13.07.2015 Views

Download PDF - Department of Navy Chief Information Officer - U.S. ...

Download PDF - Department of Navy Chief Information Officer - U.S. ...

Download PDF - Department of Navy Chief Information Officer - U.S. ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Climate MonitoringThe <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> <strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong> (DONCIO) represented the DON at the first International TelecommunicationUnion (ITU) and World Meteorological Organization(WMO) joint seminar in September 2009. It was organized as anopen forum for discussion <strong>of</strong> the ITU and WMO roles in the use<strong>of</strong> radio spectrum, space orbits and radio-based meteorologicaltools and systems for monitoring, mitigation and adaptation toclimate change.Between 1980 and 2005, more than 7,000 natural disastersworldwide took the lives <strong>of</strong> approximately 2 million people andproduced economic losses estimated at more than 1.2 trillion inU.S. dollars. Ninety percent <strong>of</strong> these natural disasters, 72 percent<strong>of</strong> the casualties, and 75 percent <strong>of</strong> the economic losses werecaused by weather, climate and water-related hazards, such asdroughts, floods, severe storms and tropical cyclones. For thisreason, climate change monitoring and disaster predictionmechanisms are increasingly vital for our personal safety andeconomic well-being.Radio-based applications, such as remote sensors, are themain source <strong>of</strong> information about the Earth’s atmosphere andsurface. For 135 years, there has been an excellent partnershipbetween the WMO and ITU. The WMO focuses its effortson meeting the needs for environmental information and thecorresponding radio frequency spectrum resources. The ITU, asinternational steward <strong>of</strong> the spectrum, allocates the necessaryradio frequencies to allow the interference-free operation <strong>of</strong>radio-based applications and radiocommunication systems (terrestrialand space) used for climate monitoring and prediction,weather forecasting, and disaster early warning and detection.The primary goal <strong>of</strong> the ITU/WMO seminar was to provide aforum to exchange information about meteorological and radio-frequencyspectrum management services and authoritieson the use and development <strong>of</strong> radio-based space and terrestrialsystems and applications employed for weather, water andclimate monitoring, and the relevant radio frequency spectrummanagement activities.The main issues discussed were:• The role <strong>of</strong> information communication technologies ingeneral,and radio-based technologies in particular,in monitoringclimate change;• WMO and ITU roles in development, use and effective operation<strong>of</strong> systems and applications for monitoring the environment;prediction and detection <strong>of</strong> natural disasters; andmitigation <strong>of</strong> the negative effects <strong>of</strong> disasters initiated byclimate change;• Status and development <strong>of</strong> radio-based systems and applicationsfor weather, water and climate monitoring andprediction;• Operation <strong>of</strong> meteorological systems and quality <strong>of</strong> meteorologicalmeasurements; andThe Earth Exploration Satellite (discussed on the previouspage) is used for the establishment <strong>of</strong> radiocommunicationservice between Earth stations and one or more space stations,which may include links between space stations, inwhich information relating to the characteristics <strong>of</strong> the Earthand its natural phenomena is obtained from active or passivesensors on Earth satellites. Similar information is collectedfrom airborne or Earth-based platforms, such informationmay be distributed to Earth stations within the system concerned,and platform interrogation may be included.– European Union• Activities <strong>of</strong> other national and international organizationsin climate monitoring and disaster prediction, and detectionand mitigation <strong>of</strong> the negative effects <strong>of</strong> disasters.The text for Greener Spectrum and Climate Monitoring was compiledfrom information published on the ITU’s Web Site at www.itu.int/ by Mr.Tom Kidd, DON director <strong>of</strong> strategic spectrum policy and delegate to theUnited Nations ITU World Radiocommunication Conference in 2007. Sendquestions to DONSpectrumTeam@navy. mil, or go to the DON CIO Website: www.doncio.navy.mil.8CHIPS www.chips.navy.milDedicated to Sharing <strong>Information</strong> - Technology - Experience


By Mr. D. Mark Johnson and Mr. J. Don PierceEnabling Future Naval Capabilities NAVSEA Headquarters’ PerspectiveNaval Sea Systems Command is comprised <strong>of</strong> commandstaff, headquarters directorates, affiliated program executive<strong>of</strong>fices (PEOs) and numerous field activities. NAVSEA is accountableto the <strong>Chief</strong> <strong>of</strong> Naval Operations to deliver, modernize andmaintain a 313-ship <strong>Navy</strong> that meets our national security requirements.NAVSEA has the further responsibility <strong>of</strong> establishingand enforcing technical authority in combat system designand operation. NAVSEA’s technical standards ensure systems areengineered effectively, and that they operate safely and reliably.NAVSEA is the “technical authority” for the following electromagneticspectrum-related issues that affect ships and submarines:electromagnetic interference (EMI) control; electromagneticcompatibility (EMC); electromagnetic pulse (EMP); andradiation hazards (RADHAZ). As a technical warrant holder, NAV-SEA's Force E3/Spectrum Office controls EMI, the spectrum andEMP impact on the effectiveness <strong>of</strong> warfare systems, to maintainwarfighting readiness for all ships, submarines and systems.The electromagnetic environment (EME), in which navalsystems must operate, is created by a multitude <strong>of</strong> sources.Primary contributors are ships, forces, other friendly transmissions,enemy transmissions, spurious emissions from equipment,the ship's metallic hull, natural and environmental noise,and possibly EMP resulting from a nuclear burst. The dominantcontributor(s) to the EME depend on the platform's (or system's)location and operating circumstances. Many elements <strong>of</strong>the EME are vital to system performance; others are potentialsources <strong>of</strong> EMI. Electromagnetic signals vital to one system'sperformance may prove fatal to another system's performance.An increased awareness <strong>of</strong> the EME will enhance identificationand reduction <strong>of</strong> platform/system EMI.Defense <strong>Department</strong> policy requires all electrical and electronicsystems, subsystems and equipment, including ordnancecontaining electrically initiated devices, to be mutually compatiblein their intended EME without causing or suffering unacceptablemission degradation due to electromagnetic environmentaleffects (E3).Accordingly, appropriate E3 requirements must be imposedto ensure a desired level <strong>of</strong> compatibility with collocated equipment(intra-system) within the applicable external EME that mayinclude intersystem, radio frequency, lightning, EMP and precipitationstatic. E3 requirements must also address safety <strong>of</strong> personnel,ordnance and fuel.In addition, national, international and DoD policies andprocedures for the management and use <strong>of</strong> the electromagneticspectrum direct program managers developing spectrum-dependentsystems or equipment to consider spectrum supportabilityrequirements and E3 control early in the developmentprocess, and throughout the acquisition life cycle.NAVSEA's Force E3/Spectrum Office's goal is to partnerwith each system, ship or submarine program to provide thebest products to the warfighter. This is accomplished by gettingplugged-in at the earliest stages <strong>of</strong> program development.NAVSEA subject matter experts help guide individual programsthrough the E3/spectrum certification (SC) process, requirementsidentification and controls implementation, and throughthe Technical Warrant Pyramid (Figure 1).NAVSEA Headquarters leads the tri-SYSCOM organizationconsisting <strong>of</strong> Space and Naval Warfare Systems Command(SPAWAR), NAVSEA and Naval Air Systems Command (NAVAIR)for EMI control, EMP and spectrum certification matters.10 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


Figure 1 shows the top-down organization <strong>of</strong> the ForceLevel EMC Program. At the headquarters level, front line systemsengineers interface with the various PEOs (PEO Ships, PEO Carriers,etc.). At the field activity level, NAVSEA designates engineeringagents (EAs) for specific functional areas. These EAs formteams <strong>of</strong> subject matter experts to assist in the investigation andresolution <strong>of</strong> EMI problems ashore and afloat. These activitieschampion and execute E3/spectrum management (SM) in thedesign, development, procurement and integration <strong>of</strong> equipmentand platforms, as well as naval shore sites.The Technical Warrant Pyramid illustrates the depth <strong>of</strong>knowledge and expertise that exists within the Force Level EMCProgram. This team maximizes operational performance andsafety with respect to E3 and spectrum management in shipsand submarines, their combat systems and shore installations.The key to enable future naval capabilities is well-engineeredwarfare systems. This is accomplished through a disciplinedup-front systems engineering effort, which includes thereview <strong>of</strong> acquisition documents (initial capability documents,capability development documents, capability production documents,or capstone requirements documents).To ensure EMC for new systems introduced into the fleet,NAVSEA reviews ship change documents and ensures thatsystems attain spectrum certification. NAVSEA ensures theperformance and readiness <strong>of</strong> current naval systems and thatplatforms are ready to fight by executing shipboard EMC andRADHAZ certification, the Submarine Pre-Deployment EMC Survey,and providing direct fleet and program manager support.The NAVSEA team exercises technical authority by holdingformal technical warrant holder reviews, thereby enforcingelectromagnetic environmental effects/spectrum certificationacquisition policies and providing E3/SC technical subject matterexpert guidance.In September 2009, the <strong>Chief</strong><strong>of</strong> Naval Operations, issued Guidancefor 2010 for Executing theMaritime Strategy. It reviewsthe <strong>Navy</strong>’s major 2009 accomplishmentsand reaffirmsthe vision, mission,guiding principles andfocus areas articulatedin last year’sguidance. The<strong>Navy</strong>’s focus areasremain:• Build the future force.• Maintain our warfighting readiness.• Develop and support our Sailors and <strong>Navy</strong> civilians.The CNO Guidance 2010 places emphasis on the followingfive objectives:• Continue to be the dominant, ready naval force acrossall maritime missions.• Build a <strong>Navy</strong> with appropriate force structure and strategiclaydown.• Achieve decision superiority.• Align the requirements, resources and acquisitionprocesses.• Evolve and establish international relationships.The CNO Guidance is a basis for NAVSEA's Force E3/SpectrumOffice’s goals to ensure we build the future force throughan up-front engineering process and maintain our warfightingreadiness through ship maintenance and developing our Sailorsand <strong>Navy</strong> civilians.Mr. D. Mark Johnson is the OPNAVprogram spectrum supportability, electromagneticenvironmental effects andelectromagnetic pulse coordinator.Mr. J. Don Pierce, is the director <strong>of</strong>the NAVSEA Force Level E3/SpectrumOffice.CHIPS January - March 2010 11


Assessing Spectrum SupportabilityBy Tom KiddThe electromagnetic spectrum is a critical enabler <strong>of</strong> the <strong>Department</strong><strong>of</strong> the <strong>Navy</strong>’s ability to communicate and operate ina global environment. Now more than ever before, deployedSailors and Marines depend on the electromagnetic spectrumbecause it enables nearly all <strong>Navy</strong> and Marine Corps capabilities,including strategic command and control; tactical communications(airborne and ground); intelligence, surveillance and reconnaissance;and radar, navigation and weapons systems.Spectrum is also important to world commerce because it enablesa vast array <strong>of</strong> wireless capabilities, including e-mail, mobiletelephone, and other capabilities that are now essential tomodern-day business and life. While spectrum is a finite naturalresource, it is readily available in most rural areas <strong>of</strong> the world.However, spectrum is congested in major metropolitan areaswhich include many coastal regions <strong>of</strong> the world. As a result,spectrum can be challenging to acquire in some geographicalareas <strong>of</strong> the world and easily acquired for use in others.The ability <strong>of</strong> <strong>Navy</strong> and Marine Corps forces to support diversemissions is critically dependent on the availability <strong>of</strong> spectrum.This availability is determined by a number <strong>of</strong> varying factors,including a host nation’s allocation and control <strong>of</strong> spectrumwithin its borders, congestion, and operational requirements <strong>of</strong>spectrum-dependent equipment and systems.Due to diverse and unique governance within many sovereignnations, spectrum-dependent systems and equipment procuredfor U.S. military use should be planned and designed formultiband operation or provide significant tuning flexibility tomaximize global use.Spectrum supportability is an assessment <strong>of</strong> whether theelectromagnetic spectrum necessary to support the operation<strong>of</strong> spectrum-dependent equipment or systems will be availablewhen required. While assessing the spectrum supportability forequipment does not constitute the right to operate the equipment,it can identify whether equipment can be supported withspectrum.Spectrum supportability is composed <strong>of</strong> a number <strong>of</strong> processes.Obtaining permission to operate spectrum-dependentequipment may involve a lengthy, multi-step process thatshould be started as early as possible. It begins with a SpectrumSupportability Assessment (SSA) and includes considerable coordinationand scrutiny. The box above contains guidance forensuring spectrum supportability.<strong>Department</strong> <strong>of</strong> Defense Instruction (DoDI) 4650.01, “Policyand Procedures for Management and Use <strong>of</strong> the ElectromagneticSpectrum,” requires all DoD components to conduct spec-In addition to the Spectrum Supportability Assessment, spectrumsupportability may include the completion <strong>of</strong>:◙ DD Form 1494 – Application for Equipment FrequencyAllocation◙ U.S. Equipment Certification◙ Electromagnetic Environmental Effects (E3) Assessment◙ Host Nation Coordination/Approval (HNC/HNA)◙ Frequency request/assignment◙ Spectrum Supportability Assessmenttrum supportability risk assessments as early as possible in theprocurement <strong>of</strong> spectrum-dependent systems or equipment.The purpose <strong>of</strong> the risk assessment is “to affect design andprocurement decisions” because the early identification <strong>of</strong>regulatory, technical and operational spectrum supportabilityrisks minimizes the possibility that the spectrum-dependentequipment cannot be employed to support <strong>Navy</strong> and MarineCorps requirements. Identified risks should be reviewed duringacquisition milestones for programs <strong>of</strong> record and throughout asystem’s life cycle.Within the DON, the responsibility for conducting a SpectrumSupportability Assessment resides with the organization procuringor acquiring the spectrum-dependent system or equipment.The composition and level <strong>of</strong> complexity for conducting a SSAis dependent upon a number <strong>of</strong> factors including the type <strong>of</strong>spectrum-dependent equipment and the intended operationalarea.While it is necessary to assess the supportability <strong>of</strong> all spectrumequipment intended for procurement, some equipmentrequires only completion <strong>of</strong> the SSA. This would generally includeequipment that complies with the “non-licensed” requirementsidentified in the National Telecommunications and <strong>Information</strong>Administration’s (NTIA) “Manual <strong>of</strong> Regulations andProcedures for Federal Radio Frequency Management” and forequipment that will not be used outside <strong>of</strong> the United Statesand its possessions (US&P).Equipment <strong>of</strong> this type <strong>of</strong>ten includes wireless peripheraldevices such as a wireless mouse or keyboard, wireless routersand Family Radio Service. Any spectrum-dependent equipmentintended for use outside <strong>of</strong> the US&P, regardless <strong>of</strong> conformancewith NTIA non-licensed requirements, is subject toDD Form 1494 – Application for Equipment Frequency Allocationrequirements and applicable host nation requirements.12 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


DD Form 1494 – Application for Equipment FrequencyAllocationThe DD Form 1494 – Application for Equipment FrequencyAllocation is used to record the technical characteristics <strong>of</strong>spectrum-dependent equipment and apply for host nation coordinationand host nation allocation. The technical informationdocumented on the form includes transmitter power, bandwidthand receiver sensitivity. It also includes other data that isessential for the employment <strong>of</strong> the equipment, HNC/HNA requirements,and frequency requests and assignments.Host Nation Coordination/Host Nation ApprovalIn peacetime, international spectrum governance requiresmilitary forces to obtain host nation permission to operate spectrum-dependentsystems and equipment within a sovereign nation.International governance is honored and enforced by theU.S. departments <strong>of</strong> State, Defense and <strong>Navy</strong>. In wartime, internationalspectrum governance is not honored between warringcountries; however, the sovereign spectrum rights <strong>of</strong> borderingcountries must be respected by military forces executing theirassigned missions.Accordingly, HNA is solicited by U.S. naval forces to use spectrum-dependentsystems and equipment in bordering countries’airspace and/or on bordering countries’ soil. HNA must beobtained before the operation <strong>of</strong> spectrum-dependent systemsand equipment within a sovereign nation. The combatant commanderis responsible for coordinating requests with sovereignnations within his or her area <strong>of</strong> responsibility. Because the combatantcommander has no authority over a sovereign nation,the HNC/HNA process can be lengthy.U.S. Equipment CertificationEquipment certification is a U.S. HNC/HNA process. The NTIAcoordinates and reviews equipment certification requests withthe agencies <strong>of</strong> the federal government. U.S. equipment certificationensures that the radio frequencies required for the operation<strong>of</strong> the equipment can be made available within the UnitedStates. It also ensures that equipment that cannot be supportedwith a radio frequency is not purchased.Electromagnetic Environmental EffectsThe joint definition <strong>of</strong> electromagnetic environmental effects(E3) is: “the impact <strong>of</strong> the electromagnetic environment uponthe operational capability <strong>of</strong> military forces, equipment, systems,and platforms. It encompasses all electromagnetic disciplines,including electromagnetic compatibility and electromagneticinterference; electromagnetic vulnerability; electromagneticpulse; electronic protection; hazards <strong>of</strong> electromagnetic radiationto personnel, ordnance and volatile materials; and [the] naturalphenomena effects <strong>of</strong> lightning and precipitation static.”Before the acquisition <strong>of</strong> spectrum-dependent equipment,possible impacts <strong>of</strong> electromagnetic compatibility (EMC) andelectromagnetic interference (EMI) should be considered toensure the equipment can be employed in its intended operationalenvironment.The <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> has establishedspectrum policy that aligns with international, nationaland DoD spectrum governance to attain access for allspectrum requirements <strong>of</strong> the <strong>Navy</strong> and Marine Corps.• Secretary <strong>of</strong> the <strong>Navy</strong> (SECNAV) Instruction 2400.1,“Electromagnetic Spectrum Policy and Management,”provides DON spectrum policy and delegatesspectrum responsibilities within the department(available at www.doncio.navy.mil).• SECNAVINST 5000.2D, “Implementation and Operation<strong>of</strong> the Defense Acquisition System and theJoint Capabilities Integration and DevelopmentSystem,” identifies DON specific requirements associatedwith the acquisition <strong>of</strong> spectrum-dependentequipment (available at http://doni.daps.dla.mil).• OPNAVINST 2400.20F, “Electromagnetic EnvironmentalEffects (E3) and Spectrum SupportabilityPolicy and Procedures,” provides service-level policyfor the <strong>Navy</strong> while Marine Corps Order 2400.2A,“Marine Corps Management and Use <strong>of</strong> the ElectromagneticSpectrum,” provides Marine Corps spectrumpolicy (available at http://www.marines.mil/news/publications – search on "electromagneticspectrum").In accordance with DoD Directive 3222.3, “DoD ElectromagneticEnvironmental Effects (E3) Program,” “Identification <strong>of</strong>requirements for E3 control shall be initiated early during theconcept refinement and technology development phases, fullydefined prior to Milestone C, and verified throughout the acquisitionprocess.”Frequency Request and AssignmentA frequency assignment provides authorization for operation<strong>of</strong> a spectrum-dependent system or equipment under specificrequirements and generally applies to a specific geographicalarea. Frequency assignments must be requested before the operation<strong>of</strong> systems and equipment and authorized by a properauthority for a given geographical area.Within the US&P, frequency assignments for use by federalagencies, including the DON, are authorized by the NTIA. <strong>Navy</strong>and Marine Corps requests for frequency assignments are coordinatedwith the NTIA under the authority <strong>of</strong> the DON <strong>Chief</strong> <strong>Information</strong><strong>Officer</strong>. Outside the US&P, regional combatant commandersauthorize and assign frequencies within their area <strong>of</strong>responsibility; a sovereign host nation is the ultimate authorityfor use <strong>of</strong> radio frequencies within its boundaries.Ensuring spectrum supportability for <strong>Navy</strong> and Marine Corpsequipment and systems is <strong>of</strong>ten a complex task in light <strong>of</strong> globalrequirements. But despite the enormity <strong>of</strong> the challenge, theDON maintains a fully capable team <strong>of</strong> experts to assist and processapplicable spectrum supportability requirements.Tom Kidd is the director <strong>of</strong> strategic spectrum policy for the <strong>Department</strong><strong>of</strong> the <strong>Navy</strong>. For more information e-mail DONSpectrumTeam@navy.mil.CHIPS January - March 2010 13


The U.S. <strong>Navy</strong>’s NewElectromagnetic Pulse (EMP) ProgramResurrecting the Capability in a New WorldBy Blaise Corbett and James PartakDormant for more than a decade, the U.S. <strong>Navy</strong>’s Electro -magnetic Pulse (EMP) Program is being revived through theNaval Sea Systems Command (NAVSEA) Office <strong>of</strong> the Directorfor Force Electromagnetic (EM) Effects and Spectrum Manage -ment. The program’s immediate goals include establishing cog -nizance about current standards for system acquisition as re -lated to EMP survivability; assisting with developing standardsand methodology to test and assess future systems; assessingthe current posture <strong>of</strong> mission critical systems with regard toEMP survivability; and coordinating with other <strong>Department</strong> <strong>of</strong>Defense (DoD) services and entities to share EMP resources andinformation.High-Altitude Electromagnetic PulseElectromagnetic pulse is a ra -diated electromagnetic field,typically generated and as -sociated with a nucleardetonation. A nucleardevice detonated atan altitude in ex -cess <strong>of</strong> 40 milesgenerates High -Altitude Elec -t r o m a g n e t i cPulse (HEMP),which is the focus<strong>of</strong> the U.S. <strong>Navy</strong> program. This high -altitude nuclear explosioncreates high energy photons known as gamma rays. The pho -tons collide with molecules in the upper atmosphere creatingfree electrons called Compton electrons, which then interactwith the Earth’s geomagnetic field lines to create a HEMP.HEMP can be characterized as a radio frequency emissionwith broad frequency content, high electrical field levels up to100 kilovolts per meter, and high instantaneous power den -sity levels that can exceed 20 megawatts per meter squared.HEMP is composed <strong>of</strong> three components commonly re -ferred to as E1, E2 and E3.E1, <strong>of</strong>ten referred to as the prompt component, is charac -terized by short pulse duration and a fast rise time. The actualEMP experienced is a function <strong>of</strong> the weapon yield anddesign, burst height, latitude <strong>of</strong> the burst, andrelative observer location from theburst point.E2 is <strong>of</strong>ten compared tolightning in terms <strong>of</strong> dura -tion and frequency con -tent (frequencies con -tained in the signal),while E3 has thelongest duration,lowest frequencycontent, and low -est field levels.14 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


