The Voice of Military Communications and Computing
Naval Networker www.MIT-kmi.com
Rear Adm. Patrick H. Brady Commander Navy SPAWAR
NETCENTS O Security Certification O Network Monitoring Big Data O Command Posts
C4
December 2013
Volume 17, Issue 9
Military Information Technology
2014
Editorial Calendar February [18.1]
March [18.2]
April [18.3]
May [18.4]
June [18.5]
Q&A: Lt. Gen. Edward Cardon Commander Army Cyber Command Special Section: Cyber Features: Big Data Infrastructure Modernization Enterprise Licenses Tradeshows: Cyberspace February 4 AUSA Winter February 19 Closing Date: January 17
Q&A: Director DISA COMSATCOM Center Special Section: Satellite Industry Guide Features: Telecom Contracts Mobile Devices Insider Threats Tradeshows: Satellite March 10 Closing Date: February 24
Q&A: Brig. Gen. Kevin Nally Marine Corps CIO Special Section: Tactical Networking Features: Rugged Hardware Social Media Computer Forensics Tradeshows: Sea/Air/Space April 7 Closing Date: March 21
Q&A: Commander Army NETCOM Special Section: Data Center Consolidation Education issue Features: ID Management Optical Networking Tactical SATCOM Tradeshows: Joint Warfighting Conference May Closing Date: April 25
Q&A: Rear Adm. Marshall Lytle Director, C4 Systems & CIO U.S. Cyber Command Special Section: Joint Information Environment Features: 4G Innovations Software Development Terminals Tradeshows: Cyber Symposium June Closing Date: May 30
July/August [18.6]
September [18.7]
October [18.8]
November [18.9]
December [18.10]
Q&A: Lt. Gen. Michael J. Basla Chief, Information Dominance and Chief Information Officer Special Section: Air Force Air Force Services Guide Features: Airborne Networks Storage Unified Capabilities Tradeshows: Air/Space September 16 Closing Date: July 10
Q&A: Maj. Gen. Alan Lynn Vice Director DISA Special Section: DISA Guide Features: Network Integration Evaluation Virtualization IT Certification Tradeshows: DISA Forecast to Industry Closing Date: August 15
Q&A: Army CIO Special Section: Enterprise Email Features: Antennas Cyber Ranges Encryption Tradeshows: AUSA Oct. 13 Closing Date: September 24
Q&A: Director Joint Tactical Networking Center Special Section: Radios Features: Video Teleconferencing Spectrum Network Monitoring Tradeshows: MILCOM Closing Date: October 31
Q&A: Adm. William E. Leigher Director of Warfare Integration for Information Dominance Navy Special Section: Naval Networks Features: Cross Domain Solutions Collaboration WIN-T Tradeshows: AFCEA West (2015) Closing Date: December 12
This editorial calendar is a guide. Content is subject to change. Please verify advertising closing dates with your account executive.
military information technology Features
8
Cover / Q&A
Special Report: Big Data Big Data Tracks Readiness
23
A home-grown Army “big data” system for tracking readiness levels plans next year to expand into providing commanders with guidance on future trends in such key areas as personnel, equipment, training and information resources. By Harrison Donnelly
5
Higher Stakes for Network Monitoring
With more military organizations using cloud-based technologies and the number of mobile enterprise users continuing to expand, the Department of Defense is more in need than ever of sophisticated, real-time network monitoring, and industry is stepping up with a variety of tools. By William Murray
December 2013 Volume 17, Issue 9
10
Gassing Up Big Data
Industry is stepping forward with new and enhanced services designed to provide analysts with all the big data they need, and in forms that are easy to work with. By Harrison Donnelly
Departments 2 Editor’s Perspective 3 program notes 4 People 14 data bytes 26 COTSacopia 27 Resource Center
Clearing the Way for Mobile Security
A new streamlined security certification process has been set up whereby the Defense Information Systems Agency acts as a central party within the federal government for reviewing and approving the use of third-party software and hardware solutions. By Karen E. Thuermer
16 11
20
Brigade and battalion command posts are more mobile and agile than ever before, and the Army is increasing their ability to move forward in the fight while retaining commanders’ critical situational awareness. By Amy Walker
After an extended contract selection process and repeated formal protests, the Air Force has settled on a group of 25 companies eligible to provide netcentric products to Air Force customers under the NETCENTS-2 acquisition vehicle. By Harrison Donnelly
Tactical Posts Offer Mobile Command
NETCENTS-2 Takes Off
Industry Interview Charles Croom
Vice President Cyber Security Solutions Lockheed Martin
28
Rear Admiral Patrick H. Brady
Commander Space and Naval Warfare Systems Command U.S. Navy
“Through collaboration with the stakeholders, we have worked to speed the development and acquisition of urgent requirements to match the rapid development of information dominance capabilities and threats.” —Rear Admiral Patrick H. Brady.
EDITOR’S PERSPECTIVE
Military Information Technology Volume 17, Issue 9 • December 2013
The Voice of Military Communications and Computing Editorial Managing Editor Harrison Donnelly harrisond@kmimediagroup.com Online Editorial Manager Laura McNulty lauram@kmimediagroup.com Copy Editor Sean Carmichael seanc@kmimediagroup.com Correspondents Peter Buxbaum • Cheryl Gerber • Bill Murray Karen E. Thuermer
Art & Design Art Director Jennifer Owers jennifero@kmimediagroup.com Senior Graphic Designer Jittima Saiwongnuan jittimas@kmimediagroup.com Graphic Designers Scott Morris scottm@kmimediagroup.com Amanda Paquette amandak@kmimediagroup.com
Advertising Account Executive Patrice Lucid patricel@kmimediagroup.com
KMI Media Group Chief Executive Officer Jack Kerrigan jack@kmimediagroup.com Publisher and Chief Financial Officer Constance Kerrigan connik@kmimediagroup.com Editor-In-Chief Jeff McKaughan jeffm@kmimediagroup.com Controller Gigi Castro gcastro@kmimediagroup.com
An agreement being finalized by the Department of Defense and the broadcast industry to expand commercial access to the electromagnetic spectrum represents effective public/private collaboration that could boost the economy and ultimately provide more revenue for the government. But making the deal work in practice will also require extra effort on the part of all involved. With polls showing that a majority of adult Americans now own a bandwidth-hogging smartphone, competition and demand for limited spectrum space is surging. That has put DoD and other federal agencies, with their traditional bandwidth allocations, squarely in the crosshairs, especially Harrison Donnelly considering that the government could sell the space to the telecommunica- Editor tions industry for billions of dollars. The deal, endorsed by the National Telecommunications and Information Administration (NTIA) this fall, calls for DoD to shift operations away from the 1755-1780 megahertz (MHz) band, with that space being auctioned off next fall. Instead, the department will use the 2025-2110 MHz band for those needs, which include munitions guidance, UAVs and other mobile operations. The problem is that it will have to share the 2025-2110 MHz band with local broadcasters, who use it for providing essential news coverage of disasters and emergencies. Although the compromise would define DoD as one of the primary users of the 2025-2110 MHz band, the burden would be on military users to not interfere with broadcast operations. Non-federal users would have to “make all reasonable efforts to accommodate military mobile and fixed operations in the band,” according to the NTIA, but when push came to shove it would be the military that would have to give way. The crunch could be worst in some of the nation’s biggest metropolitan areas, which feature both major military bases and a plethora of media outlets. Frequency-hopping “cognitive radio” technology could help in sharing bandwidth in the long run. For now, though, patience and a cooperative spirit will be at the top of the agenda.
Trade Show Coordinator Holly Foster hollyf@kmimediagroup.com
Operations, Circulation & Production Operations Administrator Bob Lesser bobl@kmimediagroup.com Circulation & Marketing Administrator Duane Ebanks duanee@kmimediagroup.com Circulation Barbara Gill barbg@kmimediagroup.com Data Specialist Raymer Villanueva raymerv@kmimediagroup.com
KMI MedIa Group LeadershIp MaGazInes and WebsItes Border & CBRNE Defense
A Proud Member of
Geospatial Intelligence Forum
Military Advanced Education
Military Information Technology
Military Logistics Forum
www.GCT-kmi.com
www.GIF-kmi.com
www.MAE-kmi.com
www.MIT-kmi.com
www.MLF-kmi.com
Navy Air/Sea PEO Forum
Special Operations Technology
Tactical ISR Technology
U.S. Coast Guard Forum
www.TISR-kmi.com
www.CGF-kmi.com
Border Threat Prevention and CBRNE Response
Subscription Information Military Information Technology ISSN 1097-1041 is published 9 times a year by KMI Media Group. All Rights Reserved. Reproduction without permission is strictly forbidden. © Copyright 2013. Military Information Technology is free to qualified members of the U.S. military, employees of the U.S. government and non-U.S. foreign service based in the U.S. All others: $65 per year. Foreign: $149 per year.
Ground Combat Technology
SPECIAL SECTION:
Integrated Fixed Towers
Border Protector
www.BCD-kmi.com
June 2012 Volume 1, Issue 1
Michael J. Fisher Chief U.S. Border Patrol U.S. Customs and Border Protection
Leadership Insight: Robert S. Bray Assistant Administrator for Law Enforcement Director of the Federal Air Marshal Service Transportation Security Administration
Wide Area Aerial Surveillance O Hazmat Disaster Response Tactical Communications O P-3 Program
www.BCD-kmi.com
Military Medical Military Training & Veterans Technology Affairs Forum
Corporate Offices KMI Media Group 15800 Crabbs Branch Way, Suite 300 Rockville, MD 20855-2604 USA Telephone: (301) 670-5700 Fax: (301) 670-5701 Web: www.MIT-kmi.com www.M2VA-kmi.com
www.MT2-kmi.com
www.NPEO-kmi.com www.SOTECH-kmi.com
PROGRAM NOTES Army Team Tapped for IT Achievement An Army team involved in the work of expanding the Department of Defense enterprise email system has won first place in this year’s DoD Chief Information Officer Awards. The award is the highest honor recognized by the department for achievement in information management, information technology, cybersecurity and information assurance. More than 100 nominees for the award were evaluated based on their outstanding achievement in one or more of the following eight critical areas: acquisition; architecture and interoperability infrastructure; identity and information assurance and cyber operations; management and standards; synchronized and responsive operations and services; capital planning and optimized information technology investments; information management/technology/assurance workforce; and information sharing and data management. Team awards were presented to: • First Place: Army Enterprise Email Migrations Team, Army Network Enterprise Technology Command, which improved enterprise architecture and services in support of expanding the DoD enterprise email system. • Second Place: Enterprise Mission Assurance Support Service Team, Defense Information Systems Agency, which contributed to improving mission assurance through IT systems certification and accreditation governance. • Third Place: Enterprise Infrastructure Team, Joint Task Force-Capital Medical, Military Health System, which improved medical data sharing through the consolidation of regional medicaltreatment facility networks into a single network. First place among individual awards went to Charles (Dean) Corpman, chief, Command and Control Section, U.S. Strategic Command, who directly modernized a portfolio of nuclear command and control programs that contributed to the safety and security of the United States.
www.MIT-kmi.com
Compiled by KMI Media Group staff
Marines Test Made-to-Order Intelligence Handheld devices and special software that automatically sifts through loads of data can help ease information overload and deliver made-to-order intelligence to the front lines, a recent Marine field exercise has demonstrated. That finding comes from the third annual Agile Bloodhound demonstration, which was staged in November at Marine Corps Base, Hawaii, by the Office of Naval Research (ONR) in partnership with Marine Corps Forces Pacific (MARFORPAC) Experimentation Center and the 3rd Marine Regiment. The demonstration showed how the integration of ISR assets, such as imagery from unmanned aircraft sensors and command-and-control capabilities for communications and networking, can be tailored to speed decision making by expeditionary forces. “We’re trying to create a useroriented worldview for Marines,” said Colonel William Zamagni, deputy director of ONR’s Expeditionary Maneuver Warfare and Combating Terrorism Department. “Whether they’re in command centers with PCs, in vehicles with laptops or on foot with smartphones, Marines need access to the most pertinent information possible.” Expeditionary operations involve more sensors, radios and computers than ever before. The management and dissemination of information has not kept pace with technological advancements, however, potentially leaving Marines and other warfighters on the front lines overwhelmed with the amount of raw data coming at them. “Marines in the heat of battle have more pressing things to worry about than trying to make sense of a lot of different pieces of intelligence,” said John Moniz, ONR program manager. “They need the right information at the right time, and Agile Bloodhound is helping us figure out what combination of hardware and software works best to deliver only the most relevant information as quickly as possible.” Some of the many technologies used during Agile Bloodhound include: • •
•
A serverless chat system that allows person-to-person and group communications even for those not connected to the infrastructure network and servers A knowledge discovery program that uses smartphones and tablets to streamline ISR data collection and exploitation, as well as create a unified picture of the battlefield through geographically identified imagery and automated force tracking ActiveWiki software that allows collaboration for social networking graphs and real-time updates of pictures and maps to produce unique views and overlays of the battlespace.
