Chapter 16. Army Knowledge Management

Size: px
Start display at page:

Download "Chapter 16. Army Knowledge Management"

Transcription

1 Chapter 16 Army Knowledge Management Section I Introduction The Army Knowledge Vision - A transformed Army, with agile capabilities and adaptive processes, powered by world class network-centric access to knowledge, systems and services, interoperable with the Joint environment Transformation Strategy a. The Army is undergoing its most fundamental change in over a century while still being fully dedicated to the global war on terrorism. Army Transformation is all about transitioning from information-based to knowledge-based operations. Achieving the Army Knowledge Vision will provide the ability to achieve decision superiority and take decisive action across the spectrum - this includes both the tactical and institutional Army. b. The Office of the Army CIO/G 6 continues to work toward the Enterprise vision of a single Army network, one Enterprise Army portal, and universal access to Army knowledge, managed by the U.S. Army Network Enterprise Technology Command/9th Army Signal Command (NETCOM/9th ASC). AKO, the Army s knowledge portal, has grown to over one million soldier and civilian registered users. Through the leadership of the Army CIO Executive Board (EB), strong governance procedures for the Enterprise control of our command, control, communications, computers/information technologies (C4/IT) budget have been institutionalized, information management organizations have been realigned, and the Army Knowledge Enterprise Architecture (AKEA) has been defined. c. Army Knowledge Management (AKM) is the comprehensive strategy to transform the Army into a net-centric, knowledge-based force. The strategy consists of a robust set of goals and objectives, which once achieved, will improve the decision dominance of our tactical commanders and our business stewards. These goals and objectives concentrate on managing the information technology (IT) infrastructure as an Enterprise in line with the Global Information Grid (GIG), with a view toward reducing the resource and equipment footprint and creating ubiquitous access through AKO as the Enterprise portal to knowledge centers, functional applications and network services. The use of best business and governance practices and the emphasis on innovative human capital strategies are key goals of AKM. d. The AKM strategy enables transformation to the Future Force and is based on a framework that includes: a robust infostructure, effective applied intellectual capital, and change catalysts required to enable transformation. Infostructure: The IT (computers, software, architecture, security, communications, programs, and facilities) required to support the network-centric Army. Intellectual Capital: Individual, team, and Enterprise knowledge, systems, and services, and workforce strategies that are necessary to improve operations and decision-making. Change Catalysts: The policies, resources, management, culture, processes, and education that are required to optimize and adaptive organization and Enterprise net-centric environment Implementation a. The implementation of AKM means: (1) The infrastructure must accommodate faster processing capabilities and dissemination of requirements; (2) The Enterprise-wide system must be easily accessible with net-centric processes and services available through a single portal; (3) The information that leads to knowledge must be well organized and structured through content management; (4) The ability to generate knowledge requires the transfer and sharing of knowledge across the Enterprise using such techniques as collaborative processes, virtual teams, and communities of practice; and (5) We must recruit, train, and retain an interdisciplinary workforce (soldiers and civilians) empowered to share knowledge. b. The implementation of AKM at the strategic, operational and tactical levels of war means designing and fielding an Enterprise information infrastructure capable of increased data distribution and faster processing. The AKM strategy defines the AKEA framework to achieve a knowledge-based, network-centric Enterprise that uses advanced Command, Control, Communications, Computers and Intelligence, Surveillance and Reconnaissance (C4ISR) capabilities to improve its warfighting capabilities at the tactical level. Unlike the former Army Enterprise Architecture construct, the AKEA encompasses the full spectrum of both the tactical, operational and strategic levels of war by incorporating the tactical and functional applications, computing services and communications networks into virtually one network with a single access to the Army s knowledge centers. c. The Army CIO/G 6 provides Enterprise management of the AKEA through NETCOM/9 th ASC, the Army s single authority to operate, manage, and defend the Army s infostructure at the Enterprise level. NETCOM/9 th ASC 367

2 exercises technical control over regional CIO offices in coordination with the Installation Management Agency (IMA) to provide management and oversight of installation operations. Section II Chief Information Officer (Cio)/G 6 roles and responsibilities Clinger-Cohen Act (CCA) a. L a w. T h e C l i n g e r - C o h e n A c t, f o r m e r l y k n o w n a s t h e I n f o r m a t i o n T e c h n o l o g y M a n a g e m e n t R e f o r m A c t (ITMRA), Public Law , directs that each executive agency appoint a CIO who reports directly to the head of the agency. The law requires: Development of information resources management using a reliable integrated technology architecture. Promotion, design, and operation of a major information resources management process monitoring IT for the agency. Assessment of personnel to achieve the requirements of the information system. b. CCA Objectives. The CCA increases the SECARMY responsibility, authority, and accountability for the use of IT and other information resources in performing Army missions. The National Security Systems provisions of the CCA include the CIO responsibility for any telecommunications or information system operated by the U.S. Government, the function, operation or use of which involves: intelligence activities; crypto-logic activities related to national security; command and control (C2) of military forces; or, equipment that is an integral part of a weapon or weapons system. The CCA emphasized the importance of completing effective planning, analyzing processes, and, where appropriate, improving processes before applying C4I/IT solutions to known requirements. The CCA requires a process for maximizing the value, managing, and assessing the risks of IT acquisitions. The entire text of the CCA can be viewed at c. Army CIO Responsibilities. The Army CIO is the functional proponent for Command, Control, Communications, Computers and IM (C4/IM) and maintains Enterprise policy, guidance, oversight, and resource management for all Army C4/IM efforts and also serves as the principal advisor to the SecArmy and Chief of Staff, Army (CSA) and other Army senior leaders on all matters related to managing and overseeing the Army-wide implementation of CCA mandated functions. This includes providing direction and guidance for the Transformation of the Army into a netcentric, knowledge-based Enterprise and force. Focus areas within the CCA follow: (1) Business process analysis/improvement. (a) Sec. 5113(b)(2)(C):...analyze the missions of the executive agency and based on the analysis, revise the executive agency s mission-related processes and administrative processes, as appropriate, before making significant investments in IT to be used in support of those missions... (b) Sec. 5125(b)(3): Promote the effective and efficient design and operation of all major information resources management (IRM) processes, including improvements to work processes. (2) Information assurance. Sec. 5113(b)(2)(D):...ensure that the information security policies, procedures, and practices are adequate. (3) Information resources management. (a) Sec. 5125(b)(1): providing advice and other assistance to the head of the executive agency and other senior management personnel of the executive agency to ensure that IT is managed for the executive agency... (b) Sec. 5125(b)(3):...promoting the effective and efficient design and operation of all major information resources management processes for the executive agency. (4) IT architecture. Sec. 5125(b)(2): developing, maintaining, and facilitating the implementation of a sound and integrated IT architecture for the executive agency. (5) IT acquisition oversight. Sec. 5125(c)(2):...monitor the performance of IT programs of the agency, evaluate the performance of those programs on the basis of the applicable performance measurements, and advise the head of the agency regarding whether to continue, modify, or terminate a program or project; (6) Capital IT investment control. Sec. 5125(c)(2):...monitor the performance of IT programs of the agency, evaluate the performance of those programs on the basis of the applicable performance measurements, and advise the head of the agency regarding whether to continue, modify, or terminate a program or project. (7) Professional development and training. (a) Sec. 5125(c)(3)(A): Assess requirements established for agency personnel regarding knowledge and skill in IRM and adequacy of such requirements for facilitating achievement of the IRM performance goals. (b) Sec. 5125(c)(3)(B): Assess the extent to which the executive and management levels of the Army meet the IRM knowledge and skills requirements. (c) Sec. 5125(c)(3)(C):...develop strategies and specific plans for hiring, training and professional development in the areas of IRM and IT. d. CIO/G 6 Responsibilities. The CIO reports directly to the Secretary but also provides staff support to the CSA. 368