As such, E1 poses the greatest danger to individual elec -tronic systems, while E3 poses the greatest threat to networkedinfrastructure, such as long line power and telephone networks.The focus <strong>of</strong> the military is primarily on electronic system im -pacts due to E1.With the collapse <strong>of</strong> the Soviet Union and no perceivedthreat, the military’s investments in EMP assessment capabilitieswere significantly reduced.CBRN Survivability OversightThe late 20th century saw the emergence <strong>of</strong> tactical andstrategic nuclear capabilities by developing nations whose po -litical agendas and policies are diametrically opposed to the in -terests <strong>of</strong> the United States.In September 2008, the DoD formally established a senior -level Chemical, Biological, Radiological, Nuclear (CBRN) Surviv -ability Oversight Group (CSOG) through the mechanism <strong>of</strong> theCBRN Survivability Policy, <strong>Department</strong> <strong>of</strong> Defense Instruction(DoDI) 3150.09.The CSOG charter established its mission to ensure thatequipment survivability in a nuclear weapons effects environ -ment, including EMP, is addressed specifically by requirementsduring the acquisition process. Further, the CSOG was chargedto establish the process for evaluating legacy system vulner -abilities deployed by the services and to prepare a yearly reportto Congress about the progress toward achieving hardening <strong>of</strong>each service’s mission critical systems.The CBRN Survivability Policy: (1) defines a CBRN missioncritical system; (2) calls for the establishment <strong>of</strong> processes toidentify and review a mission critical system in the context <strong>of</strong> theJoint Capabilities Integration and Development System (JCIDS);(3) establishes processes for ensuring system survivability in aCBRN environment; and (4) identifies lines <strong>of</strong> responsibility forpolicy implementation.EMP Program MissionThe new U.S. <strong>Navy</strong> EMP Program mission is multifaceted butultimately comes down to providing senior <strong>Navy</strong> leadership theinformation to assess fleet posture with regard to EMP. Currentlyfour core elements comprise the new program: testing and as -sessment, guidance, surveys and standards.The U.S. <strong>Navy</strong> EMP Program supports the functions <strong>of</strong> theNAVSEA electromagnetic environmental effects (E3) technicalwarrant holder by providing guidance to <strong>Navy</strong> acquisition pro -grams relative to military standards, requirements and designpractices.It is vital that the U.S. <strong>Navy</strong> EMP Program engage programmanagers early in the acquisition process to provide guid -ance and education about the effect these requirements haveon their respective programs. The EMP Program is standingby to assist program managers with such tasks as developingand/or reviewing capability design documents and systemspecifications.The Road AheadThe road ahead for any new program is fraught with chal -lenges. The most significant challenge for the new U.S. <strong>Navy</strong>EMP Program is cognizance. Due to the long absence <strong>of</strong> a robustEMP Program, few people in the U.S. <strong>Navy</strong> or across the greaterDoD community have an intimate knowledge <strong>of</strong> EMP causesand effects. The prevailing thought appears to be that the prob -ability <strong>of</strong> occurrence is low, so the issue is not important and canbe easily dismissed.However, the risk <strong>of</strong> failing to implement a mitigation strat -egy for EMP is at the highest level, and the consequences <strong>of</strong> fail -ing to take precautions now can be catastrophic.Blaise Corbett has been with the <strong>Navy</strong> since 2002 and has beendirectly involved in the EMP assessment <strong>of</strong> naval systems since 2004.Corbett is currently the group leader for the Naval Surface WarfareCenter Dahlgren Division EMP assessment group.James Partak, an engineer originally from Naval Surface WarfareCenter White Oak, has more than 39 years <strong>of</strong> experience in the area <strong>of</strong>nuclear effects to electronic systems. Now retired from the <strong>Navy</strong>, Jimsupports the EMP assessment group through EG&G, a division <strong>of</strong> theURS Corp.Applicable Policy• • • • • DoDI 3150.09. Chemical, Biological,Radiological, and Nuclear (CBRN)Survivability Policy (Change 1). Aug. 17,2009.MIL-STD-1310G. Standard Practice forShipboard Bonding, Grounding, andOther Techniques for ElectromagneticCompatibility and Safety. June 28, 1996.MIL-PRF-24758A. PerformanceSpecification – Conduit Systems,Flexible, Weatherpro<strong>of</strong>. Sept. 24, 2004.OPNAVINST 3401.3A. NuclearSurvivability <strong>of</strong> <strong>Navy</strong> and Marine CorpsSystems. Jan. 5, 1989.OPNAVINST 9070.1. Survivability Policyfor Surface Ships <strong>of</strong> the U.S. <strong>Navy</strong>. Sept.23, 1988.CHIPS January - March 2010 15


The <strong>Information</strong> Dominance Corps(IDC) is a management constructfor those <strong>Navy</strong> military and civilianspecialties that work in informationrelatedcareer fields. The vision <strong>of</strong>the IDC is to establish a focusedcorps integrated from across <strong>Navy</strong>'sinformation-intensive fields —comprised <strong>of</strong> more than 44,000 <strong>Navy</strong>pr<strong>of</strong>essionals.Figure 2.✓The <strong>Navy</strong> established and stood upFleet Cyber Command/U.S. 10th Fleetas the <strong>Navy</strong>'s operational element forcyber and information-related activityand as the U.S. <strong>Navy</strong> ComponentCommand to DoD's new sub-unifiedcommand, U.S. Cyber Command (US-CYBERCOM). The establishment <strong>of</strong> FLT-CYBERCOM was effective Oct. 1, 2009,with a directive to be fully operationalby Oct. 1, 2010.✓Establishment <strong>of</strong> the <strong>Navy</strong> <strong>Information</strong>Dominance Corps (IDC) — simplydefined as the combination <strong>of</strong> all the information-relatedspecialties <strong>of</strong> the <strong>Navy</strong>under N2/N6 to better synchronize thetraining, knowledge and skills <strong>of</strong> thesecritical career fields.✓The transition <strong>of</strong> Director, <strong>Navy</strong> Staff-Quadrennial Defense Review (DNS QDR)to Director, Naval Warfare Integration(N00X). In this construct N00X serves as apermanent directorate assigned to assessthe alignment between <strong>Navy</strong> warfarestrategy and investments, and to providethe CNO recommendations on how bestto improve <strong>Navy</strong>'s ability to deliver thecapability, capacity and strategy neededto meet national and combatant commanderneeds.✓Movement <strong>of</strong> the information-relatedelements <strong>of</strong> N3 (N39, information andcyber operations) and N8 (unmannedsystems programs and resources) into theN2/N6 organization.With regard to the reorganization <strong>of</strong> N2and N6, one might assume that a reorganization<strong>of</strong> this scope and scale wouldsimply take the easy road <strong>of</strong> establishingan Assistant DCNO (ADCNO) for Communicationsand an ADCNO for Intelligence,effectively maintaining the integrityand responsibilities <strong>of</strong> the previous staffdirectorates.However, it was understood early onthat to achieve warfighting dominanceand game-changing information capabilities,the new construct had to effectivelymeld the two organizations into one. Theplanning team worked hard to developan integrated organization as representedin Figure 1.As can be seen, this is not a simple combining<strong>of</strong> two directorates under one seniorflag <strong>of</strong>ficer.Generally, the corporate side <strong>of</strong> theorganization provides the manpower, intelligenceand compliance structure forthe operation <strong>of</strong> the entire organization,while the business side <strong>of</strong> the organizationis effectively involved in creating thevision and strategic roadmap for informationdominance while developing,integrating and managing the programsand future capabilities that will meet themandate for the organization as set forthby the CNO.Further, the reorganization has specificimplications for all members <strong>of</strong> the newlyformed <strong>Information</strong> Dominance Corps.As previously stated, the IDC is a managementconstruct for those <strong>Navy</strong> militaryand civilian specialties that work in information-relatedcareer fields.The vision <strong>of</strong> the IDC is to establish afocused corps integrated from across<strong>Navy</strong>'s information-intensive fields —comprised <strong>of</strong> more than 44,000 <strong>Navy</strong>pr<strong>of</strong>essionals. Individual communitiesand specialties will maintain their uniquehistory and culture, but a new structure,illustrated in Figure 2, ensures synergyand collaboration.During the summer <strong>of</strong> 2009, the Secretary<strong>of</strong> Defense directed the commander<strong>of</strong> U.S. Strategic Command tostand up a new sub-unified commandfocused on the integration <strong>of</strong> defensecyberspace operations. In response tothat guidance, the CNO directed the establishment<strong>of</strong> FLTCYBERCOM/10th Fleetas the Naval Component Command forUSCYBERCOM.As such, FLTCYBERCOM has the responsibilityto:• Serve as the central operational authorityfor networks, intelligence, cryptology/signalsintelligence (SIGINT), informationoperations, cyber, electronicwarfare, and space in support <strong>of</strong> forcesafloat and ashore;• Operate a secure, interoperable navalnetwork; coordinate <strong>Navy</strong>'s operationalrequirements for intelligence, informationoperations, networks, cryptology/SIGINT, and space capabilities; and,18 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


Figure 3.Fleet Cyber Command/U.S. 10th Fleet, the<strong>Navy</strong> ComponentCommand for U.S. CyberCommand, is the centraloperational authority fornetworks, intelligence,cryptology/signalsintelligence (SIGINT),information operations,cyber, electronicwarfare, and spacein support <strong>of</strong> forcesafloat and ashore. Theprojected command andcontrol relationships forFLTCYBERCOM/U.S. 10thFleet are shown here.The U.S. <strong>Navy</strong> is undertaking a significant transformation to better position itself for the future operating environment.The goal <strong>of</strong> the N2/N6 reorganization is to achieve unprecedented agility and innovation in development and integration<strong>of</strong> information capabilities, to achieve <strong>Information</strong> Dominance over our current and future adversaries, and to providedecision superiority for our commanders, operational forces and coalition partners, at the time and place necessary forsuccess in any future environment.• Provide operational support to <strong>Navy</strong>commanders worldwide in the areas <strong>of</strong>cyber, information and computer networkoperations, electronic warfare and space.The projected command and controlrelationships for FLTCYBERCOM are indicatedabove in Figure 3.Undoubtedly, the U.S. <strong>Navy</strong> is undertakinga significant transformation to betterposition itself for the future operatingenvironment. The goal <strong>of</strong> this effort is toachieve unprecedented agility and innovationin development and integration <strong>of</strong>information capabilities, to achieve <strong>Information</strong>Dominance over our current andfuture adversaries, and to provide decisionsuperiority for our commanders, operationalforces and coalition partners, atthe time and place necessary for successin any future environment.Accordingly, the N2/N6 has establishedsome initial guiding principles as webegin this strategic endeavor. First principlesinclude:❒ Every platform is a sensor;❒ Every sensor is networked;❒ Every collector and sensor will be dynamicallytasked and managed; and❒ Every shooter must be capable <strong>of</strong>using target data derived from any sensor.This is a very large undertaking, leveragingthe knowledge and capabilities <strong>of</strong>a newly integrated and multidisciplinedstaff. One month into the transition, it isalready possible to foresee the impact <strong>of</strong>this new organization on the future <strong>of</strong> the<strong>Navy</strong>.The energy and support dedicated tothis effort presage significant changes forthe way the <strong>Navy</strong> organizes to fight andwin future conflicts across all spectrums<strong>of</strong> engagement and warfare.I feel confident that this new, groundbreakingreorganization <strong>of</strong> the <strong>Navy</strong>staff, combined with the establishment<strong>of</strong> FLTCYBERCOM/10th Fleet and the <strong>Information</strong>Dominance Corps, will serve asthe best solution to leverage and managenew information technologies within aconstruct that provides strategic decisionsuperiority to <strong>Navy</strong> commanders workingto ensure the defense and security <strong>of</strong> ourgreat nation.Jack N. Summe is a senior advisor for strategicengagement for OPNAV N2/N6 and a DefenseIntelligence Senior Level (DISL) employee.DISLs are recognized leaders and authoritiesin a specialized field or functional area. Formore information about the U.S. <strong>Navy</strong>, go tothe <strong>Navy</strong> news site at www.navy.mil.CHIPS January - March 2010 19


Getting from NMCI to NGEN Early Transition Activities will ensure the seamless follow-on <strong>of</strong> the Next Generation Enterprise NetworkBy Capt. Tim HollandThe year 2010 marks the end and thebeginning <strong>of</strong> an era in naval informationtechnology. After 10 years <strong>of</strong> the <strong>Navy</strong>Marine Corps Intranet, the largest intranetin the world and the single largestdefense IT program, the <strong>Department</strong> <strong>of</strong>the <strong>Navy</strong> has started its evolution towardthe Next Generation Enterprise Network,the follow-on to NMCI. In fact, NGEN ispreparing for the transition through aseries <strong>of</strong> initiatives called Early TransitionActivities. These ETAs are paving the wayfor the DON’s vision <strong>of</strong> the Naval NetworkingEnvironment in 2016.In 2009, the DON began to developETAs to prepare for a successful migration<strong>of</strong> services from a contractor-owned, contractor-operatedmodel to one that givesthe government increased command andcontrol (C2). The ETAs are made up <strong>of</strong>several initiatives that will establish processesand tools used to lay the groundworkfor a seamless transition betweenNMCI and NGEN. The ETAs will mitigatethe risk for government and industry asthe IT platform’s operational model shiftsto becoming government-owned.The NGEN Program Office, or PMW 210,is part <strong>of</strong> the program portfolio <strong>of</strong> theNaval Program Executive Office for Enterprise<strong>Information</strong> Systems (PEO EIS). InAugust 2009, PEO EIS received approvalfor all ETA acquisition decisions and programmaticdocuments. PMW 210 is alsoauthorized to manage the ETAs as risk reduction/riskmitigation efforts. As a result<strong>of</strong> this approval, the NGEN Program Officeand PEO EIS regularly provide statusupdates on the ETAs to the Assistant Secretary<strong>of</strong> the <strong>Navy</strong> for Research, Developmentand Acquisition (ASN RDA), as wellas conducting summits with NGEN stakeholdersto keep them informed.The ETAs are substantial in size andscope. Their scope encompasses people,processes and tool enhancements for the<strong>Navy</strong> and Marine Corps. Descriptions <strong>of</strong>the funded ETAs as <strong>of</strong> press time follow.ITSM Process DevelopmentTo achieve operational control acrossa large IT enterprise comprised <strong>of</strong> multipleservice providers, the governmentEarly Transition Activities will prepare the network for a successful migration <strong>of</strong> servicesfrom NMCI through the Continuity <strong>of</strong> Services Contract (CoSC) period to the implementation<strong>of</strong> NGEN.must enhance insights in IT Service Management.ITSM is a discipline for managinginformation technology systemscentered on the customer's perspective.NGEN will leverage the <strong>Information</strong> TechnologyInfrastructure Library (ITIL V3), aframework <strong>of</strong> industry best practices forITSM. Some inherent benefits for organizationsthat have chosen to adopt ITIL forservice management include lower costsand improved services.To develop the ITIL competency, theNGEN Program Office, in conjunction withNaval Network Warfare Command (NET-WARCOM), will use a phased approach todeploy customized and integrated ITSMprocesses based on the ITIL V3 framework.The NGEN Program Office and NET-WARCOM have begun the initial processdevelopment work for knowledge management;service asset and configurationmanagement; information security management;incident management; eventmanagement; and portfolio management.The NGEN Program Office will leadNGEN stakeholders through process designefforts to cultivate standardized processes,procedures, roles, performancemanagement plans and tools to supportfuture NGEN services.This ETA will also develop standardizedservice management procedures that willensure government oversight, IT conformance,standardization and integration<strong>of</strong> ITSM processes across all segments<strong>of</strong> the NGEN environment. To effectivelymanage the network, the ETA will lay thegroundwork for the creation <strong>of</strong> trainingspecifications for NGEN and contractornetwork management resources.Enterprise Tools StrategyLike the ITSM Process ETA, the EnterpriseTools ETA is part <strong>of</strong> the proposed NGENITSM/ITIL framework and is responsiblefor the strategy and implementation/integration<strong>of</strong> technical solutions. Since NGENis moving toward a consolidated managementenvironment to reduce costs andincrease the level <strong>of</strong> services it providesto customers, ITSM tools for automation,monitoring and management are a mandatorypiece to the enterprise puzzle.This ETA will analyze current tools, performindustry research, develop designrequirements and interfaces, and recommendvendor tool integration specificationsdeemed by the government as necessaryto support and enforce enterprisestandards for its ITSM processes. This ETAwill reduce NGEN tool acquisition risk byanalyzing government and commercial<strong>of</strong>f-the-shelf tools, and recommend toolsthat tightly integrate all ITSM processes,while simultaneously reducing customizedtools and overall costs.The Enterprise Tools ETA strategy is alsoexpected to increase the efficiency <strong>of</strong>ITSM processes and facilitate collaborationamong multiple stakeholders. By integratingstate-<strong>of</strong>-the-art processes andstandard workflow tasks, NGEN will also20 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


standardize enterprise management activities. Ultimately, thesuccessful transition from NMCI to NGEN will incorporate ITIL V3training for personnel as a necessary part <strong>of</strong> the implementationprocess. Support will be furnished by qualified ITIL V3 staff.Global NetOps C2 Workforce EstablishmentAchieving NetOps effects in the NGEN environment impliesan ability to conduct seamless, synchronized and integrated visibility,management, and command and control <strong>of</strong> assets and/or resources within NGEN management domains. The focus <strong>of</strong>this ETA is to provide capability to achieve the NetOps essentialtasks and their desired effects in relation to shared situationalawareness, unified C2, network assurance, enterprise management,content management, assured system and network availability,assured information delivery and assured informationprotection. To achieve these effects, the NetOps ETA will developthe personnel, processes and tools to support NGEN NetOpsrequirements and capabilities, including:• Visibility into the health and status <strong>of</strong> NGEN operations andalignment <strong>of</strong> operational and contractual authorities;• Alignment <strong>of</strong> resources with military organizations andmissions;• Focus on network defense activities;• Support the full range <strong>of</strong> continuity <strong>of</strong> operations activities;• Ability to associate performance issues with a specific NGENsegment; and• Development <strong>of</strong> tool requirements and processes to exerciseC2 over NGEN resources.Comprehensive Facilities InventoryTo properly inform the NGEN request for information/requestfor proposal (RFI/RFP) activities, the DON will create a comprehensiveasset database <strong>of</strong> NMCI’s core infrastructure. The ComprehensiveFacilities Inventory ETA will capture the informationnecessary to establish an Enterprise Infrastructure Asset baseline<strong>of</strong> the current NMCI infrastructure. This will facilitate transitionfrom the vendor-controlled environment to the government-controlledNGEN environment. To establish this baseline,the government will assess the current state <strong>of</strong> asset configurationinformation and develop a strategy for collecting and analyzingthe data.CTR Workforce ReconstitutionCurrently, DON contract technical representatives (CTR) performservice-related functions, such as ordering, invoicing andcontract execution for users on the NMCI contract, as a collateralduty. The CTR Workforce Reconstitution ETA will perform the workanalysis and manpower development documentation needed toalign the CTR workforce with NGEN acquisition and mission strategies.The ETA will define NGEN CTR roles and responsibilities, aswell as training requirements, to meet NGEN performance expectations.By leveraging a unified and coordinated approach to areconstituted CTR workforce, the DON will improve its ability torealize reduced costs through blended training, as well as ensurea seamless CTR transition from NMCI to NGEN.DISN Core ExtensionThis ETA will bring wide area network (WAN) connectivityfrom the Defense <strong>Information</strong> Systems Network (DISN) to fivemajor DON nodes in the Atlantic and Pacific areas <strong>of</strong> responsibility.One <strong>of</strong> the issues with the current DISN subscription servicestructure is that it does not provide enough sites with sufficientbandwidth. Enhanced connectivity provided by this ETA will improveperformance and maximize bandwidth usage by utilizinga higher maximum transition unit and through rate shaping, orfiltered bandwidth. This should resolve DISN subscription servicesissues with the Defense <strong>Information</strong> Systems Agency (DISA),the <strong>Department</strong> <strong>of</strong> Defense’s primary communications system.By achieving efficiencies in the DISN’s subscription servicesand minimizing NGEN’s circuit costs, the ETA will improve quality<strong>of</strong> service for warfighters and reduce costs for the DON.Marine Corps Upgrade WAN and Enterprise ServicesThe Wide Area Network and Enterprise Services ETA consists<strong>of</strong> various IT assets that will directly replace and refresh existingMarine Corps Enterprise Network (MCEN) infrastructure itemsfor approximately 30,000 users.Marine Corps Installation East PilotThe Marine Corps Installation East Pilot will be conducted atHeadquarters Marine Corps Installations East, Marine Corps BaseCamp Lejuene, N.C. Transition activities will include assumption<strong>of</strong> operational control <strong>of</strong> the base area network, local area network,migration <strong>of</strong> end-users to Marine Corps Worldwide ActiveDirectory, various management and sustainment processes, andtransition <strong>of</strong> user workstations for approximately 1,200 users.This ETA will serve as the model for the entire Marine CorpsNGEN transition strategy.How We Get ThereEach ETA has its own program life cycle and is managed withinan integrated product team (IPT) in the NGEN Program Office.Some <strong>of</strong> the ETAs, such as the Comprehensive Facilities Inventory,are nearing completion in their life cycles whereas otherETAs, such as the ITSM/ITIL Processes and Tools, will continueuntil NGEN reaches its full operating capability.PMW 210 continues to meet with stakeholders as it staffs andexecutes the ETAs in coordination with PEO EIS and ASN RDAoversight. The NGEN Program Office is also reviewing ETA deliverableswith the IPTs responsible for each activity and aligningactivities with the services that will be provided under the newNGEN operating model.This is truly an exciting time to be a part <strong>of</strong> naval IT. As wetransition from a model that made great strides in unifying ourdepartment under one IT platform, we continue the work thatwas begun 10 years ago in maximizing efficiencies and reducinglegacy systems. As one <strong>of</strong> the program <strong>of</strong>fices <strong>of</strong> PEO EIS, NGENembraces its motto, “Enabling the Enterprise.”I am very proud <strong>of</strong> the work being conducted by the IPTs andthe early progress made by the ETAs to successfully transition toNGEN and to achieve the DON’s vision for the Naval NetworkingEnvironment ~ 2016.Capt. Timothy Holland is the PMW 210 program manager. He isa graduate <strong>of</strong> the U. S. Naval Academy with a bachelor’s degreein engineering and a Master <strong>of</strong> Science degree from the NavalPostgraduate School.CHIPS January - March 2010 21


U.S. Joint Forces Command Provides Global Force Managementincreased troop levels means better security forthe afghan people and an extraordinary logisticscampaign for U.S. troop deploymentBy Sharon andersonOn Dec. 1, 2009, President Obama directed an additionalsurge <strong>of</strong> 30,000 troops to southern and eastern Afghanistan toreverse the negative security trends in these areas. The first <strong>of</strong>the troops are expected to arrive within days <strong>of</strong> the president’sannouncement and most <strong>of</strong> the remainder by mid-summer.U.S. Joint Forces Command, in its primary force provider role,is helping combatant and operational commanders plan andsynchronize the deployment <strong>of</strong> forces to carry out the president’sstrategy.Air Force Brig. Gen. Robert Yates, director for Operations,Plans, Logistics and Engineering (J3/4) for USJFCOM,spoke about USJFCOM's role in the Global Force Management(GFM) process, the approach used to deploy the troopsand supporting elements to Afghanistan, in mid-December.“We are getting final details on some <strong>of</strong> the requirements; weknow most <strong>of</strong> them,” Yates said.Once a combatant commander’s request is validated by theJoint Staff, it is forwarded to master planners in the Joint DeploymentCenter which opened in October 2009. The JDC staffhas significantly assisted in analyzing and recommending whichforces will best fill commanders’ needs, according to Yates.Although, it may appear to look like the typical <strong>of</strong>fice filledwith computers and desks, the JDC is ergonomically engineeredto facilitate collaboration. Instead <strong>of</strong> cubicles and halls withclosed doors, the center is an open space with state-<strong>of</strong>-the-artcommunications. Teams can be quickly formed or clustered totackle a specific requirement.The JDC staff is about 275 strong with representation from allthe services which makes planning much easier, said Yates. TheJDC staff is comprised <strong>of</strong> active duty and Reserve service membersrepresenting all four services, DoD civilians, many <strong>of</strong> whomare retired military members, and contract personnel. The forcesourcing effort, however, goes far beyond the JDC staff.The force sourcing effort is led by JFCOM personnel from theJDC, but involves other JFCOM directorates, JFCOM service componentsfrom the Army, <strong>Navy</strong>, Air Force and Marine Corps, andeach <strong>of</strong> the services at the leadership level.The force sourcing institution is organized into Joint WorkingGroups (JWGs) arranged by subspecialty and spread through thecommand, components and services accordingly. For instance,sourcing <strong>of</strong> medical requirements is primarily handled throughpersonnel from the JFCOM Surgeon’s Office (J02M) who liaisewith service medical providers. Communications requirementsare sourced with the assistance <strong>of</strong> JFCOM’s Command, Control,Communications and Computer Directorate, commonly knownas the J6, and JFCOM’s Intelligence Directorate (J2) helps to facilitatethe sourcing <strong>of</strong> intelligence requirements.The core <strong>of</strong> expertise resides in the JDC, but the actual sourcingeffort includes hundreds, if not thousands, <strong>of</strong> expertsnationwide.“If we are discussing the requirement for an engineering unitor a Marine battalion, we don’t have to call outside this room,the representatives for the services are right here and can tell uswhat is available,” Yates said.The JDC serves as a command center for both the <strong>Navy</strong> andJoint Forces Command separated by a movable wall that can beeasily removed for joint planning. For example, in a domesticcrisis, commanders can quickly regroup to get the informationthey need regarding the status <strong>of</strong> forces and how they can bedeployed to respond to the emergency.Yates compared his staff’s current challenge to the one it facedin the 2007 surge <strong>of</strong> troops to Iraq. He said that challenge wasone <strong>of</strong> J3/4’s biggest successes as a joint force provider. Whilethere are lessons learned to apply in the current surge, there arebig differences in the requirements.“They’re unique situations with unique requirements,” Yatessaid. “The type <strong>of</strong> force that we use for an Afghanistan counterinsurgencyand training effort is going to be a little bit differentthan what was needed for the Iraqi surge. Each theater is uniquein terms <strong>of</strong> force requirements, strategy, terrain, logistics andsecurity.”Included in the deploying force structure are about 4,100 supportpersonnel in the areas <strong>of</strong> logistics, engineering, operationalplanners, and specialized providers, for example, explosive ordnancedisposal (EOD) and security teams.Just over half <strong>of</strong> the forces have been identified and informed<strong>of</strong> their upcoming deployments, according to Yates. The responsibilityfor coordinating the rotations falls to USJFCOM.Defense <strong>Department</strong> <strong>of</strong>ficials announced in early Decemberthat 1,500 Marines from Camp Lejeune, N.C., will deploy later inthe month, and 6,200 Marines <strong>of</strong> Regimental Combat Team 2 atCamp Lejeune were alerted for deployment early in the spring.The 1st Marine Expeditionary Force at Camp Pendleton, Calif.,also will deploy 800 Marines in the spring, along with an influx<strong>of</strong> 3,400 soldiers from the 1st Brigade Combat Team from theArmy’s 10th Mountain Division at Fort Drum, N.Y., department<strong>of</strong>ficials said.USJFCOM’s goal is to anticipate requirements and have thenecessary personnel identified and accounted for 18 months inadvance <strong>of</strong> commanders’ needs, but <strong>of</strong>ficials <strong>of</strong>ten must adaptquickly to changing demands on the ground.The general explained the process for how combatantcommanders request troops or resources to fulfill missionrequirements.“Because Afghanistan is in the U.S. Central Command area<strong>of</strong> responsibility, I’ll use CENTCOM as an example. When Gen.[Stanley] McChrystal (commander <strong>of</strong> the International SecurityAssistance Force in Afghanistan) sends a request for troops, hisrequirement goes to Gen. [David] Petraeus, CENTCOM commander,then to the Chairman <strong>of</strong> the Joint <strong>Chief</strong>s <strong>of</strong> Staff for validation.JFCOM’s role is to analyze the requirement and providecourses <strong>of</strong> action in the form <strong>of</strong> recommendations for the JointStaff,” Yates said.22 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