The Navy and Marine Corps continue to move from a net-centric to a data-centric strategy to enable development of more interoperable and cost-effective solutions. Agile Bloodhound supports the Marine Corps’ Information Enterprise Strategy, which aims to create a “knowledge-based force” that uses seamless communications to improve decision making and mission execution. The demonstration was the result of partnerships between ONR, MARFORPAC, Marine Corps Systems Command, Marine Corps Warfighting Laboratory, Space and Naval Warfare Center Pacific, Naval Surface Warfare Center Dahlgren Division, Naval Research Laboratory and others.
MIT 17.9 | 3
PROGRAM NOTES
Compiled by KMI Media Group staff
Radios Make the Arctic Connection Overcoming the obstacles of frigid temperatures and high latitudes, two manpack radio systems have successfully completed secure voice and data calls from Alaska and the Arctic Circle. The devices used the Mobile User Objective System (MUOS) waveform to connect with the MUOS satellite and ground communications network. The high latitude experiment was led by Lockheed Martin, the prime contractor for the MUOS satellite system. The devices tested were the General Dynamics C4 Systems-developed AN/PRC-155 two-channel manpack radio, and the Harris Falcon III AN/PRC-117G multiband manpack radio. The demonstration’s success represents a significant operational milestone for their radios, executives of the two companies said. “Exposed to sub-freezing temperatures and blistering arctic winds, the PRC-155 manpack radio is the first and only military radio to deliver secure voice and data connectivity with the MUOS system from the highest latitudes on the planet,” said Chris Marzilli, president of General Dynamics C4 Systems. “The success of this demonstration proves that with a MUOS-capable PRC-155 manpack radio, soldiers operating in extreme and isolated locations will always be connected to the soldier’s network.” “Harris is fully committed to delivering MUOS capability to the U.S. warfighter,” said George Helm, president, Department of Defense business, Harris RF Communications. “The test results validate our advanced capabilities and speed in porting, certifying and deploying complex U.S. government waveforms. The AN/PRC-117G can enable DoD to address the anticipated shortage of terminals to deliver the significant capabilities that the MUOS constellation offers to the end user.”
The mid-October demonstration covered a number of realistic operational scenarios that included fixed-site locations around Anchorage and Barrow, Alaska, and aboard aircraft flying throughout the Arctic Circle. During the demonstration, the radios completed multiple one-to-one voice and data calls as well as conference calls connecting more than five participants. Reaching the MUOS satellite communications network from high latitudes is particularly challenging due to the physics associated with how radio signals reach the MUOS satellites in geosynchronous orbit around the equator.
PEOPLE Michael Carter, chief executive officer of Sabtech, a provider of technologies for the rigorous demands of C5ISR systems, has personally acquired the privately held company.
Compiled by KMI Media Group staff
officer and executive vice president of its Mission, Cyber and Intelligence Solutions Group.
Kevin Jackson
H. Christopher Goodrich
ManTech International has named H. Christopher Goodrich as chief operating
4 | MIT 17.9
The Network Centric Operations Industry Consortium (NCOIC) has named cloud computing expert Kevin Jackson to lead a team that will assist organizations in adopting into their
operations a process known as the NCOIC Rapid Response Capability, which enables governments, agencies and businesses to create a secure, hybrid IT environment quickly and cost-effectively. General Dynamics Fidelis Cybersecurity Solutions has appointed Jim Jaeger to a new executive position—chief cyber-services strategist—to help customers design, develop and deploy interoperable cybersecurity solutions that can discover, investigate and contain advanced cyber threats. Mike Buratowski will assume
Jaeger’s previous role as vice president of cybersecurity services.
Curt Mattingly
Curt Mattingly has joined the national capital region operations of McLane Advanced Technologies as vice president of business development.
www.MIT-kmi.com
Higher Stakes for
Network Monitoring
With the boom in cloud computing and mobile devices, careful oversight and managing of network performance is more important than ever. With more military organizations using cloud-based technologies and the number of mobile enterprise users continuing to expand, the Department of Defense is more in need than ever of sophisticated, real-time network monitoring. Industry in turn is offering a variety of tools for such key functions as threat analysis, measuring downtime, long-term data archiving and analytics on multiple networks with millions of devices. Network monitoring is also a reflection of a broader trend toward shared IT architecture, which along with its many benefits also holds perceived risks for agencies accustomed to controlling every aspect of network operations. The Federal Data Center Consolidation Initiative, for example, has sought to curb the growth of federal data centers by reducing the acquisition of data center hardware, software and operations, while shifting spending to more efficient computing platforms. Chief information officers and program managers have clearly started to look www.MIT-kmi.com
By William Murray MIT Correspondent
architecture to meet the requirements for greater efficiency in their computing of DoD’s developing Joint Information platforms, which can only be achieved by Environment (JIE). careful monitoring and managing of netSimilarly, Army officials this fall received work performance. That has been evident congressional approval to reprogram $175 throughout the federal sector, which has million in fiscal 2011 funds to consolidate seen a growth in recent years in data cen400 points of presence to 11 regional center collaboration and virtualization, noted ters in the continental U.S. and four in Kevin Manwiller, manager of federal secuEurope. In addition to the rity and mobility solutions costs to maintain and replace for Cisco Systems. equipment, Army officials In the military arena, a have had to deal with the fact major example of architecthat they have 400 potential ture-sharing and modernpoints of vulnerability that ization has been a recent they must defend from netagreement among the Air work-based cyber-attacks. Force, Army and Defense The Army/Air Force/DISA Information Systems Agency initiative, known as the Joint (DISA), aimed at increasing Regional Security Stack, is bandwidth and network secupart of the broader JIE, a rity while cutting more than Kevin Manwiller consolidated, collaborative $1 billion in future costs. and secure infrastructure that officials see The agreement seeks to bring together as key to enabling future end-to-end inforthe Army’s excess IT capacity, resultmation sharing and interdependent entering from force structure changes, with prise services across the department. the Air Force’s need to modernize its IT MIT 17.9 | 5
“We need to get better at working together,” Manwiller said, adding that the development and fielding of open source tools that can work and be shared in an open architecture environment is still in its infancy.
Access to Data
including looking at user patterns and logs, according to Motola. “It’s not just green light, red light,” since the threat analysis is more sophisticated, he said, adding that network monitoring at the mission level in DoD includes drones and other sensors and unmanned aerial vehicles as cyber-assets on an enterprise network. Although the military generally lags behind the technology curve compared with what same-size commercial companies adopt, Motola said, there is an earnest desire to “break down stovepipes” and implement a joint information environment in DoD. “Let’s not reinvent the wheel,” he said. Now, as military leaders move to take advantage of shared cloud solutions, which can help them lower costs, they are being helped by improved network management tools.
When engaged in network monitoring, military organizations tend to know who has access to what data in their enterprise and who doesn’t, according to J.P. Leibundguth, director of technology for global cyber systems for Raytheon Intelligence and Information Systems. Bad actors within networks try to do what they can to appear normal and escape detection, according to Leibundguth. There are also times when insiders unintentionally become threats. “The threat always advances, and so do we,” Leibundguth said. “The resting heartbeat is different for Early Warnings each individual,” is how Michael Smith, senior vice president of enterprise technolProducts such as BMC Patrol, HP Openogy for Kratos Networks, described the View, IBM Tivoli and Computer Associates’ normal activities of users on an enterUnicenter and Kratos’ NeuralStar are very prise network. Kratos Networks provides commonly used enterprise network manthe End-to-End Management suite, which agement software applications. includes its COMPASS and NeuralStar prodAnother contender in the field is Solaructs for managing large-scale, distributed Winds, which offers products such as and hybrid networks. “You have to look for Network Performance Monitor, an early what is abnormal,” which can vary from warning system that simplifies detecdevice to device, he said. tion, diagnosis and resolution of network DoD organizations have issues before outages occur to balance their offensive and and tracks response time, defense networking posture availability and uptime of so that they can deal with routers, switches and other both outsider and insider devices. threats, Leibundguth said. Some organizations preNetwork monitorfer to handle network moniing services that can work toring and similar services across domains that cover in-house. But in doing so, different security levels are they may neglect to take particularly helpful to the advantage of the capabilities Sean Applegate DoD and intelligence comof available software, accordmunities, according to Pat Motola, chief ing to Sean Applegate, DoD sales engineer executive officer of Bluespace Federal. manager at Riverbed Technology, an appli“Some users are provisioned at multiple cation performance infrastructure vendor. levels,” such as Secret and Top Secret, Riverbed’s IT Performance solutions, he noted. for example, have the capability of improvThe tools that now exist to complete ing efficiencies, and also have network such work are more effective than those monitoring and security features. on the market 10 years ago, and interopApplegate, who focuses on wide area erability standards are also better, Motola network optimization, network and appliobserved. cation monitoring and performance Vendors are providing more sophistimanagement, noted the complexities of cated threat analysis to DoD organizations, network monitoring in enterprise networks reviewing data coming in at real time, with large numbers of mobile users, such 6 | MIT 17.9
as DoD. These complexities, combined with the demand to consolidate IT infrastructure and achieve cost savings while enabling high user productivity and secure, network-centric operations within large enterprises such as DoD, can pose formidable challenges to success. In providing network analytics and forensics reports to military organizations, there are a number of variables to consider, vendors say. There are different costs, for example, in providing network management storage tiers that can accommodate solid state drives and flash RAM, according to Raytheon’s Leibundguth. Raytheon’s primary strengths in network monitoring include mobility assessment and moving from one classification level to another, Leibundguth said. With the increase in “bring your own device” policies, which allow employees to use their own smartphones and tablets for business as well as personal needs, within enterprise networks, there has been a dramatic increase in need for mobility assessment services, he added. That ties in with the ongoing debate between the balance of achieving greater worker productivity through mobile technology and an organization’s network security. With the convenience and easier access to data on the part of workers comes the crossing over and blurring of lines at times between the personal and professional, which vendors say underscores the need for comprehensive approach that aligns the technology to the specific mission. What is needed is a “mission-defined management approach,” said Smith of Kratos Networks, as opposed to a previous silo-based network management approach, which was typically conceived and executed by IT specialists. “The new model is about how you define the technology needs from a mission orientation.” The military services and the intelligence and special operations communities might use the same enterprise networks, with many different points of entry and an overwhelming volume of data interchanged, including high definition video, Smith said. Enterprise network users may seek to view and edit high definition video, an application that can clog many networks. Special operations and other personnel, for example, need to be readily deployable worldwide, underscoring the need for open architecture to accommodate disparate devices. Putting together a secure, www.MIT-kmi.com
end-to-end network with high availability to meet diverse needs is a challenge. “You have to have the right network so that the right personnel can use it and get the right information,” during a time of personnel reduction, Smith said. Chief information officers and IT managers “feel the pressure to make workers more productive, including through the use of tablets and smartphones,” said Manwiller, so it is in their interest to enable workers to use voice and video applications on a tablet computer and easily check their email during non-work hours using a smartphone. To assist in this overall trend, Cisco has developed an Open Platform of Safety and Security, an architectural framework that the company sees as proactively protecting workforces, citizens and mission critical assets. With the proper amount of planning, CIOs and other military leaders usually work with their staff and vendors to determine an acceptable level of risk for mobile user security on networks, Manwiller noted. “There are tools out there that can make mobile networks safer.” Vendors are also trying to keep on top of the evolution of data interchange strategies and formats, according to Leibundguth. Leibundguth also noted that there is a great deal of overlap between security vendor product offerings, which makes it difficult for contractors such as Raytheon to perform analysis across product lines. “With every technology we evaluate, we try to make it an apples-to-apples comparison,” he said.
a device by device management level, but rather on an aggregate level. “Kratos Networks designed its End-toEnd Management Suite to address this challenge,” said Smith. “The solution provides a 360-degree view across all systems and delivers unrestricted visibility and service transparency across circuit (satellite/ microwave) and packet (IP) networks using dashboards that deliver critical service and performance metrics.” “Scalability is one of the key driving areas in the government market,” Smith said of network monitoring. In addition, the purchase of software, network monitoring, system development and other key
components as services is a key trend in the military. “They’re buying everything as a service,” he said. The military’s need to properly store and segregate large volumes of data from enterprise networks is another key trend. Some military customers also want vendors to diagnose their networks and provide the leadership with a list of top threats to the network, in addition to the services that the vendor is already providing, Smith said. O For more information, contact MIT Editor Harrison Donnelly at harrisond@kmimediagroup.com or search our online archives for related stories at www.mit-kmi.com.