3 The CIO serves as the G 6 for all matters concerning information and signal operations, network and communications security, force structure, equipping, and employment of signal forces. (1) Information and Signal Operations. (a) Manages and controls the use of information network capabilities and network services from the sustaining base to the forward-most fighting platforms. (b) Manages radio frequency allocations and assignments and provides spectrum management. (c) Recommends signal support priorities for force information operations. (d) Recommends locations for command posts within information battle space. ( e ) M a n a g e s a l l s i g n a l s u p p o r t i n t e r f a c e s w i t h j o i n t a n d m u l t i n a t i o n a l f o r c e s, i n c l u d i n g h o s t n a t i o n s u p p o r t interfaces. (f) Manages the command frequencies lists. (g) Manages communications protocols, and coordinates user interfaces of Defense Information System Networks (DISNs) and command and control systems down to battalion tactical internets. (h) Ensures redundant signal means are available to pass time-sensitive battle command information from collectors to processors and between medical units and supporting medical laboratories. (2) Force Structure, Equipping and Employment of Signal Forces. (a) Manages employment of signal forces to support current/near term operations. (b) Plans signal support structure for future systems Army Knowledge Management (AKM) a. Knowledge management provides the Army with overall strategy, oversight and guidance in the area of AKM development and implementation at the Enterprise level and facilitates the transformation of the Army into a worldclass, net-centric organization with access to agile and adaptive knowledge, systems and services. The CIO/G 6 manages and oversees the integration of AKM goal efforts across the Army while promulgating Enterprise solutions through managing knowledge goals, objectives, and C4/IM enabled solutions for the Army. As the functional proponent for AKO, the CIO/G 6 determines and integrates Enterprise resources, plans and policy requirements. AKM brings to the Army streamlined functional operations, the collaborative e-business model, new horizontal and virtual governance structures, evolving new technologies, and an empowered, knowledge-generating workforce. AKM goals will be achieved through active participation at every level of the Army. b. AKM goals will be worked in parallel, not sequentially, to ensure maximum and optimal transformation. Goal 1: Adopt governance and cultural changes to become a knowledge-based organization. Goal 2: Integrate knowledge management concepts and best business practices into Army processes to improve performance. Goal 3: Manage the infostructure as an Enterprise to enhance capabilities and efficiencies. Goal 4: Institutionalize AKO as the Enterprise Portal to provide universal, secure access for the entire Army. Goal 5: Harness Human Capital for the Knowledge-Based Organization Army CIO Executive Board (CIO EB) a. The Army CIO EB was chartered in April 2001 and serves as an executive forum to advise the Army CIO on the full range of matters pertaining to IM/IT in accordance with the CCA (Public Law ) and other related legislation and Federal directives. The EB is currently composed of executive-level membership from the Headquarters, Department of Army principal staff and MACOMs. The EB meets on a quarterly basis and also conducts its business between quarterly meetings using its private collaboration Web site located behind the AKO. The meeting minutes of the Army CIO EB are available within the AKO collaboration center at Army Communities/Army CIO/G 6/AKM/CIO Executive Board/CIO Exec BD (public)/previous meetings. b. The purpose of the EB is to involve Army senior leadership from across functional areas in the implementation of the CCA and to identify and resolve Enterprise level issues related to Army CIO responsibilities. The EB identifies opportunities, makes recommendations for, and sponsors cooperation in using information resources. The EB coordinates with the DOD CIO EB and the Federal CIO Council on matters of mutual interest. c. The EB functions are identified as follows: (1) Management Oversight. Advise and make recommendations to the Army CIO on overall Army IM/IT policy, processes, procedures, standards, priorities, and resources, as appropriate. (2) Alignment of IM/IT and Army Missions. Ensure that IM/IT programs and systems are strategically aligned with Enterprise-wide Army missions, strategic plans, and initiatives, such as the Transformation and the QDR. (3) Functional System Integration. Advise and make recommendations to the Army CIO on policies and procedures that will enhance the Army CIO s oversight and integration of IM/IT programs and systems within and across functional areas to include the horizontal integration of technology. Identify Enterprise level CIO challenges that cross functional boundaries and make recommendations to the CIO regarding resolution of those challenges. 369

4 (4) Resource Allocation Process. Recommend measures to strengthen integration of the IT capital planning and investment process with the PPBE process. In addition, review IT funding and program issues and make recommendations on investment priorities and resource alignments in the context of the PPBE process. (5) Knowledge Management. Promote and support knowledge management concepts and initiatives throughout the Army. Identify and resolve issues relating to Enterprise knowledge management programs. (6) Acquisition Process. Advise the Army CIO on program synchronization and standardization issues resulting from program and portfolio reviews. Recommend appropriate IT program and acquisition actions. (7) Interoperability, Information Assurance or Communications and Computing Infrastructure Reviews. Advise and make recommendations to the Army CIO on issues of interoperability, information assurance, and communications and computing information systems infrastructures. (8) Human Resources Management. Recommend and support strategies for recruiting, retaining, and training IM/IT personnel across the Army. (9) Architecture Management. Assist the Army CIO in ensuring that processes are in place to enforce standardized use, management, and control of architectures. (10) Process Improvement and Performance Measures. Share experiences, ideas and promising practices including work process redesign and the development of performance measures, to improve the management of information resources. Recommend and promote results-based performance measures and best practices that strengthen and optimize links between IM and Army missions, and improve Army mission performance. (11) Electronic Business Operations. Recommend measures that will promote, enhance, and safeguard the use of electronic business techniques and technologies throughout the Army in such areas as biometrics, smart cards and other secure electronic transactions devices. (12) Other Business. At the option of the Chair with advice of the Board, address any areas and issues not specified above. d. The EB is supported by several working groups and committees which consider items of concern and conduct research, analyze processes, and recommend solutions to issues if interest. One of those working groups, the CIO Integration Governance Group (CIO IG2), provides a governance structure to coordinate the current working groups and committees and assist Board members in receiving timely updates on issues and recommend actions. The CIO IG2 is composed of the working group chairs and the coordinators for the EB members. Figure Investment Strategy Working Group Process 370

5 16 6. C4/IT Inversement Strategy a. The efficient and effective use of information technology (IT) resources has a direct impact on the Army s ability to perform its missions. The Army CIO/G 6 manages C4/IT investments and develops a coordinated, consolidated investment strategy. The Capital Planning and Investment Management (CPIM) process develops the C4/IT Investment Strategy, recommending a prioritized list of C4/IT investments and/or whether to continue, modify, or terminate a C4/ IT program/project according to mandates from the Clinger-Cohen Act (CCA). The recommended prioritization listing is a reference and support tool within Program Evaluation Groups (PEG) throughout the PPBS and acquisition processes. The prioritization process addresses capability gaps, investment risks, IT interdependencies and timing issues across all areas of IT investments. b. In line with the legislative direction of the CCA and Government Performance and Results Act (GPRA), the CPIM process. Provides for the selection of IT investments, the management of the investments, and the evaluation of the results of such investments; Is integrated with the processes for making budget, financial, and program management decisions; Includes minimum criteria to be used in considering investment in information systems/it, including criteria related to the quantitatively expressed projected net, risk-adjusted return on investment and specific quantitative and qualitative criteria for comparing and prioritizing alternative information systems investment projects; Provides for identifying information systems investments that would result in shared benefits or costs; Provides the means for senior management personnel to obtain timely information regarding the progress of investment in an information system, including milestones for measuring progress in terms of cost, capability of the system to meet specified requirements, timeliness, and quality. c. The central piece in the development of the CPIM process is the formalization of an IT portfolio for the Army, wherein all IT related investments are documented and reviewed in line with CCA mandates. The CPIM portfolio is structured with three sub-portfolio areas, each with corresponding investment areas: Enterprise Enablers: Architecture, Information Assurance, NETOPS, and Army Knowledge Management Communications and Infrastructure: Battlefield Communications and Network Management, Satellite Communications, and C4/IT Infrastructure Functional Applications: Soldier Education and Training, Focused Logistics, Personnel Management, and Battlespace Awareness d. Structuring the portfolio with three sub-portfolios enables the analysis of funding requirements and recognizes interdependencies and fielding timelines in each area. This structure enables a complete portfolio analysis with the product being a funding prioritization list for C4/IT investments. e. The CPIM process requires executive level officials to monitor and approve their recommendations. The Army CIO reviews, modifies and approves the CPIM prioritization recommendations in the development of the C4/IT investment strategy. The CIO develops relationships with other key decision makers in the budget process, advising them on the CPIM Strategy and making the best use of IT resources in line with building the Army Enterprise. f. The CIO Investment Strategy, as depicted in Figure 16 3, is developed through collaborative efforts of the Army s multi-functional community of C4/IT stakeholders, including Joint representation, to collectively determine the best value investment solutions for the Army s most critical C4/IT requirements. The process incorporates strategic reviews, performance measures, capability gap assessments, risk assessments, and interdependency assessments for the multitude of potential IT investments. The CIO/G 6 depends heavily upon subject matter experts within each investment area for the critical analysis and review of proposed IT related investments, and for each of the investment areas, an Investment Area Leader is identified. To ensure accuracy and completeness of all information presented, it is critical that the Investment Area Leaders maintain close, cooperative relationships with key players in their respective communities, including: PEG Representatives and CIO/G 6 representatives to each PEG Program Managers and Subject Matter Experts (as appropriate) Battlefield Operating Systems and Functional Representatives Army Budget Office, G 3 and G 8 leadership (as appropriate) MACOM & RCIO Representatives (as appropriate), including NETCOM/9 th ASC, Reserves and Guard Representatives from other CIO/G 6 offices, as required g. The CPIM process is a tool to facilitate the development of an IT resourcing strategy. When implemented, the process makes the best use of resources in meeting the diverse requirements of the Army. The process is a long-term 371

