Barkley Group

Barkley Group Teammates

1) Automated Process Surveys

2) Carbon-Key LLC.

      3) Decision Software Systems LLC.

4) Monnit

5) Reliant Scientific LLC.

6) SC&A

Copyright © Aug 22, 2018 Barkley Group all Rights Reserved

54151   Computer Systems Design and Related Services

541511 Custom Computer Programming Services

541512 Computer Systems Design Services

541513 Computer Facilities Management Services

541519 Other Computer Related Services

541715 Research and Development in the Physical, Engineering, and Life Sciences (except Nanotechnology and Biotechnology)

54133   Engineering ServicesT

541330 Engineering Services

54199   All Other Professional, Scientific, and Technical ServicesT

541990 All Other Professional, Scientific, and Technical Services

Barkley Group Experience

a.      Ballistic Missile Defense

b.      Combat Systems Integration

c.       Kalman Filtering

d.      Multi-sensor Fusion

e.      Tracking Intercepting and Filtering

a.       Artificial Intelligence

                                                              i.      Most US Military Artificial Intelligence (AI) has been in English.  However, translating Arabic or other Semetic languages documents and communications to English before applying AI may not produce desired results

                                                            ii.      Many threats hide in language subtleties such as: nuances, ambiguities, and context dependent word meanings. These subtleties are often lost in translation.

                                                         iii.      An enemy who knows that the US Military is translating his language to English before analysis, can easily hide intent in the subtleties.

                                                          iv.      For Semitic languages AI must be done in the original language! Here is a detailed discussion of the problem

b.       Compiler Construction

c.      Computer Language Design

                                                              i.      Develop higher level language compilers, above the programming languages in d. below, to enable users to choose the features they want in a program by a program

                                                            ii.      Compile it and generate a working program from a library of modules.

                                                         iii.      This is the penultimate software reuse.

                                                                i.      Ada

                                                             ii.      Bison/Yacc

                                                           iii.      CMS-2

1.       Direct Code 

                                                          iv.      C / C++ / C#

                                                            v.      DCL

                                                          vi.      Flex/lex

                                                       vii.      Fortran

                                                     viii.      HTML

                                                          ix.      IDL

                                                            x.      Java

                                                          xi.      JavaScript

                                                        xii.      Jovial

                                                     xiii.      Make

                                                     xiv.      Mathematica

                                                        xv.      Mathcad

                                                     xvi.      MATLAB

                                                   xvii.      Pascal

                                                 xviii.      PHP

                                                       xix.      PL/I

                                                        xx.      Python

                                                      xxi.      Ruby

                                                    xxii.      Sed

                                                 xxiii.      SQL

 3) Electrical Engineering

 4) Mechanical Engineering

 5) Mathematics

a.      We are experts in mathematical modeling of physical and abstract systems

b.      Use Math Modeling to help resolve issues with physical systems mentioned in a BAA. Eg:

                                                               i.      Improved Capacity, High Efficiency Cryogenic Cooling System

                                                             ii.      Compact, Flexible Integrated Power Node Center for Direct Current Distribution

                                                           iii.      Pattern Recognition Algorithms for Detection of Latent Errors in Combat System Software

                                                           iv.      Ultra-Low Ripple 1000 Volt Direct Current Battery Charger

                                                             v.     

a.     Identifying “Holes” in Systems Engineering Documents

                b.     Identifying “Holes” in software solutions

          c.   Multi-disciplinary solutions to difficult problems

d.  The US Military has Billion Dollar Software Projects which go on and on and on, and never seem
to produce
a useable product. We can fix this! 

a.      We’ve worked in the defense industry for years and understand the problems.

b.       We are about to create a new area of study called: Systems Process Engineering.

c.       With this approach, the Military can force projects to completion with useable products emitted.

   9) Software Integration and Test

10) Software Integration and Test Automation

11) Systems Engineering

12) Cyber Security Engineering Capabilities

In a prior subcontract, supported systems engineering for the JSF F–22 encryptors program. The effort

included analysis of the development of the Theory of Equipment Operations (TEO), Fail Safe Design

Assurance data communications system. Tasking analysis included review of Crypto Ignition compatible

pre–placed management keys during startup and upset clearance processing.

Additional efforts entailed using technical analysis of data communications traffic transmitted and

received via the encoder(s) interfacing with the AEHF, MILSTAR and GPS satellite communications

systems.

In the area of AEHF extensive efforts entailed TEO,FSDAR, UIC analysis of the satellite encoding payload

ASICS. The effort incorporated Global Information Grid (GIG) communications to support Asynchronous

Transfer Mode (ATM) communications messaging into large secure payload data frames.

In a subcontract for Global Positioning System (Block IIR/III) supported satellite navigation payload

systems/software engineering the control channel uplink and downlink message commands. Part of the

effort was to resolve the multi–vendor GPS PIRNS to assure compliance of the command message

formats accuracy per edition of planned communications updates.

On GPS Block III supported key management import operations for the GPS satellite payload into the

internal key management database(s). Here also supported ground based communications message

processing to the GPS satellite constellation.


In addition, worked on the Systems Operations Center (SOC) High Assurance Electronic Key

Management System(s) (EKMS) Cryptograhic key distribution network. Extensive work with the Local

Management Device (LMD) /Key Processor (KP), Data Transfer Device (DTD), End Cryptographic Units

(ECUs) and ASN.1 messaging. Worked with the Central Facility (CF) Simulator to generate EKMS Standard

Key Material. The CF Key data was then imported into the Central Automated Key Management System

(CAKMS) for subsequent processing (An array of LMD/KPs). The CAKMS key material is then imported

into a Local Area Key Management System (LAKMS) for further processing. The LAKMS output is then

imported to a single LMD/KP and the output is transferred to a Data Transfer Device (DTD). The DTD is

then transported to the designated End User Cryptographic Unit(s) (ECU) and the key material is

installed into these devices.

Decision Software Systems Inc www.decision–software.com 800–682–0794 dssinc@decision–software.com

1 | P a g e


Here also supported Cryptographic Verification and development of Testing procedures for approval by

the vendor(s).

In a recent project, supported Risk Management Framework (RMF) (NIST SP–800–39 etc) Cyber Security

Mitigation. Tasks involved identification and installation of security critical patches for the computing

systems (Windows Servers 2008/2012 and Sun Servers) in the network. Introduced to the Patching

efforts utilization of the Microsoft Windows Update Services (WSUS) to automate server network

patching. Performed analysis for Common Off the Shelf (COTS) periodic security critical and/or

comprehensive vendor patching within the designated patch cycle. Patches were applied to both

operating systems and applications.

Reviewed Defense Information Systems Agency (DISA), Security Technical Information Guides (STIGs)

guidelines and properly configured systems for applicable STIG requirements. Built compliance matrices

and support Plan of Action and Mitigation (POAM) on issues identified for Authorization to Operation

(ATO). Worked on RMF areas building compliance matrices for identification of program weakness with

respect to RMF compliance. (eg. Disaster Recovery, Risk Management Policies and Procedures etc).

Here also worked on Window Servers Group Policies used to control access to the AEHF data based on

user and data access rights. The policies are enforced by utilization of Active Directory (AD) standards.

Here also supported systems/software engineering and analysis of frequency permutation satellite

communications to optimize usage of channel communications usage based on planned usage

schedules. The system utilize counter mode communications between the satellite constellation and

the end user communications platforms

Decision Software Systems Inc www.decision–software.com 800–682–0794 dssinc@decision–software.com

2 | P a g e