that after nearly two years of a negative spotlight on the U.S. intelligence community, and particularly on the National Security Agency (NSA) and Central Intelligence Agency (CIA), the American people still have a positive view of the NSA and CIA. More startlingly, young Americans have more favorable views of NSA and CIA than older Americans!
Northrop Grumman Information Technology, Herndon, Virginia, was awarded a nearly $50 million contract to provide fully functional messaging systems to the operational messaging community, including Air Force Intelligence Surveillance, and Reconnaissance Agency, Department of Defense, intelligence community members, federal government departments/agencies and our coalition partners for messaging and data handling systems. Air Force Research Laboratory, Rome, New York, is the contracting activity.
Yesterday's blog coverage was just too short to include the depth of advice the experts at the Small Business Intelligence Forum shared, so here are a few more ideas: -Savvy SIGNAL Scape reader Ross Andrews, ARC Program Manager, Contractor - BVTI, beat this reporter to the punch on a very important item that should be on every small company's list if it wants to do business with the intelligence community: register with the Acquisition Resource Center. See his full comment at http://bit.ly/bXmzFM.
It's sometimes difficult to figure out what's the bigger secret - intelligence or the acquisition processes of the organizations that gather it. CIA, NSA, DIA plus 13 more agencies are collectively known as the intelligence community (IC), but that's where most of the similarity ends when it comes to these information hunters and gathers when it comes to purchasing goods, services or "carbon units." One fact is absolutely true and as open source as is possible: small businesses have advocates in IC agencies that fight tooth and nail in their interest. Some of these experts presented valuable secrets as well as common sense about how to capture the IC's business at the AFCEA International Small Business Intelligence Forum.
AFCEA's Intelligence Department has launched yet another blog. This one focuses on how technology can (or should) be used by intelligence professionals. Bob Gourley serves as the man behind the mask--er, blog. He's the founder and CTO of Crucial Point LLC, a technology research and advisory firm, and he is also the primary blogger at CTOvision.com. If that's not enough, Gourley is a former CTO of the Defense Intelligence Agency and a former senior executive with Northrop Grumman.
The intelligence community has been leading the government pack in its collaboration efforts. Christopher Dorobek points to 9/11 and other examples to show how government realized it needed a better way to collect, process and share intelligence data in this month's Incoming column, "The Intelligence Community Writes the Book on Collaboration."
Delays in obtaining security clearances are actually the second biggest problem for companies of any size that want to work with members of the intelligence community. The first is what many firms affectionately call the chicken-and-egg problem. Getting a security clearance for corporate personnel is not possible without having a contract that requires secured personnel; however, companies cannot be awarded a contract that requires security clearances until they have personnel that have received security clearances.
An impressive panel featuring participants from the some of the most well-known "three-lettered" intelligence organizations got down to the nuts and bolts of intelligence agencies' requirements. The discussion, which took place this morning at the AFCEA Small Business Intelligence Forum in Fairfax, Virginia, also centered on where the organizations plan to go in the near future in the information technology realm.
Representatives from the DIA, NGA and NSA shared their insights about how to get a foot in the door at intelligence community agencies during the second panel presentation at the AFCEA Small Business Intelligence Forum this morning in Fairfax, Virginia. All agreed that it requires more than the standard marketing approach but emphasized that it is worth the investment in time and talent.
Dr. William Nolte, research professor and director of the Center for Intelligence Research and Education, University of Maryland, laid the problems on the line regarding industry and intelligence community organizations during the AFCEA Small Business Intelligence Forum, which took place today in Fairfax, Virginia. Ranging from determining who is in charge to the acquisition process, Nolte forthrightly shared that the many of the systems that facilitate government-industry partnerships are broken.