Situational Awareness from the NOC to the Network’s Edge Network Operations Center (NOC)
End-to-End Monitoring
Analytical Depth Some DoD agencies need vendors to store data from network interactions of devices in five minute increments for up to a year after the event. Statutory data storage requirements vary by agency, according to Leibundguth. “The depth of analytics that agencies require is becoming more complex,” he said. When one considers that there can be millions of devices, including sensors, on multiple networks that a contractor might need to perform network management services support, the volume of data can be staggering. Enterprise networks are so large, with hundreds of thousands if not millions of devices, across multiple networks using both radio frequency and Internet Protocol, that real time analytics can’t be done on
Warfighter
Real-Time End-to-End Monitoring in a Single Solution Overcome stovepipes and reduce costs. Kratos’ NeuralStar COTS product provides commanders and operators with a Common Operational Picture (COP) of network operations for enhanced situational awareness. • Role-based, user-definable dashboards for a ConOps, mission or command level • Visibility into NetOps, security, and overall mission readiness • End-to-end monitoring across terrestrial and satellite networks For more information call 703.668.1003, email KratosTTS@kratosdefense.com or visit www.KratosDefense.com/SA
Military Information Technology.indd 1
www.MIT-kmi.com
12/5/2013 8:59:09 AM
MIT 17.9 | 7
Army system to expand into predictive analytics by providing guidance on future trends in personnel, equipment and training.
By Harrison Donnelly MIT Editor
For Lieutenant Colonel Bobby Saxon, diviA home-grown Army “big data” system sion chief and program director for the EMDS for tracking readiness levels plans next year system, the much-discussed challenges and to expand into providing commanders with opportunities of big data involve more than guidance on future trends in such key areas just the volume of information being collected. as personnel, equipment, training and infor“A lot of people think that big data is just mation resources. more data. But the reality is that while more The foray into predictive analytics repredata is part of it, it is also different types of sents a major step for the Army Enterprise data, such as structured or unstructured data, Management Decision Support (EMDS) sysor if data is coming in at different speeds. We tem, which has already garnered considerdeal with all of that in our day-to-day roles at able industry recognition for its ability to Lt. Col. Bobby Saxon EMDS,” Saxon said. automatically collect data from roughly two “My personal definition of big data conforms in many dozen data sources on readiness and resourcing informaways to what the industry is talking about,” he continued. tion, in order to help inform decision making. 8 | MIT 17.9
www.MIT-kmi.com
“They talk about the variety, velocity and volume of the data. But I think there is too much emphasis on the volume of the data, and there should be more on the speed at which that data is coming in and the variety of it. “One of my frustrations about how people define big data is that they want to talk gigabytes, terabytes and petabytes, because for them it is only about size. If you listen to the talk about big data, people are always pointing to the amount of information in the Library of Congress, and how that volume of data is being created every hour, day or week, depending on who you listen to. But most of that data, to be frank, is worthless. It’s not the size of the data, but the key nuggets of information inside that data,” he said. The EMDS system works by reaching across the Army to a variety of authoritative data sources, bringing the information back for storage in an Oracle database. The system has a data warehouse to provide more capability to handle data, and uses Oracle Business Intelligence to present and do some analytical work on the data. In addition, Oracle’s Endeca enterprise class data discovery platform helps with data discovery capabilities. “The bottom line is that, in our system, with a single user name and password on the classified network, you have easy access to visually driven data from nearly 100 data sources. Although we only pull from a couple of dozen sources directly, some of our sources pull from many other locations as well,” Saxon explained.
Real Time Data Developing a big data system like EMDS forces developers to grapple with a number of fundamental issues, from the speed at which new information is incorporated into the database, to the still-unsolved problem of how to extract meaning from unstructured data from social media and other sources. On the technologically and operationally challenging topic of including real time data, the specific mission at hand is critical. “If you are running a big data system whose mission is to help find the bad guys who pose an immediate threat to national security, then it is important to have lots of data, delivered extremely fast,” Saxon observed. “But if you’re running a system whose mission is to make a strategic plan for the Army, a lot of data is important, but the speed may not be as important. Or it may be more important that we look at multiple but small sources of data, rather than just the volume of data.” It comes down to the fact that the EMDS program deals at the strategic and operational level rather than the tactical level, he noted. “If we were an intelligence system being used in Afghanistan, we would need to know in real time where units are located and other intelligence. But when you are looking at how you should array your force six months or 12 months down the road, you don’t have to have information from a minute ago. Also, we have a lot of physical limitations. Some of the data comes from sources that may not have the latest technology, so we may get that data only once a week or once a month. “When we tell our story about EMDS, we make clear that there may be information in it that may be a week or month old,” Saxon added. “But in cases such as installations, where the Army isn’t making changes on a weekly or monthly basis, that data can be provided on a quarterly basis. Although we get a nightly update on the readiness of the force, readiness information is only reported www.MIT-kmi.com
to Congress, by law, on a monthly basis. Units slowly move from one level of readiness to another.” Another major issue for all big data analytics is how to gain aggregate insights from unstructured data, from PowerPoint presentations to Facebook entries, that falls outside the traditional rows and columns of figures. “Unstructured data has been one of our challenges, but it has more to do with the tools that are available than with our ability to implement it. If you want to look at some basic information in unstructured data, there are tools to help you. But to really dig into the unstructured data and paint a robust picture, it’s more complicated. We provide some superficial information associated with unstructured data, such as sharing commanders’ comments and looking at some trending in that. But we haven’t been able to go past that much,” Saxon said. The program has an advantage, on the other hand, in that orderly, structured data is the most familiar and useful to the military. “We’re fortunate that a lot of data that the Army and DoD use on a daily basis is very structured. If you’re out in the commercial section trying to following what people say in their Twitter feeds, that is heavily dependent on unstructured data,” Saxon said. “But when you’re looking at the number of tanks, people and installations in readiness, the vast majority of that data is very structured. Although we haven’t made as much progress with unstructured data as we would like, it also hasn’t been as much of a challenge because of the limited amount of that type of data that is readily available to us.” With any big data analytics system, the obvious evolution is to move to predictive analytics, and that is true for EMDS as well. Saxon said he expects that sometime in late spring or early summer, the program will deliver an initial capability in that area, with the ultimate goal to help senior leaders see the future more clearly than they do today. “If a senior leader wants to look 12 months down the road today, there is a tremendous amount of accrued wisdom and user experience involved in making a decision like that, but there may not be as much hard core data and modeling to back that up,” he said. “We believe that we can use the data we have, including historical data, as well as a near-term picture provided by some of our users, who are looking six to 12 months down the road, based on hard facts.” The personnel community, for example, has a general idea of how the Army personnel picture is going to look six to 12 months in the future, based on enlistment rates, planned retirements and so on. “It’s not factual data, but it’s better than pure guessing or looking only at historical data,” Saxon said. “We will take a fuzzy picture and, over time, make it clearer. We’ll never be able to predict with 100 percent accuracy. But we will be able to help senior leaders see ahead with a smaller error rate.” Saxon concluded with an observation that could stand for any effort to use big data analytics to peer into the future: “We’ll always use experience and wisdom, but now we’re going to throw in data science as well, with some sophisticated modeling that will help them get closer to the final answer than they would just by guessing.” O For more information, contact MIT Editor Harrison Donnelly at harrisond@kmimediagroup.com or search our online archives for related stories at www.mit-kmi.com.
MIT 17.9 | 9
Gassing Up Big Data Effective analysis and prediction depend on a steady flow of easy-to-use information fuel.
By Harrison Donnelly, MIT Editor
analysts were using our data before, doing searches and making While industry and government work to develop and deploy spreadsheets, and then coming back and filling it in later, we’re big data “engines” for analyzing and making predictions from now just piping it in, so that when they come to the platform, the information flows, they can’t get anywhere without the data “gas” analyst has to do just a single query—on their data, our data and to power them. other vendors’ data at once, as opposed to correlating it together, To be sure, organizations like the Army and the intelligence manually, later. That has made them work smarter and be more agencies have access to massive supplies of data of their own, agile and able to respond to incidences more quickly than before,” from readiness statistics to UAV video feeds. But to make sense of Boylston said. that, analysts also need easy access to the even greater amounts “We’ve taken all of the fabrication work that has slowed down of information fuel all around—such as legal records, newspapers analytics, and tried to get it all cleaned up, so that by the time and proprietary databases—that often provide the key links for they make a request from our system, it will come back to them actionable intelligence. in such a consistent format that their analytics system can start In response, companies such as LexisNexis, the venerable right away,” she noted. “They’re not scraping off the information source used by lawyers and researchWeb or cleaning up news stories, but are getting ers for decades, are stepping forward with new and news stories from us that are clean. It makes a huge enhanced services designed to provide analysts with difference in how fast they can respond.” all the big data they need, and in forms that are easy For example, LexisNexis conducted a coopto work with. erative research and development agreement with “For years now, intelligence and military anathe National Geospatial-Intelligence Agency that lysts have been using LexisNexis, but they come provided information to a number of NGA vendors in through our traditional research platform,” said looking at “stressor” events that happened prior to Tracey Boylston, government professional services a certain incident. “They were able to use our data, solutions architect for LexisNexis. “But as big data piece together the applications, and see the stressor has evolved, the need to get to our data in a different Tracey Boylston events that came before the incident. That helps way has become apparent. tracey.boylston@lexisnexis.com NGA build a system that’s able to predict the next “Normally, a user logs in, uses the system, and time based on what happened before,” Boylston said. gets a download in a static document. With big data applications, Boylston summed up the role her company wants to play in it has become apparent that they need to get our data in a differmeeting military and intelligence big data needs this way: “We ent format, and the results through an analytics system. So what still have our traditional users among lawyers and researchers. we have done is to allow users to access our system through an We’ve seen another set of users, specifically analysts, whose needs application programming interface rather than a log-in. They’re we should address. Government analysts need to perform as getting bulk data as opposed to doing one search at a time,” effectively and efficiently as possible, because the traditional way Boylston explained. research has been conducted in the past isn’t necessarily the best “We’ve tried to become agile as big data has moved into that way anymore. atmosphere,” she added. “As much as the government, the Depart“So as analytics platforms are put in front of them, whether ment of Defense and intelligence community are trying to become something is built internally or is a vendor product, we want to be more agile with the new technology, we’re trying to mimic that able to continue to support them, and provide data in a form that and stay up with it.” works better for them now.” O The goal is not only to offer additional sources of data, but also to supply it in ways that make analysts more effective. “As open For more information, contact MIT Editor Harrison Donnelly source intelligence analysts share data across agencies, and DoD at harrisond@kmimediagroup.com or search our online archives starts to share or duplicate data, for us to come in and fill in the for related stories at www.mit-kmi.com. gaps with our data has become more necessary as well. Whereas 10 | MIT 17.9
www.MIT-kmi.com
Tactical Posts Offer Mobile Command Army tests systems to enhance a commander’s
ability to lead from anywhere on the battlefield. Brigade and battalion command posts, the heart of battlefield operations, are more mobile and agile than ever before, and through ongoing improvements in network capability, the Army is increasing their ability to move forward in the fight while retaining commanders’ critical situational awareness. Current technologies such as Warfighter Information Network Tactical (WIN-T), Increment 2, the Army’s mobile tactical communications network backbone, and emerging solutions like the Modular Integrated Command Post www.MIT-kmi.com
(MiCP)—a vehicle that efficiently provides networking equipment and power to support a command post—are enhancing a commander’s ability to lead from anywhere on the battlefield. “We are a maneuver unit that has to be mobile, lethal and expeditionary; if we are not able to move with our systems then we are really disadvantaged,” said Colonel Thomas Dorame, commander for 2nd Brigade, 1st Armored Division, the operational unit for the Army’s Network Integration Evaluation (NIE) exercises. “Right now utilizing WIN-T Increment
By Amy Walker 2 and mission command on the move, I am able to extend the operational reach for the brigade, but more importantly, as units continue to move, to make contact with the enemy, we are able to provide them updated information from any location.” As part of the Army’s modular expeditionary force, brigade tactical command posts (TACs) replicate the critical mission command and communication systems found in units’ much larger tactical operations centers (TOCs). Both TACs and TOCs are stationary and don’t possess full MIT 17.9 | 11
operational capability when in transit to new locations. But the TAC’s robust atthe-halt network capability can be torn down, moved and set up in a fraction of the time that it takes to reconstruct the full blown TOC. The smaller TAC’s mission command and communications capabilities are tailorable and scalable and can be rearranged depending upon mission requirements. When the commander needs to move his main TOC forward on the battlefield, he will send the TAC ahead first to retain the unit’s operational network capability. Once the TAC is set up in its new location, the larger TOC can then move forward with minimal disruption to battlefield operations. “WIN-T Increment 2 improves commanders’ flexibility since they can ‘jump’ their TACs and the TOCs much faster now, without loss of situational awareness,” said Lieutenant Colonel LaMont Hall, product manager for WIN-T Increment 2. “They can simultaneously command and control from either location, or from their WIN-T Increment 2-equipped vehicles.” Fielded since 2004, WIN-T Increment 1 provides soldiers with high-speed, highcapacity voice, data and video communications down to the battalion level. WIN-T Increment 2, which began fielding last year, enhances these capabilities by providing an on the move network that extends down to the company level. Both increments are deployed in Afghanistan today as part of the Army’s interoperable tactical communications network architecture. WIN-T Increment 2-equipped TACs and TOCs leverage tactical communications nodes and advanced satellite transportable terminals for satellite communications, which enable them to cover greater distances. In the past commanders could only jump their TACs as far as they could get their line-of-sight radio relay set up, approximately 10 to 15 kilometers. Now with WIN-T Increment 2’s beyond-line-of-sight satellite communications, a commander can move his TAC an unlimited distance, Hall said. “The commander is able to keep full situational awareness at all times,” said Lieutenant Colonel Ernest Tornabell, brigade communications officer for 2/1 AD. “He can go from the stationary TOC or TAC into his WIN-T Increment 2 Pointof-Presence-equipped vehicle, which has virtually everything [communication and 12 | MIT 17.9
TOP: Integrated onto a mine resistant ambush protected vehicle, the Modular Integrated Command Post (MiCP), such as the one shown here during Network Integration Evaluation (NIE) 13.2 preparatory training, was again a system under evaluation at the NIE 14.1 in November 2013 at Fort Bliss, Texas. The MiCP is geared to support the brigade combat team tactical command post (CP) and battalion CP, where mobility and scalability are essential. [Photo courtesy of U.S. Army] ABOVE: The Warfighter Information Network-Tactical Increment 2 Tactical Communications Node (TCN) provides the tactical operations center and tactical command post with communication and networking equipment [line-of-sight and satellite communications] both on-the-move and at-the-halt to battalion and above echelons. While at-the-halt, the TCN is equipped with a 10-meter extendable mast to improve line-of-sight connectivity. [Photo courtesy of U.S. Army/Amy Walker]
mission command capabilities] that he had at the stationary locations; it gives him the ability to be driving on the road at 25 mph and continue to command the fight.”
