C4I Center Of Excellence Annual Research Conference - George Ma

Transcription

C4I Center of ExcellenceAnnual Research Conference George Mason UniversityDoD Chief Information Officer/Assistant Secretary of Defense forNetworks and Information IntegrationJohn G. Grimes19 May 2006Connecting People With Information1Topics of DiscussionThe DoD Transformation to Net-Centricity Background and Scope of Challenge The Path to Achieving Net-Centricity Accomplishments and ChallengesTHE most significant transformation in 50 years –PIONEERS OF THE INFORMATION AGEPartnering is essential to success:Government, Industry, AcademiaConnecting People With Information21

Background and Scope of ChallengeConnecting People With Information3CIO/NII Responsibilities Networks and Net-Centric Policies and Concepts Enterprise-wide integration of DoD information mattersPrincipal Staff AssistantUS Title 10Advise the Secretary Command and Control Communications andInformation Networks Information Assurance RF Spectrum Management Position, Navigation, Timing Non-Intelligence SpaceChief Information OfficerUS Title 40Manage Information Resources Enterprise-level strategist fromthe information perspective Enterprise-wide Informationpolicy Information architect for the DoDEnterprise DoD-wide information executiveAuthorities NII Charter (DoDD 5144.1 May 2, 2005) Section 113, Title 40, U.S.C., (formerly Clinger-Cohen Act of 1996 as amended) Responsibilities and Control MatrixConnecting People With Information42

CIO/NII PrioritiesLead the effort that will deliver the criticalenabling capability required by the NationalDefense Strategy to conduct Net-CentricOperations– Establish a true Information Age CIO– Create a 21st century workforce of InformationPioneers– Ensure “information” is recognized as a criticalstrategic asset– Tell a clear and compelling story of where the ITEnterprise is headed and whyConnecting People With Information5Scope of the ChallengeWorld Wide Defense Enterprise*Info Storage – equivalent of800MB per person on eartheach yearEmail – 31 B sent daily; expectto double by 2006Instant Messages (IM) – 592Bsent daily; expect 1,380B by2007Wireless Technology – over1.5B mobile phone users;expected 2 B by 2007Internet – 1B users in 2005;expect 1.35B by 2007 IT Budget (FY06) – 30BComputers – 5MCAC Cards (issued) – 10MBusiness Processes –thousands (personnel,medical, logistics, etc.)IT Policies – hundredsCountries – 146Locations – 6,000Area – 30M acresBuildings – 600,000Intranets – 3 (NIPR, SIPR,JWICS)*FY06Connecting People With Information63

DoD IT Budget (FY07PB)(dollars in billions)Navy 5.818%Air Force 7.122%Navy 5.719%Defense Wide 10.935%Army 8.025%Defense Wide 10.434%Air Force 7.223%Army 7.524%FY 2007 30.9FY 2006 31.9Connecting People With Information7DoD IT Budget (FY07PB)(dollars in billions)BusinessSystems 4.515%Other 1.03%InformationAssurance 2.37%Comms &ComputingInfrastructure 14.347%WarfightingSystems 8.828%FY 2006 31.9InformationAssurance 2.06%Comms &ComputingInfrastructure 14.145%Other 1.03%BusinessSystems 4.715%WarfightingSystems 10.031%FY 2007 30.9Connecting People With Information84

Bottom Line Up FrontOur current system: Cannot communicate across stovepipes– Need Cross-Domain Solutions Cannot meet spiraling information demands– Must be Scalable Cannot support unanticipated needs and users– Demands Agility and FlexibilityWe need a new approach.Connecting People With Information9Path to Achieving Net-CentricityConnecting People With Information105

Transforming National Defense -- Net-CentricNational Security StrategyTransform America’s national security institutions tomeet the challenges and opportunities of the twentyfirst century.National Defense StrategyWe will conduct network-centric operations withcompatible information and communications systems,usable data, and flexible operational constructs.Beyond battlefield applications, a network-centricforce can increase efficiency and effectiveness acrossdefense operations, intelligence functions, andbusiness processes.Transforming to a network-centric force requiresfundamental changes in process, policy, and culture.National Military Strategy.creation of a collaborative information environmentthat facilitates information sharing, effectivesynergistic planning, and execution of simultaneous,overlapping operations. on demand to defensepolicymakers, warfighters and support personnel.Connecting People With Information11Context for Net-Centric Operations“Uncertainty is the defining characteristic of today’s strategicenvironment.” (National Defense Strategy)Challenge – UNCERTAINTY– Leave behind the reasonable predictability of the past– Adjust to an era of surprise and uncertainty“We have set about making US forces more AGILE and moreexpeditionary.” (Quadrennial Defense Review)Response – AGILITY– Enterprise-wide: Battlefield Applications; Defense Operations;Intelligence Functions; Business Processes– Capabilities Based: Access, Share, Collaborate– Fundamental Changes: Process, Policy, Culture– Emphasis Shift: From moving the user to the data – to moving data tothe userConnecting People With Information126

Defining Net-CentricityPeople, processes, and technologyworking together to enable timely:– ACCESS to information– SHARING of information– COLLABORATION among those who needit mostCan Only Be Done on The Net!Connecting People With Information13“I can get the information I need”When I need itWhere I need itHow I need itNet-Centric Information EnvironmentBetter Decisions Faster -- Decisive Actions SoonerConnecting People With Information147

