13.07.2013 Views

Network Unifier Maj. Gen. Susan S. Lawrence - KMI Media Group

Network Unifier Maj. Gen. Susan S. Lawrence - KMI Media Group

Network Unifier Maj. Gen. Susan S. Lawrence - KMI Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Voice of Military Communications and Computing<br />

<strong>Network</strong><br />

<strong>Unifier</strong><br />

<strong>Maj</strong>. <strong>Gen</strong>.<br />

<strong>Susan</strong> S.<br />

<strong>Lawrence</strong><br />

Commanding<br />

<strong>Gen</strong>eral<br />

Army NETCOM<br />

9th SC (A)<br />

PRSRT STD<br />

U.S. POSTAGE<br />

PAID<br />

ROCKVILLE, MD<br />

PERMIT # 2669<br />

www.MIT-kmi.com<br />

C4ISR<br />

September 2009<br />

Volume 13, Issue 8<br />

Satellite Phones ✯ Domain Name Security ✯ NCOIC ✯ 3G Technology<br />

Air Mobility Command ✯ C2 Transformation ✯ Software as a Service ✯ Cybermetrics


MILITARY INFORMATION TECHNOLOGY<br />

SEPTEMBER 2009<br />

VOLUME 13 • ISSUE 8<br />

FEATURES COVER / Q&A<br />

6<br />

11<br />

16<br />

18<br />

30<br />

34<br />

37<br />

38<br />

<strong>Network</strong>s in the Sky<br />

Rapidly evolving from its first incarnations, satellite phone<br />

technology is becoming embedded in every part of military life from<br />

the foxhole to the Internet cafe.<br />

By Adam Baddeley<br />

3G and Beyond<br />

Cellular communications technologies now in their latest 3G and<br />

4G iterations are being tested, evaluated and packaged for urgent<br />

operational needs in the current fight and integrated in critical<br />

programs both on and off the battlefield.<br />

By Adam Baddeley<br />

Digital Technology for Small Unit Leaders<br />

In order to leverage the potential of networked information, small<br />

unit leaders need greater bandwidth connecting them to a secure<br />

network.<br />

By Colonel Buddy Carman and Mike Kelley<br />

Putting the IT in “Mobility”<br />

The Directorate of Communications supports Air Mobility Command<br />

by providing integrated, reliable and secure communications<br />

and information, and providing services and policy for managing<br />

information as a strategic resource.<br />

Domain Name Security<br />

A new mandate for defense and other federal agencies is focusing<br />

attention on the security of the Internet’s Domain Name System—<br />

the vital “telephone book” that looks up the IP addresses of<br />

Websites.<br />

By Peter Buxbaum<br />

Servings of Software<br />

Information technology vendors providing software as a service are<br />

attracting growing revenues, as well as increasing interest from<br />

military organizations.<br />

By Peter Buxbaum<br />

Outcome-Based Metrics<br />

It is vital that the government develop processes by which<br />

to measure performance and outcomes associated with its<br />

cybersecurity efforts.<br />

By Scott Charbo<br />

<strong>Network</strong>-Centric Consensus<br />

The <strong>Network</strong> Centric Operations Industry Consortium (NCOIC) is a<br />

global not-for-profit association dedicated to the advancement of<br />

network-centric operations and the benefits of interoperability.<br />

25<br />

<strong>Maj</strong>or <strong>Gen</strong>eral <strong>Susan</strong> S. <strong>Lawrence</strong><br />

Commanding <strong>Gen</strong>eral<br />

Army <strong>Network</strong> Enterprise<br />

Technology Command<br />

9th Signal Command (Army)<br />

DEPARTMENTS<br />

2<br />

4<br />

4<br />

20<br />

22<br />

42<br />

43<br />

Editor’s Perspective<br />

Program Notes<br />

People<br />

JTRS Update<br />

Data Bytes<br />

COTSacopia<br />

Calendar, Directory<br />

INDUSTRY INTERVIEW<br />

44<br />

Simon Lee<br />

Chief Executive Officer<br />

STG Inc.


MILITARY INFORMATION<br />

TECHNOLOGY<br />

VOLUME 13, ISSUE 8 SEPTEMBER 2009<br />

The Voice of Military Communications<br />

and Computing<br />

EDITORIAL<br />

Managing Editor<br />

Harrison Donnelly harrisond@kmimediagroup.com<br />

Copy Editor<br />

Regina Kerrigan reginak@kmimediagroup.com<br />

Correspondents<br />

Adam Baddeley • Peter Buxbaum • Scott Gourley<br />

Tom Marlowe • Karen E. Thuermer<br />

ART & DESIGN<br />

Art Director<br />

Anna Druzcz anna@kmimediagroup.com<br />

Graphic Designers<br />

Scott Morris scottm@kmimediagroup.com<br />

Anthony Pender anthonyp@kmimediagroup.com<br />

Jittima Saiwongnuan jittimas@kmimediagroup.com<br />

ADVERTISING<br />

Account Executives<br />

Tabitha Naylor tabitha@kmimediagroup.com<br />

Dean Sprague deans@kmimediagroup.com<br />

Ted Ventresca tedv@kmimediagroup.com<br />

<strong>KMI</strong> MEDIA GROUP<br />

President and CEO<br />

Jack Kerrigan jack@kmimediagroup.com<br />

Executive Vice President<br />

David Leaf davidl@kmimediagroup.com<br />

Vice President of Sales and Marketing<br />

Kirk Brown kirkb@kmimediagroup.com<br />

Editor-In-Chief<br />

Jeff McKaughan jeffm@kmimediagroup.com<br />

Controller<br />

Gigi Castro gcastro@kmimediagroup.com<br />

Publisher’s Assistant<br />

Carol Ann Barnes carolannb@kmimediagroup.com<br />

OPERATIONS, CIRCULATION & PRODUCTION<br />

Circulation Specialists<br />

Dena Granderson denag@kmimediagroup.com<br />

Davette Posten davettep@kmimediagroup.com<br />

MARKETING & ONLINE<br />

Marketing & Online Director<br />

Amy Stark astark@kmimediagroup.com<br />

Trade Show Coordinator<br />

Holly Foster hollyf@kmimediagroup.com<br />

A PROUD MEMBER OF<br />

SUBSCRIPTION INFORMATION<br />

Military Information Technology<br />

ISSN 1097-1041<br />

is published 11 times a year by <strong>KMI</strong> <strong>Media</strong> <strong>Group</strong>.<br />

All Rights Reserved. Reproduction without permission is<br />

strictly forbidden. © Copyright 2009.<br />

Military Information Technology is free to members of the<br />

U.S. military, employees of the U.S. government and<br />

non-U.S. foreign service based in the U.S.<br />

All others: $65 per year.<br />

Foreign: $149 per year.<br />

Corporate Offices<br />

<strong>KMI</strong> <strong>Media</strong> <strong>Group</strong><br />

15800 Crabbs Branch Way, Suite 300<br />

Rockville, MD 20855-2604 USA<br />

Telephone: (301) 670-5700<br />

Fax: (301) 670-5701<br />

Web: www.MIT-kmi.com<br />

Sometimes, the questions can be at least as telling as the answers.<br />

At the Army LandWarNet conference in Fort Lauderdale, Fla., this<br />

summer, for example, one of the plenary sessions featured a number of<br />

executives from companies involved in Army information technology.<br />

What was especially interesting was that session organizers took the time<br />

to ask staff members in the Army Chief Information Office/G-6 what<br />

questions they would most like to ask industry. The questions were:<br />

•<br />

•<br />

•<br />

•<br />

•<br />

•<br />

How could industry support the requirement to take modular capa-<br />

bilities and deploy them anywhere, with immediate connectivity and<br />

access to network-delivered capabilities, without the need to modify<br />

systems or configurations? How would industry create an environment<br />

that supports the “fight on arrival” imperative, global plug and play, and train as we fight?<br />

What is industry’s role in achieving the Army’s thrust to integrate generating and operating force<br />

into one cohesive force in support of total joint requirements, and what is needed from the Army<br />

to make this a reality?<br />

From what you know of the Army infostructure today, what three areas should the Army focus<br />

on—why and how?<br />

What lessons learned or areas of improvement—IT, communications, information assurance or<br />

network management—have come from overseas contingency operations? What specific areas can<br />

the government partner with industry to better support joint warfighters?<br />

The Army fights today in a coalition construct, which presents challenges within the U.S. military,<br />

and even more without international partners. What is U.S. industry doing to bridge this gap?<br />

In an era of increasing demand for new technology and flat or<br />

decreasing IT budgets, what approaches should the Department<br />

of Defense take to keep pace with the rate of technology change?<br />

While the answers given by industry executives on the panel<br />

were good, the questions themselves provided valuable insight into<br />

what’s on the minds of those creating the Global <strong>Network</strong> Enterprise<br />

Construct.<br />

SOF Leader<br />

Admiral Eric<br />

T. Olson<br />

Commander<br />

USSOCOM<br />

<strong>KMI</strong> MEDIA GROUP FAMILY OF MAGAZINES AND WEBSITES<br />

Military Medical/<br />

CBRN Technology<br />

www.MMT-kmi.com<br />

Special Operations<br />

Technology<br />

World’s Largest Distributed Special Ops Magazine<br />

Body Armor Image Image Analysis Weapon Weapon Suppressors<br />

Wearable Power CSAR CSAR with a Twist PEO PEO Soldier<br />

USSOCOM USSOC USSOC Program<br />

Updates Updates<br />

www.SOTECH-kmi.com<br />

May<br />

2008<br />

Volume 6, Issue 4<br />

Geospatial<br />

Intelligence Forum<br />

www.GIF-kmi.com<br />

Military Information<br />

Technology<br />

Military Logistics<br />

Forum<br />

www.MLF-kmi.com<br />

Military Training<br />

Technology<br />

Harrison Donnelly<br />

harrisond@kmimediagroup.com<br />

(301) 670-5700<br />

Military Space &<br />

Missile Forum<br />

www.MSMF-kmi.com<br />

Military Advanced<br />

Education<br />

www.SOTECH-kmi.com www.MIT-kmi.com www.MT2-kmi.com<br />

www.MAE-kmi.com


Reliability is crucial on the battlefield. With over 400,000 units deployed worldwide, ITT SINCGARS is the most<br />

capable, reliable, battle-proven combat net radio available today. This tough radio, with waveforms and features<br />

only found with ITT SINCGARS, is built to survive the harshest environmental challenges. Giving you peace of<br />

mind on the battlefield. To find out how ITT SINCGARS stands up to nature’s worst, visit us at: cs.itt.com/tough.<br />

Drenched. Burned. Frozen. Run over.<br />

Blasted. Shot. Dropped.<br />

Yeah, it still works.<br />

<br />

ITT, the Engineered Blocks logo, and ENGINEERED FOR LIFE are registered trademarks of ITT Manufacturing Enterprises, Inc., and are used under license. ©2009, ITT Corporation.


Compiled by <strong>KMI</strong> <strong>Media</strong> <strong>Group</strong> staff<br />

Advanced Aperture System Offers “Superhero” Vision<br />

Over the past year, a group from the<br />

Army RDECOM CERDEC Night Vision and<br />

Electronic Sensors Directorate (NVESD) has<br />

been working on the Advanced Distributed<br />

Aperture System (ADAS), which gives aircrews<br />

“superhero” vision, enabling them to “see<br />

through” the helicopter.<br />

During a recent flight demonstration,<br />

Brigadier <strong>Gen</strong>eral Raymond Palumbo, deputy commanding general, Army Special<br />

Operations Command, said, “The ability to see through the cockpit infrastructure<br />

is pretty damn awesome. Can you imagine having this on a Stryker, where you can<br />

see all around and hear each other?”<br />

The ADAS is a multi-spectral day/night viewing system, consisting of six<br />

cameras mounted on the outside of the helicopter. The day/night imagery from<br />

each camera is processed and stitched together to provide each aircrew member<br />

with an independent, unrestricted spherical view around the aircraft. Each aircrew<br />

member independently views the thermal and near-infrared fused imagery as it is<br />

projected onto the visor of their helmet mounted display (HMD).<br />

Each aircrew member’s HMD is continually tracked by an optical head tracker,<br />

and the aircrew member determines the imagery he sees by simply pointing<br />

his head in the desired direction.<br />

Correction<br />

In the article, “DISA, GSA<br />

Combine on COMSAT Acquisition,”<br />

in the August 2009 issue of MIT, the<br />

name of one of the prime contractors<br />

on the DSTS-G program appeared<br />

incorrectly. It is CapRock Government<br />

Solutions.<br />

Robert J. Butler has<br />

been appointed to the<br />

Senior Executive Service<br />

and will be assigned as<br />

deputy assistant secretary<br />

of defense for cyber and<br />

space policy, Office of<br />

the Under Secretary of<br />

Defense for Policy.<br />

Brigadier <strong>Gen</strong>eral<br />

Dwyer L. Dennis,<br />

who has been serving<br />

as commander, 551st<br />

Electronic Systems<br />

Wing, Electronic<br />

Systems Center, Air Force<br />

Materiel Command,<br />

has been assigned as<br />

4 | MIT 13.8<br />

Compiled by <strong>KMI</strong> <strong>Media</strong> <strong>Group</strong> staff<br />

people<br />

Since the cameras are located<br />

on the outside of the aircraft, the<br />

images appear to “see through”<br />

the Blackhawk. Informational<br />

symbols from the helicopter instrument<br />

panel also provide heads-up<br />

pilotage and navigation data as<br />

an overlay to the multi-spectral<br />

imagery.<br />

special assistant to the<br />

commander, Air Force<br />

Materiel Command.<br />

<strong>Maj</strong>or <strong>Gen</strong>eral Blair<br />

E. Hansen, who has<br />

been serving as director,<br />

ISR capabilities,<br />

deputy chief of staff,<br />

intelligence, surveillance<br />

and reconnaissance,<br />

Headquarters U.S. Air<br />

Force, has been assigned<br />

as deputy commander,<br />

Joint Functional<br />

Component Command for<br />

Intelligence, Surveillance<br />

and Reconnaissance, U.S.<br />

Strategic Command.<br />

Cubic Defense<br />

Applications has<br />

hired Grant Palmer<br />

as vice president of<br />

communications<br />

systems.<br />

Jon Percy<br />

Overwatch, an<br />

operating unit of<br />

ADAS greatly improves situational awareness by providing aircrew members<br />

the ability to look anywhere about the aircraft to view objects and terrain with<br />

minimal or no structural limitation during day/night operations.<br />

NVESD has been working with several contractors to develop the helmet<br />

display and multi-spectral sensors. One of NVESD’s contractors is also providing<br />

3-D audio cueing and active noise reduction technology.<br />

Similar to a bat’s echolocation, the 3-D audio cueing distributes sound directionally<br />

so that auditory signals sound like they’re coming from the direction of<br />

the source; this also provides separation for different channels of input, like threat<br />

alerts, radio traffic and aircrew dialogue. The 3-D audio is enhanced by ANR,<br />

which also minimizes the risk of hearing loss from noise exposure, reduces fatigue<br />

and stress during long missions, and limits cockpit noise, enabling the aircrew to<br />

concentrate and work efficiently.<br />

One of the issues deployed aircrews have been facing is brownout. Brownout<br />

occurs when a helicopter is landing and the rotorcraft’s downwash throws dust,<br />

sand and other loose debris into the air, severely limiting or obscuring the pilots’<br />

view of the landing area. To combat brownout situations, the aircrew using ADAS<br />

can view pilotage and brownout symbology to let the pilots know where the<br />

helicopter is in relation to the ground as well as look through the floor of the<br />

helicopter into the cleaner downwash directly below them, allowing the aircrew to<br />

conduct safe landings during a dangerous brownout situation.<br />

Textron Systems, has<br />

appointed Jon Percy<br />

as vice president of<br />

business development<br />

and strategy.<br />

Brian Roach has<br />

been named vice<br />

president, federal, for<br />

Juniper <strong>Network</strong>s. He<br />

previously worked at<br />

Microsoft, where he<br />

was general manager<br />

of product sales for the<br />

Department of Defense.<br />

Aruba <strong>Network</strong>s, a<br />

provider of wireless<br />

LANs and secure<br />

Diana L. McGonigle<br />

With sadness, <strong>KMI</strong> <strong>Media</strong> <strong>Group</strong> announces the<br />

passing of our friend and co-worker, Copy Editor<br />

Diana L. McGonigle, who died August 15. A skilled<br />

editor with a fierce dedication to accuracy and<br />

timeliness, Diana had been a valued member of the<br />

<strong>KMI</strong> team since 2005. She will be missed.<br />

Hitesh Sheth<br />

mobility solutions,<br />

has announced the<br />

appointment of Hitesh<br />

Sheth to the newly<br />

created position of<br />

chief operating officer.<br />

www.MIT-kmi.com


TUC<br />

Dynamically<br />

reconfigurable<br />

logic<br />

Hardware Speed<br />

Architecture<br />

(FPGA-Based)<br />

Multiple<br />

Encryption<br />

Algorithms<br />

Multiple<br />

Bit Insertion<br />

& Bending<br />

Protocols<br />

Multiple<br />

Compression<br />

Engines<br />

TUC is presented by<br />

Tactically Unbreakable COMSEC<br />

Meet with MAT<br />

Corporate Leadership at<br />

AUSA<br />

Booth # 135<br />

Contact<br />

Michael Gravens<br />

michael.gravens@mclaneat.com<br />

TUC is a product of<br />

www.mclaneat.com


6 | MIT 13.8<br />

<strong>Network</strong>s<br />

Rapidly evolving from its first incarnations—when it<br />

offered little more than an expensive rugged personal communications<br />

device to its users and a tenuous business<br />

opportunity to its providers—satellite phone technology is<br />

becoming embedded in every part of military life from the<br />

foxhole to the Internet cafe.<br />

The latest wave of improvements in satphones include<br />

reductions in size and weight while simultaneously embracing<br />

advanced networking capabilities designed to also<br />

support command and control and advanced situational<br />

awareness via always-on networks available throughout the<br />

globe.<br />

in the Sky<br />

SATELLITE PHONES EMBRACE<br />

ADVANCED NETWORKING CAPABILITIES<br />

DESIGNED TO SUPPORT COMMAND<br />

AND CONTROL AND ADVANCED<br />

SITUATIONAL AWARENESS.<br />

BY ADAM BADDELEY<br />

MIT CORRESPONDENT<br />

BADDELEYA@<strong>KMI</strong>MEDIAGROUP.COM<br />

www.MIT-kmi.com


One of the latest developments is the recent<br />

established its own Iridium DoD gateway in Hawaii,<br />

award by the Naval Surface Warfare Center (NSWC)<br />

separate from the firm’s commercial subscriber site<br />

to Iridium for Phase 2 of the Distributed Tactical<br />

in Arizona.<br />

Communications System (DTCS), an extension of<br />

EMSS services were first negotiated in Decem-<br />

“Netted Iridium.” DTCS takes telephony out of the<br />

ber 2000. Iridium is now on its third such contract,<br />

loop, and makes Iridium into a packet switch network<br />

with the most recent negotiations leading to a con-<br />

in the sky. Furthermore, it enables true tactical comtract<br />

signed in March 2008, which with options will<br />

munications by providing push-to-talk, one-to-many,<br />

continue until 2013.<br />

voice and limited data distribution to disadvantaged<br />

“We anticipate that our relationship with DoD<br />

users.<br />

“DTCS is a paradigm shift in many aspects of<br />

Scott Scheimreif<br />

will continue well into the future,” said Scott<br />

Scheimreif, vice president of government programs<br />

tactical comms, not only on the availability of satellite scott.scheimreif@iridium.com for Iridium. “Requirements and global military<br />

assets, but also in the way we do business,” said Igor<br />

activity will determine to what extent. We expect<br />

Marchosky, DTCS technical manager at NSWC Dahlgren Division. that the U.S. DoD’s reliance on commercial satellite communications,<br />

“The DTCS radios represent a much smaller form factor than other specifically Iridium, will continue to expand as their missions and<br />

tactical radios, require far less training and add opportunities that were applications evolve.”<br />

not available before. DTCS also provides a platform for learning how to In addition to providing conventional satphone capabilities across<br />

operate outside the traditional VHF/UHF bands.<br />

DoD, additional network capabilities are being developed. Iridium<br />

“The lessons learned from the implementation and development and the Marine Corps Warfighting Laboratory (MCWL) at Quantico,<br />

of this system present opportunities for other programs in DoD where Va., began an engagement in 2001 to address the needs of commu-<br />

these shifts could be challenging,” Marchosky continued. “One very nications-disadvantaged Marines, who did not have access to military<br />

important aspect of DTCS is to capture how we procure and man- UHF tacsat channels and needed additional tactical narrow band comage<br />

commercial satellites, how we enable disadvantaged users to use munications.<br />

these new assets, and how rapid development and deployment can Scheimreif outlined the process by which the Marines addressed<br />

be accomplished while effectively incorporating warfighter feedback this. “The MCWL chose to look at space-based networks, and spe-<br />

directly from the field.”<br />

Despite its technological roots, it is important to keep in mind that<br />

the DTCS is not a phone. “The DTCS radio system will be completely<br />

removed from the 9555 or any other COTS Iridium products,” Marchosky<br />

emphasized. “The DTCS family of radios, which includes the<br />

RO, ROA, C2, C2A and eventually the C2S, will be capable of operating<br />

in the Iridium network, but will truly operate as a tactical device, and<br />

not as a COTS commercial phone.”<br />

DTCS will be transitioned into the Enhanced Mobile Satellite Service<br />

(EMSS) program under the Defense Information Systems Agency<br />

(DISA). DISA will provide DTCS service as one additional service in the<br />

EMSS product line.<br />

The roadmap for development and fielding of DTCS beyond Phase<br />

2 at this point is not finalized, but demand is high, Marchosky said.<br />

“Today there is a stated need for a large quantity of units in the field.<br />

As OSD and Congress figure out what the portfolio will be, DTCS is<br />

tasked to satisfy urgent needs outside the POM cycles. Our intention<br />

is to satisfy as many of these requirements as possible within the next<br />

12 months.<br />

“Although time will tell, I believe DTCS-Operational stands a good<br />

chance of being mainstream for years to come. DTCS fills a niche in<br />

the C2 arena, and it is unlikely it will ever be more than that. However,<br />

it is a very important niche that has become more relevant in<br />

the world of irregular warfare. The utility that DTCS will present to<br />

the warfighter will exceed how we intend to employ it today, not only<br />

complementing PORs, but also proving new capabilities in other areas,<br />

such as sensors and asset tracking,” he predicted.<br />

cifically Iridium, to try to solve their ship-to-object maneuver<br />

NETWORK CAPABILITIES<br />

Iridium’s relationship with the Department of Defense dates to<br />

the EMSS contract with DISA, which has been the conduit through<br />

which Iridium continues to provide its hardware and services into the<br />

war fighting community, both for the U.S. DoD and allies. DISA has<br />

www.MIT-kmi.com MIT 13.8 | 7


problem; their interest in our network focused on our complete<br />

global footprint, low latency and secure architecture. Plus in terms<br />

of cost, DoD had already made the investment into Iridium in<br />

respect to the gateway and subscriber devices.”<br />

Using Iridium, the lab created the Expeditionary Tactical Communications<br />

Systems (ETCS), originally designed as a proof of<br />

concept, although approximately 400 systems were deployed into<br />

the Iraq area of operations as well as into the Horn of Africa.<br />

Feedback on potential improvements to ETCS was then fed<br />

back into MCWL and the NSWC. Warfighter feedback and engineering<br />

improvements led to the evolution and change of the<br />

system architecture to what became Netted Iridium or DTCS. A<br />

limited technical assessment was conducted on the first phase of<br />

the system in October 2006, focusing on quality of service, range<br />

and the stability of the network. The MCWL continues evaluating<br />

this capability to support concept-based experimentation.<br />

To support this activity, a formal relationship was established<br />

between Iridium and DoD. “In 2005, Iridium entered into a cooperative<br />

research and development agreement with the MCWL<br />

to discuss how a system like this could be architected to meet<br />

the growing requirements for these communities. We surveyed<br />

interested parties, reaching out to the services and combatant<br />

commands, including Strategic Command, based on their interest<br />

in ensuring tactical narrowband SATCOM availability, and to<br />

operational combatant commands, specifically PACOM and CENT-<br />

COM, asking for their input,” Scheimreif explained.<br />

GAPFILLER SYSTEM<br />

This led Iridium to envisage adapting the system as a near-term<br />

capability gapfiller between the legacy UHF tacsat and the forthcoming<br />

next generation Mobile User Objective System.<br />

“That is what led Iridium and our industry partners to invest our<br />

own internal R&D dollars into DTCS Phase 1, which was in essence<br />

a completely industry-funded effort,” said Scheimreif. “This resulted<br />

in a limited technical assessment in 2006, in which we and the government<br />

focused on measuring specific attributes of the capability,<br />

including range, scalability and quality of service.”<br />

That success led to the award of DTCS Phase 2 in June, as a fiveyear<br />

effort funded by the Navy. This work will fundamentally change<br />

the nature of the Iridum/EMSS service, which was hitherto limited<br />

to point-to-point, global telephony services. This next stage enhances<br />

each of the three nodes of the network: space, ground and subscriber<br />

equipment to provide greater capabilities in terms of networked operations<br />

while still retaining the legacy global point-to-point capabilities.<br />

“In the military tactical environment, a commercial satellite<br />

telephone isn’t necessarily the optimal tool to support the need for<br />

real-time tactical communications in a challenging environment,”<br />

Scheimreif observed. “As we have seen over the past 10 years, a satellite<br />

phone does provide a critical back-up communications solution.<br />

DTCS changes everything. Improvements and modifications to the<br />

radios, the satellites and the gateway create a new capability that for<br />

most users can now be used as a primary tactical voice and data solution.<br />

“Changes to the subscriber device, supported by ITT Nex<strong>Gen</strong>, offer<br />

