Barkley Group Teammates
1) Automated Process Surveys
2) Carbon-Key LLC.
3) Decision Software Systems LLC.
5) Reliant Scientific LLC.
Aug 22, 2018 Barkley Group all Rights Reserved
Please Click Blue Folds to Open
54151 Computer Systems Design and Related Services
541511 Custom Computer Programming Services
541512 Computer Systems Design Services
541513 Computer Facilities Management Services
541519 Other Computer Related Services
541715 Research and Development in the Physical, Engineering, and Life Sciences (except Nanotechnology and Biotechnology)
54133 Engineering ServicesT
541330 Engineering Services
54199 All Other Professional, Scientific, and Technical ServicesT
541990 All Other Professional, Scientific, and Technical Services
Barkley Group Experience 1) Analytics
a. Ballistic Missile Defense
e. Tracking Intercepting and Filtering 2) Computer Science
a. Artificial Intelligence
Most US Military Artificial Intelligence (AI) has been
in English. However, translating
or other Semetic languages documents and communications to English before
applying AI may not produce desired results Arabic
Many threats hide in language subtleties such as:
nuances, ambiguities, and context dependent word meanings. These subtleties are
often lost in translation.
An enemy who knows that the US Military is translating
his language to English before analysis, can easily hide intent in the
For Semitic languages AI must be done in the original
language! Here is a detailed discussion
of the problem
c. Computer Language
Develop higher level language compilers, above the
programming languages in d. below, to enable users to choose the features they
want in a program by a program
Compile it and generate a working program from a library
This is the penultimate software reuse. 2d) Languages Supported
/ C++ C#
5) Mathematics 6) Mathematical Modeling
We are experts in mathematical
modeling of physical and abstract systems
Math Modeling to help resolve issues with physical systems mentioned in a BAA. Eg :
Capacity, High Efficiency Cryogenic Cooling System
Flexible Integrated Power Node Center for Direct Current Distribution
Recognition Algorithms for Detection of Latent Errors in Combat System Software
Ripple 1000 Volt Direct Current Battery Charger
… 7) Outside Of the Box "Solutions to Difficult Problems"
“Holes” in Systems Engineering Documents
“Holes” in software solutions Multi-disciplinary
solutions to difficult problems
d. The US Military has Billion Dollar Software
Projects which go on and on and on, and never seem a useable to produce product. We can fix this! 8) Systems Process Engineering
worked a. i n the defense industry for years and
understand the problems.
b. We are about to create a new area of study called: Systems Process Engineering.
With this approach, c.
the Military can force projects to completion with useable
Integration and Test
Integration and Test Automation
11) Systems Engineering
12) Cyber Security Engineering Capabilities 12a) Prior Subcontract
Please Click Blue Folds to Open
In a prior subcontract, supported systems engineering for the JSF F–22 encryptors program. The effort
included analysis of the development of the Theory of Equipment Operations (TEO), Fail Safe Design
Assurance data communications system. Tasking analysis included review of Crypto Ignition compatible pre–placed management keys during startup and upset clearance processing.
Additional efforts entailed using technical analysis of data communications traffic transmitted and
received via the encoder(s) interfacing with the AEHF, MILSTAR and GPS satellite communications
In the area of AEHF extensive efforts entailed TEO,FSDAR, UIC analysis of the satellite encoding payload
ASICS. The effort incorporated Global Information Grid (GIG) communications to support Asynchronous Transfer Mode (ATM) communications messaging into large secure payload data frames.
In a subcontract for Global Positioning System (Block IIR/III) supported satellite navigation payload
systems/software engineering the control channel uplink and downlink message commands. Part of the
effort was to resolve the multi–vendor GPS PIRNS to assure compliance of the command message
formats accuracy per edition of planned communications updates.
On GPS Block III supported key management import operations for the GPS satellite payload into the internal key management database(s). Here also supported ground based communications message
processing to the GPS satellite constellation.
In addition, worked on the Systems Operations Center (SOC) High Assurance Electronic Key Management System(s) (EKMS) Cryptograhic key distribution network. Extensive work with the Local
Management Device (LMD) /Key Processor (KP), Data Transfer Device (DTD), End Cryptographic Units
(ECUs) and ASN.1 messaging. Worked with the Central Facility (CF) Simulator to generate EKMS Standard
Key Material. The CF Key data was then imported into the Central Automated Key Management System
(CAKMS) for subsequent processing (An array of LMD/KPs). The CAKMS key material is then imported
into a Local Area Key Management System (LAKMS) for further processing. The LAKMS output is then
imported to a single LMD/KP and the output is transferred to a Data Transfer Device (DTD). The DTD is
then transported to the designated End User Cryptographic Unit(s) (ECU) and the key material is
installed into these devices.
D ecision Software Systems Inc www.decision–software.com 800–682–0794 dssinc@decision–software.com
1 | P a g e
12b) Cryptographic Verification and Development of Testing Procedures
Here also supported Cryptographic Verification and development of Testing procedures for approval by the vendor(s). In a recent project, supported Risk Management Framework (RMF) (NIST SP–800–39 etc) Cyber Security Mitigation. Tasks involved identification and installation of security critical patches for the computing systems (Windows Servers 2008/2012 and Sun Servers) in the network. Introduced to the Patching efforts utilization of the Microsoft Windows Update Services (WSUS) to automate server network patching. Performed analysis for Common Off the Shelf (COTS) periodic security critical and/or comprehensive vendor patching within the designated patch cycle. Patches were applied to both operating systems and applications. Reviewed Defense Information Systems Agency (DISA), Security Technical Information Guides (STIGs) guidelines and properly configured systems for applicable STIG requirements. Built compliance matrices and support Plan of Action and Mitigation (POAM) on issues identified for Authorization to Operation (ATO). Worked on RMF areas building compliance matrices for identification of program weakness with respect to RMF compliance. (eg. Disaster Recovery, Risk Management Policies and Procedures etc). Here also worked on Window Servers Group Policies used to control access to the AEHF data based on user and data access rights. The policies are enforced by utilization of Active Directory (AD) standards. Here also supported systems/software engineering and analysis of frequency permutation satellite communications to optimize usage of channel communications usage based on planned usage schedules. The system utilize counter mode communications between the satellite constellation and the end user communications platforms D ecision Software Systems Inc www.decision–software.com 800–682–0794 dssinc@decision–software.com 2 | P a g e