9 ways the defense bill's passage could affect your job

When President Barack Obama signed the 2012 National Defense Authorization Act, he passed into law some new rules that will have serious impact on the defense IT and acquisition communities.

The bill puts a number of high-profile issues under a microscope, including Army enterprise e-mail and the Defense Department’s broader use of cloud, rules on contractor ethics and roles, acquisition reform and counterfeit electronic parts in the DOD supply chain. At the same time, the legislation catalyzes within DOD the wider federal government view of IT as a money-saver, ordering the use of technology to streamline operations and the ways DOD does business.

There’s plenty of fodder for discussion in the 565-page bill, but our analysis found nine areas in which its effects may be felt very soon, and in some cases, quite profoundly.

  • Consideration of contractors’ work: Defense officials now have to think about contractors, as well as their civilian employees and military personnel, as they draw up plans for future operations. The law requires officials to include contractor support requirements in DOD planning documents. Officials have to identify the support functions that contractors will likely need to do under those contingency plans. Officials also need to lay out the risks associated with contractors doing those assignments.
  • Federal Acquisition Institute reorganization: The bill clears up issues that lawmakers have said left FAI largely unused. The legislation establishes a clear line of responsibility and accountability for the institute by requiring FAI to report directly to the Office of Federal Procurement Policy. It also requires all existing civilian agency training programs to follow guidelines issued by OFPP, which would ensure consistent cross-government training standards. The provision is based on companion bills introduced in the House and Senate in 2011.
  • Ban on disclosure of political contributions: The authorization act stops the government from requiring contracting companies or its executives to include in their bid proposals which party or the candidate they supported.
  • Targeting of counterfeit electronic parts: The bill establishes guidance for defining and dealing with fake electronic parts in the supply chains of weapons systems and related defense IT, and puts suppliers and contractors on the hook. According to the language, contractors are responsible for detecting and avoiding fake products, as well as for the cost of their replacement; it also calls for the use of “trusted suppliers” whenever possible.
  • Use of cloud: DOD is to migrate its data and services to less expensive but equally or more secure commercial cloud offerings. The provision also calls on DOD CIO Teri Takai to establish performance standards and provide detailed reports to Congress on savings.
  • Crackdown on Army enterprise e-mail: The bill strips funding from the Army’s migration to a DISA cloud-based enterprise e-mail system, which was already underway, pending further review. It establishes the project as a formal DOD acquisition program with accompanying oversight. The provisions also demand Takai furnish a report on the enterprise e-mail plans, including DISA’s broader strategic fit, relevance to the other services and the use of fair and open competition.
  • Cyber defense and information security expansion: The bill has a number of measures targeting cybersecurity, including training and education, “advanced capabilities” to fight network intrusions and other threats, and strengthening of the U.S. Cyber Command’s defense of DOD networks. The bill also notes the military’s authority to conduct offensive operations in cyberspace.
  • IT for intelligence-sharing improvement: Provisions in the bill call for open-source IT, advanced capabilities for searching across multiple information databases, and cloud-based, network-driven and open-source tools for sharing information across the federal intelligence community and DOD. A new pilot program the bill provides for will demonstrate high-speed database search capabilities, with a report due Nov. 1.
  • Defense business systems overhaul: The defense bill takes aim at DOD’s copious, redundant systems for accounting and business operations, directing the DOD deputy chief management office to set up an investment review board by March to comb through business systems and management processes. The goal will be to aggressively streamline systems across DOD’s business management communities.

About the Authors

Amber Corrin is a former staff writer for FCW and Defense Systems.

Matthew Weigelt is a freelance journalist who writes about acquisition and procurement.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Wed, Jan 4, 2012 DEFENDER OF THE FREE WORLD

Yes, absolutely, migrate my health information to a "Federal Electronic Medical Health Record" system so DoD can lose it again just like SAIC did a month ago in Texas.

Wed, Jan 4, 2012

Really? How will outsourcing ever be less expensive and more secure? Yet another provison in an appropriation (not a permanent law) that is much ado about nothing.

Wed, Jan 4, 2012

Commercial Clouds fail when faced with a persistent threat let alone an APT. See Google, Sony, Amazon, banks... Outsourced Clouds are a pure lobbying move. If they are broken into, then the problem will be spun that DOD did not define the necessary controls enough. Congress should experiment with clouds on the domestic side of the government not with the defense department.

Wed, Jan 4, 2012

What's missing is the creation of one Federal Electronic Medical Health Record which would improve seamless delivery of health care to our nations servicemen and veterans.

Wed, Jan 4, 2012

The only way this going to affect our job is make it better. We need to streamline alot of this agencies to work together on one data base so we can all share the data that is needed. GSA, Justice departments, DOD and etc....

Show All Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group