NIE Results To help incrementally advance network technologies such as WIN-T, the Army leverages the NIEs, which are semiannual, soldier-led evaluations in the realistic operational testing environments of
Fort Bliss, Texas, and White Sands Missile Range, N.M. The Army also uses the events to introduce emerging industry solutions that could potentially satisfy network capability gaps. During NIE 14.1, which wrapped up in mid-November, the brigade TAC was integrated into a new mobile command post based on a light medium tactical vehicle with expandable sides that could be set up or torn down in under an hour, making it even more maneuverable, scalable and agile than the traditional TAC tent. www.MIT-kmi.com
When the brigade TAC was set up in its stationary location, its communication and mission command laptops and screens were connected to the MiCP, an NIE system under evaluation, which provided the servers, network connectivity and power to the TAC. Since the TAC servers were located on the MiCP vehicle, they were always ready to be quickly reconnected with the network equipment in the TAC directly after a jump, instead of having to be torn down and set up again. Integrated onto a survivable MaxxPro mine-resistant ambush-protected vehicle, the MiCP solution significantly reduces size, weight and power requirements. The capabilities of two legacy command post platforms, currently used to provide the necessary communications equipment to operate and support a TOC or TAC, were combined into just one mobile platform. MiCP provides advanced communication through a modern suite of information systems, networking devices and tactical radios, as well as the unique ability to generate electrical power from its own transmission through its On Board Vehicle Power system. MiCP will also be evaluated at NIE 14.2 this spring. “MiCP helps the commander be more flexible in where he can go and how quickly he can set up and establish [operations] at the halt by having to just connect a few cables instead of two sets of vehicles coming to the halt and setting up both of those,” Tornabell said.
Current tactical communication network technologies are increasing commanders’ abilities to move their command posts forward in the fight while retaining critical situational awareness. This brigade tactical operations center at the Army’s Network Integration Evaluation 14.1 in Fort Bliss, Texas, in November 2013 was moved forward in the fight several times. [Photo courtesy of U.S. Army/Amy Walker]
As the Army continues to modernize its network and make it easier for soldiers to learn and operate, the force will increase its agility and ability to conduct current, evolving and future missions. The depth and breadth of information available at soldiers’ fingertips, both in and out of the TOC, is also increasing, facilitating collaboration down to the lowest echelons and across the entire brigade combat team. “Operationally, we want to fight to the fullest extent with our great network and communication capabilities, and now we are able to extend out a lot further,” Dorame said. “We are able to receive back
reports with a better clarity and fidelity to allow commanders at battalion and brigade level to make faster decisions with better resolution and less risk to the overall force.” O Amy Walker is a staff writer for Symbolic Systems, supporting the Army Program Executive Office Command, Control, Communications-Tactical, PM WIN-T and Miltech Solutions. For more information, contact MIT Editor Harrison Donnelly at harrisond@kmimediagroup.com or search our online archives for related stories at www.mit-kmi.com.
Proceed with confidence Enhance and enrich your big-data platforms with LexisNexis® data Be confident that you’re getting the most accurate picture and a deeper understanding of your critical data sets. Expert and comprehensive third-party data services from LexisNexis® support: • Data aggregation and corroboration • Organization and analysis • Comparative modeling and more Download our latest white papers on the usage and benefits of third-party data: www.lexisnexis.com/bigdata LexisNexis and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties Inc., used under license. © 2013 LexisNexis. All rights reserved.
www.MIT-kmi.com
MIT 17.9 | 13
DATA BYTES SATCOM System Transformed for Aircraft Use
Northrop Grumman engineers have taken a satellite communications system normally used in space and transformed it into a high-functioning, low-cost communications system that can be used on aircraft. The SATCOM system was successfully demonstrated on board the company’s Firebird demonstrator aircraft. Until now, no small communications system has been able to send sensor data to a satellite and back to a ground station at such a high rate of transfer. During the demonstration, the SATCOM system rapidly provided full-motion video to the ground. For demo purposes, the system and associated test equipment were housed within a pylon-mounted structure attached to the top of the Firebird fuselage. The system’s small size saves a great deal of space, allowing more sensor payloads and equipment to be carried by the aircraft. Northrop Grumman developed the SATCOM system using Gallium Nitride technology, which allows for high communications output.
Tactical Afloat Network Completed on Missile Destroyer The Navy and Northrop Grumman have installed the service’s next generation tactical afloat network onboard the Arleigh Burke-class guided-missile destroyer USS McCampbell. The installation of the Consolidated Afloat Networks and Enterprise Services (CANES) was completed during the ship’s scheduled
maintenance at a facility in Japan. Northrop Grumman has delivered 11 CANES systems to the Navy, with 10 for guided-missile destroyers and one for a nuclearpowered aircraft carrier. CANES installation aboard the destroyer USS Milius is progressing as part of the ship’s extended drydock availability.
Exelis Spin-Off Creates Government Services Company Exelis has approved a plan to spin off its military and government services business, currently called Exelis Mission Systems, into an independent public company. This business is currently part of the company’s Information and Technical Services segment. Following completion of the spin-off, Exelis will retain a portfolio of mission critical, affordable and platform-agnostic products and services for managing global threats, conflicts and complexities. The business will focus future investments on strengthening its four strategic growth platforms of Critical Networks; ISR & Analytics; Electronic Warfare; and Aerostructures. Exelis Mission Systems will be renamed and rebranded as a new, independent company that provides industry-leading facilities management, logistics and network communications services. As a pure-play services provider, the new company will capitalize on more than 50 years of experience delivering service solutions to a wide range of customers.
DISA Order Supports Multinational Information Sharing The Defense Information Systems Agency (DISA) has awarded a $45 million task order to CACI International to provide design, transition and operations services to the agency’s Multinational Information Sharing (MNIS) Program Management Office (PMO). The MNIS programs provide the infrastructure backbone, centralized network management, common services and core applications for both MNIS classified and unclassified networks. These support and host the Department of Defense combatant commands, U.S. coalition and mission partner communities of interest, and related activities. CACI will provide network engineering and a wide array of other support services to MNIS PMO’s classified networks, as well as providing support to transition all MNIS PMO networks and operations to a DISA Enterprise Service Management Framework. CACI will integrate these efforts to ensure all information technology service management tasks are seamlessly incorporated into MNIS PMO day-to-day activities.
Agreement Provides Ku-Bandwidth for Marine Corps Intelsat General has been awarded a subcontract from TeleCommunication Systems (TCS) to provide managed Ku-bandwidth on Intelsat satellites, in addition to associated teleport and terrestrial services, for the Marine Corps. The TCS contract was issued under the joint Defense Information Systems Agency/GSA Future Commercial SATCOM 14 | MIT 17.9
Acquisition program. Intelsat General is also providing TCS with IGC Sat-View, a customized, encrypted, bandwidth-management-reporting tool that enhances the ability to monitor and manage satellite circuits on the network and includes a scheduling feature to enable a more efficient utilization of assigned satellite bandwidth. www.MIT-kmi.com
Compiled by KMI Media Group staff
Wideband Satellite Reaches 20 Years on Orbit The Defense Satellite Communications System (DSCS) B10 satellite has achieved its 20th anniversary, which represented a significant milestone for the Air Force, in part because the satellite was designed to operate for only 10 years. DSCS B-10 was designed to provide wideband military communications to U.S. Strategic Command users. Following a 1993 launch, the satellite was positioned over the Indian Ocean and served in the active DSCS constellation for more than 18 years before transitioning to a test asset in 2012. Though it was built with 1980s technology, B-10 has provided critical communications service to warfighters throughout various worldwide conflicts that occurred during the past two decades. More recently, contractor and 3rd Space Operations Squadron engineers managed to squeeze even more use from the aging vehicle.
Manpack Radio Production Supports Global Response Force
As it continues to work on finalizing the actions necessary to conduct a full and open competition for the full rate production (FRP) phase of the HMS Manpack program, the Army has requested and received permission from the Office of the Secretary of Defense to increase its low rate initial production (LRIP) authorization for the current AN/PRC 155 Manpack by 1,500 radios, from 3,826 to 5,326, which is less than 8 percent of the Army’s total acquisition objective for the program. The LRIP approval allows the Army to continue fielding the Manpack’s dual-channel communications capabilities to meet the needs of operational units including the 82nd Airborne Division, home to the Army’s Global Response Force, which is prepared to deploy a brigade combat team anywhere in the world within 96 hours of notification. The Army will field the LRIP radios as part of Capability Sets 14 and 15, while simultaneously executing the competition for the next-generation FRP radios. Through a multi-vendor award strategy for FRP, officials said, the Army aims to drive competition at every level and maintain it over the life of the Manpack radio program, in order to reduce system costs and encourage industry innovation.