a more robust, ruggedized tactical radio, known as the Radio Only<br />

device. Our customer is also working on an encryption path to take the<br />

handheld radios from a commercial AES 256 up to a National Security<br />

Agency-accredited system, while making sure that it remains flexible<br />

8 | MIT 13.8<br />

The Inmarsat-4 constellation enables the Broadband Global Area <strong>Network</strong> family of services. [Image<br />

courtesy of Inmarsat]<br />

enough so it can be distributed out to NATO and coalition allies, supporting<br />

communications interoperability.”<br />

Under Phase 2, Boeing is updating software for the Iridium satellite<br />

fleet, as well as performing systems integration and testing.<br />

One of the biggest differences to the tactical user moving from<br />

ETCS to DTCS capabilities will be its networking. “In Phase 1 we created<br />

a network based on a single beam in which the user could establish<br />

a net around himself with an approximately 100-mile footprint<br />

with high reliability,” Scheimreif said. “In the next phase of the spiral<br />

development, we will leverage multiple spot beams by lighting up<br />

adjacent beams to the user, therefore expanding the footprint from 100<br />

miles to 250 miles. Basically, it is now a pocket radio with a 250-mile<br />

footprint. Under Phase 1, we could employ 250 nets simultaneously<br />

anywhere in the world. Now, we expect to increase that to 2,000 simultaneous<br />

nets, deployable anywhere in the world at the same time.”<br />

Under Phase 1, the networks were primarily voice and position<br />

location information (PLI), but under Phase 2, the program provides<br />

netted data as well. “In Phase 2, we are still able to support voice<br />

and PLI, but have added the ability to push data over the multi-cast<br />

architecture. This includes text, chat, medevac request and so on. If<br />

somebody wants to send out a low-resolution imagery target of interest<br />

in real time to multiple users in the net, distributed over 250 miles,<br />

regardless of whether they are dismounted, in a ground vehicle, or a<br />

fast-mover, DTCS will be able to support that,” Scheimreif said.<br />

This data capability is being envisaged as a benefit to platforms<br />

as part of command and control on-the-move initiatives. Iridium<br />

has already been installed on a variety of platforms, such as LAVs,<br />

HMMWVs and MRAPs, and has been flown on everything from fixed to<br />

rotary wing tactical aircraft, as well as installed at fixed locations like<br />

command centers and forward operating bases.<br />

As the need for commercial satellite communication networks<br />

increases within the DoD community, DTCS presents a viable capability<br />

well into the future, Scheimreif emphasized. “Today, I believe DTCS<br />

is viewed by many as a gapfiller. But once MUOS and other systems<br />

come online, will the need for Iridium and DTCS go away? No, I don’t<br />

think so. MUOS and other military satellite networks will continue to<br />

provide attributes and capabilities that commercial networks cannot.<br />

However, the growing warfighter communication requirements in the<br />

future will still demand access to networks such as Iridium.<br />

www.MIT-kmi.com


“The DTCS system significantly changes how DoD communities<br />

use our network. We are excited about DTCS and truly see the value<br />

and advantages it brings to the warfighter. We are working closely with<br />

the NSWC and our industry partners and are committed to provide<br />

this service,” he added.<br />

GLOBAL BROADBAND<br />

Inmarsat has a longstanding relationship with DoD in terms of<br />

personal communications. The company’s most recent capability<br />

is provided by its Inmarsat-4 (I-4) constellation, which enables the<br />

Broadband Global Area <strong>Network</strong> (BGAN) family of services.<br />

“You can toss a BGAN<br />

terminal in a man pack,”<br />

noted Rebecca Cowen-<br />

Hirsch, a former DISA official<br />

who currently serves as<br />

vice president of global government<br />

services for Inmarsat.<br />

“Special operations and<br />

other military users employ<br />

BGAN for their voice communications,<br />

but they are<br />

also using this capability Rebecca Cowen-Hirsch<br />

for high streaming data and rebecca_cowen-hirsch@inmarsat.com<br />

situational awareness capability.<br />

This is a highly portable capability, and special ops communities<br />

have found it especially valuable for highly disconnected, mobile communications<br />

for small units.”<br />

In addition to frontline applications, BGAN is also widely used for<br />

welfare communications in theater back to the United States, providing<br />

an Internet cafe environment for off-duty forces. Cowen-Hirsch<br />

said, “It is deployed in a wide variety of applications, such as command<br />

and control, but also supporting different types of assets, from intelligence<br />

and battle damage assessment to morale communications and<br />

telemedicine, and virtually everything in between.”<br />

Access to Inmarsat’s BGAN is offered through a demand-assigned<br />

capability. “We are a very different commercial satellite system,”<br />

Cowen-Hirsch explained. “Our core services don’t require leased transponder<br />

bandwidth. You use it as you require it, rather than having<br />

capacity that sits idle when you don’t use it. We have seen a significant<br />

penetration in Southwest Asia, and we know that our streaming IP<br />

traffic in that particular region is very high, not only for U.S. forces but<br />

for coalition operations too.”<br />

BGAN has the ability to support a mobile ad hoc networking capability,<br />

so that a small unit can go into an environment, use BGAN to<br />

create and set up a small network, and then tear it down just as rapidly<br />

and deploy it into another region. Inmarsat is currently working on a<br />

multi-cast capability that ensures that multiple users receive the same<br />

information, simplifying command and control issues.<br />

Traditionally, Inmarsat has simply managed the satellite network,<br />

with interface criteria provided by hardware manufacturers such as<br />

Thrane & Thrane and Hughes <strong>Network</strong>s. This is now changing, with<br />

Inmarsat due to launch its own global handheld satellite phone in<br />

2010, using the I-4 constellation. “It is our intent as well to provide a<br />

secure satellite phone specifically for military operations,” Cowen-<br />

Hirsch said.<br />

Encryption is key to providing this, and moves to certification<br />

are well advanced. Inmarsat is currently registering with<br />

Search across your<br />

Hitachi and NetApp<br />

storage* for increased<br />

business efficiency.<br />

Elementary!<br />

No file too small,<br />

no search too big<br />

Time is money and there’s no time to waste.<br />

Hitachi Data Discovery Suite efficiently searches all of your Hitachi<br />

and Net App storage* to find the data you need, when you need it,<br />

through one easy to use management interface. This means a super<br />

boost in productivity of users and IT staff, enhanced mission support<br />

and an intelligent retrieval platform for your unstructured data.<br />

The investigation is over.<br />

Visit www.hds.com/go/discover<br />

for the latest analyst reports on<br />

Hitachi Data Discovery Suite.<br />

Or call 866-637-2763 for more<br />

information<br />

Hitachi Data Discovery Suite.<br />

SEARCH. IDENTIFY. COLLECT.<br />

Assuming an average<br />

salary of $60,000,<br />

including benefits,<br />

the cost of ineffective<br />

search is $5,251 per<br />

worker per year. For<br />

1,000 workers, the<br />

cost is $5.25 million.<br />

IDC 2007<br />

*Full text search capability for Hitachi High-performance NAS, Hitachi Content Archive Platform and NetApp filers running ONtap 7.3<br />

Hitachi is a registered trademark of Hitachi, Ltd., and/or its affiliates in the United States and other countries.<br />

Hitachi Data Systems is a registered trademark and service mark of Hitachi, Ltd., in the United States and other countries.<br />

All other trademarks, service marks, and company names are properties of their respective owners.<br />

© Hitachi Data Systems Corporation 2009. All Rights Reserved.<br />

www.MIT-kmi.com MIT 13.8 | 9


NSA for its comsec encryption program. “We are<br />

looking to ensure that we have FIPS 140-2—AES<br />

256—commercial grade encryption,” she noted.<br />

“Then for the U.S. market we are currently in<br />

discussions with NSA to pursue their Suite A or<br />

B certification—the new type certification NSA is<br />

introducing.”<br />

Cowen-Hirsch cited Suite B certification, which<br />

is sufficient for secret and below traffic, as Inmarast’s<br />

goal. The U.S. military satphone is anticipated to be<br />

made available shortly after the commercial device<br />

in 2010.<br />

To date, Inmarsat has already injected the highest<br />

level of NSA security into its overall system.<br />

“One thing we offer specifically for the military is<br />

to encrypt our command signal for our satellites, so<br />

that it is consistent with NSA comsec requirement<br />

for Type 1 encryption. This ensures that no one<br />

else can command or control our satellites. That<br />

is an investment we have made to ensure that it is<br />

consistent with military requirements, but certainly<br />

there is a commercial advantage to that as well,”<br />

Cowen-Hirsch said.<br />

Other developments have seen Inmarsat enter<br />

the software defined radio (SDR) field, working with Gatehouse<br />

to instantiate the BGAN waveform on the company’s SDR to demonstrate<br />

future Joint Tactical Radio System-type capabilities. In<br />

addition, earlier this year Inmarsat and Harris announced that the<br />

BGAN waveform has received type certification on the latter’s AN/<br />

PRC-117G Type 1 radio.<br />

NEW CONTENDER<br />

In July, TerreStar <strong>Network</strong>s successfully launched TerreStar-1.<br />

Described by the company as the world’s largest, most powerful<br />

commercial communications satellite, TerreStar-1 has been developed<br />

while liaising with the government to ensure its capabilities<br />

can meet defense and homeland security requirements.<br />

“We have been looking at the requirements of the government,<br />

specifically looking at first responders, understanding their<br />

TerreStar-1 has been described as the world’s largest, most powerful commercial communications<br />

satellite. [Image courtesy of TerreStar <strong>Network</strong>s]<br />

10 | MIT 13.8<br />

Dennis Matheson<br />

Martin Neilsen<br />

requirements so that as we develop our systems, we<br />

have addressed their needs, so that they can take<br />

advantage of our solution as we move forward and get<br />

it into service. With the launch of TerreStar 1, which<br />

is the linchpin for the network that will utilize the 2<br />

GHz spectrum in North America, they will be able to<br />

use that satellite’s all-IP communications networks<br />

for the devices that we are going to be delivering,”<br />

said Dennis Matheson, chief technology officer of<br />

TerreStar.<br />

The handset for TerreStar, developed in conjunction<br />

with Finnish firm Elektrobit, is due to<br />

be available by the end of the year. Similar in size<br />

to any other consumer smartphone, the TerreStar-<br />

Elektrobit devices represent the world’s first secure<br />

quad-band GSM and tri-band WCDMA/HSPA smartphone<br />

with integrated all-IP satellite-terrestrial voice<br />

and data capabilities.<br />

“As we worked the design of the smartphone,<br />

anything that needed to be incorporated for DoD was<br />

done as much as we could. Being an all-IP phone, we<br />

have the ability to add in functionality if they need<br />

different encryption, and we will be able to add those<br />

things on top of the general handset,” Matheson said.<br />

“Satellite terminals don’t have to be big and clunky. They can<br />

be in a more consumer package size,” he added. “At the same<br />

time, there is always going to be a need for ruggedized, specialized<br />

devices. What we are going to do is to take the smarts in our consumer<br />

unit and wrap it into the packaging that is needed for that<br />

particular application as requested by our government clients.”<br />

Another company in this field is Globalstar, which provides a<br />

wide variety of mobile and fixed satellite voice products to various<br />

U.S. government agencies, including DoD. Globalstar also provides<br />

those agencies with satellite data solutions using both satellite<br />

simplex and duplex data products for a variety of asset tracking<br />

and remote data monitoring or system control applications.<br />

Martin Neilsen, vice president, new business ventures for<br />

Globalstar, outlined the company’s capability growth path: “Later<br />

this year, Globalstar expects to begin taking delivery of its secondgeneration<br />

satellites, with deployment of the second-generation<br />

constellation expected to finish in 2010. Combined with the<br />

ground segment upgrades, the new network is designed to provide<br />

high-quality voice and data services beyond 2025 and increased<br />

data speeds of up to 256 kbps, in a flexible all-IP configuration.<br />

“Products and services supported are expected to include<br />

push-to-talk and multicasting, advanced messaging capabilities<br />

such as multimedia messaging or MMS, mobile video applications,<br />

geo-location services, multi-band and multi-mode handsets and<br />

data devices with GPS integration,” he continued. “Globalstar is<br />

also expanding its satellite coverage area in both Southeast Asia<br />

and Africa, and the company continues to evaluate other potential<br />

markets.” ✯<br />

Contact Editor Harrison Donnelly at<br />

harrisond@kmimediagroup.com. For more information related to this subject,<br />

search our archives at www.MIT-kmi.com.<br />

www.MIT-kmi.com


BY ADAM BADDELEY<br />

MIT CORRESPONDENT<br />

BADDELEYA@<strong>KMI</strong>MEDIAGROUP.COM<br />

3G and Beyond<br />

THE LATEST CELLULAR COMMUNICATIONS TECHNOLOGIES ARE BEING TESTED,<br />

EVALUATED AND PACKAGED FOR URGENT OPERATIONAL NEEDS.<br />

No doubt many warfighters, looking at their bulky combat net<br />

radios and comparing them with their own sleek cell phones at home,<br />

have been left scratching their heads as to why the latter can’t be<br />

replicated on the battlefield.<br />

In reality, however, cellular communications technologies now<br />

in their latest 3G and 4G iterations are currently being tested, evaluated<br />

and packaged for urgent operational needs in the current fight<br />

and integrated in critical programs of record both on and off the<br />

battlefield. This is ensuring that both on and off the battlefield, the<br />

Department of Defense and other federal agencies can conduct every<br />

aspect of their work using militarily secure links that also embrace<br />

the enhanced bandwidth’s connectivity that originates in the civilian<br />

world.<br />

John T. Armantrout, chief technology officer for the Joint Program<br />

Executive Office Joint Tactical Radio System (JPEO JTRS), addressed<br />

the issues involved in bringing this technology to the<br />

battlefield. “It is not more challenging, just different,”<br />

he commented. “Certainly the legacy waveforms have<br />

a lot of history and folks have experience with them, so<br />

it is easy to find a subject matter expert in DoD. Additionally,<br />

they are significantly less complex than the<br />

modern waveforms—and, obviously, significantly less<br />

capable. The networking and cellular waveforms are<br />

new to DoD, and there is little development experience<br />

with them in the department. But we are finding folks<br />

from industry to assist us in the JPEO, and our primes<br />

are quickly gaining similar experience.<br />

Joe Miller<br />

“Keep in mind that the military operational environment is vastly<br />

different than a commercial cellular environment,” Armantrout<br />

continued. “JTRS networking waveforms provide a ‘meshed network’<br />

architecture—no fixed infrastructure required. Each radio has equal<br />

capability and can connect with another like-kind radio directly over<br />

the air. The radio determines coverage by transmit power and antenna<br />

gain configuration. The radio also determines the connectivity population<br />

autonomously. JTRS is capable of relay and routing messages<br />

and provides for ad hoc connectivity between two or more radios.”<br />

MULTIPLE TECHNOLOGIES<br />

There are multiple 3G cellular technologies. In meeting some<br />

of the DoD’s key communications objectives, <strong>Gen</strong>eral Dynamics C4<br />

Systems is focusing on two of them—CDMA and WiMAX. Their capabilities<br />

are being incorporated as part of three key<br />

programs: the Mobile User Objective System (MUOS),<br />

a UHF SATCOM network; JTRS Handheld, Manpack<br />

and Small Form Fit (HMS); and the Warfighter Information<br />

<strong>Network</strong>-Tactical (WIN-T).<br />

MUOS uses a wideband CDMA architecture, much<br />

like a traditional cellular implementation in that there<br />

is an infrastructure associated with it, albeit one that<br />

is partially satellite-based. Joe Miller, director of JTRS<br />

programs at <strong>Gen</strong>eral Dynamics, explained the underlying<br />

challenges for HMS terminals in supporting its<br />

3G waveform.<br />

www.MIT-kmi.com MIT 13.8 | 11


“From a terminal implementation perspective, you need more<br />

processing elements to host these networks and the applications<br />

associated with them. In addition, as these waveforms are adopted<br />

for military applications, unique modifications are required in the 3G<br />

technologies,” Miller said. “A very good example is the fact that they<br />

have to co-exist with terrestrial communications around the world,<br />

so it is very important to get spectral authorization to use MUOS.<br />

You can’t interface with existing terrestrial communications so the<br />

waveform is being modified for spectral adaptation so that it doesn’t<br />

jam existing commercial networks.”<br />

The first MUOS terminal will be the two-channel JTRS HMS<br />

manpack. The manpack is a two channel design with a 30 MHz–2.5<br />

GHz 20W output requirement for both channels. Two separable power<br />

amplifiers (PA) are mounted on each side of the radio. Either channel<br />

extends down to 2 MHz with the addition of a high frequency<br />

PA. To run MUOS on the manpack requires a replacement MUOS<br />

PA that provides the additional circuitry required to host the MUOS<br />

waveform.<br />

This approach has inherent flexibility, Miller said. “You can put<br />

it on either side, or put it on both sides and field-replace the unit. In<br />

addition, because you have all of the modem and security hardware<br />

and software inside the main manpack, you can run the other waveforms<br />

using the MUOS PA in bypass mode, at the modem’s normal<br />

5W output.”<br />

Right now MUOS is not a requirement on every JTRS HMS set,<br />

but only the manpack and handhelds. “I would expect that any set that<br />

they want to have SATCOM capability, they will eventually want MUOS<br />

on it. In reality, though, what they are initially looking for is a manpack<br />

terminal and a handheld terminal for MUOS. I don’t believe there<br />

is any current thought for any of the embeddable HMS form factors<br />

that go on sensors, to be MUOS compatible as they go through local<br />

nets. Once MUOS capability is reduced down to a handheld capability,<br />

it would be no problem to add it to the embedded variant that goes<br />

with the Ground Soldier Ensemble,” Miller commented.<br />

A broad concept of 3G incorporates WiMAX, an OFDMA-based<br />

wireless technology now being adapted for use by <strong>Gen</strong>eral Dynamics<br />

on JTRS HMS and WIN-T. Miler said, “There is growing interest for<br />

WiMAX on HMS. Standard commercial implementations of WiMAX<br />

do not incorporate true ad hoc capabilities, but our adaptation of<br />

WiMAX does incorporate that ad hoc functionality.<br />

“Commercial WiMAX implementations rely on network access<br />

points for connection into a network,” he continued. “The military<br />

doesn’t have the benefit of these network access points because of<br />

a lack of fixed infrastructure. The difficult piece for the military is<br />

making it fully ad hoc so that every node on the network can support<br />

any other node and route information through it, as well as adding in<br />

the security features that are not supported but required for military<br />

applications.”<br />

In WIN-T, <strong>Gen</strong>eral Dynamics has implemented a modified WiMAX<br />

that is used as a mobile local area network purely for secure local area<br />

connectivity.<br />

EMPIRE CHALLENGE<br />

One of the key technological inflexion points has been the creation<br />

of cellular and 3G wireless environments that can be scaled down as<br />

well as up, making them suitable to military deployment and disaster<br />

recovery, explained Michael Coyne, chief technology officer of Ericsson<br />

Federal. “We have cellular systems based on standard hardware<br />

12 | MIT 13.8<br />

and software that is packaged into a small, self-contained ‘system in a<br />

box’ called QuicLINK. This system is scaled to be deployable and work<br />

in communities where the system itself is mobile, making 3G and 4G<br />

cellular systems viable in this space.”<br />

This concept was tested in DoD’s recent Empire Challenge event, a<br />

month-long exercise designed to take new technology, insert it in realworld<br />

tactical environments and test its ability to work with existing<br />

architectures to meet immediate operational needs.<br />

“Our primary focus with QuicLINK was on delivering broadband<br />

wireless to the soldier in the field, enabling multimedia capabilities<br />

with strong focus on distribution of voice and video information from<br />

sensor platforms. We also showed some IMS-based software that gave<br />

situational awareness capabilities and multimedia communications,”<br />

Coyne said, citing the example of a 360-degree immersive video C2<br />

system, where Ericsson was asked with very short notice to allow the<br />

vendor to connect their system to QuicLINK, permitting a successful<br />

test.<br />

“What is unique about Ericsson’s IMS solution, used in combination<br />

with QuicLINK and using fixed broadband access, is that we<br />

are using a standardized IMS SIP core,” he noted. “That is interesting<br />

because in the past, people would tend to build custom-made IPbased<br />

systems, so if you buy from one vendor you get everything you<br />

need in a proprietary system. This does not support a multi-vendor<br />

environment or transparent sharing of information across agencies<br />

in a peered, policy managed way. The implementation Ericsson<br />

showed at Empire Challenge is a prime example of this approach,<br />

using standard IMS interfaces and various third-party software with<br />

more than eight different vendors in addition to our gear. We took<br />

best of breed.”<br />

The outcome from Empire Challenge, Coyne explained, is that<br />

Ericsson’s technology is now being considered for deployment in<br />

systems due to be rolled out in the next six to nine months. “Empire<br />

Challenge has been a big breakthrough for us. It has moved us from<br />

PowerPoint slides to real systems in a real-world environment,<br />

working with what is already deployed in the field,” he said.<br />

Coyne emphasized that the QuicLINK system is a complement<br />

to and enhancer of existing military capabilities. “We have to be able<br />

to say to guys with SINCGARS or JTRS, that you don’t have to throw<br />

away the things you have,” he said. “For example, in the public safety<br />

arena, we have worked with vendors of P25 deployed systems and<br />

have already enabled those products to tunnel over and go to cellular<br />

handsets that look and feel as though they were part of the P25<br />

group. It’s a combination of an interworking gateway and an ability<br />

to tunnel a client on a handset. We can anticipate the same thing<br />

applying in this space. We will not try to replace what is already<br />

there, rather we will augment and enhance.”<br />

One of the first 3G customers in DoD for Nokia Siemens <strong>Network</strong>s<br />

(NSN), meanwhile, was the Army, which acquired a high<br />

speed downlink packet access 3G network in 2006.<br />

“There are other DoD entities that are also evaluating our technology,”<br />

said Robert Fennelly, head of U.S. government sales at NSN.<br />

“We provide the technology, support the technology and keep them<br />

apprised of the roadmaps for where the technology is headed. We<br />

also have a cooperative research agreement with Army CERDEC.<br />

That is another effort where we present technologies and are in the<br />

process of delivering latest generation technologies for evaluation.<br />

In one example, we have upgraded the radio network and introduced<br />

IMS technology, allowing the Army to evaluate applications such as<br />

VoIP.”<br />

www.MIT-kmi.com


Unified Secure Voice and Data<br />

in the Palm of your Hand<br />

<strong>Gen</strong>eral Dynamics’ Sectéra ® Edge is the world’s first NSA-certified Type 1 ruggedized<br />

smartphone, developed for the National Security Agency’s SME PED (Secure Mobile Environment<br />

Portable Electronic Device). This compact and lightweight device allows users to protect classified<br />

and unclassified voice and data communications from one easy-to-use handheld device.<br />

<br />

The RUGGED Sectéra Edge smartphone provides secure and wireless:<br />

<br />

<br />

<br />

<br />

® devices<br />

<br />

<br />

<br />

<strong>Gen</strong>eral Dynamics Secure Communications: We Bring You What’s Next.<br />

The Sectéra ® Edge is<br />

the only SME PED that<br />

switches between an<br />

integrated classified<br />

and unclassified<br />

PDA with a<br />

<br />

press.


