09.02.2013 Views

C4 Marine Brig. Gen. Kevin J. Nally - KMI Media Group

C4 Marine Brig. Gen. Kevin J. Nally - KMI Media Group

C4 Marine Brig. Gen. Kevin J. Nally - KMI Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Voice of Military Communications and Computing<br />

<strong>C4</strong> <strong>Marine</strong><br />

<strong>Brig</strong>. <strong>Gen</strong>.<br />

<strong>Kevin</strong> J. <strong>Nally</strong><br />

<strong>C4</strong> Director<br />

<strong>Marine</strong> Corps<br />

Deputy CIO, DoN<br />

www.MIT-kmi.com<br />

<strong>C4</strong><br />

February 2011<br />

Volume 15, Issue 1<br />

Virtualization O Rugged Computers O Tactical Information Assurance<br />

Joint Battle Command


Transmit secure, high-resolution<br />

video in seconds<br />

The Harris AN/PRC-117G:<br />

accelerating command decisions<br />

with real-time networking.<br />

Assess suspicious activity<br />

as it happens<br />

Enhance command<br />

decision making<br />

The action won’t pause while communications catch up.<br />

Today’s missions demand reliable access to secure voice, video, and data in real time.<br />

With the Falcon III ® AN/PRC-117G, Harris delivers on these needs today.<br />

Read more comments from the fi eld at www.harris117G.com<br />

Take action, quickly<br />

and confi dently


Military inforMation technology<br />

february 2011<br />

VoluMe 15 • issue 1<br />

features coVer / Q&a<br />

6<br />

11<br />

25<br />

31<br />

www.Mit-kMi.coM<br />

New Platform for Battle Command<br />

Force XXI Battle Command <strong>Brig</strong>ade and Below, a battle<br />

command system that has won widespread praise for its<br />

contributions to U.S. operations in Southwest Asia, is in the<br />

process on undergoing major system redesigns.<br />

By Peter Buxbaum<br />

Ruggedization Acceleration<br />

The military’s demand for mobile IT technology is spurring<br />

rapid development of ruggedized computing equipment<br />

capable of providing the most up-to-date capabilities while<br />

also withstanding harsh conditions.<br />

By Adam Baddeley<br />

Encryption at the Edge<br />

In response to the basic dilemma of tactical IA and<br />

encryption—speed and access versus increased exposure<br />

and risk—major military communications companies are<br />

developing a host of new products.<br />

By Adam Baddeley<br />

Virtualizing the Future<br />

Military Information Technology recently posed the following<br />

question to some of the leading companies in the field of<br />

network systems: What benefits and potential drawbacks do<br />

you see in the current military drive toward server, desktop<br />

and other forms of virtualization?<br />

21<br />

<strong>Brig</strong>adier <strong>Gen</strong>eral<br />

<strong>Kevin</strong> J. <strong>Nally</strong><br />

<strong>C4</strong> Director, <strong>Marine</strong> Corps<br />

Deputy CIO, Department of the Navy<br />

DepartMents<br />

2<br />

4<br />

17<br />

18<br />

35<br />

Editor’s Perspective<br />

People/Program Notes<br />

JTRS Update<br />

Data Bytes<br />

Calendar, Directory<br />

inDustry interView<br />

36<br />

James D. Brock<br />

Principal<br />

Deloitte Consulting LLP


Military inforMation<br />

technology<br />

VoluMe 15, issue 1 february 2011<br />

The Voice of Military Communications<br />

and Computing<br />

eDitorial<br />

Managing Editor<br />

Harrison Donnelly harrisond@kmimediagroup.com<br />

Senior Copy Editor<br />

Laura Davis laurad@kmimediagroup.com<br />

Correspondents<br />

Adam Baddeley • Peter Buxbaum • Cheryl Gerber<br />

Scott Gourley • Karen E. Thuermer<br />

art & Design<br />

Art Director<br />

Anna Druzcz anna@kmimediagroup.com<br />

Senior Graphic Designer<br />

Jittima Saiwongnuan jittimas@kmimediagroup.com<br />

Graphic Designers<br />

Scott Morris scottm@kmimediagroup.com<br />

Jennifer Owers jennifero@kmimediagroup.com<br />

Eden Papineau edenp@kmimediagroup.com<br />

Kailey Waring kaileyw@kmimediagroup.com<br />

aDVertising<br />

Account Executives<br />

Cheri Anderson cheria@kmimediagroup.com<br />

Hope Casselman hopec@kmimediagroup.com<br />

kMi MeDia group<br />

Publisher<br />

Kirk Brown kirkb@kmimediagroup.com<br />

Chief Executive Officer<br />

Jack Kerrigan jack@kmimediagroup.com<br />

Chief Financial Officer<br />

Constance Kerrigan connik@kmimediagroup.com<br />

Executive Vice President<br />

David Leaf davidl@kmimediagroup.com<br />

Editor-In-Chief<br />

Jeff McKaughan jeffm@kmimediagroup.com<br />

Controller<br />

Gigi Castro gcastro@kmimediagroup.com<br />

operations, circulation & proDuction<br />

Manager, Circulation and Operations<br />

Toye McLean toyem@kmimediagroup.com<br />

Distribution Coordinator<br />

Wayne Brooks wayneb@kmimediagroup.com<br />

Data Specialists<br />

Erin Johnson erinj@kmimediagroup.com<br />

Tuesday Johnson tuesdayj@kmimediagroup.com<br />

Diamond Mathews diamondm@kmimediagroup.com<br />

Sasha Scott sashas@kmimediagroup.com<br />

Marketing & online<br />

Marketing & Online Director<br />

Amy Stark astark@kmimediagroup.com<br />

Trade Show Coordinator<br />

Holly Foster hollyf@kmimediagroup.com<br />

a prouD MeMber of<br />

subscription inforMation<br />

Military Information Technology<br />

ISSN 1097-1041<br />

is published 11 times a year by <strong>KMI</strong> <strong>Media</strong> <strong>Group</strong>.<br />

All Rights Reserved. Reproduction without permission is<br />

strictly forbidden. © Copyright 2011.<br />

Military Information Technology is free to members of the<br />

U.S. military, employees of the U.S. government and<br />

non-U.S. foreign service based in the U.S.<br />

All others: $65 per year.<br />

Foreign: $149 per year.<br />

Corporate Offices<br />

<strong>KMI</strong> <strong>Media</strong> <strong>Group</strong><br />

15800 Crabbs Branch Way, Suite 300<br />

Rockville, MD 20855-2604 USA<br />

Telephone: (301) 670-5700<br />

Fax: (301) 670-5701<br />

Web: www.MIT-kmi.com<br />

Are you worthy of the network, and is the network worthy<br />

of you?<br />

While such fundamental questions may not be exactly what the<br />

military has in mind, it’s clear that the concept of “networthiness” is<br />

becoming a important one for Department of Defense IT.<br />

DoD officials have been working on standards to define and<br />

enforce networthiness, which according to one recent definition<br />

reflects “the operational assessment of systems, applications or<br />

devices to determine security, interoperability, supportability,<br />

sustainability, usability and compliance with federal, DoD and<br />

[combatant command, service and agency] regulations.”<br />

It’s an idea the Army has pursued for some time, with the Army Network Enterprise Technology<br />

Command issuing certificates of networthiness for specific products before they are allowed to be<br />

connected to Army networks. The program was developed in a proactive way “to preclude drive-by<br />

fieldings of systems, serve as a safety-net prior to anything connecting to the Army LandWarNet,<br />

prevent products from causing damage or interoperability issues, and mitigate the risks posed<br />

to the Army LandWarNet due to supply chain risk management issues,” according to a NETCOM<br />

description.<br />

Although the above definitions identify a number of different aspects to networthiness, many<br />

people have tended to focus just on the security aspects of the concept. That’s why organizations<br />

such as the Air Force Network Integration Center (AFNIC), which is leading that service’s efforts<br />

in this area, are emphasizing the holistic character of networthiness.<br />

“We frequently see systems ready for fielding that may pass the security piece, but then they get<br />

connected and aren’t interoperable with other systems, or they’re a bandwidth hog and multiple<br />

sites experience degraded performance,” Nancy Klein, AFNIC’s networthiness lead, has said.<br />

Klein led the Joint Networthiness High Performance Team, comprising representatives from<br />

the Defense Information Systems Agency and the services, which developed the assessment<br />

criteria.<br />

Geospatial<br />

Intelligence<br />

Forum<br />

www.GIF-kmi.com<br />

Ground<br />

Combat<br />

Technology<br />

www.GCT-kmi.com<br />

kMi MeDia group Magazines anD websites<br />

Military<br />

Advanced<br />

Education<br />

www.MAE-kmi.com<br />

Military<br />

Training<br />

Technology<br />

www.MT2-kmi.com<br />

Military<br />

Information<br />

Technology<br />

www.MIT-kmi.com<br />

Special<br />

Operations<br />

Technology<br />

www.SOTECH-kmi.com<br />

Military<br />

Logistics<br />

Forum<br />

www.MLF-kmi.com<br />

Tactical ISR<br />

Technology<br />

www.TISR-kmi.com<br />

Harrison Donnelly<br />

Editor<br />

Military<br />

Medical/CBRN<br />

Technology<br />

www.MMT-kmi.com<br />

U.S. Coast<br />

Guard Forum<br />

www.USCGF-kmi.com


Compiled by <strong>KMI</strong> <strong>Media</strong> <strong>Group</strong> staff<br />

Having met key cost, schedule and performance entry criteria, the<br />

Navy’s Consolidated Afloat Networks and Enterprise Services (CANES)<br />

program has received milestone B approval.<br />

Navy officials described CANES as being at the forefront of<br />

recent acquisition reform changes directed by the under secretary of<br />

defense for acquisition, technology and logistics (USD AT&L). A recent<br />

series of “better buying power” memorandums directed acquisition<br />

organizations to pursue initiatives in the areas of target affordability<br />

and control cost growth; creating incentives for productivity and<br />

innovation in industry; promoting real competition; improving<br />

tradecraft in services acquisition; and reducing non-productive<br />

processes and bureaucracy.<br />

“CANES meets the spirit and intent of what the Department of<br />

Defense wants acquisition programs to be doing to obtain greater efficiency<br />

and productivity in defense spending,” explained Navy Captain<br />

D.J. LeGoff, program manager for the Tactical Networks Program Office.<br />

“In alignment with USD AT&L’s acquisition roadmap, the program<br />

foundation is built upon cost containment, open architecture and<br />

competition throughout the program’s life cycle.”<br />

The approval was based on the program’s ability to meet key<br />

defense acquisition efficiency criteria such as maximizing competition,<br />

streamlining the acquisition process, targeting affordability and<br />

controlling cost growth.<br />

CANES represents the consolidation and enhancement of five shipboard<br />

legacy network programs. It will provide the common computing<br />

environment infrastructure for <strong>C4</strong>I applications that currently require<br />

system specific infrastructure to operate legacy systems.<br />

people<br />

Major <strong>Gen</strong>eral Susan S.<br />

Lawrence has been nominated<br />

for appointment to the<br />

grade of lieutenant general<br />

and assignment as chief information<br />

officer/G-6, Office of<br />

the Secretary of the Army.<br />

Lawrence most recently served as<br />

4 | MIT 15.1<br />

Navy’s CANES Seeks Better Buying Power<br />

commanding general, U.S.<br />

Army Network Enterprise<br />

Technology Command, Fort<br />

Huachuca, Ariz.<br />

Air Force Colonel Linda R.<br />

Medler, deputy chief information<br />

officer of the Joint Staff, has<br />

been nominated to the grade of<br />

brigadier general.<br />

Air Force <strong>Brig</strong>adier <strong>Gen</strong>eral<br />

John R. Ranck Jr., who has<br />

been serving as deputy director,<br />

strategic effects, U.S. Air Forces-<br />

Iraq, has been appointed<br />

director, warfighter systems inte-<br />

Milestone B is the initiation point for acquisition programs and<br />

official entry into the engineering and manufacturing development<br />

phase of a program’s life cycle. The purpose of this phase is to develop<br />

a system, complete full system integration, develop an affordable and<br />

executable manufacturing process, and demonstrate system integration,<br />

interoperability, safety and utility.<br />

The milestone B decision, which also included milestone C entrance<br />

criteria, allows for the production of four limited fielding units.<br />

These units are intended for operational and training use, and will<br />

not be installed until completion of an operational assessment and a<br />

successful milestone C decision. At this point the program will enter the<br />

production and deployment phase.<br />

The Navy’s Program Executive Office for Command, Control,<br />

Communications, Computers and Intelligence oversees the CANES<br />

program and is managing competitive system development contracts<br />

with Lockheed Martin and Northrop Grumman.<br />

Consolidation through CANES will eliminate many legacy, standalone<br />

networks while providing an adaptable and responsive information<br />

technology platform to rapidly meet changing warfighter<br />

needs. This strategy strengthens the network’s infrastructure, improves<br />

security, reduces the existing hardware footprint and decreases total<br />

ownership costs. In addition to providing greater capability, CANES<br />

will allow fleet end-users to benefit from reduced operations and<br />

sustainment workloads as a result of common equipment, training<br />

and logistics.<br />

CANES will be deployed to more than 190 ships, submarines and<br />

maritime operations centers by 2021.<br />

gration, Office of Information<br />

Dominance and chief information<br />

officer, Office of the<br />

Secretary of the Air Force.<br />

<strong>Gen</strong>eral Dynamics Advanced<br />

Information Systems named<br />

John Jolly, a 25-year veteran of<br />

the Department of Defense and<br />

the defense industry, as the vice<br />

president and general manager<br />

of its Cyber Division.<br />

Global Crossing has appointed<br />

Bill O’Neill to the position of<br />

vice president, federal sales, in<br />

the company’s federal sector<br />

business unit. O’Neill is a<br />

former vice president of Qwest<br />

Government Services.<br />

Alex Heidt<br />

Harris has named Alex Heidt<br />

vice president of Air Force<br />

programs for its IT services<br />

business.<br />

www.MIT-kmi.com


REDCOM IS INTEROPERABLE<br />

COMMUNICATIONS<br />

VIRTUALLY EVERYTHING OVER ANYTHING EVERYWHERE<br />

Deployable, reliable, adaptable & secure<br />

V.150.1 MLPP AS-SIP JITC APL CERTIFIED<br />

+1.585.924.6500 sales@redcom.com www.redcom.com<br />

PROUDLY DESIGNED<br />

& MADE IN THE USA<br />

© 2011 REDCOM Laboratories, Inc. REDCOM and the REDCOM logo are registered trademarks of REDCOM Laboratories, Inc. Subject to change without notice or obligation.


