14 June 2013
AMRDECSED Overview
Presented to:
HAMA
Approved for public release;Distribution unlimited
Presented by:
William CraigDirector
Software Engineering DirectorateU.S. Army Aviation and Missile Research,
Development, and Engineering Center
2 FileName.pptx
Outline
AMRDEC SED OverviewContract DataAreas of Business Opportunity
Cyber SecurityObsolescenceMobile Application Development3D PrintingForeign Military Sales
Conclusion
3 FileName.pptx
SED Quad Chart
4 FileName.pptx
Current AMCOM EXPRESS Contracts
Contract Award Type Ceiling Period of Performance
Prime
SCRS Full & Open $820M Feb 12 – Feb 15 SAIC
BASES Small Business $172M Aug 10 – Aug 15 IRTC
Lower Tier IV&V Small Business $78.8M Aug 10 – Aug 15 Radiance
Systems & Software Security
Engineering
Small Business $62.7M Nov 11 – Oct 15 COLSA
JSIL Tech Services Full & Open $194M Sep 12 – Sep 17 AMS
IUID Support Small Business $57M Oct 12 – Dec 17 Avion
5 FileName.pptx
Planned AMCOM EXPRESSContracts
Contract Award Type EstimatedCeiling
Estimated Award Date
Systems/Software Technology
Analysis
Small Business $60M FY14
Fielded Systems Support
Small Business $100M FY 14
Non Tactical Software
Applications
Small Business $125M FY 14
SED Programmatic Support
Small Business $45M FY 14
6 FileName.pptx
Cyber Security
How much information?
Study conducted by the global information industry center at the University of California, San Diego.
Study looked at only the amount of information U.S. residents consumed in the their homes and outside the home for non-work-related reasons.
Study found that the average American spent about 12 hours digesting 34 Gigabytes (one byte of information is equivalent to one letter of text) of information daily in 2008.
"Considering that on average we work for almost three hours a day [at home] and sleep for seven, this means that three quarters of our waking time in the home is receiving information, much of it electronic," the authors write.
Yearly, the American info habit consumes 3.6 zettabytes,or 3.6 billion trillion bytes.
To put that in perspective, if 3.6 zettabytes of text were printed in books and stacked tightly across the continental United States and Alaska, it would create a pile 7-feet high (2 meters).
7 FileName.pptx
Obsolescence Significant Issue for Aging Army Systems
• Many fielded Army systems are struggling with obsolescence issues. In some cases the cost and lead-time for the parts are extreme. There are many opportunities to re-design these obsolete parts with more modern, available, and less expensive components. In many cases the cost and lead-times can be reduced by >50% using modern technologies and in some cases COTS.
• In many cases there is a lack of use rights that excludes competition• The obsolescence-related business opportunities are not limited to US
Army systems. Many foreign militaries rely on US Army systems; some still in US Army inventory and others that are no longer in the US Army inventory. These countries are interested in solutions for obsolete parts as well. In most cases these customers are interested in small quantities (less than 100).
• Older weapon systems use out dated technologies, system requirements, and system designs
8 FileName.pptx
Mobile Application Development
• 9 mobile programs• Over 30 mobile apps in
development• Mobile Apps Categories
– Aviation Control Simulation Apps– Outreach Apps– Aircraft Trainer Apps– Geographical Surveillance Apps– Augmented Reality Apps– Weapon Simulator Apps– Tactical Camera Apps– Missile Simulation Apps – Soldier Instrument Training Apps– Business Apps
SED Mobile Applications
9 FileName.pptx
3D Printing
Entered the mainstream marketplace in 2007
Sales have grown by 7.2 Percent each year
Sales are projected to jump from about $1.7 Billion in 2011 to $3.7 Billion 2015
10 FileName.pptx
Army Foreign Military Sales
FY2003 – FY2006 $18+B
FY2007 – FY2010 $63.5B
FY2009 $24.2B
FY2011 $12B
FY2012 $19.6B (144 Different Nations)
11 FileName.pptx
Conclusion
There is business for those who are innovative and provide
customer value.