The underlying strategy behind this interest lies<br />

in obtaining synergies with the commercial sector’s<br />

economies of scale. “The commercial world offers a<br />

wholly different cost point,” said Fennelly. “There are<br />

millions of subscribers out there and the technology<br />

moves very quickly. DoD is interested in riding the<br />

technology curve and getting the latest capabilities,<br />

whether it is bandwidth, applications or seamless<br />

databases.”<br />

The next generation of technology is 4G or LTE,<br />

which is being addressed via the initiatives with the<br />

research agreement with NSN and promoted in a<br />

range of defense forums.<br />

“We presented at the Army Science Board, looking<br />

at future technologies,” Fennelly said. “They are very<br />

familiar with the LTE technology, and we anticipate<br />

that they will make an investment in that in the near<br />

future. The flat architecture that 4G brings enables a<br />

simpler network with greater bandwidth data speeds.<br />

Also, a more compact architecture raises the chance of<br />

a tactical deployment of the technology which would<br />

have been difficult with commercial grade equipment<br />

in the past.”<br />

Tom Liggett<br />

Scott Totzke<br />

device, so that anybody who didn’t have the appropriate<br />

access for that level of classification couldn’t access<br />

the data, either from the far end or by picking up the<br />

device and attempting to hack into it.”<br />

The advent of 4G, Liggett believes, represents further<br />

opportunities in terms of higher data rates so a lot<br />

of mission-critical requirements can now be met. “The<br />

other key technology going forward is the migration<br />

to VoIP. It has been a long time coming and it is still<br />

coming, but once 3G networks universally adopt VoIP,<br />

we will be able to take advantage of that technology,<br />

and the Edge will be able to offer some additional users<br />

efforts to use some of the secure voice services.<br />

“Currently, the secure voice capability runs over<br />

circuit switched data service technology, a legacy<br />

technology in the cellular world that is gradually<br />

being replaced. As that happens, we will migrate to<br />

VoIP, and that will provide additional features like a<br />

single phone number for different devices, potentially<br />

a higher voice quality and other capabilities like that,”<br />

Liggett added.<br />

SECURITY IS PRIMARY<br />

SMARTPHONE CAPABILITIES<br />

For DoD or federal government business, security<br />

always comes first, said RIM’s Scott Totzke, vice presi-<br />

<strong>Gen</strong>eral Dynamics C4 Systems Sectéra product line<br />

dent for BlackBerry security. “DoD is comparable to<br />

comprises a family of secure voice and data products.<br />

a large enterprise customer that has centralized gov-<br />

Sectéra begins with the secure wireless GSM phone<br />

ernance of their geographically dispersed personnel<br />

for 2G cellular networks. The new 3G wireless product<br />

around the world, but there are some baseline criteria<br />

is the Sectéra Edge smartphone, which provides the<br />

for wireless security that are required to even enter<br />

same secure voice capability of its predecessors. In<br />

into the discussion with that customer base.”<br />

addition to basic point-to-point data services, however,<br />

Totzke cited Homeland Security Presidential<br />

it also adds the capabilities of a modern smartphone,<br />

Dan Bigbie Directive 12 and DoD 8100—policy documents gov-<br />

including push e-mail, Web browsing, MS Office and<br />

dbigbie@lgsinnovations.com<br />

additional applications. The Sectéra wireless GSM<br />

erning the use of wireless devices—as well as the<br />

National Institute of Science and Technology’s Federal<br />

phone was based on a standard commercial Motorola cell phone Information Processing Standards 140, which independently validates<br />

to a commercial standard, while the Sectéra Edge is ruggedized to the design and implementation of an encryption module that is part of<br />

MILSTD-810F.<br />

a product. “RIM has been a longstanding participant in that program,”<br />

“The target market for the product is segmented. It is used par- he said. “At one point we were the first and only mobile solution and<br />

ticularly by Pentagon seniors and others in federal agencies and DoD a lot of our competitors have followed suit.”<br />

for their day-to-day communications. The products are also used in a To support its strength in encryption, RIM acquired Certicom<br />

tactical environment and run on the native network. It is also used in in 2006. Previously the National Security Agency obtained a gov-<br />

applications where a unit will drop in a portable cell site and just use it ernmentwide license for the firm’s Elliptic Curve Cryptography<br />

for local communications,” said Tom Liggett, business area manager technology used in the NSA Suite B standard for secure government<br />

for end-user and voice products at <strong>Gen</strong>eral Dynamics C4 Systems. communications, which is now part of RIM’s portfolio of products.<br />

When a secure call or a data session is required, the devices RIM’s approach to DoD business has been to focus on enhancing<br />

automatically negotiate the highest appropriate security level, Liggett the security of COTS products. “BlackBerry has been [Type 1] Suite B<br />

explained. “One device might be keyed for Suite B only to protect sen- compliant for about seven years now, so we don’t build Type 1 [Suite<br />

sitive but unclassified information, while I might have a device keyed A] products. Our forte is secure but unclassified, and 80 percent to<br />

with Suite A for classified information and also with Suite B, so we 90 percent of day-to-day communications within DoD falls into that<br />

could go secure using Suite B. That is all done by virtue of the secu- realm. For Type 1 [Suite A], you are into purpose-built hardware with<br />

rity protocols used. There are two standard security protocols, and we customized requirements that only allow you to sell the product to a<br />

implement them both. One is called SCIP [Secure Communications subset of the U.S. federal government. That is where you end up with<br />

Interoperability Protocol] for secure voice communications. $3,000-plus phones, and that is not a COTS product.”<br />

“For data communications, we use the HAIPE [High Assurance RIM works closely with the DoD on the Wireless and Secure Tech-<br />

IP Encryption] protocol. When you exchange classified e-mails, there nical Implementation Guide (STIG), which establishes requirements<br />

is specific data-at-rest encryption technology in the device that uses for properly configuring and managing the security features that are<br />

NSA-certified technology. The Edge encrypts the classified data on the inherent in the BlackBerry platform.<br />

14 | MIT 13.8<br />

www.MIT-kmi.com


“We routinely meet with representatives of the<br />

Office of the Secretary of Defense and Defense Information<br />

Systems Agency (DISA) to talk about what<br />

their needs are from a mobile device standpoint so that<br />

we can accommodate that in our technology roadmap.<br />

We have also worked with DISA to open up the STIG<br />

to create guidance on how to safely allow third-party<br />

applications to be safely installed on DoD networks,”<br />

Totzke said.<br />

“Some of our large enterprise customers are also<br />

starting to look at this model, so DoD is certainly a<br />

thought leader in this space,” he noted, adding that issues for the<br />

future include using BlackBerry smartphones on 3G and, in the future,<br />

4G networks, as a communications modem for attached devices.<br />

Looking beyond e-mail, RIM believes it has more to offer. “Having<br />

a reliable device that provides a secure connection back to your mail<br />

server is certainly important. Now, however, DoD, like a lot of other<br />

customers, is starting to look at how they can leverage that investment<br />

in mobile technology. We for example have seen Army recruiting have<br />

an application for signing up new recruits. We also have emergency<br />

contact lists for continuity of government and continuity of operations,<br />

and this has been a fairly big initiative within DoD.”<br />

At the core of the offering, Totzke said, is RIM’s ability to manage<br />

scarcity of bandwidth in catastrophic or certainly high stress situations,<br />

where a land line infrastructure has failed.<br />

“I was in London when the 2005 subway bombing happened, and I<br />

was able to effectively communicate with my boss and family sending<br />

BlackBerry e-mail, but I couldn’t make a phone call,” he recalled. “It<br />

is that efficiency of network use that has allowed DoD to start looking<br />

at BlackBerry as a fallback if the mail server fails. If I can’t make a<br />

phone call, we are still able to get messages routed between BlackBerry<br />

devices. So continuity of government really comes into play.”<br />

RAPIDLY DEPLOYABLE NETWORK<br />

Both the use of 3G and 4G wireless communications technologies<br />

should be considered a strong addition to existing communication<br />

solutions in the battlefield, but not a replacement, according to executives<br />

of LGS Innovations, the independent U.S. government subsidiary<br />

of Alcatel-Lucent. These networks are typically deployed at higher frequencies<br />

(typically between 450MHz and 3.5GHz) and while they offer<br />

significant bandwidth advantages, they do not yet offer all of the transmission<br />

range advantages of the lower frequency legacy equipment.<br />

“The network needs to be both expandable and flexible enough<br />

that it is able to easily support every application the warfighter needs<br />

both now and in the future,” said Dan Bigbie, vice president business<br />

development for LGS. “Leveraging our broad history of providing<br />

long-term communications solutions, we look to deliver standardsbased<br />

networks so the ability to incorporate new applications is not<br />

only possible, but also easy.”<br />

Probably the most critical component of a 3G/4G solution is the<br />

creation of a proper network architecture that gives users the ability<br />

to form ad hoc wireless mesh networks that can adapt to the needs of<br />

various deployment scenarios on demand.<br />

LGS is in the final phase of testing a rapidly deployable 4G solution.<br />

This innovative rapidly deployable network is a compact, self<br />

contained network in a box (less than 1 cubic foot) used for establishing<br />

secure, real time, mission critical voice, video and sensor communications.<br />

Macy W. Summers<br />

For the last few years LGS has provided the<br />

TacBSR, a single box GSM cellular solution, to DoD<br />

customers. The TacBSR delivers the smallest form factor<br />

in the industry. It leverages VoIP for backhaul and<br />

allows multiple TacBSRs to inter-network in a simple,<br />

easy to deploy and manage, flat architecture employing<br />

commodity IP networks, providing “cellular over IP”<br />

functionality.<br />

“Current network architectures tend to be hierarchical<br />

and centralized which limits communications<br />

when cut off from the core,” said Wayne Eagleson, LGS<br />

general manager. “The advantage of a rapidly deployable technology is<br />

that it can provide mobile, flexible and self sufficient broadband voice,<br />

video and data for deployments with company, brigades or battalions<br />

without having to rely on any existing network infrastructure. When<br />

commercially available, systems like the RDN can take advantage of<br />

commercial cellular network technology enabling the ability to build<br />

the network on the fly.”<br />

SOCIAL NETWORKING<br />

At the Coalition Warfare Interoperability Demonstrations this<br />

summer, meanwhile, Lockheed Martin demonstrated what company<br />

executives see as the beginning of a new future of social networking<br />

and related technologies in a military context.<br />

Using the combination of legacy Defense Information Systems<br />

Agency network devices and commercial wireless infrastructure, the<br />

company and its partners demonstrated the ability to deliver media<br />

rich data and applications with smartphones. Applications included<br />

tactical maps, UAV tasking, integrated biometrics and an ISR Enterprise.<br />

Combined with research and development programs, Lockheed<br />

Martin is rapidly enabling the irregular operator and warfighter with<br />

faster and more collaborative tools that provide rich robust applications<br />

to the first mile and seamless connectivity for success in garrison,<br />

on patrol or in disadvantaged positions.<br />

“Our young warfighters and operators come from a world where<br />

they can communicate at will,” said Macy W. Summers, vice president<br />

for strategic development with Lockheed Martin Information Systems<br />

& Global Services-Defense. “The ‘first mile’ capabilities and mobility<br />

of the teenager hanging out at the mall easily outpace those provided<br />

today to our combatants and operators in the field.<br />

“That teenager has easy-to-use applications for provisioning, information<br />

sharing, situational awareness, course of action determination,<br />

and imagery data,” Summers said.<br />

These fundamental shifts in computing, mobility and human<br />

interaction mean there is a great opportunity for the warfighter operating<br />

in environments that encompass traditional, irregular, disruptive<br />

and catastrophic threats. Lockheed Martin believes bold thinking<br />

and solution-creation using Web 2.0, smartphones and mobile communications<br />

is the answer.<br />

“We’re doing it today—changing the very nature of the interface<br />

of the edge,” Summers said. “It’s beyond novelty; we’re innovating for<br />

the mission.” ✯<br />

Contact Editor Harrison Donnelly at<br />

harrisond@kmimediagroup.com. For more information related to this subject,<br />

search our archives at www.MIT-kmi.com.<br />

www.MIT-kmi.com MIT 13.8 | 15


Digital Technology<br />

for Small Unit Leaders<br />

IN ORDER TO LEVERAGE THE POTENTIAL OF NETWORKED INFORMATION, SMALL UNIT LEADERS NEED GREATER BANDWIDTH<br />

CONNECTING THEM TO A SECURE NETWORK.<br />

As the U.S. military enters the ninth<br />

year of overseas contingency operations<br />

against terrorist groups, doctrine writers,<br />

material developers, and capability managers<br />

are sprinting to keep up with the rapidly<br />

changing demands of the warfighter. This<br />

conflict features asymmetric threats within a<br />

disparate culture and language of a populace<br />

struggling for basic essential services and<br />

security. Complex, densely populated urban<br />

areas as well as huge expanses of rural, harsh<br />

terrain further complicate the mission.<br />

At the heart of all the challenges is<br />

maintaining effective command and control<br />

(C2). In order to adapt to the illusiveness of<br />

our adversary and the overwhelming scope<br />

of full spectrum operations, leaders at every<br />

level have demonstrated enormous creativity<br />

in adapting “legacy” doctrine and systems to<br />

accomplish the mission at hand.<br />

A traditional view of tactical military command<br />

and control is a centralized structure.<br />

At the battalion level and above, seasoned,<br />

experienced, centrally selected commanders<br />

lead a trained battle staff, leveraging<br />

robust intelligence resources, to plan and<br />

disseminate operations orders and intelligence<br />

updates for execution. Eager but less<br />

16 | MIT 13.8<br />

experienced company commanders execute<br />

those orders and report information higher<br />

to provide the higher headquarters situational<br />

awareness and refine the plan.<br />

These inputs from subordinate units feed<br />

refinements to the plan in the continuous<br />

planning and execution of the mission,<br />

resulting in fragmentary orders generated<br />

back to the subordinate smaller units. In<br />

simple terms, higher headquarters develop<br />

the plan, and company commanders do what<br />

they are told.<br />

Current operations in Iraq and Afghanistan<br />

have demonstrated a shift in that traditional<br />

centralized view. Although battalion<br />

and above headquarters continue to provide<br />

orders and updates, company-level units<br />

have established significantly more robust<br />

“command posts” at their level. Companies<br />

are developing home-grown intelligence:<br />

leveraging human intelligence assets taskorganized<br />

to them as well as intelligence<br />

developed from direct relationships with<br />

indigenous security force and improved relationships<br />

with the local populace.<br />

Often intelligence gathered on an objective,<br />

during a cordon and search for example,<br />

is rapidly exploited to conduct subsequent<br />

BY COLONEL BUDDY CARMAN<br />

AND MIKE KELLEY<br />

operations within hours of the first objective.<br />

Junior leaders are operating on intent, adapting<br />

rapidly to the environment and working<br />

under the principle of asking for forgiveness<br />

rather than waste valuable time seeking<br />

permission.<br />

DECENTRALIZED<br />

COUNTERINSURGENCY<br />

As a result of this shift in the C2 paradigm,<br />

the Army is struggling to adapt<br />

doctrine, organization structure and material<br />

requirements to resource the company<br />

commander with additional people, training<br />

and equipment to enable improved command<br />

and control. Why did this dramatic<br />

change to C2 occur?<br />

As the Army’s 2004 interim field manual<br />

on counterinsurgency operations states, “C2<br />

during counterinsurgency requires greater<br />

decentralization to small unit leaders. Normal<br />

operating methods focused around a<br />

single commander’s approval often prove<br />

inefficient, untimely, and ineffective for<br />

the situation. Commanders must develop a<br />

level of trust communication with subordinates<br />

and foster their initiative well before<br />

www.MIT-kmi.com


arriving into the theater of operations. Commanders<br />

must empower their subordinates<br />

with clear authority for specific operations.<br />

The subordinate leaders must clearly understand<br />

orders, missions, and the commander’s<br />

intent down to the squad and fire team level.<br />

… If C2 and decision making become slow<br />

processes, the insurgents can exploit this.<br />

Additionally, commanders often coordinate<br />

with other agencies that will not be present<br />

on a conventional battlefield.”<br />

The nature of the counterinsurgency<br />

(COIN) environment demands decentralized<br />

C2. Small unit leaders must develop relationships<br />

with the local populace and hostnation<br />

security forces that share their area<br />

of operations. Intelligence often hinges on<br />

these relationships and is more commonly<br />

developed from the “bottom up” that from<br />

analysis form higher levels. Therefore, they<br />

have developed internal C2 structure to meet<br />

the demands of this fight.<br />

The current fight has dramatically<br />

increased the operational tempo for ground<br />

forces. In addition to repeated combat<br />

deployments, the nation is asking the force<br />

to accomplish an incredibly broad range of<br />

missions and skills, including training host<br />

nation security forces; assisting in nationbuilding<br />

and providing essential services;<br />

developing and improving cultural awareness<br />

and basic language skills; and conducting<br />

time-sensitive missions to capture or kill<br />

senior insurgent leaders by exploiting fleeting<br />

intelligence from national assets.<br />

Previously, these are missions or tasks<br />

that were associated with special operations<br />

forces, after undergoing highly specialized<br />

training. Now, these are routine lines of<br />

operations for conventional ground forces.<br />

These seasoned warriors understand the<br />

intricacies of counterinsurgency operations.<br />

They’ve developed relationships with the<br />

people, both security forces and the local<br />

populace. They have built trust and learned<br />

how to develop and exploit human intelligence<br />

sources at the lowest levels of leadership.<br />

They understand the second order<br />

effects of their actions. They’ve learned the<br />

fundamentals of COIN not from the schoolhouse,<br />

but the school of hard knocks.<br />

Today’s soldiers and Marines are the<br />

product of the information age—“digital<br />

natives” with no experience of a world that<br />

isn’t networked. Small unit leaders are very<br />

comfortable with multitasking—assimilating<br />

and leveraging enormous amounts of<br />

data from a variety of sources simultaneously.<br />

They are extremely comfortable with<br />

automation and information technology and<br />

often have made it an integral part of every<br />

aspect of their lives.<br />

Two notable examples of successful systems<br />

are Force XXI Battle Command Brigade<br />

and Below (FBCB2) and Tactical Ground<br />

Reporting (TIGR). Although originally<br />

developed in the mid-’90s for the Army’s<br />

Counterattack Corps, FBCB2 is a real-time<br />

situational awareness and C2 system that<br />

automatically updates friendly locations and<br />

displays reported enemy activity on georeferenced<br />

imagery.<br />

TIGR is a Defense Advanced Research<br />

Projects Agency (DARPA) initiative: a multimedia<br />

reporting system for soldiers at the<br />

patrol level, allowing users to collect and<br />

share information to improve situational<br />

awareness and to facilitate collaboration and<br />

information analysis. The digital-native leaders<br />

at the company level are able to exploit<br />

these systems to improve situational awareness,<br />

plan missions, and conduct more effective<br />

command and control.<br />

But a significant gap remains for C2<br />

at the company and below. In addition to<br />

improvements to manning and training,<br />

small unit leaders need better connectivity to<br />

the network and a simplified interface.<br />

INDUSTRY PARTNERSHIPS<br />

In order to leverage the potential of<br />

networked information, small unit leaders<br />

need greater bandwidth connecting them to<br />

a secure network. In order to keep pace with<br />

the growing demand, the military must find<br />

a more effective way to leveraging current<br />

and emerging wireless technology to push<br />

connectivity to the lowest level. Whatever<br />

bandwidth we will be able to provide will<br />

be rapidly consumed with a variety of critical<br />

data: photos, biometric data, streaming<br />

video, and a growing amount of other sensor<br />

data.<br />

In order to meet the demand, we must<br />

partner with industry to develop a variety of<br />

low-cost, redundant communications options<br />

for both terrestrial and celestial networks to<br />

provide a robust network capability.<br />

Leveraging the digital native’s inherent<br />

expertise with information technology is fundamental<br />

to any successful automation tool.<br />

Part of TIGR’s success as a small unit leaders’<br />

operational tool is its ease of use. The software<br />

developers patterned the graphic user interface<br />

off of Web 2.0 applications like Facebook<br />

and Twitter. A variety of COTS systems have<br />

been developed and deployed, but they often<br />

require “swivel chair” operations—taking<br />

data from one system and manually entering<br />

it into another, incompatible system.<br />

As we develop new software applications<br />

and improve existing systems, material<br />

developers and industry must make a<br />

concerted effort to create an intuitive user<br />

interface that allows the warfighter to access<br />

applications from a single work station. The<br />

development must include refinements from<br />

user juries that allow recently redeployed<br />

leaders to operate prototype systems and<br />

provide feedback on improvements to make<br />

them effective. Creating a more intuitive<br />

user interface also reduces the amount of<br />

training time required to operate the system<br />

since it more closely replicates the systems<br />

he uses every day.<br />

Although this article has focused on the<br />

need for improving the network and software<br />

applications for small unit leaders, these are<br />

merely tools needed by leaders to improve<br />

effectiveness. It is a dangerous assumption<br />

that improvements in information technology<br />

will solve the challenges of the current<br />

fight. Used inappropriately, they can actually<br />

become a distraction or lead to micromanagement<br />

from a command post. Improving<br />

information technology will be a critical<br />

enabler only when coupled with disciplined,<br />

realistic training and professional, engaging<br />

leaders.<br />

In order to bring about effective change in<br />

improving information technology for small<br />

unit leaders, the military must skillfully partner<br />

with industry. The current acquisition<br />

system is too cumbersome to keep pace with<br />

the rapid improvements in technology. We<br />

must become more agile to leverage emerging<br />

technology more effectively.<br />

Our industry partners, meanwhile,<br />

must develop a longer view in their relationship<br />

with the military, focused on<br />

modular, upgradeable systems, providing<br />

insight to promising emerging technology,<br />

and geared toward customer satisfaction<br />

and support to the warfighter instead of<br />

the “quick buck.” ✯<br />

Colonel Buddy Carman is the TRADOC<br />

capability manager for platform battle<br />

command and combat identification, and<br />

Mike Kelley is his deputy.<br />

Contact Editor Harrison Donnelly at<br />

harrisond@kmimediagroup.com.<br />

For more information related to this subject,<br />

search our archives at www.MIT-kmi.com.<br />

www.MIT-kmi.com MIT 13.8 | 17


Putting the IT in “Mobility”<br />

AIR MOBILITY COMMAND’S COMMUNICATIONS DIRECTORATE PROVIDES INTEGRATED,<br />

RESPONSIVE, RELIABLE AND SECURE COMMUNICATIONS AND INFORMATION.<br />

(Editor’s Note: This article, provided by the AMC/A6 Director’s Action <strong>Group</strong>, is one of a series of profiles of key commands in the<br />

information technology and communications fields.)<br />

Members of Multinational Corps-Iraq came together at the Joint Airspace Interoperability<br />