Sometimes combatant commanders get exactly what theyrequest, other times the forces they want are not available, andJFCOM can craft a solution that will provide the same effect.“If a requirement comes in for an Army or Marine battalion, weask the services what is available including National Guard units.If there isn’t one available, we can work with the COCOM to tryto further refine the requirement, maybe a security force wouldanswer the requirement, and we can provide that,” Yates said.Unit requirements are filled in one <strong>of</strong> four ways. The primarysourcing method is through a “standard” sourcing solution,meaning it most closely answers the request <strong>of</strong> the combatantcommander. For example, if the request is for engineering capabilitiesto support an Army Brigade Combat Team, the standardsolution would be an Army Engineering Battalion.Should a standard solution be unavailable, JFCOM next looksto a “joint” solution whereby a unit from another service thatpossesses the same core capabilities is used to satisfy the request.In the example above, an Air Force RED HORSE engineeringunit or a <strong>Navy</strong> Seabee battalion could be used as a jointsolution.If no standard or joint solution is available, but the request canbe filled by retraining a unit to another core capability, an “inlieu-<strong>of</strong>”(ILO) sourcing solution can be used. For example, if therequest is for a transportation unit that moves cargo in trucks, afield artillery unit can be trained for the mission and temporarilyassigned to it. ILO solutions normally keep units intact whileperforming a mission outside their core capability.Some requests cannot be satisfied through standard, jointor ILO solutions. This typically happens when a capability isrequested by a combatant commander, but not held in the inventory.In this case, JFCOM may assemble an ad hoc unit bygathering personnel with the requisite skills and forming a new,temporary unit. These personnel can, and do, come from all theservices based on skill set and are assembled into a temporaryunit complete with an appropriate command structure. Anynecessary training is accomplished to ensure the new unit isfully capable <strong>of</strong> accomplishing the mission without undue risk.The efforts in Iraq and Afghanistan might appear to heavilydepend on Army and Marine Corps ground forces, and they are,but there are significant contributions from the <strong>Navy</strong> and AirForce as well, Yates said.There is substantial air capability from bases inside Iraq and Afghanistan,as well as from aircraft carriers afloat in neighboringseas. All four services contribute in skill sets such as intelligence,EOD, military police and engineering. Air Force and <strong>Navy</strong> medicalpersonnel and units provide medical evacuation capability,as well as trauma care on the ground. Air Force RED HORSE unitsand <strong>Navy</strong> Seabee battalions perform a myriad <strong>of</strong> constructiontasks from building roads, to digging wells, to raising buildings.Logistics teams from every service maintain the flow <strong>of</strong> food,water, consumables and fuel to units widely dispersed throughoutthe theater. Intelligence specialists are in high demand, andevery service provides these valuable personnel to units andstaffs on the ground. Operations Iraqi Freedom and EnduringFreedom are very much team efforts requiring significant contributionsfrom every branch <strong>of</strong> the U.S. military.While Marine Corps and Army units typically deploy with aU.S. Joint forces Command Joint Deployment Center, which opened inoctober 2009, is ergonomically engineered to facilitate collaboration.instead <strong>of</strong> cubicles and halls with closed doors, the center is an openspace with advanced communications. in an emergency, teams can bequickly formed to tackle a specific requirement. the facility covers49,000 square feet and has a state-<strong>of</strong>-the-art data, communications andaudio-visual collaborative network supported by more than 110 miles <strong>of</strong>cable. a centralized server and secured hard drives eliminate the needfor desktop personal computers, optimizing work space and network security.the JDC contains a conference center, operational areas and acrisis response center.CHIPS January - March 2010 23


air force Brig. Gen. robert yates, director for operations, plans, Logisticsand engineering (J3/4) for USJfCom, and air force Capt. mei ling taylor,Joint force provider orders Writer in USJfCom's Joint DeploymentCenter. the JDC, located on the norfolk naval Base, plays a pivotal rolein the Global force management process, the method used to respond tocombatant commander requirements.Below, army Col. eric Weidemann, former J3/4 <strong>Chief</strong> <strong>of</strong> Staff. he isprepping for a tour in afghanistan.Photos by Air Force Staff Sgt. Vanessa M. Valentine, U.S. Joint ForcesCommand photographer.supporting infrastructure for communications and operations,and with provisions for food and shelter, it is reasonable to anticipatethat much <strong>of</strong> the deploying supporting element will tacklethe logistical challenges <strong>of</strong> providing for the additional troops,according to Yates.“We take it day-by-day. In a typical day, there is activity atevery level <strong>of</strong> the enterprise. While sourcing is a serial process,following a sequence <strong>of</strong> combatant commander requests, Chairmanvalidation, Joint Force Provider sourcing, Joint Staff recommendation,and Secretary <strong>of</strong> Defense approval, these functionsoperate in parallel at any given time. On a normal day in the JDCvalidated requests are being received, others are being parsedout to the JWG leads for potential solutions, others are beingpitched to the Joint Staff, and still others are being presented toSecDef for approval."There is a great deal <strong>of</strong> liaison work throughout the process.JDC action <strong>of</strong>ficers (AO) <strong>of</strong>ten discuss the specific details <strong>of</strong> validatedrequirements with their counterparts from the geographiccombatant commanders. They also negotiate with their JFCOMservice component counterparts over potential solutions. Issuesthat can not be resolved at the AO level are presented duringgeneral and flag <strong>of</strong>ficer (GO/FO) secure video teleconferencesin an effort to reconcile solutions when requirements outnumbercapabilities," Yates said.While there is no one priority at the top <strong>of</strong> his list, Yates saidthat his staff understands the enormity <strong>of</strong> their task to get Gen.McChrystal the flexibility he needs to put troops where needed.Many <strong>of</strong> the 30,000 U.S. forces will be employed to combat theTaliban, while others will assist NATO troops in training new Afghansoldiers and police.The 2010 goal for trained and equipped Afghan soldiers is134,000 and about 110,000 for the Afghan police, said Joint StaffChairman Adm. Mike Mullen at a Pentagon news conferenceDec. 10, 2009.Afghanistan's international partners showed their enduringcommitment by pledging about 7,000 additional troops.Some 43 nations will contribute to a security effort that will benearly 150,000 strong — at the invitation <strong>of</strong> the Afghans — andwith the sanction <strong>of</strong> the United Nations, reported the Defense<strong>Department</strong>.“The ability to contribute to the uplift <strong>of</strong> U.S. forces to Afghanistanas ordered by the president is a great honor. While most <strong>of</strong>us here would prefer to be among those deployed and contributingdaily to the coalition effort in Afghanistan, we understandthe importance <strong>of</strong> doing our job well to the ultimate achievement<strong>of</strong> success," Yates said."We know the new strategy and increased force levels will resultin achievement <strong>of</strong> our national objectives in Afghanistan;because <strong>of</strong> this our contribution to that success as force providersis very rewarding and a point <strong>of</strong> pride for the men andwomen <strong>of</strong> the Joint Forces Command J3/4 involved in the sourcingeffort.”Sharon Anderson is the CHIPS senior editor. For more informationabout the Joint Deployment Center, go to www.jfcom.mil.24 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


It can be embarrassing toattempt to predict technologybeyond its current developmenthorizon. This isespecially challenging whenthe technology has begunto accelerate exponentially.To predict the future <strong>of</strong> radiointo the second half <strong>of</strong> the21st century, we will need tolook back at its developmentfrom a 19th century oddity, toa 20th century necessity, andinto the early years <strong>of</strong> the 21stcentury.The expansion <strong>of</strong> Maxwell’selectromagnetic theory <strong>of</strong>light by Heinrich Hertz in 1886starts our timeline.Radio’s first 50 years sawthe technology move out <strong>of</strong>the laboratory and into society.By the mid-1930s, radio,television and radar had becomethe cutting-edge technology<strong>of</strong> the day. However,another technology was alsoin development that wouldnot only eclipse radio as theicon <strong>of</strong> the future, but wouldforever change the way radiotechnology is employed insociety. This development,the computer, changed thefundamental building blocks<strong>of</strong> radio hardware. And it isthat marriage <strong>of</strong> computer toradio that is having the greatestimpact on radio’s secondcentury.It has been said <strong>of</strong> technologythat “form follows function.”But when the function isformless an interesting opportunityfor integration occurs.In the later years <strong>of</strong> the 20thcentury, the function <strong>of</strong> producingradio waves movedout <strong>of</strong> the physical dimension<strong>of</strong> tubes and transistors to becomea function <strong>of</strong> s<strong>of</strong>twareand microchips.Today’s wireless technologyis a chipset capability and nolonger a proprietary device.While we will always have legacytechnology, somewheresomeone is still making buggywhips, the future <strong>of</strong> radio is todisappear into an integratedinterconnected fabric <strong>of</strong> theworld around us.Within the next decade,radio technology will enablethe wireless exchange <strong>of</strong> informationamong systemsranging from household appliancesto automobiles. Theper unit cost <strong>of</strong> wireless nodeswill continue to drop whiletheir capabilities will continueto increase. Lower cost deviceswill lead to their integration indiverse and unexpected ways.As we head into the middle<strong>of</strong> the 21st century we won’tbe surprised to find that more<strong>of</strong> our devices are interconnectedthan are not. Takinga studied look around thetypical <strong>of</strong>fice or home, we findcountless items that will interactwith each other in muchthe same way that we interactwith them today.Where today, a humanlooks for wear and tear inhome or <strong>of</strong>fice equipment;in 2050, a device will not onlyknow its level <strong>of</strong> wear but willcommunicate with other affecteditems to manage itsdeficiencies.Perhaps our transportationsystems will communicatewith other systems or devicesto optimize our experiences orminimize their impact on ourenvironment.And the knowledge wecollect may interact with thecollective knowledge <strong>of</strong> ourfriends, family, co-workers,and their devices to anticipatecapabilities we may not knowwe need until they are presentedfor our use.While total interconnectivitythroughout our environmentis unlikely, the ratio <strong>of</strong> interconnectionto disconnectionwill be much higher than it istoday. All this interconnectionwill be done wirelessly. Physicalconnections will be seen ascumbersome and antiquated.But the radio, as a uniquedevice, will have all but disappearedinto the productsthemselves.By January 2050, the typicalconsumer will assume a deviceis capable <strong>of</strong> wireless interconnectivityand will be surprisedwhen it isn’t.Tom Kidd is the director <strong>of</strong>strategic spectrum policy forthe <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong>.CHIPS January - March 2010 25


Advances in Magnetometer TechnologyU.S. Marines will no longer have to worry about what is hidden behind the next rock – they will knowBy Tom LaPuzzaA six-year collaboration by Space andNaval Warfare Systems Center Pacific (SSCPacific) scientists and engineers, withcolleagues in Sweden and Sicily, has putnew force protection technology into thehands <strong>of</strong> U.S. Marines, who will be takingit to the battlefield sometime this year.Drs. Adi Bulsara and Visarath In, servingas principal investigators, and severalother SSC Pacific personnel, have beenworking with physicists and engineersfrom the University <strong>of</strong> Catania in Italy andthe Swedish Defense Research Agency(FOI) in Stockholm, to harness the substantialpotential <strong>of</strong> nonlinear dynamicsfor military and civilian applications.These applications include battlefieldsensors disguised as rocks that can communicatewith each other and pass vitalinformation to military planners via satellitelinks. Similar sensors can be placedon the seafloor and detect swimmers anddivers passing in the water column a fewmeters away.An add-on to the U.S. Marines’ TacticalRemote Sensor System (TRSS) will allowa reconnaissance patrol to image armedindividuals even through a wall, and canalso be deployed in remote areas as anunattended ground sensor for persistentsurveillance. Other sensors, the size<strong>of</strong> clothing buttons, can also be distributedrandomly around a building to alertsecurity personnel to the presence <strong>of</strong>intruders.Technology DevelopmentThe basic idea <strong>of</strong> using the principles <strong>of</strong>nonlinear dynamics in developing a magnetometerwith a simpler readout basedon the idea <strong>of</strong> spike timing, which underpinsthe neural code, came during a 2003discussion between Dr. Bulsara, his colleaguesin Stockholm, and pr<strong>of</strong>essor LucaGammaitoni <strong>of</strong> the University di Perugiain Italy.“We were chatting and jotting somethoughts on a chalkboard, when it hit usthat the physics would allow us to developa magnetometer that could sense minutechanges in a magnetic field caused byThe magnetometer to be placed on the U.S. Marines’ Tactical Remote Sensor System and the “rock”under which it would be hidden to gather information without being noticeable to those passing by.objects made <strong>of</strong> ferrous metal, leading toa wide range <strong>of</strong> applications,” Dr. Bulsarasaid.“Of course, the basic fluxgate magnetometerhad been around since WorldWar II; however, the idea <strong>of</strong> modifying thereadout to mimic the process wherebyneurons are believed to code and processinformation in the nervous system wasdifferent. We realized quite rapidly thatif certain physics constraints were met,then the idea afforded simplicity and elegancewhich are always desirable in newconcepts. We persuaded FOI to do a quickexperiment to test the idea (it worked),and [we] wrote a long article about it inPhysical Review A in 2003,” Dr. Bulsara said.“Over the next six years, we rigorouslyproved the physics and began developingvarious pieces <strong>of</strong> hardware. It’s a reflectionon the dynamics <strong>of</strong> the groupthat one <strong>of</strong> the products <strong>of</strong> that early discussionand subsequent development,the single core magnetometer, is ready togo into the field within only six years fromthe initial ideas as an additional sensor <strong>of</strong>the TRSS that gives the Marines some remarkablecapabilities, including the abilityto ‘see’ moving ferrous material (e.g.,rifles) through walls.”After Visarath In and Joe Neff arrived atthe lab, research accelerated and theoreticalwork aimed at better understandingthe physics <strong>of</strong> coupled nonlinear oscillatorsrapidly evolved into the “coupledcoremagnetometer” which involvescoupling an odd number <strong>of</strong> wound ferromagneticcores cyclically to one anotherin a ring oscillator configuration. A magnetometerbased on the unique physics<strong>of</strong> this configuration is far more sensitivethan the single core magnetometer.The coupled-core magnetometer isbeing refined, with a number <strong>of</strong> practicalissues remaining to be addressed.However, it will likely render the singlecore magnetometer obsolete in a couple<strong>of</strong> years. The SSC Pacific group and theirinternational collaborators are exploringother sensors and devices that employthe unique features <strong>of</strong> the coupled oscillatorconfiguration.TRSSTRSS, developed mostly by other organizations,is a handheld device weighingonly a few pounds, but it carries acoustic,infrared, seismic and magnetic sensors.The SSC Pacific contribution is a magnetometerabout 4 inches by 4 inches(shown on the next page) that will replace26 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


The 4-inch by 4-inch magnetometerto be placed on the Marines’ TacticalRemote Sensor Systemthe magnetic sensor with a much more powerful one. It candetect extremely small changes in the ambient magnetic field,such that through a plaster and wood wall a handgun can bedetected at a range <strong>of</strong> approximately 8 meters.The technology requires that the object be moving. If a handgunwere to be taken <strong>of</strong>f a table, or an individual walked out <strong>of</strong>a room carrying a weapon, the device would detect it. Similartechnology has been developed for placing magnetometers inobjects that look like rocks. They could be placed, for example, inplain sight at a sentry location through which pedestrians pass.A Marine with a personal digital assistant could be positionedsome distance away monitoring those passing through. An individualpassing by with hidden ferrous metal objects (weapons)could be stopped for interrogation and search.Similarly, a network <strong>of</strong> such magnetometers disguised as rockscould be placed strategically along paths through mountainpasses to alert security forces to the passing <strong>of</strong> heavily armedindividuals.“We could send a Tomahawk (missile) through a mountainpass dropping sensors at predetermined time separations,” Dr.Bulsara said. “They are designed always to land right-side up.”The sensors can, if necessary, carry GPS receivers to providecritical position data, and radio frequency communications to“talk” to other sensors in the area or to transmit collected informationto a satellite. In another application, a “rock” containinga magnetometer could be programmed to transmit a commandto a nearby camera to shoot still photos or videos <strong>of</strong> a passingindividual armed with ferrous metal, thus providing securitypersonnel with images <strong>of</strong> subjects <strong>of</strong> interest.Critical to the successful operation <strong>of</strong> the technology was therealization that rather than using changes in power, a time-domaindescription that underpins the neural code could be used.“We’re talking at a basic level about the firing <strong>of</strong> neurons,wherein a membrane voltage crosses a threshold and generatesa spike, which means a neuron has fired,” Dr. Bulsara said.“As an example, if we’re monitoring an individual and someonesticks him with a pin, then the sensory neurons fire more rapidlyleading to a change in the statistics <strong>of</strong> the interspike intervals.Changes in measurable quantities like the mean firing rate canbe correlated with the stimulus that led to these changes. Theso-called neural code is widely believed to be based on the timingbetween spikes.“Sensors based on this operating principle require simplifiedreadout circuitry: a clock and a counter for keeping a runningarithmetic mean <strong>of</strong> the interspike intervals suffice.” (In this case,the intervals between the crossings <strong>of</strong> the upper and lowercore magnetization thresholds by the internal magnetizationparameter.)This allowed the group to eliminate time-honored signalprocessing techniques, such as Fast Fourier Transforms (FFT),and merely calculate time differences so the readout becameevent-based. The standard time unit employed is one-tenth <strong>of</strong>a second.The core <strong>of</strong> the current single core magnetometer is an exoticmaterial about as thick as a human hair, with very favorablemagnetic properties. The hardware is hand assembled on-siteat SSC Pacific at a cost <strong>of</strong> about $400 per unit, compared to aprice tag <strong>of</strong> $6,000 or so for commercially available magnetometersthat are used in geophysics or other military surveillanceapplications.“Make it small, make it light, make it cheap”The refinement <strong>of</strong> the technology required removing originaldesigns from shielding against the Earth’s magnetic coreand then determining sources <strong>of</strong> interference, reducing falsealarms and optimizing the thresholds to ensure the signal wasn’tmissed by being buried in noise. Then there was the need tomake it small, make it light, make it cheap.In a planned competition among eight magnetometers, theSSC Pacific model was first in all categories except maintenance,since the developers’ basic approach was: “It costs $100, if itbreaks, throw it away, and we’ll send you a new one.”With the competition settled, the SSC Pacific group was fundedby the Office <strong>of</strong> Naval Research for three years to build hardwarefor the Marines to put into the field.Planned improvements underway include completion <strong>of</strong> thecoupled-core magnetometer and development <strong>of</strong> ultra-lowpower electronics, since its power requirements are significant.“We have demonstrated the coupled-core magnetometersuccessfully in a sea test,” Dr. Bulsara said. “Once we get thepower requirement to a manageable level, our current singlecore model could be obsolete. In the meantime, the single coremagnetometer has a measured in-the-field (i.e., unshielded)resolution <strong>of</strong> 0.5 to 1nT (nano tesla – unit <strong>of</strong> magnetic flux density),making it possibly the best room-temperature magnetometeravailable today.”SSC Pacific personnel involved in the effort are Drs. Joe Neff,Brian Meadows and Visarath In; and Andy Kho, Chris Obra andGreg Anderson. Their collaborators are pr<strong>of</strong>essors Bruno Andoand Salvatore Baglio <strong>of</strong> the University <strong>of</strong> Catania, Italy; Drs. JohnRobinson, Peter Krylstedt, Peter Sigray and Bjorn Lundqvist <strong>of</strong>the Swedish Defense Research Agency in Stockholm; and Dr.Antonio Palacios <strong>of</strong> San Diego State University.Tom LaPuzza is with the public affairs <strong>of</strong>fice <strong>of</strong> SSC Pacific. For moreinformation about SSC Pacific, go to the SPAWAR Web site at www.spawar.navy.mil.CHIPS January - March 2010 27


SPAWAR Releases Naval IT,C4ISR, Space Systems, andEnterprise Support: Todayand TomorrowNew technical vision for the C4ISR,Business IT and Space CommunityThe Command, Control, Communications, Computers,Intelligence, Surveillance and Reconnaissance(C4ISR), Business <strong>Information</strong> Technology (IT) andSpace Community published their first technical visionthat articulates their product line and future plan as acommunity Collaboration is KeyThe technical vision, “Naval IT, C4ISR,Space Systems, and Enterprise Support:Today and Tomorrow,“ is sponsoredby Space and Naval Warfare Systems(SPAWAR) Commander Rear Adm. MichaelBachmann, in collaboration with resourcesponsors in the Office <strong>of</strong> the <strong>Chief</strong><strong>of</strong> Naval Operations, and with contributionsfrom the U.S. Marine Corps Staffs,Naval Network Warfare Command (NET-WARCOM), and others.The new technical vision highlightsthe information-centric contributions <strong>of</strong>naval C4ISR, business IT and Space Communitypr<strong>of</strong>essionals, and it articulateshow C4I products and services employedin-theater are currently playing majorroles in warfighter successes. The documentis available on the SPAWAR publicWeb site at www.spawar.navy.mil.Dynamic examples from the currentfight in Iraq and Afghanistan demonstratethe successful integration <strong>of</strong> intelligenceand operations with the power<strong>of</strong> using the network to get informationto the right person, at the right time, toadd value to situational awareness andachieve warfighter success.Aligned with higher-level guidance andpolicy, the technical vision communicatescomplex concepts, technologies and visionarystrategies that depict examples<strong>of</strong> programs planned within the ProgramObjective Memorandum (POM) cycle —major investments for tomorrow that willenhance future capability, cyberwarfare,workforce requirements, and includeinvestments in science and technologyresearch.Large Stakeholder CommunityWhile the C4ISR, business IT and SpaceCommunity are diverse, naval forceshave a long history <strong>of</strong> research and investmentin IT to meet the communicationschallenges <strong>of</strong> dispersed operations.The publication illustrates how groupswithin SPAWAR; OPNAV; HeadquartersMarine Corps; the newly forming FleetCyber Command (FLTCYBERCOM/10thFleet); Marine Corps Systems Command;Team SPAWAR Program Executive Offices(C4I), Space Systems and SPAWAR SpaceField Activity, and Enterprise <strong>Information</strong>Systems; and Joint Program ExecutiveOffice, Joint Tactical Radio System; NET-WARCOM; and others are sustaining andcreating capabilities while continuingto evolve and improve the naval C4ISRsuite. These capabilities are an essentialand vital element <strong>of</strong> the national securitystrategy in today’s networked world.Land, Sea and AirNaval IT, C4ISR, Space Systems, and EnterpriseSupport: Today and Tomorrow illustratesthe value <strong>of</strong> end-to-end systemsengineering in delivering integrated solutionsto meet naval operational needs.This work is vital in linking network architecturesto mission threads and warfareanalysis for enhanced informationalawareness among the <strong>Navy</strong>, Marines,joint forces, federal agencies and allies.The publication illustrates the power<strong>of</strong> platform-independent C4ISR pr<strong>of</strong>essionalscollaborating across agencies andservices to deliver “change at networkspeed,” integrated warfighter and businessinfrastructure capabilities whereneeded most.To name just a couple <strong>of</strong> examples, thevision highlights how C4ISR pr<strong>of</strong>essionalscan leverage domain expertise with ISR/<strong>Information</strong> Operations systems engineeringdata and using Naval Networking28 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