6 solution for the prioritization of the Army s IT-related investments, providing links to the DOD Portfolio Management Process. Section III Army Enterprise Management Army Enterprise Management The Army is an extremely large organization, spread throughout the world, accomplishing missions that span a range from warfighting, to civil affairs, to humanitarian efforts. The challenge we face to become a net-centric, knowledgebased force requires that we manage the IT infostructure across this vast spectrum of activity. Our networks, systems, and information need to be Enterprise-based, accessible, seamless, reliable, secure, and deployable wherever we might go. Our efforts to meet this challenge required the realignment of organizations (see Figure 16 2) and the establishment of others to focus our efforts to implement transformation. Figure Operational relationships a. NETCOM/9th ASC. (1) NETCOM/9 th ASC, a direct reporting unit to the CIO/G 6, serves as the single authority assigned to operate, manage, and defend the Army s Infostructure at the Enterprise level. The mission of NETCOM/9 th ASC is to deliver seamless Enterprise level C4 and information technology, common user services, and signal warfighting forces in support of the Army, its Army service component commanders (ASCCs), and the combatant commanders. (2) NETCOM/9 th ASC executes its mission within an Army Enterprise framework and the global command presence of subordinate theater signal commands and brigades. The senior signal commander in theater, who is linked to the Army Enterprise through a command relationship with NETCOM/9 th ASC, is also dual-hatted as the Army Service Component Command (ASCC) CIO/G6 and is under the operational control of the ASCC Commander. It is at the theater level that the fusion of battlefield operating systems occurs (with local, theater, and national assets) to support the ASCC, and the theater network must be scalable, tailored and fully integrate strategic and tactical network formations. 372

7 (3) To ensure adherence to joint and Enterprise standards, NETCOM/9 th ASC has technical control and configuration management authority for the LandWarNet. In addition, to assure effective integration and global mission execution, NETCOM/9 th ASC/9 th ASC is assigned the responsibility for force structure, resource management, personnel management, training, commercial off-the-shelf (COTS) technology sustainment, and equipping for the Army s worldwide strategic and theater tactical signal forces. The US Army Signal Center, a component of the Training and Doctrine Command (TRADOC), complements this direction from the CIO/G 6 and operational execution by NET- COM/9 th ASC by providing Doctrine, Organization, Training, Materiel, Personnel and Facilities (DOTMLPF) products that encompass the joint perspective. (4) NETCOM/9 th ASC provides centralized management and technical control for installation Directors of Information Management. NETCOM/9 th ASC executes these missions through an Army-wide regional/theater structure that includes Network Operations and Security Centers (NOSCs), regional directors/theater signal commanders (the staff position is known as the RCIO, and centralized direction from the NETCOM/9 th ASC Army NOSC (ANOSC). b. Enterprise Systems Technology Agency (ESTA). ESTA, an activity assigned to NETCOM/9 th ASC, develops, implements, and enforces Enterprise Systems Management (ESM) processes and activities required to operate and manage Army infostructure at the Enterprise level. As the ESM functional proponent, ETSA develops, staffs, and manages service level agreements for the Enterprise. Additionally, ESTA is responsible for conducting the operational engineering and architectural review of the Enterprise to ensure new systems and enabling technologies or capabilities fielded within the Army infostructure comply with Enterprise-level standards, practices, and procedures. c. Regional Chief Information Officers (RCIO). (1) The CONUS RCIOs enforce C4/IM policies, standards, architectures, programs, plans, and budgets for all IT issues within their assigned regions. The CONUS RCIOs and locations follow: U.S. Army Network Enterprise Technology Command, Northeast, Fort. Monroe, VA U.S. Army Network Enterprise Technology Command, Southeast, Fort McPherson, GA U.S. Army Network Enterprise Technology Command, Northwest, Rock Island, IL U.S. Army Network Enterprise Technology Command, Southwest, Fort Sam Houston, TX (2) OCONUS, the RCIO is dual-hatted from the existing NETCOM/9 th ASC signal commands. As the Army further implements IMA, the Reserve Components and other Army commands will move into the designated IMA regions. RCIOs for the Army Reserve, Army National Guard (ARNG), Army Medical Command (MEDCOM) and Army Corps of Engineers (USACE) have been established and will remain in effect until they can be merged into the NETCOM/9 th ASC. d. Army Network Operations and Security Center (ANOSC). The ANOSC, an operational unit assigned to NET- COM/9 th ASC, manages the Army Infostructure at the Enterprise level providing decision makers a comprehensive, integrated, near real-time, situational awareness and operational reporting capability of the Army s part of the DoD Global Information Grid (GIG). The ANOSC serves as the single Army-level network operations (NETOPS) authority for coordinating, directing, managing, sustaining, and defending the infostructure. The ANOSC is under the operational control of Joint Task Force Global Network Operations (JTF GNO) for the execution of global NetOps. The ANOSC operationally integrates Systems and Telecommunication Network Management, Information Assurance (IA)/ Computer Network Defense (CND), and Content Staging (CS) technologies and procedures through Technical Control (TECHCON) of Army Theater Network Operations (NetOps) and Security Centers (TNOSCs) in support of Army business stewards and the warfighter. To posture the Army to support joint NetOps mandates, Deputy Secretary of Defense (DEPSECDEF) directed in May 2003 that the ANOSC, responsible for the Army NetOps situational awareness and reporting, be co-located and integrated with the Army Computer Emergency Response Team (ACERT). This integration created a centralized team of experts to spearhead the defense of the Army s networks, which is executed by forces under the operational control (OPCON) of the ASCC. This Enterprise focus has positioned the Army to operate and defend the network as a warfighting platform and enabled unprecedented levels of support to Operation Enduring Freedom/Operation Iraqi Freedom (OEF/OIF) operations. e. Information Technology, E Commerce, and Commercial Contracting Center (ITEC4). ITEC4 is assigned to the Army Contracting Agency (ACA), a FOA under the Assistant Secretary of the Army (Acquisition, Logistics & Technology) (ASA) (ALT). ITEC4 implements the Army s Enterprise-wide buying capability for common use IT and commercial items and provides customer support for satisfying consolidated top line IT requirements. f. Army Small Computer Program (ASCP Office). The ASCPO, an activity reporting to PEO, Enterprise Information Systems, provides a full range of IT, IT infrastructures, and information systems (hardware, software, peripherals, networking and infrastructure support services) to Army, DOD, foreign military, soldiers, and Federal agencies consistent with DOD and DA policy on standardization and interoperability Army Knowledge Online (AKO) a. AKO is the Army s integrated Enterprise portal for accessing information, conducting business, and managing operations. Integral to Army transformation, AKO crosses the warfighting, business, and intelligence mission areas to support the Current and Future Force. As critical enablers for the execution of Army activities, AKO on the NIPRNet 373

8 and AKO SIPRNet (AKO S) provide an array of Enterprise services, including reach-back capabilities to our deployed forces; self-service information and personnel actions for soldiers (e.g., medical readiness, financial, etc.); support to family support groups; and the ability to create virtual teams, organizational sites, online communities, and other collaborative work sites that leverage AKO s Enterprise global file sharing, threaded discussions, instant messaging, e- mail, notifications, calendaring, and polling services. Operating 24 x 7, AKO is globally accessible to support Army applications and operational processes. b. The CIO/G 6 is the functional proponent for AKO. Through its subordinate staff directorates and field operating agencies, the CIO/G 6 provides the policy, governance, and compliance framework to ensure both Clinger-Cohen Act (CCA) and warfighting requirements are met. Key policies regarding the usage of AKO include account management procedures, content management, taxonomy development, and employment of collaboration capabilities. c. The CCA requires management, integration, and accountability for use of Information Management/Information Technology (IM/IT) resources in performing Army missions and functions. In the execution of these tasks, the CIO/ G 6 adopted an Enterprise approach for maximizing IM/IT resources. Operation of the Army Enterprise portal provides the widespread use of capabilities (services, tools, or applications) that benefit important parts of the Enterprise to facilitate end-to-end linkage of the Army s operational and institutional processes. Using Enterprise capabilities reduces the total cost of ownership and security risks related to using stove-piped or legacy solutions to meet individual staff, MACOM, and functional requirements. d. In accordance with Army directives, all soldiers (Active, Reserve, and National Guard) and civilians must have an AKO account. All Army applications must be web-enabled for integration with AKO or AKO S. Applications not in compliance must obtain a waver from the CIO/G 6. Integration with AKO includes the use of the Single Sign-On (SSO) capability for user authentication. The use of AKO SSO uses the Army s Enterprise security architecture and offers more protection to the operations security (OPSEC) environment. e. AKO requirements are generated through multiple sources as the basis for selecting and implementing upgrades to the Enterprise portal. Staff, MACOM, or functional requirements must be based on capabilities needed to support their business processes and missions and not on the specific services, tools or applications desired. The CIO/G 6 utilizes the AKO Configuration Control Board (AKO CCB) to aid in the validation and prioritization process for implementing new Enterprise-wide capabilities. The AKO CCB is chartered as a sub-group of the CIO Executive Board (CIO EB), and its members represent HQDA Staff, MACOM, and operating agencies to ensure the use of portal capabilities support their evolving operational and institutional processes. f. AKO continues to comply with DoD and Joint requirements to support Joint and Expeditionary environments. The adoption of future DoD standards, data strategies, and core Enterprise services allows the transfer of Army information across the DoD Global Information Grid (GIG), Joint mission areas, and Joint functional domains through the Enterprise Information Environment Mission Area (EIEMA). AKO and other Army information systems conform to the EIEMA domain requirements enabling the sharing of relevant and timely data across the GIG Architecture a. The Army uses the Army Enterprise Architecture (AEA) and architectural views to analyze operational concepts and systems and to support new capabilities and requirements as required by CJCSI , Joint Capabilities Integration and Development System (JCIDS), the DoD 5000 series of acquisition documents, DoDI 4630, Information Support Plan (ISP) process, and other authorities. The AEA helps drive the Army s investment strategy for Command, Control, Communications, Computers, Intelligence, and Information Technology (C4I/IT) by providing a mechanism for addressing capability gaps, investment risks, interdependencies, and alignment with key Army and Joint doctrine. The AEA supports Army transformation to a net-centric and knowledge-based force. b. The AEA consists of the architectural views describing the Army s warfighter and business missions and functions, Battle Command Architecture (BCA) and Army Business Enterprise Architecture (ABEA), respectively, and the enabling Enterprise network, LandWarNet (LWN). These three integrated architectures are nested in Joint initiatives as detailed below: BCA is the Army s alignment to Joint Battle Management Command and Control (JBMC2) architecture. JBMC2 supports the JCIDS through the DoD 5000-series acquisition process and offers integrated capabilities to the operational warfighter. ABEA is the Army s initiative that relates to DoD s Business Enterprise Architecture and Business Management Modernization Program. LWN is the Army s part of the DoD Global Information Grid (GIG) and consists of all globally interconnected endto-end sets of Army information capabilities, associated processes, and personnel for collecting, processing, storing, disseminating, and managing information on demand supporting warfighters, policy makers, and support personnel. c. Architecture Views. There are three major perspectives, or views, which logically combine to describe a single architecture. These three architecture views are the Operational View (OV), Systems View (SV), and Technical View (TV). The views provide different perspectives on the same architecture. The most useful architecture description is an integrated description-a description that consists of multiple views. See Figure