6 | MIT 15.1<br />

army, marInes joIntly develoP uPgraded system for<br />

Command and Control and sItuatIonal awareness.<br />

By Peter BuxBaum<br />

mIt CorresPondent<br />

BuxBaumP@kmImedIagrouP.Com<br />

www.MIT-kmi.com


A battle command system that has<br />

won widespread praise for its contributions<br />

to U.S. operations in Southwest<br />

Asia is in the process on undergoing<br />

major system redesigns. Known as Force<br />

XXI Battle Command <strong>Brig</strong>ade and Below<br />

(FBCB2), the system has helped minimize<br />

battlefield confusion and fratricide<br />

by providing tactical units with blue force<br />

tracking.<br />

FBCB2 identifies friendly forces via<br />

satellite communications, without the<br />

necessity of line-of-sight contact, in<br />

Afghanistan’s mountainous terrain. It<br />

also provides short-text messaging and<br />

replaces radio-based systems that have<br />

curtailed ranges in mountainous or other<br />

rough terrain.<br />

Warfighters say that FBCB2 has dramatically<br />

improved situational awareness.<br />

Commanders have more efficient<br />

and effective command and control of<br />

their units, and they are able to adapt<br />

more quickly than the enemy. FBCB2<br />

also informs “engage/don’t engage”<br />

decisions.<br />

The redesigns FBCB2 is undergoing<br />

are taking place in two stages with<br />

two major purposes. An FBCB2 Joint<br />

Capabilities Release (JCR), which rewrites FBCB2 software and<br />

adds new capabilities, will be deployed this year, and will eventually<br />

evolve into the Joint Battle<br />

Command-Platform (JBC-P). The<br />

word “joint” in both these titles<br />

is key, as the emerging system<br />

will allow the Army and <strong>Marine</strong><br />

Corps to converge on the same<br />

battle command platform. JBC-P<br />

will also include hardware replacements<br />

and refreshes.<br />

Besides accomplishing the<br />

important goal of Army-<strong>Marine</strong><br />

Corps interoperability in the command<br />

and control and situational<br />

awareness realms, JBC-P will also<br />

improve on the current system<br />

by capitalizing on new technologies.<br />

JBC-P will meet joint command<br />

and control and situational<br />

awareness requirements and will<br />

include new dismounted and dismountable<br />

hardware solutions.<br />

Both JCR and JBC-P support an<br />

<strong>Kevin</strong> Anastas<br />

open development architecture<br />

that enables new applications to be<br />

added quickly and easily.<br />

“The purpose of FBCB2 is to<br />

Alan Stocks<br />

know where I am and where my buddies are on the battlefield,”<br />

said Lieutenant Colonel Mark Daniels, program manager for<br />

A U.S. soldier assigned to 3rd Squadron, 7th Cavalry Regiment, 2nd Heavy <strong>Brig</strong>ade Combat Team, 3rd Infantry Division finds his location<br />

on a Force XXI Battle Command <strong>Brig</strong>ade and Below communication system in Mosul, Iraq, Aug. 15, 2010. [Photo courtesy of U.S. Army<br />

by Staff Sgt. Edward Reagan]<br />

battle command at the Army Program Executive Office Command<br />

Control Communications Tactical. “What we are doing<br />

with JCR is to do it better by adding some additional functionality<br />

to the current product.”<br />

“The original FBCB2 software code has been rewritten into<br />

JCR,” said <strong>Kevin</strong> Anastas, manager of business development at<br />

the Defense Systems Division of Northrop Grumman Information<br />

Systems, the FBCB2 prime contractor. “The joint issue is<br />

key, as it will bring the Army and the <strong>Marine</strong> Corps on the same<br />

platform. Testing on the software was recently completed, and it<br />

is being readied for fielding.”<br />

The <strong>Marine</strong> Corps views JCR as an interim solution until<br />

JBC-P is ready to be deployed, according to Alan Stocks, product<br />

manager for situational awareness at <strong>Marine</strong> Corps Systems<br />

Command. “We are looking at JBC-P as our dismounted command<br />

and control and situational awareness solution for the<br />

quick mobile <strong>Marine</strong>.”<br />

equal Partners<br />

JRC and FBCB2 are both Army-led programs in which the<br />

<strong>Marine</strong> Corps participates as an equal partner. The two services<br />

work together on integrated product teams and negotiate<br />

requirements for the programs that suit both of them.<br />

“The Army and the <strong>Marine</strong> Corps require essentially the same<br />

functionality,” said Daniels, “and that functionality will appear in<br />

a single software package in JCR and JCB-P. The <strong>Marine</strong> Corps<br />

architecture is somewhat different so we need to interface with<br />

that as well as with Army systems.”<br />

The interface and interoperability between the two systems<br />

was accomplished with the development of a software tool kit by<br />

www.MIT-kmi.com MIT 15.1 | 7


A key part of the JBC-P will be a new user interface designed to enhance communications<br />

efficiency.<br />

Northrop Grumman Information Systems. “The tool kit enables<br />

the addition of applications to JCR and connects to a core infrastructure<br />

that allows the exchange of situational awareness and<br />

command and control messages,” said Jeannie Hilger, the company’s<br />

director of battle command systems.<br />

JCR will enhance FBCB2 capabilities with the availability of<br />

Type One secret encryption, initial command and control and<br />

8 | MIT 15.1<br />

situational awareness interoperability between the Army and<br />

<strong>Marine</strong>s, and the incorporation of initial capabilities of a geospatial<br />

intelligence tool set called the Commercial Joint Mapping<br />

Tool Kit (CJMTK). JCR will also support the display of imagery<br />

formats that were not supported in FBCB2, as well as terrain and<br />

topology images derived from light detection and ranging and<br />

digital color camera data provided by the Buckeye program.<br />

Type One secret encryption will be accomplished with the<br />

deployment of the KGV-72 programmable encryption device<br />

from Harris Corp., noted Anastas. “Another big JCR event coming<br />

up will be the fielding of the new high-capacity blue force<br />

tracking transceiver. This will provide a dramatic improvement<br />

to improve refresh rates on location position information.”<br />

JBC-P will provide a number of capabilities over and above<br />

JCR. “A terrestrial and medium bandwidth satellite communications<br />

hybrid solution should provide essential command<br />

and control and full situational awareness convergence of the<br />

Army and <strong>Marine</strong> Corps systems,” said Stocks. “It will also provide<br />

collaboration functions in the form of chat and the ability<br />

to share imagery.”<br />

Another new function expected for JBC-P will be a route planning<br />

capability, according to Daniels.<br />

Also enhancing communications efficiency will be a new<br />

user interface that will be part of JBC-P. “Users will be able to<br />

easily choose functions on a touch screen,” said Daniels. “It will<br />

take one thumb movement and two clicks to send a spot report,<br />

instead of the six of seven steps it takes now.”<br />

The user interface has been tested quarterly by user juries,<br />

according to Daniels. “We sit groups of users in front of computers<br />

and get their feedback through detailed questionnaires,”<br />

he said. “The user interface is being developed as government<br />

off-the-shelf software through the Army’s Software Engineering<br />

Directorate. We are able to take user feedback and turn the product<br />

around more quickly because we have a shorter feedback loop<br />

than if we were contracting with an industry partner.”<br />

JBC-P handheld devices will be capable of running the Tactical<br />

Ground Reporting (TIGR) system, which will benefit commanders<br />

and planners. “Users will be able to provide detailed<br />

information on terrains and geographies,” explained Daniels,<br />

“and commanders will be able to access that information with a<br />

click on a point on a map. Users will be able to process information<br />

in a much more efficient manner and the decision-making<br />

process will also be made easier.”<br />

Handheld devices contemplated to be fielded with JBC-P<br />

will provide smart phone-like capabilities to warfighters, noted<br />

Daniels. These devices are expected to be deployed in the 2013 to<br />

2014 timeframe.<br />

advanCe develoPments<br />

Some companies are already developing JBC-P compliant<br />

devices even in advance of any formal contracting activity in<br />

this area.<br />

Lockheed Martin has developed the Tactical Digital Assistant<br />

(TDA) and the TacFleet 8. “The TDA is a tactical handheld device<br />

for dismounted soldiers,” explained Rita Flaherty, a business<br />

development manager at Lockheed Martin Missiles and Fire Control.<br />

“It combines the best features of personal digital assistants<br />

with smart phone technologies in a compact, ruggedized design<br />

www.MIT-kmi.com


that can withstand harsh operational environments. The intuitive<br />

user interface supports shares full motion video and sensor<br />

imagery for more than 24 hours on a single battery charge.”<br />

The TacFleet 8 is a ruggedized tablet computer for use<br />

in tactical vehicles that allows tactical situational awareness<br />

exchanges for brigade and below forces on the move. “Currently,<br />

sensors use joystick-like controllers mounted inside vehicles,”<br />

said Flaherty. “The TacFleet 8 demonstrates remote operation<br />

with a multi-function display, combining several devices<br />

into one. The tablet can be used when docked in the vehicle or<br />

dismounted.”<br />

The TDA and TacFleet 8 meet JBC-P and FBCB2 requirements,<br />

according to Flaherty. “Both devices use an open system<br />

software architecture that is fully compatible with current<br />

FBCB2 software,” she said. “They support secure, on-the-move<br />

communication and information sharing with vehicles and<br />

other platforms.”<br />

Beyond the development of devices, Lockheed Martin has<br />

anticipated a future role in JBC-P through the inauguration of<br />

its Joint Battle Command-Platform Demonstration Center in<br />

Orlando, Fla.<br />

“Lockheed Martin funded the design and construction of the<br />

demonstration center to showcase our vision and capability to<br />

distribute advanced situational awareness across multiple battlefield<br />

applications,” said Flaherty. The center “immerses visitors<br />

in an audiovisual battlefield simulation, showcasing a command<br />

Patent Pending<br />

and control vision for the challenges of asymmetric warfare.<br />

Utilizing an open architecture hardware approach, the center<br />

showcases seamless distribution of situational awareness and<br />

command and control data to a variety of joint users.”<br />

In addition to hosting demonstrations for government<br />

agencies, the facility serves as an integration center. “It allows<br />

government and industry to refine innovative design approaches<br />

for the Lockheed Martin tactical situational awareness solution<br />

to meet the needs of an expanding concept of operations,” said<br />

Flaherty.<br />

<strong>Gen</strong>eral Dynamics has introduced two devices, both developed<br />

as internal research and development products, that are<br />

compatible with FBCB2 and JBC-P. “The MDA Atlas is a hardware<br />

solution that runs the FBCB2 software and is the equivalent of<br />

the current FBCB2 JB5 radio,” said Scotty Miller, vice president<br />

for strategic planning and business development at <strong>Gen</strong>eral<br />

Dynamics <strong>C4</strong> Systems. “We also recently launched the GD300<br />

handheld mobile device that runs on the Android platform. It is<br />

a handheld form factor similar to a rugged tactical cell phone<br />

and supports running tactical maps and geopositioning. It also<br />

has a connection port that allows it to interface to any radio the<br />

military fields today.”<br />

The handheld GD300 is also capable of running TIGR, which<br />

was developed by the Defense Advanced Research Projects<br />

Agency in 2006 and first fielded to the Army in 2007. Both<br />

devices are compatible with the software architecture for FBCB2<br />

EXTREME RUGGED<br />

ENVIRONMENT<br />

MEETS<br />

EXTREME RUGGED<br />

MOBILITY<br />

Gamber-Johnson introduces a new type of computer docking station for tactical applications.<br />

The RECON dock is designed to work with the Panasonic Toughbook 19 computer.<br />

• SPACE, WEIGHT AND POWER –(SWAP): Low Profile/Small Footprint design, constructed using light-weight<br />

stainless steel and aluminum materials. Includes an 18V-32V ruggedized power supply.<br />

• CORROSION RESISTANCE: Stainless steel and conversion coated aluminum chassis components with stainless<br />

steel hardware.<br />

• VIBRATION/SHOCK ISOLATION: Stainless steel stranded wire cables with secondary rubber chassis isolators.<br />

Removable isolation system for easy installation.<br />

• TESTING/CERTIFICATIONS: MIL-STD 810G Environmental including<br />

Thermal Shock, IP65 dust/water Ingress, MIL-STD 810G Shock/Vibration,<br />

75 G Crash Hazard Shock, MIL-STD 461F EMI.<br />

For more information call 877-412-6579 >>> www.gamberjohnson.com/Federal_Military<br />

GamberJohnson_MIT_Feb.indd 1 1/14/11 4:56 PM<br />

www.MIT-kmi.com MIT 15.1 | 9


and JBC-P, Miller said. They are open, scalable and non-proprietary,<br />

and interface to an array of existing or future tactical radios,<br />

such as the Joint Tactical Radio System small form factor radio.<br />

<strong>Gen</strong>eral Dynamics responded to a 2010 broad agency<br />

announcement from the Army’s Communications-Electronics<br />

Research, Development, and Engineering Center (CRDEC) for<br />

an advanced handheld JCB-P device. “We are still awaiting the<br />

results of that competition,” said Miller.<br />

Miller envisions a future role for <strong>Gen</strong>eral Dynamics on JBC-P.<br />

“We are currently working with the Army’s Software Development<br />

Center on software development work for JBC-P and on<br />

transitioning TIGR to that program,” he said.<br />

The big hardware innovation that will come with JBC-P,<br />

from Stocks’ perspective, will be the availability of a dismounted<br />

solution. “Currently FBCB2 has mounted and dismountable<br />

terminals,” meaning that they are capable of being removed<br />

from the platform, he explained. “The dismounted solution is<br />

basically a handheld device. This will provide capabilities to<br />

<strong>Marine</strong>s and potentially special operations<br />

forces who are not tied to<br />

a mobile platform like a Humvee,<br />

JLTV, helicopter or jet.”<br />

The Army’s hardware refresh,<br />

which will come as part of JBC-P<br />

beginning in 2013 and 2014, will<br />

also include advanced computers<br />

with more processing power, memory<br />

and storage, noted Daniels. “We<br />

are also looking at a tablet form factor<br />

that will be able to be removed<br />

from one vehicle and placed in<br />

another,” he added.<br />

An upcoming requirements<br />

document will define JBC-P hardware<br />

developments for 2015 and<br />

thereafter.<br />

The advanced JBC-P devices will<br />

add a myriad of capabilities to the warfighter, according to Hilger.<br />

“Additional bandwidth will allow more streaming of video,”<br />

she said. “Position refresh rates will be almost real time. It will<br />

enable FBCB2 to evolve into a complete battle command system<br />

with status reporting, planning and logistics all included.”<br />

oPen arChIteCture<br />

At the system level, JCR has re-architected FBCB2 into a<br />

“battle command product line,” according to Hilger. “The architecture<br />

we developed includes a software development tool kit,<br />

which allows for the easy addition of new applications, including<br />

third-party applications.”<br />

<strong>Gen</strong>eral Dynamics is working on a number of applications<br />

that could be incorporated into JCR and/or JBC-P. Thanks to<br />

the new open architecture, Anastas said, it is possible that capabilities<br />

originally contemplated for JBC-P could be accelerated<br />

and incorporated into JCR. These include chat and whiteboard<br />

functionalities, as well as a sensor portal that would collect and<br />

display data from a variety of different sensors on a single laptop<br />

or tablet, thus eliminating the multiplicity of devices that<br />

prevail today.<br />

10 | MIT 15.1<br />

<strong>Gen</strong>eral Dynamics has introduced two devices that are compatible with FBCB2<br />

and JBC-P, including the GD300 handheld mobile unit. [Photo courtesy of <strong>Gen</strong>eral<br />