Air Traffic Controller 2nd Class Thomas Hartleystands watch in the Carrier Air Traffic Controlcenter aboard USS John C. Stennis (CVN74). Networked C4ISR systems are crucial enablersfor battlespace awareness, informationdominance and decision superiority. U.S. <strong>Navy</strong>photo by Mass Communication Specialist 3rdClass Walter M. Wayman.Sailors man the watchfloor at NETWARCOM. U.S. <strong>Navy</strong> photo by Mass Communication Specialist 1stClass Corey Lewis.Environment (NNE)~2016 top-level strategiesto align programmatic efforts intothe Next Generation Enterprise Network(NGEN) and Consolidated Afloat Networksand Enterprise Services (CANES) toaccelerate technology delivery — all keycomponents necessary for informationdominance on the battlefield.New Cyber OpportunitiesThe timely release <strong>of</strong> the technical visioncoincides with key new Defense<strong>Department</strong> and <strong>Navy</strong> cyber initiatives:staff reorganization and consolidation <strong>of</strong>the OPNAV Directorates <strong>of</strong> Naval Intelligence(N2) and Communication Networks(N6) into a single organization,DCNO for <strong>Information</strong> Dominance; andthe dynamic realignment <strong>of</strong> operationalcyber capabilities under a single command,FLTCYBERCOM/U.S. 10th Fleet, torevolutionize and dominate warfightingcapabilities in cyberspace and networks.The reorganization will bring intelligencenetworks, electronic warfare, encryptionoperations, cyberspace communicationsand information gathering, aswell as meteorology and oceanographyunder FLTCYBERCOM, the <strong>Navy</strong> Componentto U.S. Cyber Command.These new commands will play a majorpart in directing and shaping the crucialroles the C4ISR/business IT/Space Communityare playing and will continue toplay in the new <strong>Information</strong> DominanceCorps. For example, resource realignmenthas consolidated four major Naval AirSystems Command programs: the BroadArea Maritime Surveillance UnmannedAircraft System (BAMS UAS); E-2C (earlywarning aircraft); the Next-GenerationJammer; and Unmanned Combat Air SystemDemonstration (UCAS-D) into theDCNO for <strong>Information</strong> Dominance, withthe concomitant need for the C4ISR/businessIT/Space Community to collaboratewith NAVAIR to create a unified positionrelated to these unmanned systems andsurveillance programs.The Way AheadNaval IT, C4ISR, Space Systems, andEnterprise Support: Today and Tomorrowmay be used as a communicationstool within organizations to disseminatethe criticality <strong>of</strong> naval IT, C4ISR, space systems,and enterprise support in advancingnaval and joint warfighter objectives.The publication aims for broad readership,including military personnel, Congress,the executive branch, the defenseindustry, mass media and the generalpublic.Look for Naval IT, C4ISR, SpaceSystems, and Enterprise Support:Today and Tomorrow on theSPAWAR public Web site: www.spawar.navy.mil.The success <strong>of</strong> unmanned aerial surveillanceplatforms, such as the <strong>Navy</strong> Global Hawk UAVpictured here, have led to further investmentsin next-generation systems to improve MaritimeDomain Awareness. U.S. Air Force photoby Jim Shryne.WASHINGTON (Oct. 1, 2009) – <strong>Chief</strong> <strong>of</strong> NavalOperations (CNO) Adm. Gary Roughead deliversremarks for "<strong>Information</strong> Dominance: The<strong>Navy</strong>'s Initiative to Maintain the CompetitiveAdvantage in the <strong>Information</strong> Age" at the Centerfor Strategic & International Studies. U.S.<strong>Navy</strong> photo by Mass Communication Specialist1st Class Tiffini Jones Vanderwyst.CHIPS January - March 2010 29


Coalition Warrior Interoperability DemonstrationA unique environment <strong>of</strong> virtual reality, sophisticated technology and real warfighter conditionsBy Sharon AndersonIt’s not Afghanistan, but it will simulatethe austere, remote and hostile conditions<strong>of</strong> being there. I’m talking aboutCWID — Coalition Warrior InteroperabilityDemonstration — where informationtechnologies are assessed against simulatedoperational scenarios.For 2009-2010, CWID is using an Afghanistanbackdrop for combined operations.U.S. homeland security/defensescenarios will integrate virtual naturaldisasters, health pandemics and terroristthreats. CWID supports <strong>Department</strong><strong>of</strong> Defense homeland defense and securityacquisition decisions within a venuethat provides significant savings to thegovernment.CWID’s 18-month cycle begins witha Federal Business Opportunity postedon www.fbo.gov that asks industry toprovide near-term technology solutions,also known as interoperability trials (ITs),designed to improve information sharingfor both military and emergency first-responderoperations.CWID focuses on assessing new technologiesand upgrades to existing versions<strong>of</strong> command and control (C2); communicationssystems; and intelligence,surveillance and reconnaissance (ISR)systems. CWID 2010 will execute in June.The complexity <strong>of</strong> staging and executingapproximately 40 ITs across multipleU.S. and international sites, with morethan 1,500 participants and 20 participatingnations, is immense and requiresvigorous C2 and exhaustive planning,according to Dennis Warne, CWID sitemanager for Naval Surface Warfare CenterDahlgren.“We are coordinating command andcontrol over the Pacific and Atlantic,across Europe, Lillehammer, Norway, inGermany, in Italy. We run the trials duringthe day, but think <strong>of</strong> what time it is inItaly and Europe,” Warne said. “No othervirtual or real-world environment can duplicatethe unique characteristics <strong>of</strong> theCWID infrastructure.”CWID is a Chairman <strong>of</strong> the Joint <strong>Chief</strong>s<strong>of</strong> Staff-directed annual technology discoveryand risk reduction event whichidentifies information-sharing solutionsfor operational problems. The Defense<strong>Information</strong> Systems Agency (DISA) managesCWID’s day-to-day operations usingthe CFBLNet, or Combined FederatedBattle Laboratories Network, which willspan 15 time zones, from New Zealand tothe United States, and across Europe.CWID encompasses an environment<strong>of</strong> virtual reality, sophisticated technologyand real-world conditions that videogame fans would love to enter. But thereis nothing playful about CWID. To participate,proposed technologies must fillwarfighting gaps and be interoperable,not only with joint partners, but withNATO partners, and at another level, withnongovernmental organizations to coordinatedisaster relief responses and humanitarianaid.CWID's Unique Environment AddsComplexity and Realism to TestingWarfighter Solutions“This is a difficult battlefield. Coalitionsare complex: different languages,different cultures; coalitions are ad hocby nature. Sometimes there are differentstanding agreements with NATO countries,”said U.S. Marine Corps Lt. Col. BruceDowns, CWID’s coalition forces land componentcommander and role player.“We are also looking for opportunitiesto integrate information, collaborate andshare information on the battlefield. Thisis a rare opportunity. This is the only placeI know <strong>of</strong> where you can have a multidomaintrial and where you have classifiedand unclassified networks, and youare sharing information between those inthe backdrop <strong>of</strong> something that is meaningfulto a warrior,” Downs said.Technology plays a major role in CWID,where participants explore the “art-<strong>of</strong>-thepossible,” according to Downs.“We get ideas about how to apply technology,to try to stretch it to meet ourneeds for interoperability and allow usto have an advantage on the battlefield,”Downs explained. “All <strong>of</strong> these coalitioncountries have come with their own solutionsindependently. Some <strong>of</strong> them arevery technical; some <strong>of</strong> them are manual.We take and use all <strong>of</strong> that information togetherto make good, effective decisionsin those scenarios. There is everythingfrom what we call kinetic warfare [whichis] dropping bombs and shooting bulletsand maneuvering on the battlefield,to running convoys with relief supplies,to humanitarian relief, to ship-to-shoremovements.”There are so many fascinating technologiesthat will be explored in June,but I’ll just highlight a few. CHIPS spokewith several CWID participants during theCWID Initial Planning Conference, whichtook place Nov. 16-20, 2009, in Williamsburg,Va., where more than 200 military,government and industry experts fromaround the world discussed their proposedITs for CWID participation. Whileneither the <strong>Navy</strong> nor Defense <strong>Department</strong>endorses the commercial products usedin the ITs; testing these products is theonly way to determine warfighter utility.IT001 – Service-orientedInfrastructure for Maritime TrafficTracking (SMART)The Italian-led Virtual Regional MaritimeTraffic Center (V-RMTC) is a virtualnetwork environment connecting the operationalcenters <strong>of</strong> participating naviesto unclassified information on merchantshipping vessels to enhance maritimesituational awareness (MSA).In CWID 2010, Service-oriented Infrastructurefor Maritime Traffic Trackingwill undergo interoperability testingwith system partners: Finland, Germany,the United Kingdom and United States.SMART represents the next-generationdevelopment <strong>of</strong> V-RMTC, according toItalian <strong>Navy</strong> Lt. Cmdr. Sergio Ciannamea.But other frameworks can be easily exploitedthrough this technology, for example,the Italian interagencies and forthe European Union’s new experiments,such as the demonstration for the MaritimeSurveillance (EU MARSUR) networkscheduled for the end <strong>of</strong> 2010, said Ciannamea.“SOA-based technology is still inits formative stages. It will be taking overwhere V-RMTC has left <strong>of</strong>f in providing30 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


the next spiral evolutionary step for the Italian <strong>Navy</strong> MSA technologysystems, built upon the standards, strategies and capabilities<strong>of</strong> V-RMTC, to build and deploy MDA capabilities."Data are delivered according to specific formats (XML;MERSIT, developed by the Italian <strong>Navy</strong>; OTH-T-Gold; etc.) andgathered by a hub located at Italian <strong>Navy</strong> Fleet Headquarters(HQ CINCNAV),” Ciannamea said.“More than 300 gross-ton (and passenger) ships are obliged tohave the Automatic Identification System (AIS) for vessel identification,tracking, collision avoidance and coastal surveillance.But AIS is not tamper-pro<strong>of</strong>,” Ciannamea said, “bad guys canalter information within AIS, so it is not always a reliable source<strong>of</strong> information for identifying vessels <strong>of</strong> interest that’s why MSAis so important. And it is not only the AIS-fitted vessels that areinteresting in our MSA perspective.”Another boost to MSA is the Trans-Regional Maritime Network(T-RMN) project which is the addition <strong>of</strong> more partners withinthe three V-RMTC enclaves, already including 29 countries. Thenext expansion <strong>of</strong> the partnership, will include Persian Gulfcountries: Bahrain, Kuwait, Oman, Qatar, Saudi Arabia and theUnited Arab Emirates.IT002 – Inter Domain Services Manager (IDSM)IDSM is a service oriented architecture (SOA) middleware applicationthat provides integration and interoperational servicesfor disparate data sources. Access to the integrated data is tailoredfor the user and can be accessed via: Web services, portals,thin or fat clients, or s<strong>of</strong>tware as a service using a JBoss J2EEenvironment.The system can rapidly take external data sources, such as systems,databases, streams, repositories and Web sites, and combinethem under a mediated metadata layer that allows datamining, manual and automated analysis, and various visualizationcapabilities in a single application, explained William Sadler<strong>of</strong> Organizational Strategies, Inc.The most innovative aspect <strong>of</strong> IDSM technology is in its abilityto fuse and allow discovery <strong>of</strong> information at different classificationlevels — all within a unified security model. Users can viewdata, as well as photographs and video.“We absolutely mediate all the traffic communication betweenone classification level and the other, and we have extensiveworkflow and document management capabilities builtinto the system. When somebody in a Top Secret enclave wouldbuild a Word document or a video out <strong>of</strong> pieces <strong>of</strong> unclassified,Secret or Confidential data that entire document would be classifiedas Top Secret."In our system, we maintain the metadata tags around traceablestorage for each one <strong>of</strong> those information chunks. If thatstructure is not modified at the highest level, we can maintainthat security traceability back to its original source,” Sadler said.“The person who is sending the document just has to pushsend. He doesn’t need to worry about the declass situation. Theworkflow management system, however, looking at the tags onthe data, will then alert the person with authority to declass andgive him two choices: either declass the data, and here is thestuff that needs to be declassed to go down to this level, or thesystem can automatically redact the document. Then when thedata is sent, it is missing the information that is not appropriatefor a lower classification,” Sadler said.MARINE CORPS AIR GROUND COMBAT CENTER TWENTYNINE PALMS, Calif.Nov. 17, 2009 – A light armored vehicle with Company E, 3rd Light ArmoredReconnaissance Battalion, fires its 25 mm Bushmaster chain gun duringtable one <strong>of</strong> qualifications at the Combat Center’s Range 109. The chaingun is the main weapon used by the company. U.S. Marine Corps photo byLance Cpl. M.C. Nerl.The IDSM framework provides XML-based interaction withIDSM clients, validation <strong>of</strong> client-supplied messages, IDSM datastore access, and the management <strong>of</strong> process flow through thesystem, including identification and service processing logic.Surprisingly, IDSM is built on open source code, open standardsand Alfresco products for document management andworkflow. Sadler said the security technology and its cross-domainsolution are the most advanced concepts <strong>of</strong> the system.IDSM aggregates intelligence from disparate sources and processesthe data into a usable format for the commander at alllevels <strong>of</strong> authority. IDSM is primarily used for operations, but itcan be used down to the tactical level, and at all levels, its aimis to improve situational awareness and enhance decision-making.IDSM’s robust capabilities can be pushed down to personaldigital assistants for convoy security and improvised explosivedevice (IED) detection.Testing will require IDSM to interoperate with the Global Commandand Control System, Theater Ballistic Missile Control System,Joint Mission Planning System, Joint Automated Deep OperationsCoordination System, and more.IT031 – Joint Asset Management Integrated SupportSystem – Automated Armory (JAMISS-AA)JAMISS-AA is a Web-based asset tracking and maintenancemanagement system that uses government <strong>of</strong>f-the-shelf technologyfor total life cycle management. JAMISS-AA was designedfor bandwidth-challenged or disconnected environments,and it adheres to all DoD information assurance policiesand guidelines.JAMISS-AA leverages existing technology, according to MichaelDaugherty, a special missions task manager for the JAMISSproject, with the expeditionary electronic warfare system division.Daugherty, who is also an employee with the Naval SurfaceWarfare Center, Crane, Ind., explained the business rules forJAMISS.Assets are tagged and tracked through IUID or radio frequencyCHIPS January - March 2010 31


identification (RFID). IUID, or Item Unique Identification, is anasset identification system instituted by the Defense <strong>Department</strong>to uniquely identify a discrete tangible item or asset.Tangible items are distinguished from one another by theassignment <strong>of</strong> a unique identifier in the form <strong>of</strong> a unique datastring and encoded in a bar code placed on the item. An itemunique identifier is only assigned to a single item and is never reused.Once assigned to an item, the IUID is never changed evenif the item is modified or reengineered. IUID tagging is similar toSocial Security numbering.The JAMISS-AA system is <strong>Navy</strong>-developed but Marine-owned.The U.S. Marine Corps Light Armored Vehicle (LAV) programsponsored JAMISS development to track maintenance actions,vehicle usage, configuration and location, and provide globalvisibility <strong>of</strong> the information. The system supports operational,strategic and tactical level operations, missions and planning.Users include at point <strong>of</strong> action (point <strong>of</strong> maintenance or inventorycontrol point level) up to program management.“JAMISS-AA will leverage a CWID trial cross-domain solutionto show interoperability with NATO partners,” Daugherty said.“Since its exposure in CWID, the <strong>Navy</strong>, Air Force and the <strong>Department</strong><strong>of</strong> Homeland Security have expressed an interest in thesystem. There are multiple armories spread across various agencies,and the services could leverage <strong>of</strong>f JAMISS capabilities."Currently, tracking weapons via stubby pencils and spreadsheetsis prone to data error. A 3 can be mistaken for an 8, and itcan take hours, sometimes days to track down a weapon. Whenthe Marines implemented JAMISS-AA utilizing IUID, the dataquality and accuracy went from about 80 percent to nearly 100percent,” Daugherty said.CWID will provide the environment to demonstrate the ability<strong>of</strong> JAMISS-AA to exchange IUID and asset information betweenthe Marine Corps and NATO, and it will also provide the Marineswith a warfighter utility assessment.“JAMISS is adaptable to different communities <strong>of</strong> interestwhere asset accountability, accuracy, tracking, [and] configurationmanagement, are essential to total life cycle management,”said James Hamric, a contractor supporting JAMISS.Space and Naval Warfare Systems Commandand SPAWAR Systems Center PacificSPAWAR and SPAWAR Systems Center Pacific (SSC Pacific) inSan Diego, Calif., have been involved with JWID and CWID sinceits inception. Acquisition successes began with the demonstration,evaluation and, ultimately, the transition <strong>of</strong> Radiant Mercuryto the military community. The SPAWAR team focuses ontechnologies that fulfill requirements in two primary areas: maritimedomain awareness and coalition interoperability.The team functions as the Combined Forces Maritime ComponentCommander (CFMCC), and coalition staff members haveincluded representatives from Germany, Canada, New Zealand,Italy and Australia. In 2010, an <strong>of</strong>ficer from Finland will join theteam. The SPAWAR team also supports homeland security initiativesin the San Diego area by involving local stakeholders in thedevelopment <strong>of</strong> the homeland security scenario, evaluation <strong>of</strong>various technologies, and the development <strong>of</strong> procedures thatwill be effective during a wildfire or other domestic disaster inthe Southern California area.Some <strong>of</strong> the homeland security organizations with which theSPAWAR team has developed ongoing relationships includethe City <strong>of</strong> San Diego, San Diego Police <strong>Department</strong>, San DiegoState University, the Regional Terrorism Threat Assessment Center,U.S. Coast Guard, and the California Army and Air NationalGuard.Naval Surface Warfare CenterDahlgren DivisionCWID 2010 marks the 11th year that NSWC Dahlgren, a secondary<strong>Navy</strong> site, has hosted CWID trials. Dahlgren is the primarysite for Marine Corps and Army demonstrations. SSC Pacific isCWID’s primary <strong>Navy</strong> site.“We are the site for the U.S. Coast Guard, the National Guardand Air National Guard demonstrations too,” Warne said. “Weare a multifaceted site. Last year we had nine separate operationalcenters, extremely high multidomain.”NSWC Dahlgren will also be working with the Maryland EmergencyOperations Centers concurrently within CWID 2010, accordingto Warne. About 300 personnel support the NSWCDahlgren site during CWID execution, a combination <strong>of</strong> military,government and contractor teams.Keith Meyers, chair for CWID’s systems engineering and integrationworking group, tracks the high-tech infrastructure thatis needed to support CWID’s unique requirements, such as theGlobal Command and Control System and Advanced Field ArtilleryTactical Data System.CWID's Rich HistoryOver the past 16 years, CWID has grown from a U.S. Army initiativeto a global event to discover new and emerging technologiesand to test and evaluate them for warfighter utility.CWID 2007 was the first year a concerted effort was made toinvolve programs <strong>of</strong> record which resulted in several interoperabilitytrials to be more rapidly fielded by emergency respondersand warfighters.During CWID 2008, several technologies were close to implementationand another, Radio Inter-Operability System (RIOS)Incident Site Communications Capability (RISCC), was used inthe U.S. Open 2007 and Kentucky Derby 2008.In 2009, the U.S. Joint Forces commander directed U.S. CWIDto use Afghanistan as the operational backdrop for the simulated,operational scenario providing richer context to thedemonstration and more meaningful capability assessments.U.S. homeland security/defense scenarios increased interactionwith worldwide organizations to improve interoperability.CWID continues to develop and triumph over challenges presentedthroughout the years, and the team looks forward to abright future in assisting warfighters and first responders withsolutions to their difficult missions. Participating in CWID is bothexciting and exhausting as demonstrators strive to providewarfighters with what they need to dominate the battlespaceand interoperate with mission partners.Sharon Anderson is the CHIPS senior editor. She may be reached at chips@navy.mil. For more information about CWID, go to the CWID Web site atwww.cwid.js.mil.32 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


Collaboration Tools for the Federal GovernmentOver the past few months, collaborative media has becomea topic <strong>of</strong> interest and debate in both the <strong>Department</strong> <strong>of</strong>Defense and federal government. As a result <strong>of</strong> this interest,collaborative sites restricted to myriad combinations <strong>of</strong> defense,intelligence and federal government communities have begunto see a rise in participation. Some <strong>of</strong> them, such as Intelink,are sponsored by government agencies and limited to a selectsubset <strong>of</strong> the federal government, while others, like GovLoop,aim to connect employees at the federal, state and local levels.Below is a selected overview <strong>of</strong> a few <strong>of</strong> these tools.GovLoop was launched in 2008 and now has 20,000 membersacross federal, state and local government. GovLoop, called“Facebook for feds” by some pundits, does at first appear to bea straightforward social networking site; however, the site, www.govloop.com/, also hosts blogs, a wiki and a listing <strong>of</strong> job openings.The site is open to all members <strong>of</strong> the government community,including contractors and students, and individuals interestedin government service.By Christy CrimminsmilSuite is a group <strong>of</strong> collaborative tools launched by theArmy in October 2009. These tools focus on three main objectives:locating information, sharing knowledge and connectingpeople.These tools are available to military, civilian and contractorpersonnel across the DoD who have Defense Knowledge Online(DKO) accounts. The suite <strong>of</strong> tools includes three separatecapabilities:milWiki is a knowledge management tool made up <strong>of</strong> a collection<strong>of</strong> Web pages that are editable by anyone who canaccess them. This allows for a living knowledge bank whereexperts are encouraged to contribute their experience andknowledge and update information in real time. The tool alsoallows users to integrate and interlink knowledge into topicalbasedarticles and collaborate on issues up to and includingunclassified/”For Official Use Only”documentation. milWiki’sgoal is to capture the intellectual capital <strong>of</strong> the DoD communityand allow users to easily locate and expand upon thatknowledge through community updates.Intelink was developed by the Intelligence Community EnterpriseServices (ICES), within the Office <strong>of</strong> the Director <strong>of</strong> NationalIntelligence and is home to Intellipedia, the U.S. government’sunclassified wiki.To be eligible for an account, users mustbelong to or provide direct support to the intelligence, defense,homeland security,law enforcement or diplomatic communities.In addition to Intellipedia, other services <strong>of</strong>fered by ICES throughIntelink are a blogging capability, video, instant messaging, anda Web-based document management system called Inteldocs.An outline <strong>of</strong> these services, as well as information on ICES, canbe found on Intellipedia at https://www.intelink.gov/.Chirp is a microblogging pilot that is part <strong>of</strong> the Intelink suite<strong>of</strong> tools described above.The site, modeled after microbloggingsites like Twitter, is intended to provide situational awarenessand information on breaking news. Chirp promotes collaborationthrough informal messaging. Like other microbloggingtools, Chirp allows users to post messages <strong>of</strong> up to 140 characters.At (@) tags are used to bring chirps to the attention <strong>of</strong> aspecific user.These are usually used when replying to a previouschirp posted by that user. Hash (#) tags are used to tag a chirpwith metadata and allow users to search on particular key terms.More information about Chirp can be found at https://www.intelink.gov/chirp/.milBlog is a place to find and share the latest news, insider articles,comments and posts from the community.It is designedto invite collaboration through discussion and comments.milBlog provides quick, easy access, and a secure awarenessfor mission-related knowledge and information.milBook is an initiative to connect people across the DoDcommunity. milBook acts as a central hub for networking DoDpr<strong>of</strong>essionals with others who have similar interests and workresponsibilities, much like the popular commercial sites Facebookand LinkedIn. Users have the ability to share informationthrough group blogs, discussions and private wiki documentsallowing secure communities <strong>of</strong> interest to grow and connectwith others across the greater military community.To access the milSuite community, please visit https://www.kc.army.mil/book/index.jspa. You can either log on via yourCommon Access Card or with your DKO username and password.As interest in collaboration and transparency in governmentincreases, the federal government will continue to exploreand make use <strong>of</strong> collaborative tools.Christy Crimmins provides support to the DON CIO communications andemerging technology teams.CHIPS January - March 2010 33