9 (1) The OV describes the tasks and activities, operational nodes or elements, and information exchange requirements between nodes for each software block or unit in a given architecture. The OV defines the type of information, the frequency and timeliness of the information exchanges, and the tasks supported by these information exchanges that are needed for warfighting, support, or combat service support functions. An OV can also be described as the total aggregation of missions, functions, tasks, information requirements and business rules. (2) The SV is a physical implementation of the OV. The SV provides graphical and textual descriptions of the C4ISR systems and interconnections used to satisfy operational needs. The SV identifies the physical connections and locations of key nodes, circuits, and networks and is constructed per standards defined in the technical view (see c.(3) below). (3) The TV identifies services, interfaces, standards, and their relationships; and it provides the framework upon which engineering specifications are based, common building blocks are built, and product lines are developed. d. AEA Architects. (1) TRADOC is the Army Operational Architect. (2) The Assistant Secretary of the Army for Acquisition, Logistics, and Technology is the Army Systems Architect, and is supported by the PEOs and PMs who develop the systems views. (3) The CIO/G 6 is the Army Technical Architect. The Technical Architect provides the technical framework for the evolving blueprint guiding the Enterprise technology life cycle. The Technical Architect influences both technical management and engineering practices; and focuses on Enterprise-wide integration issues. Figure AKEA roles and responsibilities Section IV Other areas The Army CIO/G 6 Organization The Army CIO has the principal responsibility for the Army s IM functions pursuant to 10 USC Sec 3014(c)(1)(D) and Sec 2223, and is responsible for setting the strategic direction, determining objectives, and supervising the DA s C4/IT functions. In this capacity the CIO provides strategic leadership, stewardship, and transformation of the Army s C4/IT infostructure, delivery capabilities, and assets. (See Figure 16 4.) 375

10 Figure CIO/G 6 Organization Resource Integration (RI) The CIO/G 6 is responsible for oversight of C4/IT resources and assessment, and develops and coordinates investment decisions at the Enterprise level for C4/IT expenditures. Decision-making at the Enterprise level transforms the workforce, processes and infostructure by providing accountability, standardization and efficiencies to support AKM. Strategic resourcing decisions are made through the C4/IT investment strategy process in coordination with NETCOM/ 9 th ASC, MACOMs, Combatant Commands, and Army Headquarters stakeholders. MACOM investment initiatives are reviewed and evaluated by the CIO/G 6, the Headquarters staff, and the Resource Review Working Group, before being forwarded to the Army CIO EB for approval. All allocations of C4/IT resources undergo this review process for approval. The Resource Integration (RI) Directorate represents the CIO/G 6 on the PPBC process. The RI Directorate is responsible for resources expended for C4/IT systems and programs that are not otherwise managed by an Army PEO. Specific oversight functions include compliance with CCA requirements, Army Enterprise initiatives, and financial management guidelines. The RI Directorate: a. Serves as focal point for CIO/G 6 on resource matters b. Guides CIO/G 6 participation in the Planning, Programming, Budgeting and Execution Events. c. Serves as the CIO/G 6 contact office for requests for resource information for the Office of the President, the Congress, and the OSD. d. Coordinates the CIO/G 6 participation on Program Evaluation Group (PEG) resourcing meetings Information Infostructure The CIO/G 6 provides functional management and oversight over the Army s Enterprise information infostructure. These functional include developing and articulateing policy, functional requirements for the Enterprise, practices, business processes, technologies, hardware, software, systems, networks, personnel, and resources that support the Army s information infrastructure C4 Systems, Space, and Networks The CIO/G 6 provides functional management and oversight of the transformation of the Army s tactical information infrastructure and strategic "reachback" enablers. The CIO/G 6 oversees, coordinates, and monitors C4/IT systems and programs through their life cycle; formulates policy and strategies; advocates base level systems and programs; and manages functional programs such as space and networks, C2 systems, combat service support systems, C2 Protect, and Visual Information. The CIO/G 6 supports Transformation Communications Architecture concept maturation and system development for strategic and tactical Satellite Communications (SATCOM) systems; provides management and technical expertise to ensure horizontal integration of SATCOM system elements (terminals, satellite and control) to meet current and future operational requirements; and manages the Army s equities and investments in 376

11 satellite communications to meet the Army s Future Combat System (FCS) requirements, Joint interoperability objectives, and the ASD(NII) netcentricity mandate Information Assurance (IA) a. CIO/G 6 is the Army proponent for IA, which supports Army transformation by proactively protecting its networks and infostructure, infusing and driving technology requirements, streamlining and improving operational processes, and training and educating the force. The CIO/G 6: (1) Manages the Army Information Assurance Program. (2) Establishes and issues Army IA policy and procedures for achieving acceptable levels of information assurance in engineering, implementation, operation, and maintenance for all information systems connecting to or crossing any U.S. Army managed network. (3) Prioritizes and defends Army IA resource requirements in the planning, programming, and budgeting process. b. IA ensures Army Enterprise information services are available to authorized personnel and that public, private, and classified information is reliable for DoD data-centric operations and warfare, and Army mission accomplishment. IA is a critical enabler of and supports DoD s vision of achieving a secure Global Information Grid (GIG) through the robust implementation of DoD s Defense-In-Depth Strategy and Five Strategic IA goals to: Protect Information by safeguarding data as it is created, stored, used, modified, moved, or destroyed at all levels, for all users; whether in transit or at rest Defend Systems and Networks by recognizing and responding to threats, attacks, vulnerabilities, and deficiencies implemented or identified at physical or logical system, network, and enclave boundaries and by placing defense mechanisms into the design and implementation of these systems and networks Provide Integrated Situational Awareness by integrating many information operations and disciplines into an information assurance command and control capability that synchronizes the ability to defend systems and networks Transform and Enable Technologies by rapidly evaluating and implementing emerging new technologies, standards, and capabilities that improve response time, reduce threat exposure, and increase the Army s return on investment Create an empowered workforce by training and equipping all information owners, protectors, and users with acceptable practices and emerging technologies to protect information, systems, and networks c. The Army IA Defense-in-Depth strategy implements DoD mandated IA initiatives to achieve positive control over systems and networks by: Developing, procuring, and sustaining information assurance technologies and techniques needed to ensure the protection of information and communications during Enterprise-wide military operations Integrating commercially available security technologies at military communications gateways and throughout the communications infrastructure to enhance system and network security force-wide; This includes wired and wireless technologies Providing the capability to detect information system intrusions and alterations and react to information warfare attacks in a measured and coordinated manner Implementing Public Key Infrastructure (PKI) and Common Access Card (CAC), Identity Management Automating key generation and distribution while supporting joint interoperability (Army Key Management System/ Electronic Key Management System Tier 1) Implementing vulnerability assessments of legacy and digitized force tactical systems and architectures that support the transformation of the Army d. Protecting the Army s tactical and sustaining base networks is a Commander s responsibility. Because of implications associated with force protection and operational security, Commanders at all levels must raise IA awareness in their Commands in order to protect all Army networks from degradation, attack, and exploitation Biometrics The DoD Biometrics Management Office (BMO) and the DoD Biometrics Fusion Center (BFC) are responsible for leading, coordinating, and consolidating the integration of biometric technologies across the DoD. The BMO reports to the Army CIO, who acts on behalf of the Secretary of the Army, as the DoD Executive Agent for Biometrics. The recently formed Identity Protection and Management Senior Coordinating Group provides senior-level, DoD-wide strategic guidance to the BMO, given its mission to oversee DoD s efforts in the areas of Biometrics, Public Key Infrastructure, and Smart Cards. At the foundation level, biometrics help build identity authentication, or the vetting and fixing of identity. At the application level, biometric systems can be used to protect information, systems or networks (logical access); to protect installations, facilities, and spaces (physical access); or to record or audit an individual s transactions to ensure security or prevent fraud (accountability). Biometric technologies can also contribute to fighting the Global War on Terrorism. 377