Synchronization Conference at Camp Victory, Iraq. Key players from the Army, Air Force and civilians<br />

from all over Iraq and the Combined Air Operations Center discuss the complexities of managing<br />

the joint air picture and how to improve joint tactics, techniques and procedures. [U.S. Air Force<br />

photo]<br />

With a team comprising more than 132,000 active duty, Reserve,<br />

Guard and civilian personnel, Air Mobility Command (AMC) supports<br />

America’s national interests and the collective will of the American<br />

people through three core competencies: airlift, aerial refueling and<br />

aeromedical evacuation.<br />

Our mission is to provide global air mobility—right effects, right<br />

place, right time. AMC’s airmen are put in harm’s way every day to<br />

deliver troops, cargo and fuel with velocity and precision. On a typical<br />

day, we plan 900 sorties, move 2,000 tons of cargo and transport<br />

6,000 passengers. This operations tempo equates to, on average, a<br />

mobility aircraft departure every 90 seconds, 24 hours a day, 365 days<br />

a year. In the past year, AMC flew 66 percent of the total missions in<br />

Iraq and Afghanistan.<br />

Within AMC, the Directorate of Communications (A6) community<br />

supports AMC by providing integrated, responsive, reliable,<br />

and secure communications and information; providing services and<br />

policy for managing information as a strategic resource for optimum<br />

customer support; and serving as AMC’s chief information officer,<br />

formulating policies and guidance on the strategic planning, implementation<br />

and sustainment of information systems.<br />

We provide this support not only to Headquarters AMC, but<br />

also to its 12 bases, the 618th Tanker Airlift Control Center<br />

18 | MIT 13.8<br />

(TACC) Air Operations Center, and U.S. Transportation Command<br />

(USTRANSCOM). A6 is made up of four divisions: capabilities and<br />

integration; command and control mobility systems; operations;<br />

and plans, policy and resources. Through our directorate, we plan,<br />

design, develop, test, deploy, operate, and sustain numerous information<br />

technology systems/programs designed specifically for AMC.<br />

This article will discuss several of these systems/programs,<br />

including Senior Leader Command, Control and Communications<br />

System-Airborne (SLC3S-A), In-Transit Visibility (ITV), and Enterprise<br />

Information Management (EIM). It will then briefly discuss<br />

how A6 has creatively leveraged Air Force Smart Operations for the<br />

21st Century (AFSO21) and developed several solutions to offset<br />

severe manning reductions across AMC.<br />

SENIOR LEADER COMMS<br />

The SLC3S-A program provides worldwide airborne communication<br />

capabilities for our nation’s top senior leaders, including<br />

the president, vice president, secretary of state, secretary of defense,<br />

director of national intelligence, secretary of the department of<br />

homeland security, chairman of the Joint Chiefs of Staff, and the<br />

combatant commanders. We also manage the ground network<br />

interface for these airborne assets, known as the Executive Airlift<br />

Communications <strong>Network</strong>, which provides connectivity to the<br />

Department of Defense’s Global Information Grid.<br />

Additionally, we’re pursuing related efforts to modernize our<br />

commercial and military satellite and line-of-sight systems to bring<br />

higher capacity connectivity for national command and control capability.<br />

AMC is leading the effort to keep our national senior leaders<br />

connected and protected, even while traveling in airborne assets.<br />

We also manage AMC’s command-unique C2, ITV, operations and<br />

business system programs. The C2 and ITV systems we plan, design,<br />

develop, test, deploy, operate and maintain provide support across<br />

the Mobility Air Forces (MAF) and the USTRANSCOM mission spectrum<br />

from initial planning through execution and completion. The<br />

C2 systems are responsible for all AMC mission planning, including<br />

identifying the appropriate aircraft and air crew and optimizing the<br />

flight path.<br />

The ITV systems track the people and cargo on these missions<br />

from origin to destination. Both the C2 and ITV systems are crucial<br />

to AMC’s airlift, aerial refueling and aeromedical evacuation missions,<br />

and used daily to fly our sorties. Our business systems provide for the<br />

contracting of the commercial reserve air fleet and accountability of<br />

airlift mission budget and costs between government entities.<br />

www.MIT-kmi.com


We provide the systems to integrate global mobility enterprise<br />

C2 and ITV capabilities, supporting an average of 900 sorties a day<br />

around the world; enhance the velocity and precision in AMC’s airlift<br />

capabilities and USTRANSCOM’s supply/delivery chain; and plan,<br />

execute, track and account for nearly 4,000 pallets, more than 2,000<br />

loose pieces of cargo, and over 6,000 passengers daily. These systems<br />

improve the ability to estimate fuel and optimize the routes of<br />

flights to make the most efficient use of fuel; enhance the capability<br />

to contract with commercial airlift providers; and provide the means<br />

of accounting, budgeting and analysis for over $7 billion.<br />

These systems collectively support more than 34,000 users<br />

worldwide. They have been used and continue to be used by the<br />

618th TACC Air Operations Center at Scott Air Force Base , Ill., to<br />

manage MAF operations, by planners and operators in both Afghanistan<br />

and Iraq, and by those responsible for planning and executing<br />

the day-to-day mobility missions, exercises and contingencies wherever<br />

they occur to support peacetime, humanitarian and wartime<br />

operations.<br />

Along with standard network and application technology, we<br />

leverage different technologies to constantly improve system capabilities.<br />

We use a multi-mastered replication scheme, across diverse<br />

locations, to synchronize enclaves, provide maximum performance,<br />

ensure data quality and integrity, and significantly enhance reliability<br />

and survivability. Our air cargo and passenger system is undergoing<br />

a major upgrade to extend and add new services and capabilities<br />

supporting the Worldwide Port System’s sealift capability.<br />

We have adapted network, wireless and automated information<br />

technology to extend capabilities directly to the air and water<br />

ports, flight lines and warehouses. This new capability<br />

enables USTRANSCOM and AMC to track passengers<br />

and cargo not only in the air but also on the ground,<br />

and extends our systems to our joint community. Our<br />

teams continue to improve on our initial development<br />

and fielding of a service-oriented architecture capability<br />

targeted at improving data exchange and reducing<br />

reliance on system-to-system interface.<br />

WEB-BASED SERVICES<br />

The HQ AMC deployment of EIM was one of the<br />

largest IT enabling initiatives we’ve fielded. EIM is<br />

essentially a collection of Web-based services that use Microsoft<br />

SharePoint as the underlying technology. Over the last two years,<br />

our team has stood up one of the largest SharePoint environments<br />

in the world. The result is a single, centralized enterprise<br />

environment hosting over 73,000 users and their data, enabling an<br />

unprecedented level of warfighter collaboration.<br />

We’ve established an EIM deployment team that reached out<br />

to 12 AMC bases to identify their unique organizational structure<br />

and data requirements and then built team sites for all their units.<br />

We also expanded our services to support USTRANSCOM users at<br />

Scott AFB. EIM has become the cornerstone of our daily ops; commanders<br />

live by it and users say they love it.<br />

Through our EIM deployment process, we’ve identified and<br />

automated many EIM process workflows and benchmarked those<br />

Col. Bradley K. Ashley<br />

throughout the command. To date, we’ve added over 70 solutions<br />

sets to our EIM catalog of services. Two of our most-used<br />

solutions are the task management tool and an electronic performance<br />

report system. These EIM services have totally revolutionized<br />

the way AMC does business. Building on our success,<br />

this year we are working to move all the Reserve wings on our<br />

network onto EIM, bringing the number of EIM users to over<br />

100,000.<br />

Finally, the communications and information (C&I) community<br />

has experienced a decline in resources due to Air Force-wide<br />

manpower reductions. Our airmen and civilians have found ways<br />

to minimize a loss of nearly 9,000 Air Force C&I resources, of<br />

which 1,200 were within AMC, while experiencing a 6 percent<br />

increase in Air Force deployment requirements. Through IT initiatives<br />

like EIM, we’re leveraging AFSO21 to automate processes<br />

to help offset our reductions in force and increasing deployment<br />

tempo.<br />

We’ve developed two initiatives to help reduce and consolidate<br />

manning: client service administrators (CSAs) consolidation<br />

and a theater deployable communications (TDC) restructure.<br />

The CSA initiative targeted administrators working at every<br />

AMC unit and squadron and consolidated a number to the base<br />

communications squadrons, effectively reducing the number of<br />

CSAs in the command from roughly 1,600 to about 200, which<br />

represented nearly an 85 percent decrease and saved AMC $28.9<br />

million annually. This action took workload away from the noncommunications<br />

units and better enabled the communications<br />

community to manage network requirements such as vulnerabilities<br />

and fixes.<br />

Our second initiative redirected our TDC to a<br />

contingency capability structure, reducing existing<br />

manpower requirements by approximately 80<br />

percent and reapplying those positions to existing<br />

AMC priorities, a win-win for all parties. Both initiatives<br />

not only streamlined manpower resources,<br />

but reduced monetary requirements for training<br />

and equipment by nearly $1 million per year.<br />

The communications community plays a crucial<br />

role in supporting AMC’s overall mission. In<br />

today’s very demanding, IT-intensive world, we<br />

continually strive to meet and exceed AMC’s needs<br />

through the very best in IT programs and systems such as the<br />

SLC3S-A program, ITV and implementation of EIM. Even while<br />

faced with resource reductions, we implemented several creative<br />

initiatives to offset these losses and maintain the same level of<br />

service to AMC customers and continue to look for targets of<br />

opportunities to streamline our processes.<br />

Colonel Bradley K. Ashley, director of communications,<br />

summed up the work of his organization this way: “AMC/A6 puts<br />

the IT in ‘mobility.’” ✯<br />

Contact Editor Harrison Donnelly at<br />

harrisond@kmimediagroup.com. For more information related to this subject,<br />

search our archives at www.MIT-kmi.com.<br />

www.MIT-kmi.com MIT 13.8 | 19


First Responder Interoperability<br />

P25 WAVEFORM PORTING PROJECT SEEKS TO ENABLE MILITARY RADIOS TO COMMUNICATE<br />

WITH STATE AND LOCAL AGENCIES.<br />

Editor’s Note: This is another in a regular series of updates on the Joint Tactical Radio System (JTRS), as provided by the program’s<br />

Joint Program Executive Office (JPEO).<br />

U.S. Air Force Staff Sgt. David Teague, left, performs first aid as <strong>Maj</strong>. Christopher Gamble radios<br />

in for accountability during an Operational Readiness Inspection at McEntire Air National Guard<br />

Station, S.C. Both Airmen are wearing mission-oriented protective posture gear and are both<br />

assigned to the 240th Combat Communications Squadron. [U.S. Air Force photo]<br />

The JPEO JTRS has begun work on a Project 25 (P25) waveform<br />

porting project in conjunction with the University of California,<br />

San Diego (UCSD) California Institute for Telecommunications and<br />

Information Technology (Calit2) facility. The effort represents the first<br />

phase of a three-phased approach by the JPEO JTRS designed to allow<br />

military radios to interoperate with emergency and first responder<br />

agencies.<br />

Phase one of this project has the UCSD engineers utilizing the<br />

Software Communications Architecture (SCA) and JTRS application<br />

program interfaces to initially implement P25 in a software simulation.<br />

Next, they will port the waveform to a COTS development platform,<br />

which will then lead to a demonstration of RF end-to-end functionality.<br />

Finally, the team will demonstrate interoperability with commercial<br />

P25 radios, simulating military interoperability with COTS first<br />

responder radios running the P25 waveform.<br />

The Association of Public-Safety Communications Officials-International<br />

(APCO) is the world’s largest organization dedicated to public<br />

safety telecommunications. Formerly called APCO-25, P25 is now a<br />

joint effort between APCO, Telecommunications Industry Association,<br />

National Association of State Telecommunications Directors and<br />

various federal agencies. P25 concerns the development of standards<br />

for digital telecommunications technology, including an objective to<br />

determine consensus standards for digital radio equipment embracing<br />

elements of interoperability, spectrum efficiency and cost economies.<br />

20 | MIT 13.8<br />

“This is a crucial step towards making JTRS radios interoperable<br />

with first responders,” said Richard North, technical director for JPEO<br />

JTRS. “Phase two will be to port the UCSD-developed APCO-25 waveform<br />

onto a JTRS radio with additional modes, which may include<br />

encryption, trunking and analog FM. Both phase one and phase two<br />

are risk-mitigation efforts before moving to the third and final phase.”<br />

Phase three of the project will be the incorporation of the P25<br />

into the JTRS program of record, which provides the management<br />

and funding mechanism required to deliver the radio to the military<br />

end-users.<br />

Interoperability for a first responder participant requires that public<br />

safety agencies (fire, police, medical) have direct communications<br />

when they operate with one another, across disciplines and jurisdictions.<br />

In order to facilitate this communication goal, agencies are<br />

looking at non-military waveform standards such as P25.<br />

Using a standardized suite of waveform standards allows radio sets<br />

manufactured by different vendors to communicate. Ultimately, porting<br />

the P25 waveform to JTRS radios will allow military organizations<br />

to interoperate with state and local agencies in time of an emergency<br />

such as a disaster relief scenario.<br />

“The JTRS radios will host the ported P25 waveform as well as<br />

JTRS networking and current force military waveforms such as SIN-<br />

CGARS, EPLRS, HF, Link-16 or UHF SATCOM,” North added. “With<br />

all these waveforms on the same radio, we can provide direct communications<br />

to P25-equipped first responders, as well as routing and<br />

retransmitting messages from the P25 net to current force radios. This<br />

provides a tremendous capability for unit commanders equipped with<br />

JTRS radios.”<br />

The UCSD division of Calit2 and Calit2’s division at UC Irvine<br />

together house more than 1,000 researchers across the two campuses,<br />

organized around more than 50 projects. With a focus on discovery<br />

and innovation at the intersection of science, engineering and the arts,<br />

Calit2 constitutes one of the largest multidisciplinary research centers<br />

in the nation. Research is conducted on the future of telecommunications<br />

and information technology and using these advancing technologies<br />

to transform a range of applications.<br />

The Calit2/JTRS Software Defined Radio (SDR) Project is a collaborative<br />

research effort supported by JPEO JTRS involving SCA SDR<br />

platforms for development and porting of SDR waveforms, creating<br />

a high-performance amplifier test-bed, and hosting the JTRS Open<br />

Information Repository. More information is available at http://jtrs.<br />

calit2.net. ✯<br />

www.MIT-kmi.com


AUSA BOOTH 1439<br />

The FALCON III ® AN/VRC-110 Vehicular System:<br />

Complete Interoperability<br />

One radio lets you do it all – National Guard<br />

Deployments, Medevac, Disaster Relief, Convoy<br />

Control—Now, multiple missions without the<br />

burdens of multiple radios.<br />

Choose the JTRS-approved, interoperable radio<br />

that's just as versitle as you are. Our dismountable<br />

SINCGARS-capable radio meets your military and<br />

civilian operational needs.<br />

assuredcommunications www.harris.com<br />

RF Communications Government Communications Systems Broadcast Communications<br />

®


Compiled by <strong>KMI</strong> <strong>Media</strong> <strong>Group</strong> staff<br />

Highband <strong>Network</strong>ing Radio<br />

Scores in WIN-T Testing<br />

Harris has received a contract update from Lockheed Martin to<br />

continue development work on wireless networking technology under<br />

Increment 3 of the Warfighter Information <strong>Network</strong>-Tactical (WIN-T)<br />

program. Harris successfully completed recent major testing and evaluation<br />

milestones on the Army’s WIN-T program and is continuing work on<br />

the next generation of military tactical communications systems. Harris<br />

is a member of the WIN-T team led by <strong>Gen</strong>eral Dynamics and Lockheed<br />

Martin. WIN-T Increment 3 significantly extends the capabilities of the<br />

current Increment 2 Line-Of-Sight (LOS) wireless networking technology.<br />

Harris is responsible for key LOS radio system components for Increment 3<br />

that, once awarded, will extend the scope of the Harris work on WIN-T and<br />

bring the company’s total award value to more than $130 million from<br />

2007 to 2012. The follow-on production program is expected to include<br />

hundreds of systems per year between 2012 and 2021. Harris successfully<br />

completed the development test and engineering field test with <strong>Gen</strong>eral<br />

Dynamics, Lockheed Martin and the WIN-T program office using the<br />

Highband <strong>Network</strong>ing Radio (HNR) at Fort Huachuca, Ariz. This is a major<br />

milestone in the WIN-T Increment 2 program, which precedes Increment<br />

3 in the successive technology deployment strategy of the WIN-T program.<br />

An order for low rate initial production using the HNR is projected to be<br />

placed by WIN-T later this year.<br />

Mobile Computers Meet Tough<br />

New Environmental Standards<br />

Panasonic Computer Solutions, manufacturer of Toughbook mobile<br />

computers, has announced its fully rugged line and Toughbook U1 are the<br />

first to be certified by an independent third-party test lab to meet the newer<br />

and more demanding MIL-STD-810G standard for environmental condi-<br />

tions, which was issued in October 2008 and sup supersedes MIL-STD-810F. The<br />

Toughbook 30 laptop, Toughbook 19<br />

convertible ta tablet and Toughbook U1<br />

ultra mobile handheld replacement<br />

m have passed 20 critical<br />

MIL-STD-810G M<br />

tests applicable<br />

c to mobile computers,<br />

as a well as IP65 ingress<br />

protection p<br />

and ASTM<br />

D4169-04 D vehicle vibration<br />

tests. t Testing was conducted<br />

and a certified by an internationally<br />

n respected thirdparty<br />

p laboratory.<br />

22 | MIT 13.8<br />

Enterprise Buy Includes<br />

Next-<strong>Gen</strong>eration Workstation<br />

The Air Force has selected HP<br />

to provide new HP workstation and<br />

desktop PCs as part of its enterprise<br />

IT purchase program. This latest<br />

award builds on the more than<br />

400,000 units of HP client products<br />

deployed by the Air Force. The<br />

award is part of the desktop, laptop<br />

and servers Quarterly Enterprise<br />

Buy (QEB). In compliance with Air<br />

Force requirements, HP will include<br />

customized security configurations<br />

that meet strict specifications and tests. Air Force facilities worldwide will use an array<br />

of HP platforms, including HP workstations and mobile workstations that combine<br />

sleek style and energy efficiency with high-grade functionality. The QEB award will<br />

include the HP xw4600 workstation, which combines next-generation performance<br />

technologies into a powerful, flexible and reliable single processor socket workstation.<br />

Dual PCIe X16 <strong>Gen</strong>2 graphics interfaces provide up to four times the performance of<br />

previous graphics interfaces, along with the ability to power multiple displays without<br />

compromise. In addition, the HP EliteBook 8730w mobile workstation will be delivered<br />

in both standard and customized secure configurations that meet the Air Force’s secure<br />

product category requirements.<br />

Voice Core Solutions Receive<br />

Security Accreditation<br />

The PacStar 6800 Small End Office (SMEO) and the PacStar 6300<br />

Deployable Voice Exchange have received information assurance accreditation<br />

by the Defense IA/Security Accreditation Working <strong>Group</strong>. The solutions<br />

have also received interoperability certification by the Joint Interoperability<br />

Test Command, and consequently the Defense Information Systems Agency<br />

placed them on the Approved Product List. Both solutions are designed to be<br />

the voice core of the network infrastructure for the U.S. military around the<br />

world. The PacStar 6800 and 6300 solutions enable the military to connect to<br />

the Defense Switched <strong>Network</strong> (DSN), eliminating cumbersome two-step analog<br />

to IP network complexity. Also, the PacStar 6800 is the only y SMEO voice switch<br />

based on the Cisco Unified Communications<br />

platform that is accredited for the DSN. With<br />

proven Cisco hardware at its core, the PacStar<br />

6800 and 6300 solutions were designed to meet<br />

the “everything over IP” mandate of the Office<br />

of the Secretary of Defense, which requires that<br />

the military shift to fully IP-capable solutions.<br />

These solutions provide a common IP communications<br />

platform from the military base to<br />

the battlefield.<br />

Jamie Finn: jfinn@pacstar.com<br />

www.MIT-kmi.com


Information Assurance Experts Support Afghanistan Security<br />

Trace Systems has won a contract with the Army’s 7th Theater Tactical<br />

Signal Brigade for information assurance subject matter experts in support<br />

of the Joint <strong>Network</strong> Operations Control Center-Afghanistan (JNCC-A). The<br />

JNCC-A is the NETOPS execution arm of the U.S. Forces-Afghanistan J6 and<br />

is responsible for the operation and maintenance of communications and<br />

computer networks throughout the Afghanistan area of operations. Trace<br />

Systems will provide IA subject matter experts based at Bagram Airfield,<br />

Joint Forces Test<br />

New Encryption Technology<br />

Unisys has been awarded a task order to support the testing and evaluation of<br />

a new encryption and “bit-splitting” technology at the U.S. Joint Forces Command<br />

(USJFCOM) to ensure that data is secure and readily available to those authorized<br />

to view it. The project will test the Unisys Stealth Solution for <strong>Network</strong>, an innovative<br />

secure information-sharing solution for government and commercial organizations.<br />

Under the one-year task order, awarded through the Defense Information<br />

Systems Agency’s Encore II contract, Unisys will provide technical support at<br />

the USJFCOM site in Norfolk, Va., and at its subordinate Joint Transformation<br />

Command for Intelligence site in Suffolk, Va.<br />

The commands will test the ability of cryptographic bit-splitting technology to<br />

help converge various Department of Defense Global Information Grid networks<br />

operating at different security levels into a single network infrastructure where<br />

virtualized communities of interest can co-exist, while still maintaining complete<br />

isolation from each other. The technology would help protect each community’s<br />

data, allowing the controlled sharing of information between communities, while<br />

dramatically reducing infrastructure and associated costs.<br />

Integrated Application<br />

Complements Multi-Directional<br />

Data Transfer<br />

The latest release of PuriFile, the file inspection application from ITT, has been<br />

successfully integrated with Trusted Computer Solutions’ (TCS) SecureOffice Trusted<br />

Gateway System product. The PuriFile technology allows for enhanced file inspection<br />

preceding the Trusted Gateway System’s rapid, multi-directional transfer of any data<br />

type between numerous security levels, such as unclassified, secret, secret releasable,<br />

and top secret/sensitive compartmented information networks. ITT’s PuriFile software<br />

performs deep analysis of various Microsoft Office file formats, and discovers information<br />

within and about files that would otherwise go unnoticed in typical review<br />

processes. TCS’ Trusted Gateway System product is the most recent in a continuing<br />

series of government and commercial systems to update to ITT’s latest PuriFile application<br />

for deep content inspection of files before transfer. The PuriFile inspection tool<br />

exists as a stand-alone product, but the availability of an application programming<br />

interface allows it to be easily incorporated into a wide variety of transfer and inspection<br />

systems. PuriFile also provides additional tools and mechanisms for easy integration<br />

into existing active directory systems for user identification.<br />

Stacey Winn: swinn@trustedcs.com<br />

Afghanistan. Residing within the JNCC-A, Trace Systems will support network<br />

defense throughout the Combined Joint Operational Area-Afghanistan on a<br />

24/7 basis, including the deployment and monitoring of host-based security<br />

systems, enterprise anti-virus management systems, intrusion prevention<br />

systems, and other applications that identify and counter unauthorized<br />

applications, rogue systems and malicious content.<br />

Jeff Barrows: jsb@tracesystems.com<br />

Contract Funds Prophet<br />

Advanced SIGINT System<br />

The Linkabit division of L-3 Communications has been awarded a<br />

contract by <strong>Gen</strong>eral Dynamics C4 Systems in support of the Army’s Prophet<br />

Enhanced program. This initial contract is valued at $46.6 million and<br />

includes delivery order pricing for six years. The Prophet Enhanced system<br />

is a tactical signals intelligence system that provides battlefield commanders<br />

increased electronic intelligence and situational awareness. It is the Army’s<br />

ground-based sensor system to securely and accurately detect, identify, locate<br />

and direction find radio frequency emitters in the commander’s tactical area<br />

of interest. Under this contract, L-3 will produce, test and deliver Prophet<br />

