Cybersecurity

Army tries to speed cyber acquisition process

keyhole digital

The Army is trying to speed cyber-related acquisition by using a template known as the Information Technology Box. Officials said the goal is to quickly supply soldiers with IT tools such as sensors, forensics and "insider threat discovery capabilities" in a matter of weeks rather than the months or years a traditional acquisition might take.

"Cyber doesn't fit the traditional acquisition process that you would use to deliver a tank," said Kevin Fahey, executive director of the Army's System of Systems Engineering and Integration Directorate, in an article on the Army's website.

The Defense Department first used the IT Box template in 2008 and updated it in 2012, according to the article.

"IT Box is not new. What's new is how the Army is tailoring the IT Box and other innovative acquisition methods to meet the demands of cyber," Army spokesman Lt. Col. Jesse Stalder told FCW. "We pursued IT Box because it gives us the foundation and the flexibility to quickly prioritize and deliver solutions, even as cyber requirements change based on evolving threats."

The "box" has four main components (or "sides"), according to a Defense Acquisition University glossary: requirements and oversight; capabilities and measures of effectiveness; applications and software development and integration costs; and estimated sustainment costs.

The oversight side of the box is fulfilled, at least in part, by the Cyber Acquisition Requirements and Resourcing working group, which helps prioritize the acquisition of materiel solutions.

The Army also has other initiatives in the works to limber up its acquisition process. Officials plan to set up a "consortium of industry, academia and government entities to foster cross-sector collaboration on emerging cyber solutions," according to the article on the Army's website. And Stalder said the service has established a "Cyber Innovation Challenge that allows the Army to quickly purchase and evaluate pilot and prototype cyber solutions using other transaction authority methods rather than standard acquisition processes."

The first such challenge, which is already underway, involves a software and hardware kit that supports the service's cyber protection teams, Stalder said, adding that several vendors' proposals are being evaluated at the Army's Cyber Battle Lab at Fort Gordon, Ga.

The Army isn't the only service trying to inject a sense of urgency into IT acquisition. In March, the Navy unveiled a new acquisition model known as the Innovation Cell to get interested vendors involved in the process earlier. The Air Force, meanwhile, has emphasized agile acquisition. The service's 30-year strategy, released last year, warned against big, complex procurements with "crippling interdependencies."

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


The Fed 100

Read the profiles of all this year's winners.

Featured

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group