Dynamics]<br />

“What the Army wants,” said Anastas, “is the quick and<br />

inexpensive deployment of tactical applications in response to<br />

developments in the field. The new JCR architecture supports<br />

that goal.”<br />

The re-architecting of FBCB2 is also in keeping with the<br />

Army’s new push toward a common operating environment<br />

(COE), according to both Anastas and Hilger.<br />

The COE “is an approved set of computing technologies and<br />

standards that enable secure and interoperable applications to<br />

be developed and deployed rapidly across computing environments,”<br />

according to a November 2010 Army CIO document.<br />

“Each computing environment has a minimum standard configuration<br />

that also supports the Army’s ability to produce and<br />

deploy high-quality applications quickly while reducing the<br />

complexities of configuration, support and training associated<br />

with the computing environment.”<br />

The COE standardizes end-user environments and software<br />

development tool kits and establishes a streamlined end-to-end<br />

enterprise software process.<br />

“We believe that is a good way<br />

to evolve,” said Hilger. “The Army<br />

can take applications beneficial to<br />

tactical fighting and add them to<br />

the architecture. The common operating<br />

environment also facilitates<br />

the sharing of applications across<br />

different platforms.”<br />

FBCB2 version 6.5, which is currently<br />

in the field, will receive the<br />

software enhancements of JCR this<br />

year. Fiscal years 2013 and 2014<br />

will see the beginning of the JBC-P<br />

rollout. That process should be<br />

completed for the <strong>Marine</strong>s in 2016,<br />

according to Stocks.<br />

“There are a lot training implications<br />

to the transition,” said Stocks.<br />

“We also have to deal with legacy hardware. We need to plan<br />

for the replacement of the mounted and dismountable terminals<br />

as the current hardware life cycle expires. The handheld<br />

dismounted device also needs to be rolled out in phases. You<br />

can’t just buy 200,000 handhelds on Friday and deliver them<br />

on Monday.”<br />

The convergence of the Army and the <strong>Marine</strong> Corps on a<br />

joint command and control/situational awareness platform is<br />

also seen as continuing to help cut the chances of fratricide. “We<br />

expect this development to provide more timely and accurate<br />

situational awareness,” said Stocks. “This is also part of bringing<br />

the digital <strong>Marine</strong> Air-Ground Task Force down to the level of the<br />

<strong>Marine</strong> Corps rifle squad.”<br />

Daniels emphasized the new capabilities JBC-P will bring.<br />

“The increased capabilities will provide a gigantic leap forward”<br />

for warfighters, he said. O<br />

Contact Editor Harrison Donnelly at harrisond@kmimediagroup.com.<br />

For more information related to this subject, search our archives at<br />

www.MIT-kmi.com.<br />

www.MIT-kmi.com


Ruggedization<br />

the PaCe of develoPment of hardened<br />

It equIPment Is surgIng In terms of<br />

Both added CaPaCIty and enhanCed<br />

duraBIlIty.<br />

By adam Baddeley, mIt CorresPondent<br />

Baddeleya@kmImedIagrouP.Com<br />

Acceleration<br />

From the tactical edge in Southwest Asia to a CONUS storage facil-<br />

ity, the military’s demand for mobile IT technology continues to grow<br />

even as many major platform programs are being reconsidered or scaled<br />

back. That need is spurring rapid development of ruggedized computing<br />

equipment capable of providing the most up-to-date capabilities while also<br />

withstanding harsh conditions, constant movement and electromagnetic<br />

interference.<br />

www.MIT-kmi.com MIT 15.1 | 11


Users in the field need high levels of ruggedization to protect<br />

the devices they rely on from everyday wear and tear, to allow it<br />

to continue to operate in dense electronic environments without<br />

either affecting or being affected by nearby systems, and to do so<br />

in such a way that the device remains lightweight and with low<br />

demands for power and batteries.<br />

The challenge is a tough one, but one that industry is meeting.<br />

A recent review of several manufacturers of ruggedized equipment,<br />

many of whom were exhibiting at the giant AUSA exhibition in<br />

Washington, D.C., last October, showed that the pace of development<br />

is surging in terms of both added capacity and enhanced<br />

durability.<br />

general dynamICs <strong>C4</strong>s<br />

One key program in rugged computing is the Army-led Common<br />

Hardware Systems (CHS) program, which is designed to provide<br />

and qualify the hardware and software sourced from multiple<br />

providers that the Department of Defense needs for its computing<br />

requirements across the full gamut of battlefield computing, buttressed<br />

by a responsive worldwide repair, maintenance and logistics<br />

support.<br />

The current iteration of the program, known as CHS-3, is led by<br />

<strong>Gen</strong>eral Dynamics <strong>C4</strong> Systems. Reflecting the urgent demand for<br />

rugged computing, the company recently received a cap extension<br />

of $187 million, designed to bridge the gap between this contract<br />

and CHS-4, the competitive contract for which is due to be awarded<br />

in the next few months.<br />

Providing as it does a significant portion of DoD computing<br />

requirements, CHS provides a weathervane for trends in <strong>C4</strong>I. A<br />

major thrust of the program at the moment is to provide the rugged<br />

computing necessary to keep pace with headquarters as they<br />

rapidly migrate from deployable static facilities to embrace battle<br />

command on the move (BCOTM). This has tasked the CHS program<br />

with providing new solutions that can operate not from desks<br />

but from combat vehicles. A key requirement for that is the need to<br />

switch to induction cooled devices rather than the air cooled solutions<br />

used in traditional tactical operations centers.<br />

One new product on CHS, brought in via a recent engineering<br />

change proposal and delivered this quarter, is the Multi-domain<br />

ATLAS. This device, which allows users to run multiple security<br />

domains on the same device, is baseline on the Warfighter Information<br />

Network-Tactical (WIN-T) Increment 2 program.<br />

“It allows us to use <strong>Gen</strong>eral Dynamics <strong>C4</strong> Systems’ Trusted<br />

Virtual Environment so that we can have SIPRNet and NIPRNet or<br />

even colorless [unclassified] data running on the same machine,<br />

switching back and forth and transferring data that is vetted by inbuilt<br />

software guard policies. We are bringing in a systems approach<br />

at a box level, using the <strong>Gen</strong>eral Dynamics <strong>C4</strong> Systems Information<br />

Assurance division’s software,” said Scott Butler, who heads tactical<br />

computing solutions for <strong>Gen</strong>eral Dynamics <strong>C4</strong> Systems.<br />

The Multi-domain ATLAS is in essence two computers—an<br />

Atom-based solution and a second located on the device’s docking<br />

station, which houses a Core 2 Duo processor. This allows<br />

one application to run on the tablet with a second running on the<br />

docking computer.<br />

Butler cited two further new products designed to meet similar<br />

BCOTM requirements. The first is a conduction cooled Cisco 5940<br />

embedded router, designated V2 5940 under CHS. It is also a WIN-T<br />

12 | MIT 15.1<br />

baseline product and can be bolted anywhere in a vehicle, even<br />

under seats. The second is the Distributed Computing Element,<br />

which essentially comprises a high-end Core 2 Duo, 8Gb of RAM,<br />

four Ethernet ports and solid state drive (SSD) in a small “brick”<br />

that is conduction cooled and installed by bolting it onto available<br />

space.<br />

CHS originally had strict delineations in terms of ruggedization.<br />

Butler explained that due to customer requirements, these<br />

have lost their rigidity as users demanded custom ruggedization,<br />

tailored to their requirements.<br />

Looking to the future, Butler concluded, “What we are doing<br />

is keeping up with COTS to reduce size, weight, power and cost,<br />

with cost being key. We are continually driving costs down as DoD<br />

budgets are shrinking.”<br />

In addition to its prime contractor role on CHS, <strong>Gen</strong>eral<br />

Dynamics remains a key developer of rugged computing equipment.<br />

The GD300 represents <strong>Gen</strong>eral Dynamics Itronix’s next generation<br />

rugged wearable computer, designed to take commercial<br />

device technology further onto the battlefield.<br />

The GD300 takes key advantages of cell phone technology, such<br />

as low power consumption and versatile “apps,” while overcoming<br />

their inherent fragility by integrating them in a rugged enclosure,<br />

noted Jason Jacob, product manager for the device at <strong>Gen</strong>eral<br />

Dynamics Itronix. “There is nothing else to date that is fully rugged<br />

and weighs half a pound and designed from the ground up for each<br />

ground soldier.<br />

“There is a big initiative within the Army to leverage the latest<br />

commercial technologies on the battlefield,” Jacob said, adding<br />

that the 75th Ranger Regiment is in the process of acquiring<br />

the device.<br />

The GD300 has no radiating RF, but is simply a rugged GPS<br />

computer, hardened to the same MIL-STD-810G environmental<br />

standards as other devices and compliant with MIL-STD-461F. It<br />

has the capabilities of a cell phone without being a phone, and can<br />

run the Android operating system. “We did that because we wanted<br />

to leverage the application development that happens in the consumer<br />

world,” he said.<br />

“The GD300 was built from the ground up, not just to be a<br />

ground platform but also to be modular. This is the computing<br />

platform only. A separate radio interface kit acts as a docking station<br />

that you connect to a tactical radio, and is rugged from point to<br />

point. You can have over 50 pins in the connector and create almost<br />

any solution that docks to this unit and is rugged,” he explained.<br />

“The value to the military is that networks can change frequently,<br />

but all you do with the GD300 is unplug it and change as<br />

radios change,” Jacob continued. “If for a particular mission they<br />

are using JTRS radios but for another they want to use a different<br />

radio, all you have to do is modify the radio interface kit.”<br />

Developing a new, separable radio interface kit for the GD300<br />

takes roughly two to six months depending on complexity of the<br />

requirement, rather than the 12 months needed to adapt a conventionally<br />

configured computing device, he added.<br />

drs teChnologIes<br />

To date, DRS Technologies has delivered more than 90,000 JV-5<br />

computers under its current contract to provide computing and<br />

display systems to support Force XXI Battle Command <strong>Brig</strong>ade and<br />

Below (FBCB2) and Blue Force Tracking (BFT) program require-<br />

www.MIT-kmi.com


ments. If earlier DRS computing solutions for FBCB2 are included,<br />

the total rises to over 150,000 rugged computers. The current JV-5<br />

contract is in year four with options to continue to 2012.<br />

“It is still the JV-5 same computer<br />

we started delivering in year one of<br />

our current contract—a 1.66Ghz<br />

Core 2 Duo processor and a 160Gb<br />

rotating hard drive or 128Gb solid<br />

state drive,” said Bill Guyan, vice<br />

president, programs and strategy<br />

at DRS. “There is also space inside<br />

the processor unit for expansion to<br />

include, for example, a SAASM GPS,<br />

something that has already been<br />

qualified. This integration of the<br />

Bill Guyan<br />

SAASM GPA, which is testing with<br />

the <strong>Marine</strong>s from a usability stand-<br />

bguyan@drs-ts.com<br />

point, offers them the opportunity<br />

to remove external hardware such as the DAGRs. We can distribute<br />

the GPS signal from our box to other systems, so vehicles that<br />

today have two to three GPS devices could go down to just one.<br />

That is significant.”<br />

Demand continues, as does a desire to adapt requirements to<br />

emerging warfighter needs.<br />

Guyan expects that there will be a competition at the end of<br />

2011 for next generation vehicle systems that will be the first<br />

vehicle procurement targeting the Joint Battle Command-Platform<br />

(JBC-P).<br />

While FBCB2 clearly garners considerable interest, other programs<br />

have seen further DRS rugged computers reach the frontlines.<br />

Guyan cites the example of the Joint Platform Tablet (JPT).<br />

“In the two years since we received an order from PM Movement<br />

Tracking System (MTS) for about 25,000 JPTs, various customers<br />

have adopted the JPT for tactical operations, and it is now on 14<br />

different programs of record for mounted and dismounted use,”<br />

Gayan said. “The JPT uses exactly the same processor and hard<br />

drive as the JV-5, resulting in minimal integration or interoperability<br />

risk to the program office and enabling the eventual migration<br />

of PM MTS into the FBCB2 program office. Today you have<br />

common hardware in both the MTS and FBCB2, as these programs<br />

are slated to merge next year with the MTS program moving from<br />

PEO EIS to PEO C3T. I believe it positions us very well to help the<br />

Army achieve its version of JBC-P and Unified Battle Command.”<br />

Guyan explained that upgrades to the technology of both<br />

devices as well as the underlying common architecture are both<br />

under constant review, “Future potential product upgrades include<br />

a next-generation processor featuring faster graphics processing,<br />

larger hard drive and more I/O,” he said. “We haven’t had direction<br />

yet from the customer as to the way they want to go. Part of the<br />

challenge in fielding as many systems as we have is that we have<br />

to constantly be prepared to refresh technology to keep the fleet<br />

current.”<br />

One area of change in ruggedization requirements is the move<br />

from rotating to solid state hard drives. For example, all 25,000 JPTs<br />

are delivered with 128GB SSD, although to date, only a very small<br />

proportion of the JV-5s are being bought with a solid state drive.<br />

Guyan believes the rugged market may eventually go over to SSDs<br />

entirely, based on price as the benefits in terms of ruggedization<br />

and other design advantages are already proven.<br />

The Joint Platform Tablet Military Rugged Tablet from DRS Technologies is now on 14 programs of<br />

record. [Photo courtesy of DRS Technologies]<br />

“There is a point in time when everything will be solid state,”<br />

Guyan said. “There won’t be a directive, but whenever the technology<br />

price point meets the sweet spot, our customers will jump<br />

on board. There are some new technologies that we are aware of<br />

launching soon and we want to be early adopters. We always want to<br />

offer best value capabilities—the latest, greatest technology available<br />

at an affordable price point.”<br />

elBIt systems of amerICa<br />

The Tacter 31 rugged computing<br />

family from Elbit Systems of<br />

America is designed to provide all<br />

the functionality of a laptop but in<br />

an entirely sealed unit, sufficient<br />

to deal with the toughest battlefield<br />

environments, including being<br />

able to continue operating while<br />

submerged.<br />

“The Tacter 31 family has been<br />

Jim English around for a while [in the U.S. military]<br />

and what we wanted to do is<br />

jim.english@elbitsystems-us.com<br />

to maintain as much backwards<br />

compatibility as possible,” said<br />

Jim English, vice president of <strong>C4</strong>I solutions for Elbit Systems of<br />

America.<br />

The Tacter 31M, an integral part of the CHS-3 program, consists<br />

of a common computing module and the option of a 6.4 inch<br />

or 10.4 inch display. Users opt between a keyboard or touch screen<br />

to operate the device. In addition to the full range of normal ports<br />

for the Tacter 31M, Elbit has added a Multi <strong>Media</strong> In Out port that<br />

combines LAN, USB and just about anything else in an additional<br />

multi-purpose port. “Not everyone carries an adapter with them,<br />

and so I wanted them to have everything. It is also completely<br />

sealed,” English explained.<br />

The Tacter 31M houses a SAASM GPS and also has slots for<br />

TacLink or IDM modems. Additional options have been provided<br />

according to customer requirements. These have included the<br />

addition of an L-band transceiver in order to interface with FBCB2.<br />

www.MIT-kmi.com MIT 15.1 | 13


Quick function keys allow the stealth mode to be instigated, allowing<br />

users to rapidly change the status of the device.<br />

These options illustrate the devices’ inherent modularity, English<br />

said. “This is modular device, in the sense that when we design<br />

the computers, if you want to change something, we don’t have to<br />

redesign the whole thing. To us the shell, keyboard, side panel and<br />

displays are all modules we can change out.”<br />

A more recent addition is the Tacter 31D tablet, which has dual<br />

core processors.<br />

Numerically, the most significant<br />

product Elbit offers in the<br />

United States is the handheld RPDA,<br />

which is now in its fifth generation<br />

since its beginnings in 2002. The<br />

RPDA has since been used in variety<br />

of roles, controlling unattended<br />

ground sensors via Zigbee transceivers,<br />

for example, while on the JTRS<br />

GMR program, the RPDA replaced<br />

a much larger control device. Other<br />

versions have PCMCIA slots, SAASM<br />

GPS and are Iridium capable.<br />

“The concept behind this is that<br />

is we want something where users<br />

can change the mission without<br />

buying an all-new unit, and as tech-<br />

nology changes fast we wanted to<br />

invest in some of the high dollar<br />

items once and not have to reinvest<br />

in them with each generation of the RPDA,” English said.<br />

Users have a common display, with tailored back modules that<br />

are forward and backwards compatible with every generation of<br />

the RPDA’s display. “Because it is modular with four screws, we<br />

allow the user take to the back off and put whatever back they<br />

want on it,” English said. “PM Battle Command has three major<br />

programs that use the same RPDA: the pocket sized forward<br />

entry device, Centaur and the lightweight technical fire direction<br />

system. PM BC has been buying those since 2002, and every<br />

time they get a new front, they can take the whole back and plug<br />

it on, so they have been using some of the same things we might<br />

have sold originally in 2002 even though we have a brand new fifth<br />

generation front.”<br />

PanasonIC<br />

Panasonic Solutions Company<br />

has focused for more than two<br />

decades on ensuring that its Toughbook<br />

mobile computers will operate<br />

successfully and reliably in a<br />

range of harsh environments, while<br />

maintaining technology links with<br />

the commercial sector to leverage<br />

development in ways that complement<br />

warfighter requirements.<br />

Fed de Gastyne, a federal<br />

business development manager<br />

with Panasonic Solutions<br />

Company, outlined the recent<br />

14 | MIT 15.1<br />

The Toughbook U1 from Panasonic has equipped units in Iraq and Afghanistan.<br />

