As Pentagon Dawdles, Silicon Valley Sells It’s Hottest Technology Abroad

A trio of tech CEOs say red tape and onerous requirements are undermining just the sorts of products that Pentagon says it wants.
    
Liquid Robotics sells seagoing robots that can carry sub-hunting sensors on long patrols. Savonix is beta-testing a mobile app whose cognitive assessments can improve how people do their jobs and interact with machines. Hytrust improves security for cloud computing. But the innovators running these outfits, and others like them, have begun turning their sales efforts toward foreign militaries because doing business with the Pentagon is just too hard.

At an Atlantic Council event recently, Liquid Robotics CEO Gary Gysin described a recent interview at the Pentagon. He said it took four months to set up, even though his company receives funding from In-Q-Tel and the Office of Naval Research. His product, the Wave Glider SV3, is “the world’s first hybrid wave and solar propelled unmanned ocean robot,” the company website says. You can outfit it with sensor packs to do advanced sub-hunting, a major concern for the Pentagon, especially given Russia’s efforts to bolster its submarine fleet.

Liquid Robotics does do business with the US military, through prime contractors. But Gysin fears a growing gap. “We’re in almost every country in Asia. And they make decisions, rapid decisions. And we’re in selling our platform. And if we’re in selling our platform and we’re not selling it to our government at the same pace, that worries me,” he said.

He’s not alone. At the same event, the heads of Savonix and Hytrust also said that they were seeing interest from foreign militaries.

Savonix founder Mylea Charvat said potential Pentagon sales are just 1 percent of the total market for apps that measure cognitive performance. But she wants to help her country’s troops. “We really do care,” she said. ” There’s a concern among educated entrepreneurs in Silicon Valley” about getting advanced tech” into the hands of our warfighters and optimizing their performance using the best tools that we have available.”

But the CEOs said the sluggish pace of Pentagon contracting is preventing commercial tech firms from responding to the entreaties of Defense Secretary Ash Carter and other DoD players. Prime contracting processes can take a decade, far longer than Silicon Valley investors are willing to wait for a return on their investment.

“They don’t want a sale cycle that’s [even as long as] nine to 18 months,” Charvat said. “So just think of that in the context of the prime contract process with the United States government that can take a decade. A decade from now they [the investors] expect us to have exited this company. They expect an acquisition or an IPO. They expect to no longer be primary shareholders in my company.”

But a company can’t just find a military outfit that needs its product and ring up a sale. Such a transaction requires a no-bid, or “sole source,” contract. And those come with a lot of unattractive demands.
 
“In order to justify a sole-source contract you have to write down why what you do…is so unique,” Charvat said. “And they want you to go into the kind of detail that would make a patent officer blush. That’s a huge IP [intellectual property] concern because what they also want to do is show this to all these other companies and see if they can do it too. Well, no, no, no.”

She said she walked away from a recent sale when military buyers wanted her to put too much proprietary information in a white paper.

All three CEOs said a lot of Silicon Valley people are interested in working on DOD problems, yet highly skeptical about doing business with the Pentagon.

Last year, Carter established the Defense Innovation Unit Experimental, or DIUx, at Santa Clara’s Moffett Field, precisely to address those concerns. He’s poured his own time and attention into the effort, visiting three times since September.

At a recent National Industrial Association event in Tampa, Col. Steven Butow — who leads DIUx’s National Guard liaison effort — said that most of the five business outreach events he’s held in Silicon Valley were standing room only.

“We have not had one company out there shut the door,” he said. Butow said the events works best when a soldier can bring his or her problem directly to folks who might be able to solve it.

“What this is doing is putting non-traditional thinkers into our problem set,” he said. “We did a little experiment. We can have anybody not in uniform come out and try to tell the people we work with in the Valley what the problem is, and they listen attentively, but it doesn’t go very far because the people who normally do that are detached from the person who really has the problem.”

But, he said, “When we take a person in uniform and put them in the same room, you know what happens? We get 15 to 20 people who get really into ‘What’s the nature of the problem? What’s the environmental conditions?’ They’re looking at it from, ‘How do we apply what we’re doing to national security and defense?”

Butow said DIUx can help move ideas between two radically different cultures: a meritocracy where a 22-year-old can get $2 million in funding in 40 days to pursue a good idea, and a slow-moving institution resistant to change.

The entrepreneurs at the Atlantic Council event gave DIUx high marks for intentions, and offered this advice to Carter: Enable the Pentagon to acquire goods from already commercialized companies (so IP is not an issue) a lot faster.

“I’m looking for a meeting with a decision at the end. We had a meeting — you want it; you don’t want it. Let’s move on,” said Charvarat.

Meanwhile, DIUx, which recently began moving to fund its first round of contracts, has its doubters in Congress.

The House Armed Services Committee’s subcommittee on threats and capabilities listed a few of those concerns in the 2017 National Defense Authorization bill. One is “the pinpoint focus on one geographic region, as well as the dedication of significant funding at such a nascent period in the development of this organization and the concept on which it was founded.” Another: “that outreach is proceeding without sufficient attention being paid to breaking down the barriers that have traditionally prevented nontraditional contractors from supporting defense needs, like lengthy contracting processes and the inability to transition technologies.”

Time will tell how easily those barriers are broken. But time is not something startups have much of.

DefenseOne: 

« Could Bitcoin’s Blockchain Run An Entire City?
Hacking Team Postmortem »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

it-sa 365

it-sa 365

it-sa 365 is a digital platform for connecting IT security vendors and experts with those who bear responsibility for IT security in management and technology.

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (Manusec) is a global series of summits focusing on Cyber Security for Critical Manufacturing Sectors.

CybergymIEC

CybergymIEC

CybergymIEC is a global leader in cyber defense solutions and training services.

ENVEIL

ENVEIL

ENVEIL’s technology is the first scalable commercial solution to cryptographically secure Data in Use.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

NextVision

NextVision

NextVision is a Cybersecurity and Technology company offering a range of solutions and services for Security, Compliance and IT Infrastructure Management.

Capula

Capula

Capula is a leading system integration specialist for control, automation and operational IT systems across all applications and industry sectors.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.

Clearnetwork

Clearnetwork

Clearnetwork specializes in managed cybersecurity solutions that enable both public and private organizations improve their security posture affordably.

Orpheus Cyber

Orpheus Cyber

Orpheus Cyber provides predictive and actionable intelligence to our clients - enabling them to anticipate, prepare for and respond to the cyber threats they face.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Interactive

Interactive

Interactive are a leading Australian IT service provider with services in Cloud, Cyber Security, Data Centres, Business Continuity, Hardware Maintenance, Digital Workplace, and Networks.

Oasis Security

Oasis Security

Oasis is the market leading platform for non-human identity management. Our mission is to fortify cybersecurity defenses by enabling enterprises to efficiently secure non-human identities.