12 FileName.pptx
Back upCharts
13 FileName.pptx
Cyber Security
• In developed countries information technology is vital and pervasive
• Such dependence has a corresponding vulnerability
• Cyber Security activities are absolutely essential (Military, Industry, Personal Lives)
14 FileName.pptx
Cyber SecurityStrategic Pillars
15 FileName.pptx
Cyber SecurityStrategic Partnerships
16 FileName.pptx
Cyber SecurityNation States
Open Source:Cyber War by Richard A. Clarke, pp. 147-149
NationCyber
OffenseCyber
DependenceCyber
Defense TotalU.S. 8 2 1 11Russia 7 5 4 16China 5 4 6 15Iran 4 5 3 12North Korea 2 9 7 18
Overall Cyber War Strength
• A Realistic Measurement Of Cyber War Strength Must Include All Three Factors• The Less Wired A Nation Is, The Higher Its Score On Dependence• Cyber Dependence Is A Disadvantage In A Cyber War
• Nation State Assessment By Richard Clarke (Former National Coordinator For Security, Infrastructure Protection, And Counterterrorism For President Clinton):
“The U.S. economy and government are the most dependent in the world on the Internet and therefore the most vulnerable to cyber attacks.”
- GAO-11-75 DoD Cyber Efforts, p. 1
Cyber Strength Assessment
17 FileName.pptx
Cyber SecurityCyber Huntsville
• Chair Of Federal/State/Local Gov’t Cyber Working Group
• First Gov’t Cyber WG Meeting 24 May 2012• Gov’t Liaison For Cyber Huntsville BoD
• Invitees Include:• PEO MS• RTC• SMDC• TSMO• TVA
• ALARNG• AMC G6/G2• AMCOM• AMRDEC CIO• Army G2X• City of Huntsville• DHS• FBI
• Huntsville Utilities• Inspector General• LOGSA• MDA• MSIC• NASA• NEC-R• PEO Aviation
18 FileName.pptx
ObsolescenceObsolescence Challenges
• Affects the system– Requirements, Software, Hardware, …
• In many cases the Government does not own the drawing package from the OEM or does not have the complete TDP– Restricted technical data packages prevent fair and open competition– Data rights for the OEM part when software is involved
• Ability to pass functional tests using legacy test equipment that tests tight tolerances– Test equipment can have proprietary claims too
• Government specification changes (relax requirements?)• Keeping production/manufacturing costs low for small quantities• Outsourcing of the semiconductor industry• Source code was developed without regard to the past 20 years modern
software engineering processes• Outdated design and system architectures
– Semiconductor industry moves in 3 to 4 year cycles when evolving technologies
19 FileName.pptx
ObsolescenceObsolescence Mitigation
Best Practices/Considerations
• Ensure full and open rights of technical data packages• Use best of industry system engineering guidelines
– Reconsider the original system/component requirements to allow “wiggle room” for modern solutions
– Architectures that encapsulate and modularize– Common design components
• Use modern technologies to reduce material component count – FPGAs to replace complete obsolete designs
• Teaming opportunities between industry and government– Development– Small quantity production
20 FileName.pptx
Mobile Application Development
Why Mobile Applications?
• Average age across all 5 branches of the military is at or below 30.
• June 2012 – DOD Mobile Strategy– Develop Mobile and Web Apps– Improve Infrastructure– Implement mobile device
management system• Rapid Application
Prototyping– Apps are smaller pieces of
larger applications– Quick to prototype.
21 FileName.pptx
Mobile Apps DevelopmentChallenges
• Mobile Device (e.g. iPad) Operating System changes annually– Information Assurance (IA) issue– Air Worthiness Release (AWR) issue
• Pilots will want to run their military applications on their personal (i.e. non-secure) devices; must protect sensitive aircraft performance related data– IA issue