July 1, 2019
By Chris Nissen
Bill Bickert, assistant commander for supply chain management policy and performance, Naval Supply Systems Command, visits the command’s Fleet Logistics Center–Jacksonville, Florida, headquarters. Supply chain monitoring software is useful; however, ensuring suppliers are providing clean components is crucially important as well. Photo by Carol Williams

Adversaries are exploiting the inherent vulnerabilities of U.S. military supply chains that involve tens of thousands of private sector providers from all over the globe. Attack operations include stealing valuable technical data; striking critical infrastructure, manufacturing and weapon systems control systems; corrupting the quality and assurance across a broad range of product types and categories; and manipulating software to access connected systems and to degrade systems operation integrity.

September 24, 2018

Prescient Edge Corp., McLean, Virginia, has been awarded a base-year plus four option years, with a potential six-month extension of services, time and materials contract (HHM402-18-C-0056) with an estimated ceiling of $65,080,499 to provide counterintelligence activity support services for the Defense Intelligence Agency’s (DIA) Office of Counterintelligence Counterespionage Division. Through this award, DIA will procure services to identify and neutralize threats to DIA personnel, information and missions. Work will be performed in the National Capital Region with an expected completion date of March 23, 2024. Fiscal year 2018 operations and maintenance funds in the amount of $7,286,800 are being obligated at time of award.

May 13, 2016

ManTech Advanced Systems International Inc., Herndon, Virginia, is being awarded a $32,068,507 cost-plus-fixed-fee contract (including options) for advisory and assistance services for counterintelligence in support of technical, engineering, advisory and management support. This contract provides support for the Defense Agency Counterintelligence Program missions and functional areas authorized by Department of Defense Directive 5240.02 that detect, identify, assess, exploit, penetrate, degrade and counter or neutralize intelligence collection efforts, other intelligence activities, sabotage, espionage, sedition, subversion, assassination and terrorist activities directed against the