[Photo courtesy of Panasonic Solutions Company]<br />

Fed de Gastyne<br />

fed.degastyne@us.panasonic.com<br />

additions to the product line. In terms of small factor computing,<br />

the Toughbook U1 Ultra has equipped units in Iraq and<br />

Afghanistan. The Intel Atom powered Toughbook U1 Ultra is a<br />

handheld, fully rugged, ultra-mobile personal computer with<br />

a 5-inch screen that runs full operating systems, including<br />

Windows 7.<br />

De Gastyne describes it as the toughest Toughbook computer<br />

that Panasonic has built to date, with improvements that also<br />

extend to better performance in high sunlight. “Panasonic uses<br />

circular polarization, which is a<br />

process similar to polarized sunglasses.<br />

This has helped to focus<br />

and make the screen more readable.<br />

We also have the ability to<br />

change the NIT rating on our<br />

devices for low light conditions<br />

or to increase the NIT rating to<br />

increase visibility in high sunshine<br />

environments.”<br />

The larger Toughbook H1<br />

Field has a 10-inch screen and<br />

a built-in CAC Card reader, for<br />

the DoD Common Access Card<br />

reader. Both devices use 64GB<br />

SSDs, which add an additional<br />

tier of ruggedness to the prod-<br />

ucts. Both the Toughbook U1 and<br />

Toughbook H1 Field are complemented<br />

by more conventional products<br />

such as the Toughbook 19, a fully rugged, convertible laptop<br />

that has seen a lot of use in mission planning. “It also converts to<br />

a fully rugged tablet and uses multi-touch technology so it can be<br />

used not only with a stylus, but also with a gloved finger, which is<br />

a warfighter requirement,” de Gastyne said.<br />

The Toughbook 31 laptop, equipped with either the Intel i3<br />

or i5 core processor, follows the earlier Toughbook 29 and<br />

Toughbook 30 devices. It was designed to serve as a larger clamshell<br />

type device, but is very rugged and is often mounted in military<br />

vehicles.<br />

Another example is the Toughbook Arbitrator 360, an in-car<br />

digital video system that supports up to six cameras operating<br />

simultaneously. This could be fitted to a police vehicle for number<br />

plate recognition or military implementations.<br />

“We are working with a number of U.S. military customers<br />

who are considering using the Arbitrator 360 for force protection<br />

by putting it up on a pedestal. This would provide them with a 360<br />

degree view around a Stryker brigade or in a military police or<br />

security vehicle,” de Gastyne said.<br />

Panasonic tests all its Toughbook computers using the MIL-<br />

STD-810G test suite. “The standard is invaluable,” de Gastyne<br />

said, while cautioning that testing can be interpreted many<br />

ways that affects the actual level of ruggedization and protection<br />

it offers.<br />

“We test all our devices, not only to MIL-STD-810G, but also<br />

for the highest levels of ingress protection, to protect against the<br />

damaging effects of sand, dust or liquids that warfighters often<br />

find ruin their computers,” he said. “We typically use only one<br />

computer to complete the full range of tests. We take this testing<br />

very seriously.”<br />

www.MIT-kmi.com


taCtronICs<br />

For Tactronics, which specializes<br />

in providing rugged computing<br />

solutions and digital backbone<br />

systems for special forces, the first<br />

step in the production of rugged<br />

computers is to source a computing<br />

system on module (SOM) from<br />

a vendor using industrial grade<br />

components, specially created for<br />

Tactronics’ requirements, notably<br />

temperature and vibration.<br />

Bob Ciappa<br />

But that is only the start, as Bob<br />

Ciappa, technical support manager bciappa@tactronics.com<br />

at Tactronics, explained. “The SOM<br />

is just a processor and a couple of chips and some memory,” he<br />

said. “We then design the peripheral interfaces such as serial SATA<br />

for the hard drives and the Ethernet stack on our carrier board<br />

along with the protected and EMI compliant power supply. We also<br />

design it with the proper compatible materials. One of the toughest<br />

things to do when working with wide temperature ranges is<br />

that the electronic components and enclosure expand and contract<br />

with temperature fluctuations, so you have to select materials and<br />

components that have the same thermal coefficient for expansion<br />

and contraction.”<br />

Tactronics machines its enclosures using billet aluminum.<br />

The inside is milled out and what remains is a one piece enclosure<br />

with a single cover. This approach ensures that there are as few<br />

ingress points as possible for dirt and water, which also significantly<br />

aids in radiated and conducted EMI performance. The aluminium<br />

is then treated with a chemical film coating, which doesn’t<br />

affect the conductive properties but stops the corrosion in severe<br />

environments.<br />

“You are left with one continuous surface,” Ciappa said. “For<br />

the interfaces to the outside such as access doors and connectors,<br />

we find the right material that is both EMI safe and environmentally<br />

safe. Usually those two things don’t happen at once. We use<br />

conductive rubberized gasketing on all surfaces, and we have to<br />

make sure that where the surfaces meet they are unpainted so that<br />

there is a good seal both mechanically and for EMI. It sounds like<br />

common sense, but it isn’t always done by others.”<br />

Ciappa noted that the company has precise torque specs for<br />

screws so as not to warp the surfaces. “We also have our own<br />

testing facilities, including a full EMI chamber that will test<br />

everything down to MIL-STD-461G, and environmental chambers<br />

for shock, vibration, high temperature, low temperature, salt fog<br />

and direct immersion. Before the unit leaves our facility we know<br />

it is very rugged and will perform in the harshest environments,”<br />

he said.<br />

While every product is tested to the same exacting standards,<br />

each generation brings improvements to other areas of performance.<br />

“All our next generation equipment uses less power, which<br />

reduces heat, the optical qualities of the displays improve and computers<br />

are more powerful. Our current generation is half the size,<br />

half the weight and uses less power than the former generation and<br />

that is really important for vehicles. Every cubic inch of space is<br />

critical given the highly burdened vehicle space claims. That’s why<br />

size, weight and power savings are important,” Ciappa said.<br />

seCure CommunICatIon systems<br />

Secure Communication Systems<br />

launched a number of new products<br />

at AUSA conference, including the<br />

latest version of the EDM Tablet<br />

PC for the Army’s Air Warrior program,<br />

where it is used as an electronic<br />

flight bag and runs a range<br />

of applications that includes blue<br />

force tracking and moving map<br />

applications.<br />

Michael Boice<br />

“These are now deployed, and<br />

the new version will be replacing<br />

mboice@securecomm.com the old EDM. The new device uses<br />

a new 1.6 GHz Atom processor, and<br />

has more memory, better EMI performance and a lower price. We<br />

are delivering 900 this quarter,” said Michael Boice, vice president<br />

sales and marketing,<br />

To date, Secure Communication Systems has delivered more<br />

than 5,000 EDMs. Other features of the new EDM include a daylight<br />

readable transflective 6.4 inch LCD screen with LED backlight and<br />

an internal 64 Gb SSD.<br />

Improvements to ruggedization continue at the company, Boice<br />

said. “We have improved a lot of items. Our new touch-screen technology,<br />

for example, uses a new micromesh touch screen, improving<br />

the EMI performance of the screen with a glass front so that<br />

it is now immersion proof as well. That’s a big improvement and<br />

something the earlier version didn’t have.”<br />

BarCo<br />

Barco’s Display Processing Module<br />

(DPM)-3 is the company’s latest<br />

rugged computer offering. “The<br />

DPM-1 was Barco’s first step into<br />

rugged computer business, and<br />

was developed in France and Belgium,”<br />

said Douglas Jarus, systems<br />

applications engineer at Barco. “Its<br />

successor, the DPM-2, was developed<br />

in Duluth, Ga., for a Future<br />

Douglas Jarus Combat Systems program, and<br />

the new DPM-3 is a joint develop-<br />

douglas.jarus@barcofederal.com ment between Barco in France,<br />

Belgium and the United States,<br />

harvesting the experiences of this multi-site approach. We have<br />

decreased the size of the DPM-2 by half, maintaining the same<br />

capabilities, yet adding extra expansion. The DPM-3 was designed<br />

to survive in almost any environment, including immediately adjacent<br />

to a 155mm cannon, so the shock levels were off the chart.”<br />

In addition to reductions in size, weight and power, other<br />

innovations facilitate maintenance in the field. The CMOS battery<br />

in the DPM-2 was located such that replacement required<br />

disassembly and reassembly. For the DPM-3, a removable drive<br />

door provides almost immediate access to the necessary parts<br />

when needed.<br />

Barco’s second new product is linked to the DPM-3 and its<br />

TX display technology. The SV126 is a combination of DPM and<br />

www.MIT-kmi.com MIT 15.1 | 15


TX-type display technologies incorporated into one mechanical<br />

package. “We have taken all the electronics and put them in the<br />

rear of the unit. We have a thermal barrier in there, with glass<br />

up front. This enables us to keep the glass at a constant operating<br />

temperature and still maintain the performance of the DPM-3. We<br />

have decreased the size, enabling us to fit it behind a 10 inch display,<br />

in contrast to the DPM-2, which required a 17 inch display,”<br />

Jarus explained.<br />

vt mIltoPe<br />

At AUSA, VT Miltope launched<br />

eight new products, ranging from<br />

clamshell laptops, convertible laptops,<br />

handhelds, mounted computers<br />

to small form factor and<br />

handheld devices for dismounted<br />

users.<br />

“Our family of rugged computers<br />

meets the requirements for Pat Morrison<br />

environmental and EMI required<br />

for the military in the field. Rugged<br />

military grade computers by VT Miltope are built tough in<br />

and out,” said Pat Morrison, director central region business<br />

development.<br />

VT Miltope also provides a range of fiber networking products,<br />

Morrison stated. “We provide 100 percent environmental stress<br />

screening on our products to make sure that they are solid and reliable<br />

in the field. They are developed and tested to meet or exceed<br />

military standards.”<br />

New VT Miltope products are about to enter production as part<br />

of the Army’s Maintenance Support Device (MSD) contract. MSD<br />

laptops are used in variety of roles, providing portable maintenance<br />

and diagnostics systems via ruggedized laptops under a contract<br />

awarded in 2004. “Currently under that program, we have some<br />

30,000 units fielded. With the next generation products, they will<br />

be going into production later this year,” Morrison said.<br />

ruggedCom<br />

RuggedCom was established in Canada in 2001 with a focus on<br />

electric substation automation, for which it aimed to create a reliable<br />

and rugged communications backbone. But it has since found<br />

a strong military market.<br />

“It was the U.S. Navy that discovered us and saw what a good fit<br />

our product portfolio was with what they were doing, modernizing<br />

some of their ships,” said Roger Moore, CTO and vice president of<br />

engineering at RuggedCom.<br />

Meeting military standards required a few modifications,<br />

but now the company’s products are being deployed in several<br />

projects.<br />

The M2100 modular managed Ethernet switch with gigabit<br />

uplinks and the M2200 modular managed gigabit Ethernet backbone<br />

switch have now been in use as part of the Navy DDG 51 class<br />

modernization project for several years.<br />

RuggedCom’s MX5000, the company’s newest multiservice<br />

product, is a scalable, hot-swappable, high port density routing<br />

and switching platform designed to operate in the most demanding<br />

environments. “It’s not just an Ethernet switch,” Moore noted.<br />

16 | MIT 15.1<br />

VT Miltope offers a wide range of rugged products. [Photo courtesy of VT Miltope]<br />

The Rugged Operational Computer is one product from Tactronics, which specializes in rugged<br />

computing for special forces. [Photo courtesy of Tactronics]<br />

“You name the interface and we can put it in this box; it provides<br />

tremendous operational flexibility to the Navy and will be deployed<br />

on the LSD Class mid-life update project this year, beginning with<br />

LSD 47.”<br />

While the Navy is RuggedCom’s biggest military customer, the<br />

company is also developing products for use in other defense contexts,<br />

particularly mission-critical private networks.<br />

RuggedMAX is a high-performance, long-range secure family<br />

of products that is fully compliant with the WiMAX 802.16e wave<br />

2 (MIMO) mobile broadband wireless standard and designed to<br />

extend IP networks over large distances to fixed and mobile users.<br />

Moreover, the M969, a MIL-STD hardened, fully managed Ethernet<br />

switch, has generated much interest throughout the military. It is<br />

IP66/67 rated for protection against strong jets of water (IP66) or<br />

immersion in water (IP67) and is being used for deployments in the<br />

air and on the ground. O<br />

Contact Editor Harrison Donnelly at harrisond@kmimediagroup.com.<br />

For more information related to this subject, search our archives at<br />

www.MIT-kmi.com.<br />

www.MIT-kmi.com


Waveform for a Coalition<br />

taCtICal networkIng CaPaBIlIty wIll allow InternatIonal<br />

Partners to exChange seCure wIdeBand voICe, data and vIdeo.<br />

Editor’s Note: This is another in a regular series of updates on the Joint Tactical Radio System (JTRS), as provided by the<br />

program’s Joint Program Executive Office (JPEO).<br />

The JPEO JTRS has announced the approval of the operational<br />

requirements document (ORD) underpinning the Coalition Wideband<br />

Networking Waveform (COALWNW) specification. The ORD represents<br />

the consolidated and prioritized operational requirements of the<br />

nations participating in the COALWNW international agreement and<br />

is intended to support potential future development of a common,<br />

interoperable waveform. This milestone is an important step toward<br />

achieving enhanced interoperability and communication between the<br />

United States and coalition partners.<br />

Enhanced interoperability among coalition partners is an essential<br />

requirement on the modern battlefield, with multinational coalitions<br />

becoming the norm for conducting military operations in hot spots<br />

around the world. The COALWNW tactical networking capability<br />

will allow coalition partners to exchange secure wideband voice,<br />

data and video between national software defined radios in the land,<br />

air and maritime domains. These capabilities will significantly<br />

contribute to improved coordination, shared situational awareness,<br />

reduced chance of fratricide, and secure provisioning of effects across<br />

multinational boundaries.<br />

In June 2009, nine nations (Australia, Finland, France, Germany,<br />

Italy, Spain, Sweden, United Kingdom and United States) agreed to<br />

jointly develop a wideband networking waveform to enable tactical<br />

interoperability among coalition forces. This waveform is known as<br />

the COALWNW (pronounced Coal-Win).<br />

The COALWNW capability will be designed, developed and tested<br />

using a three-phased approach: waveform specification, waveform<br />

development and interoperability testing. During the first phase,<br />

the participating nations have developed a single set of operational<br />

requirements that will underpin the COALWNW specification. To<br />

evaluate and baseline these requirements, the nations performed<br />

a comprehensive requirements definition process that included an<br />

analysis of current waveform developments.<br />

When waveform development begins in the second phase, COAL-<br />

WNW will be delivered incrementally with increased functionality<br />

incorporated in later increments. In this manner, developmental risk<br />

can be effectively managed and early deployment of initial capability<br />

can be achieved. The first increment will focus on delivering interoperability<br />

within the ground environment, inclusive of many maritime<br />

and air support assets.<br />

A working group comprising members from the nine COALWNW<br />

nations is studying alternatives to determine the best acquisition<br />

strategy for the initial increment. The member nations expect that<br />

other nations will join the COALWNW effort for development of the<br />

first increment.<br />

A key enabler to the COALWNW capability is the introduction of<br />

software defined radio programs within the partner nations. In a software<br />

defined radio, the software defines the communication characteristics<br />

of the radio and software waveforms may be reused and ported<br />

onto different radio hardware (similar to computer applications). Once<br />

developed, the intent is to port COALWNW onto various national software<br />

defined radio hardware hosts, thus ensuring coalition interoperability<br />

through a diverse range of platforms. O<br />

www.MIT-kmi.com MIT 15.1 | 17


Compiled by <strong>KMI</strong> <strong>Media</strong> <strong>Group</strong> staff<br />

