Weekly Insider
In This Issue: May 27, 2014 
ABOUT THE WEEKLY INSIDER'S MISSION:  GTSC was started by small business CEOs to build a community of people and companies devoted to the homeland and national security mission.  The mission of our Weekly Insider is to summarize and consolidate weekly news you should know from DHS, DOD, ODNI, DOJ and DOS and GSA or other agencies related to procurement and acquisition as appropriate.  We cover major missions, initiatives and opportunities in these agencies in addition to major legislative or agency initiatives that would have an impact on our community.  If you need additional information or have suggestions on how we can improve our content or coverage, please let us know!
mentorawardsJUNE 12:  THE MENTOR AWARDS & MEGA-MATCHMAKING

 

JOIN US for 
The Mentor Awards
JUNE 12, 2014 
Arlington, VA

Contact us for information on sponsorship. 

 

The Government Technology & Services Coalition and Government Contracting Weekly partnered to recognize exceptional mentors in the government contracting community. 

 The awards program recognizes and salutes government contractors for their leadership and concrete actions in assisting small government contracting firms through mentoring, training, inspiration, teaming and cooperation.  The awards recognize that mentoring is critical to the contracting community.  Large firms that mentor small companies play a critical role in saving their Federal clients money and time, commit to putting action behind the mantra of bringing "innovation and creativity" to the Federal mission and bring a higher level of professionalism to the contracting community.   

 

Honoring our Federal Small Business Titans:  

 

Frank Barros 

Program Analyst, Science & Technology Directorate, U.S. Department of Homeland Security

Sandra Broadnax 

Director, Small Business Programs, National Geospatial Intelligence Agency

Peggy Butler

Deputy Director, Army Office of Small Business Programs, Subcontracting and Mentor Protege Program Manager, U.S. Department of Defense

Elissa Sobolewski 

SBIR Ptorgram Director, Science & Technology Directorate, U.S. Department of Homeland Security   

 

Federal Small Business Titan of the YEAR:

 

Kevin Boshears

 Director, Office of Small & Disadvantaged Business Utilization, U.S. Department of Homeland Security 

 

 

KEYNOTE SPEAKER ANNOUNCED FOR MATCHMAKING SESSION

Les Rose is the Corporate Vice President & President of L3 National Security Solutions group. He also serves as the co-chair of the GTSC Mentor Forum. L-3 NSS' six operating units deliver full-spectrum cyber operations, enterprise and mission information technology, intelligence operations support and operational infrastructure solutions.
Mr. Rose's career has spanned over 40 years of management and engineering. Upon completing a successful 20-year career as an officer with the U.S. Army Corps of Engineers and as an Army pilot, Mr. Rose joined Delta Research Corporation, an L-3 legacy company in 1990. He was promoted to president of Delta Research, and through a series of acquisitions and promotions became president of L-3 STRATIS one of the largest division of the global defense leader. Today Mr. Rose serves as president of both L-3 STRATIS and L-3 NSS. Mr. Rose holds a Bachelor of Science in Mechanical Engineering from the South Dakota School of Mines & Technology and a Master of Science in Civil Engineering from the University of Michigan.

 

GTSC MEGA MATCHMAKING

Are you a small business interested in teaming partners?  Do you work on:

  • information technology
  • identity management
  • configuration management
  • help desk.call center support
  • warfighter support services
  • C4ISR experience
  • Maritime/Port security operations services
  • Wireless Network technical support
  • Health IT
  • information security/information assurance
  • IA support for validation testing
  • logistics support
  • networks services
  • modeling and simulation
  • training courseware capabilities
  • Intelligence Community IT services 
  • or other services?

Join us for an afternoon of new contacts, teaming and insight into new market areas.

 

TENTATIVE AGENDA - GTSC Small Business Mega-Matchmaking & The Mentor Awards

1:00 pm  Introduction 

1:15 - 4:15 pm  Matchmaking with GTSC Mentors and other large companies

4:30 pm  Small Business Government Panel

5:30 pm  The Mentor Awards program and reception

 

ALREADY CONFIRMED FOR MATCHMAKING:

 

AGILEX
ALION
Alion Science & Technology
CACI
EAGLE RAY
GDIT

GDIT
GRANT THORNTON


HARRIS

Harris
L3 NSS

 

MOTOROLA


NTT DATA

NTT DATA
TASC
 

AECOM


CSC





 
Special Thanks to our Marketing Co-Hosts:
 
 
 
 
 

JUNEkellyhoggan 26:  KELLY HOGGAN, TSA
Save the date!

 

Insight Session with
Kelly Hoggan
Assistant Administrator, Security Operations
Transportation Security Administration
JULY 26, 2014 
10:00 pm - 12:00 pm
Arlington, VA

REGISTER

Join GTSC for an Insight Session with TSA's Kelly Hoggan, Assistant Administrator of Security Operations.  Tasked with assuring the security of all modes of transportation, including cargo placed abroad airplanes also carrying passengers, TSA is charged with 100% cargo screening.  TSA has achieved these mandates and screens 100% of cargo on 96% of the flights originating in the United States.  Eighty-five percent of passengers on flights originating in the U.S. are on planes where all of the cargo has been fully screened; 50% of air cargo on passenger carrying aircraft is screened.

 

Join us to hear more about the Office of Security Operations, their mission, accomplishments and challenges.  Mr. Hoggan will discuss their work with the air cargo community, TSA's multi-layered, high-tech, industry-cooperative approach, the agency's use of "strikes" and their screening of smaller airports.  He will also discuss the new air cargo regulations are also requiring 100,000 more background checks requiring more robust checks and visibility on shipping companies and their employees.  Learn more about Kelly Hoggan.

gtscanniversaryJULY 9:  GTSC'S 3rd ANNIVERSARY
Save the date!

 

Join us to Celebrate 
GTSC's 3rd Anniversary Awards
"A Stroll Through Spain"
JULY 9, 2014 
5:30 pm - 9:00 pm
Arlington, VA

REGISTER

The Government Technology & Services Coalition is celebrating its 3rd Anniversary with our annual reception and awards.  Join us to honor our MVP's in the Federal government, network with colleagues and friends, and enjoy great food and music.  

 

NOMINATE AN MVP!