Enhanced (PE) B-kits, PE A-kits and associated spares in support of the<br />

program. In addition to providing a technically advanced intelligence<br />

resource, the Prophet Enhanced kit will also utilize mature communications<br />

provided by L-3 Linkabit. This technology provides the Army a wideband<br />

beyond line-of-sight communications capability.<br />

Brian Domian: brian.domian@l-3com.com<br />

www.MIT-kmi.com MIT 13.8 | 23


C 3 ISR > GOVERNMENT SERVICES > AM&M > SPECIALIZED PRODUCTS<br />

Communication Systems–West<br />

TACTICAL SITUATIONAL AWARENESS<br />

ROVER CAPABILITY IN YOUR HANDS.<br />

ROVER 5 is the newest product in the ROVER family. It was designed to be<br />

a lightweight portable transceiver, to provide real-time situational awareness<br />

and to shorten the kill-chain with two-way communication of target intelligence<br />

across Ku, C, L, S, and UHF frequency bands. With the ability to network<br />

between manned and unmanned ISR platforms, ROVER 5 gives warfighters a<br />

fast, secure way to collaborate on time-sensitive video imagery and targeting<br />

data. For more information, call 800-874-8178, visit L-3com.com/csw or<br />

email CSW.Products@L-3com.com.<br />

L-3com.com


Q&A<br />

Becoming the Army’s Single IT Service Provider<br />

<strong>Network</strong> <strong>Unifier</strong><br />

<strong>Maj</strong>or <strong>Gen</strong>eral <strong>Susan</strong> S. <strong>Lawrence</strong><br />

Commanding <strong>Gen</strong>eral<br />

Army <strong>Network</strong> Enterprise Technology<br />

Command<br />

9th Signal Command (Army)<br />

<strong>Maj</strong>or <strong>Gen</strong>eral <strong>Susan</strong> S. <strong>Lawrence</strong> enlisted in the Army in 1972<br />

and received her commission as a second lieutenant in June 1979.<br />

Prior to assuming command of Army <strong>Network</strong> Enterprise Technology<br />

Command/9th Signal Command (Army) (NETCOM/9th SC (A)),<br />

she served as commanding general, 5th Signal Command, and U.S.<br />

Army, Europe and Seventh Army chief information officer/assistant<br />

chief of staff, G-6.<br />

<strong>Lawrence</strong> has served as a platoon leader in the 67th Signal Battalion,<br />

Fort Gordon, Ga.; aide-de-camp to the commanding general,<br />

Army Signal Center, Fort Gordon; military assistant at the Defense<br />

Communications Agency; platoon leader in Korea under Eighth U.S.<br />

Army, 122nd Battalion, 2nd Infantry Division; executive officer to the<br />

commanding general, Army Signal Center; company commander of<br />

B Company, 67th Signal Battalion; S-2 and S-3 officer of the 67th<br />

Signal Battalion; branch chief to the U.S. Army Information Systems<br />

Engineering Command-Europe; deputy G-6, 2nd Armor Division;<br />

executive officer,142nd Signal Battalion; force development action<br />

officer, Washington, D.C.; and chief, Signal Career Assignments<br />

Branch, Officer Personnel Management Directorate.<br />

In addition, <strong>Lawrence</strong> commanded the 123rd Signal Battalion,<br />

3rd Infantry Division, Fort Stewart, Ga., which deployed in support<br />

of Operation Desert Thunder. She commanded the 7th Signal Brigade,<br />

5th Signal Command, prior to serving as chief of staff and vice<br />

director, J-6, Joint Chiefs of Staff at the Pentagon. She also served as<br />

the director, command and control, communications and computer<br />

systems, J-6, U.S. Central Command.<br />

<strong>Lawrence</strong> received a bachelor’s degree from Campbell University<br />

in North Carolina, where she received her commission, and holds<br />

a master’s degree in information systems management from the<br />

University of Georgia.<br />

<strong>Lawrence</strong> was interviewed by MIT Editor Harrison Donnelly.<br />

Q: What are the goals of the Global <strong>Network</strong> Enterprise Construct<br />

(GNEC)?<br />

A: As you know, the Army is facing a wide range of threats. They are<br />

synchronous, asynchronous, worldwide and persistent. The GNEC<br />

is our Army’s strategy for aligning and transforming our network<br />

assets—our people, equipment and policies—to meet these challenges.<br />

The GNEC will deliver a global, standardized, protected and<br />

effective network enterprise that supports the needs of the warfighter<br />

in joint, international, intergovernmental and multinational operations.<br />

The reason for transforming to the GNEC is obvious: We live<br />

in a different world than we did in the 1980s and 1990s. When I<br />

was a young signal officer, the focus was on the forward deployment<br />

of forces. The new reality is that 80 percent of Army forces<br />

are CONUS-based. This means that our soldiers are called to<br />

deploy with little to no notice, and the Army’s relevance in these<br />

conflicts will be judged by its responsiveness and expeditionary<br />

capability. The Army must be ready to fight upon arrival. The key<br />

to that is ensuring that we can provide reliable network services<br />

to our soldiers anytime, anywhere. The GNEC will allow us to do<br />

that by providing a seamless network that is universally available<br />

and accessible to the warfighter from home station, to the area of<br />

operations and back again.<br />

Q: What is the role of 9th Signal Command (Army) in implementing<br />

the Army’s GNEC?<br />

A: The 9th SC (A), in partnership with the CIO/G6, the PEO community<br />

and the CIOs of the Army’s various commands and agencies, is<br />

leading the march to make the GNEC a reality. Our job is to use the<br />

GNEC strategy to deliver a global network enterprise from the desktop<br />

to the foxhole, improving defensive capabilities and effectiveness<br />

while at the same time gaining resource efficiencies through a set<br />

of common standards and configurations. Once implementation is<br />

www.MIT-kmi.com MIT 13.8 | 25


complete, we will serve as the Army’s single information technology<br />

service provider.<br />

We already started working on this: Right now, we are in the process<br />

of obtaining full visibility—or aggregating—of our network assets.<br />

Once that is complete, we will move to federate and ultimately consolidate,<br />

where it makes sense, these assets into a single network. We’ll<br />

make the best use of collected data and systems by way of a federation<br />

that employs common standards that will allow organizations to manage<br />

their own systems and networks. This is a big job. The collection of<br />

disparate networks we have to consolidate consists of a variety of new,<br />

nearly-new and legacy systems.<br />

Another part of our role is to improve overall network security. One<br />

way we will do this is through the consolidation of points of access.<br />

We currently have 400-plus points of access to the network in CONUS<br />

alone. We plan to reduce that to between 12 and 15 entry points and,<br />

over time, to apply this same model to the worldwide network. This will<br />

immediately enhance our network defense posture. At the same time<br />

we’re operating in this federation, we are going to standardize our assets<br />

and achieve a common technical and operational picture to ensure that<br />

universal capabilities and services are delivered seamlessly across the<br />

enterprise network, and if juggling all that isn’t enough, we’re going to<br />

modernize our systems and operations while doing everything else. So<br />

these activities are not necessarily going to be performed sequentially.<br />

As a matter of fact, we expect them to happen in parallel.<br />

At the end of the day, while the job is hard, our goal is simple: to<br />

bring about a unified network enterprise that provides soldiers with<br />

a single identity from home station to AOR and back, manage the<br />

network so that our forces have the capability to access data from<br />

anywhere, at anytime, and provide our warfighters the information<br />

superiority they need to accomplish their mission.<br />

Q: How will the creation of <strong>Network</strong> Service Centers [NSC] and Area<br />

Processing Centers [APC] change the way the Army conducts its<br />

network operations?<br />

A: The NSCs will enable always-on, real-time access to the network<br />

and network services globally. The kind of network service I’m talking<br />

about is what you find in everyday life. You don’t even think twice<br />

when you make a call on your cell phone—you expect, and get, a connection.<br />

That is the type of access that the NSCs will provide.<br />

The APCs are key components of the larger NSC construct. We’ve<br />

already established them in the European and CONUS theaters, and<br />

are in the process of doing the same in the Pacific. They will enable us<br />

to provide better service in terms of data and applications, as well as<br />

reduce the number of access points on the network, ultimately reducing<br />

the cost of ownership for information technology.<br />

While we’re on the subject of centers, let’s not forget our Theater<br />

<strong>Network</strong> Operation Security Centers [TNOSC] or the Army Global<br />

<strong>Network</strong> Operations Security Center [AGNOSC]. These organizations<br />

are the focal point of network operations for the NSC. There are six<br />

TNOSCs, operating globally on a 24/7 basis. Along with the AGNOSC,<br />

they serve on the front line in detecting, analyzing and defusing<br />

threats to the network.<br />

Q: What do you see as the biggest challenges involved in implementing<br />

the GNEC?<br />

A: As it turns out, our biggest challenge hasn’t been technical; it is<br />

cultural. That’s understandable. The current architecture of having<br />

26 | MIT 13.8<br />

networks support single organizations or regions has been in place for<br />

years. That worked well for a time, but times have changed, and most<br />

importantly, our Army is now network dependent, requiring universal<br />

access and availability regardless of location or operational requirement.<br />

We have to be smarter, faster and better than we’ve been in the<br />

past if we hope to meet the operational and resources challenges of<br />

the 21st century.<br />

There are efficiencies and economies of GNEC implementation<br />

that will tremendously benefit any organization—not just providing<br />

information superiority, but also saving time and money spent due to<br />

outdated processes and redundancies. We’ve done the math, and these<br />

savings increase as time goes on, so that as expenditures for maintenance<br />

and repair of networks infrastructure dissipate, that money can<br />

be spent elsewhere, addressing the specific needs and mission of an<br />

organization. Our challenge is in getting that word out—helping our<br />

community see both the necessity and the benefits of transforming to<br />

a true network enterprise.<br />

Q: How will the GNEC enable or directly support the warfighters’<br />

expeditionary tenants?<br />

A: In the past, warfighters were network enabled. The network was a<br />

force multiplier. Today those same warriors are network dependent;<br />

the enterprise has become part and parcel of how we fight. The GNEC<br />

will provide that network enterprise both at home station and in the<br />

area of operations.<br />

In previous conflicts, we would deploy an initial communications<br />

capability to the battlefield, and then plan for the network to catch<br />

up. We can’t do this anymore. Under the GNEC, the network will<br />

never leave the warfighter. It will remain with the soldier through<br />

all phases of operations, providing the single network identity I mentioned<br />

earlier, as well as the always-on access to intelligence, logistics,<br />

fires and other information necessary in today’s world. This will free<br />

up additional time for training and contingency planning while in<br />

transit, reduce disruptions in battle command, and provide units on<br />

the ground with always-on, real-time access to the network. When<br />

the warfighter is operationally engaged, he will be better prepared and<br />

informed, have greater situational awareness, be able to react within<br />

shorter decision cycles and as a result be more lethal than at any time<br />

in the past. GNEC makes that possible.<br />

Q: How will the GNEC change the way in which 9th SC (A) and the<br />

Army in general work with industry?<br />

A: GNEC is a once-in-a-generation opportunity for the Army to standardize<br />

our environment through secure hardware configurations<br />

and common toolsets. For example, the Army’s standard desktop<br />

configuration, the Army Golden Master, incorporates the federal,<br />

Department of Defense, and Army security configurations. Industry<br />

partners, both hardware vendors and software developers, must<br />

understand these configurations and build their products to work in<br />

our secure environment and, at the same time, with open standards<br />

to ensure interoperability. Federal and DoD acquisition regulations<br />

actually prevent the Army from purchasing hardware and software<br />

that cannot operate in the secure environment.<br />

The Army has always worked with industry on customizing<br />

solutions to meet our operational needs. However, the fast pace at<br />

which technology changes requires the Army and industry to work<br />

together so that we can influence changes to hardware and software<br />

www.MIT-kmi.com


capabilities before they are released to the public. In some cases, the<br />

Army leverages enterprise software agreements to achieve this capability.<br />

For example, our software agreement with Microsoft enabled us<br />

to collectively develop a Vista activation solution that ultimately saved<br />

the Army millions in hardware costs. DoD and other federal agencies<br />

now use this activation solution as well. We will also continue to<br />

increase our cooperation with industry in this area.<br />

The transformation of the network into a true global enterprise<br />

will also change our relationship with business. Over the years,<br />

industry has provided IT services to individual commands and organizations<br />

in an organic manner with proprietary solutions. This has<br />

sometimes resulted in duplicative and overlapping services that are<br />

not interoperable and are non-standard from an enterprise perspective.<br />

This limits our ability to share information, conduct joint operations,<br />

collaborate, and defend our networks. We will look to industry<br />

to view the Army in global terms and craft solutions that meet enterprise<br />

requirements. The relationship will be between the IT industry<br />

and the enterprise, not between industry and individual commands.<br />

Q: In what ways will industry need to change in order to achieve the<br />

greatest mutual benefits from GNEC?<br />

A: The GNEC is a paradigm shift from how the Army previously<br />

addressed our technical and user challenges. Industry can assist<br />

by forming more teaming arrangements to help us achieve greater<br />

capabilities. The Army needs integrated, end-to-end solutions, not the<br />

standard one-toolset-per-capability approach that is used today. This<br />

is extremely important for the GNEC, which incorporates the sustaining<br />

base and the tactical Army. A single solution must span that user<br />

base and provide equal capability.<br />

Industry can also benefit from understanding our environment<br />

and becoming a partner with us. We want industry to continue to<br />

innovate, with regard to solutions and services that we need in order<br />

for us to succeed. We want industry to identify savings and efficiencies<br />

that we can make as we go through our GNEC enterprise transformation.<br />

We also want to adopt best practices from industry on how<br />

large commercial enterprises manage their own IT infrastructure,<br />

and apply those principles to the Army. Another area that industry<br />

can help with is to ensure that the solutions they propose can scale<br />

to Army enterprise level. Often, we are finding that solutions do not<br />

scale to the Army’s large, complex environment and wide geographic<br />

base. Also, industry needs to understand that our tactical forces operate<br />

in austere environments and require special consideration when<br />

targeting solutions for this problem set.<br />

Q: The role, and even name, of directorates of information management<br />

[DOIMs] will be changing under a re-organization currently<br />

under way. How will this change operations, and what benefits do<br />

you see as a result?<br />

A: The renaming of DOIMs to <strong>Network</strong> Enterprise Centers [NECs] is<br />

a direct function of GNEC implementation. NECs at each installation<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

www.MIT-kmi.com MIT 13.8 | 27


are transforming their internal processes to align with this GNEC<br />

model. The advantages of the NEC transformation are eliminating<br />

network capability gaps for units preparing, deploying and transitioning,<br />

and dramatically improving our network defense posture<br />

by applying globally consistent network security policies and procedures.<br />

This yields economies and efficiencies while improving<br />

effectiveness and enhancing our ability to share information with<br />

joint forces and coalition partners. This transformation is occurring<br />

in all Army theaters. What’s ultimately behind the change to<br />

NECs is a new alignment of command and control responsibility<br />

and an enterprise approach to the security and management of<br />

the network, which improves capabilities and supports operations<br />

through all phases of the fight.<br />

Q: Since the annual LandWarNet conference has become one of<br />

the biggest technology-focused military conferences, and because<br />

of your command’s involvement in this conference each year,<br />

how do you feel this conference helps DoD and the Army? What<br />

came out of this year’s conference?<br />

A: Because of its focus on joint and coalition operations, the Land-<br />

WarNet conference is DoD’s premier C4IT conference. It is an<br />

important opportunity for our community to anchor our successes,<br />

to share our lessons learned, and to chart out a course for the<br />

future. The conference puts leaders and operators, program managers,<br />

staff and industry in the same room to hear first-hand operator<br />

requirements, issues, concerns and timelines. Likewise, operators<br />

hear about what technologies are working their way to them.<br />

From the 9th SC (A) perspective, the annual conference is also<br />

an important opportunity to shape the discussion of critical operational<br />

subjects. Starting with the theme of the 2009 event, Land-<br />

WarNet—A Global <strong>Network</strong> Enterprise Enabling Full Spectrum<br />

Operations for the Joint Warfighter, and through our after-action<br />

report, our entire focus continues to be on generating and capturing<br />

discussion on what matters to the operating and generating<br />

forces that better enables their mission. My expectations each year<br />

are to hear first-hand from conferees about what they need to fight<br />

the war, and from industry what they can bring to the table to meet<br />

our global interoperability and collaboration requirements more<br />

securely, effectively and efficiently.<br />

Q: What is your strategy for strengthening cybersecurity under<br />

GNEC?<br />

A: Ensuring a safe, secure network is fundamental to making<br />

the GNEC work. We’ve developed a comprehensive strategy that<br />

focuses on enhancing our defensive capabilities, improving the<br />

sustainment of programs, working with industry to develop more<br />

effective and rapid detection and response capabilities, and partnering<br />

with the military intelligence community to improve predictive<br />

intelligence. This strategy will allow us to win the Army’s<br />

cybersecurity fight.<br />

Q: What are the key cybersecurity initiatives of other parts of<br />

your command? How will your work in this area interact with the<br />

new U.S. Cyber Command?<br />

A: The cyberthreat is real, and the U.S. Cyber Command is an<br />

important step in confronting that threat. The Army is currently<br />

28 | MIT 13.8<br />

performing a mission analysis of how it will provide forces in<br />

support of the newly formed Cyber Command. 9th SC (A) will<br />

be a critical part of this solution. In the meantime, we remain<br />

involved in cyber-operations on a daily basis through our<br />

AGNOSC and TNOSCs, and the development of expanded network<br />

operations [NetOps] capabilities.<br />

I discussed our TNOSCs and the AGNOSC a bit earlier, but I<br />

can’t overstate their importance on the cyberfront. The TNOSCs<br />

and AGNOSC are the network’s guardians. The work they do on<br />

a daily basis to detect, analyze and overcome the threat to theater<br />

and global network operations is central to our maintaining<br />

information dominance. Additionally, the TNOSCs also provide<br />

NetOps and service desk functions—ensuring the seamless<br />

delivery of standardized enterprise services—while the AGNOSC<br />

serves as the Army’s operational arm into the world of the Joint<br />

Task Force-Global <strong>Network</strong> Operations. Together, they represent<br />

the Army’s key LandWarNet cyberdefense capability.<br />

Speaking of NetOps, and its role in the GNEC and cyberoperations,<br />

I should mention that the Army made an important<br />

initial investment in NetOps capabilities during the 2009<br />

midyear review. This investment provides significant resources<br />

to close computer network defense gaps in the network and to<br />

standardize critical network management tools that facilitate the<br />

further federation and consolidation of the LandWarNet. These<br />

tools, together with our other efforts, will enhance our ability<br />

to see the network, know what’s happening on it, and rapidly<br />

respond to threats.<br />

Q: What are the elements of your command doing to support the<br />

stepped-up U.S. efforts in Afghanistan?<br />

A: We don’t anticipate a change in personnel requirements but<br />

do plan to increase our support of current mission requirements<br />

through commercialization and infrastructure improvements.<br />

The 9th SC (A) currently manages commercial satellite terminals,<br />

technical control facilities, and data network equipment<br />

at key strategic locations in Afghanistan. The program manager<br />

defensewide transmission systems/program manager defense<br />

communications systems-Southwest Asia has responsibility for<br />

Operation Enduring Freedom [OEF] and Operation Iraqi Freedom<br />

[OIF] commercialization implementation, as part of an ongoing<br />

commercialization effort aimed at relieving the requirement for<br />

tactical OEF rotational units and equipment. Operational control<br />

and direction is provided by 335th Theater Signal Command, with<br />

project oversight provided by 9th SC (A). The Total Army Communications-Southwest<br />

Asia Central Asia Africa [TAC-SWACAA] contract<br />

continues to provide operations and maintenance support<br />

for communications and information systems under the purview<br />

of the 160th Signal Brigade in the CENTCOM area of operations.<br />

Currently, the number of TAC-SWACAA contractors supporting<br />

OEF and OIF covers 51 sites.<br />

Several forward operating bases in Afghanistan were deemed<br />

enduring sites and are in the design and implementation<br />

stages to support strategic communications, releasing tactical<br />

elements for other missions. The new C4 facilities at International<br />

Security Assistance Forces and New Kabul Compound<br />

and scheduled upgrade of C4 facilities at Camp Phoenix and<br />

Kandahar Air Field in Afghanistan will give warfighters communications<br />

expansion capabilities for current and future growth.<br />

www.MIT-kmi.com


Meanwhile, the completion of the Fixed Regional Hub Node at<br />

Camp Arifjan, Kuwait, provides up to 48 links of Frequency Division<br />

Multiple Access and Time Division Multiplex Access satellite<br />

connectivity and 12 links of mounted battle command on the<br />

move and airborne command and control to support warfighter<br />

communications in Afghanistan. These significant changes will<br />

greatly enhance war fighting efforts.<br />

Q: What do you see as the most effective ways of responding to<br />

the growing bandwidth/spectrum crunch, especially related to<br />

UAV surveillance and imagery?<br />

A: Spectrum really has been a force multiplier/enabler. Due to<br />

technological advances, we are able to use spectrum-dependent<br />

systems to meet our mission goals and, at the same time, keep<br />

our warfighters out of harm’s way. Our challenge for the future<br />

is to ensure we have the proper requirements for our future<br />

spectrum-dependent systems.<br />

Let’s take our ISR systems on UAVs, for example. The<br />

warfighter wants streaming video in order to have real-time<br />

situational awareness. We must be smart in our methods<br />

for meeting that requirement. Capabilities exist to provide<br />

streaming video using systems with an 18 MHz bandwidth.<br />

When you compare this bandwidth to that of a typical broadcast<br />

television bandwidth, which is below 6 MHz wide, we see that<br />

smart design and efficient use of the spectrum can be achieved.<br />

PLAN YOUR MOBILE AD-HOC NETWORKS—<br />

IN MINUTES.<br />

VISUALIZE. DESIGN. OPTIMIZE.<br />

Introducing VisNet Defense, a new planning tool from Scalable <strong>Network</strong><br />