Army Project 25 Land Mobile Radios Authorized to Operate<br />

Harris Corp. has received authorization to operate (ATO)<br />

accreditation from the Department of Defense for 12 Project<br />

25 Land Mobile Radio (LMR) systems used by the U.S. Army<br />

throughout North America. An ATO is formal recognition by<br />

the designated accrediting authority regarding the acceptable<br />

level of risk associated with operating a system for DoD. After<br />

implementing all designated IA controls, all Harris Army P25<br />

LMR systems received ATO accreditation for processing, storing<br />

Trusted Network<br />

Environment<br />

Approved for Cross-<br />

Domain Security<br />

The Unified Cross Domain Management<br />

Office (UCDMO) has approved the latest<br />

version of <strong>Gen</strong>eral Dynamics <strong>C4</strong> Systems’<br />

Trusted Network Environment (TNE) suite<br />

of cross-domain, information-sharing software<br />

tools for use by U.S. government organizations.<br />

The upgraded version, TNE 10,<br />

is now available for customers including<br />

the Department of Defense and intelligence<br />

communities, as well as international users.<br />

Among the upgrades, TNE 10 delivers the<br />

familiar Microsoft Office suite of software tools<br />

for more user-friendly and intuitive operation,<br />

as well as transitioning users from the<br />

Solaris 8 to the Solaris 10 operating system.<br />

TNE is currently the only product approved by<br />

UCDMO that enables users to see e-mail and<br />

files at various security levels within a single<br />

application. The product’s security capabilities<br />

meet or exceed strict federal government<br />

standards for processing the most sensitive<br />

classified information. By using data-labeling<br />

technology to separate classified and unclassified<br />

data, users see only what their individual<br />

security profiles allow, without awareness of<br />

or visibility into other data files, applications<br />

or users on the enterprise. Based on the user’s<br />

profile, TNE 10 accesses, creates, combines and<br />

exchanges various levels of classified information,<br />

including e-mail, without having to<br />

physically move from one secure networked<br />

computer system to another.<br />

18 | MIT 15.1<br />

A new release of the VX Series<br />

(VX900, VX1200 and VX1800)<br />

from Network Equipment<br />

Technologies, running software<br />

release 4.7.4, has been added to<br />

the Defense Information Systems<br />

Agency (DISA) Approved Products<br />

List. This updated certification<br />

adds native support for multilevel<br />

precedence and preemption<br />

and transmitting mission-critical communications information.<br />

The Harris P25IP system combines the benefits of an<br />

IP-based network with industry recognized P25 standards. The<br />

result is a single cost-effective IP-based network that is reliable,<br />

scalable and secure while providing communications interoperability.<br />

Harris also delivers established IA methodology that<br />

leverages enterprise security with a programmatic view of overall<br />

mission assurance.<br />

Multi-Service Voice Switch Offers<br />

Multilevel Preemption<br />

The SwiftLink Tactical Transportable Tropo<br />

(3T) system from TeleCommunication Systems<br />

(TCS), which recently received an industry award<br />

as an innovative satellite technology product, is a<br />

small and lightweight troposcatter solution with<br />

the most robust tropo technology available on<br />

the market. The result of teaming with Comtech<br />

Systems, this solution enhances the TCS product<br />

portfolio by adding beyond line of sight capability<br />

to its Very Small Aperture Terminal (VSAT)<br />

flyaway family. TCS SwiftLink 3T ensures that<br />

users have access to long-haul, high-bandwidth,<br />

low-latency tactical communications. It uses a<br />

C-band feed to deliver troposcatter communications<br />

utilizing common modular VSAT platforms<br />

with multiple upgradeable frequency options.<br />

(MLPP) to the VX product line,<br />

greatly improving its efficiency<br />

in DISA’s core satellite facilities.<br />

Users are no longer required<br />

to use Leased Line Emulation<br />

Mode, freeing many primary rate<br />

interfaces (PRI) at constrained<br />

downlink facilities. In addition to<br />

MLPP, this release of VX software<br />

supports standards-based V.150.1<br />

secure call relay over an IP infrastructure.<br />

The VX Series retains<br />

its proprietary, error-tolerant<br />

method of secure call relay,<br />

dubbed SCIP framing, and<br />

supports both T-1 and E-1<br />

interfaces, using both Channel<br />

Associated Signaling and PRI<br />

signaling. The APL certification<br />

is for T-1 ISDN only.<br />

Troposcatter System Offers Robust<br />

Communications Technology<br />

The solution is available with either TCS’s 1.2M<br />

or 2.0 SNAP VSAT antennas and is compatible<br />

with the frequency bands and operating diversity<br />

prevalent today.<br />

Through the use of the Comtech Systems<br />

CS6716A operationally proven tropo modem, the<br />

TCS SwiftLink 3T system utilizes dynamic bandwidth<br />

allocation to minimize operator set-up,<br />

resulting in less training, troubleshooting and<br />

configuration. Path analysis software tools with<br />

integrated planning maps ensure mission-critical<br />

communication links are established without the<br />

burden of complex configuration, giving today’s<br />

warfighters a reliable, end-to-end high bandwidth<br />

solution. Importantly, it offers backwards<br />

interoperability with legacy tropo systems.<br />

www.MIT-kmi.com


Future SATCOM Acquisition<br />

Contracts Announced<br />

ARTEL, a provider of information technology and<br />

managed telecom/network services, has announced receipt<br />

of the first contract award to provide satellite services under<br />

a new $5 billion <strong>Gen</strong>eral Services Administration (GSA)<br />

and Defense Information Services Agency joint-contract<br />

vehicle. The order, which is worth tens of millions of dollars,<br />

was the first award of the Future COMSATCOM Services<br />

Acquisition (FCSA) contract, under the GSA Schedule, to<br />

provide transponded capacity and subscription<br />

services. Subsequently SES World Skies<br />

U.S. Government Solutions<br />

announced FCSA awards,<br />

also in the transponded<br />

capacity and subscription<br />

services categories.<br />

Tellabs 7100 Nano Optical Transport<br />

System (OTS) is an ideal solution for mission<br />

critical packet optical applications. The<br />

platform is scalable, versatile and reliable.<br />

The Tellabs 7100 Nano shelf supports lineside<br />

rates scaling from one 10 Gb/s optical<br />

wavelength up to 88 DWDM channels of 40<br />

Gb/s on a single fiber pair, while consuming<br />

a small amount of space (5RU) and power.<br />

Depending on the modules employed, it<br />

can be an end terminal in a point-to-point<br />

application, an OC-192 SONET/SDH ADM, or<br />

an active multi-degree node in a dynamic<br />

optical ROADM network. The Tellabs 7100<br />

system client-side interfaces and internal<br />

switching features support Ethernet,<br />

SONET/SDH, and OTN transport and service<br />

delivery. In multiple Ethernet and SONET/<br />

SDH applications, it reduces capital expenses<br />

Packet Optical Transport Offers Higher<br />

Bandwidth and Lower Cost<br />

by more than 60 percent and operational<br />

expenses by up to 85 percent. The Tellabs<br />

7100 system integrates multiple technologies<br />

to enable efficient control and management<br />

for manual or highly automated<br />

operation. More than 4,500 Tellabs 7100<br />

Security Solution Offers<br />

IP-to-ID Mapping Technology<br />

The latest version of the<br />

Fidelis SPX network security<br />

solution from Fidelis Security<br />

Systems now has the ability to<br />

associate any network activity to<br />

a specific user identity in realtime<br />

using dynamic IP address to<br />

user identity (IP-to-ID) mapping<br />

technology.<br />

Working with A10 Networks<br />

ID Series network identity<br />

management appliances, Fidelis<br />

XPS customers can now leverage<br />

IP-to-ID technology to automatically<br />

identify the activities of<br />

individual users or directorybased<br />

groups, enabling an organization<br />

to visualize a user’s<br />

network activities, implement<br />

user or group-based security<br />

policies, and link network secu-<br />

rity events with particular users<br />

for user-aware forensic analysis.<br />

With Fidelis XPS’s integration<br />

with A10 Networks’ ID Series<br />

appliances, customers can now<br />

extend the unparalleled visibility<br />

they already have into protocols,<br />

applications, content and threats<br />

to the identity of the user on<br />

the network, with the ability to<br />

tie specific network events with<br />

actual user identities. Working in<br />

conjunction with A10 Networks’<br />

ID Series products, Fidelis XPS<br />

can consume dynamic IP-to-ID<br />

information from multiple user<br />

directories, operating systems<br />

and networking devices using a<br />

modular, agent-less approach,<br />

and apply that information to all<br />

network traffic in real-time.<br />

systems are<br />

deployed in optical networks around<br />

the world, with measured availability<br />

greater than 99.9999 percent. The Tellabs<br />

7100 system is certified by the Joint<br />

Interoperability Test Command.<br />

www.MIT-kmi.com MIT 15.1 | 19


Communication Systems-West<br />

HARNESSING THE POWER<br />

OF THE NETWORK<br />

Providing Real-Time Situational Awareness<br />

Our network control software and wideband radios bring the power of the network to you, effectively<br />

reducing your decision cycle. On the battlefi eld, a multitude of sensors stream video to operation centers<br />

situated in diverse locations. By networking the data, you have access to the totality of the information<br />

available for critical decision-making processes. When it comes to facilitating situational awareness,<br />

count on L-3 to give you fast, comprehensive data delivery.<br />

For more information, visit L-3com.com/csw.<br />

L-3com.com


<strong>C4</strong> <strong>Marine</strong><br />

Q&A<br />

Managing IT as a <strong>Marine</strong> Corps Strategic Asset<br />

<strong>Brig</strong>adier <strong>Gen</strong>eral<br />

<strong>Kevin</strong> J. <strong>Nally</strong><br />

<strong>C4</strong> Director<br />

<strong>Marine</strong> Corps<br />

Deputy CIO<br />

Department of the Navy<br />

<strong>Brig</strong>adier <strong>Gen</strong>eral <strong>Kevin</strong> <strong>Nally</strong> was commissioned a second<br />

lieutenant in the <strong>Marine</strong> Corps in May 1981, after graduating<br />

from Eastern Kentucky University with a Bachelor of Science<br />

in agronomy and natural resources. After completing the Basic<br />

School and Communications Officer Course, he was assigned<br />

to the 1st <strong>Marine</strong> Amphibious <strong>Brig</strong>ade, where he served as a<br />

communications platoon commander for the <strong>Marine</strong> Service<br />

Support <strong>Group</strong>-37 and later as a communications platoon<br />

commander for the <strong>Brig</strong>ade Service Support <strong>Group</strong>. During<br />

this tour, <strong>Nally</strong> attended SCUBA School, Pearl Harbor, where<br />

he served in an additional duty capacity as a search and<br />

rescue diver.<br />

In 1985, <strong>Nally</strong> was reassigned to <strong>Marine</strong> Corps Recruiting<br />

Station, Los Angeles, Calif., where he served as an officer selection<br />

officer. In 1988, he attended Command, Control, Systems<br />

Course in Quantico, Va. After graduating in 1989, <strong>Nally</strong> was<br />

assigned to the 2nd Tank Battalion, 2nd <strong>Marine</strong> Division where<br />

he served as the communications platoon commander during<br />

Desert Shield and Desert Storm. Following this, he was assigned<br />

to Communications Company, Headquarters Battalion, 2nd<br />

<strong>Marine</strong> Division as the executive officer.<br />

<strong>Nally</strong> was assigned in 1992 operations officer, Recruit Training<br />

Regiment, <strong>Marine</strong> Corps Recruit Depot/Eastern Recruiting<br />

Region, Parris Island. In 1995, he was transferred to the 3rd<br />

<strong>Marine</strong> Division, where he served as the S-6, then the S-3, and<br />

finally as the executive officer for the 4th <strong>Marine</strong> Regiment. In<br />

1996, he served as commanding officer, Communications Company,<br />

Headquarters Battalion, 3rd <strong>Marine</strong> Division.<br />

In 1998, <strong>Nally</strong> was assigned as the deputy director, J6, United<br />

States Forces, Japan and completed a master’s in information<br />

systems management. From 2000 to 2002, he was the commanding<br />

officer of Support Battalion, MCRD/ERR, Parris Island.<br />

From May 2002 to July 2003, <strong>Nally</strong> was director of the <strong>Marine</strong><br />

Corps martial arts program.<br />

<strong>Nally</strong> is a 2004 graduate of the Industrial College of the<br />

Armed Forces with a concentration in information strategy.<br />

Following this assignment, he served from 2004 until 2006 as<br />

the deputy cirector for <strong>C4</strong>, U.S. Central Command, where he<br />

deployed twice in support of OIF/OEF. In 2006, he was transferred<br />

to Camp LeJeune, N.C., where he served as the II MEF<br />

AC/S G-6 and subsequently as the II MEF chief of staff. From<br />

2007 until 2009, he served as the commanding officer, <strong>Marine</strong><br />

Corps Communications-Electronics School in 29 Palms, Calif.<br />

He served as the AC/S, G-6, MCAGCC/MAGTF-TC from 2009<br />

until 2010.<br />

<strong>Nally</strong> was interviewed by MIT Editor Harrison Donnelly.<br />

Q: What are your mission and responsibilities as <strong>C4</strong> director<br />

for the <strong>Marine</strong> Corps?<br />

A: <strong>C4</strong> creates the vision and policies necessary for fulfilling the<br />

commandant’s vision and the <strong>Marine</strong> Corps’ mission. We do this<br />

by implementing a strategy that informs force development and<br />

investment priorities. I am specifically tasked to plan, direct and<br />

coordinate all staff activities relating to <strong>C4</strong> functions, and support<br />

the commandant in his role as a member of the Joint Chiefs<br />

of Staff. In addition, I serve as the DoN deputy CIO <strong>Marine</strong> Corps<br />

and as the deputy commanding general for MARFORCYBER. In<br />

these capacities, I am overall responsible for managing IT as a<br />

<strong>Marine</strong> Corps strategic asset to ensure the Corps’ success on the<br />

battlefield, in garrison, and in cyberspace.<br />

Q: What do you see as the most important <strong>C4</strong> issues facing the<br />