Last year the Coalition honored Charlie Armstrong, CBP for our Most Valuable Player Award.  We invite you to nominate someone you believe has made tremendous strides to help the nation achieve its homeland and national security mission (in DHS, DOD, ODNI, DOJ or State).  Please email us with your nomination with the following information:

Why do you believe this person is the MVO?

What tangible accomplishments has the person made/contributed that forwards the homeland security mission?

 

NOMINATIONS WILL BE ACCEPTED UNTIL MAY 25!



Dear GTSC Community,

 

As CEO of the Security Industry Association (SIA), it's my pleasure to welcome Dr. Reginald Brothers, undersecretary of homeland security for science and technology, as a keynote speaker for the SIA Government Summit on June 3-4 at the W Hotel in Washington, D.C. Dr. Brothers is newly confirmed as undersecretary, so this is one of the first opportunities to hear about his R&D priorities. Join us for the SIA Government Summit!  

Hope to see you there,   

Don Erickson  


                           CLICK THE BANNER TO REGISTER FOR THE SIA GOVERNMENT SUMMIT

dhsnewsDEPARTMENT OF HOMELAND SECURITY NEWS

ASSESSING PERSISTENT AND EMERGING CYBER THREATS TO THE U.S. HOMELAND

Larry Zelvin, the Directory of the National Cybersecurity Communications Integration Center (NCCIC) testified on May 21 before the House Committee on Homeland Security, Joint Subcommittee in a hearing titled "Assessing Persistent and Emerging Cyber Security Threats to the U.S. Homeland". In his testimony, Director Zelvin spoke about efforts spearheaded by the Department of Homeland Security (DHS) to assess persistent and emerging cyber threats to the U.S. Homeland. This includes threats such as "Heartbleed", Point of Sale (POS) compromises against private retailers, Distributed Denial of Service (DDoS) attacks against banking and financial sectors and cyber-attacks against the energy sector. In addition, DHS is making efforts to enhance the security of cyber infrastructure in the U.S.  DHS is enhancing the security of cyber infrastructure through several key programs. The Continuous Diagnostics and Mitigation (CDM) program enables Federal agencies to identify network security issues, including unauthorized and unmanaged hardware and software, known vulnerabilities, weak configuration settings, and potential insider attacks. CDM also allows for agencies to prioritize responses and provides diagnostic sensors, tools and dashboards which provides increased situational awareness. The National Cybersecurity Protection System (NCPS), a key component of which is referred to as EINSTEIN, is an integrated intrusion detection, analysis, information sharing, and intrusion prevention system, utilizing hardware, software, and other components to support DHS's mandate to protect Federal civilian agency networks.  Heartbleed was a vulnerability exploited in the widely used OpenSSL encryption software servers which gave unauthorized users access to encrypted internet traffic. When NCCIC learned of the vulnerability, it released a warning and information to mitigate damage for the public and private companies. In addition, while partnering with the Department of Defense and Justice, as well as private sector partners, the NCCIC created a number of compromise detection signatures for the EINSTEIN system that was also shared with additional critical infrastructure partners. After scanning civilian agencies .gov websites and servers, DHS reached out to cyber professionals from all industries to compile information on damage control and mitigation of a future vulnerability.  For POS compromises DDoS attacks and attacks made against the energy sector, DHS has been releasing information to private industries and the general public on how to mitigate the effects of said attacks and measures to be taken to help prevent future attacks. DHS has gone as far as to scan and clean all government computers which may have been infected with botware, contributing to DDoS attacks against the banking and finance industries. >>READ the testimony

 

EXAMINING THE SECURITY OF FEDERAL FACILITIES 

The director of National Protection and Programs Directorate (NPPD) Federal Protective Service (FPS), Eric L. Patterson testified on May 21 before the House Committee on Transportation and Infrastructure, Subcommittee on Economic Development, Public Buildings and Emergency Management in a hearing "Examining the Federal Protective Service: Are Federal Facilities Secure?" In light of recent security breaches at military bases and federal facilities, FPS has present training and physical security assessment practices before Congress and implementation of recommendations made by the Government Accountability Office (GAO). 

 FPS employs a number of law enforcement and protective security officer professionals who provide security for over 1.4 civilian employees at over 9,000 federally owned facilities. These security professionals are trained for 17 to 36 weeks to prepare them with arrest techniques, firearms, x-ray machines and magnetometers or situations that require defensive techniques and active shooter response. In addition, FPS security professionals are required to periodically recertify weapons skills, CPR and first aid in addition to certifications for

 Complementing the training required of security professionals, FPS regularly performs physical security assessments if federal facilities. FPS utilizes the Modified Infrastructure Survey Tool (MIST) to document the existing protective posture at a facility and compare how a facility is or is not meeting the baseline level of protection for its Facility Security Level (FSL) as set forth in the Interagency Security Committee's (ISC) Physical security Criteria for federal facilities standards and ISC's design-base threat report.

 FPS recognizes that ensuring the physical security of over 9000 facilities is a difficult task and that at times FPS fails to address certain security threats. A GAO study recommended many improvements or changes in policy which could better ensure security and threat management. FPS is actively working with the GAO in addressing the recommendations through feasibility studies and finding the best practices to implement the recommendations. >>READ more

 

CONGRESSIONAL BUDGET OFFICE COST ESTIMATE FOR H.R. 4228

On May 21st the Congressional Budget Office (CBO) released a cost estimare for H.R. 4228. H.R. 4228 would direct the Department of Homeland Security (DHS) to improve the accountability, transparency, and efficiency of its major acquisition programs. The bill would specify procedures for the department to follow if it fails to meet timelines, cost estimates, or other performance parameters for these programs. In addition, H.R. 4228 would require DHS to prepare a comprehensive report each year on the status of its acquisition program and would direct the Government Accountability Office (GAO) and the DHS Inspector General to review and report on certain issues related to departmental acquisition policies.

Based on the cost of similar activities, CBO estimates that the new DHS administrative procedures as well as additional reviews and reports by GAO and DHS required by H.R. 4228 would cost $1 million in 2015 and less than $500,000 annually thereafter, assuming availability of appropriated funds. CBO expects that DHS will continue to seek to improve its efficiency in acquiring goods and services under current law; we have no basis for estimating any savings in procurement costs that might occur as a result of the bill's directives to the department.