Cross Domain Solutions Support Rugged Deployed Systems Curtiss-Wright Controls Defense Solutions has announced the expanded capability of its COTS-based solutions for defense and aerospace system designers seeking reliable, cost-effective Cross Domain Guard embedded security for classified information on rugged deployed systems. Curtiss-Wright’s new cross domain solutions include pre-tested and validated support for Radiant Mercury on Curtiss-Wright’s rugged VPX3-1257 3U OpenVPX single board computer, provided under its new System Ready Application initiative. Radiant Mercury, an UCDMO-listed CDS-T Cross Domain Guard software solution, was developed by the Navy and is serviced by Lockheed Martin for industry use. It enables the control and filtering of data transferred between different security domains. www.MIT-kmi.com
Multi-spot Beam Tested Over Wideband Satellite ViaSat has successfully demonstrated full-mesh multispot beam (Fan In/Fan Out) operations over the government-owned Wideband Global SATCOM-1 (WGS-1) satellite with LinkWayS2equipped earth terminals configured with the WIN-T software baseline. This demonstration was a collaboration between the U.S. Army and ViaSat aimed at improving the efficiency of multi spot beam operations over the WGS constellation. LinkWayS2equipped earth terminals in the Guam, Hawaii, and West Coast
WGS beams participated in the week long demonstration. Using a single TDMA carrier, full-mesh connectivity was demonstrated between all traffic terminals, both interbeam and intrabeam. To further demonstrate the flexibility of the LinkWayS2 system, it set up the same connections using multiple TDMA carriers configured in the same bandwidth segment on WGS-1. The system is scalable from one TDMA carrier to multiple contiguous cross-beam TDMA carriers and multiple noncontiguous in-beam carriers.
Army Expands Use of Communications Management Software
PacStar has been awarded a three-year, $6.2 million contract to support the Warfighter Information Network-Tactical Increment 1, thus significantly expanding the use of PacStar’s IQ-Core Software by mobile network communications units across the Army. IQ-Core Software is designed to solve key warfighter communications challenges, including increasingly complex tactical communications being pushed to the edge; staffing and training budget cuts resulting in fewer communications specialists in the field to manage this complexity; and easing the integration of COTS products to accelerate adoption of innovative technologies. IQ-Core Software delivers intuitive communications management by replacing time-intensive, complex and error-prone manual set-up and management processes for battlefield tactical communications systems with configuration wizards that automate both complex and routine tasks.
MIT 17.9 | 15
Naval Networker
Q& A
Getting the Right Information to Commanders to Speed Decisions Rear Admiral Patrick H. Brady Commander Space and Naval Warfare Systems Command U.S. Navy Rear Admiral Patrick H. Brady assumed command of the Space and Naval Warfare Systems Command (SPAWAR) in August 2010. Previous flag assignments included commander of the Naval Undersea Warfare Center, deputy director of submarine warfare, and deputy commander for undersea warfare. Since becoming a member of the Acquisition Professional Corps in 2000, Brady has served as C5I deputy design/warfare requirements manager and subsequently the deputy program manager for the Virginia Class Submarine; major program manager for submarine combat and weapons control; executive assistant to the commander, Naval Sea Systems Command; and major program manager for advanced undersea systems. Brady’s career as a submariner included assignments in USS Lewis and Clark, USS Omaha, USS San Francisco and USS Drum, culminating in command of USS Portsmouth. Brady is a 1981graduate of the U.S. Naval Academy, where he received a Bachelor of Science degree in ocean engineering. Q: How has the concept of information dominance in the Navy evolved, and how would you define its end-state? A: The information age has spawned a new era of warfare in which the information domain, to include the electromagnetic spectrum and cyberspace, has become a center of gravity for the Navy. It is an evolution similar to the historical precedents of submarine development and carrier aviation. Thus, we have made information dominance a war fighting pillar alongside our traditional focus areas of undersea, surface, and air and space. Our Information Dominance Corps combines the capabilities of intelligence, information technology, meteorology and oceanography, information warfare, and the space cadre. Information dominance can be described as the operational advantage gained from fully integrating the Navy’s information functions, capabilities and resources to optimize decision making and maximize war fighting effects. In other words, it’s getting the right information to commanders so they can increase the speed of decision making. With regard to end state for information dominance, I would refer to the “Navy Strategy for Achieving Information Dominance 2013-2017,” and the key tenets of assured command and control, battlespace awareness and integrated fires. Our charge is to deliver the C4I capabilities that support those three tenets for warfighters and fleet operators: 16 | MIT 17.9
Assured command and control • Ability to command and control forces by exchanging orders and responses with subordinates • Understanding the disposition of friendly forces • Targeting and conducting strikes as part of a joint force • Assessing the result of those strikes • C2 enables “what” we do with information. Battlespace awareness • Persistent surveillance of the maritime and information battlespace • Penetrating knowledge of the disposition, capabilities and intent of our adversaries • An understanding of the physical environment and its potential impact on the fight • Expert knowledge of the electromagnetic spectrum. Integrated fires • The use of networks, cyberspace and space capabilities to exploit and attack the vulnerabilities of our adversaries to achieve non-kinetic effects and coordinate them with kinetic effects. Q: What is SPAWAR doing to help make information dominance a reality, especially in collaboration with OPNAV, 10th Fleet/ FLTCYBERCOM and the fleet? www.MIT-kmi.com
A: We work closely with OPNAV N2/N6 and 10th Fleet/FLTCYBERCOM to deliver the information dominance capabilities the fleet requires. Perhaps the clearest example is in our response to urgent requirements set forth by the fleet. Through collaboration with the stakeholders, we have worked to speed the development and acquisition of urgent requirements to match the rapid development of information dominance capabilities and threats. Across the Navy, we’ve made progress toward streamlining these processes and further improvements are underway. The initiative to form a single type commander for information dominance is a good example. The consolidation of the man-trainand-equip oversight functions will not only enhance operations support, but also smooth the acquisition process from a requirements determination perspective, and throughout the development, procurement, fielding and sustainment activities. Q: How would you characterize SPAWAR’s overall role in the Navy’s Information Technology Technical Authority (IT-TA) initiative?
SPAWAR Commander Rear Adm. Patrick H. Brady meets conference attendees at the AFCEA West 2012 conference. [Photo courtesy of U.S. Navy/Rick Naystatt]
A: We’ve historically acquired platforms and systems in a way where the architecture that enables interoperability is an afterthought. Then we try to test in that interoperability as we get ready to field systems. The results were information and communication systems that were built to various standards, and we implemented a variety of solutions to fix these interoperability problems at the end. So what we have in the fleet today are many different systems of systems and configurations that make configuration control a nightmare. It’s impossible to test every configuration for interoperability when we make a change to a system. The result is a sub-optimized portfolio of capability that’s expensive to operate and fraught with vulnerability, both within our domain and across the Navy. To address these issues, the CNO assigned SPAWAR a new mission to complement our systems command and information assurance technology, and charged us to assume IT-TA for the Navy. We worked closely with operational and acquisition staffs and our partner systems commands to develop optimized processes that would efficiently meet afloat and ashore fleet requirements and integrate with platform develop activities. After extensive planning and coordination, SPAWAR established IT-TA for the Navy on October 1, 2013, which will address the shortfalls of IT development and acquisition of the past. We will identify and define the specifications, establish standards and enforce protocols for use on the Navy’s networks. This governance will drive our acquisition processes toward more affordable, maintainable, secure and interoperable IT configurations. Q: Under that initiative, what is your strategy for consolidating network architecture authority under SPAWAR? A: One of the key linchpins of our war fighting effectiveness is that we use information technology in a way that gives us a clear advantage over our adversaries. We also recognize that the way we developed information technology in the Navy was too stove-piped. www.MIT-kmi.com
In order to achieve those information dominance war fighting effects, we had to get our arms around the problem of information technology and how to centralize it more so it becomes the effective war fighting platform the Navy needs it to be. Without a defensible and interoperable IT infrastructure, the Navy can’t achieve an information dominance future. The other part about this too, lingering in the background, is that we’re in a totally different world than we were in even 10 years ago with regard to the cyber-threat and cyber-actors out there. We all see it in our daily lives, both personal and professional, where that cyber-threat environment continues to accelerate. There are some who will say perhaps the next war will start with a series of ones and zeroes and not with a bomb. The question is: How do we defend ourselves against that future? Given that the Navy is so dependent on this IT infrastructure, we’re not going to get there without having some standardization. IT-TA will help the Navy simplify and strengthen architectures for new systems that build on existing programs like CANES, which consolidates five networks into one, to not only create more affordable and sustainable systems, but also improve security against emerging threats. Q: How will this new governance structure impact and support program executive offices? A: IT-TA is critical as our systems grow in complexity to meet emerging requirements anti-access area denial with an increasingly connected force. To manage this complexity while ensuring our sailors can operate and maintain our systems, we need to improve our “information dominance rules of the road” with detailed architectures, engineering standards and streamlined transparent technical accountability. One specific goal that programs strive for is to reduce variance of a common system across a number of platforms. Numerous variants drive security, capability, sustainability and cost issues into the system and detract from readiness. Programs have made progress in MIT 17.9 | 17
reducing the number of system variants in the fleet, and the IT-TA, providing Reference Target Architectures (RTA), will further those efforts and provide the goal for a mission driven system of system artifacts to influence what we acquire across the enterprise—from innovation and design to installation and sustainment. A RTA will set the foundation to trace requirement to dollar spent, and ultimately evaluate our return on investment from a war fighting perspective. SPAWAR IT-TA has the potential to provide an enterprise set of standards that not only align the material solutions, but reduce duplication of engineering efforts and simplify the sustainment of an entire build. Having common design standards across our programs will simplify the training, operation and sustainment of our C4ISR capabilities. This will enable our overarching goal of delivering assigned capabilities for reduced total ownership cost. Hard work remains to build prioritize and define standards and common architectures, but this is critical to our collective success of IT-TA. Q: What is the status of deploying the Consolidated Afloat Networks and Enterprise Services (CANES) to the fleet, when is the full rate production decision expected, and what can fleet operators anticipate upon installation? A: We completed the installation of CANES aboard the Arleigh Burke class guided-missile destroyer USS McCampbell in November. Prior to that, the destroyer conducted sea trials in October to validate how the network would perform in an operational environment and that the network would meet mission needs. This is a key accomplishment because it paved the way for the CANES operational testing platform, USS Milius, which is program’s initial operational test and evaluation platform. This testing is important because it will inform the program’s full deployment decision, which is expected to approve fielding to the remainder of the program’s target inventory objective. That decision is expected in the spring of 2014. Installation of CANES is ongoing in various stages aboard eight guided missile destroyers, two carriers and one amphibious assault ship, so needless to say this is an exciting time. While those programmatic aspects are important for the program’s long-term success, the real benefit I’m excited about is the network and capability improvements for the fleet. CANES represents a key aspect of the Navy’s modernization planning by upgrading cybersecurity, command and control, communications and intelligence systems afloat. The enhanced degree of standardization will reduce the number of network variants by ship class across the fleet. Hardware refresh is planned and funded for every four years, with software refresh scheduled for every two years. This will enable the Navy to keep pace with technology, eliminate the challenges of multiple versions of hardware and software and decrease threats to the network. Information assurance is the foundation used to build CANES, which makes network protection easier and decreases the costs and complexity of training and sustainment. The desired end-state is a more operationally effective, capable network that will ultimately be deployed to more than 190 ships, submarines and Maritime Operations Centers by 2021. Q: In the CANES process, what have been some of the key challenges you have had to address, and what lessons have you learned? 18 | MIT 17.9