Remote Testing Using ADEPTBy Joel H. TimmTrident Warrior is the <strong>Navy</strong>’s major annualSea Trial event. Trident Warrior 2009(TW 09) marked the first time that remotetest equipment information was usedin real time and controlled from a shoreinstallation while on an operational shipunderway <strong>of</strong>f the Virginia Capes. Amongthe distance support objectives accomplishedwere: (1) real-time connectivityfrom ship-to-shore <strong>of</strong> the equipment; and(2) the capture and transfer <strong>of</strong> the informationin near-real time for analysis.This testing was made possible by theAdaptive Diagnostic Electronic PortableTestset. ADEPT is a lightweight ruggedizedtouch-screen system which can beused to maintain and troubleshoot theSPY-1 radar on Aegis ships by integratingmaintenance procedures, test equipmentand data collection into a single system.ADEPT is an electronic test tool originallydesigned for the SPY-1A radar byMikros Systems Corp. It consolidates multipletest equipment (digital multimeter,oscilloscope, power meter) into one portableunit.The test set incorporates various instrumentationcards and XML-taggedmaintenance requirement cards (MRCs),linked to an integrated Structured QueryLanguage database. The test set providesunique distance support capabilities andhas been shown to significantly reducethe time it takes to perform maintenanceand to align complex electronic systems.ADEPT is a Small Business Innovation Research(SBIR)-funded project that is currentlyin development and testing.Shipboard technicians can use ADEPTto run integrated MRCs. The MRCs aredisplayed on the screen <strong>of</strong> the ADEPTunit, and during the measurementstep <strong>of</strong> the procedure, the test equipmentis automatically configured for themeasurement.Maintenance information and equipmentstatus data, such as oscilloscopedisplays, are collected and transferred toon-board Distance Support servers forviewing by In-Service Engineering Agents(ISEAs). Using designated shipboard DistanceSupport connections, ISEAs can remotelycontrol ADEPT in real time, therebyassisting shipboard technicians in thetroubleshooting process.During the exercise, the USS Farragut(DDG 99) was underway in the VirginiaCapes. Aboard the ship, ADEPT was connectedto Operational Readiness TestSystem Tech Assist Remote Support(ORTSTARS). A virtual network serverclient tool and secure shell are used inORTSTARS to enable application sharingbetween the Unix and Windows operatingsystems through a secure network.While underway, ADEPT successfullydemonstrated three sessions <strong>of</strong> real-timeSPY-1 support via ORTSTARS and oneSPY-1 data transfer via the <strong>Navy</strong> <strong>Information</strong>Application Product Suite infrastructureto the Naval Surface Warfare Center,Port Hueneme Division for analysis. Thesessions were accomplished over severalhours each with solid connectivity.As the ship’s users became increasinglyfamiliar with the ADEPT system, they frequentlyused it without assistance fromNSWC Port Hueneme personnel. The responsefrom the ship’s crew was excellent,and their feedback was positive.ADEPT completed its <strong>of</strong>ficial TW 09 experimentationwhich included troubleshootingan issue with the SPY-1 radaraboard the USS Farragut. About 10 NSWCPort Hueneme subject matter expertswere able to see, control and resolve theissue with ADEPT in real time via ORT-STARS while working with Fire Controlman2nd Class Sullivan, the SPY technicianon board the USS Farragut.FC1 (SW) Cooper, the SPY technicianat NSWC Port Hueneme, said, “It gives usthe ability to view the “O’Scope” readingsand see exactly what they (ship’s force)are seeing."The SPY-1 engineering team at PortHueneme could review and control theADEPT instrument displays, such as RFpower meters, oscilloscopes and the OperationalReadiness Test System (ORTS), inreal time while the shipboard techniciansperformed SPY-1 maintenance activities.The SPY-1 engineering team said theyexperienced minimal latencies <strong>of</strong> 1 to 2seconds in the connection while in control<strong>of</strong> the ADEPT system aboard the ship.Additionally, they were able to place theADEPT display on a large screen at NSWCPort Hueneme giving several engineersthe opportunity to troubleshoot SPY-1simultaneously.During the troubleshooting <strong>of</strong> an ir-ATLANTIC OCEAN (Feb. 29, 2008) – The guided-missiledestroyer USS Farragut (DDG 99) approaches the aircraftcarrier USS George Washington (CVN 73) in preparationfor a refueling at sea. U.S. <strong>Navy</strong> photo by MassCommunication Specialist Seaman Luis Ramirez.regular SPY-1 reading, the SPY-1D(V) engineeringteam at NSWC Port Huenemewas able to walk the ship’s crew througha step-by-step procedure in real timewhile viewing and operating the ADEPTequipment.Sanitized pictures were taken <strong>of</strong> theSPY-1 backplane and shared with the engineeringteam via ADEPT and ORTSTARS.Group collaboration continued until theirregularity was resolved.Lt. j.g. Darryl Diptee, from Naval NetworkWarfare Command, referred toADEPT’s immediate technical reach-backcapability as the “technical 911” for theeyes <strong>of</strong> Aegis.Furthermore, the ADEPT unit can alsostore technical documentation which isuseful to a shipboard technician duringthe troubleshooting process. SPY-1 radarengineer Marc Dasca at NSWC Port Huenemesaid, “[ADEPT] gives us the ability toassist the fleet and be their distance supportresource.”The need for immediate technical assistancefor tactical systems in today’s highoperational tempo is obvious. An Aegisclassship with an inoperative SPY-1 radarwould have a substantially reduced missioncapability.Flying SPY-1 engineering teams todistant parts <strong>of</strong> the globe is costly andtime-consuming. But with ADEPT andORTSTARS, the waiting time required forexpert assistance is reduced to minutesinstead <strong>of</strong> days — which translates directlyto increased fleet readiness while at thesame time reducing costs and manpowerrequirements.Joel Timm is in the <strong>of</strong>fice <strong>of</strong> engineering andtechnology at NSWC PHD. Timm has a Master <strong>of</strong>Science degree in systems engineering (MSSE).34 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


Your Office Copier/Printer May Present <strong>Information</strong> Security RisksThe following is a recently reported compromise <strong>of</strong> personally identifiable information (PII) involving the disposal <strong>of</strong> copiers containingpersonal information stored on their hard drives. Incidents such as this will be reported in each CHIPS magazine to increase PII awareness.Names have been changed or removed, but details are factual and based on reports sent to the <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> <strong>Chief</strong> <strong>Information</strong><strong>Officer</strong> Privacy Office.The IncidentRecently, a command disposed <strong>of</strong> numerous copiers that hadreached the end <strong>of</strong> their service life. The copiers were originallyleased and subsequently purchased by the governmentwith a typical copier maintenance agreement. The commandwas under the impression that the copiers did not contain harddrives and therefore did not require sanitization or removal <strong>of</strong>hard drives before disposal. A few weeks after disposal, the commandlearned that the copiers did, in fact, contain hard drives.This particular breach did not result in a loss or compromise <strong>of</strong>PII because the machines were recovered by the governmentsoon after disposal.Many copiers, printers and multifunctional reproductive machinesmanufactured today have hard drives capable <strong>of</strong> storingdocuments that have been scanned, printed or faxed asdigitized images. These machines are <strong>of</strong>ten connected to <strong>Department</strong><strong>of</strong> the <strong>Navy</strong> (DON) networks to ease workload andincrease efficiency.Reproductive <strong>of</strong>fice equipment manufactured in the lastseven years employ hard drives that store digital images. Whilemuch <strong>of</strong> the hard drive space is used for processing, the machinesin this scenario stored up to 6,000 pages <strong>of</strong> information.The information copied may include PII, classified or sensitivebut unclassified information, depending on the machine. Oncethe hard drive memory has been exceeded, files are automaticallyoverwritten. “Cap points” limit the number <strong>of</strong> pages storedto hard drives, and the cap limitation can vary on each make andmodel number.Depending on the type <strong>of</strong> machine, information from smallprint jobs may be stored in random access memory (RAM) only,and the files may be overwritten with each new print request,or lost when the machine is powered <strong>of</strong>f. Manufacturers <strong>of</strong> thenewest reproductive <strong>of</strong>fice equipment may advertise that theirhard drives use encryption s<strong>of</strong>tware to safeguard data, but as<strong>of</strong> this writing, that encryption capability is not DON-approved.Approved DON encryption solutions do not encrypt reproductiveequipment hard drives.DON copiers, printers and multifunctional machines are eitherleased from a vendor or government-owned. In either scenario,the possibility <strong>of</strong> PII loss presents challenges when equipment isrepaired or turned-in for replacement. Stand-alone fax machinememory is generally nonvolatile and is lost as soon as the machineis turned <strong>of</strong>f.Lessons LearnedThe DON CIO is drafting tighter policy controls regarding theturn-in and disposal <strong>of</strong> reproductive equipment. Until release <strong>of</strong>the new policy, DON personnel should comply with the followingbest practices.For CLASSIFIED copiers/printers:Guidance for reproductive equipment can be found in SEC-NAV M-5510.36, paragraphs 7-15(2), (3), available on the <strong>Chief</strong> <strong>of</strong>Naval Operations (N09N2) <strong>Information</strong> and Personnel SecurityWeb site at www.navysecurity.navy.mil/info-551036.htm.For UNCLASSIFIED copiers/printers:• Identify the hard drive capabilities (and security risks) <strong>of</strong>your photographic equipment and educate <strong>of</strong>fice personnelregarding that information.• For government-owned equipment, hard drives should beremoved and physically destroyed before disposal. Harddrives are not easily accessible, so removal will probably requirea technician.• For leased equipment, the hard drives should be reformattedto remove all data. Refer to the equipment manual orservice technician for instructions on the reformattingprocess.• Place a sticker or placard on the copier/printer with the following:“Warning, this government-owned copier uses ahard drive that must be physically destroyed before turn-in”or “Warning, this leased copier uses a hard drive that mustbe reformatted before turn-in.”Additional privacy information can be found on theDON CIO Web site: www.doncio.navy.mil.Steve Muck is the DON CIO privacy team lead.CHIPS January - March 2010 35


<strong>Navy</strong>’s <strong>Chief</strong> TraiNiNg OffiCeraddresses defeNse CONTraCTOrsaNd dOd repsBy Joy Samsel, NETC Public AffairsCiting <strong>Navy</strong> training's ability to flex and change to meet theneeds <strong>of</strong> the fleet, Rear Adm. Joseph Kilkenny, commander <strong>of</strong>Naval Education and Training Command (NETC) spoke to theaudience at the Interservice/Industry Training, Simulation andEducation Conference in Orlando, Fla., Dec. 1. The address waspart <strong>of</strong> the General/Flag <strong>Officer</strong> Panel, which gave participantsan opportunity to talk about how their organizations are supportingmilitary missions, as reflected in the conference theme,"Train to Fight … Fight to Win.""We must gain more pr<strong>of</strong>iciency and our students more expertisein less time to keep up with the rapidly evolving challengesthroughout the world," Kilkenny said. "The technologyon display throughout this conference is indeed impressive, butwe all acknowledge that it is our people who enable our servicesto be combat ready. We all go to great lengths to select traininginstructors who can teach, and we select those best suited tolearn and develop into the most combat-ready Sailors, Soldiers,Marines [and] Coast Guardsmen [in] highly technical and challengingpositions. This is also true whether you are a Fortune500 company or a small independent contractor. And it is especiallytrue <strong>of</strong> the United States armed forces."Kilkenny gave a brief overview <strong>of</strong> the <strong>Navy</strong> training domain,which includes more than 19,000 military and civilian personnel,who provide training at more than 230 subordinate activitiesaround the world. More than 35,000 students are taking part in<strong>Navy</strong> training on any given day. NETC logged more than 615,000graduations in fiscal year 2008, including students from the<strong>Navy</strong>, Marine Corps, Army, Air Force and Coast Guard. The U.S.<strong>Navy</strong> also trains more than 12,000 international students frommore than 150 countries annually.The admiral talked about a few <strong>of</strong> the changes which occurredwithin NETC over the last decade, including the Executive Review<strong>of</strong> <strong>Navy</strong> Training, directed by then <strong>Chief</strong> <strong>of</strong> Naval OperationsAdm. Vern Clark, which led to the <strong>Navy</strong>'s "Revolution inTraining.""What followed was a massive restructuring that enabled us towork closer with the fleet to understand their requirements fortrained Sailors, and to concurrently embrace a new approach inthe methods used to train them," Kilkenny said. "Training workscollaboratively with the fleet to take a human performance approachto analyzing and solving performance gaps. We identifySailors' knowledge, skills and abilities required to be successfulat a job, task or function, and design training to respond to thoserequirements — as they are determined by the fleet."The admiral said changes to <strong>Navy</strong> training will continue becausethe missions <strong>of</strong> the <strong>Navy</strong> continue to change."In support <strong>of</strong> the expanded role for Sailors on the ground[in] Overseas Contingency Operations, our Center for SecurityForces has adapted training to meet the demands for individualaugmentees in Iraq and Afghanistan, and other parts <strong>of</strong> theworld," Kilkenny said. "The understanding <strong>of</strong> foreign cultures,customs and languages is a direct joint force multiplier that enablesservice members to sustain our long-standing alliancesNORFOLK, Va.(Dec. 4, 2009)– Fire ControlTechnician 3rdClass ZamirWolfe logs on tothe SubmarineOn Board Trainingportion <strong>of</strong>the Naval Educationand TrainingCommand Website. Submarinerscan also downloadand takethe training withthem on deployment. U.S. <strong>Navy</strong> photo by Mass Communication Specialist1st Class Todd A. Schaffer.and forge new relationships with emerging partners. For Sailors,the <strong>Navy</strong> achieves this understanding through training in Language,Regional Expertise and Culture at our Center for <strong>Information</strong>Dominance."Kilkenny said the development <strong>of</strong> training begins with theweapons and platforms the <strong>Navy</strong> purchases. "We must workclosely with you in the defense development and constructionarena to ensure when we buy a system, the training is developedin parallel and fully supports the Sailors and joint servicepartners in the mission required <strong>of</strong> the system delivered."Kilkenny also addressed the issue <strong>of</strong> technology in training,saying NETC has embraced technology to support training, inschools, as well as in exporting training to the fleet."These endeavors resulted in the use <strong>of</strong> blended learningsolutions that include instructor-led training, computer-basedtraining, simulation and technical training equipment," Kilkennysaid. He gave a few examples <strong>of</strong> training initiatives, includingthe Submarine Learning Center's Submarine On Board Training.It provides Sailors with training developed by subject matterexperts which is approved by the fleet as meeting its requirements.Sailors can also download and take the training withthem on deployment.Looking at the future, NETC is partnering with the Office <strong>of</strong>Naval Research and the Defense Advanced Research ProjectsAgency on a project called Digital Tutor. This adaptive projectleverages the expertise <strong>of</strong> Silicon Valley information technologyspecialists to model how best to train the next generation <strong>of</strong> cyberwarfareexperts.While citing the requirement for the best training possible,Kilkenny tempered his comments with the reality <strong>of</strong> fiscal constraints."How can industry deliver highly technical, complexand secure solutions at a price that the services can afford? Thisis a challenge for both <strong>of</strong> us. As we have always done, NETC willcontinue to work closely with the fleet to determine the besttraining to support their needs. We have never, and will never,create our training in a vacuum," the admiral continued."The training we provide America's Sailors and our joint servicepartners is outstanding — if it was not — we would nothave more than 150 nations knocking at our door to send theirmilitary members through our courses."For more information about the Naval Education and Training Command,visit https://www.netc.navy.mil/.36 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


NMCI Gets Into A HotspotBy Mike HernonFor years now, <strong>Navy</strong> Marine Corps Intranet(NMCI) users have jealously eyedthe laptop-wielding, Wi-Fi-connectedmasses in c<strong>of</strong>fee shops, hotels and airportsas they turned idle time into productivetime. Barred from full networkaccess, NMCI users on the go had to settlefor cellular phones, air cards and OutlookWeb Access to provide mobile support.While these capabilities provide somefairly productive mobility tools, access tothe information and resources on NMCIthat would further support the mobileworker remained unavailable — untilnow.With the release <strong>of</strong> Wireless Public Hotspots(WPH) service, NMCI users withinthe continental United States can nowuse free or for-fee public Wi-Fi hotspotsto securely access NMCI. This capabilityprovides mobile users with the samecomputing environment they would havewhen sitting at their wired computer. Thisenhanced capability will allow remoteusers to remain better connected andmore productive outside <strong>of</strong> their wiredenvironment, whether on travel, telecommutingfrom home, or in any locationoutside the <strong>of</strong>fice where Wi-Fi is available.Private Network, Public Wi-FiIntegrating any secure, private network,such as the NMCI, with public Wi-Fi accesspoints outside the control <strong>of</strong> network administratorsis not done lightly. Before deliveringany enterprise mobility capabilityto the <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> workforce,a careful analysis <strong>of</strong> the delicate balancebetween the benefits and inherent risks<strong>of</strong> wireless technologies is conducted.Opening up network access throughpublicly available Wi-Fi hotspots presentssignificant information assurance(IA) concerns about introducing threatsthat might potentially harm the network.The use <strong>of</strong> public Wi-Fi access points,which are normally unsecured and unencryptedby design to foster maximumsharing <strong>of</strong> the signal, brings a number <strong>of</strong>widely known vulnerabilities that may beexploited. For example, is that wirelessnetwork named “FREE STARBUX Wi-Fi”that shows up as available for connectionreally coming from the c<strong>of</strong>fee shop you’rein or from the van in the parking lot?Setting up such imposter or “rogue” accesspoints that can divert your laptop toa hacker-controlled destination and/or installmalware is just one potential avenuefor hackers. Another common attack is totake advantage <strong>of</strong> the lack <strong>of</strong> encryptionon a public access point to intercept andread the traffic transmitted between thelaptop and the network.Of course, these threats are above andbeyond the fact that you are conducting<strong>of</strong>ficial business in the middle <strong>of</strong> a bustlingc<strong>of</strong>fee shop or airport terminal, andwearing a uniform or sporting a Defense<strong>Department</strong> badge that just might makeyou a more attractive target for hackers.Locking It Down to Open It UpThe threat to the network from thesevulnerabilities is real; the impact from abreach could not only affect the user thatis being targeted, but the entire network.Clearly, before approval could be given bythe <strong>Navy</strong> and Marine Corps DesignatedAccrediting Authorities (DAA), networkengineers had to develop a solutionthat would minimize the risks <strong>of</strong> Wi-Fiaccess.As a result <strong>of</strong> these efforts, connectingto NMCI via a public hotspot is done in asignificantly different way than how youwould normally use your laptop’s internalWi-Fi antenna to connect to a hotspot athome or in a public location.The NMCI solution relies on two componentsthat reside on the laptop; oneis hardware, and the other is s<strong>of</strong>twarebased.The hardware consists <strong>of</strong> an approvedwireless network interface cardwhich installs in the laptop’s PCMCIA slot.(Laptops with an ExpressCard slot willrequire an adapter.) The necessary clients<strong>of</strong>tware component is the Wireless ClientEncryption, which is available onlythrough NMCI. This allows you to securelyconnect to NMCI via an encrypted virtualprivate network. Additional security includesthe encryption <strong>of</strong> data-at-rest andthe Host Based Security System for intrusionprevention.This newly announced Wi-Fi hotspot<strong>of</strong>fering is distinct from, and in additionto the existing solution for wireless localarea networks (WLAN) for access on those<strong>Navy</strong> or Marine Corps bases and installations(i.e., base area networks), whereWLANs are currently in place. Dependingon your needs, you may install either orboth solutions on your laptop.Cutting the CordAll components required to enablewireless access to either public or baseaccess points are available through theContract Line Item Numbers (CLIN) on theNMCI contract. There are one-time coststo procure the hardware and s<strong>of</strong>tware, aswell as a monthly recurring fee, each orderedthrough a separate CLIN. Additionally,the following constraints apply:• Windows XP operating system installed;• Broadband Unclassified Remote AccessService (BuRAS v4.0.5) installed;• <strong>Navy</strong> NMCI domain only (as <strong>of</strong> this writing,the Marine Corps DAA has not approvedthe solution);• Unclassified use only; and• Not available for non-NMCI networks,such as the science and technologydomains.For the latest <strong>of</strong>ferings and pricinginformation, visit the NMCI Homeportwireless page at https://www.homeport.navy.mil/services/wireless. Additional resourceson the site include a user guideand an online tutorial.Mike Hernon is an independent consultant to theDON CIO on a variety <strong>of</strong> telecommunicationsrelatedtopics. He was formerly the chief information<strong>of</strong>ficer for the City <strong>of</strong> Boston.CHIPS January - March 2010 37