 H.R. 4228 contains no intergovernmental or private-sector mandates as defined in the Unfunded Mandates Reform Act and would impose no costs on state, local, or tribal governments. 

>>READ more

 

DHS CYBERSECURITY RETENTION ACT OF 2014

Senator Tom Carper of Delaware sponsored the Cyber Security Workforce Retention Act of 2014 which would give DHS improved hiring authority of cybersecurity professionals. Hiring and retaining top cybersecurity talent of the federal government is extremely difficult. There is large demand for cybersecurity professionals in both government agencies and the private sector. The private sector has the competitive advantage in that it can offer superior salaries, benefits and other incentives whereas the federal government is hindered by law to cap salaries at certain grades and steps.

Under existing law, the Department of Defense (DOD) and National Security Agency (NSA), has personnel authorities that have been critically important in their recruitment and retention of cyber professionals for years. These authorities enabled the DOD and NSA to build and maintain a strong cybersecurity workforce. The Secretary of Defense can establish positions in the excepted service that would permit the Secretary to make direct appointments, set rates of basic pay and provide additional compensation, benefits, incentives and allowances. Essentially these authorities allow DOD and NSA to hire faster, pay more, and offer retention bonuses. Even though DHS also has a broad cybersecurity mission, it does not currently have any of these hiring authorities in law, putting DHS at a disadvantage against the private sector, the DOD and NSA. This bill seeks to extend comparable hiring authorities of the DOD and NSA to DHS. >>READ more

 

DHS TAKES OVER SECURITY OF ITS HEADQUARTERS 

The Department of Homeland Security (DHS) has taken over security of its own headquarters in Washington, DC, replacing the Federal Protective Service (FPS) in this capacity. This leaves one to wonder, why did DHS decide for a change in the physical security of its own facility? In testimony presented to Congress on May 21st, Director of FPS, Eric Patterson stated that performance was not a leading reason behind the change. This may not be the case because an HSToday.us article paints a very different picture. Testing carried out by the Government Accountability Office (GAO) found that FPS practices may not have been sufficient to provide adequate security to a number of federal facilities including DHS headquarters. During these penetration tests, GAO found that many of FPS security professionals lacked screener training for x-ray machines or magnetometers and lacked training for active-shooter response. In addition, it was found there was no clear authority for how local or state law enforcement should respond to such an event.The HSToday.us articles goes further to say that physical security assessments of federal facilities were behind schedule and that FPS was not making the security assessments in agreement with federal standards. This leaves government agencies blind to security vulnerabilities and unprepared for situations such as active-shooter, terrorist attacks or criminal activity. Patterson did admit that planning and assessing physical security of government facilities was a slow and difficult process but it has been augmented through the use of the Modified Infrastructure Survey Tool (MIST). MIST assesses federal facilities on an interim basis until FPS is able to develop a long term solution. In addition, MIST does not incorporate the consequences of an undesirable event; MIST compares the disparities identified against the baseline level of pretection specified in the Interagency Security Committee (ISC) standards. Patterson continued to say that FPS has developed a more advanced version of the program, MIST 2.0 which aims to simplify user interface and hasten the risk assessment process. >>WATCH the hearing

 

JOIN GTSC ON SOCIAL MEDIA



FOLLOW GTSC ON TWITTER
or click the birdie



LIKE GTSC ON FACEBOOK
or click the icon
 

DODNEWSDEPARTMENT OF DEFENSE NEWS

VETERANS AFFAIRS AND SHINSEKI TESTIMONY

The Department of Veterans Affairs (VA) has been struggling with an overburdened system due to an increase in veterans requiring medical assistance. The VA has been doing everything it can to get through the backlogs of veterans waiting for claims and doctors' appointments. But not all of the VA offices have been operating on federal standards. A CNN article found that the Phoenix VA Health Care System (PVAHCS) has been accused of falsifying wait time records after 40 veterans died while waiting to see doctors. Top VA officials in this office implemented a system where public wait time records were falsified and used to show officials in Washington, DC that the office was improving its service to Veterans with low wait times. The records indicated VA office was experience wait times of 14 to 30 days, as is the accepted timeframe for the VA but in reality; a secret waiting list was created where veterans were forced to wait up to 14 to 16 months to see a doctor. This secret list was known only to higher ups in the PVAHCS but once a veteran was within 14 days of a wait time, he/she was taken off the secret list and placed on the public one, creating the illusion of short wait times in at the system. This illegal system resulted with 40 veterans dying before they were ever able to receive medical treatment from the VA.

The Secretary of Veterans Affairs, the Hon. Eric Shinseki was brought before the Senate Committee on Veterans Affairs to answer to this illegal activity. In his testimony, Shinseki stated that top officials at the PVAHCS have been placed on administrative leave while an investigation is carried out by the Office of the Inspector General (OIG). Once OIG has completed its investigation, the findings will be reported to Congress and the general public. In addition, the Secretary assured Senate members that the VA was doing everything it could to deliver acceptable treatments at increased speeds across the country. The VA has expanded its fleet of mobile VA clinics which treat veterans in rural areas, it has increased research and treatment practices of veterans with mental health issues and homelessness. The Secretary stated that overall; the VA receives high marks in patient satisfaction. He continued to admit that, VA practices were not perfect and that there is always room for improvement. >>READ the testimony

 

UPDATE ON DOD'S EFFORTS TO IMPLEMENT A COMMON CONTRACTOR MANPOWER DATA SYSTEM

 DOD is the federal government's largest purchaser of contractor-provided services. It relies on contractors to perform functions as varied as professional and management support, information technology support, medical services, and weapon system and intelligence support. DOD reported about $187 billion in obligations for service contracts in fiscal year 2012. To help provide better insight into the number of contractor full-time equivalents (FTE) providing services to the department, Congress requires DOD to establish a data collection system and to annually compile, and for the military services and defense agencies to review an inventory of services contracted for or on behalf of DOD during the preceding fiscal year. Congress has also directed DOD to develop a data collection system that captures direct labor hours, among other things. DOD's offices of the Comptroller, the Under Secretary of Defense for Acquisition, Technology, and Logistics, and the Under Secretary of Defense for Personnel and Readiness share responsibility for issuing guidance for these efforts. Congress has mandated GAO to report on DOD's contractor inventory submissions for fiscal years 2011 through 2015. This report addresses the status of DOD's efforts to implement a department-wide contractor manpower data collection system.