A: The required time to complete a CANES installation varies depending upon platform type. Efforts to reduce installation time periods are currently ongoing by incorporating lessons learned from initial installations to maximize efficiencies. The CANES program office is currently working with the installation teams to obtain lessons learned from the various ongoing installations to inform installation timeline reduction efforts. Q: On the other side of the coin, what are the recent developments with the Next Generation Enterprise Network (NGEN) and its transition into service? A: On June 27, 2013, the Department of the Navy (DON) awarded Hewlett Packard Enterprise Services (HPES) an indefinite delivery/ indefinite quantity fixed-priced with award fee contract for NGEN. On July 15, protests of the NGEN contract award were filed with the Government Accountability Office (GAO), and performance of the NGEN contract was stayed as a result. On October 31, GAO denied the protest, enabling DON and HPES to begin work on the contract. A post-award conference was held with HPES in November, and DON has begun to issue task orders on the contract. The NGEN contract specifies a 13-month transition timeline from contract award. Q: Following the Mobile User Objective System-2 (MUOS-2) program operational handover, what can end-users anticipate with the full suite of MUOS capability available? A: The MUOS program reflects the Navy’s deep tradition in space and provides narrowband satellite communications for the entire Department of Defense. It’s important to note that the first MUOS satellite, launched in February 2012 and accepted for operational use by U.S. Strategic Command November 2012, has been providing high quality voice communications for users. The Navy began spacecraft operations MUOS-2 on November 15, and allowed us to begin government technical evaluation prior to commissioning and operational use. The handover also included three MUOS ground stations that will relay voice and high-speed data signals for mobile users worldwide. Plus, the ground system, the networking software and the waveform are all aligning at the same time. Multiservice operational test and evaluation is expected to be completed by June 2014, after which the satellite will be commissioned and accepted by U.S. Strategic Command for operational use. With MUOS-2 in place and operational, users will soon see significantly improved benefits when the full system suite comes on-line. Users will have access on demand, and be able to use the service while on the move and in all environments and weather to talk to beyond-line-of-sight recipients, whether they are on the other side of a mountain or the other side of the world. Services will also be available for platforms such as ships, aircraft and vehicles. Q: How would you define SPAWAR’s role in the Department of Defense’s developing Joint Information Environment (JIE), and how do you see this initiative evolving in the coming years? A: SPAWAR has an active role in the development and implementation planning of the JIE effort. We are focused on the primary JIE www.MIT-kmi.com
goals, which are to resolve barriers to trusted information sharing, collaboration and interoperability across DoD and with nonDoD mission partners, and to enhance security and effectiveness against cyber threats and vulnerabilities. Additionally, we want to do what we can to reduce IT infrastructure costs and work smarter to manage the DoD infrastructure. Right now we are engaged on three fronts: • First, we have an onsite team at the Joint Technical Synchronization Office at Fort Meade, Md., representing Navy’s interests in JIE as DoD strives to integrate the IT and cyber worlds. We have routinely supplemented that team with subject matter experts from SPAWAR sites. • Secondly, SPAWAR, with our systems centers, PEOs EIS and C4I, has been engaged in the implementation planning of the JIE initiative through the development of the Navy’s Information Dominance Enterprise Architecture (IDEA). As such, we have ensured that IDEA is consistent with JIE. • Finally, since Navy is the executive agent for JIE Increment II deployment within the U.S. Pacific Command AOR, we are actively engaged in planning for this event. This includes experimentation objectives, technical analysis, modeling and simulation, and test and evaluation. Q: What is SPAWAR doing to prepare for and respond to the austere budget environment facing the Navy and military, and what
tough choices do you see on the horizon for 2014 as a result of fiscal pressures? A: We will continue to focus our efforts on delivering capabilities that align with Navy priorities and improving the processes that help us accomplish our mission. That’s why we place so much emphasis on efforts like IT-TA, because it not only drives better systems today, but also supports long-term improved capability and sustainability for Navy systems. Regardless of budgetary pressures, we will adjust course as necessary throughout the year to stay aligned with Navy priorities. Q: How can industry help the Navy cope with budget pressures? A: Industry, and especially small business, brings incredible innovation and agility to capability development for the Navy. The technologies central to the programs we develop and deliver evolve very quickly. To keep pace, we rely on our industry partners to maintain the tactical edge for our warfighters. We must also ensure short- and long-term value for each taxpayer dollar. Striking the optimum balance in acquisition is nothing new for defense acquisition and efforts, like DoD’s Better Buying Power 2.0, will help improve the processes to support finding that value. Industry’s support and alignment to the enhancements outlined within this document will benefit the effort to bring valued capability to the warfighter. O
PREPARE FOR YOUR FUTURE AS YOU SERVE U.S. AIR FORCE phOtO. USE OF mIlItARy ImAgERy dOES nOt Imply OR COnStItUtE dOd EndORSEmEnt.
EARN YOUR DEGREE ONLINE FROM ANYWHERE IN THE WORLD IN THE FIELDS OF INFORMATION SYSTEMS, TECHNOLOGY, OR SECURITY. Contact Baker today for a complimentary evaluation of transfer credit and military work experience. See an online class demo at bakercollegeonline.com/demo
Baker College is a member of Servicemembers Opportunity Colleges (SOC), DANTES, GoArmyEd, and CCAF’s AU-ABC program. The college is eligible to receive Federal military and Veteran education benefits.
CALL TO GET STARTED: (800) 469-4062 100% ONLINE
6475BCO_REQ3_R1
REGIONALLY ACCREDITED
NOT-FOR-PROFIT WE’RE IN IT FOR YOU
NO APPLICATION FEE
NATIONALLY RECOGNIZED
LIFETIME EMPLOYMENT ASSISTANCE
GRADUATE SCHOOL
UNDERGRADUATE SCHOOL
bakercollegeonline.com
An Equal Opportunity Affirmative Action Institution. Baker College is accredited by The Higher Learning Commission and is a member of the North Central Association / 30 North LaSalle Street, Suite 2400, Chicago, IL 60602-2504 / 800-621-7440 /www.ncahlc.org. Baker Center for Graduate Studies’ MBA program is also accredited by the International Assembly of Collegiate Business Education (IACBE). For more information about our graduation rates, the median debt of students who completed the program, and other important information, please visit our Web site at www.baker.edu/gainfulemployment.
www.MIT-kmi.com
MIT 17.9 | 19
After extended selection process, Air Force taps 25
companies for key netcentric products acquisition vehicle. After an extended contract selection process and repeated formal protests, the Air Force has settled on a group of 25 companies eligible to provide netcentric products to Air Force customers under the NETCENTS-2 acquisition vehicle. The indefinite delivery/indefinite quantity contract was the object of a hard-fought battle because it essentially represents a “hunting license� for the right to sell a total of up to $6.9 billion of IT equipment and software to the
20 | MIT 17.9
By Harrison Donnelly MIT Editor
Air Force over the next six years. Those selected must still compete for individual task orders. The final resolution came in early November, when the Air Force in response to protests announced addition of nine companies to the 16 already selected, thus including all but one of the 26 companies that had originally sought to participate. The Air Force awarded eight IDIQ contracts under NETCENTS-2 netcentric products in April, and eight additional contracts in August.
www.MIT-kmi.com
The mandatory contract vehicle will provide for commercially available off-the-shelf products to support the Internet Protocol Network, including networking equipment, servers/storage, peripherals, multimedia, software not included on other enterprise licenses, and identity management/biometric hardware and associated software. NETCENTS-2 netcentric products is one of a set of categories of contract capabilities that also includes network operations and infrastructure solutions, applications services, and enterprise integration and service management (EISM). Another proposed category, information technology professional services, is on hold due to resource constraints. The network operations and applications services categories are further divided into separate programs for small business and full and open competition, creating a total of six separate contract vehicles. Of those, three—EISM, acquisition services (small business) and netcentric products—have been awarded. Orders under NETCENTS-1, however, were halted September 30. As a result, Air Force customers for products and services not included under the three awarded NETCENTS-2 categories are having to find other Department of Defense and governmentwide acquisition vehicles to meet their needs.
Prime Relationships Along with the CENTECH Group, Harris, Northrop Grumman, Booz Allen Hamilton, General Dynamics, Lockheed Martin and Telos, NCI Inc. was one of the eight prime contractors under NETCENTS-1. Although not included in the recent netcentric products award, NCI is seen as a strong candidate for inclusion in the upcoming full and open contract for network operations and infrastructure. A recent interview with NCI executives offered insights into the workings of NETCENTS-1, as well as the possible impact on acquisition operations of the changes embodied in the various parts of NETCENTS-2. After working together for nearly a decade, the small group of contractors and the Air Force developed a relationship that functioned smoothly and effectively, according to Greg Hanson, general manager, Enterprise Solutions Sector. “During the nine years of the program so far, we and the Air Force have learned a lot about the way each does business,” said Hanson. “There are eight NETCENTS-1 primes now, and those of us who have been doing this for the past nine years really know the Air Force intimately, and it’s been a good relationship. “The customer has learned the types of capabilities we have, and that we can be agile and flexible with the requirements, which have changed a lot over the past nine years. It’s been a dynamic environment. They’ve learned about all of the primes, which is a large group when you think about the primes and all of their teammates. When you work a vehicle like this, you get to know their desires and mission,” he added. The company had laid the groundwork for success in its responses to sample tasks put forward by the Air Force during the original selection process, observed Kyle Cormack, head of the company’s centralized IDIQ Management Office. “When the
www.MIT-kmi.com
NETCENTS Primes Following three separate announcements by the Air Force, the following companies have been awarded a firm-fixed-price, multiple-award, indefinite delivery/ indefinite quantity contract with a maximum potential value of $6.9 billion for Network Centric Solutions-2 (NETCENTS-2) Netcentric Products: • • • • • • • • • •
• • • • • • • • • • • • • • •
Ace Technology Partners Blue Tech CDW Government CounterTrade Products Dell Federal Systems FCN Federal Networked Systems FedStore Force 3 General Dynamics Corp. Information Technology (Needham Mass.) Global Technology Resources Harris IT Services immixTechnology Insight Public Sector Integration Technologies Group Intelligent Decisions Iron Bow Technologies M2 Technology Micro Tech PCMall Red River Computer Sterling Computers Presidio Networked Solutions UNICOM Government World Wide Technology
MIT 17.9 | 21
awards were made, those of us who were accepted initially already had a baseline set up, where the Air Force knew what to expect from industry and industry knew that we had a good solid baseline. From then, the efficiencies started. “When the task order work comes out, you’re comfortable with your baseline, and the Air Force is comfortable that the primes know how to work on the Air Force IT infrastructure,” Cormack said. “Now we can get creative with how you best work in an environment, where you would staff things differently or bring in resources from vendor partners in a different way. You could do that knowing that the baseline was already set. Over the nine years, we all won some and lost some, and learned from that. Seeing the same kinds of work come up, with sometimes similar and sometimes different customers, we knew what worked and didn’t work.” As veterans of the program when there was only a single contract vehicle and a small group of prime contractors, Hanson and Cormack are alert to both the benefits and pitfalls of moving to a multi-vehicle approach with a relatively large array of contractors. “If you look across the eight NETCENTS-1 primes, they are different, with systems integrators on one end of the spectrum and consulting firms at the other end,” said Hanson. “The requirements went from putting wires into a communications closet on a base to developing high-end software for modeling and simulation, and everything in between. “When they split it up, what they are going to get is more focused companies on each of the areas,” he said. “The Air Force is going to have to divide its requirements up, and there will be more of a burden on them to decide if something is an application, infrastructure or data management deal. They’ll try to let the deal out under whichever one of the NETCENTS-2 contract vehicles is the appropriate one. The benefit is that they are going to get a more diverse group of players to answer their requirements, because when you have eight contractors trying to do everything, you get more of a one-size-fits-all situation than if you have different vehicles. The specialization will be a benefit to them.” But that could have an impact on the speed and efficiency of procurements, Cormack suggested. “If you’re putting three solicitations together instead of just one, and dividing between large and small contracts, will the Air Force be able to use NETCENTS as quickly and efficiently as they have in the past? I’d like to think they will continue to do so, but breaking the contract up could add other variables. “From an interoperability standpoint, if the government is going to one vendor for the hardware and others for application and network support, it is breaking up a contract that might have included all of those areas in one. That creates a potential risk to interoperability. Under NETCENTS-1, associated-contractor agreements were encouraged, and that will be even more important on contracts that are broken up into different sections. You have to make sure that the different vendors cooperate,” he said.