Identity Management Operationsto Improve CybersecurityBy Sonya SmithThe Defense <strong>Department</strong> is makinga number <strong>of</strong> improvements to theCommon Access Card to enhanceidentity authentication and physicaland network securityThe December 2008 report written bythe Center for Strategic and InternationalStudies (CSIS) Commission on Cybersecurityfor the 44th Presidency,“Securing Cyberspacefor the 44th Presidency,” beganwith one central finding: “The UnitedStates must treat cybersecurity as one <strong>of</strong>the most important security challenges itfaces.”The report went on to state, “Creatingthe ability to know reliably what person ordevice is sending a particular data streamin cyberspace must be part <strong>of</strong> an effectivecybersecurity strategy.” The report urgedthe government to accelerate the adoption<strong>of</strong> identity authentication.The administration’s Cyberspace PolicyReview, released in April 2009, stated veryclearly that: “We cannot improve cybersecuritywithout improving authentication,and identity management is not justabout authenticating people.”The National Security TelecommunicationsAdvisory Committee’s “Report tothe President on Identity ManagementStrategy” <strong>of</strong> May 2009 states:“… this lack<strong>of</strong> trusted identification enables harmfuland/or malicious activity and diminishesnational security/emergency preparednesscapabilities, endangering nationaland homeland security as well as individualprivacy and security.”The <strong>Department</strong> <strong>of</strong> Defense understandsthe magnitude <strong>of</strong> the threat weface in cyberspace.The threat is advanced,persistent and constantly changing. In addition,the increasing popularity <strong>of</strong> collaborativeWeb applications, such as blogs,social networks, podcasts and wikis, andmobile devices, has brought a new set <strong>of</strong>challenges to cybersecurity.There is a clear appreciation <strong>of</strong> the relationshipbetween cybersecurity andidentity management; we must be able toauthenticate entities, as either human ornonhuman, with DoD resources and thenbe able to manage access privileges.A major vulnerability on DoD networksis the use <strong>of</strong> usernames and passwords.Therefore, the DoD has increased assur-ance <strong>of</strong> user authentication by replacingthe requirement for usernames andpasswords with the DoD Common AccessCard (CAC) and associated public key infrastructure(PKI) to cryptographicallylogon to DoD unclassified networks. Thiseffort is now being extended to the classifiednetwork as well.The DoD has seen the benefits <strong>of</strong> thiseffort. Retired Air Force Lt. Gen. CharlesCroom, when director <strong>of</strong> the Defense<strong>Information</strong> Systems Agency and commander<strong>of</strong> the Joint Task Force - GlobalNetwork Operations, said in January 2007that successful intrusions to DoD unclassifiednetworks had declined 46 percentdue to CAC use. The DoD is now also requiringPKI-based user authenticationto access the majority <strong>of</strong> its private Websites.Those same PKI certificates are beingused to encrypt personally identifiableinformation (PII) and sensitive informationto ensure its confidentiality whilein transit. Digital signatures, also usingPKI, provide nonrepudiation services, enablinga higher level <strong>of</strong> assurance that thee-mail users receive is authentic. Digitalsignatures also help thwart e-mail spo<strong>of</strong>ingattempts. In the <strong>Department</strong> <strong>of</strong> the<strong>Navy</strong> (DON), these protections are beingextended to mobile personal electronicdevices such as BlackBerrys.Identity management initiatives utilizingthe CAC with PKI certificates havechanged the way the Defense <strong>Department</strong>does business. But, as with all things,there is always room for improvement.The use <strong>of</strong> Homeland Security PresidentialDirective-12 (HSPD-12) and Federal<strong>Information</strong> Processing Standards-201(FIPS-201) are mandatory across the federalgovernment and provide a commonlanguage and standard to improve identityassurance.The CAC is the DoD’s vehicle to HSPD-12 compliance, and improvements arebeing made to the CAC to comply withFIPS-201. These include making the card/token itself more resistant to tamperingand counterfeiting, meeting interoperabilityrequirements,improving the vettingprocess before card issuance to ensurethe applicant’s eligibility and uniquenesswithin the database, and the addition <strong>of</strong>biometrics to the CAC.The CAC improvements to comply with38 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


the FIPS-201 standard are helping to raisethe confidence level within the CAC infrastructure.Issuance is the critical point <strong>of</strong>identity management and because <strong>of</strong> theFIPS-201, DoD now requires:• • • • an individual’s eligibility for a CAC;verification <strong>of</strong> DoD affiliation froman authoritative data source instead<strong>of</strong> a paper form;completion <strong>of</strong> the FIPS-201 requiredbackground check; andverification <strong>of</strong> a claimed identity perFIPS-201.The enterprise authentication solutionsfor cybersecurity are currently PKI-based.The DoD has deployed a significant number<strong>of</strong> “next-generation CACs,” or CACsthat are being used as part <strong>of</strong> the HSPD-12 transition.As part <strong>of</strong> the transition, some biometricsinformation is being stored on thenext-generation CACs. At a minimum, thefingerprints information on the CAC couldbe utilized as a stronger form <strong>of</strong> multifactorauthentication.The focus <strong>of</strong> identity managementmust build on successes to date andmove forward to a more all-encompassingapproach to include meeting the requirements<strong>of</strong> interoperating with otherHSPD-12 compliant federal credentialsand securely sharing information withother mission partners.The new CAC contains advanced technologythat will enhance the security <strong>of</strong>federally controlled facilities and computersystems and ensure a safer work environmentfor all federal employees andcontractors.Out with the old. In with the smart. For more information about the Defense<strong>Department</strong>’s next-generation CommonAccess Card, go to the CAC Web site atwww.cac.mil or the DON CIO Web site atwww.doncio.navy.mil.Sonya Smith is the deputy director <strong>of</strong> the DONCIO cybersecurity and critical infrastructureteam.The DoD is proud to be among the first government agencies to issue theHSPD-12 compliant federal credential — the next-generation CAC.The gold standard <strong>of</strong> advanced identification.This initiative is part <strong>of</strong> an ongoing effort to provide government personnel with themost secure and reliable forms <strong>of</strong> identification possible. The next-generation CAC representssignificant strides in contactless technology and heralds a critical step in the evolution<strong>of</strong> personnel and national security.The next-generation CAC is more sophisticated:• Increased data storage and memory capacity• Integrated circuit chips, magnetic stripe, bar codes and contactless capability• DoD’s solution to the new federal credentialThe next-generation CAC is safer than ever:• Used for identification purposes when entering federal buildings and controlled spaces• Improved vetting and background check requirements• Meets or exceeds requirements <strong>of</strong> all applicable privacy laws• Electronic authentication to gain physical and logical access improves security• The next-generation CAC can be used with complete confidence to:• Log on securely to DoD networks, systems and Web sites• Access public key infrastructure (PKI)-compliant systems• Encrypt and electronically “sign” e-mails and documentsWhether you are getting a CAC for the first time or renewing your current CAC, the same process isrequired for the next-generation CAC. Please note that you do not need to replace your CAC until yourcurrent card expires.Renew your CAC in three easy steps.1. Meet all Defense Enrollment Eligibility Reporting System (DEERS) requirements.To receive a next-generation CAC, all eligible personnel must be entered into DEERS. To establisha DEERS record, all personnel must undergo proper identity vetting.A next-generation CAC can only be issued once:• A Federal Bureau <strong>of</strong> Investigation (FBI) fingerprints check has been completed and approved• A National Agency Check with Inquiries (NACI)* background security check is in the process <strong>of</strong>being completed*Note: Since the NACI process can take up to 18 months, an individual may be issued a CAC beforethe process is completed. However, if the NACI process is completed and a person does not get“cleared,” his or her CAC will then be revoked.2. Meet all Real-Time Automated Personnel Identification System (RAPIDS) requirements.Required RAPIDS documentation and information for active duty military personnel, Selected Reserve,DoD civilian employees, eligible contractor personnel, eligible federal personnel, and otherDoD-sponsored eligible populations:• Two Forms <strong>of</strong> ID. Both IDs must be among those listed on the I-9 Form (available from www.cac.mil). One must bear a photo (e.g., passport, driver’s license). A current/unexpired CAC is considered a valid form <strong>of</strong> ID.• A six (6) to eight (8) digit number to use as a personal identification number (PIN). All personnelwill be asked to create a PIN that can be easily remembered. Please do not use easily traced numbers such as part <strong>of</strong> your Social Security number (SSN), birthday, anniversary date, telephone number or address.3. Visit any <strong>of</strong> the 1,500+ RAPIDS centers worldwide to obtain your next-generation CAC.Remember, you will only receive a CAC, if your DEERS account is vetted AND you have all requireddocumentation and information. To locate a RAPIDS center near you, please visit the RAPIDS sitelocator at www.dmdc.osd.mil/rsl/owa/home.Note: If you encounter a problem obtaining your next-generation card at the RAPIDS center, and theproblem is related to vetting, please follow up with your personnel security representative to updateyour DEERS pr<strong>of</strong>ile.CHIPS January - March 2010 39


NSIPS Enhancements Help <strong>Navy</strong>’s Aspiring Healthcare Pr<strong>of</strong>essionals ReceiveFaster, More Accurate Financial BenefitsBy Deborah GonzalesThanks to new functionality inthe <strong>Navy</strong>’s largest pay and personnelsystem, medical, dental,optometry, physician assistant, podiatryand nursing students are receiving faster,more accurate reimbursements andtuition payments as part <strong>of</strong> their <strong>Navy</strong>scholarship benefits. In addition, the newfunctionality has boosted the efficiency<strong>of</strong> participant tracking and communicationfor managers <strong>of</strong> the scholarshipprograms.Enhancements to the <strong>Navy</strong> StandardIntegrated Personnel System (NSIPS)have provided the <strong>Navy</strong> Medicine Manpower,Personnel, Training and Education(NAVMED MPT&E) Medical Accessions<strong>Department</strong> (NMAD) with efficient toolsto manage personnel, tuition payments,reimbursements, incentive payments,logistics and training data for more than1,700 <strong>Navy</strong> Reservists enrolled in itsHealth Pr<strong>of</strong>essions Incentives Programs(HPIP).Another improvement is the <strong>Navy</strong>’sability to report core strength and demographicdata required by Congress for themilitary’s Medical Accessions programs.Personnel with the Space and NavalWarfare Systems Center (SSC) AtlanticNew Orleans Office, which provides acomplete range <strong>of</strong> life cycle support, engineering,and maintenance services forNSIPS, deployed the functionality in June2008 in response to NMAD’s requirementfor a more efficient and accurate systemto manage HPIP data and to administerthe $100 million doled out annually instipends, bonuses, tuition payments, reimbursements,and active duty annualtraining pay and entitlements.Also required was a system that couldinterface with multiple Reserve and activeduty systems to initiate, pay and trackappropriate entitlements.The goal <strong>of</strong> the development effort,said Edura Baham, SSC Atlantic’s NSIPSproject director, was to provide a standardizedand integrated field-level datacollection system for entering and trackingHPIP data for <strong>Navy</strong> personnel, leveragingthe existing data, hardware andnetwork infrastructure <strong>of</strong> NSIPS, whichis based on PeopleS<strong>of</strong>t commercial s<strong>of</strong>twareand an Oracle database.“Minimum customization kept developmentcosts in check,” said Baham, whowas the NSIPS deputy program managerduring HPIP development.The new component <strong>of</strong> NSIPS providesa Web-based system that is the singlepoint <strong>of</strong> entry for information pertainingto HPIP-related pay and personnel databy support staff at the NAVMED MPT&E inBethesda, Md.With the critical first-year milestonenow past, the system is receiving highmarks from the staff who work with studentsand universities as they administerthe scholarship programs.Dr. Sandra Yerkes, NAVMED Accessionsprogram manager, also gives the systema thumbs up. “The systems engineerswho worked with us were exceptionallyreceptive to our needs and ideas forimproved connectivity with existing Reserveand financial data systems, as wellas with the individual scholarship participants,”Yerkes said. “The new NSIPS modulesand functionalities have significantlyenhanced our tracking and communicationabilities.”The new NSIPS functionality replaceda legacy system that lacked the modern,robust features needed to support NMADstaff and HPIP participants.Initially developed and deployed in1996 by the former SSC New Orleans,the Reserve Standard Training, Administrationand Readiness Support - HealthPr<strong>of</strong>essions (RSTARS-HP) application wasa successful PC-based application that authorizedpayment for stipends, bonuses,reimbursements and annual training entitlementsfor qualified <strong>Navy</strong> health pr<strong>of</strong>essionalstudents.Prior to the deployment <strong>of</strong> RSTARS-HP,the application process was manual andtook up to six weeks. RSTARS-HP allowedstaff to enter payment data, which wasuploaded to the Reserve HeadquartersSupport (RHS) system and then processedthrough an interface to the DefenseJoint Military Pay System-ReserveComponent (DJMS-RC), the system usedby the Defense Finance and AccountingService to issue payments.As technology changed, RSTARS-HPbecame more costly to maintain andwould have required significant investmentsto upgrade operating systems,databases and hardware, and to complywith new security mandates and pay forscholarship benefit expansion.In 2007, NAVMED MPT&E received permissionand funding to migrate the lega-NAVMED MPT&E Medical Accessions <strong>Department</strong>staff members discuss the new HealthPr<strong>of</strong>essions Incentives Programs (HPIP) functionalitythat is now part <strong>of</strong> the <strong>Navy</strong> StandardIntegrated Personnel System (NSIPS). Standingfrom left are Hospital Corpsman <strong>Chief</strong> MichaelMcGovern, Dr. Sandra Yerkes, HM3 CrystalCopeland, Garcia Elliott, Frances Smith andYeoman 3rd Class Zoe Hepler. Seated is SeanHughes. Photo by HM1 James Royal, <strong>Navy</strong>Medicine Support Command.40 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


cy system’s functionality to NSIPS, a logicalchoice since the system contains manyfunctions that RSTARS-HP users required,including the ability to process personnelgains and losses, enter personnel dataand record annual training.“NSIPS was a feasible migration pathforward as it provided the flexibility toadd the existing RSTARS-HP functionalitywhile leveraging its existing interfaceswith personnel and pay-relatedsystems and the ability to add new ones,”said Catherine Folse, former NSIPS HPIPproject manager, who spearheadeddevelopment.NSIPS already interfaced with DJMS-RC,eliminating the need to route pay-relatedtransactions through RHS, although theinterface required some modification.Only two new interfaces were needed.One interface was with the Inactive Manpowerand Personnel Management <strong>Information</strong>System (IMAPMIS), needed forpersonnel-related transactions. IMAPMISmaintains personnel master records formembers <strong>of</strong> the Selected Reserve (SEL-RES), Individual Ready Reserve (IRR),Standby Reserve, and all retired U.S. <strong>Navy</strong>and U.S. <strong>Navy</strong> Reserve personnel. The systemalso supports IRR mobilization andpersonnel data reporting.Also required was an interface withthe <strong>Navy</strong> Reserve Order Writing System(NROWS) to ensure timely issuance<strong>of</strong> annual training payments to HPIPparticipants.Despite some challenges, includingconversion <strong>of</strong> data not resident in thelegacy system and configuration <strong>of</strong> datato align with the NSIPS drop-down menustructure, the NSIPS team completed thedevelopment and migration project inonly nine months, meeting the customer’srequirements on time and within budget.“NSIPS provided the HPIP staff with acomprehensive system to receive timelyand accurate personnel and pay-relateddata to not only manage HPIP personnelbut to report on them using the robustad hoc reporting capability inherent toNSIPS,” Folse said.Baham credits Folse and her team’sclose coordination and partnership withthe customer as a major factor in the successfuldelivery. “We viewed this projecttotally from the customer’s perspectiveand really worked hard to listen and understandtheir requirements and maintainregular communication,” Baham said.The HPIP component <strong>of</strong> NSIPS hasvastly improved data reliability and accuracy,as well as the accuracy and speed<strong>of</strong> payments. Previously, numerous manualtransactions were required in theHPIP payment process, which frequentlycaused errors that delayed or generatedincorrect deposits to bank accounts.Now, it is entirely possible for studentsto begin receiving payments within a fewdays <strong>of</strong> their gain in the system, said Lt.Elijah Sanders, current NSIPS HPIP projectmanager.In addition, NMAD staff have completevisibility <strong>of</strong> student data, university informationand tuition payments, andcan track and run reports on all types <strong>of</strong>financial data, including reimbursableexpenses for items such as stethoscopes,lab coats and goggles.Business intelligence tools embeddedin the analytics portion <strong>of</strong> NSIPS will providetrend analysis and other forwardleaningcapabilities to NMAD staff in thefuture, Baham added.Programs supported under the HPIPumbrella include the Health Pr<strong>of</strong>essionsScholarship Program (HPSP), <strong>Navy</strong> ActiveDuty Delay for Specialists (NADDS), theFinancial Assistance Program (FAP) andNurse Candidate Program (NCP).Qualified applicants are recruited, appointedand remunerated in exchangefor an active duty obligation after graduation,ensuring the availability <strong>of</strong> appropriatelytrained health pr<strong>of</strong>essionals tomeet <strong>Navy</strong> Medicine’s mission-essentialrequirements.HPSP is an IRR program created to obtainadequate numbers <strong>of</strong> commissioned<strong>of</strong>ficers on active duty who are qualifiedin the various health pr<strong>of</strong>essions. The programis the primary source for the <strong>Navy</strong>’score medical pool, supplying 80 percent<strong>of</strong> physicians and 75 percent <strong>of</strong> dentists.HPSP provides full tuition, stipend andequipment, and book reimbursement tostudents pursuing training or doctoraldegrees in medicine, dentistry, osteopathy,podiatry and optometry, or master’sdegrees as physician assistants. Each studentis also entitled to 45 days <strong>of</strong> annualtraining for each year <strong>of</strong> scholarship.In return for the scholarship benefit,students fulfill a minimum three-yearcommitment as active duty medical, dentalor Medical Service Corps <strong>of</strong>ficers.NADDS supports former HPSP studentswho have been granted a delay in goingon active duty to complete residencytraining.The FAP is an IRR program for physiciansand dentists currently accepted toor enrolled in an accredited residency orfellowship program progressing toward adegree in a specialty designated as criticalto the <strong>Department</strong> <strong>of</strong> Defense.FAP participants receive a monthly stipend,yearly grant, paid tuition and supplies,in addition to 14 days <strong>of</strong> annualtraining per year. In exchange, FAP participantsagree to serve on active duty for aset number <strong>of</strong> years with a minimum twoyears as active duty Medical or DentalCorps <strong>of</strong>ficers.The Nurse Candidate Program providesfinancial assistance to students who arewithin 24 months <strong>of</strong> completing an accreditedbaccalaureate degree in nursing.Students receive monthly stipends and asigning bonus. After graduation, NCP participantsjoin the <strong>Navy</strong> Nurse Corps as <strong>of</strong>ficersand must complete an active dutyservice obligation.These healthcare education incentiveprograms currently serve participants enrolledin more than 160 institutions scatteredacross the United States and PuertoRico. Most participants have no priornaval service and are enrolled in privatehealthcare education institutions.The <strong>Navy</strong> Health Pr<strong>of</strong>essions IncentivesPrograms <strong>of</strong>fer attractive incentives, includingsign-on bonuses, to help with theextremely high costs <strong>of</strong> medical education,enabling students to leave schoolwith minimal debt.SSC Atlantic New Orleans Office providesvarious products and services forNSIPS and its HPIP modules as the technicalagent for the PMW 240 Sea Warriorprogram, a component <strong>of</strong> the Naval ProgramExecutive Office for Enterprise <strong>Information</strong>Systems (PEO EIS).Support includes s<strong>of</strong>tware developmentand sustainment; systems engineering;project management; risk management;installation support; s<strong>of</strong>twarechanges; and customer support centerand help desk services.For more information about <strong>Navy</strong> Medicine,go to www.med.navy.mil.Deborah Gonzales provides contractor supportto the SSC Atlantic New Orleans Office.CHIPS January - March 2010 41


Iam a frustrated Dick Tracy fan. I have been waiting formy two-way TV wristwatch since 1964. The best anyonehas come up with is a cell phone that will show a picture<strong>of</strong> the person calling and then only if users upload photos andassociate their contacts in advance.The "Star Wars" trilogy introduced the idea <strong>of</strong> three-dimensionalholographic images for communications in the “The EmpireStrikes Back” in 1980, but 3-D images are still not availablefor home, vehicle or desktop use today.In short, despite the fact that we may have the technology todo so, we have not created practical versions <strong>of</strong> all the wonderfultoys we have seen in movies over the last 50 years. In thisissue, we will look at one <strong>of</strong>fshoot <strong>of</strong> these technologies: desktopvideo teleconferencing. Yes, we have the technology, but aVTC is still a long way from becoming a ubiquitous replacementfor voice or text-only communications for both technical andcognitive reasons.TalkiNg piCTuresHumans communicate most effectively face-to-face. Thereis always a certain amount <strong>of</strong> information lost when we communicateover a distance. Text conveys our words but not voiceinflection, tone, timbre or pitch. Radios and telephones can recreatesome, but not all <strong>of</strong> the aural signal.The advent <strong>of</strong> television brought the first technologies thattransmitted both real-time moving images and speech electronically.The earliest attempts at video teleconferencing usedclosed-circuit analog television systems connected by cable.Broadcast technologies soon advanced, and television signalsvia radio waves were transmitted over greater distances including,most famously, the live broadcast <strong>of</strong> Neil Armstrong walkingon the moon in 1969.But transmitting signals via analog waveforms was an inefficientand expensive way to hold a long-distance chat, particularlybecause <strong>of</strong> poor video quality, a need for a van full <strong>of</strong> equipment,and satellite capability to communicate over the horizon.Another limiting factor during the initial development period inthe 1970s was a lack <strong>of</strong> an efficient video compression capability.That meant videophones, primarily the AT&T Picturephone,required a lot <strong>of</strong> bandwidth and bit transmission relative to thenetworks available.The emergence <strong>of</strong> the integrated services digital network(ISDN) and better video compression technologies in the 1980smade it possible for video teleconferencing to be more efficientand economical. The expansion <strong>of</strong> digital VTC systems coincidedwith the worldwide expansion <strong>of</strong> ISDN networks. While thefirst digital systems consisted <strong>of</strong> expensive proprietary technology,during the 1990s, Internet Protocol, more efficient videocompression, and emerging international standards facilitated amigration toward standards-based systems. While most higherquality VTC installations currently follow the conference roommodel, there are a variety <strong>of</strong> Internet and Web-based technologies,like small universal serial bus (USB) cameras, and s<strong>of</strong>tware,like Yahoo! Messenger and MSN Messenger, that give users inexpensive,though low-quality, desktop VTC.A typical desktop VTC setup includes the following components:video camera; video display; one or more microphonesfor audio input; one or more speakers for audio output; videoand audio processing capability in the desktop PC, either hardware(dedicated device/card) or s<strong>of</strong>tware; and a data connectionto a telephone or data network.Desktop VTC systems generally follow one <strong>of</strong> two internationalstandards. The International Telecommunication Union (ITU)standard H.323 defines audio-visual communication sessions onpacket networks. The other, slightly newer standard for desktopVTC, is the Internet Engineering Task Force Session InitiationProtocol (SIP), a signaling protocol used to control multimediacommunication sessions that include voice and video calls overIP. Both standards are proven and widely implemented. Themain difference between the two is that SIP <strong>of</strong>fers more optionsfor multiple media streams such as converged voice, video, chat,presentation and multi-party connections.So, we have a wide variety <strong>of</strong> available desktop VTC platforms,some <strong>of</strong> which come with everything you need to hold videoteleconferences right out <strong>of</strong> the box. And yet, I realized whilepreparing for this article that I have never placed a single videocall. Not one. Zip. Nada. Zilch.Since I do not consider myself a Luddite when it comes toIT that led to a little self-reflection on why I have never used adesktop VTC.TO vTC Or NOT TO vTC?Why do I keep phoning or e-mailing people when I could try aVTC? Well, if I want an immediate answer I stand a better chanceby phoning rather than finding someone at a computer withvideo chat s<strong>of</strong>tware running. Because my smiling face probablydoes not add much to what I want to discuss, using speed dial tohave the cellular phone network track someone down is a muchmore convenient way <strong>of</strong> communicating.If the receiver is not available, it will only take me longer to findthat out going through the VTC interface. (I am a Lazy Person,after all.) If I want to make sure a receiver gets my message in amore permanent form, e-mail will lay in wait until it is checked,at which point the system will obligingly display my message(and send me a read receipt if I want delivery confirmation).In addition to the synchronous communication issues outlined,unless you have a recorder running, VTC is not a persistentmedium.Essentially, habit and convenience keep me from trying tovideo call everyone I know. Most <strong>of</strong> the people I know have aphone and e-mail, but virtually none use desktop VTC. There isno critical mass <strong>of</strong> users to work with. Until use <strong>of</strong> VTC s<strong>of</strong>tware42 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


