DOD to Require Cybersecurity Certification in Some Contract Bids

By the end of September 2020, the Department of Defense (DOD) will require at least some companies bidding on defense contracts to certify that they meet at least a basic level of cybersecurity standards when responding to a request for proposals.


By the end of September 2020, the Department of Defense (DOD) will require at least some companies bidding on defense contracts to certify that they meet at least a basic level of cybersecurity standards when responding to a request for proposals.

DOD released its new Cybersecurity Maturity Model Certification on Friday, billed by the undersecretary of defense for acquisition and sustainment as “Version 1.0.”

By June, the department plans to publish as many as 10 requests for information on contracts that include CMMC requirements, Ellen M. Lord said during a Pentagon news conference announcing the certification effort. By September, she said, the department will also publish corresponding requests for proposals that include those requirements. By fiscal year 2026, all new DOD contracts will contain the CMMC requirements, Lord said.

“I believe it is absolutely critical to be crystal clear as to what expectations for cybersecurity are, what our metrics are, and how we will audit for those expectations,” Lord said. “CMMC is a critical element of DOD’s overall cybersecurity implementation.”

Lord said cybersecurity risks threaten the defense industry and the national security of the U.S. government, as well as its allies and partners. About $600 billion, or 1% of the global gross domestic product, is lost through cyber theft each year, she noted.

“Adversaries know that in today’s great-power competition environment, information and technology are both key cornerstones,” she said. “Attacking a sub-tier supplier is far more appealing than a prime [supplier].”

The CMMC gives the department a mechanism to certify the cyber readiness of the largest defense contractors — those at the top who win contracts are called “primes” — as well as the smaller businesses that subcontract with the primes.

The new CMMC provides for five levels of certification in both cybersecurity practices and processes.

“Something … simple in Level 1 would be, ‘Does your company have antivirus software? Are you updating your antivirus software? Are you updating your passwords?'” said Katie Arrington, DOD’s chief information security officer for acquisition. “CMMC Level 1 is the basic cyber hygiene skills we should be doing every day. They are there to protect yourself, your company and your own information.”

By CMMC Level 2, Arrington said, the department will also begin looking at cybersecurity processes as well, to ensure cybersecurity is not just practiced, but that a company is effectively documenting, managing, reviewing and optimizing its practices across its entire enterprise.

Arrington said that for the roughly 10 requests for information  and requests for proposals DOD is expected to publish later this year for potential contracts, she expects a mix of CMMC certification levels will be required.

“We’ll have some CMMC Level 3, CMMC Level 1, and there may be one or two with the 4 or 5 CMMC levels going out,” Arrington said.

The department will not be certifying potential defense contractors for CMMC on its own. Instead, Lord explained, a series of CMMC “third-party assessment organizations” or C3PAOs, will conduct those assessments. The C3PAOs will also not be paid by the department, Lord said. “That’s a private transaction between industrial base companies and those of certification bodies,” she added.

No C3PAOs have been designated to conduct the assessments yet, Lord said, noting that while multiple companies are interested, DOD has not yet designated who is qualified.

A newly created 13-member CMMC accreditation body, made up of members of the defense industrial base, the cybersecurity community and the academic community will oversee the training, quality and administration of the C3PAOs, Lord said.

Meanwhile, she said, the department is drafting a memorandum between DOD and the CMMC accreditation body to outline its roles, responsibilities and rules. She said one area of concern will be to ensure no conflicts of interest are involved in accreditation. For example, a C3PAO would not be able to accredit itself for CMMC.

No existing contracts with the department will have CMMC requirements inserted into them, Arrington said.

Subcontractors to a prime contractor will not all need to have the same level of CMMC certification to win a contract, Arrington said.

“Security is not one size fits all,” she added. Instead, she said, depending on how controlled unclassified information flows between those parties involved in a contract, subcontractors might need only be a CMMC Level 1 company.

CMMC will ensure a more level and fair playing field for companies bidding on DOD contracts, Arrington said. Today, she said, some small businesses bidding on work might self-attest that they meet requirements to handle certain kinds of information, but in fact only are planning to meet those requirements, while another business might actually be meeting the requirements. CMMC, she said, will ensure that only companies that actually meet requirements can compete for contracts.

“We need to make sure our industry partners are prepared to take on the work, and our third-party auditors will ensure that they are implementing the practices that we need in place to secure that national defense and our industrial base,” Arrington said.

Lord said the department is aware that CMMC requirements could be a burden to some smaller companies and that DOD is working with primes and smaller companies to help them overcome that burden.

“We need small and medium businesses in our industrial base, and we need to retain them,” she said. “We will continue to work to minimize impacts, but not at the cost of national security.”

Defense.gov (2020). DOD to Require Cybersecurity Certification in Some Contract Bids

Help me maintain this news reporting blog by donating here.

Air Force Colonel Sentenced for Receiving Child Pornography

An Air Force Colonel was sentenced today to five years in prison followed by 15 years of supervised release for receiving child pornography.


An Air Force Colonel was sentenced today to five years in prison followed by 15 years of supervised release for receiving child pornography.

Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division and U.S. Attorney G. Zachary Terwilliger for the Eastern District of Virginia made the announcement.

“According to admissions made in connection with his plea agreement, between November 2015 and June 2016, Mark Visconi, 48, received and attempted to receive child pornography using the Internet. Visconi used an online bulletin board dedicated to the sharing of child pornography that operated on the anonymous Tor network to download child pornography. A forensic review of his laptop showed that Visconi downloaded and viewed numerous child pornography images and videos.  Visconi previously pleaded guilty on Oct. 4, 2019.”