The SituationCurrentNet-CentricInformation stovepipesShared information“Welded” interfacesUnconstrainedPredetermined needsAccommodate uncertaintyFixed display formatsUser-Defined info and formatsNeed to knowNeed to share; right to knowRigidAgileConnecting People With Information1501NOV05/0053An Information Age Approach to Net-CentricityToday’s Approach:Segregated StovepipesUser “gets what he gets”Transformed Approach:Shared SpaceUser “takes what he needs” and“contributes what he knows”Fundamental Shift: Requires ENTERPRISE, not stovepipesRequires ACCESS, not exclusivityRequires TRUST Trust in the System (availability) Trust in the Information (assurability) Trust in the Participants (identity)Key to Success: Leverage Web & IP-based TechnologiesConnecting People With Information168

Net-Centric Framework Data Strategy:– How to “share” the data Enterprise Services:– How to “access” the data Information Transport:– How to “move” the data Information Assurance:– How to keep it “dependable” Network Operations:– How to “manage” the systemData: Discoverable, Accessible, UnderstandableConnecting People With Information1701NOV05/0050Critical Technology EnablersIPv6 Supports proliferation of IP-addressedapplications/devices, and “comm on themove” DoD Transition Strategy:– Tech RefreshMobile Communications Provides network entry device forindividual users at the tactical edge DoD JTRS Program:– Joint Program Office established– Form-factors being developedVOIP Increases flexibility/capacity throughbroadband Internet connection; allowsfor converged voice and data on thesame network DoD Initiatives:– Developing standards to end-to-endVOIP capabilityService-Oriented Architecture Establishes easy-to-use services toaccess, share and collaborate DoD Strategy:– Acquire commercially managedservice (NCES goal)Satellite Communications Enables real time connectivity, high datarate, ISR exfiltration, and comm on themove DoD TSAT Program Restructure:– IOC 2013; 4 on orbit 2017Information Assurance Assures DoD’s information, informationsystems, and information infrastructure DoD Strategy:– Fundamental shift from “walls andpatches” to “secure from the start” DoD Initiatives:– Build IA architecture– Expand partnership with industryfor IA R&DConnecting People With Information189

Accomplishments and ChallengesConnecting People With Information19Accomplishments Information Age Chief Information Officer (CIO)established Bandwidth Expansion at 80 DISN sites in support ofthe Global Information Grid Information sharing strategies institutionalized Enterprise Wide System Engineering strategy andplan Key technologies advances Information Assurance Component of the GIGEnterprise Architecture Portfolio Management initiated Community of Interest Pilot programs and capabilitydemonstrations Scholarship programs to grow new talentConnecting People With Information2010

Information Technology - Specific Challenges Transport Programs Spectrum Management Joint Tactical Radio System (JTRS) ProgramRestructure Enterprise-Wide System Engineering Communications on the Move Information Assurance Transformational Programs – Development Risk– Net-Enabled Command Capability (NECC)– Net-Centric Enterprise Services (NCES)– GIG Information Assurance Program (GIAP)– Transformational Satellite (TSAT)Connecting People With Information21Information Assurance - Specific ChallengesSPECIFIC ISSUES: Maturing and implementation of the IA architectureCross Domain Solutions with IA technologiesPublic Key Infrastructure / Identity ManagementInformation Assurance ToolsIA-related requirements and acquisition processVulnerability assessment plans/toolsIA gaming and exercisesPersistent monitoring and intrusion detectionCommercial IA practicesMetrics and assessment toolsTraining and educating the workforceTAKE AWAYS: Maintain consistent focus on securing national securitysystemsFocus on new/broader threats to information, networks, andinfrastructureConnecting People With Information2211

Skilled IT Workforce – Specific Challenges2/3 of Civilian IT Population in 3Communities168 K DoD IT WorkforceAll OthersIncludes:34%Computer Scientists(3,915)Communications Mgmt(3,059)Ops Research Analyst(2,864)Computer K)27,0655,851ElectronicsTechnician8%27,826IT ManagementSpecialist 36%81% of Military IT WorkforceIs 56,243SELRESActiv e0Information Assurance Workforce Training and Certification Program DoD lead in IA certification efforts in Federal Government Collaborating with Department of Homeland Security (DHS) toestablish national IA standardsInformation Assurance Scholarship Program (IASP)20,00040,00060,000Information Technology Exchange Program (ITEP) Flexibility to access private sector experts to address critical, realworld IT issues in a dynamic technological environment Improve critical IT Management competencies in DoD civilian ITworkforceIT Management Specialist (2210 Series) Identification Recruit/retain top performers in IT disciplines (with IA focus) to fillcritical military/civilian positions within DoD Capability to rapidly identify personnel with critical skills foremergencies and/or emerging defense requirements Bachelors/Masters/PhD students attend Centers of AcademicExcellence in IA Education (e.g., Carnegie Mellon, Johns Hopkins,GW) Monitor workforce trends to develop targeted recruitment,retention, and compensation policiesConnecting People With Information23Private Sector Support We continue to need your ideas and initiatives– Most important single thing is for more securecommercial products, practices and services– But contributions welcome in every area We need YOU– Help us solve our most pressing IA and technologyissues– Help us excite and attract the needed future talent Need to bring more youth now into public service Baby Boomers beginning to retire– Help us make this real all of our futures depend on itConnecting People With Information2412

Our Nation’s SecurityConnecting People With Information2513

Net-Centric Agile 01NOV05/0053 16 Connecting People With Information An Information Age Approach to Net-Centricity Fundamental Shift: Requires ENTERPRISE, not stovepipes Requires ACCESS, not exclusivity Requires TRUST Trust in the System (availability) Trust in the Information (assurability) Trust in the Participants (identity)