12 Human Capital (HC) a. The CIO/G 6 supports the development of a knowledge-based workforce by leveraging intellectual assets and empowering the Army s human resources through effective workforce planning, cutting-edge recruitment and retention initiatives, broad-based education and training, and cross-functional professional development opportunities. b. A knowledge-based organization demands new organizational definitions, disciplines and structures to respond effectively to new challenges and new opportunities. Leaders must communicate their vision and expectations across the Army, and articulate clearly how we will move from our current to our to be state. This wholesale transformation must embrace the principles of effective change management, and focus on building a framework for knowledge management that has a strong human capital infrastructure in which knowledge is shared across the Army Enterprise. c. A key to the success of a knowledge-based organization is the continuous learning and the transformation of the Army s most valued asset - its human capital. Accordingly, education, training, mentoring, and professional development opportunities will provide soldiers and DA civilians with a global perspective, enable them to embrace and lead change, and make them adaptable to new environments and new ways of doing business. The Army should work to attract global thinkers from many disciplines, and should implement recruitment and retention strategies that include monetary incentives, workplace flexibilities, and education opportunities Policy and Governance a. AKM Goal 1 Support. The CIO/G 6 manages and oversees the Army Enterprise integration of policies and functions to comply with public laws and OMB, DOD, and Army guidance and serves as the focal point for assigned AKM functions. The CIO/G 6 is also the focal point for the management and integration of Federal, DOD and Army CIO EBs. AKM Goal 1, Adopt governance and cultural changes to become a knowledge-based organization, is achieved through the institutionalization of policies, management structures, and leadership initiatives to support knowledge management and infostructure at the Enterprise level. b. Business Initiative Council (BIC). The Army Business Initiative Council (ABIC), chaired by the SecArmy and run by the ASA(FM&C), provides a forum to generate improved business processes applicable to the Army Enterprise. The Policy and Governance Office represents the CIO/G6 as a member of the ABIC and chairs the IT Process Functional Board (PFB), one of six PFBs supporting ABIC activities. The IT PFB coordinates proposals and implementation plans for IT -enabled business process change initiatives in the Army Strategic Partnering Strategic Partnering supports integration of AKM into the military and business functions of the Army, and advances transformation of AKO into the killer application for land-power dominance by integrating it fully into military and business operations. This effort, a form of customer relationship management, requires Strategic Partnering to determine the current needs of functionals and anticipation of their future requirements. To accomplish this, Strategic Partnering educates functionals on the Headquarters staff, as well as the support and combat forces, on knowledge management and what AKO can accomplish. It maps the following: mission needs and operational requirements; existing and proposed knowledge bases and expertise networks to meet those needs; and the state of webification the prerequisite for making these knowledge assets available through AKO. Strategic Partnering implementation embeds Functional Exchange Officers (FEO) in key functional areas to work requirements and solutions from the inside out, thereby integrating their functions into AKO, and into the vibrant knowledge network for the Future and Current Forces. a. e-gov. e-government, one of five Presidents Management Agenda items ( budintegration/pma_index.html), focuses on creating improved ways for the citizen to get information and services from the federal government and emphasizes the interoperability necessary to support seamless interagency operations. The e-gov program draws on commercial e-business principles and is heavily web-enabled ( practices). The E Government Act of 2002 (P.L ) created an Office of Electronic Government within the OMB ( The OMB e-gov office reviews the annual OMB Form 300 reports to assess progress towards e-gov interoperability. The Army CIO/G 6 is the Army Point of Contact for overall e-gov issues. b. G o v e r n m e n t P a p e r w o r k E l i m i n a t i o n A c t ( G P E A ). E n a c t e d i n , t h e G P E A ( P. L ) ( h t t p : / / 10.html ) focuses on using IT to improve customer service and government efficiency by reducing paperwork and moving the government to a paperless environment. Federal agencies are required to provide for, when practical, an option of electronically maintaining, submitting and disclosing information, as well as using and accepting electronic signatures. The implementation of the GPEA primarily focuses on automating forms and records and transforming the processes that support that information. ( inforeg/infopoltech.html#gpea). E Army transformation incorporates GPEA into its strategy. c. e-army transformation. e-business has become the hallmark of successful commercial organizations to streamline their operations and improve customer service, internal efficiencies and supplier relationships by using IT to enable their processes. The Army has adopted these commercial best practices under a strategy called e-army, part of Goal 2 of the overarching AKM strategy. e-army is an approach that emphasizes IT-enabled end-to-end process transformation by focusing on self-service web-based applications, the creation of Army-wide Enterprise processes and multifunctional processes, digital signature, workflow and content management to support a paperless operating environment, 378

Department of Defense

Department of Defense Department of Defense DIRECTIVE NUMBER 5144.1 May 2, 2005 DA&M SUBJECT: Assistant Secretary of Defense for Networks and Information Integration/ DoD Chief Information Officer (ASD(NII)/DoD CIO) Reference:

More information

DEPARTMENT OF THE NAVY DEPUTY CHIEF INFORMATION OFFICER MARINE CORPS ROLES AND RESPONSIBILITIES

DEPARTMENT OF THE NAVY DEPUTY CHIEF INFORMATION OFFICER MARINE CORPS ROLES AND RESPONSIBILITIES DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350-3000 MCO 5400.52 C4 MARINE CORPS ORDER 5400.52 From: To: Subj: Ref: Commandant of the Marine

More information

S E C R E T A R Y O F T H E A R M Y W A S H I N G T O N

S E C R E T A R Y O F T H E A R M Y W A S H I N G T O N S E C R E T A R Y O F T H E A R M Y W A S H I N G T O N MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Army Directive 2015-42 (Army Contingency Basing Policy) 1. References. A complete list of references is

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8100.1 September 19, 2002 Certified Current as of November 21, 2003 SUBJECT: Global Information Grid (GIG) Overarching Policy ASD(C3I) References: (a) Section 2223

More information

Relationship of the DOD Information Technology Standards Registry (DISR) with the Defense Standardization Program

Relationship of the DOD Information Technology Standards Registry (DISR) with the Defense Standardization Program Relationship of the DOD Information Technology Standards Registry (DISR) with the Defense Standardization Program Michael O Connor DISA, GE33 9 March 2005 Agenda Responsibilities of the DOD Executive Agent

More information

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350-3000 MCO 3100.4 PLI MARINE CORPS ORDER 3100.4 From: To: Subj: Commandant of the Marine Corps

More information

Department of Defense Investment Review Board and Investment Management Process for Defense Business Systems

Department of Defense Investment Review Board and Investment Management Process for Defense Business Systems Department of Defense Investment Review Board and Investment Management Process for Defense Business Systems Report to Congress March 2012 Pursuant to Section 901 of the National Defense Authorization

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION SUBJECT: Distribution Process Owner (DPO) NUMBER 5158.06 July 30, 2007 Incorporating Administrative Change 1, September 11, 2007 USD(AT&L) References: (a) Unified Command

More information

SUBJECT: Army Directive (Implementation of Acquisition Reform Initiatives 1 and 2)

SUBJECT: Army Directive (Implementation of Acquisition Reform Initiatives 1 and 2) S E C R E T A R Y O F T H E A R M Y W A S H I N G T O N MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Army Directive 2017-22 (Implementation of Acquisition Reform Initiatives 1 and 2) 1. References. A complete

More information

DOD DIRECTIVE DOD SPACE ENTERPRISE GOVERNANCE AND PRINCIPAL DOD SPACE ADVISOR (PDSA)

DOD DIRECTIVE DOD SPACE ENTERPRISE GOVERNANCE AND PRINCIPAL DOD SPACE ADVISOR (PDSA) DOD DIRECTIVE 5100.96 DOD SPACE ENTERPRISE GOVERNANCE AND PRINCIPAL DOD SPACE ADVISOR (PDSA) Originating Component: Office of the Deputy Chief Management Officer of the Department of Defense Effective:

More information

THE JOINT STAFF Research, Development, Test and Evaluation (RDT&E), Defense-Wide Fiscal Year (FY) 2009 Budget Estimates

THE JOINT STAFF Research, Development, Test and Evaluation (RDT&E), Defense-Wide Fiscal Year (FY) 2009 Budget Estimates Exhibit R-2, RDT&E Budget Item Justification February 2008 R-1 Line Item Nomenclature: 227 0902298J Management HQ ($ IN Millions) FY 2007 FY 2008 FY 2009 FY 2010 FY 2011 FY 2012 FY 2013 Total PE 3.078

More information

Department of Defense INSTRUCTION. 1. PURPOSE. This Instruction, issued under the authority of DoD Directive (DoDD) 5144.