<strong>Marine</strong>s today?<br />

www.MIT-kmi.com MIT 15.1 | 21


A: Supporting our <strong>Marine</strong>s in Afghanistan and the work force<br />

are my top priorities. We need to install, operate and maintain<br />

IT but we also must have the intellectual capacity to ensure the<br />

latest IT fits seamlessly into our enterprise. Regarding our<br />

<strong>Marine</strong>s in Afghanistan, it is paramount that we provide sufficient<br />

bandwidth for commanders at all levels, from the generals down<br />

to the NCOs, for them to accomplish their missions. Without sufficient<br />

investment in all forms of transport infrastructure, we put<br />

at risk our forward deployed <strong>Marine</strong>s and their mission partners<br />

who currently operate under severe bandwidth constraints. This<br />

is especially true within the tactical environment, to include<br />

afloat access, when reaching back to CONUS-based data/resources<br />

is critical. We must field enough capacity to maximize planned<br />

C2 systems and emerging secure mobile communications capabilities.<br />

This requires significant investment in infrastructure,<br />

and given the emergence and preeminence of cyberspace as a<br />

principal war fighting domain, we must invest to ensure our<br />

forward deployed forces are not limited in their success by<br />

limited bandwidth.<br />

To ensure <strong>C4</strong> training is relevant, up to date and available<br />

to all <strong>Marine</strong>s [active duty, reserve and civilian] is the most<br />

important training initiative. To accomplish this goal, <strong>C4</strong> must<br />

continue to support the formal learning centers and communications<br />

training centers and merge <strong>C4</strong> training as necessary. By<br />

realigning key MOSs and establishing a training continuum, <strong>C4</strong><br />

will achieve this end state.<br />

Q: What role are <strong>C4</strong> systems playing in <strong>Marine</strong> Corps<br />

operations in Afghanistan today?<br />

A: <strong>C4</strong> systems are greatly enhancing operational interoperability.<br />

The <strong>Marine</strong> Corps’ growing use of the ISAF Coalition network is<br />

increasing our ability to interoperate with our coalition partners.<br />

Providing terrestrial and celestial communications networks<br />

that are communicating with NATO, coalition, sister services and<br />

our interagency partners is critical to our success. These coalition<br />

networks have changed the way we fight.<br />

Q: Can you give some examples of programs that are making a<br />

difference on the battlefield?<br />

A: While all our programs are designed to enhance battlefield C2,<br />

several have increased our throughput and data accessibility to<br />

lower tactical levels, allowing our smallest units to receive data<br />

that was reserved for higher levels only a few years ago.<br />

The Satellite Wide Area Network is a very small aperture<br />

antenna terminal that has been fielded to our battalions and<br />

squadrons. This has provided celestial connectivity that is tied<br />

into a major subordinate command or <strong>Marine</strong> expeditionary<br />

force network. Its ease of installation and significant capability<br />

and capacity have proven to be combat multipliers. Wireless<br />

point-to-point links provide 54 mbps line of sight shot with<br />

low latency. This has increased our throughput to the smaller<br />

bases when they are within range and terrain that supports<br />

this type of link. The AN/PRC-117G is a game-changing radio.<br />

It provides high-bandwidth communications, enabling applications<br />

such as streaming video, simultaneous voice and data<br />

feeds, collaborative chat, and connectivity to secure networks.<br />

The AN/PRC-117G’s wideband networking capabilities give war-<br />

22 | MIT 15.1<br />

fighters on the move, critical real-time information through a<br />

man-portable radio.<br />

Q: What are some of the key initiatives you are working on to<br />

improve operations in the future?<br />

A: My vision is a knowledge-based force that leverages seamless<br />

enterprise capabilities across the spectrum of conflict in order<br />

to enhance decision-making, achieve knowledge superiority,<br />

and gain tactical, operational and strategic advantage over our<br />

nation’s adversaries. This vision spans across both the tactical and<br />

business domains and includes initiatives such as networking on<br />

the move, tactical equipment modernization, and data center consolidation.<br />

I am keenly aware of the benefits of inserting new and<br />

emerging technologies such as VoIP, thin client, and virtualization<br />

in the <strong>Marine</strong> Corps Enterprise Network, and we are working<br />

to do so to increase effectiveness while gaining efficiencies.<br />

Q: A strategy report released by the <strong>C4</strong> office in 2010 states that<br />

the Corps “currently lacks the ability to effectively model, manage<br />

and control tactical MAGTF networks.” Do you agree, and<br />

how are you addressing that lack?<br />

A: The communications control strategy document from which<br />

that particular quote was taken was meant to provide guidance<br />

to the <strong>Marine</strong> Corps communications community on where the<br />

<strong>Marine</strong> Corps will go in regards to the planning, installation,<br />

operation and maintenance of our tactical networks. What the<br />

quote really stresses is the fact that we must have a consolidated<br />

and standardized approach across the tactical environment to<br />

do these things. The desired end-state is to do it better and<br />

align our governance and processes across both the garrison<br />

and tactical networks to the maximum extent possible as our<br />

enterprise includes both garrison and tactical. Additionally, the<br />

strategy document discusses how implementing this strategy<br />

can more efficiently utilize our limited fiscal and manpower<br />

resources.<br />

Q: The same report also states that the open standards based<br />

approach to software design, rather than proprietary systems, is<br />

best suited to the Corps. Why, and is there something about how<br />

the Corps operates that makes this true for it even more than<br />

the other services?<br />

A: Adopting open standards, where sensible, is crucial to achieving<br />

our vision for a knowledge-based force. Open standards are<br />

important because they promote system and data interoperability,<br />

information sharing and collaboration—and thus improve organizational<br />

mobility and flexibility. We will significantly enhance<br />

our warfighters’ ability to achieve tactical, operational and<br />

strategic advantage by fielding improved mobile, seamless and<br />

secure communications and IT services that facilitate collaborative,<br />

coordinated actions, with instant or near real-time access to<br />

mission critical data. We simply cannot do this with stovepiped<br />

proprietary solutions.<br />

Addressing the second part of this question, the <strong>Marine</strong> Corps<br />

is unique among the services because we operate as a <strong>Marine</strong><br />

Air Ground Task Force. We fight as a combined arms air-ground<br />

team with organic logistics and C2 capabilities. This structure,<br />

www.MIT-kmi.com


our continuous global presence, and our<br />

diverse mission set unique requirements<br />

for mobility, flexibility and interoperability<br />

that make us a middleweight fighting<br />

force.<br />

Q: What are you doing to provide<br />

commanders with better situational<br />

awareness, both of overall operations and<br />

of network performance?<br />

A: The <strong>Marine</strong> Corps requires robust,<br />

efficient and secure connectivity in the<br />

tactical environment. Recognizing the<br />

physical constraints present in the limited<br />

bandwidth tactical environment, we plan<br />

to leverage future joint networking waveforms<br />

currently in development, and we<br />

are pursuing fielding Internet Protocolbased<br />

mobile ad hoc network capabilities.<br />

This added capability and enhanced<br />

connectivity will help improve battlefield<br />

effectiveness by reducing the amount of<br />

equipment <strong>Marine</strong>s must carry while at<br />

the same time allowing for adaptability<br />

and enabling <strong>Marine</strong>s to operate at the<br />

tactical edge, ensuring that <strong>Marine</strong>s are<br />

able to accomplish the mission with solutions<br />

based on mission specific requirements.<br />

Battlefield effectiveness through<br />

optimized connectivity must also exploit<br />

improved software applications that facilitate<br />

the exchange of data in low bandwidth<br />

environments. <strong>Marine</strong> Corps efforts<br />

have been and will continue to be coordinated<br />

with the joint community to ensure<br />

interoperability and optimized response to<br />

commander, joint task force requirements.<br />

Q: What are some of your most important<br />

training initiatives?<br />

A: One key initiative is to realign MOSs to<br />

ensure we have network-capable <strong>Marine</strong>s<br />

who have a basic understanding of communication<br />

systems vice a single piece<br />

of equipment. This allows unit flexibility<br />

due to an overall understanding of communications<br />

and enhances the use of<br />

on-the-job training and distance-learning<br />

in support of MOS producing schools. As<br />

for the training continuum, we are establishing<br />

a road map for career progression<br />

that guides our communications <strong>Marine</strong>s<br />

to become subject matter experts across<br />

multiple disciplines.<br />

Q: Please outline your information<br />

assurance (IA) and cybersecurity strategy.<br />

How does your office relate to the new<br />

<strong>Marine</strong> Cyber Command?<br />

A: Information is a decisive strategic asset,<br />

and IA provides a key component within<br />

cyberspace operations for leveraging this<br />

asset to achieve tactical, operational and<br />

strategic advantage. As the <strong>Marine</strong> Corps<br />

evolves its cyberspace capabilities, we<br />

are emphasizing the need to improve<br />

and institutionalize our IA capabilities<br />

and practices. Institutionalizing IA across<br />

the <strong>Marine</strong> Corps requires a total force<br />

approach to ensure that IA skill sets and<br />

proficiencies are codified and ingrained<br />

through doctrine, policy, education and<br />

training.<br />

By continuing to professionalize the<br />

IA work force, the <strong>Marine</strong> Corps can better<br />

leverage enterprise information to<br />

help negotiate and succeed in a dynamic<br />

security environment. Additionally, the<br />

<strong>Marine</strong> Corps will continue to use existing<br />

developmental processes and continue<br />

to refine certification and accreditation<br />

processes to ensure IA requirements are<br />

identified and included early in a systems<br />

design project. Continual refinement<br />

and incorporation of emerging policies<br />

and guidance from the IA and acquisitions<br />

communities will better ensure<br />

IA controls are inherent to the system,<br />

thus providing superior and transparent<br />

threat protection across a wide range of<br />

missions.<br />

<strong>C4</strong> is one of many <strong>Marine</strong> Corps cyberspace<br />

stakeholder organizations. As the<br />

director <strong>C4</strong>, I am designated as the deputy<br />

commanding general for MARFORCYBER.<br />

This establishes a unique and close relationship<br />

between <strong>C4</strong> and this new USMC<br />

organization. We work very closely with<br />

MARFORCYBER to assist in the development<br />

of cyberspace goals and objectives,<br />

as well as identify specific capability needs<br />

for our cyber-work force.<br />

Q: How would you describe your strategy<br />

for achieving the goal, as outlined by<br />

Corps leaders, to migrate to a net-centric<br />

interoperable network by 2025?<br />

A: I view a net-centric interoperable network<br />

at the root of achieving my vision<br />

for a knowledge-based force. Achieving<br />

the vision requires the development of<br />

improved mobile, seamless, and secure<br />

communications and IT services across the<br />

information enterprise. Communications<br />

Save up to<br />

70% of capex<br />

80% of energy<br />

90% of space<br />

Tellabs Optical LAN<br />

(GPON) offers big<br />

savings compared<br />

with conventional<br />

.active Ethernet LANs.<br />

Free white paper at<br />

Tellabs.com/olan<br />

www.MIT-kmi.com MIT 15.1 | 23


and services with these characteristics facilitate collaboration,<br />

coordinated actions and instant or near real time access to mission<br />

critical data, information and knowledge. To evolve the<br />

Corps into a knowledge-based force that achieves decision and<br />

execution superiority in traditional war fighting domains, cyberspace,<br />

and business mission areas, investments in core enterprise<br />

components are crucial. Investments for the MCEN and associated<br />

technologies will focus on more effectively delivering, displaying,<br />

and managing data, information, and knowledge across<br />

the enterprise.<br />

Furthermore, investments will emphasize better ways for<br />

rapidly infusing emerging technologies that enhance command<br />

and control, extend the reach of forward deployed forces, and<br />

improve organizational and tactical agility. Investments will<br />

be planned from the perspective of ensuring bandwidth limited<br />

<strong>Marine</strong>s and mission partners have improved access to mission<br />

critical data, information and knowledge, wherever and<br />

whenever needed, and in an understandable format. Enterprise<br />

investments will also focus on work force education, training and<br />

professionalization programs. Such initiatives will be designed<br />

to ensure <strong>Marine</strong>s, civilian <strong>Marine</strong>s, and support contractors<br />

know how to use improved enterprise governance tools, policies<br />

and technological capabilities to create advantage in a dynamic<br />

strategic landscape.<br />

Much of this depends on improving reachback support to our<br />

forward deployed and bandwidth limited <strong>Marine</strong>s and mission<br />

24 | MIT 15.1<br />

partners. As I emphasized earlier, we must invest in every form<br />

of transport infrastructure to deliver a “plug and play” capability<br />

that facilitates mobile, seamless and secure communications.<br />

Q: What is your role as deputy CIO of the Department of the<br />

Navy? How do you find a balance between the Corps’ unique<br />

needs and the overall <strong>C4</strong> strategy of the DON?<br />

A: The commandant of the <strong>Marine</strong> Corps and the DoN CIO<br />

have tasked me as the director <strong>C4</strong>/DDCIO [MC] to provide IT<br />

capital planning and portfolio management, to develop and<br />

manage an IM/IT architecture and work force, and to provide<br />

leadership and governance of IM/IT activities for the <strong>Marine</strong><br />

Corps. In this role, I have the flexibility to make IT management<br />

and investment decisions specific to the <strong>Marine</strong> Corps to<br />

ensure that our unique warfighting, business, and worldwide<br />

enterprise and expeditionary infrastructure requirements and<br />

capabilities are met. It is also incumbent upon me to ensure<br />

that we are interoperable and integrated with joint, coalition and<br />

naval IT.<br />

Terry Halverson, the DoN CIO, has brought our three<br />

teams—the DoN CIO, <strong>C4</strong> and N2/N6—together to ensure we are<br />

all aligned. I oversee all strategy, planning, directing and coordinating<br />

of IT capabilities that support <strong>Marine</strong> Corps war fighting<br />

and business functions, and the N2/N6 performs the same role<br />

for the Navy. Together, I think we do a very good job of balancing<br />

the war fighting IT strategies. Additionally, we need to work<br />

with the DoN CIO to similarly align the post-Navy <strong>Marine</strong> Corps<br />

