Booz Allen Hamilton, McLean, Virginia, has been awarded a time and materials contract (HHM402-19-C-0058) with a ceiling of $89,993,973 to provide support services for the Defense Intelligence Agency's (DIA) Directorate of Analysis. Through this award, DIA will procure services for the production, dissemination and tracking of DIA's finished intelligence products, including the development and maintenance of applications and tools used to perform the mission. Work will be performed in the National Capital Region with an expected completion date of February 28, 2025.
BAE Systems Technology Solutions & Services Inc., Rockville, Maryland (HHM402-19-D-0005); Bluehawk LLC,* West Palm Beach, Florida (HHM402-19-D-0008); Booz Allen Hamilton Inc., McLean, Virginia (HHM402-19-D-0007); CACI Inc.
Company Deloitte Consulting LLP, Arlington, Virginia, has been awarded a $39,933,653 firm-fixed-price contract for technical and programmatic expertise and recommendations. This contract provides for force optimization analysis support to HQ Air Combat Command. Work will take place at Joint Base Langley-Eustis, Virginia, and is expected to be completed by June 15, 2022. This contract is the result of a competitive acquisition and three offers were received. Fiscal year 2019 operations and maintenance funds in the amount of $4,949,388 are being obligated at the time of award.
Artificial intelligence can analyze vast amounts of information, identifying patterns and anomalies at a speed and scale beyond human capacity. To make it an invaluable part of defense, the goal will be to create cybersecurity systems that can anticipate national security threats. Once systems can automatically reconfigure themselves and their security controls to prevent any potential breaches, the next step will be to move to machines with the power to make their own decisions.
The Boeing Co., St. Louis, Missouri, is awarded $90,428,967 for modification P00002 to a previously awarded cost-reimbursable contract (N00019-18-C-1012). The modification provides for the performance of studies and analysis related to the MQ-25 unmanned air vehicle engineering, manufacturing and development phase of the program. Work will be performed in St. Louis, Missouri, and is expected to be completed in August 2024. Fiscal year 2019 research, development, test and evaluation (Navy) funds in the amount of $10,000,000 will be obligated at time of award; none of which will expire at the end of the current fiscal year. The Naval Air Systems Command, Patuxent River, Maryland is the contracting activity.
Cloud Lake Technology, Herndon, Virginia, has been awarded an $8,875,620 modification (P00012) to contract FA8075-17-C-0002 for Information Analysis Center Program Management Office (IAC PMO) support. IAC PMO support services provides program management analysis, acquisition management, operations analysis, financial analysis, process improvement, strategic communications and performance measurement support. This modification provides for the exercise of an option for additional services under the basic contract, and brings the total cumulative face value of the contract to $21,870,362. Work will be performed at Fort Belvoir, Virginia, and is expected to be completed by March 31, 2020.
Warfighters must keep their eye on the metrics to manage and secure military networks.
Network systems are similar to icebergs. Less than 10 percent of their volume is visible to the user of an application. Almost all of the hidden code, measured in hundreds of thousands of lines of logic, is invisible in the operating system, in the database management software, in security safeguards and in communication routines. The problem with such software is that for each application—and the U.S. Defense Department has more than 7,000 major software projects—contractors will develop the hidden coding to suit separate requirements.
U.S. Defense Department’s strategic plan and cloud computing mesh well.
Cloud computing could give a major assist to the U.S. Defense Department’s information technology strategy for implementing network-centric operations.
Federal investments advance national threat protection capabilities.
Unmanned aerial vehicles are used extensively in current operations and to some degree to patrol borders; however, size and power requirements may limit extensive use in homeland security efforts.
Data analysis continues to prove difficult in multilevel security realm.
Accredited, tested solutions could allow military decision makers and intelligence analysts to access information and make decisions simultaneously using information that resides in multiple security classifications. However, although the U.S. Defense Department is moving forward to address information-sharing challenges, it has encountered difficulties in proving and certifying these technologies in a testbed environment.
Administrators strive for free flow of information between nations.
The debate between the European Union and the United States over protecting personal information represents a fundamental cultural difference that could alter the future growth of electronic commerce. Throughout this debate, these differences have threatened to bring data transfers from within the European Union to the United States to a grinding halt.
Distance education specialists agree that learning has never been a place--it has always been a process.
The smell of fat crayons, the snap of three-ring binders and the crack of book spines as they open for the first time bring back memories of those old school days. Students today, both in the classroom and on the job, are more familiar with the hum of a hard drive and glow of a monitor screen. One thing, however, has not changed--the up-front expenses for an education rarely reflect the final cost.
Experts debate accommodation of third-generation communications devices.
Open systems require multilevel security solutions.
Government agencies and commercial companies that are striving to share data to protect citizens or improve service to customers are discovering that as access to data increases, information security challenges grow exponentially. To address this concern, trusted security approaches emerging from government applications offer information assurance at both the operating-system and relational-database-management levels.
Problem may be more widespread than officials acknowledge.
Having effective sensors, fire control, ordnance and control systems is only part of the picture for building a capable shipboard combat system. The task that makes all of these play together is called combat system integration, or CSI.
Many foreign navies rely on CSI to pull together shipboard combat systems that have components originating from different suppliers. If integration is not done well, it can be very costly and take years to do what should take months. Valuable warships needed for naval missions can be unavailable for years. The result is best described as combat system dis-integration.
Technology advances are balanced against national, institutional needs.
Three important decisions reached at the recent World Radiocommunication Conference may hold substantial ramifications for the United States and the global telecommunications community as a whole. Many of the issues discussed at the conference are illustrative of the realities affecting both commercial and U.S. Defense Department spectrum usage today.
Changes in government procurement policies may play critical role.
After years of economic stagnation, the satellite industry could find that a turnaround is about to begin. Early returns point to a resurgence in interest and visibility for a weathered, yet optimistic, industry. Now more than ever, the government community recognizes that the commercial satellite industry plays an essential role in both international and homeland security. Several important occurrences in 2003 have set the stage for a turnaround.
Advanced technologies lie at the heart of most efforts.
The focus of long-term changes underway in China’s military is on regional rather than global improvements. This approach includes deploying systems that have only a local reach as well as developing or acquiring advanced technologies for specific military units or elements.