UNCLASSIFIED/ AFCEA Mission Command Industry Engagement Symposium MG Pete Gallagher Director, Network CFT 3 April 2018 Network CFT Collaboration, Fusion & Transparency
WARFIGHTING REQUIREMENTS Army Warfighters must be able to fight, shoot, move, communicate, protect and sustain. All of these capabilities require the ability to reliably communicate anywhere, anytime, in all domains, in all environments and against any foe. Network Characteristics & Requirements TECHNICAL NETWORK REQUIREMENTS The network must be capable of adequate secure communications, providing voice, data and video in all environments. It will offer situational awareness down to the Platoon level using devices installed, operated and maintained by Soldiers and able to work anywhere in the world. It will be standardized, running on a Common Operating Environment with common graphics, applications, and integrated data. Additionally, applications must be usable on multiple platforms (for example, a workstation in the garrison or command post, a handheld device and a vehiclemounted or airborne system). To improve force protection and operational effectiveness, the network must also mitigate electronic signatures by both minimizing and masking emissions from the network itself and the devices that use it. CHARACTERISTICS OF THE NETWORK The network must be simple and intuitive with a single mission command suite and single common operational picture that is installed, operated and maintained by Soldiers. It must be available, reliable and resilient, functioning in all operational environments against any enemy. It will be expeditionary and mobile, providing voice, data and video on the move. It will be standards-based, protected and dynamic and must be upgradeable over time. The end result is a network that enables the Warfighter to observe, orient, decide and act faster than the enemy in the conduct of Unified Land Operations, enabling the use of the network as a weapon system. This robust Army network will ensure continuous Joint interoperability and be accessible to allies and coalition partners without compromising functionality. It will enable agile and adaptive operational flexibility, including the ability to rapidly task organize and employ Joint capabilities.
Problem Scope: Mission Areas Focus: Enterprise services to the edge Network Operations Increased Network Capacity (transport) Improved Cybersecurity Network Modernization Joint Information Environment Mission Partner Environment Data Center Consolidation Cloud Computing Software Optimization Enterprise Information Environment Mission Area (EIEMA) Focus: Long haul Defense Information System Network (DISN) Services as part of the intel enterprise Intel Community IT Enterprise (IC ITE) JWICS Trojan Data & Switch Army s Portion of Defense Intelligence Mission Area (DIMA) SCIF IT Cyber Security Coalition Intel Sharing End User IT Licensing Trojan Network Control Center Focus: Expeditionary comms Reach-back to deploy a smaller, more capable force Initial entry comms Fight in a contested EW/ Cyber environment Improved SA/mission collaboration Live, virtual and constructive training Integrated tactical network Standards-based architecture Warfighting Mission Area (WMA) Business Mission Area (BMA) Focus: Assured availability/ reliability in the network to execute mission functions Enterprise Resource Planning (ERP)
The Enterprise Environment Alaska Pacific 51 Installations Japan Okinawa Korea 65 Installations 288 Army Installations 3731 Reserve Component Readiness Centers CONUS 84 Installations Hawaii SWA 10 Installations Europe 78 Installations Army Network 1.4 Million Users 965,000 Windows Assets 71,000 Mobile Devices 33,000 Servers EIEMA WMA 3,463 Private Web Servers DIMA BMA 1,932 Forward Facing Web Sites Convergence: a true end to end integrated network is necessary to rapidly deploy in mass for a large scale contingency operation. Situational Understanding: we must adequately see ourselves across the network-wide surface area to reduce cyber vulnerabilities and enable mission assurance. Asset Management: we must account for IT and network assets across all four mission areas.
The Business Environment Army Enterprise Business Intelligence Approach Analytical Tools Visualization Tools Data Engineering Big Data Platform $ Data Science $ Sensor, Unstructured & Structured Data EIEMA WMA DIMA BMA Supporting Infrastructure Legacy Data GCSS-A Global Combat Support System - Army LMP Logistics Modernization Program AESIP Army Enterprise System Integration Program GFEBS General Fund Enterprise Business System IPPS-A Integrated Personnel and Pay System Army Enterprise Resource Planning (ERP) Environment LOGSA (LIW) Logistics Support Activity (Logistics Information Warehouse) End User Data Generating Readiness: our Army business is to man, train, and equip forces. This requires dependable systems. Enterprise Resource Planning (ERP) Systems: enable the Army to generate readiness to prepare for war.
The Intel Environment #1 Standardize the Enterprise Establish enterprise baselines Collapse Military Intelligence domains (Convergence) Establish Enterprise Services Catalog #2 Modernize Trojan Define/codify mission requirements Reduce Trojan garrison transport Refine Program Requirements - Tactical transport requirements - Processing, Exploitation and Dissemination (PED) C L O U D 1 st #3 Intel Community IT Enterprise (IC ITE) Adoption FY22 Common desktop environment Cloud adoption IC Data Center Consolidation Adopt IC services JWICS EIEMA WMA ADOPT ENTERPRISE Cross Domain Solutions DIMA BMA #4 Finalize Enterprise Governance Establish oversight/ inspection processes IT governance forum: - Cyber Security working group - IT requirements validation S T R A T E G Y SIPR #3a Joint Information Environment (JIE) Utilize NETCOM services (Network Convergence) Utilize enterprise services Army Data Center Consolidation #5 Modernize/Harden IA Process Implement Risk Management Framework (RMF) process Cyber Security Score Card Publish Cyber implementation guidance Develop Cyber Security workforce Train Cyber Security workforce Educate leaders
Modernization Path Current State Doesn t enable mission command Lacks end-to-end interoperability Fragmented = lack of common standards Complex and Fragile EMS Vulnerable Multiple identities Crypto mod challenges Software baselines = interoperability challenges Four Lines of Effort: Transport Network Modernization Plan Mission Command Suite Command Posts Interoperability Addressing the Threat FY18-19: Fight Tonight, Address most pressing OPLAN Mobility, Survivability, Interoperability Improve common operating environment Augment the Network FY20-24: Address emerging threats Protected SATCOM Assured PNT Counter EW/Cyber Crypto Modification Next Generation Tactical Radios Future State Seamless end-to-end connection and PACE plan Self-generating, self-healing, multilayered integrated network Unified Transport Layer End User Device Unified Mission Command Suite Simple and Intuitive Available, reliable and resilient Expeditionary and mobile Standards-based, protected, upgradeable OODA faster than the enemy Network is a weapon system
Network Path Forward Problem Statement: The current network is too complex, fragile, not sufficiently mobile nor expeditionary, and will not survive against a peer adversary, especially in a contested and congested environment. Halt Programs that do not meet operational requirements Fix Capabilities required to fight tonight (Command Posts (CPs), Transport, Mission Command Systems, Interoperability Cross Functional Teams Pivot Improve CP mobility and survivability, Increase Transport Resiliency, Purchase available Joint /SOF and industry solutions where possible Adapt & Buy A Modernized... More Lethal Ready Force Priority Fixes Command Post Mobility & Survivability Unified Transport Layer Mission Command Application Suite Joint/Coalition Interoperability Hyper-converged Networks: Converging multiple networks (~65) into a single security infrastructure with centralized command and control Enables the Army its Soldiers and Commanders in decision making (Orient, Decide, Act) Faster than Peer Adversaries NETWORK OF THE FUTURE FLAT FAST MOBILE PROTECTED Transition from a static environment to a multi-domain battle environment enabling unified land operations Cyber EW Anti-Jam
Questions