Intranet strategies in the Next <strong>Gen</strong>eration Enterprise Network<br />

and Naval Networking Environment [NNE] construct to ensure<br />

that the unique supporting establishment requirements are both<br />

effective and efficient. We are looking at where we can combine<br />

efforts where it makes sense, to be more operationally effective.<br />

Recently we actively collaborated with the DoN CIO in the development<br />

of the current draft NNE base strategy document. We are<br />

ensuring our service requirements are met by NNE objectives<br />

and similarly are leveraging NNE objectives to shape our service<br />

requirements.<br />

Q: What lessons from your experiences in Operation Desert<br />

Storm and Operation Iraqi Freedom [OIF] are uppermost in<br />

your mind as you approach your current position?<br />

A: The information sharing requirements for these two distinct<br />

forms of warfare are vastly different, but the communications<br />

means and methods are very similar. We therefore need to think<br />

holistically about how our networks are going to be used in<br />

various operational contexts to ensure we field appropriate and<br />

flexible capabilities. For highly kinetic conventional operations<br />

such as Desert Storm or OIF I, we must provide a robust and<br />

highly mobile network that provides real-time, or near realtime<br />

sensor to shooter information. For today’s operations in<br />

Afghanistan, we must provide network capabilities that supports<br />

both traditional kinetic operations and also facilitates dynamic<br />

collaboration, information sharing and coordinated actions<br />

among a wide range of mission partners across vast geographical<br />

spaces. The key lesson is the importance of sound strategic<br />

assessments and planning to help us understand the true scope<br />

of communications requirements. O<br />

www.MIT-kmi.com


Encryption at the Edge<br />

For developers of encryption technology,<br />

information assurance (IA) at the tactical<br />

edge is where the greatest challenges arise.<br />

During field operations, the demand for<br />

information is arguably at its most pressing,<br />

with operators demanding access to the latest<br />

intelligence about a time-sensitive target.<br />

At the same time, however, the information<br />

being transmitted is most vulnerable<br />

to interception, and the devices<br />

carried by warfighters for hosting and<br />

www.MIT-kmi.com<br />

the Challenges of taCtICal InformatIon assuranCe are<br />

sPurrIng raPId develoPment of new teChnology.<br />

By adam Baddeley<br />

mIt CorresPondent<br />

Baddeleya@kmImedIagrouP.Com<br />

communicating that information, together<br />

with the technology that makes it possible,<br />

are at their most vulnerable to loss and<br />

capture.<br />

In response to this basic dilemma of tactical<br />

IA and encryption—speed and access<br />

versus increased exposure and risk—major<br />

military communications companies are<br />

developing a host of new products. Following<br />

is a roundup of some of the many offerings<br />

in this field.<br />

network aPProaCh<br />

ITT has been out of the IA device<br />

business for some time, but that is now<br />

changing with the advent of the company’s<br />

new IA project, the name of which has not<br />

been publicly disclosed. This approaches the<br />

security challenge from a different perspective<br />

than Department of Defense legacy<br />

encryption products, company executives<br />

say, because rather than looking at the<br />

MIT 15.1 | 25


challenge from a hardware<br />

perspective, it approaches the<br />

issue from the network side.<br />

The next generation<br />

secure network processors<br />

are in the final stages of the<br />

government approval process<br />

and have received broadbased<br />

support from different<br />

DoD bodies and government<br />

agencies.<br />

“We are bringing our<br />

information assurance products<br />

to market in the first and<br />

second quarter of 2011. The<br />

secure network processors<br />

themselves are complete and<br />

we are doing final testing,”<br />

said Ken Peterman, president<br />

of ITT Communications<br />

Systems.<br />

The first recipients of the<br />

new secure network processors<br />

will include ITT’s soldier<br />

radio-based solution for<br />

the Army-led Rifleman Radio<br />

requirement and secure<br />

smart phone technology.<br />

The new network<br />

approach is central, said<br />

Richard Takahashi, IA director.<br />

“The last major U.S.<br />

government crypto modernization<br />

was during the Reagan<br />

administration. During<br />

that time it was ARPAnet, not<br />

the Internet, and everything<br />

was single point encryption<br />

systems. The hardware and<br />

software encryption/cryptographic architectures/products<br />

that came out in the ’80s to<br />

early 1990s were, because of the applications<br />

and certification process, basically still pointto-point<br />

solutions [not network aware].<br />

“Today, to use the older encryption hardware,<br />

designers have to wrap a lot of external<br />

logic around themselves to be network<br />

aware. Crypto modernization in 2010 has<br />

changed drastically, and is now about cyberinfrastructure—cyber-aware<br />

and network<br />

aware. We felt that to be a breakthrough<br />

technology, we had to design crypto differently<br />

to work within the Internet,” Takahashi<br />

explained. “ITT’s secure network processor is<br />

about the development of products that are a<br />

10th of the power, a 10th the size, a 10th the<br />

cost but 10 times the processing power. We<br />

designed the engine so it can be applied not<br />

just to radios, but also products from USB<br />

26 | MIT 15.1<br />

Ken Peterman<br />

Richard Takahashi<br />

Chris Wren<br />

chris.wren@viasat.com<br />

drives and smart phones to<br />

entire networks—the whole<br />

plethora of systems that DoD<br />

needs.”<br />

This game-changing<br />

technology is made possible<br />

by the adoption of systemon-a-chip<br />

technology, which<br />

takes much of that peripheral<br />

circuitry into the device, thus<br />

saving on real estate as well as<br />

power and cost.<br />

“Our secure processor is<br />

a multi-architecture processor<br />

technology, with multicrypto<br />

processor,” Takahashi<br />

said. “It has nine RISC 32bit<br />

processors inside and offload<br />

engines for multiple types for<br />

crypto and packet engines,<br />

and it is fully programmable.<br />

We have designed our secure<br />

processor for today’s requirements,<br />

and projecting 10<br />

years out for programmability<br />

and functionality.”<br />

ITT is leveraging and<br />

reusing core IA technology<br />

from a software/hardware<br />

perspective across a family<br />

of products. “When you get<br />

the fundamental DNA of this<br />

product family through the<br />

government certification<br />

processes, which is now very<br />

close, then instantiating that<br />

core technology into a variety<br />

of different applications<br />

across the product family<br />

becomes relatively quick to achieve,” Takahashi<br />

continued.<br />

Encryption is also central and integral<br />

to ITT’s tactical communications strategy.<br />

“In order to be able to compete effectively<br />

in the domestic and global market, one<br />

of those technologies is IA; another is RF<br />

transceiver technology that has sufficient<br />

capability to host wideband and narrowband<br />

military waveforms with complex attributes<br />

that include frequency hopping and Transec.<br />

The IA and the RF transceiver technology<br />

is fundamental to developing new products<br />

that achieve size weight and objectives.<br />

“Secondarily, it allows us to be able<br />

to take commercial products, like smart<br />

phones, and enhance them to incorporate<br />

genuine mid-grade security or to be able to<br />

implement military RF tactical waveforms as<br />

a companion capability,” he said.<br />

A key application for the crypto technology<br />

will be secure USB drives, which have<br />

been banned under DoD policy. “One of the<br />

things that we have come up with was to<br />

develop a trusted USB drive in such a way<br />

that it completely encrypts the information.<br />

Plus, it’s made by an American company in<br />

Indiana with a setup that can be trusted in<br />

such a way that it can be introduced into<br />

your network and there can be no fear of<br />

embedded virus or things that can attack you<br />

network,” Takahashi said.<br />

“That is going to enable the DoD customer<br />

to update that technology and change<br />

the game because we have a device that<br />

overcomes those kinds of vulnerabilities,”<br />

Peterman added.<br />

data at rest<br />

For Chris Wren, IA vice president at<br />

ViaSat, the core security challenge is ensuring<br />

that the level of security hitherto provided<br />

in buildings and data centers can<br />

be replicated in a mobile environment,<br />

giving warfighters access to classified data<br />

while simultaneously ensuring that the data<br />

remains secure should the device fall into the<br />

hands of opponents.<br />

The security of data “at rest” is a critical<br />

aspect of the issue, Wren noted. “We have<br />

done a lot in terms of data in transit, protecting<br />

the data from one entry point to another.<br />

But what about data stored on computing<br />

devices? What do you do to protect the<br />

data? We have recently purchased a company<br />

called Stonewood, which has a whole array of<br />

products for data at rest that are approved to<br />

protect classified data in the U.K. We are now<br />

working with the National Security Agency<br />

to get those products certified for use in the<br />

United States for Secret and below. I think<br />

the Eclypt product range from Stonewood<br />

is going to change the game in the way<br />

processors and end processing points are<br />

protected.”<br />

ViaSat’s KG200 and KG201 are currently<br />

the only Type 1 certified data-at-rest solutions<br />

for Top Secret data for DoD.<br />

“Right now, U.S. policy doesn’t demand<br />

that you have that level of encryption,<br />

because DoD doesn’t want to have a policy<br />

that no one can meet. We have those products<br />

now. So we are working with the services<br />

to make sure that policy is set up, which<br />

is really there to ensure that warfighters have<br />

what they need to do their job,” Wren said.<br />

Encryption products are having to adapt<br />

to vastly increased numbers of devices in use,<br />

www.MIT-kmi.com


Copyright © 2011 ViaSat, Inc. ViaSat and the ViaSat logo are registered trademarks of ViaSat, Inc. Eclypt and the Eclypt logo are registered trademarks of Stonewood <strong>Group</strong> Limited. All other trademarks mentioned are the sole property of their respective companies.<br />

WikiLeaks. Lost laptops. Stolen information. The U.S. military faces data breaches<br />

every month, putting the nation’s classified data at risk.<br />

Eclypt® data-at-rest security hardware is the first NSA-certified removable data storage<br />

that automatically encrypts up to Top Secret data, rendering it unclassified.<br />

In the event of computer theft, loss, or attack, Eclypt ensures that your data is completely<br />

encrypted, secure, and unstealable.<br />

viasat.com/eclypt<br />

Eclypt Core<br />

Encrypted Internal<br />

Hard Drive<br />

Eclypt Freedom<br />

Encrypted External<br />

Hard Drive<br />

Eclypt KG-201<br />

Inline <strong>Media</strong><br />

Encryptor


he continued. “We have to do more in terms<br />

of protecting data on a device that is lost. We<br />

have a whole lot of things to make it easier<br />

when these things are in hostile environment<br />

either to rekey them or disable them.”<br />

The same technology could also be applied<br />

to commercial non-government users, whose<br />

laptops are often stolen. ViaSat is already<br />

beginning to install the same technology on<br />

company laptops to ensure the security of<br />

proprietary data.<br />

ViaSat also has an array of Type 1 encryption<br />

technology for data in transit. These<br />

inline network encryptors (INE) utilize a<br />

common encryption technology called<br />

PSIAM. This embedded crypto module is also<br />

offered as a system to companies who need<br />

cybersecurity technology and can incorporate<br />

PSIAM into their computing and communications<br />

devices. The module went through<br />

the final security verification approval process<br />

by NSA in December.<br />

“That will be a fully certified instantiation<br />

of PSIAM,” Wren said. “We are working with<br />

handset and tablet manufacturers and want<br />

to enable them to communicate securely. We<br />

are seeing a lot of play in that because vendors<br />

don’t like being tied to one ASIC and ASIC<br />

supplier. With PSIAM FPGA-based technology<br />

they can implement a new algorithm and<br />

change whatever needs to be changed to keep<br />

the product moving forward. We are hitting<br />

power and size requirements that compete<br />

with ASIC architectures because the PSIAM<br />

technology is going so well.”<br />

The KG-250X, ViaSat’s latest INE, also<br />

uses the PSIAM crypto engine and has been<br />

certified by NSA for Top Secret data. An<br />

uncertified version of the device has already<br />

been demonstrated to customers across the<br />

services. In addition to being smaller than<br />

any currently available INE, additional functionality<br />

has been added as well as ruggedization<br />

and additional processing power for<br />

future capabilities.<br />

Wren expects to deliver units early this<br />

year. “We are ramping up production now<br />

and you will see this almost pocket-sized<br />

encryptor device, using the same technology<br />

that we have developed in the KG-250.”<br />

Another innovative solution for the tactical<br />

edge is the IPS-250, which is HAIPE<br />

compliant and interoperable with the existing<br />

fielded Type 1 network infrastructure. “That<br />

gets a lot of play in the services because now<br />

it doesn’t need to be treated like a COMSEC<br />

device,” Wren explained. “Instead, it has to be<br />

treated only as a high value item, although<br />

that is still important. The IPS-250 is the first<br />

28 | MIT 15.1<br />

and only instantiation of an NSA certified<br />

CHVP INE out there today.”<br />

“HAIPE encryption is moving out to the<br />

edge. If you have a device that is mobile<br />

and you want to get it onto the grid, doing<br />

that in a secure manner is a big challenge.<br />

Nonetheless, we have been able to do that<br />

because we have built up the knowhow over<br />

many years,” he said, adding, “The IPS-250<br />

can be used for NATO communications, and<br />

supports HAIPE 3.1.2 and HAIPE-to-HAIPE<br />

keying.”<br />

non-ClassIfIed Box<br />

The latest update to <strong>Gen</strong>eral Dynamics’<br />

TACLANE KG-175 family of IA products has<br />

been the NSA certification of HAIPE 3.1.2,<br />

which started delivery in October. This gives<br />

users a simultaneous capability in IPv4 and<br />

IPv6, allowing users to have a staged migration<br />

from the former to the latter. The software<br />

will be shipped with all new TACLANE<br />

products and is being made available as a free<br />

download via NSA’s SIPRNet website or a CD-<br />

ROM, and takes 15 minutes to install.<br />

The presence of the TACLANE product line<br />

is substantial, with about 60,000 TACLANE-<br />

Micro devices in service. This is supported<br />

by roughly 60,000 TACLANE Classics and<br />

E-100s and a further 15,000 KG-175D-Minis<br />

and 12,000 KG-175A TACLANE-GigE, which<br />

provide a gigabit Ethernet capability.<br />

“They are used just about anywhere,”<br />

explained Mike Guzelian, vice president of<br />

secure voice and data products for <strong>Gen</strong>eral<br />

Dynamics <strong>C4</strong> Systems. “They could be in<br />

a command center, a tent in the battlefield<br />

or data closets to secure LAN connectivity<br />

in secure building. They are used all over<br />

SIPRNet, JWICS, GCCS, the departments of<br />

state and homeland security and for other<br />

federal customers and on other classified networks.<br />

They are also pretty widely deployed in<br />

Canada, Australia and New Zealand.”<br />

Another key feature of 3.1.2 is what is<br />

called HAIPE-to-HAIPE keying, allowing a<br />

user to download the encryption keys into<br />

one device for the entire network and rekey<br />

all the other devices on the network, even<br />

from the other side of the world. Previously<br />

the key fill would have had to be physically<br />

inputted at each device by hand.<br />

Beyond 3.1.2, <strong>Gen</strong>eral Dynamics <strong>C4</strong><br />

Systems is working on hardware and software<br />

upgrades for TACLANE to support a<br />

new mode that NSA calls Internet Protocol<br />

Minimum Essential Interoperability Requirements<br />

(IPMEIR).<br />

“This is a second mode in the box using<br />

all commercial protocols and algorithms<br />

next to the government HAIPE mode,” Guzelian<br />

explained. “The reason for doing this is<br />

to enable the deployment of TACLANEs to<br />

non-classified networks. As part of that software<br />

release, we are coming out with a new<br />

piece of hardware called TACLANE-C100,<br />

which is an unclassified device, not a CCI.<br />

There is new designation NSA gives it, called<br />

Crypto High Value Product (CHVP). Basically<br />

that will run this new IPMEIR mode only in<br />

that hardware.<br />

“Because it is a non-classified box, it can<br />

be deployed to other federal agencies and<br />

state and local government. TACLANEs with<br />

both modes will interoperate with all the<br />

existing devices in a classified network, but<br />

will also have a highly secure solution that<br />

is now easy to field to other agencies. It also<br />

protects communications with very strong<br />

security, but again, without needing someone<br />

to obtain Type 1 keys and to operate in a<br />

Type 1 environment,” he continued.<br />

The goal is to deliver the new solution<br />

ready for certification in April 2012. A second<br />

option would be to use it in NATO and allied<br />

countries so that in Afghanistan, for example,<br />

the CHVP devices can be used in current networks.<br />

But because they are non-CCI items,<br />

they can be left in situ when the United States<br />

turns over control to the local authorities.<br />

In addition to the TACLANE INEs, in the<br />

cellular world the Sectéra Edge is being continually<br />

improved both to maintain security<br />

and also to enhance ruggedization to better<br />

enable its reliable use on the battlefields of<br />

the near future.<br />

The Sectéra Edge is essentially two PDAs<br />

in one via NSA’s Secure Mobile Environment<br />

Portable Electronic Device (SME PED) program.<br />

Even though there is only one display<br />

and one keyboard on the device, it is actually<br />

two physically separate PDAs, not two different<br />

modes. There are two separate chips in<br />

the device plus a variety of measures in place<br />

to ensure that data between the two processors<br />

never meets.<br />

Guzelian explained, “There is an unclassified<br />

PDA that allows you to go to Google<br />

or Yahoo or any website on the Internet you<br />

want. Then there is a classified PDA that can<br />

talk Secret or Top Secret on the network.<br />

Now I can get my classified e-mail on one<br />

PDA and my unclassified e-mail on the other.<br />

It runs a Windows operating environment<br />

capable of downloading imagery and video.”<br />

At the forward edge, the device has<br />

been selected to meet the requirement for<br />

www.MIT-kmi.com


UMUC uMuC<br />

CyberseCurity<br />

DEfEnD yoUr CoUntry with a wholE DiffErEnt wEapon.<br />

Today’s new battlefield is in cyberspace. And everyone needs trained cyber<br />

warriors immediately—from our nation’s new Cyber Command to banks, utilities<br />

and defense contractors. You can be ready, with a bachelor’s or master’s degree<br />

in cybersecurity, a master’s degree in cybersecurity policy or one of three new<br />

graduate certificates from University of Maryland University College (UMUC).<br />