starts spreading through my network<strong>of</strong> friends like Facebook has, and it canbe used on smartphones, I will never getin the habit <strong>of</strong> using it.That leads to a second consideration:What would desktop videoteleconferencing give me that aphone conversation or e-mail doesnot? I can think <strong>of</strong> two things, though onethat initially looks like a positive comes with an interesting sideissue that could count as a negative with many people.The first and most obvious advantage is that you can see theperson you are talking with. We humans are social creaturesand, as I mentioned earlier, we lose a lot <strong>of</strong> the nuances <strong>of</strong> communicationwithout visual attention. Seeing the other person(or people) generally gives us a sense <strong>of</strong> personal security aboutwhom we are dealing with.Second, a VTC is not always just about having a picturephoneconversation. Good VTC s<strong>of</strong>tware can also allow for collaborativework on documents.The parallax viewNow, however, to the side issue: eye contact. Or morespecifically, the lack <strong>of</strong> true eye contact in videoconferencing.When humans communicate faceto-face,we tend to watch one <strong>of</strong> two bodyparts: eyes or mouths. Eye contact establishesa very primal connection, while people whowatch mouths may depend on it to identify whois talking. But even a mouth-watcher is aware<strong>of</strong> how the other person’s eyes are moving.And herein is the problem with desktopVTC: no meaningful eye contact occurs. Todo that, we would have to look directly intothe camera. Unfortunately, if the camera isanywhere besides dead center in the video picture <strong>of</strong>the person we are talking to, the image on the monitorswill be looking above or below, and because we are lookingat the camera we will not see the participants looking at us.The farther away from the camera, the less parallax (displacementor difference <strong>of</strong> orientation) you experience. While parallaxcan be very useful for calculating the distance to an objectbased on the angle <strong>of</strong> inclination and distance separating originpoints between two lines <strong>of</strong> sight, it is disconcerting for humanswhen we cannot make eye contact even periodically during aconversation. And that is likely another reason that desktop VTChas not quite caught on: We do not have similar cognitive expectationswhen using e-mail or a phone, therefore they remainmore comfortable to use.Full-size conference room setups reduce the parallax effectbecause the camera is farther away from us, but the next timeyou are in a VTC, see if you really can make eye contact withsomeone on the other side <strong>of</strong> the camera.TeChNiCal requiremeNTsNow that we have looked at the whys and wherefores <strong>of</strong> desktopVTC, let’s take a quick look under the hood.While early desktop videoconferencing solutions requiredthe use <strong>of</strong> custom equipment, a modern desktop VTC can runon most desktop PCs or notebooks with either a built-in or USBwebcam.However, enterprise-level network-based desktop VTC solutionsmay require the use <strong>of</strong> some additional hardware ors<strong>of</strong>tware components. For example, multi-point sessions thatinclude more than two participating clients generally require avideo bridge.If your enterprise VTC system is going to communicate withother enterprise VTC systems, you may need a dedicated gatewayfor connectivity and gatekeeper s<strong>of</strong>tware to control calladmission and track usage. You will also likely need dedicatedfirewalls and servers for streaming or recording transmissions.In particular, if we expect to successfully host network-baseddesktop VTC traffic, we really need a solid understanding <strong>of</strong> justwhat type and size <strong>of</strong> infrastructure is required to make it work.First and foremost, VTC traffic can consume a significantamount <strong>of</strong> bandwidth. While modern video compression techniqueshave reduced the bandwidth required for videoconferencing,a good quality desktop VTC call (about 15frames per second) still requires about 500 kbps <strong>of</strong>bandwidth per participant.A high-definition VTC call (about 24 frames persecond) will likely require at least 1 Mbps per client(which is why most conference room setups usea primary rate interface connection operating atT1 speeds).In addition, conducting a VTC over a networkwill require the ability to adjust network bandwidthutilization in real time to adapt to changingusage.Second, while other popular networked applications,like e-mail, file services or Web browsing,send and receive traffic in bursts <strong>of</strong> data, VTC networktraffic is usually a constant stream <strong>of</strong> data thatmore closely resembles circuit-switched operations thanpacket-switched. Any significant latency (taking more than100 milliseconds to deliver a packet) and jitter (the variation inthe time between packets arriving) will have a negative impacton the quality <strong>of</strong> the transmission.A large part <strong>of</strong> providing an acceptable quality <strong>of</strong> service restswith managing network bandwidth. Time-sensitive, rich-mediaapplications, like videoconferencing, require dedicated bandwidthprovided by call admission control; setting and enforcingbandwidth usage limits for each user and location; and havingsome way to adapt on-the-fly to changing network conditions.On a smaller scale, you can see this with home VTC usage. Myhome Internet connection is a DSL that maxes out at around 780kbps (about half <strong>of</strong> a T1 line) and usually runs at speeds between300 kbps and 550 kbps. The desktop VTC applications on homecomputers and laptops can allegedly run with 128 kbps <strong>of</strong> bandwidth,as will (in theory) most <strong>of</strong> the online computer or consolegames we play.But I can tell you from personal experience that one teenagerwatching YouTube combined with another teenager trying todo video chat over our relatively unmanaged wireless router anddefault firewall will bring each other’s applications to a crawl.And the lag generated by the low quality video chat applicationhogging the connection will also get you "killed" repeatedlywhile playing something like Halo or Call <strong>of</strong> Duty online.CHIPS January - March 2010 43


Iraqi Government Begins Management<strong>of</strong> High Frequency Radio BandThe Government <strong>of</strong> Iraq (GoI) began managing the highfrequency radio band throughout the country in October '09By Multi-National Force-Iraq Public AffairsSo, regardless <strong>of</strong> whether we want to video teleconferencefrom home or at an enterprise level, we need to engineer ourpacket networks for high throughput, low latency and lowpacket loss. A network-based VTC call will not be a fun or satisfyingexperience if late or lost packets result in the signal lookingworse than the video quality <strong>of</strong> the "Blair Witch Project."I want a nice, clear, high definition signal so I can at least try tosee the other person’s eyes.Finally, there are security issues, particularly at the enterpriselevel. Standard H.323-based videoconferencing, in particular,uses a large number <strong>of</strong> network ports across a wide range, andcomplicating matters further, the ports used will vary almostwith every call.On the one hand, most desktop video conferencing systemsinclude some form <strong>of</strong> firewall traversal capability that allowstraffic to pass through the firewall without the need to changefirewall rules or settings, enabling fairly seamless communicationsand reducing the burden on network administrators.Then again, this means a lot <strong>of</strong> bits and bytes will be passingthrough the firewall without much adult supervision, thusmaking network security folks just that much more anxious.CONClusiONsMaybe I am a Luddite, because despite my desire for that DickTracy two-way TV wristwatch, I just do not have a great burningdesire to do much more than pick up the phone or send ane-mail. Yes, there are times where we can use a VTC to hold abig meeting with participants in lots <strong>of</strong> different places and savethe cost and carbon footprint <strong>of</strong> all those airline tickets, but onlywith a high-quality dedicated VTC system. Desktop VTC is stilljust a bit quirky for me.But even if someone solves the parallax issue, as, for example,Micros<strong>of</strong>t is attempting with its GazeMaster project, and we getdesktop VTC s<strong>of</strong>tware that can display multiple callers simultaneously,and there is enough network capacity available that wedo not throttle the rest <strong>of</strong> our users into a network breakdown,is it really worth the extra expense just so I can see a movingpicture <strong>of</strong> who I am talking to?Maybe. And definitely, if it can work on my wristwatch.Happy NetworkiNg!Long is a retired Air Force communications <strong>of</strong>ficer who has written forCHIPS since 1993. He holds a Master <strong>of</strong> Science degree in information resourcesmanagement from the Air Force Institute <strong>of</strong> Technology. He currentlyserves as a telecommunications manager in the <strong>Department</strong> <strong>of</strong>Homeland Security.Multi-National Force-Iraq turned over responsibility for management<strong>of</strong> the high frequency radio band to the Government<strong>of</strong> Iraq after a months-long process that included training, fieldingmanagement systems and development <strong>of</strong> Iraqi proceduresfor utilization <strong>of</strong> the electromagnetic spectrum.In accordance with the Security Agreement, both partiesformed the Frequency Management Joint Sub-Committeein January 2009 to address any issues regarding frequencymanagement.Dr. Hiyam Al Yassiri, <strong>of</strong> the Ministry <strong>of</strong> Communications, andRear Adm. David Simpson, Deputy <strong>Chief</strong> <strong>of</strong> Staff, Communicationsand <strong>Information</strong> Systems (CJ6), Multi-National Force-Iraq,co-chairman <strong>of</strong> the sub-committee, oversaw the development<strong>of</strong> Iraqi spectrum management capacity to allow the transition<strong>of</strong> the high frequency (HF) band to the Iraqi Government.The sub-committee will continue to work together to developan Iraqi process for each successive band. Each band has verydifferent commercial, government and security uses and willneed different procedures to accommodate all <strong>of</strong> the Iraqi usergroups. The sub-committee is now working on the transition <strong>of</strong>both the very high frequency (VHF) and ultra high frequency(UHF) bands with the ultimate goal <strong>of</strong> turning over managementresponsibilities for all frequencies to the GoI.In May 2009, U.S. forces conducted frequency managementtraining for GoI personnel in various ministries. The purpose <strong>of</strong>the training was to establish a cadre <strong>of</strong> individuals capable <strong>of</strong>staffing a Communications and Media Commission and for Ministriesthat depend on radio frequencies as a critical resource.The training produced GoI staff capable <strong>of</strong> training and certifyingfuture spectrum and frequency managers.“The radio spectrum is a limited natural resource for every nation.Governments must balance domestic needs and internationalresponsibilities as they manage their spectrum resources.The demand for radio frequency use is on the rise and will continueto grow in the foreseeable future. Iraq’s Communicationsand Media Commission and Ministry <strong>of</strong> Communications arecommitted to preserving the equities <strong>of</strong> Iraqi citizens,” Simpsonsaid.“This talented Government <strong>of</strong> Iraq team <strong>of</strong> engineers, techniciansand managers are ready to serve Iraq as stewards <strong>of</strong> the[Iraqi] nation's spectrum resources consistent with internationaltreaty obligations and with due regard for the rights <strong>of</strong> neighboringnations.”For more information about Multi-NationalForce-Iraq, visit WWW.MNF-IRAQ.COMor contact the public affairs <strong>of</strong>fice atMNFIPRESSDESK@iraq.centcom.mil.44 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


Enterprise S<strong>of</strong>tware AgreementsThe Enterprise S<strong>of</strong>tware Initiative (ESI) is a <strong>Department</strong> <strong>of</strong> Defense (DoD) initiativeto streamline the acquisition process and provide best-priced, standardscompliantinformation technology (IT). The ESI is a business discipline used tocoordinate multiple IT investments and leverage the buying power <strong>of</strong> the governmentfor commercial IT products and services. By consolidating IT requirementsand negotiating Enterprise Agreements with s<strong>of</strong>tware vendors, the DoDrealizes significant Total Cost <strong>of</strong> Ownership (TCO) savings in IT acquisition andmaintenance. The goal is to develop and implement a process to identify, acquire,distribute and manage IT from the enterprise level.Additionally, the ESI was incorporated into the Defense Federal Acquisition RegulationSupplement (DFARS) Section 208.74 on Oct. 25, 2002, and DoD Instruction5000.2 on May 12, 2003.Unless otherwise stated authorized ESI users include all DoD components, andtheir employees including Reserve component (Guard and Reserve) and theU.S. Coast Guard mobilized or attached to DoD; other government employeesassigned to and working with DoD; nonappropriated funds instrumentalitiessuch as NAFI employees; Intelligence Community (IC) covered organizationsto include all DoD Intel System member organizations and employees, but notthe CIA, nor other IC employees, unless they are assigned to and working withDoD organizations; DoD contractors authorized in accordance with the FAR; andauthorized Foreign Military Sales.For more information on the ESI or to obtain product information, visit the ESIWeb site at http://www.esi.mil/.S<strong>of</strong>tware Categories for ESI:Asset Discovery ToolsBelarcBelManage Asset Management – Provides s<strong>of</strong>tware, maintenance and services.Contractor: Belarc Inc. (W91QUZ-07-A-0005)Authorized Users: This BPA is open for ordering by all <strong>Department</strong> <strong>of</strong> Defense (DoD) components and authorized contractors.Ordering Expires: 30 Sep 11Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jspBMCRemedy Asset Management – Provides s<strong>of</strong>tware, maintenance and services.Contractor: BMC S<strong>of</strong>tware Inc. (W91QUZ-07-A-0006)Authorized Users: This BPA is open for ordering by all <strong>Department</strong> <strong>of</strong> Defense (DoD) components and authorized contractors.Ordering Expires: 29 Jan 10 (Please call for extension information.)Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jspCarahs<strong>of</strong>tOpsware Asset Management – Provides s<strong>of</strong>tware, maintenance and services.Contractor: Carahs<strong>of</strong>t Inc. (W91QUZ-07-A-0004)Authorized Users: This BPA is open for ordering by all <strong>Department</strong> <strong>of</strong> Defense (DoD) components and authorized contractors.Ordering Expires: 18 May 10Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jspDLTBDNA Asset Management – Provides asset management s<strong>of</strong>tware,maintenance and services.Contractor: DLT Solutions Inc. (W91QUZ-07-A-0002)Authorized Users: This BPA has been designated as a GSA Smart-BUY and is open for ordering by all <strong>Department</strong> <strong>of</strong> Defense (DoD) components,authorized contractors and all federal agencies.Ordering Expires: 01 Apr 13Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jspPatriotBigFix Asset Management – Provides s<strong>of</strong>tware, maintenanceand services.Contractor: Patriot Technologies Inc. (W91QUZ-07-A-0003)Authorized Users: This BPA has been designated as a GSA Smart-BUY and is open for ordering by all <strong>Department</strong> <strong>of</strong> Defense (DoD) components,authorized contractors and all federal agencies.Ordering Expires: 08 Sep 12Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jspBusiness and Modeling ToolsBPWin/ERWin BPWin/ERWin – Provides products, upgrades and warranty for ER-Win, a data modeling solution that creates and maintains databases, datawarehouses and enterprise data resource models. It also provides BPWin,a modeling tool used to analyze, document and improve complex businessprocesses.Contractor: Computer Associates International, Inc.(W91QUZ-04-A-0002); (813) 612-7352Ordering Expires: Upon depletion <strong>of</strong> Computer Hardware, EnterpriseS<strong>of</strong>tware and Solutions (CHESS) inventory.Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jspBusiness IntelligenceBusiness Objects Business Objects – Provides s<strong>of</strong>tware licenses and support for BusinessObjects, Crystal Reports, Crystal Enterprise and training and pr<strong>of</strong>essionalservices.Volume discounts range from 5 to 20 percent for purchases<strong>of</strong> s<strong>of</strong>tware licenses under a single delivery order.Contractor: EC America, Inc. (SP4700-05-A-0003)Ordering Expires: 04 May 10Web Link: http://www.gsaweblink.com/esi-dod/boa/CHIPS January - March 2010 45


Database Management ToolsMicros<strong>of</strong>t ProductsMicros<strong>of</strong>t Database Products – See information under Office Systemson page 49.Oracle (DEAL-O)Oracle Products – Provides Oracle database and application s<strong>of</strong>tware licenses,support, training and consulting services. The <strong>Navy</strong> Enterprise LicenseAgreement is for database licenses for <strong>Navy</strong> customers. Contact the <strong>Navy</strong> projectmanager.Contractors:Oracle Corp. (W91QUZ-07-A-0001); (703) 364-3351DLT Solutions (W91QUZ-06-A-0002); (703) 708-9107immixTechnology, Inc. (W91QUZ-08-A-0001);Small Business; (703) 752-0632Mythics, Inc. (W91QUZ-06-A-0003); Small Business; (757) 284-6570TKC Integration Services, LLC (W91QUZ-09-A-0001);Small Business; (571) 323-5584Ordering Expires:Oracle: 30 Sep 11DLT: 1 Apr 13immixTechnology: 26 Aug 11Mythics: 18 Dec 11TKCIS: 29 Jun 11Authorized Users: This has been designated as a DoD ESI and GSA Smart-BUY contract and is open for ordering by all U.S. federal agencies, DoD componentsand authorized contractors.Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jspSpecial Note to <strong>Navy</strong> Users: See the information provided on page 50concerning the <strong>Navy</strong> Oracle Database Enterprise License under <strong>Department</strong> <strong>of</strong>the <strong>Navy</strong> Agreements.Sybase (DEAL-S)Sybase Products - Offers a full suite <strong>of</strong> s<strong>of</strong>tware solutions designed to assistcustomers in achieving <strong>Information</strong> Liquidity. These solutions are focusedon data management and integration; application integration; Anywhere integration;and vertical process integration, development and management. Specificproducts include but are not limited to: Sybase’s Enterprise ApplicationServer; Mobile and Embedded databases; m-Business Studio; HIPAA (HealthInsurance Portability and Accountability Act) and Patriot Act Compliance; PowerBuilder;and a wide range <strong>of</strong> application adaptors. In addition, a Golden Diskfor the Adaptive Server Enterprise (ASE) product is part <strong>of</strong> the agreement. TheEnterprise portion <strong>of</strong> the BPA <strong>of</strong>fers NT servers, NT seats, Unix servers, Unixseats, Linux servers and Linux seats. S<strong>of</strong>tware purchased under this BPA has aperpetual s<strong>of</strong>tware license. The BPA also has exceptional pricing for other Sybaseoptions. The savings to the government is 64 percent <strong>of</strong>f GSA prices.Contractor: Sybase, Inc. (DAAB15-99-A-1003); (800) 879-2273;(301) 896-1661Ordering Expires: 15 Jan 13Authorized Users: Authorized users include personnel and employees <strong>of</strong>the DoD, Reserve components (Guard and Reserve), U.S. Coast Guard when mobilizedwith, or attached to the DoD and nonappropriated funds instrumentalities.Also included are Intelligence Communities, including all DoD Intel <strong>Information</strong>Systems (DoDIIS) member organizations and employees. Contractors <strong>of</strong> theDoD may use this agreement to license s<strong>of</strong>tware for performance <strong>of</strong> work onDoD projects.Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jspEnterprise Application IntegrationSun S<strong>of</strong>twareSun Products – Provides Sun Java Enterprise System (JES) and Sun StarOffice.Sun JES products supply integration and service-oriented architecture(SOA) s<strong>of</strong>tware including: Identity Management Suite; Communications Suite;Availability Suite; Web Infrastructure Suite; MySQL; xVM and Role Manager. SunStarOffice supplies a full-featured <strong>of</strong>fice productivity suite.Contractors:Commercial Data Systems, Inc. (N00104-08-A-ZF38);Small Business; (619) 569-9373Dynamic Systems, Inc. (N00104-08-A-ZF40);Small Business; (801) 444-0008 World Wide Technology, Inc. (N00104-08-A-ZF39);Small Business; (314) 919-1513 Ordering Expires: 24 Sep 12Web Link:http://www.it-umbrella.navy.mil/contract/enterprise/application_integration/sun/index.shtmlEnterprise Architecture ToolsIBM S<strong>of</strong>tware Products IBM S<strong>of</strong>tware Products – Provides IBM product licenses and maintenancewith discounts from 1 to 19 percent <strong>of</strong>f GSA pricing. On June 28, 2006,the IBM Rational Blanket Purchase Agreement (BPA) with immixTechnology wasmodified to include licenses and Passport Advantage maintenance for IBM products,including: IBM Rational, IBM Database 2 (DB2), IBM Informix, IBM Trivoli, IBMWebsphere and Lotus s<strong>of</strong>tware products.Contractor: immixTechnology, Inc. (DABL01-03-A-1006);Small Business; (800) 433-5444Ordering Expires: 31 Jan 10 (Please call for extension information.)Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jspEnterprise ManagementCA Enterprise Management S<strong>of</strong>tware (C-EMS2) Computer Associates Unicenter Enterprise Management S<strong>of</strong>tware– Includes Security Management; Network Management; Event Management;Output Management; Storage Management; Performance Management; ProblemManagement; S<strong>of</strong>tware Delivery; and Asset Management. In addition tothese products,there are many optional products,services and training available.Contractor: Computer Associates International, Inc.(W91QUZ-04-A-0002); (703) 709-4610Ordering Expires: 22 Sep 12Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jspCitrixCitrix – Provides a full range <strong>of</strong> Metaframe products including Secure AccessManager,Conferencing Manager,Password Manager,Access Suite & XP PresentationServer. Discounts range from 2 to 5 percent <strong>of</strong>f GSA schedule pricing plusspot discounts for volume purchases.Contractor: Citrix Systems, Inc. (W91QUZ-04-A-0001); (772) 221-8606Ordering Expires: 31 Jan 10 (Please call for extension information.)Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jspMicros<strong>of</strong>t Premier Support Services(MPS-2)Micros<strong>of</strong>t Premier Support Services – Provides premier supportpackages to small and large-size organizations. The products include TechnicalAccount Managers, Alliance Support Teams, Reactive Incidents, on-site support,Technet and MSDN subscriptions.Contractor: Micros<strong>of</strong>t (W91QUZ-09-D-0038); (980) 776-8413Ordering Expires: 31 Mar 10 (Please call for extension information.)Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jsp46 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


NetIQNetIQ – Provides Net IQ systems management, security management and Webanalytics solutions. Products include: AppManager; AppAnalyzer; Mail Marshal;Web Marshal; Vivinet voice and video products; and Vigilant Security and Managementproducts. Discounts are 8 to 10 percent <strong>of</strong>f GSA schedule pricing forproducts and 5 percent <strong>of</strong>f GSA schedule pricing for maintenance.Contractors:NetIQ Corp. (W91QUZ-04-A-0003)Northrop Grumman – authorized resellerFederal Technology Solutions, Inc. – authorized resellerOrdering Expires: 05 May 14Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jspPlanet AssociatesPlanet Associates Infrastructure Relationship Management (IRM) S<strong>of</strong>tware Products – Provides s<strong>of</strong>tware products including licenses,maintenance and training for an enterprise management tool for documentingand visually managing all enterprise assets, critical infrastructure and inter-connectivity including the interdependencies between systems, networks, users,locations and services.Contractor: Planet Associates, Inc. (N00104-09-A-ZF36);Small Business; (732) 922-5300Ordering Expires: 01 Jun 14 Web Link: http://www.it-umbrella.navy.mil/contract/planet_assoc/planetassoc.shtmlQuest ProductsQuest Products – Provides Quest s<strong>of</strong>tware licenses, maintenance, servicesand training for Active Directory Products, enterprise management, ERP planningsupport and application and database support. Quest s<strong>of</strong>tware productshave been designated as a DoD ESI and GSA SmartBUY. Only Active DirectoryProducts have been determined to be the best value to the government and;therefore, competition is not required for Active Directory s<strong>of</strong>tware purchases.Discount range for s<strong>of</strong>tware is from 3 to 48 percent <strong>of</strong>f GSA pricing. For maintenance,services and training, discount range is 3 to 8 percent <strong>of</strong>f GSA pricing.Contractors:Quest S<strong>of</strong>tware, Inc. (W91QUZ-05-A-0023); (301) 820-4800DLT Solutions (W91QUZ-06-A-0004); (703) 708-9127Ordering Expires:Quest: 30 Sep 10DLT: 01 Apr 13Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jspEnterprise Resource PlanningOracleOracle – See information provided under Database Management Tools on page46.RWD TechnologiesRWD Technologies – Provides a broad range <strong>of</strong> integrated s<strong>of</strong>tware productsdesigned to improve the productivity and effectiveness <strong>of</strong> end users incomplex operating environments. RWD’s Info Pak products allow you to easilycreate, distribute and maintain pr<strong>of</strong>essional training documents and online helpfor any computer application. RWD Info Pak products include Publisher, Administrator,Simulator and OmniHelp. Training and other services are also available.Contractor: RWD Technologies (N00104-06-A-ZF37); (410) 869-3014Ordering Expires: Effective for term <strong>of</strong> the GSA FSS ScheduleWeb Link: www.it-umbrella.navy.mil/contract/enterprise/erp_s<strong>of</strong>tware/rwd/rwd.shtmlSAPSAP Products – Provides s<strong>of</strong>tware licenses, s<strong>of</strong>tware maintenance support,information technology pr<strong>of</strong>essional services and s<strong>of</strong>tware training services.Contractors:SAP Public Services, Inc. (N00104-08-A-ZF41);Large Business; (202) 312-3515Advantaged Solutions, Inc. (N00104-08-A-ZF42);Small Business; (202) 204-3083Carahs<strong>of</strong>t Technology Corporation (N00104-08-A-ZF43);Small Business; (703) 871-8583Oakland Consulting Group (N00104-08-A-ZF44);Small Business; (301) 577-4111Ordering Expires: 14 Sep 13Web Link: http://www.it-umbrella.navy.mil/contract/enterprise/erp_s<strong>of</strong>tware/sap_products/sap_hdr.shtml<strong>Information</strong> Assurance ToolsData at Rest Solutions BPAs <strong>of</strong>fered through ESI/SmartBUYThe Office <strong>of</strong> Management and Budget, Defense <strong>Department</strong> and GeneralServices Administration awarded multiple contracts for blanket purchase agreements(BPA) to protect sensitive, unclassified data residing on government laptops,other mobile computing devices and removable storage media devices.These competitively awarded BPAs provide three categories <strong>of</strong> s<strong>of</strong>tware andhardware encryption products — full disk encryption (FDE), file encryption (FES)and integrated FDE/FES products. All products use cryptographic modules validatedunder FIPS 140-2 security requirements and have met stringent technicaland interoperability requirements.Licenses are transferable within a federal agency and include secondary userights. All awarded BPA prices are as low as or lower than the prices each vendorhas available on GSA schedules. The federal government anticipates significantsavings through these BPAs.The BPAs were awarded under both the DoD’s EnterpriseS<strong>of</strong>tware Initiative (ESI) and GSA’s governmentwide SmartBUY programs,making them available to all U.S. executive agencies, independent establishments,DoD components, NATO, state and local agencies, Foreign Military Sales(FMS) with written authorization, and contractors authorized to order in accordancewith the FAR Part 51.Service component chief information <strong>of</strong>ficers (CIO) are developing componentservice-specific enterprise strategies. Accordingly, customers should checkwith their CIO for component-specific policies and strategies before procuringa DAR solution. The <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> and Army released service-specificDAR guidance for their personnel to follow. Go to the ESI Web site at www.esi.milfor more information.The DON CIO issued an enterprise solution for <strong>Navy</strong> users purchasing DARs<strong>of</strong>tware. See the information provided on page 50 under <strong>Department</strong> <strong>of</strong> the<strong>Navy</strong> Agreements. The <strong>Department</strong> <strong>of</strong> the Army issued an enterprise solutionfor Army users purchasing DAR s<strong>of</strong>tware. See the information provided onthe Army CHESS Web site at https://chess.army.mil/ascp/commerce/contract/FA8771-07-A-0301_bpaorderinginstructions(2)_ARMY.jsp.As <strong>of</strong> press time, other DoD users are not authorized to purchase DAR s<strong>of</strong>twarebecause service-specific guidance has not been issued.Mobile Armor – MTM Technologies, Inc. (FA8771-07-A-0301)Safeboot/McAfee – Rocky Mountain Ram (FA8771-07-A-0302)<strong>Information</strong> Security Corp. – Carahs<strong>of</strong>t Technology Corp.(FA8771-07-A-0303)Safeboot/McAfee – Spectrum Systems (FA8771-07-A-0304)SafeNet, Inc. – SafeNet, Inc. (FA8771-07-A-0305)Encryption Solutions, Inc. – Hi Tech Services, Inc. (FA8771-07-A- 0306)Pointsec/Checkpoint – immix Technologies (FA8771-07-A-0307)SPYRUS, Inc. – Autonomic Resources, LLC (FA8771-07-A-0308)CREDANT Technologies – GTSI Corp. – (FA8771-07-A-0309)WinMagic, Inc. – Govbuys, Inc. (FA8771-07-A-0310)CREDANT Technologies – Intelligent Decisions (FA8771-07-A-0311)CHIPS January - March 2010 47


