information sharing strategic vision
DESCRIPTION
Information Sharing Strategic Vision. Mr. Steve Pitcher, YC-3 (GS-15) Chief, Information Sharing Branch Joint Chiefs of Staff J65C. StrategicVision. An integrated global network that enables us to share the right information at the right time so warfighters can act before the enemy acts. - PowerPoint PPT PresentationTRANSCRIPT
1U N C L A S S I F I E D
Advancing information technology capabilities to the warfighter
U N C L A S S I F I E D
Information Sharing Strategic Vision
Mr. Steve Pitcher, YC-3 (GS-15)Chief, Information Sharing BranchJoint Chiefs of Staff J65C
2U N C L A S S I F I E D
Advancing information technology capabilities to the warfighter
U N C L A S S I F I E D
2
StrategicVisionAn integrated global network that enables us to share the right information
at the right time so warfighters can act before the enemy acts
Integration of currently certifiable IA and mitigating processes can enable near term fielding of operationally relevant mission planning with our closest Allies,
and effective mission execution with ALL of our Mission Partners
NOTE: Closest Allies for a given COI are not always traditional 4…
Mission Planningw/Closest Allies
Mission Executionw/All Mission Partners
3U N C L A S S I F I E D
Advancing information technology capabilities to the warfighter
U N C L A S S I F I E D
3
Mission Partner Assured IS Roadmap
PhysicalSeparation2008-2010
HybridSeparation2010-2012
LogicalSeparation2013-2016
CCERAssess Tech, Dev, Test
CENTRIX Consolidation at DECCs
SOANECC & NCES
Integrated Data StorageCrypto Binding IA Metadata
COCOM/COI CENTRICPARTIAL ENTERPRISE
CENTRICENTERPRISE
CENTRIC
CCER at DECCsComplete CENTRIXConverging (incl.
Bilats & Interagency)Role Based Access
NCES
AISEnables:
NECC -> APEX
201
2 F
un
ds
MNIS/AIS AOAMSN Partner IS Conops
Tools for marking/release
PR
09
PO
M 1
0
GRIFFIN / ICI ICI
CFE, ISAF, CNFC, CENTRIX- J / K, Bi-lats…
Non-Classified NetStd, Dev, Test
DOD External Collaboration
CDS Baseline Enterprise CDS
EnterpriseGateways
OB
JEC
TIV
E S
YS
TEM
MNISGIG-IA
Iterative fielding of technologies as they mature and are certifiable, provides improved operational capability at lower overall cost
Info
Sh
ari
ng
I-P
lan
4U N C L A S S I F I E D
Advancing information technology capabilities to the warfighter
U N C L A S S I F I E D
4
UK CWID
NATO CWID
“US” COALITION
CWIDHS/HD
Leveraging CWID “Venues” & CFBLNet for Pre-Deployment
Canada CWID
CFBLNet Infrastructure -for demonstrations, exercises and training (incl. pre-deployment)
In a funding constrained environment…leveraging other capability is key
Must define “Coalition Interoperability Assessment Criteria” start Information Assurance Maturity assessments early, and synchronize assessments (e.g.,
CWID, Empire Challenge, Combined Endeavor, JUICE, DICE,…)
5U N C L A S S I F I E D
Advancing information technology capabilities to the warfighter
U N C L A S S I F I E D
5
Some Things Just Need to be Simpler!
Ju
st-I
n-T
ime
Po
licy
& T
rain
ing
CA
PC
O W
rite
fo
r R
ele
ase
--
De
fau
lt
X
XUNCLASSIFIED
CONFIDENTIAL
SECRET
TOP SECRET
SELECT ONE IF AUTHORIZED SELECT APPROPRIATE MARKINGS FOR
CLASSIFICATION CAVEATS and RELEASABLE TO
NATO
AUS/CAN/GBR/NZ
AUS/CAN/GBR
Australia
Canada
Germany
Japan
Korea
New Zealand
Saudi Arabia
United Kingdom
… Etc.
FOUO Law Enforcement Sensitive
Contract Sensitive
SCI
… Etc.
To be replaced by CUI
NOTE: Intelligence Organization Use -- ONLY
NOFORN (methods, sources, nuclear)
ORCON
… Etc.
For additional information and training on appropriate use of caveats, release and disclosure policy, FDO ROE, and waiver process go to www.classification_answers.mil , or contact your local FDO at (COCOM FDOs contact list with phone/e-mail)
x
x
6U N C L A S S I F I E D
Advancing information technology capabilities to the warfighter
U N C L A S S I F I E D
6
Summary
• Need to creatively integrate certifiable technology, with mitigating processes to allow near term fielding of operationally relevant capability
• Warfighters demand trusted, credible and timely IS
• COI Allies for Mission Planning not always the same…
• Iterative operational improvements…on path to objective
• In a funding constrained environment…CFBLNet ur friend!
• Some things just need to be simpler…need standards
Lots of Moving Parts -- Must Synchronize to be Successful100% Certain None of Us has 100% of the Answers!