Department of Defense INSTRUCTION. 1. PURPOSE. This Instruction, issued under the authority of DoD Directive (DoDD) 5144. Department of Defense INSTRUCTION NUMBER 8410.02 December 19, 2008 ASD(NII)/DoD CIO SUBJECT: NetOps for the Global Information Grid (GIG) References: See Enclosure 1 1. PURPOSE. This Instruction, issued

More information

Be Smart: Target Opportunities Beyond Today

Be Smart: Target Opportunities Beyond Today Be Smart: Target Opportunities Beyond Today Presented to to The The Sixth Annual Army Small Business Conference Wednesday, June 26, 26, 2002 Mrs. Mrs. Miriam Miriam F. F. Browning Browning Principal Principal

More information

UNCLASSIFIED. FY 2011 Total Estimate

UNCLASSIFIED. FY 2011 Total Estimate Exhibit R-2, RDT&E Budget Item Justification: PB 2011 The Joint Staff DATE: February 2010 COST ($ in Millions) FY 2009 Actual FY 2010 for the Warrior (C4IFTW) FY 2012 FY 2013 FY 2014 FY 2015 Cost To Complete

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Net Centricity FY 2012 OCO

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Net Centricity FY 2012 OCO COST ($ in Millions) FY 2010 FY 2011 FY 2012 Base FY 2012 OCO FY 2012 Total FY 2013 FY 2014 FY 2015 FY 2016 Cost To Complete Total Cost Total Program Element 1.425 29.831 14.926-14.926 24.806 25.592 26.083

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 3100.10 October 18, 2012 USD(P) SUBJECT: Space Policy References: See Enclosure 1 1. PURPOSE. This Directive reissues DoD Directive (DoDD) 3100.10 (Reference (a))

More information

Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE

Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350 1000 SECNAVINST 5239.20 DON CIO SECNAV INSTRUCTION 5239.20 From: Secretary of the Navy Subj: DEPARTMENT OF THE NAVY

More information

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN VERSION 1 A COMBAT SUPPORT AGENCY

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN VERSION 1 A COMBAT SUPPORT AGENCY DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2013 2018 VERSION 1 A COMBAT SUPPORT AGENCY Direct D E F E N S E I N F O R M A T I O N S Y S T E M S A G E N C Y Intent 2 or s S T R A T E G I C P L A

More information

James T. Conway General, U.S. Marine Corps, Commandant of the Marine Corps

James T. Conway General, U.S. Marine Corps, Commandant of the Marine Corps MISSION To serve as the Commandant's agent for acquisition and sustainment of systems and equipment used to accomplish the Marine Corps' warfighting mission. 1 It is our obligation to subsequent generations

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5101.02E January 25, 2013 DA&M SUBJECT: DoD Executive Agent (EA) for Space References: See Enclosure 1 1. PURPOSE. This Directive: a. Reissues DoD Directive (DoDD)

More information

REQUIREMENTS TO CAPABILITIES

REQUIREMENTS TO CAPABILITIES Chapter 3 REQUIREMENTS TO CAPABILITIES The U.S. naval services the Navy/Marine Corps Team and their Reserve components possess three characteristics that differentiate us from America s other military

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5100.91 October 28, 2008 USD(I) SUBJECT: Joint Intelligence Interoperability Board (JIIB) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes

More information

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J-6 CJCSI 5116.05 DISTRIBUTION: A, B, C MILITARY COMMAND, CONTROL, COMMUNICATIONS, AND COMPUTERS EXECUTIVE BOARD 1. Purpose. This instruction establishes

More information

NG-J6/CIO CNGBI A DISTRIBUTION: A 26 September 2016 NATIONAL GUARD BUREAU JOINT INFORMATION TECHNOLOGY PORTFOLIO MANAGEMENT

NG-J6/CIO CNGBI A DISTRIBUTION: A 26 September 2016 NATIONAL GUARD BUREAU JOINT INFORMATION TECHNOLOGY PORTFOLIO MANAGEMENT CHIEF NATIONAL GUARD BUREAU INSTRUCTION NG-J6/CIO CNGBI 6000.01A DISTRIBUTION: A NATIONAL GUARD BUREAU JOINT INFORMATION TECHNOLOGY PORTFOLIO MANAGEMENT References: See Enclosure A. 1. Purpose. This instruction

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Common Joint Tactical Information. FY 2011 Total Estimate. FY 2011 OCO Estimate

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Common Joint Tactical Information. FY 2011 Total Estimate. FY 2011 OCO Estimate COST ($ in Millions) FY 2009 Actual FY 2010 FY 2012 FY 2013 FY 2014 FY 2015 Cost To Complete Program Element 19.873 20.466 20.954 0.000 20.954 21.254 21.776 22.071 22.305 Continuing Continuing 771: Link-16

More information

GLOBAL INFORMATION GRID NETOPS TASKING ORDERS (GNTO) WHITE PAPER.

GLOBAL INFORMATION GRID NETOPS TASKING ORDERS (GNTO) WHITE PAPER. . Introduction This White Paper advocates United States Strategic Command s (USSTRATCOM) Joint Task Force Global Network Operations (JTF-GNO) and/or AF Network Operations (AFNETOPS) conduct concept and

More information

The Army Protection Program

The Army Protection Program Army Regulation 525 2 Military Operations The Army Protection Program Headquarters Department of the Army Washington, DC 8 December 2014 UNCLASSIFIED SUMMARY AR 525 2 The Army Protection Program This new

More information

AUSA BACKGROUND BRIEF

AUSA BACKGROUND BRIEF AUSA BACKGROUND BRIEF No. 46 January 1993 FORCE PROJECTION ARMY COMMAND AND CONTROL C2) Recently, the AUSA Institute of Land Watfare staff was briefed on the Army's command and control modernization plans.

More information

C4I System Solutions.

C4I System Solutions. www.aselsan.com.tr C4I SYSTEM SOLUTIONS Information dominance is the key enabler for the commanders for making accurate and faster decisions. C4I systems support the commander in situational awareness,

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 Incorporating Change 1, Effective May 18, 2018 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure

More information

EVERGREEN IV: STRATEGIC NEEDS

EVERGREEN IV: STRATEGIC NEEDS United States Coast Guard Headquarters Office of Strategic Analysis 9/1/ UNITED STATES COAST GUARD Emerging Policy Staff Evergreen Foresight Program The Program The Coast Guard Evergreen Program provides

More information

From Stove-pipe to Network Centric Leveraging Technology to Present a Unified View

From Stove-pipe to Network Centric Leveraging Technology to Present a Unified View From Stove-pipe to Network Centric Leveraging Technology to Present a Unified View Medhat A. Abuhantash U.S. Army, Communications and Electronics Command (CECOM), Software Engineering Center (SEC), Battlespace

More information

Net-Enabled Mission Command (NeMC) & Network Integration LandWarNet / LandISRNet

Net-Enabled Mission Command (NeMC) & Network Integration LandWarNet / LandISRNet Net-Enabled Mission Command (NeMC) & Network Integration LandWarNet / LandISRNet 1 LandWarNet (LWN) Initial Capabilities Document (ICD) / Network Enabled Mission Command (NeMC) ICD LandISRNet Intel Appendices

More information

THE JOINT STAFF Fiscal Year (FY) 2008/2009 Budget Estimates Research, Development, Test and Evaluation (RDT&E), Defense-Wide

THE JOINT STAFF Fiscal Year (FY) 2008/2009 Budget Estimates Research, Development, Test and Evaluation (RDT&E), Defense-Wide Exhibit R-2, RDT&E Budget Item Justification February 2007 R-1 Line Item Nomenclature: 228 0902298J Management HQ ($ IN Millions) FY 2006 FY 2007 FY 2008 FY 2009 FY 2010 FY 2011 FY 2012 FY 2013 Total PE

More information

Defense Health Agency PROCEDURAL INSTRUCTION

Defense Health Agency PROCEDURAL INSTRUCTION Defense Health Agency PROCEDURAL INSTRUCTION NUMBER 6025.08 Healthcare Operations/Pharmacy SUBJECT: Pharmacy Enterprise Activity (EA) References: See Enclosure 1. 1. PURPOSE. This Defense Health Agency-Procedural

More information

Army Regulation Army Space Activities. Department of the Army. Space Policy. Headquarters UNCLASSIFIED

Army Regulation Army Space Activities. Department of the Army. Space Policy. Headquarters UNCLASSIFIED Army Regulation 900 1 Army Space Activities Department of the Army Space Policy UNCLASSIFIED Headquarters Department of the Army Washington, DC 21 April 2017 SUMMARY of CHANGE AR 900 1 Department of the

More information

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J-6 CJCSI 5721.01B DISTRIBUTION: A, B, C, J, S THE DEFENSE MESSAGE SYSTEM AND ASSOCIATED LEGACY MESSAGE PROCESSING SYSTEMS REFERENCES: See Enclosure B.