markets, will be participating in NETCENTS for the first time as a prime contractor for the netcentric products category. But the company has extensive experience with other government contract vehicles, according to Vice President of Strategic Programs Jim Dunn, and sees NETCENTS-2 as an important strategic opportunity. Dunn’s observations on the loyalty of the Air Force as a customer may also offer an explanation of why companies fought so hard to win a spot on the contractor list: “The Air Force in particular has a strong history of being loyal to its contract vehicles. So when you win an Air Force contract, it actually means something. They really use these vehicles, and the Air Force announced early on that in many cases the NETCENTS contracts would be mandatory for anything within the scope. So in addition to being another way to solve problems for our customer base, it is also a significant financial opportunity.” The netcentric products category is well suited for Red River’s abilities, Dunn said. “The scope of the contract for this market is a broad range of everything federal IT product related, and that’s also how we would describe Red River. We’re a broad range federal IT hardware integrator. As I look at the primary things the Air Force buys, they align directly with the kinds of things we offer, including mass storage from the major OEMs, such as EMC and NetApp, basic computing devices from companies like Dell and HP, and networking equipment from Cisco and others. Those are our key strengths in the marketplace, and where we see the majority of opportunities within the NETCENTS-2 products contract.” With 25 companies competing in just one category of NETCENTS-2, compared with eight contractors vying for the full range of NETCENTS-1 business, the competitive environment for individual task orders might be expected to be much more intensive. But Dunn observed that the total size of the field is often not a factor. “I’d be lying if I said I wouldn’t prefer there were eight rather than 25 companies competing,” he said. “But we tend to find that, whether there are four or five competitors or 30, the competition almost always ends up being the same. It’s no more difficult to compete with a few companies than with 20 companies, because there are generally only four or five companies on any opportunity that are really competitive and serious.” Dunn pointed to the example of Red River’s participation in the NASA Solutions for Enterprise-Wide Procurement (SEWP) program, a popular governmentwide acquisition contract vehicle focused on IT products and product-based services. “SEWP has 38 contract holders, but on any given deal there are always just a handful of us competing. We just finished 2013 ranked third out of the 38 in that program,” he noted. “Our price competitiveness in the market, willingness to invest in sales resources, and overall reputation will carry us up to the top of the Air Force NETCENTS product sales just as they have in SEWP.” O
Netcentric Opportunity By contrast, Red River, an IT hardware integrator focused on the federal civilian, military, intelligence and health care 22 | MIT 17.9
For more information, contact MIT Editor Harrison Donnelly at harrisond@kmimediagroup.com or search our online archives for related stories at www.mit-kmi.com.
www.MIT-kmi.com
Clearing the Way for Mobile Security Ratification of security guides represents significant milestone in ensuring that mobile devices will not endanger networks. systems is unknown and unproven, particuWith more and more Department of larly since it is difficult to gauge whether or Defense employees utilizing mobile devices, not they are truly secure. the need to clear the way for more selecConsequently, a new streamlined DoD tion and foster procurement is paramount. security certification process Not only must DoD agencies has been set up whereby the ensure that their employees Defense Information Syshave access to mobile devices tems Agency (DISA) acts as a that maintain a reasonable central party within the fedtotal cost of ownership and eral government for reviewgood user experience, but ing and approving the use also the devices must not of third party software and compromise security. hardware solutions. Upon Enter the need for secureview and approval, DISA rity certification. Industry publishes a security techniexperts maintain that many Terry Sherald cal implementation guide competitive mobile device (STIG) that summarizes the approved conplatforms have not been tested in the field figuration and the required third party or subjected to the long-term rigors of products and services to use a device in a high-stress applications, particularly those secure and compliant manner. confronted in DoD. They rely on many “The implication is that due to the third-party applications—some of which new streamlined DoD security certificould introduce their own sets of vulnercation process, new mobile devices and abilities. As a result, the true value of these www.MIT-kmi.com
By Karen E. Thuermer MIT Correspondent systems will be filed more quickly in DoD,” reported Terry Sherald, chief, Information Assurance Standards Branch, DISA Field Security Operation (FSO). Up until now, BlackBerry has traditionally dominated the federal market as the smartphone solution of choice thanks to its government-grade security, high degree of policy control and adherence to critical government certifications. “For more than a decade, BlackBerry has made security and government certification a top priority,” commented Scott Totzke, senior vice president for the BlackBerry Security Group. “Technical certifications are an important first step in meeting the needs of truly secure mobile computing for government personal. Security, reliability and the ability to perform in crisis situations when you depend on mobility are all important hallmarks of the BlackBerry solution.” BlackBerry 7 devices require the use of the BlackBerry Enterprise Server (BES) for MIT 17.9 | 23
STIG for their product using DISA guidelines, and then submits the STIG to DISA for review and approval,” reported Sherald. “In the case of the Apple iOS 6, the STIG was developed in-house using DISA’s legacy STIG development process because the development effort started before the new vendor developed STIG process was fielded.” In fact, the Samsung Knox and BlackBerry BB10 used exactly the same process for STIG development and certification. “Both vendors developed their own Giant Leap STIGs, which were reviewed and approved by DISA,” Sherald said. “The difference This past spring, however, DISA between the Samsung Knox (Android) and approved the STIG for Apple iOS 6 and the Blackberry BB10 operating system was the Samsung Knox (Android), in a move that the Samsung Knox efforts were comthat was widely seen as a giant leap for the pleted prior to the release of the product to multi-vendor environment. the market.” “This means these government-issued The STIGs allow use of accepted devices mobile devices are now approved for use as part of approved mobility pilots with when connecting to DoD networks within actively defended MDM systems. current mobility pilots or the future mobile DISA officials describe the Samsung device management (MDM) framework,” Knox STIG as representing a paradigm Sherald said. shift in DISA’s business processes that With the recent approval of Apple iOS will dramatically increased the efficiency and Samsung Knox devices by DISA, the of bringing new devices into the DoD doors have opened for DoD and other fedenterprise. “To meet the STIG, both the eral agencies to embrace the latest iPhones, Samsung Android Knox and iPads and Samsung Galaxy Apple iOS 6 mobile operatdevices as an alternative to ing systems completed DISA BlackBerry smartphones, required security certificanoted Tyler Lessard, chief tions,” remarked Sherald. marketing officer for Fixmo. In fact, DISA FSO devel“There is significant oped the Samsung Knox pent-up demand amongst STIG ahead of its comgovernment agencies to mercial release, highlightbroaden their use of smarting how close partnerships phones and tablets beyond between government and BlackBerry devices, and Tyler Lessard industry are delivering they now have an approved the latest enterprise technology to meet and standardized framework to do just department needs. that,” said Lessard. “This represents a huge To pass security certification, both opportunity for Apple and Samsung to gain Apple and Samsung products were market share within the federal governreviewed against DoD mobile device secument while also offering DoD agencies an rity requirements. The process started opportunity to expand their use of mobile with the development of a STIG. technologies to better meet their operaAny mobile device or MDM product tional goals.” vendor can complete the same processes, The new STIGs set out security policy and assuming their products meet DoD and configuration requirements for govrequirements, obtain the same certificaernment-issued devices using iOS6 and tions, Sherald stressed. the hardened Samsung Knox Android Both Apple and Samsung worked operating system. closely with DISA for a lengthy period The guidelines do not allow the use of of time to understand their security and personally owned devices. compliance requirements, and to ensure “In the case of Samsung Knox, the new they were able to meet, or exceed, each of DISA vendor STIG development process these requirements through a combination was used, whereby the vendor develops a policy configuration, remote management and data encryption services, according to a company called Fixmo, a mobile security vendor that can enable DoD agencies to meet STIG requirements. In addition to the use of BES, the DISA STIG for BlackBerry 7 calls for the use of various components from Fixmo and its Fixmo Sentinel Integrity Services for device integrity verification and compliance reporting.
24 | MIT 17.9
of out-of-the-box capabilities and complementary third party security solutions. Apple worked directly with DISA on the ratification of the Apple iOS STIG, while Samsung partnered with Fixmo and General Dynamics for the ratification of the Samsung Knox STIG. “While the process was generally the same for both parties, there were very different review processes as Apple iOS and Samsung Knox devices offer completely different hardware configurations, software implementations and requirement for complementary third party cybersecurity solutions,” revealed Lessard.
Compliance and Configuration Earlier, DISA approved the STIG for the BlackBerry 10, Blackberry Playbook and Blackberry Device Service. In making this stride, vendors can now work in getting the latest technology into the hands of soldiers, sailors and airmen more quickly. “BlackBerry successfully passed the new rigorous security certification process, whereby compliance and configuration standards are set by the Mobile Security Requirements Guides developed by DISA,” explained Totzke. “The difference with BlackBerry’s certification is that the configuration and administrative effort required for other solutions is much greater and the user experience is reduced compared to BlackBerry.” For example, BlackBerry Balance technology makes it possible to ensure work information is kept separate and secure so that users’ personal apps cannot access work information, and work information cannot be copied and pasted into personal apps or email messages. “BlackBerry Balance provides the industry’s leading bring your own device (BYOD) solution, combining trusted BlackBerry security with a brand-new usability paradigm that allows users to get the most out of BlackBerry 10,” reported Totzke. Blackberry, in particular, has enjoyed a good relationship with DoD. “For more than a decade, BlackBerry has made security and government certification a top priority, and we are pleased to see our competitors beginning to engage on what we’ve always deemed a necessary first step for military and law enforcement agencies,” remarked Totzke. Particularly critical to passing the new rigorous security certification process are www.MIT-kmi.com
its compliance and configuration standards set by the Mobile Security Requirements Guides developed by DISA. “The difference with BlackBerry’s certification is that the configuration and administrative effort required for other solutions is much greater and the user experience is reduced compared to BlackBerry,” Totzke said. With a reported 470,000 BlackBerrys in use within DoD, compared to 41,000 mobile devices run on Apple iOS and 8,700 on versions of Samsung’s Android OS, BlackBerry maintains the majority of market share for mobile devices throughout the department. “We have a long history and a strong relationship with DoD’s military mobile workforce, and our focus is to consistently develop new and improved products to meet their needs,” Totzke added.
Third Party Solutions Both Apple iOS and Samsung Knox devices require third party enterprise software solutions for managing device configurations, securing and managing the distribution of mobile applications, monitoring and verifying the integrity of the operating system, enforcing multi-factor user authentication, and ensuring all sensitive email and corporate data is protected with strong FIPS 140-2 certified data encryption both at-rest and in-transit. To assist with the effort, Fixmo provides a complete enterprise mobility platform, Fixmo EMP, which addresses each of these requirements across both Apple iOS and Samsung devices in a way that meets all of the security requirements of the DISApublished STIGs. “Additionally, Fixmo offers the Fixmo Sentinel integrity verification solution for both BlackBerry and Samsung Knox devices, which is required as part of the STIG definition for these device types,” Lessard continued. “Fixmo EMP offers a single platform that enables government agencies to expand their mobility deployments to include BlackBerry, Apple and Samsung devices while ensuring they can meet the full range of security requirements specified in each of the mobile STIGs.” In the case of BlackBerry, a single vendor is providing the device hardware, device software and enterprise management software, and as such the STIG process was tightly controlled and defined. In the case of Apple, a single vendor is providing the www.MIT-kmi.com
device hardware and device software, but it requires third party enterprise management software. As a result, the Apple STIG process included inputs from external vendors but was developed directly between Apple and DISA. “Samsung Knox, in contrast, consists of hardware provided by Samsung, device software developed by multiple parties including Google, Samsung, Fixmo, Mocana and others, and it also requires third party enterprise management software,” Lessard explained. “As a result, the Samsung Knox STIG was developed through a more collaborative exercise, and was jointly developed by Fixmo, General Dynamics and Samsung in coordination with DISA. “The Samsung Knox STIG focuses heavily on third party software requirements and proper configuration profiles, and specifies the required configuration of the Samsung Knox device as well as third party software required for device integrity verification, application management, policy control and data encryption with explicit reference to required third party components such as Fixmo Sentinel,” Lessard added. The cornerstone leading to this new process and basis for establishing the list of approved mobile devices to operate within the enterprise is the DoD Commercial Mobile Device Implementation Plan, released in February. In the plan, DISA was tasked to develop a new process for approving mobile devices “to ensure that DoD will have access to the latest mobile technologies in a timely manner by maximizing vendor participation.” “DISA established a process where vendors develop STIGs following DoD Security Requirements Guides and submit documentation and evidence for DISA’s validation,” said Sherald. “We are excited to continue working with other commercial mobile device providers to support a diverse competitive multi-vendor environment.”