7U N C L A S S I F I E D
Advancing information technology capabilities to the warfighter
U N C L A S S I F I E D
7
Questions
8U N C L A S S I F I E D
Advancing information technology capabilities to the warfighter
U N C L A S S I F I E D
8
Notional MP IS Architecture
MNFI
5 Eyesw/C2 & I Apps
GCTFCDS
MNISCENTRIX Cross Enclave Req
Ally A
Ally B
Ally C
Ally …
JWICS
NIPRNET
CDS
CDS
CDS
US to US Sharing of Releasable Info
Reduced Risk
“Most Trusted Partner” Reachback to Similarly Classified & Protected
National Network
Converge physically separated coalition warfighting networks to provide a common suite of information services to all Mission Partners with controlled access to C2/Intell
applications on a common network -- based on country trust and user role
All Others MPCOP, Input ...
US-SIPR
CDS
CDS
CDS
GRIFFINCFE partner
National HQ to HQ Connection
to SIPR
CDS
CDS
Bi-Lat
5 Eyes Only Perishable …
UnclassifiedOperational Networks
StateLocal
NGOs
Foreign
US Only Perishable
• Identity/Access Mgnt• IA Metadata • Attack Sensing & Warning
9U N C L A S S I F I E D
Advancing information technology capabilities to the warfighter
U N C L A S S I F I E D
9
Notional Integration of JISSC & Suite A/B for Tactical Edge
CDS
Ally A
Ally B
Ally …
JWICS
NIPRNET
CDS
CDS
CDS
US to US Sharing of Releasable Info
Reduced Risk
“Most Trusted Partner” Reachback to Similarly Classified & Protected
National Network
US-SIPR
CDS
CDS
UnclassifiedOperational Networks
StateLocal
NGOs
Foreign
• Identity Management• IA Metadata • Attack Sensing & Warning
Mission PlanningSuite “A”
Or Suite “B”Crypto
Mission ExecutionSuite “B”
Crypto
TacticalForces
TacticalForces
TacticalForces
TacticalForces
JISSCA, B & …
Mission Planning requires a greater protection mechanisms to allow for reach back to the “WHY”, Mission Execution requires the sharing of the “WHAT” and the “WHEN”
10U N C L A S S I F I E D
Advancing information technology capabilities to the warfighter
U N C L A S S I F I E D
10
Improved Assessment Process
CWID Services Integration Laboratory Standardized evaluation across all CWID trials Conformity and compliance with DOD defined criteria and specification Data collection, compilation, and analysis to support CWID decision makers
Development of Robust “Coalition” Interoperability and Access Assessment Criteria Current assessment criteria based on “Joint” standards Can’t wait for others -- “drafting best effort” assessment criteria
for use in CWID coalition environment -- Tech & IA Maturity Levels Working with JITC, JSIC, JFCOM, DISA, NSA, …
Synchronization with Empire Challenge, JUICE, DICE, Combined Endeavor, …
11U N C L A S S I F I E D
Advancing information technology capabilities to the warfighter
U N C L A S S I F I E D
11
11
Positive Developments
NSA STEP Analysis: Identified several capabilities to support CCERCWID 08: Initial assessment identified several promising tech and at
least one set that appears to achieve most if not all of CCERGCCS-I3: Migrating to Secure SybaseGCTF Intelligence DB: INSCOM plan to migrate to Secure Enterprise
DataVault (Oracle 10G) by 2010CENTRIXS-M: In FY10 Navy begins fielding workstation convergence to
leverage CCER enterprise servicesTNE Backend: Certified PL4 network environment - Oct 2008
AF ISR and other large user base TNE Frontend: Completed PL4 assessment - May 2009
Includes MS Office products on desktopTadpole: deployable Sun Server $900 laptop thin clients, Type 1 wireless
“Perfect Storm” of technology, policy and process changes merging in FY10 to achieve CCER.
12U N C L A S S I F I E D
Advancing information technology capabilities to the warfighter
U N C L A S S I F I E D
12
Other Mission Partner IS Efforts
Objective MNIS – AoA; depends on SOA, GIG-IA & Net-Centric capability Single Transport Infrastructure (CCER’s CMIL.MIL and ExternalNetIS) Role/Attribute Based Access for ‘COI on the Fly’ (CCER, MNIS/AIS, …) Integrated Secure Data Storage (NSA Jericho, DIA MDDS, Oracle 10G, …) GIG Enterprise Services (NECC/NCES, DECC Consolidation, GIG-IA, …) Other CC/S/A Efforts (ACE, CENTRIXS-M, CANES, BlueSpace, Oracle 10G,
TSol8, MLWeb, CD-CIE, DTW 4.1, MI2, CISA, OB1, …) Enterprise Cross Domain Access Solutions (UCDMO Initiatives) Coalition Warfighter Interoperability Demonstration (CWID) Combined Federated Battle Lab Net (CFBLNet) Griffin (National HQ connectivity) – COP, Web, Chat, … ICI Multinational Interoperability Council (MIC) - WAN DoD/IC Information Sharing (ISS, IS I-Plan, PM-ISE) Commercial Suite B Crypto UCDMO defining standard CDS assessment criteria, processes, …
Lots of Moving Parts -- Must Synchronize to be Successful100% Certain None of Us has 100% of the Answers!
13U N C L A S S I F I E D
Advancing information technology capabilities to the warfighter
U N C L A S S I F I E D
13