More information

Department of Defense Fiscal Year (FY) 2015 IT President's Budget Request Defense Prisoner of War/Missing Personnel Office

Department of Defense Fiscal Year (FY) 2015 IT President's Budget Request Defense Prisoner of War/Missing Personnel Office Mission Area Business System Breakout Appropriation BMA 0.003 Total 3.293 Defense Business Systems 0.243 EIEMA 3.290 All Other Resources 3.050 FY 2015 ($M) FY 2015 ($M) OPERATIONS 3.293 FY 2015 ($M) FY14

More information

SECRETARY OF THE ARMY WASHINGTON

SECRETARY OF THE ARMY WASHINGTON SECRETARY OF THE ARMY WASHINGTON 3 1 JUL 2013 MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Army Directive 2013-18 (Army Insider Threat Program) 1. References: a. Presidential Memorandum (National Insider Threat

More information

JOINT STAFF FY 2006/2007 Budget Estimates Submissions Research, Development, Test, and Evaluation (RDT&E), Defense-Wide

JOINT STAFF FY 2006/2007 Budget Estimates Submissions Research, Development, Test, and Evaluation (RDT&E), Defense-Wide Exhibit R-3, Project Analysis Exhibit R-3, Project Analysis : February 2005 RDT&E, Defense Wide, Joint Staff 0400 / BA 7 PROGRAM ELEMENT: 0902298J Management Headquarters PROJECT NAME: FCB Studies Categories

More information

Department of Defense Enterprise Architecture (EA) Modernization Blueprint/ Transition Plan

Department of Defense Enterprise Architecture (EA) Modernization Blueprint/ Transition Plan Department of Defense Enterprise Architecture (EA) Modernization Blueprint/ Transition Plan 25 February 2011 Prepared by: Director, Architecture & Infrastructure Office of the Department of Defense Chief

More information

DOD DIRECTIVE DIRECTOR, DEFENSE DIGITAL SERVICE (DDS)

DOD DIRECTIVE DIRECTOR, DEFENSE DIGITAL SERVICE (DDS) DOD DIRECTIVE 5105.87 DIRECTOR, DEFENSE DIGITAL SERVICE (DDS) Originating Component: Office of the Deputy Chief Management Officer of the Department of Defense Effective: January 5, 2017 Releasability:

More information

RDT&E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit) MAY 2009 APPROPRIATION / BUDGET ACTIVITY RDT&E, DEFENSE-WIDE / 7

RDT&E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit) MAY 2009 APPROPRIATION / BUDGET ACTIVITY RDT&E, DEFENSE-WIDE / 7 RDT&E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit) DATE MAY 2009 APPROPRIATION / BUDGET ACTIVITY RDT&E, DEFENSE-WIDE / 7 R-1 ITEM NOMENCLATURE / PROJECT NO. PE 1160404BB Special Operations (SO) Tactical

More information

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release.

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release. White Paper 23 January 2014 DISTRIBUTION RESTRICTION: Approved for public release. Enclosure 2 Introduction Force 2025 Maneuvers provides the means to evaluate and validate expeditionary capabilities for

More information

Organization and Mission of the United States Army Signal Command

Organization and Mission of the United States Army Signal Command CHAPTER 3 Organization and Mission of the United States Army Signal Command Headquarters, US Army Signal Command (USASC), the Army s Continental United States (CONUS)-based, worldwide force and service

More information

Department of Defense INSTRUCTION. Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN)

Department of Defense INSTRUCTION. Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 Incorporating Change 2, July 27, 2017 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and

More information

AFCEA Mission Command Industry Engagement Symposium

AFCEA Mission Command Industry Engagement Symposium UNCLASSIFIED/ AFCEA Mission Command Industry Engagement Symposium MG Pete Gallagher Director, Network CFT 3 April 2018 Network CFT Collaboration, Fusion & Transparency WARFIGHTING REQUIREMENTS Army Warfighters

More information

INSTRUCTION. Department of Defense. NUMBER May 22, 2008 USD(P) SUBJECT: Joint Deployment Process Owner

INSTRUCTION. Department of Defense. NUMBER May 22, 2008 USD(P) SUBJECT: Joint Deployment Process Owner Department of Defense INSTRUCTION NUMBER 5158.05 May 22, 2008 USD(P) SUBJECT: Joint Deployment Process Owner References: (a) DoD Directive 5158.5, subject as above, November 12, 2001 (hereby canceled)

More information

ASSIGNMENT OF FUNCTIONS AND RESPONSIBILITIES WITHIN HEADQUARTERS, DEPARTMENT OF THE ARMY

ASSIGNMENT OF FUNCTIONS AND RESPONSIBILITIES WITHIN HEADQUARTERS, DEPARTMENT OF THE ARMY *GO 2017 01 GENERAL ORDERS } NO. 2017 01 HEADQUARTERS DEPARTMENT OF THE ARMY WASHINGTON, DC, 5 January 2017 ASSIGNMENT OF FUNCTIONS AND RESPONSIBILITIES WITHIN HEADQUARTERS, DEPARTMENT OF THE ARMY 1. Authority

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3000.05 September 16, 2009 Incorporating Change 1, June 29, 2017 USD(P) SUBJECT: Stability Operations References: See Enclosure 1 1. PURPOSE. This Instruction:

More information

DIRECTIVE. SUBJECT: Unique Identification (UID) Standards for a Net-Centric Department of Defense

DIRECTIVE. SUBJECT: Unique Identification (UID) Standards for a Net-Centric Department of Defense Department of Defense DIRECTIVE NUMBER 8320.03 March 23, 2007 USD(AT&L)/USD(P&R) SUBJECT: Unique Identification (UID) Standards for a Net-Centric Department of Defense References: (a) Strategic Planning

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8320.2 December 2, 2004 ASD(NII)/DoD CIO SUBJECT: Data Sharing in a Net-Centric Department of Defense References: (a) DoD Directive 8320.1, DoD Data Administration,

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8320.05 August 18, 2011 Incorporating Change 1, November 22, 2017 ASD(NII)/DoD CIO DoD CIO SUBJECT: Electromagnetic Spectrum Data Sharing References: See Enclosure

More information

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 Incorporating Change 1, July 27, 2017 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See

More information

2016 Major Automated Information System Annual Report

2016 Major Automated Information System Annual Report 2016 Major Automated Information System Annual Report Global Combat Support System-Marine Corps Logistics Chain Management Increment 1 (GCSS-MC LCM Inc 1) Defense Acquisition Management Information Retrieval

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3115.15 December 6, 2011 USD(I) SUBJECT: Geospatial Intelligence (GEOINT) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes policies, assigns

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 213 Army DATE: February 212 COST ($ in Millions) FY 211 FY 212 FY 214 FY 215 FY 216 FY 217 To Complete Program Element 125.44 31.649 4.876-4.876 25.655

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 33-401 14 MARCH 2007 Communications and Information IMPLEMENTING AIR FORCE ARCHITECTURES ACCESSIBILITY: COMPLIANCE WITH THIS PUBLICATION

More information

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit) BUDGET ACTIVITY ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit) PE NUMBER AND TITLE COST (In Thousands) FY 2001 FY 2002 FY 2003 FY 2004 FY 2005 FY 2006 FY 2007 Cost to Total Cost Actual Estimate Estimate

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8320.02 August 5, 2013 DoD CIO SUBJECT: Sharing Data, Information, and Information Technology (IT) Services in the Department of Defense References: See Enclosure

More information

M O C 9th Signal T E Command N (army)

M O C 9th Signal T E Command N (army) N ET C O M 9th Signal Command (Army) NETCOM/9th Signal Command (Army) U.S. Army Network Enterprise Technology Command/9th Signal Command (Army), headquartered at Fort Huachuca, Ariz., is the Army s single

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3325.08 September 17, 2012 Incorporating Change 1, Effective October 15, 2013 USD(I) SUBJECT: DoD Intelligence Collection Management References: See Enclosure 1

More information

Cybersecurity United States National Security Strategy President Barack Obama

Cybersecurity United States National Security Strategy President Barack Obama Cybersecurity As the birthplace of the Internet, the United States has a special responsibility to lead a networked world. Prosperity and security increasingly depend on an open, interoperable, secure,

More information

UNCLASSIFIED

UNCLASSIFIED A. Mission Description and Budget Item Justification: The mission of the Advanced Information Technology Services Joint Program Office (AITS-JPO) is to expedite the transition of new Information Technology

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 4630.8 June 30, 2004 SUBJECT: Procedures for Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS) ASD(NII)/DoD

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 1322.18 January 13, 2009 Incorporating Change 1, Effective February 23, 2017 USD(P&R) SUBJECT: Military Training References: (a) DoD Directive 1322.18, subject as

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5105.19 July 25, 2006. DA&M SUBJECT: Defense Information Systems Agency (DISA) References: (a) Title 10, United States Code (b) DoD Directive 5105.19, Defense Information

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 90-16 31 AUGUST 2011 Special Management STUDIES AND ANALYSES, ASSESSMENTS AND LESSONS LEARNED COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.15E April 26, 2011 Incorporating Change 1, August 14, 2017 USD(AT&L) SUBJECT: DoD Forensic Enterprise (DFE) References: See Enclosure 1 1. PURPOSE. Pursuant