Expanding Demand Given these developments, the big news is that DoD agencies can now expand their use of mobile technologies in a safe and compliant manner. “With the right third party solutions in place, DoD agencies can now confidently embrace iPhones, iPads and Samsung Galaxy devices for a growing range of mobile use-cases, including secure browsing, remote document access, and custom
applications for enhanced productivity,” remarked Lessard. “It’s about embracing the right tool for the right job, and ensuring that each agency has a choice when it comes to the types of devices, operating systems and applications that will help them deliver on their mission and improve operational efficiency and effectiveness.” Totzke emphasizes that with DoD moving to a multi-platform environment, BlackBerry will continue to evolve with changing military needs. “BlackBerry Enterprise Service 10 supports remote management of BlackBerry, iOS and Android devices from a single console, and the Secure Work Space addresses the needs of enterprises and governments that want trusted security on their iOS and Android devices,” he said. At the same time, however, IT security tools are critical to maintaining the high degree of security, integrity and compliance that DoD users have become accustomed to with BlackBerry deployments. Totzke argued that with BlackBerry Balance, the company has not only embedded security into the system, it has done so in a way that makes it easy for the user and the administrator and allows security to become a strategic business enabler for government. Lessard stressed that the ratification of the STIGs for Apple and Samsung lays the foundation for a comprehensive set of security requirements for the next generation of mobile computing and mobile applications, and sets an important precedent for how COTS devices can be paired with sophisticated cybersecurity solutions from industry leaders to meet the requirements of DoD security officers as well as the end user of the device. “It’s a great example of how cyber security can act as a true enabler for operational effectiveness,” he said. Still, Sherald points out that integration of DoD Public Key Infrastructure requirements in mobile devices—that is, smart card/CAC functionality—remains a challenge. “In addition, due to the decreasing lifecycle of mobile devices, pressure to continue to shorten the timeline from the introduction of a new device on the market to DoD security certification is a continuous challenge,” she said. O
For more information, contact MIT Editor Harrison Donnelly at harrisond@kmimediagroup.com or search our online archives for related stories at www.mit-kmi.com.
MIT 17.9 | 25
COTSACOPIA
Commercial Off-the-Shelf Technology
Compiled by KMI Media Group staff
High Volume Solution Supports Transmission of ISR Big Data The RT Logic subsidiary of Kratos Defense and Security Solutions has released its SpectralFox technology, an advanced high volume/high data rate solution that supports the rapid, assured transfer of very large amounts of data via satellite for mission critical applications. Targeted particularly for intelligence community and defense uses, but applicable in any scenario that requires rapid, error-free transfer of exceptionally large amounts of high value data, SpectralFox is a unique configuration of antennas, radio frequency devices and related equipment anchored
by RT Logic’s latest high data rate modem and data protection algorithms. SpectralFox has passed data at more than 700 Mbps in the field, the equivalent of allowing one-way transmission of a terabyte of error-free data in less than four hours. This represents more than a tripling of the effective channel capacity beyond other solutions when using the same satellite system. SpectralFox dramatically reduces the time needed to transfer ISR big-data files while at the same time reducing the associated manpower and logistics.
Thin Client Unit Offers Quad-Core Processors The HP t620 Flexible Series Thin Client, is HP’s most flexible thin client and the first to offer quad-core processors in a fan-less design for improved performance and productivity. With the addition of HP Remote Graphics Software and flexible networking options on the HP t620, organizations now can take advantage of the manageability and security benefits of desktop virtualization plus the increased productivity and convenience for teams collaborating on graphically rich applications. With a new fan-less design and preconfigured high-performance processors and software, the HP t620 provides businesses with a powerful and seamless desktop experience, enhanced security features for virtual desktops, desktop as a service, unified communications, and other demanding client virtualization and cloud computing use cases.
Cybersecurity Solution Allows Cross Domain Information Flow A new cybersecurity solution from Lockheed Martin allows intelligence to be securely shared among personnel working at all security levels— from highly classified intelligence sites to unclassified users in the field. This high assurance information solution, called Trusted Sentinel, allows data to be manually and/or automatically transferred between two or more differing security domains by using a single consolidated configuration of hardware and software. Trusted Sentinel supports the secure flow of intelligence data between all clearance levels by ensuring that 26 | MIT 17.9
sensitive information does not escape the highest clearance levels. It also ensures that information traveling back up the chain from un-cleared sources does not contain malicious code that could corrupt secure networks. By incorporating a suite of network protection capabilities that guards classified data from unauthorized access, Trusted Sentinel controls the release of information commensurate with the security level of the information being processed, including clearance level, formal access approval and user need as determined by assigned confidentiality requirements.
Storage Service Offers Pay-asyou-go Operation DLT Solutions and NetApp have launched a storage-asa-solution (STaaS) service— an enterprise-class hardware, software and services solution that combines secure, elastic and dedicated on-premise NetApp infrastructure with a flexible, pay-as-you-go operating model requiring zero capital investment. NetApp creates innovative storage and data management solutions that help customers around the world store, manage, protect and retain their data. NetApp data storage solutions help government agencies simplify the management of growing data while cutting costs by only paying for what they use. STaaS allows government customers to align their storage capacity with frequently changing requirements and mandates. The offering includes components for licensing and hardware, storage consulting and assessments, installations, and managed services.
www.MIT-kmi.com
The advertisers index is provided as a service to our readers. KMI cannot be held responsible for discrepancies due to last-minute changes or alterations.
MIT RESOURCE CENTER Advertisers Index Baker College. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 www.bakercollegeonline.com Kratos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 www.kratosdefense.com/sa LexisNexis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 www.lexisnexis.com/bigdata Sabtech Industries Inc. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 www.sabtech.com University of Maryland University College. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C4 http://military.umuc.edu
Calendar February 4-6, 2014 Cyberspace Symposium Colorado Springs, Colo. www.rockymtn-afcea.org
February 11-13, 2014 AFCEA West San Diego, Calif. www.afcea.org
February 19-21, 2014 AUSA Winter Symposium and Exhibition Huntsville, Ala. http://ausameetings.org/winter
March 10-13, 2014 Satellite 2014 Washington, D.C. www.satellite2014.com
NEVER STOP LEARNING Considering a new degree? Advising your troops on their education options? You need Military Advanced Education’s 2014 Guide to Military-Friendly Colleges & Universities! Check out the searchable database at www.mae-kmi.com for the details prospective students and commanders are looking for! • Access all the survey answers from the hundreds of schools that participated in MAE’s 2014 Guide to Military-Friendly Colleges & Universities • New and improved design makes it easier than ever to find what you’re looking for • Search the database by school name, state, online or brick-and-mortar schools • Compare and contrast institutions with all the info MAE used to score and designate our top schools
www.MIT-kmi.com
MIT 17.9 | 27
INDUSTRY INTERVIEW
Military Information Technology
Charles Croom Vice President of Cyber Security Solutions Lockheed Martin Air Force Lieutenant General Charles Croom (Ret.) is a former director of the Defense Information Systems Agency and commander of the Joint Task Force for Global Network Operations. Q: How would you describe the greatest cybersecurity threats facing the Department of Defense? A: I have both a strategic and a technical answer for that. Strategically, I think we might have overestimated the cybersecurity threat, in that we’ve over-hyped the consequences of a destructive conflict—the cyber-war. But we may be underappreciating the impacts of the intrusions that are going on daily, stealing our nation’s secrets, intellectual property and economic data. Looking at the issue technically, the methods have stayed relatively constant in how they steal our intellectual property or do harm. We’re still seeing email spoofing, thumb-drive issues, fake websites with malware, and denial of service. At Lockheed Martin, what we’re seeing in particular is attacks on our supply system, which have increased. The world is also seeing increased malicious attacks on the network, such as the destruction last year of 30,000 computers at Aramco. In essence, the methods have remained the same, but we have become more sophisticated. Q: What do you see as Lockheed Martin’s most notable accomplishments in the past year in the cybersecurity field? A: I’m most proud of what we’ve done in the thought-leadership area. We have led the defensive capabilities by changing the way we think about cyber-defense. We’ve created an intelligence-driven defense philosophy, and to support that we’ve developed what we call the “Lockheed Martin Cyber Kill Chain” model, a term that we recently trademarked. It turns the world upside down by allowing the defender to go beyond just saying that the offense always has the advantage, or the offense always picks the time and place of an attack and the defender has no opportunity 28 | MIT 17.9
to block it. We now say that the adversary has to take a sequence of steps and execute those steps in a set order, and we have multiple opportunities to stop them. This thought leadership has been our most notable accomplishment, and has led to substantial business opportunities for Lockheed Martin. We’ve won a number of significant pure cyber contracts, including the DISA Global Information Grid Services Management Operations contract, several contracts with classified customers, and our Defense Cyber Crime Center win. We’ve been able to take our leadership, turn it into practical solutions for our customers, and win business. Q: What can the military and the private sector learn about cybersecurity from each other, and what is the most effective way to transfer that expertise? A: The extensive experience and sophistication among the military services and the strong partnership and sharing within the Defense Industrial Base has taught us the value of sharing. And we continue to learn together. The value of the community is that the more information we share, the better it is for all of us. Sharing is becoming automated, and we’re seeing standards being developed by MITRE that allow information to be exchanged machine to machine. It’s about speed, and you want to be ahead of the attack, so the sharing of information through automation and standards of sharing data will only be improved. The advantage of this information exchange is that we will be able to free up resources to move from mundane attacks
to focus more on the advanced and more sophisticated threats. What’s different between the government and the commercial world, at least for the large defense companies, is that the governance of large commercial networks is much tighter than the government networks. We have much stricter rules in terms of what we can do on our networks. Governance is really important, and it’s what I tried to bring to the government networks, across the Army, Navy and Air Force. In the commercial world, we also look at cybersecurity in a risk-management model, so it’s integrated into the other risks that our company faces, and approached at the executive level. That’s a good model for the government to share. Q: Where do you see LM heading in the future in terms of strengthening its cybersecurity capabilities? A: What we’ve learned is that it’s about people first. Talent is very important, so you see great competition for the limited talent that is out there. Because of the scarce resources of talent, Lockheed Martin has searched within the company to find the talent and then provide the appropriate training through our Lockheed Martin Cyber University to allow people to acquire enhanced skill sets. We like the course that we charted earlyon. We created a Next-Generation CyberInnovation and Technology Center that is still active, with more than 100 customers visiting the center this year. It is where we apply our research and development, and where we can work side by side with customers to provide integrated enterprise security solutions. Secondly, we’ve created an alliance that now has 21 member companies, where we’re taking the best of breed from each and integrating the solutions, so that the customer doesn’t get something that is untried. We provide enterprise solutions that are thoroughly tested long before they get to the customer. Also critical is the cyber-range, where we test our solutions’ defensive strategies and integrate solutions for seamless security. O www.MIT-kmi.com
February 2014 Vol. 18, Issue 1
NEXT ISSUE The Voice of Military Communications and Computing
Cover and In-Depth Interview with:
Lt. Gen. Edward C. Cardon Commander Army Cyber Command Features
Big Data for Network Defense The Defense Information Systems Agency’s Acropolis program combines computer network defense data with analysis and workflow tools to provide network situational awareness.
Enterprise Licensing Enterprise software licensing is growing increasingly popular in DoD, with companies such as Microsoft and Google competing to sell office system licenses.
Cyber-Operations Centers Installation Infrastructures The Army Project Manager Installation Information Infrastructure-Communications and Capabilities works with industry to ensure a single Army network from each post/camp/station to the tactical edge.
Industry is offering a variety of solutions and support services to enable organizations to protect their networks, systems, applications and information in real time.
Insertion Order Deadline: January 10, 2014 • Ad Materials Deadline: January 17, 2014
ARM YOURSELF FOR OPPORTUNITY WITH A CYBERSECURITY DEGREE.
To win the battle in cyberspace, we need more cyber warriors. University of Maryland University College (UMUC) has answered the call, educating the next generation of cyber security specialists in the public and private sectors. Our accessible online degree programs have been recognized for excellence by NSA and DHS. And many of UMUC’s courses address industry-standard certifications, including many on the DoD 8570 list. UMUC is affordable, too, with scholarships for those who qualify, interest-free monthly payment plans and participation in the Yellow Ribbon Program. Because the nation’s battle for cyber security can’t afford to be without you.
© 2013 University of Maryland University College
AT YOUR SERVICE SINCE 1947
University of Maryland University College is the nation’s largest public university.
Learn more • 877-275-UMUC • military.umuc.edu/cuttingedge