“Visconi also admitted to using his cell phone to create hundreds of apparently surreptitious pictures that were focused on the clothed buttocks of minor girls, including images that appear to have been taken with a camera angled upward underneath a minor’s skirt or loose shorts so as to depict or attempt to depict the minor’s underwear.”    

The case was investigated by U.S. Immigration and Customs Enforcement’s Homeland Security Investigations. Trial Attorney Gwendelynn Bills of the Criminal Division’s Child Exploitation and Obscenity Section (CEOS) and Assistant U.S. Attorney Whitney Russell of the Eastern District of Virginia are prosecuting the case.

This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. 

For more information about Project Safe Childhood, please visit www.justice.gov/psc.

Photo: Col. Mark Visconi, shown in this 2007 photo as a Major, pleaded guilty to child pornography charges and was sentenced to five years in prison. (David Armer/Air Force)

Help me maintain this news reporting blog by donating here.

Raytheon to help US Air Force modernize missile warning architecture

Raytheon Intelligence, Information and Services has developed a completely open framework — which the Air Force calls the Future Operationally Resilient Ground Evolution (FORGE) Mission Data Processing Application Framework (MDPAF) — that will be capable of processing Overhead Persistent Infrared (OPIR) satellite data


New system will fuse dozens of data sources for the military

To help with this mission, Raytheon Intelligence, Information and Services has developed a completely open framework — which the Air Force calls the Future Operationally Resilient Ground Evolution (FORGE) Mission Data Processing Application Framework (MDPAF) — that will be capable of processing Overhead Persistent Infrared (OPIR) satellite data from both the U.S. Air Force’s evolving Space Based Infrared System (SBIRS) constellation and the future Next Gen OPIR constellation, as well as be capable of processing data from other civil and environmental sensors.

“The U.S. government’s global satellite network produces a constant flood of data — petabytes and petabytes of it every day,” said Dave Wajsgras, president of Raytheon IIS. “The Air Force wants to open that network up so they can use as much of that data as possible. That’s a huge transformation not just for the service, but for the whole government.”

This is a significant departure from previous satellite ground control programs. Typically, companies would develop a system that collects and exploits data from specific types of satellites or sensors. FORGE changes this model as it’s able to collect data from nearly any type of satellite or sensor, and then helps operators make sense of that data quickly.

“Essentially, this is a smartphone model,” said Wajsgras. “We’ve built an operating system that everyone can build applications for – from Raytheon to the Air Force to universities to small companies. These applications allow the system to process specific types of data.”

One of the key benefits of incorporating new applications is that the system can be used beyond its intended mission. For example, an application could be built that would allow civil agencies to use the same satellite data to help detect forest fires, volcanic activity, agricultural changes, even surges in electric power consumption.

Further departing from the traditional ground control development model, Raytheon built the prototype system in less than a year and it’s capable of processing real data today. The company leveraged development work on several past programs, especially its Advanced Weather Integrated Processing System, to design the framework. Raytheon also incorporated its deep experience developing applications using DevSecOps and Agile software development processes to dramatically speed development.

Raytheon will work with the Air Force over the upcoming years to further evolve and prove the framework’s capabilities.

Help me maintain this news reporting blog by donating here.

Huntington Man Sentenced for Illegally Accessing Veterans’ Records

A Huntington, West Virginia man was sentenced to six months in prison for illegally accessing the medical records of six veterans, announced United States Attorney Mike Stuart.


A Huntington, West Virginia man was sentenced to six months in prison for illegally accessing the medical records of six veterans, announced United States Attorney Mike Stuart. 

Jeffrey Miller, 40, a former Veterans Benefits Administration (VBA) employee, was also sentenced to one year of supervised release.

“We must protect our veterans. Miller used his position with the Veterans Benefits Administration to illegally access the medical records of veterans,” said United States Attorney Mike Stuart. “Medical records are protected information and veterans have an expectation and right of privacy. We will prosecute anyone who violates our veterans.”

Miller previously admitted that he illegally accessed the medical records of six veterans between January and May of 2018. 

Miller further admitted that he took a picture of the medical records of former West Virginia State Senator Richard Ojeda, and then sent the picture to an acquaintance.

The Department of Veterans Affairs – Officer of the Inspector General and the Federal Bureau of Investigation (FBI) conducted the investigation. United States District Judge Robert C. Chambers presided over the hearing and Assistant United States Attorney Stefan Hasselblad handled the prosecution.

Help me maintain this news reporting blog by donating here.

Car of missing US Marine in Arizona found, Veteran still missing

Law Enforcement in Arizona has found a car belonging to U.S. combat veteran Jesse Conger who has been missing for more than five months.


Law Enforcement in Arizona has found a car belonging to U.S. combat veteran Jesse Conger who has been missing for more than five months.

Conger, 37, was last seen with his girlfriend, Natasha Harwell, the morning of August 14 at his apartment in Scottsdale. Harwell reported him missing the next day, and his family said he’d been suffering from post-traumatic stress disorder and depression.

The Scottsdale Police Department told FOX10 on Saturday that Conger’s car was discovered in San Carlos on Thursday, about 100 miles east of Phoenix.

His sister, Patricia Conger stated on Facebook that three men working in eastern Arizona found Jesse’s car on Thursday morning and that they called police and texted her at 10 am. When talking to locals the police were told the car had been there more than a month. The rail crew had been there the day before but didn’t notice it because of the terrains and color of the car.

“Apparently the morning sun happened to reflect off of a break light that shined in one of their eyes that made them notice it when they did. All the rain has washed away all tracks of any kind, “Conger said. “The car had the keys in the ignition, and Jesse’s maps, and fishing/hunting gear is still there. Jesse’s pistol is not there. I haven’t been able to confirm if the Xanax or Tramadol was there.”

Anyone with information of the whereabouts of Jesse Conger is asked to contact the Scottsdale Police Department.