recommended reading

Series of firms win Defense contracts to provide new RFID technology

A group of firms has won contracts worth a total of $428 million to provide active radio frequency identification technology tags, readers, systems and services to the Defense Department in a procurement designed to bring competition to a field long dominated by a subsidiary of contracting giant Lockheed Martin Corp.

Now, Northrop Grumman Corp., Systems & Processes Engineering Corp. and Unisys will join the Savi Technology division of Lockheed Martin in providing the technology.

The RFID III contracts awarded on Dec. 19 by the Army's Technology, E-Commerce and Commercial Contracting Center also will provide a wider range of RFID tags than Savi supplied under previous contracts. And the tags will operate under International Organization for Standards 18000-7 standards, rather than by using proprietary Savi technology.

Since 1994, Defense has established a global network to use active RFID technology to track cargo in containers, providing it with visibility into its supply chain that was lacking in the first Iraq war.

Active RFID tags are powered by a battery and can be read at a range of 300 feet. Passive tags, which Defense uses to identify cases and pallets of supplies, do not have batteries and have a shorter range.

When tags are read, the contents of a container are identified and transmitted over Defense networks to logistics databases the four services and the U.S. Transportation Command maintain.

Demand for active RFID tags and readers in the Defense Department is so strong that in February, the Army raised the ceiling on its RFID II contract with Savi -- which expires next month -- by $60 million, to $483 million.

The active RFID tags Savi currently supplies come equipped with 128k of rewriteable memory. The new contracts call for the vendors to provide a wide array of tags, ranging form a simple digital "license plate" tag identifying a container to tags with up to 512k of memory, said Sam McClintock, manager of the Northrop Grumman Automated Information Technology Center in Williamsburg, Va.

The contract also includes an inexpensive tag with a nonreplaceable battery, which McClintock described as a "throw-away" tag, and security tags that record when a container door has been opened or closed during transit.

Phil Toler, vice president for strategic plans and products at SPEC, said vendors on the RFID III contract also will supply environmental tags that can record temperatures inside refrigerated containers.

Toler said he expects strong demand on RFID III for license plate tags due to their inherent security. A potential adversary equipped with a handheld RFID reader would be able to determine only the number of a container equipped with such a tag, and not gain any information about the contents of the container.

While Savi now faces competition on RFID III, the other companies involved still will have to license intellectual property from Savi to meet active RFID standards.

Toler said he believes that competition on RFID III will be good for all the vendors, including Savi, and also will benefit users throughout Defense and at other federal agencies, which can buy off the contract. RFID III has two base years for ordering tags, readers and services and another three option years. There are also options for another five years for maintenance.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.