Thirty-two DOD components submitted inventories for fiscal year 2012, collectively reporting an estimated 670,000 contractor FTEs providing services to DOD with obligations totaling about $129 billion. Since our May 2013 report, DOD has taken additional steps to implement its November 2011 plan to collect contractor manpower data via a department-wide solution, but various challenges may hinder DOD's efforts to having a common system and associated processes fully in place to support its fiscal year 2016 inventory. In October 2013, DOD fielded a system based on the Army's Contractor Manpower Reporting Application (CMRA) system, to support the DOD components as it had previously done for the Air Force and Navy. Each of the four CMRA systems is independent, maintaining its own interface, but all are accessible via a common webpage. DOD is weighing options on how to further refine the current CMRA configuration. These options include maintaining the four independent CMRA systems or developing a single, unified system. Further, DOD is determining the business processes and rules needed to standardize the department's approach to collecting and using inventory data. DOD officials noted that a key factor hindering resolution of these issues has been the lack of dedicated resources to develop and implement a common system and associated business rules.  In March 2014, DOD approved plans to establish an office to support these implementation efforts, but the office's roles and responsibilities and how it will be staffed have not yet been fully determined.  

GAO is not making any recommendations at this time but continues to believe that its 2011 recommendation that DOD develop a plan of action with timeframes and necessary resources continues to have merit and should be fully implemented. Such a plan would help facilitate the department's stated intent of implementing a common data system and using contractor manpower data as part of workforce planning and budgeting decisions to the department. >>READ the report

 

ARMY RELEASES DRAFT REQUEST FOR PROPOSALS FOR RIFLEMAN RADIO

The Army announced on May 21st it is holding a full and open competition in the hopes of procuring more Rifleman Radios. This will effectively create a small competitive market for the Army to explore numerous radio models and designs, allowing it to pick the one(s) which best fit the needs of its rifleman. The Army intends to award indefinite orders and quantity of radios purchased and allow for several vendors to compete for the orders. The orders will take place over the next five years with an optional five year extension. This optional extension gives the Army and escape route in the event that the technology behind radios becomes much more advanced than what is currently available today. This could save taxpayers millions of dollars and keep U.S. soldiers in the field with the most technologically advanced equipment. The Army is hosting an industry day on May, 27 to gain more feedback on the radios and process before making a final decision. The Army anticipates that the award will given out in FY 2015. >>READ the article

 

HOUSE PASSES DEFENSE AUTHORIZATION ACT FOR 2015

The House of Representatives has approved the National Defense Authorization Act for 2015 which caps contract spending, suspends more rounds of Base Realignment and Closures (BRAC) and forces the Department of Defense (DOD) to insource certain jobs and duties.

DOD requested another BRAC round set for 2017, however, the House rejected this provision. A C4ISR & Networks article states "the extension of a cap on contract spending at DOD is necessary to make sure the Defense Department does not just shift work from civilian employees to contractors as it works to reduce costs and reorganize its workforce". Other provisions and amendments to the bill include a prohibition for DOD purchases of biofuels except for testing and research purposes, a rule forcing the DOD to study which of its workforce, military, civilian or contractor is the most cost effective for non-critical missions and a pilot program which allows whistleblowers to appeal cases from the Merit Systems protection Board to any circuit court, not just the federal circuit courts for another three years. >>READ more

 

DIA DIRECTOR, DEPUTY TO STEP DOWN

The Director of the Defense Intelligence Agency (DIA) Lt. Gen. Michael Flynn and the Deputy Director, David Shedd announced their retirement from the agency in an email to personnel of April 30. Flynn has been the Director of DIA since July of 2012 while Shedd joined the agency as deputy director in August of 2010. A C4ISR & Networks article suggests that the retirement of Flynn was a result of his being vocal about initiating change in the agency in order to increase innovation and the integration of personnel and capabilities within the intelligence community. >>READ more

 

DIA NAMES DOUG WISE, A FORMER CIA OFFICIAL, AS ITS DEPUTY DIRECTOR

The Deputy of the Defense Intelligence Agency (DIA) Lt. Gen. Michael Flynn announced that Doug Wise will replace David Shedd as the Deputy Director effective August of 2014. A C4ISR & Networks articles reports "After being commissioned from West Point, Wise served as an active duty infantry officer in the Army and graduated from the Army's Command and General Staff College at Fort Leavenworth, Kan. He earned master's degrees from the Dartmouth College School of Arts and Sciences and from the Thayer School of Engineering, and completed a post-graduate fellowship at Los Alamos National Laboratory. Wise also did a tour of duty in the Pentagon with the then-classified National Reconnaissance Office.  >>READ more 

DOSnewsDEPARTMENT OF STATE NEWS

PROCESS TO TRACK RESPONSES TO CONGRESSIONAL CORRESPONDENCE CAN BE IMPROVED

The Department of State (State) receives about 2,200 pieces of correspondence each year from members of Congress seeking information. GAO was asked to review State's procedures for responding to requests for information. The Government Accountability Office (GAO) examined (1) State's process for responding to congressional correspondence and (2) the extent to which State tracks the timeliness of its responses to congressional correspondence. To do so, GAO reviewed information on 4,804 pieces of correspondence that State indicated it had received and responded to between April 2011-when State said the Bureau of Legislative Affairs (the Bureau) began to track State's response letters-and June 2013. GAO also interviewed cognizant State officials.

State did not track key information on the timeliness of nearly half of its responses to congressional correspondence. State's timeliness goal is to provide the member, within 21 business days of receiving his or her correspondence, with either a response letter or an interim acknowledgment informing the member of the delay. State tracked the time it took to respond and also met its timeliness goal in 2,524 (53 percent) of the 4,804 cases that GAO reviewed. However, State did not track the timeliness of its responses in 1,544 (32 percent) of the cases GAO reviewed because the bureau tasked with mailing the response directly to constituents and members did not notify the Bureau when it did so, as required by State policy. In addition, because the Bureau did not systematically track State's interim acknowledgments in cases that took more than 21 days, GAO could not determine whether State actually sent such acknowledgments in 736 (15 percent) of the cases GAO reviewed where the response time exceeded 21 days. Because its database lacks accurate and complete data, State is not in a position to identify elements of the process that may be most prone to delays and therefore cannot develop strategies to improve the timeliness of its response letters.