More information

FINANCIAL MANAGEMENT OPERATIONS

FINANCIAL MANAGEMENT OPERATIONS FM 1-06 (14-100) FINANCIAL MANAGEMENT OPERATIONS SEPTEMBER 2006 DISTRIBUTION RESTRICTION: Distribution for public release; distribution is unlimited. HEADQUARTERS DEPARTMENT OF THE ARMY This page intentionally

More information

ARMY G-8

ARMY G-8 ARMY G-8 Deputy Chief of Staff, G-8 703-697-8232 The Deputy Chief of Staff, G-8, is responsible for integrating resources and Army programs and with modernizing Army equipment. We accomplish this through

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5250.01 January 22, 2013 Incorporating Change 1, August 29, 2017 USD(I) SUBJECT: Management of Intelligence Mission Data (IMD) in DoD Acquisition References: See

More information

The Army Force Modernization Proponent System

The Army Force Modernization Proponent System Army Regulation 5 22 Management The Army Force Modernization Proponent System Rapid Action Revision (RAR) Issue Date: 25 March 2011 Headquarters Department of the Army Washington, DC 6 February 2009 UNCLASSIFIED

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8330.01 May 21, 2014 Incorporating Change 1, December 18, 2017 DoD CIO SUBJECT: Interoperability of Information Technology (IT), Including National Security Systems

More information

UNCLASSIFIED. COST (in millions) FY02 FY03 FY04 FY05 FY06 FY07 FY08 FY09

UNCLASSIFIED. COST (in millions) FY02 FY03 FY04 FY05 FY06 FY07 FY08 FY09 Exhibit R-2, RDT&E Budget Item Justification R-1 ITEM NOMENCLATURE C4I for the Warrior/PE 0303149K COST (in millions) FY02 FY03 FY04 FY05 FY06 FY07 FY08 FY09 Total Program Element (PE) 0 19.914 37.100

More information

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J-6 CJCSI 8010.01C DISTRIBUTION: A, B, C JOINT COMMUNITY WARFIGHTER CHIEF INFORMATION OFFICER Reference: See Enclosure B. 1. Purpose. This instruction

More information

Applying Enterprise Architecting within Army Transformation

Applying Enterprise Architecting within Army Transformation Applying Enterprise Architecting within Army Transformation Prof. Nightingale / LTC Matty 22 January 2009 http://lean.mit.edu 2008 Massachusetts Institute of Technology Nightingale 11/17/08-1 Agenda Enterprise

More information

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology Development

More information

SIGNAL SOLDIER S GUIDE

SIGNAL SOLDIER S GUIDE FM 6-02.43 SIGNAL SOLDIER S GUIDE March 2009 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army

More information

PART THREE. Operational-Level Support. Chapter 8 Signal Support BATTLEFIELD INFORMATION ARCHITECTURE

PART THREE. Operational-Level Support. Chapter 8 Signal Support BATTLEFIELD INFORMATION ARCHITECTURE PART THREE Operational-Level Support Operational-level support can be a dominant factor in determining the nature and tempo of operations. More than logistics, it furnishes the means to execute the operational

More information

The 19th edition of the Army s capstone operational doctrine

The 19th edition of the Army s capstone operational doctrine 1923 1939 1941 1944 1949 1954 1962 1968 1976 1905 1910 1913 1914 The 19th edition of the Army s capstone operational doctrine 1982 1986 1993 2001 2008 2011 1905-1938: Field Service Regulations 1939-2000:

More information

Antiterrorism Synchronization

Antiterrorism Synchronization PURPOSE This paper describes the synchronization efforts associated with planning and executing an effective antiterrorism (AT) program and the key elements that can enhance the overall ability to coordinate

More information

JOINT STAFF FY 2005 Budget Estimates Research, Development, Test, and Evaluation (RDT&E), Defense-Wide. Exhibit R-2, RDT&E Budget Item Justification

JOINT STAFF FY 2005 Budget Estimates Research, Development, Test, and Evaluation (RDT&E), Defense-Wide. Exhibit R-2, RDT&E Budget Item Justification Exhibit R-2, RDT&E Budget Item Justification Exhibit R-2, RDT&E Budget Item Justification : February 2004 RDT&E, Defense Wide, Joint Staff 0400 / BA7 R-1 ITEM NOMENCLATURE: 194 PE: 0902298J Management

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5134.09 September 17, 2009 DA&M SUBJECT: Missile Defense Agency (MDA) References: See Enclosure 1 1. PURPOSE. This Directive, in accordance with the authority vested

More information

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES (Federal Register Vol. 40, No. 235 (December 8, 1981), amended by EO 13284 (2003), EO 13355 (2004), and EO 13470 (2008)) PREAMBLE Timely, accurate,

More information

7 th Army LandWarNet Training and Readiness Oversight (TRO)

7 th Army LandWarNet Training and Readiness Oversight (TRO) AIR WAR COLLEGE AIR UNIVERSITY 7 th Army LandWarNet Training and Readiness Oversight (TRO) by Dana S. Tankins, COL, U.S. Army A Research Report Submitted to the Faculty In partial Fulfillment of the Graduation

More information

Subj: ELECTRONIC WARFARE DATA AND REPROGRAMMABLE LIBRARY SUPPORT PROGRAM

Subj: ELECTRONIC WARFARE DATA AND REPROGRAMMABLE LIBRARY SUPPORT PROGRAM DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3430.23C N2/N6 OPNAV INSTRUCTION 3430.23C From: Chief of Naval Operations Subj: ELECTRONIC

More information

The Army Executes New Network Modernization Strategy

The Army Executes New Network Modernization Strategy The Army Executes New Network Modernization Strategy Lt. Col. Carlos Wiley, USA Scott Newman Vivek Agnish S tarting in October 2012, the Army began to equip brigade combat teams that will deploy in 2013

More information

Executing our Maritime Strategy

Executing our Maritime Strategy 25 October 2007 CNO Guidance for 2007-2008 Executing our Maritime Strategy The purpose of this CNO Guidance (CNOG) is to provide each of you my vision, intentions, and expectations for implementing our

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 7 R-1 Line #73

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 7 R-1 Line #73 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology Development

More information

IV. Organizations that Affect National Security Space

IV. Organizations that Affect National Security Space IV. Organizations that Affect National Security Space The previous chapters identified U.S. national security interests in space and measures needed to advance them. This chapter describes the principal

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 Incorporating Change 1, July 31, 2017 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive:

More information

Department of Defense. Enterprise Roadmap

Department of Defense. Enterprise Roadmap Department of Defense Enterprise Roadmap August 31, 2012 Prepared by: Director, Architecture & Interoperability Office of the Department of Defense Chief Information Officer DoD Enterprise Roadmap, 31

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8190.3 August 31, 2002 Certified Current as of November 21, 2003 SUBJECT: Smart Card Technology ASD(C3I)/DoD CIO References: (a) Deputy Secretary of Defense Memorandum,

More information

The pace of change and level of effort has increased dramatically with

The pace of change and level of effort has increased dramatically with Space & Cyberspace: The Overlap and Intersection of Two Frontiers By Jac W. Shipp Key Areas of Intersection Space, like cyberspace, is a warfighting domain. Both domains are information-centric and informationenabled.

More information

DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE COMMITTEE ON ARMED SERVICES DEFENSE ACQUISITION REFORM PANEL UNITED STATES HOUSE OF REPRESENTATIVES

DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE COMMITTEE ON ARMED SERVICES DEFENSE ACQUISITION REFORM PANEL UNITED STATES HOUSE OF REPRESENTATIVES DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE COMMITTEE ON ARMED SERVICES DEFENSE ACQUISITION REFORM PANEL UNITED STATES HOUSE OF REPRESENTATIVES SUBJECT: MISSION OF THE AIR FORCE GLOBAL LOGISTICS SUPPORT

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 4650.08 February 5, 2015 DoD CIO SUBJECT: Positioning, Navigation, and Timing (PNT) and Navigation Warfare (Navwar) References: See Enclosure 1 1. PURPOSE. This

More information

OUR MISSION PARTNERS DISA S BUDGET. TOTAL DOD COMPONENT/AGENCY ORDERS FOR DISA DWCF FY16 (in thousands)

OUR MISSION PARTNERS DISA S BUDGET. TOTAL DOD COMPONENT/AGENCY ORDERS FOR DISA DWCF FY16 (in thousands) OUR MISSION PARTNERS Military Services DISA S BUDGET Appropriated (Based on FY17 President s Budget- Not Enacted) Total Appropriated: Defense Working Capital Fund (DWCF) (Based on FY17 President s Budget-

More information

2016 Major Automated Information System Annual Report

2016 Major Automated Information System Annual Report 2016 Major Automated Information System Annual Report Teleport Generation 3 (Teleport Gen 3) Defense Acquisition Management Information Retrieval (DAMIR) UNCLASSIFIED Table of Contents Common Acronyms

More information

DOD DIRECTIVE DOD CONTINUITY POLICY

DOD DIRECTIVE DOD CONTINUITY POLICY DOD DIRECTIVE 3020.26 DOD CONTINUITY POLICY Originating Component: Office of the Under Secretary of Defense for Policy Effective: February 14, 2018 Releasability: Reissues and Cancels: Approved by: Cleared

More information