GuardianEdge Technologies – Merlin International (FA8771-07-A-0312)Ordering Expires: 14 Jun 12 (If extended by option exercise.)Web Link: http://www.esi.milMcAfeeMcAfee – Provides s<strong>of</strong>tware and services in the following areas: Anti-Virus; E-Business Server; ePolicy Orchestrator; GroupShield Services; IntruShield; Secure Messaging Gateway and Web Gateway.Contractor: En Pointe (GS-35F-0372N)Ordering Expires: 16 Sep 10 (Please call for extension information.)Web Link: http://www.esi.milAntivirus Web Links: Antivirus s<strong>of</strong>tware available at no cost; download includes McAfee, Symantec and Trend Micro Products. These products can be downloaded by linking to either <strong>of</strong> the following Web sites:NIPRNET site: https://www.jtfgno.mil/antivirus/antivirus_index.htmSIPRNET site: https://www.cert.smil.mil/antivirus/av_info.htmSecurifySecurify – Provides policy-driven appliances for network security that are designedto validate and enforce intended use <strong>of</strong> networks and applications; protectsagainst all risks and saves costs on network and security operations. Securifyintegrates application layer seven traffic analysis with signatures and vulnerabilityscanning in order to discover network behavior. It provides highly accurate,real-time threat mitigation for both known and unknown threats and <strong>of</strong>fers truecompliance tracking.Contractor: Patriot Technologies, Inc. (FA8771-06-A-0303)Ordering Expires: 04 Jan 11 (If extended by option exercise)Web Link: http://www.esi.milSymantecSymantec – Symantec products can be divided into 10 main categories thatfall under the broad definition <strong>of</strong> <strong>Information</strong> Assurance.These categories are: virusprotection; anti-spam; content filtering; anti-spyware solutions; intrusion protection;firewalls/VPN; integrated security; security management; vulnerabilitymanagement; and policy compliance.This BPA provides the full line <strong>of</strong> SymantecCorp. products and services consisting <strong>of</strong> more than 6,000 line items includingGhost and Brightmail. It also includes Symantec Antivirus products such as SymantecClient Security; Norton Antivirus for Macintosh; Symantec System Center;Symantec AntiVirus/Filtering for Domino; Symantec AntiVirus/Filtering for MSExchange; Symantec AntiVirus Scan Engine; Symantec AntiVirus Command LineScanner; Symantec for Personal Electronic Devices; Symantec AntiVirus for SMTPGateway; Symantec Web Security; and support.Contractor: immixGroup (FA8771-05-0301)Ordering Expires: 12 Sep 10Web Link: http://var.immixgroup.com/contracts/overview.cfm or www.esi.milNotice to DoD customers regarding Symantec Antivirus Products: A fully fundedand centrally purchased DoD enterprise-wide antivirus and spyware s<strong>of</strong>twarelicense is available for download to all <strong>Department</strong> <strong>of</strong> Defense (DoD) users whohave a .mil Internet Protocol (IP) address.Contractor: TVAR Solutions, Inc.Antivirus Web Links: Antivirus s<strong>of</strong>tware can be downloaded at no cost bylinking to either <strong>of</strong> the following Web sites:NIPRNET site: https://www.jtfgno.mil/antivirus/antivirus_index.htmSIPRNET site: http://www.cert.smil.mil/antivirus/av_info.htmWebsense (WFT)Websense – Provides s<strong>of</strong>tware and maintenance for Web filtering products.Contractor: Patriot Technologies (W91QUZ-06-A-0005)Authorized Users: This BPA is open for ordering by all DoD components and authorized contractors.Ordering Expires: 31 Aug 11Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jspXactaXacta – Provides Web Certification and Accreditation (C&A) s<strong>of</strong>tware products,consulting support and enterprise messaging management solutions through itsAutomated Message Handling System (AMHS) product. The s<strong>of</strong>tware simplifiesC&A and reduces its costs by guiding users through a step-by-step process todetermine risk posture and assess system and network configuration compliancewith applicable regulations, standards and industry best practices, in accordancewith the DITSCAP, NIACAP, NIST or DCID processes. Xacta’s AMHS provides automated,Web-based distribution and management <strong>of</strong> messaging across yourenterprise.Contractor: Telos Corp. (FA8771-09-A-0301); (703) 724-4555Ordering Expires: 24 Sep 14Web Link: http://esi.telos.com/contract/overviewLean Six Sigma ToolsiGrafx Business Process Analysis Tools iGrafx – Provides s<strong>of</strong>tware licenses, maintenance and media for iGrafx Processfor Six Sigma 2007; iGrafx Flowcharter 2007; Enterprise Central; and EnterpriseModeler.Contractors:S<strong>of</strong>tchoice Corporation (N00104-09-A-ZF34); (416) 588-9002 ext. 2072S<strong>of</strong>tmart, Inc. (N00104-09-A-ZF33); (610) 518-4192SHI (N00104-09-A-ZF35); (732) 564-8333Authorized Users: These BPAs are co-branded ESI/GSA SmartBUY BPAsand are open for ordering by all <strong>Department</strong> <strong>of</strong> Defense (DoD) components, U.S.Coast Guard, NATO, Intelligence Community, authorized DoD contractors and allfederal agencies.Ordering Expires: 31 Jan 14Web Links:S<strong>of</strong>tchoicewww.it-umbrella.navy.mil/contract/enterprise/igrafx/s<strong>of</strong>tchoice/index.shtmlS<strong>of</strong>tmartwww.it-umbrella.navy.mil/contract/enterprise/igrafx/s<strong>of</strong>tmart/index.shtmlSHIwww.it-umbrella.navy.mil/contract/enterprise/igrafx/shi/index.shtmlMinitabMinitab – Provides s<strong>of</strong>tware licenses, media, training, technical services andmaintenance for products including Minitab Statistical S<strong>of</strong>tware, Quality Companionand Quality Trainer. It is the responsibility <strong>of</strong> the ordering <strong>of</strong>ficer to ensurecompliance with all fiscal laws prior to issuing an order under a BPA, and to ensurethat the vendor selected represents the best value for the requirement being ordered(see FAR 8.404).Contractor: Minitab, Inc. (N00104-08-A-ZF30); (800) 448-3555 ext. 311Authorized Users: This BPA is open for ordering by all <strong>Department</strong> <strong>of</strong> Defense(DoD) components, U.S. Coast Guard, NATO, Intelligence Community andauthorized DoD contractors.Ordering Expires: 07 May 13Web Link: http://www.it-umbrella.navy.mil/contract/minitab/minitab.shtmlPowerSteeringPowerSteering – Provides s<strong>of</strong>tware licenses (subscription and perpetual),media, training, technical services, maintenance, hosting and support for Power-Steering products: S<strong>of</strong>tware-as-a-Service solutions to apply the proven discipline<strong>of</strong> project and portfolio management in IT, Lean Six Sigma, Project ManagementOffice or any other project-intensive area and to improve strategy alignment, resourcemanagement, executive visibility and team productivity. It is the responsibility<strong>of</strong> the ordering <strong>of</strong>ficer to ensure compliance with all fiscal laws prior toissuing an order under a BPA, and to ensure that the vendor selected representsthe best value for the requirement being ordered (see FAR 8.404).Contractor: immixTechnology, Inc. (N00104-08-A-ZF31);Small Business; (703) 752-0661Authorized Users: All DoD components, U.S. Coast Guard, NATO, IntelligenceCommunity, and authorized DoD contractors.Ordering Expires: 14 Aug 1348 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


Web Link: http://www.it-umbrella.navy.mil/contract/powersteering/powersteering.shtmlOffice SystemsAdobe Desktop ProductsAdobe Desktop Products – Provides s<strong>of</strong>tware licenses (new and upgrade)and maintenance for numerous Adobe desktop products, including Acrobat(Standard and Pr<strong>of</strong>essional); Photoshop; InDesign; After Effects; Frame; CreativeSuites; Illustrator; Flash Pr<strong>of</strong>essional; Dreamweaver; ColdFusion and otherAdobe desktop products.Contractors:Dell Marketing L.P. (formerly ASAP) (N00104-08-A-ZF33);(800) 248-2727, ext. 5303CDW-G (N00104-08-A-ZF34); (703) 621-8211GovConnection, Inc. (N00104-08-A-ZF35); (301) 340-3861Insight Public Sector, Inc. (N00104-08-A-ZF36); (301) 261-6970Ordering Expires: 30 Jun 13Web Link: http://www.it-umbrella.navy.mil/contract/enterprise/adobe-esa/index.shtmlAdobe Server ProductsAdobe Server Products – Provides s<strong>of</strong>tware licenses (new and upgrade),maintenance, training and support for numerous Adobe server products includingLiveCycle Forms; LiveCycle Reader Extensions; Acrobat Connect; Flex; ColdFusionEnterprise; Flash Media Server and other Adobe server products.Contractor:Carahs<strong>of</strong>t Technology Corp. (N00104-09-A-ZF31);Small Business; (703) 871-8503Ordering Expires: 14 Jan 14Web Link: http://www.it-umbrella.navy.mil/contract/enterprise/adobe-srvr/carahs<strong>of</strong>t/carahs<strong>of</strong>t.shtmlMicros<strong>of</strong>t ProductsMicros<strong>of</strong>t Products – Provides licenses and s<strong>of</strong>tware assurance for desktopconfigurations, servers and other products. In addition, any Micros<strong>of</strong>t productavailable on the GSA schedule can be added to the BPA.Contractors:CDW-G (N00104-02-A-ZE85); (888) 826-2394Dell (N00104-02-A-ZE83); (800) 727-1100 ext. 7253702 or (512) 725-3702Dell Marketing L.P. (formerly ASAP) (N00104-02-A-ZE78);(800) 248-2727, ext. 5303GTSI (N00104-02-A-ZE79); (800) 999-GTSI ext. 2071Hewlett-Packard (N00104-02-A-ZE80); (978) 399-9818Insight Public Sector, Inc. (N00104-02-A-ZE82); (800) 862-8758SHI (N00104-02-A-ZE86); (732) 868-5926S<strong>of</strong>tchoice (N00104-02-A-ZE81); Large Business; (877) 333-7638S<strong>of</strong>tmart (N00104-02-A-ZE84); (800) 628-9091 ext. 6928Ordering Expires: 31 Mar 10Web Link: http://www.it-umbrella.navy.mil/contract/enterprise/micros<strong>of</strong>t/ms-ela.shtmlRed Hat/Netscape/FirefoxThrough negotiations with August Schell Enterprises, DISA has establisheda DoD-wide enterprise site license whereby DISA can provide ongoing supportand maintenance for the Red Hat Security Solution server products that are atthe core <strong>of</strong> the <strong>Department</strong> <strong>of</strong> Defense’s Public Key Infrastructure (PKI). The RedHat Security Solution includes the following products: Red Hat Certificate Systemand dependencies; Red Hat Directory Server; Enterprise Web Server (previouslyNetscape Enterprise Server); and Red Hat Fortitude Server (replacing EnterpriseServer). August Schell also provides a download site that, in addition to the RedHat products, also allows for downloading DISA-approved versions <strong>of</strong> the followingbrowser products: Firefox Browser; Netscape Browser; Netscape Communicator;and Personal Security Manager. The Red Hat products and services providedthrough the download site are for exclusive use in the following licensed community:(1) All components <strong>of</strong> the U.S. <strong>Department</strong> <strong>of</strong> Defense and supported organizationsthat utilize the Joint Worldwide Intelligence Communications System, and(2) All non-DoD employees (e.g., contractors, volunteers, allies) on-site at the U.S.<strong>Department</strong> <strong>of</strong> Defense and those not on-site but using equipment furnished bythe U.S. <strong>Department</strong> <strong>of</strong> Defense (GFE) in support <strong>of</strong> initiatives which are fundedby the U.S. <strong>Department</strong> <strong>of</strong> Defense.Licensed s<strong>of</strong>tware products available through the August Schell contract arefor the commercial versions <strong>of</strong> the Red Hat s<strong>of</strong>tware, not the segmented versions<strong>of</strong> the previous Netscape products that are compliant with Global <strong>Information</strong>Grid (GIG) standards. The segmented versions <strong>of</strong> the s<strong>of</strong>tware are required fordevelopment and operation <strong>of</strong> applications associated with the GIG, the GlobalCommand and Control System (GCCS) or the Global Combat Support System (GCSS).If your intent is to use a Red Hat product to support development or operation<strong>of</strong> an application associated with the GIG, GCCS or GCSS, you must contactone <strong>of</strong> the Web sites listed below to obtain the GIG segmented version <strong>of</strong> thes<strong>of</strong>tware. You may not use the commercial version available from the AugustSchell Red Hat download site.If you are not sure which version (commercial or segmented) to use, westrongly encourage you to refer to the Web sites listed below for additional informationto help you to make this determination before you obtain the s<strong>of</strong>twarefrom the August Schell Red Hat download site (or contact the project manager).GIG or GCCS users: Common Operating Environment Home Pagehttp://www.disa.mil/gccs-j/index.htmlGCSS users: Global Combat Support Systemhttp://www.disa.mil/gcssjContractor: August Schell Enterprises (www.augustschell.com)<strong>Download</strong> Site: http://redhat.augustschell.comOrdering Expires: 14 Mar 10 (Please call for extension information.) All downloads provided at no cost.Web Link: http://iase.disa.mil/netlic.html Red Hat LinuxRed Hat Linux – Provides operating system s<strong>of</strong>tware license subscriptionsand services to include installation and consulting support, client-directed engineeringand s<strong>of</strong>tware customization. Red Hat Enterprise Linux is the premieroperating system for open source computing. It is sold by annual subscription,runs on seven system architectures and is certified by top enterprise s<strong>of</strong>twareand hardware vendors.Contractors:Carahs<strong>of</strong>t Technology Corporation (HC1028-09-A-2004)DLT Solutions, Inc. (HC1028-09-A-2003)Ordering Expires:Carahs<strong>of</strong>t: 09 Feb 14DLT Solutions, Inc.: 17 Feb 14Web Link: http://www.esi.milWinZipWinZip – This is an IDIQ contract with Eyak Technology, LLC, an “8(a)” Small Disadvantaged Business (SDB)/Alaska Native Corp. for the purchase <strong>of</strong> WinZip Standard, a compression utility for Windows. Minimum quantity order via deliveryorder and via Government Purchase Card to Eyak Technology, LLC is 1,250 WinZip licenses.Contractor: Eyak Technology, LLC (W91QUZ-04-D-0010)Authorized Users: This has been designated as a DoD ESI and GSA Smart-BUY contract and is open for ordering by all U.S. federal agencies, DoD componentsand authorized contractors.Ordering Expires: 31 Jan 10 (Please call for new agreement information.)Web Link: https://chess.army.mil/ascp/commerce/contract/ContractsMatrixView.jspOperating SystemsAppleApple – Provides Apple Desktop and Server S<strong>of</strong>tware, maintenance, relatedservices and support as well as Apple Perpetual S<strong>of</strong>tware licenses.These licensesinclude Apple OS X Server v10.5; Xsan 2; Apple Remote Desktop 3.2; Aperture 2;Final Cut Express 4; Final Cut Studio 2; iLife ‘08; iWork ‘08; Logic Express 8; LogicCHIPS January - March 2010 49


Pro 7; Mac OS X v10.5 Leopard; QuickTime 7 Pro Mac; and Shake 4.1 Mac OS X.S<strong>of</strong>tware Maintenance, OS X Server Support, AppleCare Support and TechnicalService are also available.Contractor: Apple, Inc. (HC1047-08-A-1011)Ordering Expires: 10 Sep 11Web Link: http://www.esi.milSun (SSTEW)SUN Support – Sun Support Total Enterprise Warranty (SSTEW) <strong>of</strong>fers extendedwarranty, maintenance, education and pr<strong>of</strong>essional services for all SunMicrosystems products. The maintenance covered in this contract includes flexibleand comprehensive hardware and s<strong>of</strong>tware support ranging from basic tomission critical services. Maintenance covered includes Sun Spectrum Platinum,Gold, Silver, Bronze, hardware only and s<strong>of</strong>tware only support programs.Contractor: Dynamic Systems (DCA200-02-A-5011)Ordering Expires: Dependent on GSA schedule until 2011Web Link: http://www.disa.mil/contracts/guide/bpa/bpa_sun.htmlResearch and Advisory BPAResearch and Advisory Services BPAs provide unlimited access to telephone inquirysupport, access to research via Web sites and analyst support for the number<strong>of</strong> users registered. In addition, the services provide independent advice ontactical and strategic IT decisions. Advisory services provide expert advice on abroad range <strong>of</strong> technical topics and specifically focus on industry and market trends.BPA listed below.Gartner Group (N00104-07-A-ZF30); (703) 378-5697; Awarded 01 Dec 2006Ordering Expires: Effective for term <strong>of</strong> GSA contractAuthorized Users: All DoD components. For the purpose <strong>of</strong> this agreement,DoD components include: the Office <strong>of</strong> the Secretary <strong>of</strong> Defense; U.S. Military <strong>Department</strong>s;the Chairman <strong>of</strong> the Joint <strong>Chief</strong>s <strong>of</strong> Staff; Combatant Commands; the<strong>Department</strong> <strong>of</strong> Defense Office <strong>of</strong> Inspector General; Defense Agencies; DoD FieldActivities; the U.S. Coast Guard; NATO; the Intelligence Community and ForeignMilitary Sales with a letter <strong>of</strong> authorization.This BPA is also open to DoD contractorsauthorized in accordance with the FAR Part 51.Web Link: www.it-umbrella.navy.mil/contract/r&a/gartner/gartner.shtmlOn Oct. 1, 2004 and May 6, 2005, the <strong>Navy</strong> established the Oracle DatabaseEnterprise License, effective through Sept. 30, 2013. The enterprise licenseprovides <strong>Navy</strong> shore-based and afloat users, to include active duty, Reserve andcivilian billets, as well as contractors who access <strong>Navy</strong> systems, the right to useOracle databases for the purpose <strong>of</strong> supporting <strong>Navy</strong> internal operations. <strong>Navy</strong>users in joint commands or supporting joint functions should contact theNAVICP Mechanicsburg contracting <strong>of</strong>ficer, at (717) 605-5659 for further review<strong>of</strong> the requirements and coverage.This license is managed by the Space and Naval Warfare Systems Center(SPAWARSYSCEN) Pacific DON <strong>Information</strong> Technology (IT) Umbrella ProgramOffice. The <strong>Navy</strong> Oracle Database Enterprise License provides significant benefits,including substantial cost avoidance for the department. It facilitates thegoal <strong>of</strong> netcentric operations by allowing authorized users to access Oracle databasesfor <strong>Navy</strong> internal operations and permits sharing <strong>of</strong> authoritative dataacross the <strong>Navy</strong> enterprise.Programs and activities covered by this license agreement shall not enterinto separate Oracle database licenses outside this central agreement wheneverOracle is selected as the database. This prohibition includes s<strong>of</strong>tware ands<strong>of</strong>tware maintenance that is acquired:a. as part <strong>of</strong> a system or system upgrade, including Application Specific Full Use(ASFU) licenses;b. under a service contract;c. under a contract or agreement administered by another agency, such as aninteragency agreement;d. under a Federal Supply Service (FSS) Schedule contract or blanket purchaseagreement established in accordance with FAR 8.404(b)(4); ore. by a contractor that is authorized to order from a Government supply sourcepursuant to FAR 51.101.This policy has been coordinated with the Office <strong>of</strong> the Assistant Secretary <strong>of</strong>the <strong>Navy</strong> (Financial Management and Comptroller), Office <strong>of</strong> Budget.Web Link: http://www.it-umbrella.navy.mil/contract/enterprise/deal/oracle/oracle.shtmlData at Rest Solutions BPA - <strong>Navy</strong> Agreement onlyThe DON CIO has issued an enterprise solution for <strong>Navy</strong> users purchasingDAR s<strong>of</strong>tware. Visit the DON CIO Web site at www.doncio.navy.miland search for “Data at Rest” to read the new policy. The DON awardedMTM Technologies a BPA for purchase <strong>of</strong> the DON Mobile Armor s<strong>of</strong>twarebundle. For <strong>Navy</strong> users, all purchases <strong>of</strong> DON enterprise DAR solutionsmust be executed through the enterprise BPA, which can be foundon the DON IT Umbrella Program Web site at www.it-umbrella.navy.mil. Procurement <strong>of</strong> other DAR solutions for <strong>Navy</strong> users is prohibited.<strong>Navy</strong> Enterprise BPA for DAR Users:Mobile Armor – MTM Technologies, Inc. (N00104-09-A-ZF30)Web Link: http://www.it-umbrella.navy.mil/contract/mtm/mtm.shtmlVisit our Web sites:<strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> AgreementsOracle (DEAL-O) Database Enterprise License for the <strong>Navy</strong>www.it-umbrella.navy.milwww.itec-direct.navy.milwww.esi.milwww.chips.navy.mil50 CHIPS www.chips.navy.mil Dedicated to Sharing <strong>Information</strong> - Technology - Experience


Page intentionally left blankCHIPS January - March 2010 51


DON CIOMOBILEwww.doncio.navy.mil/mobile

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!