GAO recommends that State (1) take steps to ensure that all response letters, including those tasked to bureaus to reply directly to constituents and members, are tracked; and (2) ensure that if and when interim acknowledgments to members of Congress are provided, they are tracked. State agreed with GAO's recommendations and said it would begin to implement them immediately. >>READ the report

 

HELPING THE NAVY ADDRESS THE RISING TIDE OF SENSOR INFORMATION   U.S. Navy intelligence, surveillance, and reconnaissance (ISR) functions have become critical to U.S. national security. Within the Navy, there is a growing demand for ISR data from drones and other sources that provide situational awareness, which helps Navy vessels avoid collisions, pinpoint targets, and perform a host of other mission-critical tasks.

The RAND Corporation, a non-profit institution that helps improve policy and decision-making through research and analysis, has found that the amount of data generated by ISR systems has become overwhelming. Processing and deriving useful knowledge from the data are severely taxing the analytical capabilities of the Navy's humans and networks. This "big data" challenge will only continue to grow. RAND predicts that if the Navy continues to field sensors as planned but does not change the way it processes, exploits, and disseminates information, it will reach an ISR "tipping point"-the point at which intelligence analysts are no longer able to complete a minimum number of exploitation tasks within given time constraints-as soon as 2016. Today, as little as 5 percent of the data collected by ISR platforms actually reach the Navy analysts who need to see them. Getting at the data is complicated; so much time is spent finding the data that there is little time to analyze it.

One option to prevent analysts from become overloaded with work is to adopt a regional or global tasking model that automatically assigns tasks based on who is available. However, a true solution must encompass changes in all the following spheres: people; tools and technology; data and data architectures; demand and demand management.

RAND suggests that the Navy adopt similar to the Intelligence Community's (IC) Cloud solution, the Intelligence Community Government Cloud. RAND believes that this solution will be sufficient to meet the needs of "growing volumes of data that will need to be harvest and thus enable viable tasking, collection, processing, exploitation, and dissemination (TCPED) operations in the future." >>READ the report

 

COMPETES: HOW PRIZE-INCENTIVES HELP GOVERNMENT INNOVATE

Under the America COMPETES Reauthorization Action of 2011, all agencies are granted broad authority to conduct prize competitions to spur innovation, solve tough problems, and advance their core mission.

A report from the office of Science and Technology Policy, details examples of how, under the right circumstances, well-designed prizes, integrated into a broader innovation strategy, have enabled Federal agencies to: 1) Pay only for success and establish an ambitious goal without having to predict which team or approach is most likely to succeed; 2) Reach beyond the "usual suspects" to increase the number of solvers tackling a problem and to identify novel approaches, without bearing high-levels of risk; 3) Bring out-of-discipline perspectives to bear; and 4) Increase cost-effectiveness to maximize the return on taxpayer dollars.

In September 2010, the Administration launched Challenge.gov, a one-stop shop where entrepreneurs and citizen solvers can find public-sector prizes. By September 2013, Challenge.gov had featured more than 280 competitions from over 45 Federal agencies, departments, and bureaus. The prize authority provided by COMPETES supports this effort. By giving agencies a clear legal path, the legislation has made it dramatically easier for agencies to use prizes, subject to the availability of appropriations or other allowed sources of funds. By significantly expanding the authority of all Federal agencies to conduct prize competitions, the legislation enables agencies to pursue more ambitious prizes with robust incentives.

The authority provided in COMPETES has led to significant new efforts, applying prizes to national priority areas including energy, climate change resilience, health, and employment. >>READ more
 
FREE WEBINAR ABOUT BORDER SURVEILLANCE/ANTI-POACHING OPPORTUNITIES IN SOUTH AFRICA
Opportunities are strengthening throughout Southern Africa for land, air, and sea border surveillance solutions in the context of a heightened global focus on illegal cross-border activities, combatting wildlife trafficking and the related security threats.  
The U.S. Commercial Service is offering an Executive Service and U.S.-South Africa Border Surveillance Symposium to assist U.S. companies maximize this opportunity at  Africa Aerospace and Defense (AAD) Show from September 16-19, 2014 in South Africa.  This biennial event is one of the world's pre-eminent second tier air shows and the major African regional showcase for marketing aerospace and defense technology, as well as business and commercial aviation and airline equipment and facilities.  
On June 5th at 11 am ET there will be a free Webinar about Border Surveillance/Anti-Poaching Opportunities in Southern Africa.  >>REGISTER for free here
justicenewsDEPARTMENT OF JUSTICE NEWS 

FIVE CHINESE MILITARY HACKERS CHARGED WITH CYBER ESPIONAGE 
A grand jury in the Western District of Pennsylvania (WDPA) indicted five Chinese military hackers for computer hacking, economic espionage and other offenses directed at six American victims in the U.S. nuclear power, metals and solar products industries. Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, and Gu Chunhui, who were officers in Unit 61398 of the Third Department of the Chinese People's Liberation Army (PLA) were indicted on 31 charges spanning from 2006-2014. Victims include Westinghouse Electric Co. (Westinghouse), U.S. subsidiaries of SolarWorld AG, United States Steel Corp., Allegheny Technologies Inc., the United Steel, Paper and Forestry, Rubber, Manufacturing, Energy, Allied Industrial and Service Workers International Union and Alcoa Inc. The FBI conducted the investigation that led to the charges in the indictment.  This case is being prosecuted by the U.S. Department of Justice's National Security Division Counterespionage Section and the U.S. Attorney's Office for the Western District of Pennsylvania.

The indictment alleges that the defendants conspired to hack into American entities, to maintain unauthorized access to their computers and to steal information from those entities that would be useful to their competitors in China, including state-owned enterprises (SOEs).  In some cases, it alleges, the conspirators stole trade secrets that would have been particularly beneficial to Chinese companies at the time they were stolen.  In other cases, it alleges, the conspirators also stole sensitive, internal communications that would provide a competitor, or an adversary in litigation, with insight into the strategy and vulnerabilities of the American entity.

"This is a case alleging economic espionage by members of the Chinese military and represents the first ever charges against a state actor for this type of hacking," U.S. Attorney General Eric Holder said.  "The range of trade secrets and other sensitive business information stolen in this case is significant and demands an aggressive response...This Administration will not tolerate actions by any nation that seeks to illegally sabotage American companies and undermine the integrity of fair competition in the operation of the free market." 

