Oracle’s lawsuit against the Department of Defense looking to stop its $10 billion cloud buy is being frozen temporarily while DOD probes conflict-of-interest allegations.
Judge Eric Bruggink of the Court of Federal Claims issued a stay in the case Feb. 19, in response to a motion from the DOD. According to the brief order, DOD is reconsidering “whether possible personal conflicts of interest impacted the integrity of the JEDI Cloud procurement.”
The DOD’s motion seeking the stay remains under seal.
The conflict-of-interest allegations stem from the participation of two individuals in the Joint Enterprise Defense Infrastructure procurement with strong ties to Amazon Web Services, the vendor widely seen as having the inside track in this procurement because of its work provisioning classified cloud services for the intelligence community.
A combination of artificial intelligence, machine learning, cloud computing, fifth-generation communications and agile software development processes may one day allow commanders to direct any asset from anywhere, essentially revolutionizing command and control.
During the recent AFCEA Alamo Chapter Event in San Antonio, several officials agreed that the current command and control (C2) center known as an air operations center (AOC) has grown too cumbersome and vulnerable for Air Force commanders to make the rapid-fire decisions required in the modern era of multi-domain operations.
Maj. Gen. Patrick Wade, USAF, mobilization assistant to the Air Combat Command commander, pointed out that the AOC can take up to 72 hours to complete an air tasking order, which essentially assigns specific aircraft to a mission.
“I think in the future, and I say think, we’re going to be fusing information from fifth-gen platforms, bringing together everything we have in the Air Force, in other services and with our coalition partners, and trying to take that data and turn it into something actionable.”
Last year the U.S. Defense Department released a cyber strategy and followed that with posture review that identified more than 90 gaps in cybersecurity capabilities, many of which were determined to be critical shortcomings.
This year, officials expect to begin implementing the strategy, beginning with several priority areas involving endpoint management, network visibility, user authentication and cyber force development, according to Brig. Gen. Dennis Crall, USMC, deputy principal cyber advisor, Office of the Secretary of Defense.
Gen. Crall made the comments during a keynote presentation at the National Security Technology Forum and Exposition, a joint effort between the University of California San Diego and AFCEA, and during a brief interview with SIGNAL Magazine following the address.
A new strategy for U.S. intelligence looks to improve integration of counterintelligence and security efforts, increasingly address cyber threats, and have clear guidance of civil liberties, privacy and transparency. As outlined in the U.S. National Intelligence Strategy (NIS), from Director of National Intelligence (DNI) Dan Coats, the intelligence community is facing a turbulent and complex strategic environment, and as such, the community “must do things differently.”
Some leaders of the IC, including Coats; FBI Director Christopher Wray; CIA Director Gina Haspel; DIA Director Lt. Gen. Robert Ashley, USA; NSA Director Gen. Paul Nakasone, USA; and NGA Director Robert Cardillo; all testified on Capitol Hill on January 29 as to the threats America faces from adversaries.
Army leaders are tackling the integration of modern network capabilities to push out broadly across the Army force structure over the next decade.
Maj. Gen. David Bassett, USA, program executive officer for Command, Control, Communications-Tactical (PEO-C3T) and Maj. Gen. Peter Gallagher, USA, director, Network Cross-Functional Team (Network CFT) are overseeing the effort and have developed an iterative plan to bring together network transport, mission command applications and services, all easily deployed to soldiers.
“We know that the things that we are doing today are going to develop capabilities that are going to have a significant improvement in our expeditionary capability, and also in the simplicity of the network design,” Gen. Gallagher said.
The U.S. Navy is consolidating its information warfare efforts to ensure effective operations across the breadth of the fleet and its ashore assets.
This endeavor ties together training, doctrine and equipping as new threats and technologies rapidly change the nature of the information operations realm.
The Navy has signed a charter to establish an information warfare (IW) enterprise that focuses on aligning IW development, generation and execution across the service.
The executive committee comprises Vice Adm. Brian Brown, USN, commander, Naval Information Forces, as the type commander; Vice Adm. Matthew Kohler, USN, the OPNAV N2/N6, as the resource sponsor; and Rear Adm. Christian Becker, USN, Space and Naval Warfare Systems commander, as the primary systems command lead for IW capabilities.
Below this command level is a broader board of directors representing other systems commands, program executive officers and type commanders.
During his speech to the Munich Security Conference in 2007, Russian President Vladimir Putin made a prediction that many in the West dismissed. He said the Western system of alliances — with its “one master, one sovereign” sitting in Washington, D.C. — would eventually “destroy itself from within.”
That speech has aged remarkably well. Twelve years on, as world leaders gathered in Munich again for their annual summit, the Europeans in attendance admitted that Putin had been right. As German Chancellor Angela Merkel put on Feb. 16, the global order had “collapsed into many tiny parts.”
The stunt was devised by Damian Collins, the leader of a U.K. parliamentary investigation into disinformation and “fake news.” The scope of that investigation ranges from Russian election interference to the changing landscape of traditional media, and from Brexit to Trump via Cambridge Analytica.
On Monday, Collins published the final report of that investigation, which proved to be a damning indictment of Facebook.
The report accuses Facebook of “intentionally and knowingly” violating data privacy and competition laws; labels top executives “digital gangsters;” and calls for urgent action to regulate social media and investigate Facebook’s alleged lawbreaking.
The culmination of 18 months of careful evidence-gathering, the scathing report now makes the U.K. one of the loudest voices calling for legal constraints on Facebook’s power.
Machine-learning techniques used by thousands of scientists to analyze data are producing results that are misleading and often completely wrong.
Dr Genevera Allen from Rice University in Houston said that the increased use of such systems was contributing to a “crisis in science”.
She warned scientists that if they didn’t improve their techniques they would be wasting both time and money. Her research was presented at the American Association for the Advancement of Science in Washington.