Technologies that takes rapid prototyping of mobile networks to a whole<br />

new level of speed and productivity.<br />

VisNet combines the simulation engine that powers SNT’s industry-leading<br />

products QualNet and EXata with dramatic 3D GIS visualization and<br />

point-and-click device setup. <strong>Network</strong> planners can now quickly build<br />

and view realistic high-level simulations of network constructs with<br />

tens, hundreds, or thousands of devices.<br />

Want to know more? Visit www.scalable-networks.com/VisNet.<br />

MILCOM October 18-21, 2009, booth #528<br />

I/ITSEC 2009 November 30-December 3, 2009, booth #2719<br />

The key is understanding the requirements, and looking at<br />

spectrally efficient methods of meeting those requirements.<br />

We also need to question whether all requirements are valid<br />

and the best use of our limited spectrum. We must approach<br />

development of spectrum-dependent capabilities the same way<br />

we are approaching the construct of our network—on an enterprise<br />

level. We must prioritize our requirements to determine<br />

the smartest approach for an enterprise solution. In taking this<br />

approach, the Army will realize gains in spectrum efficiency<br />

while meeting our war fighting mission. We can’t develop<br />

spectrum-dependent systems without taking into consideration<br />

all of the other spectrum-dependent systems in its operational<br />

environment. By taking this approach, the Army is able to realize<br />

mission goals with far fewer interference issues.<br />

This is not to say we don’t need to continue our research<br />

for further advances in technologies. The Defense Advanced<br />

Research Projects Agency [DARPA] is studying and developing<br />

methods of spectrum-sharing technologies. The Army is very<br />

interested in a spectrum-sharing technology called dynamic<br />

spectrum access, which DARPA has shown great strides in<br />

developing. This technology has the potential of increasing our<br />

spectrum usage by at least sixfold. It is technological advances,<br />

smart requirement formation, and enterprise-level development<br />

that will get us to where we want to be in the future in<br />

our use of spectrum-dependent systems and our war fighting<br />

capabilities. ✯<br />

Planning tool for mobile networks from<br />

VisNet Defense incorporates the same simulation technology and runs seamlessly with QualNet ® and EXata ® , SNT's industry-leading simulation and emulation tools.<br />

www.MIT-kmi.com MIT 13.8 | 29


DEFENSE AGENCIES AND INDUSTRY MOVE TO PROTECT<br />

THE VITAL “TELEPHONE BOOK” THAT LOOKS UP THE IP<br />

ADDRESSES OF WEBSITES.<br />

BY PETER BUXBAUM<br />

MIT CORRESPONDENT<br />

BUXBAUMP@<strong>KMI</strong>MEDIAGROUP.COM<br />

A new mandate for defense and other<br />

federal agencies is focusing attention on the<br />

security of the Internet’s Domain Name System<br />

(DNS)—the vital “telephone book” that<br />

looks up the IP addresses of Websites.<br />

The DNS was compromised last year by<br />

a “cache poisoning attack” in which someone<br />

with permission to interact with a DNS<br />

server succeeded in modifying the answers<br />

DNS provided for lookups of a domain name.<br />

The result was that lookup requests were<br />

directed to the attacker’s site rather than the<br />

legitimate site.<br />

These kinds of attacks are<br />

perpetrated by criminals who<br />

lure Internet users to fake<br />

sites where they can harvest<br />

credentials for illicit use on<br />

the real sites. Cyberwarfare is<br />

also a known venue for DNSrelated<br />

threats, and hackers<br />

have launched denial-of-service<br />

attacks against DNS servers.<br />

“The consequences of<br />

a successful cache-poisoning<br />

attack on DNS servers<br />

are so dire that describing<br />

them inevitably sounds like<br />

hyperbole,” commented<br />

Cricket Liu, vice president<br />

of architecture at Infoblox,<br />

a provider of DNS appliances.<br />

“Virtually every nontrivial<br />

transaction that takes<br />

place on the Internet relies<br />

on DNS, so in a real sense,<br />

30 | MIT 13.8<br />

Cricket Liu<br />

Victor Larson<br />

widespread vulnerability to cache poisoning<br />

means the end of trust on the Internet.”<br />

“DNS is a hierarchical system with many<br />

redundant servers,” explained Victor Larson,<br />

director of research and development at<br />

VirnetX, a provider of Internet security technologies.<br />

DNS also features caching servers<br />

to provide massive scale and redundancy for<br />

the critical service of responding to requests<br />

for name lookups.<br />

Root DNS servers provide information<br />

on global top level domains (gTLDs) such<br />

as .com, .net, .org, .gov, and .mil. The DNS<br />

servers for a gTLD provide<br />

information on servers for the<br />

next level of domain names.<br />

For example, a .mil server provides<br />

information on where<br />

a server exists with information<br />

on darpa.mil. The owner<br />

of darpa.mil provides a server<br />

with name lookups in that<br />

domain and, optionally, for<br />

additional name servers for its<br />

subdomains.<br />

“The reality today is that<br />

all these names in all those<br />

databases are kept in an unsecure,<br />

unencrypted manner,”<br />

said Ram Mohan, executive<br />

vice president and chief technology<br />

officer at Afilias USA, a<br />

provider of Internet infrastructure<br />

solutions.<br />

That means that traditional<br />

network security mechanisms<br />

are of no avail when it comes<br />

to compromises of DNS. “You can put in a<br />

firewall or a packet inspector at the server<br />

level, and it wouldn’t mean anything because<br />

you never get to the site in the first place<br />

because DNS lied,” noted Joe Gersch, chief<br />

operating officer of Secure64 Software. “What<br />

is the point of putting in that kind of security<br />

if the basic addressing mechanism fails you?”<br />

SECURITY EXTENSIONS<br />

There is a solution, however, called<br />

Domain Name System Security Extensions<br />

(DNSSEC). The Department of Defense and<br />

the rest of the federal government have been<br />

in the process of implementing DNSSEC<br />

in the months leading up to a September<br />

30 deadline to secure the top level of their<br />

domain hierarchies. Worldwide, only a few<br />

thousand of the many millions of existing<br />

Websites have thus far been secured with<br />

DNSSEC, according to Mohan.<br />

“Experts agree that the best long-term<br />

approach for fixing the DNS system is to<br />

get a cryptographic solution like DNSSEC<br />

deployed,” said Larson. “In order for DNS-<br />

SEC to provide complete protection of the<br />

transactions at all server levels, they need to<br />

be signed using DNSSEC.”<br />

DNSSEC is a protocol for DNS security<br />

extensions that provides a special cryptographic<br />

element to ensure that DNS traffic<br />

does not get hijacked. When an Internet user<br />

requests a particular entry in the global<br />

directory, the server first checks whether<br />

the requester has the correct key to open<br />

the lock for that particular record. If not,<br />

www.MIT-kmi.com


the system does not provide<br />

an answer.<br />

“It is a fairly straightforward<br />

mechanism,” explained<br />

Gersch. “DNSSEC uses digital<br />

cryptographic techniques to<br />

create a digital signature. It<br />

compares the signature to the<br />

data sent. If it looks good, it<br />

will let the data through to the<br />

user’s computer. If the server<br />

gets a bogus response, it will<br />

come back and tell the user it<br />

can’t access the site because<br />

the signatures don’t match.”<br />

DNSSEC is designed so<br />

that a key for a domain is<br />

signed by the next level up the<br />

chain. For example, if disa.<br />

mil has a key for signing its<br />

names, that key is signed by<br />

.mil, and .mil’s key is signed<br />

by the Internet root.<br />

“However, since DNSSEC deployment<br />

at all levels is going slowly,” Larson noted,<br />

“DNSSEC can optionally be set up so that<br />

Ram Mohan<br />

Joe Gersch<br />

lower level domains can provide<br />

DNSSEC integrity without<br />

the higher level domains<br />

being DNSSEC compliant.”<br />

DNSSEC was originally<br />

designed in the 1990s as an<br />

approach to protect DNS<br />

information using public<br />

key infrastructure. “It has<br />

been an overnight sensation<br />

15 years in the making,”<br />

quipped Mohan. “DNSSEC<br />

was created by the Internet<br />

Engineering Task Force, a<br />

global standards body. The<br />

original idea was the DNS<br />

trusted everybody. But by the<br />

mid-1990s it became apparent<br />

that the old model was<br />

breaking because bad actors<br />

will try to exploit the inherent<br />

trust built into the DNS<br />

architecture.”<br />

A year and half ago, the standards were<br />

finally agreed to and ratified. Afilias was one<br />

of the first companies to convert to those<br />

standards. In June 2009, Afilias deployed<br />

DNSSEC to the .org domain, the world’s<br />

largest.<br />

“DNSSEC is important because once you<br />

click on a link, you want to be absolutely sure<br />

you will get there,” said Mohan. “If that does<br />

not happen you can get hijacked somewhere<br />

else. But a domain name that is signed with<br />

a secure key will guarantee that you will get<br />

where you said you want to go 100 percent<br />

of the time.”<br />

IMPLEMENTATION TEAM<br />

The Defense Information Systems Agency<br />

(DISA) is one of the focal points within DoD<br />

for the implementation of DNSSEC. The<br />

DoD plan calls for a phased implementation<br />

of DNSSEC from the top down, based on<br />

guidance issued by the Office of the Secretary<br />

of Defense, the Joint Task Force for Global<br />

<strong>Network</strong> Operations (JTF-GNO), a unit of U.S.<br />

Strategic Command, and the National Institute<br />

of Standards and Technology (NIST).<br />

“Responsibility for implementation is<br />

shared across DoD,” said Fred Kopp, division<br />

www.MIT-kmi.com MIT 13.8 | 31


chief of the Program Executive Office Mission<br />

Assurance within DISA’s Computer <strong>Network</strong><br />

Defense branch. “We are one member of the<br />

team in implementing DNSSEC for defense<br />

agencies and coordinating planning and<br />

actions necessary to execute implementation<br />

across the federal community.”<br />

The required September 30 implementation<br />

is for the top level domain only, Kopp<br />

noted, with the second level due by a date<br />

yet to be determined. In an interview this<br />

summer, Kopp predicted that DoD would<br />

meet the deadline for deploying DNSSEC at<br />

the .mil level. “We are proceeding with that<br />

implementation within DISA and are working<br />

with the services as well,” he said.<br />

The phased approach to the implementation<br />

of DNSSEC means that DoD will start<br />

applying the security extensions to the .mil<br />

domain and then proceed to army.mil, navy.<br />

mil, af.mil, and so on, and then to their subdomains.<br />

“We’ll be working our way through<br />

the hierarchy one level at a time,” said Kurt<br />

Biernick, the lead government engineer at<br />

DISA’s Computer <strong>Network</strong> Defense Branch.<br />

A program to ensure the secure availability<br />

of Websites to the population of authorized<br />

users requires three steps, according<br />

to Mohan. “First, add DNSSEC encryption<br />

to domain names—both Internet Websites<br />

as well as those domains running internally<br />

on private networks,” he said. “Second,<br />

upgrade the DNS hosting system in such a<br />

way as to provide a secure response to DNS-<br />

SEC request. Third, work with technology<br />

providers to ensure that domain names with<br />

the DNSSEC key are widely available and<br />

propagated on machines around the world<br />

so that one or more sets of attacks on the<br />

infrastructure cannot take them down.”<br />

Gersch said he has been working with<br />

NIST to train and educate large numbers<br />

of government departments and personnel<br />

on how to make DNSSEC work. “There has<br />

been a huge educational effort in the last<br />

number of years among the many departments,<br />

agencies and bureaus on procedures<br />

and best practices,” he said. “Now they are<br />

starting with their deployment efforts.”<br />

DISA has reviewed some commercially<br />

available automated tools to help DoD<br />

with configuration management and the<br />

implementation of the DNSSEC protocol<br />

extensions. “Part of what is difficult in the<br />

implementation of DNSSEC is in deciding<br />

on the cryptographic keys as well as<br />

maintaining and modifying them,” said<br />

Kopp. “Manipulation of the keys is one of<br />

the areas in which industry has to provide<br />

32 | MIT 13.8<br />

tools to help make this a manageable<br />

process. Different keys have to be assigned<br />

to different network zones, and they must<br />

be changed periodically in order to maintain<br />

security when data is transferred from one<br />

portion of the network to another.”<br />

All of this is complex and requires expertise,<br />

Gersch said, adding, “It can be a pain in<br />

the neck if your staff turns over and you lose<br />

the recipe.” It can be a major undertaking, in<br />

other words, to be periodically reassigning<br />

keys to the various network zones.<br />

AUTOMATED ASSIGNMENT<br />

Secure64 provides a technology aimed at<br />

alleviating two of the major challenges associated<br />

with maintaining DNSSEC standards:<br />

automating the assignment and reassignment<br />

of keys and securing the cryptography<br />

associated with them.<br />

“You want to prevent someone from<br />

stealing the cryptographic keys,” said Gersch.<br />

“In our solution the keys are locked tight in<br />

a cryptographic module. You can issue a single<br />

command, ‘Do DNSSEC,’ instead of an<br />

operator manually doing and redoing each<br />

zone. Implementing DNSSEC operations<br />

can be as simple as adding a single statement<br />

to the system configuration file.”<br />

The Secure64 product, known as<br />

Secure64 DNS Signer, rests on three enabling<br />

technologies: the SourceT micro operating<br />

system, the Secure64 DNS Authority<br />

server, and a hardware trusted platform<br />

module (TPM) device. The SourceT micro<br />

operating system was designed by Secure64<br />

to be immune to malware and rootkits—<br />

programs designed to hide the fact that a<br />

system has been compromised.<br />

“Rather than relying on a general-purpose<br />

operating system that must be hardened,”<br />

Gersch said, “SourceT is designed<br />

specifically for security and performance.”<br />

The Secure64 DNS Authority server is<br />

a dedicated authoritative DNS name server<br />

that runs on the HP Integrity rx2660 hardware<br />

platform. The TPM executes secure<br />

cryptographic functions, including seeding<br />

the random number generator and<br />

generating a storage root key unique for<br />

each machine to protect subkeys and other<br />

encryption material.<br />

VirnetX takes a somewhat different<br />

approach. The VirnetX Gabriel product<br />

focuses on securing private and semi-private<br />

destinations on the Internet. “DNSSEC provides<br />

good security for large public and<br />

portal sites,” said Larson. “VirnetX Gabriel<br />

secure name services provide a unified<br />

approach for providing DNS services to<br />

authenticated users where the response is<br />

dependent on the identity of the requester<br />

so your network location is only available to<br />

those that you want to reach you. One very<br />

useful attribute of the Gabriel design is that<br />

it is much harder for an attacker to attack<br />

what it cannot find.”<br />

The second major feature of Gabriel<br />

secure name services is that following the<br />

secure lookup of DNS information, it automatically<br />

forms a secure connection with<br />

the requested name, and provides services<br />

for this secure connection even if both parties<br />

are not directly on the Internet.<br />

A third Gabriel feature, secure name<br />

services, provides support for dynamic<br />

addresses. “Legacy DNS fundamentally has<br />

a ‘pull’ architecture,” said Larson. “You can<br />

force legacy DNS to support dynamic IP<br />

addresses, but legacy DNS wasn’t designed<br />

particularly well to handle them. VirnetX<br />

Gabriel secure name services has a ‘push’<br />

architecture, where changes in information<br />

are pushed when they occur.”<br />

While the currently conceived timelines<br />

for implementing DNSSEC are achievable<br />

by DoD, as yet there is no specific timeline<br />

for implementing DNSSEC across the entire<br />

DoD network infrastructure, Kopp noted.<br />

The department will be looking to implement<br />

automated tools, he added, especially<br />

as the deployment proceeds down the network<br />

hierarchy.<br />

“We believe that the way we are attacking<br />

the problem is the way to go,” he said,<br />

“in terms of identifying mechanisms, tools<br />

and processes to try to make it easier for<br />

those who need to do this and also to avail<br />

training to them to provide an understanding<br />

of DNSSEC and to keep the learning<br />

curve up.<br />

“Deploying DNSSEC will make it much<br />

more difficult to hijack traffic meant for<br />

government domains,” Kopp added. “It will<br />

make our services more secure.”<br />

Infoblox also supports DNSSEC in its<br />

line of purpose-built, security-hardened<br />

appliances for secure, highly reliable and<br />

manageable DNS services, among others.<br />

The latest shipping version of Infoblox<br />

NIOS software has built-in support for<br />

DNSSEC. ✯<br />

Contact Editor Harrison Donnelly at<br />

harrisond@kmimediagroup.com.<br />

For more information related to this subject,<br />

search our archives at www.MIT-kmi.com.<br />

www.MIT-kmi.com


It’s your job to protect<br />

others, so missing a beat<br />

is not an option.<br />

Nextel Direct Connect ®<br />

makes sure your entire team can be mobilized in<br />

under a second. And in a fi eld like this, that second<br />

makes all the difference. Nextel Direct Connect. Only<br />

on the Now <strong>Network</strong>. 1-800-NEXTEL-9 sprint.com/nextel<br />

BlackBerry ® Curve 8350i<br />

Direct Connect: Nextel and PowerSource devices operate on the Nextel National <strong>Network</strong>. International Direct Connect not included. Other Terms: “Fastest” claim based on initial call setup time. Coverage not available everywhere. The Nextel National <strong>Network</strong> reaches over 274<br />

million people. ©2009 Sprint. Sprint and the logo are trademarks of Sprint. Other marks are the property of their respective owners.


Information technology vendors providing software as a service<br />

(SaaS) are attracting growing revenues, as well as increasing interest<br />

from military organizations such as the Defense Information Systems<br />

Agency (DISA) and the Air Force Personnel Center.<br />

The fact that the SaaS market is expanding demonstrates two<br />

things, analysts say—that SaaS is a concept that has begun to catch<br />

on, and that IT buyers are attracted by its value proposition. At the<br />

same time, studies also make clear that SaaS is still attracting only a<br />

small sliver of total IT dollars.<br />

SaaS, like the broader and related concept of cloud computing,<br />

posits that users can access and run software applications—from<br />

enterprise resource planning to customer relationship management<br />

and even network security applications—remotely over the network,<br />

from someone else’s shared infrastructure. The same applies, under<br />

the umbrella of cloud computing, to other IT operations, such as database<br />

management and data storage.<br />

Organizations accessing applications from a remote, shared infrastructure<br />

enjoy some obvious advantages. They don’t have to invest<br />

in their own hardware to run the application nor devote IT resources<br />

to hiring personnel to manage it. The software is updated automatically<br />

and remotely by the service provider. The overall costs of such<br />

an arrangement are much lower than in a traditional, on-premise<br />

software implementation.<br />

On the other hand, using a remote infrastructure shared by other<br />

users presents some problems. The ability to customize software is<br />

gone. More important are the security questions: What assurances<br />

are there that an organization’s proprietary data will not be compromised?<br />

These security considerations apply all the more in the military<br />

environment, where organizations are legally obligated under statutes<br />

and regulations, to say nothing of national security considerations,<br />

to lock down their systems and data. For example, military networks<br />

must comply with the requirements of the Federal Information System<br />

Management Act and National Institute of Standards and Technology<br />

guidelines on data encryption and must receive certification and<br />

accreditation before they can go live.<br />

SECURITY OBSTACLES<br />

These security considerations represent a major obstacle to the<br />

adoption of a SaaS model in both the commercial and government<br />

34 | MIT 13.8<br />

Servings<br />

Software of<br />

AS SOFTWARE SOOFTWARE<br />

AS A SERVICE POPULARITY<br />

GROWS, OWS PROVIDERS TAKE INNOVATIVE STEPS TO<br />

ADDRESS THE MILITARY’S SECURITY CONCERNS.<br />

BY PETER BUXBAUM<br />

S, , PROVIDERS TAKE INNOVATIVE STEPS TO<br />

MIT MI MIT CORRESPONDENT<br />

CO CORR RRES ES E PO POND ND NDEN ENT<br />

BUXBAUMP@<strong>KMI</strong>MEDIAGROUP.COM<br />

BY PET ET E ER BUX B UX UXBA BA B UM<br />

MI MIT CO CORR RRES ES E PO P ND NDEN EN ENT<br />

marketplaces. If SaaS has been a hard sell in the commercial world,<br />

it has been that much harder within the U.S. government and military.<br />

Some inroads have been made, however, and SaaS providers<br />

have taken some innovative approaches to address the U.S. military’s<br />

security requirements.<br />

“Cloud computing and SaaS provide a way to spill over from<br />

your resources and take advantage of the infrastructure provided<br />

by a professionally managed service,” said Manoj Apte, director of<br />

product management at Zscaler, an SaaS provider of Web security.<br />

“It turns IT from a cottage industry, where people have to manage<br />

every piece of a critical application themselves, to having professionals<br />

take care of the application for you.”<br />

SaaS allows organizations to rapidly launch applications, limit<br />

their financial exposure, and inexpensively update software. “There<br />

are lower upfront costs with SaaS,” said Donita Prakash, a marketing<br />

director with Acumen Solutions, a business and technology<br />

consulting firm. “You don’t have to build the infrastructure to run<br />

the application or hire the staff to manage it. You can run a pilot<br />

and, if it fails, you can simply turn it off and stop paying. That limits<br />

an organization’s financial exposure.”<br />

“New innovations come much more rapidly with SaaS,” added<br />

Rick Collison, director and solution owner at Ariba Services, a<br />

provider of automated procurement solutions. “The typical SaaS<br />

upgrade cycle is every six months. Upgrades are free and are<br />

included in the subscription price. With the traditional model it<br />

may take two or three years to get new features. With SaaS, you’re<br />

guaranteed the latest and greatest.”<br />

SaaS can also provide organizations with flexibility in allocating<br />

and paying for IT resources. “With traditional software implementations,<br />

organizations buy an enterprise license even though they<br />

don’t know how many seats they really need,” said Kevin Paschuck,<br />

vice president for public sector business at RightNow Technologies,<br />

a provider of customer relationship management software. “With<br />

SaaS, an organization can pay for 100 seats initially and if in a year<br />

from now they need another 50, they can order them and pay for<br />

them then.”<br />

“Some organizations have variable or seasonal requirements,”<br />

noted Vincent Spies, chief technology officer at Voltage Security, a<br />

provider of secure e-mail solutions. “SaaS can be dynamically provisioned<br />

to handle extreme requirements without having to build<br />

additional capacity within your organization.”<br />

www.MIT-kmi.com


For potential military SaaS customers, the secu-<br />

“Defense organizations shy away from it,” sad Apte.<br />

rity issue can be summed up in one word: control.<br />

“When you go into a shared infrastructure there is<br />

“It is the biggest challenge the software community<br />

always the possibility of some sort of leak.”<br />

faces,” said sai Spies. “It takes a fundamentally different<br />

view where wher data is. Before, you could physically guard<br />

the locatio locati location where data is stored. Now it is stored in a<br />

ISOLATED CLOUDS<br />

place that thatt<br />

people don’t understand anymore.”<br />

In response to these concerns, Zscaler developed<br />

“Military “Militta<br />

users like the idea of a commercial offer-<br />

the capability to create small isolated clouds that can<br />

ing,” confirmed connf<br />

Apte, “but not the idea of sharing<br />

be dedicated to military organizations. Zscaler pro-<br />

infrastructure infrastruc ct such as data centers.”<br />

BEHIND THE FIREWALL<br />

Manoj Apte<br />

vides Web security applications that scan requested<br />

Websites and block access to those that are potentially<br />

dangerous, and maintains separate log management<br />

and policy management for these separate,<br />

RightNow RighttN<br />

Technologies set out a year and a<br />

dedicated clouds. On the other hand, Apte noted,<br />

half ago to tto<br />

overcome the security objections among<br />

when new threat data becomes available, the entire<br />

potential t ti l military SaaS customers. “They need to<br />

cloud infrastructure, including the isolated military<br />

know their data is secure,” said Paschuck. “Some<br />

clouds, is automatically updated.<br />

systems need to run on a dot-mil network.”<br />

“It runs like a one-way street,” he said. “If we see a<br />

The answer for RightNow was to partner with<br />

threat evolving we notify the whole cloud about it and<br />

DISA to run its SaaS offering behind the Department<br />

proactively block access. But nothing inside comes<br />

of Defense firewall. “We fit our platform right on top<br />

out. The ability to create an isolated cloud makes it<br />

of DISA’s,” said Paschuck. “It takes the software out<br />

of the commercial environment, where it might be<br />

Rick Collison<br />

possible for military organizations to look at SaaS<br />

and cloud computing as a feasible way to run some of<br />

sitting next to Nike’s or Best Buy’s or Sony’s and<br />

their IT operations.”<br />

would create a whole bunch of issues as far as FISMA<br />

Apte also argued that the type of application<br />

is concerned.”<br />

Zscaler provides, blocking access to potentially dan-<br />

The Air Force Personnel Center is planning on<br />

gerous Web content, is more appropriately handled<br />

going live with a self-service personnel Website based<br />

outside the military firewall, adding an additional<br />

on RightNow’s SaaS offering later this year. “It is risky,<br />

layer of security to the most sensitive and critical<br />

and that is why this has been a project that we’ve been<br />

systems.<br />

looking at for the past two years,” said Colonel Glenn<br />

The same argument applies with respect to the<br />

Rotelle, the center’s IT director. “We had to overcome<br />

provision of public key infrastructure (PKI) access<br />

a lot of security challenges.”<br />

authentication, according to Terence Spies of Voltage<br />

Rotelle was convinced that AFPC should no longer<br />

own and host its own Website, even though “we were<br />

Donita Prakash<br />

Security. PKI safeguards sensitive data by ensuring<br />

the authentication of the identities of application<br />

very good at it,” because that “was not the way indus-<br />

users.<br />

try was going.” The key SaaS benefits, for Rotelle,<br />

“The military has a large PKI that allows them<br />

were guaranteed Website uptime of over 99 percent<br />

to send secure messages within its own system,” said<br />

and automatic failover of the system to an alternate<br />

Spies. “But in situations such as homeland security<br />

side if DISA’s primary hosting site in Oklahoma City<br />

operations, military units may want to send secure<br />

were compromised.<br />

messages to local police or fire department personnel,<br />

“That is critical to us because of all of the services<br />

but those people are not on the military PKI.”<br />

that we provide our airmen,” said Rotelle. “The Web-<br />

Voltage has performed trials with the U.S. milisite<br />

has to be up at all times so that they can perform<br />

tary and the U.S. and Canadian border patrols that<br />

their HR functions.”<br />

show that internal security applications are properly<br />

DISA is “going to be the facility that actually hosts<br />

the Web servers,” he added. “They’ll make sure that<br />

Kevin Paschuck<br />

managed tightly within the confines of an organization,<br />

Spies said. But when cross-organizational inter-<br />

all the equipment is up and running. The software<br />

application will be RightNow. It’s a hardware/software<br />

kevin.paschuck@rightnow.com changes are needed, it is useful to outsource PKI.<br />