"State actors engaged in cyber espionage for economic advantage are not immune from the law just because they hack under the shadow of their country's flag," said John Carlin, Assistant Attorney General for National Security.  "Cyber theft is real theft and we will hold state sponsored cyber thieves accountable as we would any other transnational criminal organization that steals our goods and breaks our laws." >>READ the story  

  

INTERNATIONAL BLACKSHADES MALWARE TAKEDOWN

Representatives from the FBI New York Field Office and the U.S. Attorney's Office for the Southern District of New York announced the results of a cyber takedown, which included the unsealing of an indictment against Swedish national Alex Yucel and the guilty plea of U.S. citizen Michael Hogue, both of whom are believed to have co-developed a particularly insidious computer malware known as Blackshades. This software was sold and distributed to thousands of people in more than 100 countries and has been used to infect more than half a million computers worldwide. Also charged and arrested in the U.S. were an individual who helped market and sell the malware and two Blackshades users who bought the malware and then unleashed it upon unsuspecting computer users, surreptitiously installing it on their hardware.

The actions that occurred during this takedown are part of an unprecedented law enforcement operation involving 18 other countries. More than 90 arrests have been made so far, and more than 300 searches have been conducted worldwide.

Malware is malicious software whose only purpose is to damage or perform other unwanted actions on computer systems. Blackshades malware allows criminals to steal passwords and banking credentials; hack into social media accounts; access documents, photos, and other computer files; record all keystrokes; activate webcams; hold a computer for ransom; and use the computer in distributed denial of service (DDoS) attacks. The existence of the Blackshades malware was discovered during a previous international investigation called Operation Cardshop.  The popular Blackshades Remote Access Tool (RAT) could be bought for as little as $40. In addition to its low price, the Blackshades RAT was very attractive because it could be customized by the criminals who bought it.

New York FBI Assistant Director in Charge George Venizelos said that the announcement "showcases the top to bottom approach the FBI takes to its cases...starting with those who put it [malware] in the hands of the users-the creators and those who helped make it readily available, the administrators. We will continue to work with our law enforcement partners to bring to justice anyone who uses Blackshades maliciously."  The FBI is currently working with Internet service providers to notify domestic victims of the Blackshades malware.>>READ more 
 

OIG REPORT ON DEA'S MANAGEMENT OF PRIVATE COMPANIES THAT TRANSACT CONTROLLED SUBSTANCES

The Drug Enforcement Administration (DEA) administers the Controlled Substances Act of 1970, which manages and reviews the practices of private companies and stores registered with the DEA, which sell controlled substances. The DEA investigates these vendors and if any wrongdoing is found, the DEA can suspend disbursement of controlled substances and allow the business to petition the suspension. The Office of the Inspector General (OIG) has reviewed the DEA's process for issuing final decisions on registrant actions. The review found the DEA is in compliance with rules and regulations in its review process of suspension and termination of registered companies ability to distribute controlled substances, however, it was found the DEA has no timeliness regulations or standards for the review process. >>READ the report

GAOGENERALNEWSGOVERNMENT ACCOUNTABILITY OFFICE NEWS
Agencies Have Taken Steps to Improve Suspension and Debarment Programs

To protect the government's interests, various agencies can use suspension and debarment programs to make sure individuals and contractors who have conducted themselves poorly do not receive future contracts, grants, and other federal assistance. Causes for suspension and debarment as specified by the Federal Acquisition Regulation (FAR) include fraud, false statements, theft, bribery, tax evasion, and any other offense indicating a lack of business integrity. A suspension is a temporary exclusion pending the completion of an investigation or legal proceeding that generally lasts less than eighteen months. A debarment is an exclusion for a reasonable, specified period depending on the seriousness of the cause, usually lasting less than three years. In 2011, the Government Accountability Office (GAO) recommended that six agencies-- the Departments of Commerce, Health and Human Services, Justice, State, the Treasury, and the Federal Emergency Management Agency-attempt to improve their suspension and debarment efforts by working to maintain a dedicated staff, detailed policies and procedures, and an active referral process. This May 2014 report, "Agencies have Taken Steps to Improve Suspension and Debarment Programs," examines the efforts made by the six agencies to progress their programs, changes in the level of suspension and debarment activity, and actions taken to improve oversight and government-wide efforts.

The six agencies GAO reviewed all took action to incorporate characteristics associated with active suspension and debarment programs. Since GAO made recommendations to do so in 2011, the agencies have addressed staffing issues through actions such as defining roles and responsibilities, adding positions, and consolidating suspension and debarment functions. The agencies also have issued formal policies and promulgated detailed guidance. Finally, the agencies have engaged in practices that encourage an active referral process, such as establishing positions to ensure cases are referred for possible action, and developing case management tools.

The number of suspension and debarment actions government-wide has more than doubled from 1,836 in fiscal year 2009 to 4,812 in fiscal year 2013. The number of suspension and debarment actions for the six agencies increased from 19 in fiscal year 2009 to 271 in fiscal year 2013. The six agencies generally experienced a notable increase starting in fiscal year 2011 when the agencies began to take action to incorporate the characteristics associated with active suspension and debarment programs. Overall, due to recommendations from GAO, the Office of Management and Budget (OMB), and the Interagency Suspension and Debarment Committee (ISDC), the six aforementioned government agencies have seen an enormous increase in suspension and debarment cases, suggesting that efforts to improve the system have been effective. >>READ more 

 

ICnewsINTELLIGENCE COMMUNITY NEWS

SURVEY: ABUSE OF NETWORK ACCESS PRIVILEGES IS RAMPANT

A study from Ponemon Institute, an organization that measure trust in privacy and security, found that agencies are more concerned about insiders leaking citizens' and partner organizations' information than their own general business information, said an Nextgov. Meanwhile, the commercial sector cares more about inappropriate disclosures of business data than customer data.

Commercial firms "probably feel it's kind of more important that they need to protect their stuff versus customers," said Michael Crouse, director of insider threat strategies for Raytheon Company, which commissioned Ponemon to conduct the study.  Whereas, "the government, which kind of sees their customers' information as what they have to protect," feels that client data is most unprotected, he said. "It's kind of an interesting inversion."

 

Across the board, most (88 percent) of participants recognized that the abuse of IT access privileges is a cause for alarm. "But less than half that number, around 44 percent in the government, feel that they have a dedicated budget for investing in these technologies, investing in processes and procedures, to reduce the threat of the insider," Crouse said. Determining what to invest in is part of the challenge. Many analysts say more resources must be devoted to checking up on employees' behaviors, rather than just network security. Leaders need to have auditing mechanisms in place to ensure an employee's "sense of empowerment won't do damage to the organization," Crouse said.

 

Some former U.S. national security IT officials say the government doesn't need to start from scratch on a behavior surveillance system to stop rogue employees.  "It's not new technology -- it's a matter of making it more encompassing, making it more scalable, making it faster" at searching for signs of changes in conduct, Dale Meyerrose, the first chief information officer of the intelligence community under the Director of National Intelligence. "A lot of it is the same infrastructure, the same sensors, the same networking technology." >>READ more

REVISEDGOVERNMENTRULESREVISED STANDARDS & GUIDANCE

UPDATED FISMA GUIDANCE

Update on Three FISMA Publications Ongoing Authorization Supplemental Guidance, SP 800-37, Rev 1 (Errata), SP 800-53A Rev 4 (IPD)

To view the full announcement of the updates to the 3 FISMA publications >>READ here

 

NIST Computer Security Division: 2 Revised Draft PIV Special Publications Released For Public Comment     

The request for comment on Revised (second) Draft Special Publication 800-73-4, Interfaces for Personal Identity Verification can be found HERE

 

The request for comment on Revised (second) Draft Special Publication 800-78-4, Cryptographic Algorithms and Key Sizes for Personal Identity Verification can be found  HERE

fedcornerFED CORNER:  B. TODD JONES
B. Todd Jones

Director of the Bureau of Alcohol, Tobacco, Firearms and Explosives  

U.S. Department of Homeland Security

 

B. Todd Jones was sworn in as the Director of the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) on Aug. 29, 2013. He became the first ATF Director to receive Senate confirmation on July 31, 2013. The ATF Director is responsible for the unique law enforcement agency within the U.S. Department of Justice with the responsibility for enforcing firearms and explosives laws that protect communities from violent criminals and criminal organizations.

 

Jones was nominated for the position of ATF Director, on Jan. 24, 2013 by President Barack Obama. Prior to becoming ATF's permanent Director, Jones served as the acting ATF Director starting Aug. 31, 2011.

 

While serving as the acting Director of ATF, Jones was also the U. S. Attorney for the District of Minnesota, a post he held since Aug. 7, 2009. Jones served as both ATF acting Director and U.S. Attorney until his confirmation as ATF Director.

Prior to becoming U.S. Attorney in 2009, Jones was a partner with a major national law firm in Minneapolis, where his practice focused on complex business litigation. He represented a number of organizations and individuals in criminal and civil regulatory matters. Jones is a fellow of the American College of Trial Lawyers. He also has served as special counsel to various boards of public and privately held companies. In that capacity, he led internal investigations and provided guidance on compliance and governance issues.

Jones has held the position of U. S. Attorney twice in his career. President Clinton first appointed him in 1998, and he served until January 2001. Earlier in his career, Jones also was an Assistant U.S. Attorney in the District of Minnesota. During his initial tenure as a federal prosecutor, he conducted grand jury investigations and was the lead trial lawyer in a number of federal prosecutions that involved drug trafficking, financial fraud, firearms, and violent crime.

 

Jones received his Juris Doctor from the University of Minnesota Law School in 1983 and his B.A. from Macalester College in 1979. Following admission to the Minnesota bar, he went on active duty in the United States Marine Corps, where he was an infantry officer with the First Marine Division and, subsequently, both a trial defense counsel and prosecutor in a number of court martial proceedings. In 1989, he left active duty and returned to Minnesota with his family. He was recalled to active duty in 1991, during Operation Desert Storm and was stationed at Camp Pendleton California until the cessation of hostilities. >>READ More

newsofnoteNEWS OF NOTE
Student Fatally Shoots, Stabs Students & Self
CNN reports that Elliot Rodger, a former Santa Barbara College Student, fatally shot 3 people and stabbed 3 others before fatally shooting himself on Friday, May 23.  Parents contacted law enforcement after seeing alarming YouTube videos and were on their way when the shooting occurred. >>READ more

FEMA Consolidates National Flood Insurance Program Records

The Department of Homeland Security (DHS), Federal Emergency Management Agency (FEMA) will consolidate its records to comply with the Privacy Act of 1974. This consolidation will allow FEMA to better administer the information it collects about the claims process and marketing of the flood insurance program. FEMA has previously consolidated certain categories of its information before, however this a complete consolidation which will give the agency full control of the flood insurance program. The consolidation will be broken into two parts, the National Flood Insurance Program Claims Appeals Process and the National Flood Insurance Program Marketing Files. >>READ more 

  

Confronting Corporate Crime

Over the past decade, the Federal Bureau of Investigation (FBI) has shifted its focus onto combating terrorism here at home. This leaves other aspects of its mission such as corporate crime on the back burner. Director James Comey of the FBI has made a pledge to shift its emphasis away from terrorism to corporate crime in effort to make businesses fair and just. He stated the FBI would be hiring close to 2,000 new professionals to work on corporate crime and fraud in the United States.

>>READ more 

 

Supreme Court Agrees To Hear Air Marshal Whistle Blower Case

The U.S. Supreme Court said on Monday it would weigh whether the federal government rightly fired U.S. air marshal Robert MacLean for disclosing sensitive information to the news media. Oral arguments and a decision are due in the court's next term, which begins in October and ends in June 2015, said the Chicago Tribune. >>READ more

 

Next-Gen UAVS: Armed, Modular, Smaller

The Association for Unmanned Vehicle Systems International (AUVSI) annual conference saw unmanned systems of all shapes and sizes, for all mission sets, according to C4ISR. "You're going to have to have some sort of stealth, defensive capabilities - passive sensors, where you can see stuff and people can't tell that you're seeing stuff," as well as secure communications links, Frost & Sullivan analyst Michael Blades said. "Those are the kind of technologies we're going to need for the future." >>READ the story

 

DHS Official: Heartbleed Has Had 'Minimal' Impact On Federal Government

Larry Zelvin, director of the National Cybersecurity and Communications Integration Center within the Homeland Security Department's National Protection and Programs Directorate, said that hard work and improved coordination throughout the federal government meant that the impact of the Heartbleed bug on the dot-gov domain has been minimal. >>WATCH the videos here.