“This allows the military organization to exchange<br />

partnership between DISA and RightNow.”<br />

secure messages without having to enroll the non-military users on<br />

Apte noted that one challenge for SaaS providers is to “create the military PKI,” he said. “It all starts with your security model. If you<br />

applications in a totally different way.<br />

have a policy that says you only want members of your organization to<br />

“We know that thousands of organizations are going to be using have access to data or an application, you should have an internal key<br />

that infrastructure,” he explained. “We needed to figure out how to management system. But if your model is to exchange data then SaaS<br />

make sure we get economies of scale without allowing data to inter- can work pretty well.”<br />

mingle. This has become the challenge for all cloud providers.”<br />

The key elements to making such an arrangement work, Spies<br />

At the same time, Apte acknowledged that the security added, is to employ a trusted, auditable third party who understands<br />

considerations involved in moving to a professionally managed the separation of duties involved with the internal and external secu-<br />

service within a commercial environment can be overwhelming. rity mechanisms. “There are also a lot of regulations to be complied<br />

www.MIT-kmi.com MIT 13.8 | 35


with,” he said. “A number of service organizations have earned regulatory<br />

compliance certificates to perform these kinds of operations.”<br />

VALUE PROPOSITION<br />

In the case of commercial SaaS offerings, users share a common<br />

infrastructure that contributes to the SaaS value proposition,<br />

a reduction in the total cost of ownership, according to Paschuck,<br />

of some 80 percent when compared to a traditional, on-premise<br />

software implementation.<br />

Apte argued that the SaaS value proposition holds true for the<br />

kind of isolated cloud infrastructure that Zscaler has developed.<br />

“As long as it has been architected properly, it doesn’t take away<br />

from the value of SaaS,” he said. “The value is in the ability to spill<br />

over into the cloud infrastructure and to be able to scale at the rate<br />

required without having to add hardware and software inside of your<br />

network. The hybrid model that we have devised gives the opportunity<br />

to organizations to take advantage of this evolving mechanism.<br />

The cost savings are comparable.”<br />

But Paschuck said that the kind of SaaS partnership that Right-<br />

Now has forged with DISA, which is operated on military hardware<br />

inside the DoD firewall, shaves 50 percent off the cost savings of<br />

a comparable commercial, shared-infrastructure implementation.<br />

“They are still saving 40 percent on costs, and they also have the<br />

same speed of implementation as for a commercial installation,”<br />

he said.<br />

<strong>KMI</strong> <strong>Media</strong> <strong>Group</strong><br />

is seeking a full-time<br />

MAGAZINE<br />

EDITOR<br />

RESPONSIBILITIES RE RESP SPON ONSI SIBI BILI LITIES ES INCLUDE:<br />

•<br />

•<br />

•<br />

•<br />

•<br />

Developing and producing multiple<br />

magazine titles<br />

Planning the editorial calendars<br />

Writing and assigning articles<br />

Working with public affairs officers,<br />

writers & others in defense industry<br />

Representing company at trade shows and<br />

conferences<br />

QUALIFICATIONS:<br />

•<br />

•<br />

Background in or strong knowledge<br />

of military affairs & technology<br />

Journalism/English degree preferred<br />

but not required<br />

SALARY AND BENEFITS:<br />

•<br />

•<br />

Salary commensurate with experience<br />

Health insurance and vacation<br />

CONTACT: jeffm@kmimediagroup.com<br />

36 | MIT 13.8<br />

“DISA has set up a private DoD cloud based on our architecture,”<br />

Paschuck added. “All of the hardware bought and installed<br />

has been according to NIST and FISMA guidelines. If they wanted<br />

to run the software in a commercial facility they could have avoided<br />

those costs, but that is not good enough for most DoD customers,<br />

especially those running mission critical, personnel or financial<br />

applications.”<br />

For all of the obstacles facing SaaS, Paschuck has noticed that<br />

“once people get educated, their reluctance to adopt this model goes<br />

down tremendously. Ten years from now, I doubt that any application<br />

on military systems, outside of weapons and intelligence systems,<br />

will not be in some form of cloud computing,” he said.<br />

Prakash was even more optimistic, saying that “in the next five<br />

years most commercial and government applications will be moving<br />

to the cloud.”<br />

But Apte added, “I don’t see the military adopting cloud computing<br />

for commercial data centers any time soon.”<br />

There are, however, reasons to believe that SaaS and cloud computing<br />

will grow among military users in coming years. Spies said<br />

that the concept of proof of retrievability, which is currently being<br />

developed, will provide assurances that encrypted data being stored<br />

in the cloud can be retrieved. “If I give my data to the cloud I need<br />

a way to make sure the service keeps all the data and allows it to be<br />

retrieved,” he said.<br />

Advances in “searchable encryption,” which allows authorized<br />

users to search encrypted, cloud-stored data, will also be important<br />

in encouraging users to move data to the cloud, according to Spies.<br />

“This is important to doing productive research,” he said. “By making<br />

data more secure, users can be provided with more functionality.”<br />

Apte sees SaaS growth in the increasing popularity, especially<br />

among young people in the armed services, of social networking,<br />

so-called Web 2.0, content such as YouTube, Facebook, and Myspace.<br />

“In the past, networks could secure themselves against vulnerabilities<br />

simply by denying access to those kinds of sites,” he said. “But as<br />

these sites become more popular, that approach is going to become<br />

more difficult. The more restrictions are placed in accessing them,<br />

the more ways will be found around them, and that increases risk. I<br />

believe the military will have to allow access to Web 2.0 sites while<br />

applying a security layer to them to mitigate risk.”<br />

That security layer, in turn, Apte believes, will be supplied<br />

increasingly by SaaS providers.<br />

All of which present enormous challenges to SaaS vendors.<br />

“SaaS is about managing success,” said Collison. “Traditional software<br />

implementations are project-oriented. An organization needs a<br />

fix. The vendor and consultants implement software to try and solve<br />

the problem and then go on their way.<br />

“SaaS has a different idea of success, which is tied to renewals,”<br />

he continued. “A vendor’s revenue stream is dependent on the<br />

customer’s success at every phase and milestone and on a continual<br />

basis. That means vendors must get much more involved with projects,<br />

whether that involves providing project management expertise<br />

or discussing security certifications. They need to be involved every<br />

step along the way to earn the renewal and the future business.” ✯<br />

Contact Editor Harrison Donnelly at harrisond@kmimediagroup.com.<br />

For more information related to this subject, search our archives at<br />

www.MIT-kmi.com.<br />

www.MIT-kmi.com


Outcome-Based Metrics BY<br />

In late May, President Obama announced<br />

his intention to appoint a cybersecurity czar<br />

whose mission is to safeguard our national<br />

technology infrastructure. His announcement<br />

coincided with the release of a review of the U.S.<br />

federal government’s cybersecurity efforts and<br />

initiatives.<br />

While there has been significant speculation<br />

about what the czar would do, to whom he or<br />

she would report, and what level of authority the<br />

position would hold, there’s been little discussion<br />

about the effects of such a position on the<br />

structure and operations of the federal government’s<br />

security apparatus.<br />

To be effective, comprehensive cyber-initiatives will require<br />

wholesale change management efforts across the federal government<br />

and transformation at virtually every level of the various agencies<br />

and departments. The government must assess and address such<br />

components as security metrics, service delivery models, changes to<br />

procurement for trusted supply chain support, governance models<br />

and a host of other operational processes to ensure that they advance<br />

and support cybersecurity efforts.<br />

Perhaps most important, though, it’s vital that the government<br />

develop processes by which to measure performance and outcomes<br />

associated with its cybersecurity efforts. Organizations must ask what<br />

is important for risk mitigation and programmatic success in combating<br />

threats to the enterprise. This goes beyond the mere tracking of<br />

dollars spent to include measuring the effectiveness of those dollars in<br />

meeting defined outcomes for security operations.<br />

For instance, counting the number of firewalls installed and the<br />

funds to purchase them does not reflect the true effectiveness in preventing<br />