 

Texas Department Of Public Safety Wins Grant to Reduce DNA backlog

 The US Department of Justice (DOJ), Office of the Inspector General (OIG) Audit Division, has completed an audit of the Office of Justice Programs (OJP), National Institute of Justice (NIJ) for fiscal year 2012 DNA Backlog Reduction Program. The Texas Department of Public Safety was awarded the grant; totaling $3,234,426 and this grant will be used to reduce the amount of DNA samples, which are awaiting analysis to processing for criminal cases. This will help the Texas Department of Public Safety to speed criminal investigations and lawsuits. >>READ more

  

Military Communications Market Expected To Grow

A C4ISR & Networks article reports "the military communications market is expected to grow to $30.1 billion by 2019, according to a forecast by market research firm ASDReports. This reflects a compound annual growth rate of 7.2 percent from $18.46 Billion in 2014". It is expected the military communications market will grow as companies continue to advance and develop new architectures of communications in the search for open and distributed architectures, which improves infrastructure of communications for all uses. >>READ the article

 
 

GSA Awards Long-Awaited OASIS Contract

The General Services Administration has awarded its 10-year, multibillion dollar OASIS contract to 74 companies, according to an agency announcement. The companies include Accenture Federal Services, LLC., Booz Allen Hamilton, Inc., Boeing Service Company, Deloitte Consulting, LLP., Lockheed Martin Integrated Systems, Inc., Raytheon Company and others across six separate pools of contractors. >>READ more

 

HSI Arrests 71 For Child Sexual Exploitation Crimes
 
Seventy-one individuals have been charged for crimes involving the sexual exploitation of children as part of Operation Caireen. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations (HSI) special agents partnered with the New York City Police Department (NYPD) during the operation, which began on April 4 and ran through May 15, said GSN. >>READ the story 

Apply For A FEMA Individual & Community Preparedness Award

 
The application period for the 2014 FEMA Individual and Community Preparedness Awards will be closing on May 30, 2014. Download an application and read how to submit HERE

 

STATE DEPT OPPORTUNITY: Philippines Energy Infrastructure Recovery 

A call scheduled for

Thursday, May 29, 2014; 7:00 p.m. to 8:00 p.m. EDT will give audience members a clear view of the Philippine Government's ongoing efforts to rehabilitate its infrastructure devastated by Super Typhoon Yolanda (international name: Haiyan) in November 2013.>>READ about the call  

 

 

 

B-52S Get Communications Upgrade 

 The U.S. Air Force (USAF) has implemented a round of upgrades for its fleet of B-52s communications systems. A C4ISR & Networks article found "the first B-52 has received its Boeing Combat Network Communications Technology (CONECT) upgrade. The modification adds to the B-52 several communication data links, full-color LCD displays with real time intelligence feeds overlaid on moving maps, a state-of-the-art computing network, and the ability to retarget a weapon, or missions parameters, in flight". These upgrades will allow the USAF to better manage its missions by increasing information for its pilots while in the sky. >>READ more

 

Politics Ensnares Combat UAS Program  

A turf war over the most controversial tool of the Counter Terrorism program, the Unmanned Aerial Systems (UAS) or Drones is being fought in the senate. An initiative headed by Sen. John McCain R-AZ, to move control of the Drone program from the CIA to the DOD because he feels the military is better at utilizing the program to fight terrorism abroad. This move will also increase transparency of the program allowing for more accountability. Sen. McCain intends to add a provision of his plan to the FY2015 National Defense Authorization Act (NDAA), however, Senate Intelligence Committee Chairwoman Sen. Dianne Feinstein, D-CA made it clear she would challenge the provision made it to the senate floor. >>READ more

 

FITARA Passes House As Part Of NDAA

The Federal Information Technology Acquisition Reform Act passed in the House May 22 as part of the fiscal 2015 National Defense Authorization Act (H.R. 4435). The bill would give agency chief information officers greater authority over component technology purchasing, elevate the role of CIO by requiring presidential appointment and allow more funding flexibility in the form of multi-year commodity IT budgets. >>READ more  

 

Holder Announces Guilty Plea in Tax Evasion Case

Credit Suisse- a financial institution that engaged in an extensive and wide-ranging conspiracy to help U.S. taxpayers evade taxes- has agreed to plead guilty to criminal charges related to this pervasive illegal activity.   This is the largest bank to plead guilty in 20 years.   The bank will pay a total of $1.8 billion in the form of a fine of over $1.13 billion and nearly $670 million in restitution to the IRS. >>READ the story

 

Tips To Protect Your Business From Storm Damages

Dr. Gerry Bell, a global climate expert from the National Oceanic and Atmospheric Administration (NOAA) will share the 2014 Atlantic Hurricane Season forecast during a free webinar Tuesday, May 27 hosted by The U.S. Small Business Administration and Agility Recovery. After the weather discussion, Agility Recovery will present disaster preparedness tips.>>REGISTER here 

 


 

 


quote
QUOTE OF THE WEEK:   

It's About the Mission. The Government Technology & Services Coalition (GTSC) is a nonprofit 501(c)(6), non-partisan association of innovative, agile small and midsized company CEOs that create, develop, and implement solutions for the Federal homeland and national security sector. These companies founded the Coalition to band together to work with their Federal partners to achieve their mission despite significant budget challenges by bringing the innovation, creativity and exceptionalism of successful small businesses to the homeland and national security mission.   
Our vision is to provide an ethical, effective platform for information exchange between the public and private sector on homeland and national security ideas, technologies and innovations.
Our mission is to provide exceptional advocacy, capacity building, partnership opportunities and marketing in the Federal security space for small and mid-sized companies, and to support and assist our government partners achieve their critical missions with the highest integrity; best and most innovative technologies; and results-based, quality products and services to prevent, protect against, mitigate, respond to and recover from any terrorist attack or natural disaster.
 

Connect with GTSC to get news, latest events and expand your network!

Like us on Facebook   Follow us on Twitter   View our profile on LinkedIn