cyberterrorists from entering the network. Agencies should<br />

envision the key measurement outcomes they desire and “reverse<br />

plan” those events, milestones and details that will lead them to<br />

achieving cybersecurity success.<br />

Establishing metrics that weigh performance and outcomes isn’t<br />

just about counting things. For example, the level of penetration of<br />

a cybersecurity event is important, but level assignments tell a more<br />

meaningful story. Categorizing incidents by their depth of impact to<br />

the organization’s infrastructure and domain can help yield policy<br />

changes, show where investments are necessary, and uncover opportunities<br />

for training.<br />

MORE MEANINGFUL ANALYSIS<br />

Metrics within the security operations center or computer incident<br />

response communities that could help provide more meaningful<br />

analysis and enhanced cybersecurity include:<br />

•<br />

Measuring the effectiveness of security monitoring policy. Data<br />

flow and the network behaviors become increasingly important as<br />

we look for indicators to populate the needed metrics. In simplest<br />

terms, for instance, this means reconciling the average volume of<br />

•<br />

•<br />

SCOTT CHARBO<br />

IT IS VITAL THAT THE GOVERNMENT DEVELOP PROCESSES BY WHICH TO MEASURE PERFORMANCE AND OUTCOMES<br />

ASSOCIATED WITH ITS CYBERSECURITY EFFORTS.<br />

traffic through the trusted Internet connection,<br />

or TIC, divided by the average volume of<br />

traffic through other agency gateways. The<br />

result is a more comprehensive view of the<br />

cyber landscape and can serve as an indicator<br />

both for program success and adversaries’<br />

interest.<br />

• Measuring the effectiveness and efficiency<br />

of security monitoring services delivery.<br />

This metric speaks mostly to establishing a<br />

percentage of false positives and could be<br />

accomplished via analysis of false positives<br />

alerts issued to an agency divided by the total<br />

number of agency alerts created over the last<br />

30 days. It’s also important to track the percentage of non-actionable<br />

alerts—or the number of alerts issued to an agency that the<br />

agency cannot verify, divided by the total number of alerts created<br />

over the last 30 days.<br />

Other key components of this metrics category include tracking<br />

the percentage of targeted incidents reported to the U.S. Computer<br />

Emergency Response Team (US-CERT) and weighing them<br />

against the number that US-CERT’s Einstein program did not<br />

detect, and recording sensors’ uptime percentage.<br />

Measuring business or mission impact of security monitoring<br />

activities and events. This metric considers total confirmed incident<br />

reports and alerts discovered or reported over the last 30<br />

days that are not false positives and are actionable. Further categorizing<br />

these alerts in stages helps address them in a more<br />

timely and effective manner. For example, “stage one” alerts<br />

would be phishing e-mails and/or users visiting compromised<br />

Websites. Stage two would address Trojan or malware downloading<br />

after an initial infection. And stage three would cover command<br />

and control traffic.<br />

While there are still many unknown details about Obama’s cybersecurity<br />

plans, it is encouraging that his administration is committed<br />

to protecting our national computer systems. But to be truly effective,<br />

the new cyberczar must move beyond traditional performance<br />

measurements and embrace a paradigm shift toward outcomes-based<br />

metrics. This, combined with an understanding of cybergovernance<br />

in a global borderless context, will go a long way toward meeting this<br />

administration’s strategic vision for<br />

cybersecurity. ✯<br />

Scott Charbo<br />

Scott Charbo, Accenture U.S.<br />

Federal’s director of cybersecurity, is<br />

former deputy undersecretary of the<br />

National Protection and Programs<br />

Directorate, where he managed<br />

the Cyber Security Initiative at the<br />

Department of Homeland Security,<br />

and former chief information officer<br />

at DHS.<br />

www.MIT-kmi.com MIT 13.8 | 37


<strong>Network</strong>-Centric<br />

Consensus<br />

INDUSTRY CONSORTIUM FOSTERS<br />

COMMON EFFORTS TO ACHIEVE<br />

INTEROPERABILITY AMONG ESSENTIAL<br />

GLOBAL MILITARY AND CIVIL FORCES.<br />

Established in 2004,<br />

the <strong>Network</strong> Centric Operations<br />

Industry Consortium<br />

(NCOIC) is a global notfor-profit<br />

association dedicated<br />

to the advancement of<br />

network-centric operations<br />

(NCO) and the benefits of<br />

interoperability that NCO<br />

can deliver to governments,<br />

non-governmental organizations<br />

and the citizens they<br />

serve.<br />

The more than 90 members of NCOIC<br />

include 1,900 people from 19 nations. They<br />

represent large and small defense companies,<br />

system integrators, information technology<br />

and service providers, government agencies<br />

and academic institutions. Although many<br />

38 | MIT 13.8<br />

Nicolas Berthet<br />

nicolas.berthet@ncoic.org<br />

member companies are traditional<br />

marketplace competitors,<br />

they dedicate more<br />

than 1,000 technical experts<br />

to NCOIC’s quest for interoperability.<br />

Their work is the<br />

engine of the organization’s<br />

achievement.<br />

“NCOIC’s delicate<br />

alchemy fosters true collaboration<br />

among global<br />

companies that are often<br />

fierce business competitors,”<br />

according to Nicolas Berthet of Thales<br />

<strong>Group</strong>, who chairs NCOIC’s Technical<br />

Council. “Their efforts to resolve customers’<br />

interoperability issues recently resulted in<br />

the publication of NCOIC’s Interoperability<br />

Framework, a set of guiding principles for<br />

•<br />

•<br />

•<br />

•<br />

•<br />

•<br />

NCOIC Goals<br />

Increase interoperability within<br />

and among systems involved in<br />

interagency and multinational<br />

operations.<br />

Lower development costs and<br />

increase design commonality in<br />

future systems; apply tailored<br />

standards and best practices.<br />

Improve application readiness<br />

through more rapid fielding of<br />

network-centric systems;<br />

leverage technical lessons<br />

learned.<br />

Reduce systems cost and<br />

sustainability through reuse and<br />

commonality; facilitate ease of<br />

integration; upgrade and support<br />

network-centric environment.<br />

Reduce development risk by<br />

identifying the common<br />

components needed for the<br />

network-centric environment, and<br />

develop them where none exist.<br />

Improve application effectiveness<br />

through new, more focused<br />

development on domain-specific<br />

capabilities.<br />

www.MIT-kmi.com


developers of network-centric systems,<br />

products and services.”<br />

NCOIC’s deliverables—tools,<br />

frameworks, patterns and best<br />

practices—address customers’ key<br />

concerns and help them identify<br />

opportunities to:<br />

•<br />

•<br />

•<br />

Ensure that a new or emerging<br />

system will be interoperable<br />

with other systems;<br />

Determine how legacy systems<br />

can bridge the gap between<br />

current capability and a customer’s<br />

desired level of netcentricity;<br />

and<br />

Adapt systems to meet evolving<br />

mission requirements and to<br />

easily accept emerging technology.<br />

COLLABORATIVE ENVIRONMENT<br />

“People who operate in one market<br />

segment adopt a model about<br />

how the world works, and that can<br />

lead to a mental rut,” said Hans Polzer, a<br />

Lockheed Martin fellow and chair of NCO-<br />

IC’s <strong>Network</strong> Centric Attributes Functional<br />

Team. “NCOIC members come from many<br />

sectors and have opinions that don’t always<br />

agree with your own. Within the context of<br />

such a collaborative environment, diverse<br />

thinking can be a catalyst for innovation.”<br />

The path from innovation to consensus<br />

can be thorny. Yet in NCOIC’s unique, noncompetitive<br />

environment, member technologists<br />

do share their ideas, knowledge, best<br />

practices, and even intellectual property.<br />

They attack the technical challenges, evaluate<br />

alternatives and teach each other.<br />

Ultimately, they reach consensus and<br />

propose “voice of industry” recommendations<br />

that can leverage the power of network<br />

centricity to help customers achieve<br />

greater success in domains such as command,<br />

control and communications; maritime;<br />

aviation; cybersecurity; sense and<br />

respond logistics; and net-enabled emergency<br />

response.<br />

“Many people think that consensus leads<br />

to a lowest common denominator,” said<br />

Terry Morgan of Cisco, who serves as NCO-<br />

IC’s executive chairman. “In fact, NCOIC’s<br />

process frequently leads to agreements that<br />

are better than the piece parts of the dialog.<br />

This happens because a forum of talented,<br />

experienced and secure experts present and<br />

defend their ideas and propositions, knowing<br />

Hans Polzer<br />

hans.w.polzer@lmco.com<br />

Ken Cureton<br />

kenneth.l.cureton@ncoic.org<br />

Terry Morgan<br />

tmorgan@cisco.com<br />

Lt. <strong>Gen</strong>. Harry Raduege<br />

(Ret.)<br />

that the wisdom of talented and experienced<br />

collaborators can improve upon any idea.”<br />

“Where else can we learn how to operate<br />

better, faster and more securely?” asked Air<br />

Force Lieutenant <strong>Gen</strong>eral Harry Raduege<br />

(Ret.), now chairman of Deloitte’s Center<br />

for Cyber Innovation. “Where else can<br />

we see how other companies address the<br />

issues and collaborate on technology like<br />

service-oriented architectures, cloud computing<br />

and interoperability patterns? We<br />

are overwhelmed with opportunities in the<br />

way network-centric operations can shape<br />

the future.”<br />

Whether representing their own companies<br />

or the consortium, NCOIC leaders<br />

•<br />

•<br />

•<br />

hraduege@del.ittc.com<br />

NCOIC trains Australian defense<br />

force and industry officials; nation<br />

may be first to apply consortium’s<br />

net-centric tools to acquisition<br />

process.<br />

FAA and NCOIC take unique path to<br />

Next<strong>Gen</strong>; initiative represents<br />

pioneering effort by FAA.<br />

The U.S. Office of the Assistant<br />

Secretary of Defense for <strong>Network</strong>s<br />

and Information Integration and<br />

NCOIC collaborate to develop the<br />

time-phasing assessment of DoD<br />

net-centric attributes.<br />

advocate that net-centric systems can<br />

bring interoperability to allied and<br />

coalition forces. As a result, the U.S.<br />

government, several coalition governments<br />

and NATO have invited the<br />

NCOIC to prove the effectiveness of<br />

its tools and processes in military field<br />

exercises, demonstrations and training<br />

sessions.<br />

“They want to see for themselves<br />

how NCOIC’s deliverables work,” said<br />

Boeing’s Ken Cureton, vice chair of<br />

the consortium’s Technical Council.<br />

“They want answers to essential questions<br />

like how much NCO is enough<br />

for my mission, will our current plans<br />

get us there, how will I know when we<br />

are there, and what will it take to make<br />

us interoperable with others?”<br />

NCOIC listens to the needs of<br />

global defense departments and ministries<br />

of defense. Its deliverables are<br />

designed to help leaders determine<br />

the levels of network centricity they<br />

require to meet their unique national<br />

missions; provide the tools to diagnose<br />

current and planned systems’ capabilities;<br />

and assess whether the systems do or can<br />

meet their required performance levels. In<br />

this way it offers recommendations that<br />

can remove potential barriers to success.<br />

Agencies and governments have invited<br />

NCOIC to assess their strategies, concepts<br />

of operation and major programs with an<br />

eye toward their ability to support networkcentric<br />

operations and interoperability.<br />

ACQUISITION PROCESS<br />

One recent example of how NCOIC is<br />

helping customers achieve interoperability<br />

involves training military and industry<br />

Customer Collaboration<br />

•<br />

•<br />

•<br />

U.S. Defense Information Systems<br />

Agency and NCOIC develop<br />

Standards Management Framework<br />

and Reference Implementation<br />

Model, and also collaborate on IPv6<br />

work.<br />

NATO shares unclassified portion of<br />

its network enabled capability<br />

feasibility study report with NCOIC;<br />

the consortium evaluated<br />

operational concepts and<br />

requirements defined in the study.<br />

NCOIC leaders meet with Defense<br />

Science Board to exchange NCO<br />

visions and strategies.<br />

www.MIT-kmi.com MIT 13.8 | 39


officials in Australia, which may<br />

become the first country to apply<br />

the consortium’s net-centric<br />

tools to the military acquisition<br />

process.<br />

In May, at Australia’s Canberra<br />

Rapid Prototyping, Development<br />

and Evaluation facility, a<br />

team of NCOIC technical experts<br />

led officials from the Department<br />

of Defence and the Australian<br />

Defence Information and<br />

Electronic Systems Association<br />

(ADIESA) through a training session<br />

designed to show how NCO-<br />

IC’s interoperability tools might<br />

meet the country’s unique needs.<br />

Their discussions also centered<br />

on ways to apply the tools to<br />

Australia’s defense capability<br />

development and procurement<br />

processes.<br />

“The Australian Department<br />

of Defence is a keen supporter<br />

of NCOIC, its principles<br />

and tools,” said Air Commodore<br />

John McGarry. “During 2009 we<br />

aim to apply NCOIC products to<br />

the acquisition process to better<br />

define interoperability requirements and<br />

improve through-life systems integration<br />

prospects.”<br />

Although Australia’s population is relatively<br />

small (23 million people), it has the<br />

14th largest defense budget in the world.<br />

It employs military forces in 11 theaters<br />

overseas and at home to protect the country<br />

and its national interests. Australia is a<br />

middle power in global terms, meaning that<br />

it maintains complex relationships with<br />

close allies, coalition partners and regional<br />

nations.<br />

“Getting information across the ‘last<br />

mile’ has always been the toughest challenge,<br />

yet we must see to it that future<br />

forces can access information as if they were<br />

in the middle of the network, rather than on<br />

the edge,” said Brett Biddington, ADIESA<br />

chairman. “If we adopt globally accepted<br />

standards and tools, then we can begin to<br />

build all sorts of relationships—between<br />

Asian, European, American and other forces<br />

—because we will all have the same glue.”<br />

AIRSPACE TRANSFORMATION<br />

The consortium and the U.S. Federal<br />

Aviation Administration (FAA), meanwhile,<br />

are taking a unique path to Next<strong>Gen</strong>, in an<br />

40 | MIT 13.8<br />

•<br />

•<br />

•<br />

•<br />

•<br />

•<br />

•<br />

•<br />

NCOIC Deliverables<br />

Systems, Capabilities, Operations, Programs and<br />

Enterprises (SCOPE): characterizes commercial, civil<br />

and government requirements for interoperable<br />

systems; identifies system gaps and strengths.<br />

Net Centric Analysis Tool (NCAT): net-centric analysis<br />

of system architectures, including system-of-systems<br />

and federation-of-systems models; prescribes ways<br />

to close gaps and leverage system strengths.<br />

NCOIC Interoperability Framework (NIF): recommends<br />

open standards, provides patterns, guidance and<br />

success metrics for developing interoperable<br />

systems.<br />

Net-centric Pattern: three categories of patterns<br />

(mission-oriented, function-oriented and designoriented)<br />

describe standard practices, methodologies<br />

and technologies that can advance interoperability.<br />

Building Blocks: catalog of open standards-based<br />

COTS and GOTS products that comply with NIF<br />

recommendations.<br />

NCOIC Lexicon: glossary of terms and definitions that<br />

lay the foundation for meaningful discussions.<br />

Provides a common language for disparate ideas<br />

concerning key terms, including “NCO.”<br />

Systems engineering best practices and processes:<br />

includes tools, process and maturity models,<br />

modeling techniques, and collaborative environments<br />

for NCOIC integration.<br />

NCOIC deliverables are available free of charge at<br />

www.ncoic.org.<br />

initiative that represents a pioneering effort<br />

by FAA. On July 7, the agency and NCOIC<br />

entered a five-year agreement to advance the<br />

Enterprise Architecture of Next<strong>Gen</strong>, FAA’s<br />

national airspace (NAS) transformation program.<br />

Under the agreement, NCOIC proposes to<br />

FAA net-centric standards, best practices and<br />

patterns that can lead to the achievement of<br />

Next<strong>Gen</strong>’s 2025 milestones. Among other<br />

artifacts, NCOIC’s recommendations will utilize<br />

the Joint Program Development Office’s<br />

concept of operations for 2025 Next<strong>Gen</strong>. The<br />

joint office’s Net-centric Task Force, which<br />

informs the CONOPS, is led by the U.S. Air<br />

Force.<br />

“We anticipate that the standards,<br />

recommendations, best practices and netcentric<br />

pattern development derived from<br />

our collaboration will strengthen Next<strong>Gen</strong>’s<br />

requirements,” said Morgan. “Our recommendations<br />

will be founded on the thoughts<br />

of multi-national, multi-industry leaders in<br />

net-centricity.”<br />

Industry’s review of a major acquisition’s<br />

enterprise architecture—prior to developing<br />

proposal requirements—is a pioneering<br />

effort conceived by the FAA. Further, the<br />

agreement encourages industry to provide<br />

expertise to FAA throughout Next<strong>Gen</strong>’s life<br />

cycle, from research through disposition.<br />

The significance of implementing<br />

a Next<strong>Gen</strong> enterprise architecture<br />

based on open standards—and<br />

designed to enable network-centric<br />

operations—includes delivering<br />

vital information to those who operate<br />

the NAS; speeding system development<br />

and reducing procurement<br />

cost through reuse of software, patterns<br />

and best practices; effectively<br />

bringing legacy systems into an<br />

interoperable enterprise; and supporting<br />

the seamless integration of<br />

rapidly emerging technology into<br />

Next<strong>Gen</strong>.<br />

The resulting benefit could be a<br />

technologically “evergreen” system<br />

that enhances controllers’ ability to<br />

manage traffic, increases passenger<br />

safety, reduces airport flight delays,<br />

and advances the airlines’ drive to<br />

achieve greener operations.<br />

The NCOIC-FAA collaboration<br />

dates back several years. In 2008,<br />

the agency used the NCAT tool as<br />

part of its <strong>Network</strong> Enabled Operations<br />

demonstrations. In addition,<br />

the consortium’s Aviation Integrated Project<br />

Team is developing two patterns for global<br />

application—one for weather data dissemination<br />

and another for flight object data<br />

dissemination. The goal is interoperability in<br />

joint endeavors.<br />

With the cumulative knowledge of its<br />

member organizations, NCOIC serves as an<br />

honest broker to provide broad industry perspectives<br />

on products, systems, tools and processes<br />

that could advance the major objective<br />

of network-centric operations: getting the<br />

right information to the right people at the<br />

right time and in the right format. In other<br />

words, it is to achieve interoperability among<br />

essential global military and civil forces.<br />

More about NCOIC is available at www.<br />

ncoic.org. The NCOIC hosts plenary meetings<br />

three times a year, including one in<br />

late September in Fairfax, Va. Each includes<br />

a series of working sessions along with a<br />

general session in which government and<br />

industry leaders address topics germane to<br />

NCO. ✯<br />

Contact Editor Harrison Donnelly at<br />

harrisond@kmimediagroup.com.<br />

For more information related to this subject,<br />

search our archives at www.MIT-kmi.com.<br />

www.MIT-kmi.com


THE AN/PRC-148 HANDHELD RADIO:<br />

BUILDING FOR THE FUTURE<br />

Warfi ghters need to meet today’s<br />

critical battlefi eld communications<br />

needs and prepare for the net-centric<br />

future. With the AN/PRC-148 JTRS<br />

Enhanced Multiband Inter/Intra Team<br />

Radio, or JEM, the future of battlespace<br />

communications is in hand. The<br />

AN/PRC-148 is the smallest, lightest,<br />

and most power-effi cient, tactical<br />

handheld radio in use today covering the<br />

30 -- 512 MHz frequency range. It is the<br />

most widely-fi elded multiband handheld<br />

radio in the world.<br />

The AN/PRC-148 JEM’s Software<br />

Communications Architecture (SCA)compliant<br />

platform hosts all of today’s<br />

key waveforms and enables the<br />

integration of program enhancements,<br />

future waveforms, and additional modes<br />

of operation, all via simple software<br />

upgrades. Waveforms can be loaded<br />

onto the JEM’s SCA platform, allowing<br />

the radio to be used for a wider variety of<br />

applications and providing maximum user<br />

fl exibility and upgradeability.<br />

Thales has fi elded a full system of ancillary<br />

products built around the AN/PRC-148<br />

that are providing warfi ghters with<br />

additional communications capabilities,<br />

for mounted and dismounted operations,<br />

in size-, weight-, and power-constrained<br />

environments,<br />

Thales’s vehicular systems offer fl exible<br />

mobility for the JEM. The Thales Vehicle<br />

Adapters and Vehicle Adapter Amplifi ers<br />

provide single and dual channel 50 Watt<br />

power amplifi cation for range extension,<br />

recharge the radio’s battery, and support<br />

a wide range of secure and anti-jamming<br />

voice and data applications. Thales’s<br />

unique, cable free, rapid radio dismount<br />

capability enables warfi ghters to shift<br />

seamlessly from mounted to dismounted<br />

operation in less than two seconds with a<br />

fully-charged and immediately operational<br />

handheld radio.<br />

The new Extended Band Manpack (EBMP)<br />

supplies 20 Watts of extended band<br />

operation from 1.6 -- 512 MHz. With HF,<br />

VHF, and UHF in a single manpack, the<br />

22605 Gateway Center Drive | Clarksburg, Maryland 20871 | USA<br />

www.thalescomminc.com | solutions@thalescomminc.com | 240-864-7000<br />

rugged EBMP reduces the warfi ghter’s<br />

carry load by replacing two legacy radios<br />

at half of the combined weight, size, and<br />

cost with no loss of functionality.<br />

Trusted on the battlefi eld for years, Thales<br />

is fi elding technology today that is ready<br />

for tomorrow.<br />

Taking multiband<br />

capability to the next level!<br />

Thales has combined the functionality<br />

of multiple radios into a single<br />

manpack that provides continuous<br />

coverage for HF, VHF, and UHF. The<br />

Extended Band Manpack (EBMP)<br />

weighs less than 15.5 pounds with<br />

the radio installed, providing more<br />

capability in a smaller package. The<br />

EBMP leverages the capabilities and<br />

certifi cations of the embedded AN/<br />

PRC-148 JEM and adds over-thehorizon<br />

HF capabilities, including<br />

SSB, CW, and ALE. With internal<br />

GPS, ease of programming, a user<br />

friendly front-loading battery, and the<br />

ability to “hot swap” the main battery<br />

without rebooting the radio, the<br />

EBMP offers long-awaited capability<br />

for warfi ghters.<br />

For information on the complete product<br />

family, visit our website and download our<br />

AN/PRC-148 Product Catalog.<br />

Lives Depend On Our Products --<br />

We Will Always Act Accordingly<br />

6001_19_001:090909:V1


Compiled by <strong>KMI</strong> <strong>Media</strong> <strong>Group</strong> staff<br />

Compiled by <strong>KMI</strong> <strong>Media</strong> <strong>Group</strong> staff<br />

Multi-Viewer Provides High<br />

Fidelity Display<br />

The latest in the SuperView family of multi-viewers from RGB Spectrum,<br />

model 5000 offers real-time performance with up to 12 windows. The SV5000,<br />

housed within a 3RU enclosure, is ideal for any application requiring high<br />

fidelity display of multiple images on a monitor or projector. In keeping with<br />

RGB Spectrum’s standards of performance and value, the SV5000 delivers realtime<br />

performance regardless of the number of inputs and outputs, at any resolution.<br />

The model 5000 is based on a custom high performance architecture<br />

rather than a PC, with faster updates, more display flexibility, robustness and<br />

security. Real time display of inputs is guaranteed under all conditions, without<br />

any dropped frames. The SuperView 5000 offers a scalable system that can be<br />

expanded to as many as 12 inputs.<br />

Input alternatives include RGB/DVI,<br />

analog video and HD-SDI. Each<br />

input can be sized and positioned<br />

anywhere on the screen, as well as<br />

panned and zoomed to emphasize<br />

areas of particular interest. Display<br />

alternatives are virtually infinite,<br />

and include quad split, side-by-side,<br />

picture-in-picture, and overlapping<br />

windows.<br />

Crowbar Attacks Digital<br />

Forensic Challenges<br />

Crowbar from ManTech Cyber Solutions International is a unique digital<br />

forensic tool designed to perform critical functions needed by the law enforcement<br />

and military digital forensics community. Crowbar deciphers personal<br />

identification numbers on multimedia flash memory cards typically used in<br />

mobile phones, personal digital assistants, digital cameras, and other devices.<br />

Crowbar addresses several forensics challenges. For example, many traditional<br />

forensics tools will identify a PIN-locked flash memory card as “corrupt”<br />

without indicating that the card may be PIN-locked. Crowbar is able to determine<br />

if a memory card is PIN-locked, corrupt or damaged. Before Crowbar,<br />

the only way a military, law enforcement or civilian government investigator<br />

could unlock these storage devices was to obtain the PIN from the owner, or<br />

manually guess at the PIN. Crowbar gives investigators access to data stored on<br />

PIN-locked secure digital or multimedia card flash memory cards by rapidly<br />

attempting to determine the PIN.<br />

Crowbar is a user-friendly, portable, handheld device that is designed<br />

for tactical field operations. Crowbar delivers results by saving precious fieldinvestigation<br />

time by attempting to crack PINs faster and more efficiently than<br />

could be done manually; creating forensically sound images of unlocked cards<br />

for further examination back at the lab; and serving as a write-blocked card<br />

reader for unlocked cards.<br />

42 | MIT 13.8<br />

New Gateway Platform Offers<br />

“Security That Thinks”<br />

The new eSafe SmartSuite Secure Gateway for Web and mail protection<br />

and control is now available from SafeNet. An entirely new gateway platform,<br />

eSafe SmartSuite offers “security that thinks”—the combination of intelligent<br />

protection, ease of use, and value-focused management and reporting<br />

that provides the insights today’s businesses require. Building on the foundation<br />

of eSafe’s real-time, intelligent technology platform, designed to protect<br />

organizations from current and future threats, eSafe SmartSuite offers<br />

real-time, intelligent inspection of all inbound and outbound Web and mail<br />

traffic while delivering unmatched performance and scalability. Additionally,<br />

eSafe SmartSuite now improves productivity and management visibility, and<br />

enhances security decision-making capabilities through simple, intelligent,<br />

and value-driven monitoring, trend analysis and reporting functionality. A<br />

component of SafeNet’s vision for comprehensive enterprise data protection,<br />

eSafe SmartSuite delivers the first fully integrated content security and data<br />

leakage prevention solution with data aware monitoring, enabling assessment<br />

and mitigation of threats originating from data leakage. eSafe allows<br />

organizations to detect, analyze and prevent mishandling of information, and<br />

will be fully aware of existing risks so that they can take preventive measures<br />

to protect sensitive data.<br />

Amanda Curtis: amanda.curtis@safenet-inc.com<br />

Handheld Performs<br />

in Streamlined,<br />

Portable Form Factor<br />

Technology Advancement <strong>Group</strong> (TAG) has released the second generation<br />

of the TC-100 Commander. This latest device from TAG defines the cutting edge<br />

of fast, mobile handheld computers, featuring a sunlight readable display, a<br />

touch screen, unparalleled I/O flexibility, and customizable button configurations.<br />

TAG’s TC-100 sets the<br />

stage for mobile computers<br />

wwith<br />

state-of-the-art tech-<br />

nology, specifically hardened<br />

to resist the harshest<br />

environments of modern<br />

tactical field applications.<br />

The updated model<br />

provides the performance<br />

of a dedicated, lightweight (3.8 pounds) computer in a streamlined, portable<br />

form factor. The Commander is available with advanced features such as GPS,<br />

Bluetooth, Wi-Fi, video capture, hard-drive encryption, night vision compatible<br />

display, and cellular connectivity. Built-in expansion slots afford mobile<br />

users endless flexibility for field applications. Its ergonomic, handheld design<br />

is completely ruggedized and designed to meet MIL-STDs for shock and vibration.<br />

Matt Hederstrom: matt.hederstrom@tag.com<br />

www.MIT-kmi.com


The advertisers index is provided as a service to our readers. <strong>KMI</strong> cannot be held responsible for discrepancies due to last-minute changes or alterations.<br />

MIT CALEND A R & DI RECTO RY<br />

ADVERTISERS INDEX<br />

AFCEA InfoTech 2009 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7<br />

www.afcea-infotech.org<br />

Cases2Go . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43<br />

www.cases2go.com<br />

Ericsson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .C2<br />

www.ericssonfederal.com<br />

GDC4 Needham . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13<br />

www.gdc4s.com/secureproducts<br />

GDC4 Taunton . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .C3<br />

www.gdc4s.com<br />

Harris RF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21<br />

www.harris.com<br />

Hitachi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9<br />

www.hds.com/go/discover<br />

ITT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3<br />

www.cs.itt.com/tough<br />

L-3 East . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .C4<br />

www.l-3com.com/ste<br />

L-3 West . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24<br />

www. l-3com.com/csw<br />

McLane Advanced Technologies . . . . . . . . . . . . . . . . . . . . . . . . .5<br />

www.mclaneat.com<br />

Rockwell Collins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27<br />

www.rockwellcollins.com/milsatcom<br />

Scalable <strong>Network</strong> Technologies . . . . . . . . . . . . . . . . . . . . . . . .29<br />

www.scalable-networks.com/visnet<br />

Smartronix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31<br />

www.smartronix.com<br />

Sprint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33<br />

www.sprint.com/nextel<br />

Thales . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41<br />

www.thalescomminc.com<br />

CALENDAR<br />

September 21-25, 2009<br />

NCOIC Plenary Meeting<br />

Fairfax, Va.<br />

www.ncoic.org<br />

September 29-October 1, 2009<br />

Modern Day Marine<br />

Quantico, Va.<br />

www.marinemilitaryexpos.com<br />

October 5-7, 2009<br />

AUSA Annual Meeting<br />

and Exhibition<br />

Washington, D.C.<br />

www.ausa.org<br />

October 18-21, 2009<br />

MILCOM 2009<br />

Boston, Mass.<br />

www.milcom.org<br />

October 18-21, 2009<br />

GEOINT Symposium<br />

San Antonio, Texas<br />

www.usgif.com<br />

October 27-29, 2009<br />

DCGS Worldwide<br />

Conference and Expo<br />

Virginia Beach, Va.<br />

www.ncsi.com<br />

October 29-30, 2009<br />

TechNet International<br />

Brussels, Belgium<br />

www.afcea.org<br />

November 2-5, 2009<br />

TechNet Asia-Pacifi c<br />

Honolulu, Hawaii<br />

www.afcea.org<br />

NEXTISSUE<br />

Cover and In-Depth Interview ew with:<br />

Richard<br />

Williams<br />

Vice Principal Director<br />

GIG Enterprise Services Engineering ngineering<br />

DISA<br />

DISA Special l<br />

Section<br />

IA Executive<br />

Mark Orndorff, program<br />

executive offi cer, information on<br />

assurance and NetOps PEO O<br />

Who’s Who<br />

in DISA<br />

Photos, biographies and<br />

contact information for key y<br />

DISA offi cials<br />

DISA Updates<br />

Reports on key DISA programs<br />

Features:<br />

Expanded Cybersecurity<br />

Coverage<br />

Insider threat management<br />

IA performance metrics<br />

Military IA news updates<br />

Satellite Contract<br />

New alliance between DISA and the<br />

<strong>Gen</strong>eral Services Administration could<br />

provide major benefi ts to military users<br />

of commercial SATCOM.<br />

October 2009<br />

Volume 13, Issue 9<br />

Video Teleconferencing<br />

As the military expands reliance on<br />

video teleconferencing, vendors are<br />

offering a host of security and other<br />

enhancements.<br />

Distributed Agents<br />

Distributed agent-based systems<br />

interoperability enables interoperability<br />

among existing systems and delivers<br />

high-order data processing and<br />

discovery capability.<br />

www.MIT-kmi.com MIT 13.8 | 43


INDUSTRY INTERVIEW MILITARY INFORMATION TECHNOLOGY<br />

Simon Lee is president and chief executive<br />

officer of STG Inc., a leading provider of<br />

performance-based IT, homeland security,<br />

engineering, financial and scientific services<br />

with customers spanning government and<br />

industry. In 1986 he founded STG, which has<br />

since grown into a more than $200 million<br />

organization with more than 1,300 worldwide<br />

employees.<br />

Q: What does STG do to support the<br />

Army’s Global <strong>Network</strong> Enterprise Construct<br />

[GNEC]?<br />

A: The GNEC is a global enterprise capability<br />

that is enabled by <strong>Network</strong> Service Centers<br />

[NSC]. Currently, the Army is projecting<br />

five NSCs in its IT enterprise. Each NSC<br />

has three major capabilities: Fixed Regional<br />

Hub Node [FRHN], Area Processing Centers<br />

[APC] and Theater <strong>Network</strong> Operations and<br />

Security Centers [TNOSC]. By supporting<br />

the TNOSCs, we are also providing support<br />

to NETOPS, FRHNs and APCs. Our<br />

responsibilities include indirect support to<br />

other Army organizations requesting copies<br />

of our processes; ITIL best practices; lessons<br />

learned; and Army tactics, techniques,<br />

and procedures [ATTP], as well as those<br />

requesting subject matter expertise [SME]<br />

and reachback support to enable other Army<br />

organizations to meet their individual missions.<br />

STG is proud to be a part of the<br />

Army’s team. As a mid-sized business and<br />

partner in the collaborative efforts across<br />

9th Signal Command (Army) [9th SC(A)],<br />

STG believes in sharing our expertise and<br />

knowledge across the enterprise to serve<br />

the greater good of the Army. We use our<br />

knowledge of Army initiatives to ensure<br />

other Army enterprises are using their<br />

scarce investment dollars to the greatest<br />

possible outcome.<br />

In the end, we all share one mission:<br />

to support the warfighter and keep our<br />

soldiers and our country safe.<br />

Q: How are the TNOSCs, with increasing<br />

mission and decreasing budgets,<br />

transforming to a modular-based, expeditionary<br />

force capable of full-spectrum<br />

operations?<br />

44 | MIT 13.8<br />

Simon Lee<br />

President and Chief Executive Officer<br />

STG<br />

A: The key here is collaboration across the<br />

Army enterprise. In order to maximize available<br />

resources, the individual TNOSCs are<br />

sharing their processes, SME and lessons<br />

learned with one another. Sharing these best<br />

practices and tools across the entire Army<br />

enterprise allows 9th SC(A) to fully leverage<br />

the unique expertise and knowledge of common<br />

NETOPS tools available in the Army IT<br />

enterprise. This includes sharing and integrating<br />

their ATTPs, sharing lessons learned<br />

across the TNOSCs and working to integrate<br />

proven ITIL-based processes and procedures<br />

across all Army IT support service providers.<br />

Across the Army enterprise, this collaboration<br />

includes integrating all those<br />

individual processes developed across the<br />

TNOSCs and NECs, so that each organization<br />

understands its own responsibilities<br />

and how its services and procedures fit into<br />

the larger Army enterprise.<br />

Q: How does innovation play a part in the<br />

Army’s transformation and mission?<br />

A: It is important to take advantage of emerging<br />

commercial technologies and leverage<br />

their improved capabilities as they apply<br />

to an Army environment. In addition, the<br />

Army does an outstanding job of establishing<br />

forums where the Army’s leadership explains<br />

their IT mission needs to the government<br />

contractor community, which allows industry<br />

to focus its independent research and<br />

development investments on the Army’s<br />

actual current and future IT requirements.<br />

The Army has established IT enterprise<br />

leadership among the military com-<br />

munity by tailoring commercial IT best<br />

practices in their mission-critical environment.<br />

They are generating an environment<br />

that concentrates on continuity of<br />

delivered services while greatly reducing<br />

the risk of unexpected service outages.<br />

Currently, in the Army’s rapidly changing<br />

tactical IT environment, it is important<br />

to be able to react quickly to unexpected<br />

issues. The Army is focused on establishing<br />

processes that support a more proactive,<br />

rather than reactive, approach to IT enterprise<br />

management. The war fight starts at<br />

the tactical edge with the world’s finest<br />

fighting force. Industry’s role is to develop<br />

innovative technology that will support the<br />

warfighter from the tactical edge back to<br />

the Army’s enterprise enablers.<br />

Q: What role does a contractor like STG<br />

play in supporting the Army’s mission?<br />

A: First, let me say again how honored STG is<br />

to play a role on the Army’s team. Every day<br />

our employees wake up proud and humbled<br />

by the sacrifices our warfighters make to<br />

keep our country safe.<br />

The Army is starting to fully embrace<br />

performance-based contracting and the<br />

idea of service delivery, and is focused on<br />

increasing situational awareness to make<br />

the warfighter more lethal and powerful.<br />

The Army is concerned about the overall<br />

impact of IT service delivery to the<br />

warfighter, the impact on the mission, and<br />

the impact to the Army. They shouldn’t<br />

have to focus on the small, individual components<br />

that help lead to the delivery of IT<br />

services. As a government contractor, it is<br />

STG’s job to worry about the bits and bytes,<br />

and let the Army focus on accomplishing<br />

their mission.<br />

In short, we help enable the Army to<br />

focus on the intended outcome, and not<br />

solely on how IT can support the accomplishment<br />

of the mission. They tell us what<br />

services are needed to support the mission,<br />

and we determine how best to deliver those<br />

services to the warfighter. That is what we<br />

do, and we do it well. The Army’s mission is<br />

important to national security and defense,<br />

and we are happy to play a small role in<br />

helping achieve that mission. ✯<br />

www.MIT-kmi.com


WIN-T is…<br />

being fielded today.<br />

a self-forming and self-healing network.<br />

providing integrated network operations.<br />

a mobile, ad-hoc network.<br />

the U.S. Army’s current and future network.<br />

For more information please call 508-880-1759.<br />

© 2007-09 <strong>Gen</strong>eral Dynamics. All rights reserved.<br />

Select photographs courtesy of the U.S. Department of Defense.


VoIP<br />

Upgrade<br />

Kit Now<br />

Available<br />

250,000 USERS WORLDWIDE CAN’T BE WRONG<br />

NSA Certified Industry Standard for Secure Voice & Data Communications<br />

Join over 250,000 STE users by replacing your STU-IIIs with the industry standard for NSA<br />

certified secure voice and data communications. If you’re already a member of the STE Family,<br />

L-3 offers its users the ability to upgrade to Voice over Internet Protocol (VoIP) with our<br />

low-cost, easy-to-install kit. With the purchase of the VoIP Upgrade Kit users have the option to use<br />

ISDN, PSTN or VoIP with a simple software download. To order your STE or VoIP Backfit Kit, call<br />

856-338-3437 or 856-338-3495 or visit L-3com.com/STE.<br />

C 3 ISR > GOVERNMENT SERVICES > AM&M > SPECIALIZED PRODUCTS<br />

Communication Systems-East<br />

L-3com.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!