Our cybersecurity courses are offered online, providing in-depth study of the<br />

theory and practice of preventing cyber attacks. Military or civilian, public or private<br />

sector, UMUC can help you advance your career and defend your homeland.<br />

• Designated as a National Center of Academic Excellence<br />

in Information Assurance Education by the NSA and the DHS<br />

• Graduate certificates in Foundations of Cybersecurity, Cybersecurity Policy<br />

and Cybersecurity Technology added for 2011<br />

• Earn undergraduate college credits for learning from work experience,<br />

military service or volunteer activities<br />

• Scholarships exclusively for servicemembers and their families,<br />

plus loans and an interest-free monthly payment plan available.<br />

Enroll now.<br />

visit military.umuc.edu/cyberspace<br />

Copyright © 2011 University of Maryland University College<br />

www.MIT-kmi.com MIT 15.1 | 29


the Commander’s Digital Assistant under<br />

Warfighter Information Network-Tactical<br />

(WIN-T) Increment 2. Targeted<br />

at the commander<br />

level and those with at least<br />

a Secret level clearance, it<br />

enables users to pull classified<br />

data while being able to<br />

use unclassified mode as well<br />

as communicate with soldiers<br />

who might have unencrypted<br />

smart phones.<br />

“We have done some<br />

demonstrations where they<br />

have UAVs transmitting live<br />

imagery data over the network<br />

back down to these devices in the<br />

hands of the commander which is extremely<br />

powerful,” said Guzelian.<br />

These devices have been shipped to users<br />

since 2008, and the same devices with no<br />

modifications will also be used to supply<br />

WIN-T. A recent update has been a new HMI.<br />

“It’s very user-friendly,” said Guzelian.<br />

“Some people say that it’s iPhone-like, but<br />

I think it’s better, with clear big icons and<br />

a very easy bounce between classified and<br />

unclassified buttons with a one button to<br />

jump into your mail, another to view a document.<br />

I like it better than my BlackBerry, but<br />

then I am biased.”<br />

For data at rest, the ProtecD@R product<br />

line is at the cusp of certification, and for<br />

implementations close to the front line, the<br />

ProtecD@R Embedded is offered. Guzelian<br />

said, “It is a solid state hard drive for reliability<br />

in tactical environments and an encryptor<br />

that is certified for Secret or Top Secret, but<br />

it is also in a pretty small form factor. We<br />

will do all the testing for NSA in February<br />

and submit all of our test reports at the end<br />

of April. People are ordering the uncertified<br />

prototype unit so they can test them in<br />

their environment and vehicle networks. We<br />

have delivered prototypes to just about every<br />

manufacturer of tactical vehicles, whether<br />

UAVs, MRAPs and all the JLTV prototypes,<br />

and it is being bid by GCV vendors.”<br />

Other variants in the family include a<br />

high-speed version for Boeing on its P-8<br />

Poseidon multi-mission aircraft contract,<br />

which encrypts as it stores at 40Gbps, the<br />

fastest encryption available in the world.<br />

CoalItIon InteroPeraBIlIty<br />

One of the greatest challenges facing<br />

U.S. forces deployed in the field is interoperability,<br />

not least with allies who in many cases<br />

30 | MIT 15.1<br />

Mike Guzelian<br />

cannot have access to legacy Suite A CCI<br />

Type 1 communications. This issue that has<br />

become increasingly apparent<br />

in current operations, where<br />

the United States is working<br />

closely with allies often far<br />

removed from traditional alliances<br />

such as NATO. To overcome<br />

this problem, Harris RF<br />

Communications developed<br />

the RF-310M handheld tactical<br />

radio, which hosts NSA’s<br />

new Suite B encryption standard<br />

in a Type 1 manner while<br />

keeping it as a non-CCI item,<br />

thus enabling it still to interoperate<br />

with standard U.S. military radios.<br />

The first $9.6 million order for the RF-<br />

310M-HH was announced in October and<br />

the radio is now being provided to members<br />

of the International Security Assistance<br />

Force through the DoD Coalition Readiness<br />

Support Program.<br />

“This is one of the principal applications<br />

for Suite B—to simplify coalition interoperability.<br />

At the same time, we’re seeing interest<br />

in the radio from branches within DoD<br />

and the National Guard, for applications<br />

such as base security and first responder<br />

interoperability,” said Richard Rzepkowski,<br />

vice president of communications security<br />

products, Harris RF Communications.<br />

The cryptographic core of the RF-310M<br />

radio is based on Harris’s Sierra IIB encryption<br />

hardware, utilizing the complete new<br />

set of algorithms known broadly as Suite B.<br />

Todd Moore, director of communications<br />

security product management at Harris,<br />

explained: “The algorithms cover functions<br />

such as encryption, authentication and<br />

key management. This technology in the<br />

RF-310M provides non-CCI encryption for<br />

Secret and Below traffic. Sierra IIB has been<br />

NSA certified for Secret and Below applications.<br />

The RF-310M radio utilizes the Suite<br />

B algorithms based on the current waveform.<br />

For example, the RF-310M has implemented<br />

a VHF/UHF Line-of-Sight waveform<br />

that utilizes AES traffic encryption.”<br />

Other future waveforms will implement<br />

additional algorithms, including asymmetric<br />

keying. The AN/PRC-152 and AN/PRC-117G<br />

radios are dual-mode radios that contain<br />

both Suite A and Suite B waveforms and provide<br />

interoperability with the RF-310M Suite<br />

B radio and other legacy devices.<br />

Suite A algorithms are U.S.-owned protocols.<br />

They are highly protected and are<br />

designated classified and cannot be provided<br />

without the appropriate U.S. government<br />

permissions. In contrast, Suite B algorithms<br />

are commercial algorithms that can be<br />

downloaded from the Web.<br />

Harris’ PRC-152 and PRC-117G radios<br />

have implemented both the Suite A and<br />

Suite B algorithms and are thus dual mode<br />

radios. To achieve this designation, these<br />

radio implementations have been evaluated<br />

by NSA and meet the requirements to transfer<br />

up to Top Secret information for voice,<br />

data and networking. In contrast, the RF-<br />

310M has only implemented the Suite B<br />

algorithms, and its implementation has been<br />

NSA-certified to support Secret and Below<br />

communications. With a common key and<br />

interoperable waveform, the AN/PRC-152,<br />

AN/PRC-117G and RF-310M can communicate<br />

and interoperate with each other.<br />

Whereas Harris’ Type 1 Suite A radio<br />

utilizes the Sierra II, NSA certified a Suite<br />

B-only variant of the Sierra II (called Sierra<br />

IIB). Sierra IIB has been embedded in the<br />

RF-310M radio. For export markets Harris<br />

developed a programmable export crypto<br />

engine/module called Acropolis II several<br />

years ago, which also supports the Suite B<br />

algorithm set and has been embedded in the<br />

RF-7800M Multiband Networking Radio.<br />

The recent award of the Force XXI<br />

Battle Command <strong>Brig</strong>ade and Below-Blue<br />

Force Tracking-2 (FBCB2-BFT) program to<br />

Northrop Grumman, as prime contractor,<br />

included the Harris KGV-72 programmable<br />

inline encryption devices. These devices will<br />

be installed onto BFT platforms and in network<br />

operations centers to provide enhanced<br />

(Type 1) information security, which hitherto<br />

has not be possible with FBCB2 over<br />

SATCOM.<br />

“Our devices are also fully interoperable<br />

with the next-generation BFT-2 software<br />

release. The KGV-72 will enhance information<br />

security across the BFT network,<br />

which includes more than 85,000 terminals,”<br />

Moore said.<br />

While the KGV-72 implements only U.S.<br />

Type 1 security at present, it is software<br />

upgradeable to also support the Suite B<br />

algorithms. With the use of Sierra IIB technology,<br />

a Suite B coalition version of the<br />

KGV-72 could also be quickly developed to<br />

be supplied to coalition partners, much the<br />

same way the RF-310M handheld radio is<br />

being supplied today. O<br />

Contact Editor Harrison Donnelly at<br />

harrisond@kmimediagroup.com.<br />

For more information related to this subject,<br />

search our archives at www.MIT-kmi.com.<br />

www.MIT-kmi.com


Virtualizingthe Future<br />

as the mIlItary moves strongly to “vIrtual” systems to aChIeve Cost savIngs and<br />

greater Control, Industry exPerts examIne the Challenges and oPPortunItIes.<br />

Technology, like the battlefields of<br />

Afghanistan and Iraq, is constantly changing<br />

and evolving. Successful CIOs and<br />

commanders adapt and embrace change<br />

and innovate in response. Server virtualization<br />

has been around for over 35 years<br />

and was brought to the mainstream Intel<br />

x86-market in the late 1990s. Today it<br />

has permeated into all aspects of IT, from<br />

the servers to desktops as well as mobile<br />

devices. The increased adoption can be<br />

directly traced to the benefits of increased<br />

efficiency, greater flexibility and increased<br />

speed of action.<br />

According to the website IT Dashboard<br />

Information (it.usaspending.gov),<br />

the Department of Defense is planning<br />

on spending approximately $36 billion<br />

on IT in 2011. Of that number, about<br />

$23 billion is being categorized as IT<br />

maintenance. That means that less than<br />

40 percent is being spent on innovation.<br />

With DoD facing tighter budgets, department<br />

and agency CIOs are looking for<br />

ways to increase the innovation side of<br />

the equation.<br />

Increased efficiency and cost savings<br />

are by-products of virtualization—fewer<br />

devices means less energy and space consumed<br />

by heating and cooling systems as<br />

well as reduced rack space. This reduction<br />

allows an increase in production by packing<br />

more punch into the same space, be it<br />

onboard a submarine, an aircraft, a ship<br />

or Humvee. Examples include the Distributed<br />

Common Ground System-Army,<br />

where a reduction of six to one on the<br />

number of severs shipped translates into<br />

less inter-theater airlift and less fuel con-<br />

(Editor’s Note: Military Information Technology recently posed the following question to some of the<br />

leading companies in the field of network systems: What benefits and potential drawbacks do you see in the<br />

current military drive toward server, desktop and other forms of virtualization? Following are their responses.)<br />

Flexibility and Speed<br />

By David Hunter, Chief Technology Officer<br />

VMWare<br />

The increased adoption of server virtualization can be<br />

directly traced to the benefits of increased efficiency,<br />

greater flexibility and increased speed of action.<br />

sumption. Other secondary effects include<br />

reducing generators fuel requirements,<br />

which manifests into reduced risk to<br />

sailors, soldiers, <strong>Marine</strong>s and airmen by<br />

reduced demand for fuel convoys.<br />

For any commander, the ability to<br />

remain flexible is paramount in order<br />

to take advantage of the opportunities<br />

presented in the battlespace. For CIOs,<br />

the old days of rigid, lengthy IT deployments<br />

are a thing of the past with fully<br />

virtualized infrastructures. Virtualization<br />

provides the ability to rapidly deploy new<br />

instances of existing applications based on<br />

demand. This provision is now measured<br />

in hours versus weeks. Upgrading and<br />

patching of operating systems is simplified,<br />

as well as the ability to more quickly<br />

rebase line applications to a previously<br />

known safe state is realized.<br />

On the pace of execution front, the<br />

question for CIOs and commanders is not<br />

if the network is going to be attacked, but<br />

how do we operate in an environment that<br />

is not 100 percent assured. In a virtualized<br />

environment, the speed at which the<br />

infrastructure can be deployed and rearranged<br />

is vastly greater than in a physical<br />

world. This translates directly into<br />

an increase in confidence of networked<br />

assets. This applies equally to server, desktop<br />

and mobile virtualization. Having the<br />

ability to quickly re-establish a potentially<br />

compromised coalition network without<br />

the requirement to provision from the<br />

ground up will provide a clear advantage.<br />

According to a leading research firm,<br />

in 2009 the number of applications being<br />

deployed on virtual machines exceeded<br />

those on new physical hardware. Combine<br />

this with the appetite users have for consuming<br />

new applications and services for<br />

mobile devices, and the logical question<br />

is: How does virtualization help?<br />

The current proliferation of new enduser<br />

devices that are tending to be more<br />

mobile in nature will be a challenge.<br />

Think about how many servicemembers<br />

are carrying two or more phone devices<br />

today. The ability to provide unambiguous<br />

access from any end-point device,<br />

securely and efficiently, will be enabled by<br />

virtualization of these devices. Imagine a<br />

virtualized, multi-domain mobile tablet<br />

similar to today’s collapsed multi-domain<br />

desktop analyst workstation, which is a<br />

reality today because of virtualization.<br />

As with all innovation and change,<br />

there are challenges and adjustments in<br />

thinking that is required in order to<br />

achieve optimal success. CIOs and commanders<br />

alike need to focus on simplified<br />

management structures and balancing<br />

access versus security in a virtualized<br />

environment. With the innovation around<br />

ease of creation, the temptation to create<br />

because you can is there. This is known as<br />

“VM sprawl.” Without effective, simplified<br />

management frameworks and policies,<br />

VM sprawl can escalate out of control<br />

quickly. Think about what happens when<br />

servicemembers’ mobile devices are virtualized<br />

and what it will be like when each<br />

of those cell phones will have multiple<br />

VMs on them. Getting a handle on the<br />

management, oversight and configuration<br />

control is a challenge that needs to<br />

be addressed.<br />

www.MIT-kmi.com MIT 15.1 | 31


In military IT, the goal is always to<br />

find the next force multiplier—a solution<br />

to expand capabilities without incurring<br />

massive costs, increasing personnel<br />

levels or dramatically altering existing<br />

infrastructure. This is the promise of<br />

virtualization: Not only can units expand<br />

IT capabilities using current resources,<br />

but many other benefits can also be realized,<br />

from lowered operational costs to<br />

enhanced mobility.<br />

The primary benefit of virtualization<br />

comes from the improved ability of centralized<br />

military data centers to manage<br />

and automate their operations. For<br />

example, when a new project starts, there<br />

is no longer a need to procure a physical<br />

box, space in the data center, a power<br />

supply and so on. IT simply provisions a<br />

virtual machine for the project team—<br />

and that’s it.<br />

This improved management and<br />

automation also plays a big part in the<br />

military’s efforts to meet the data consolidation<br />

requirements of the Office<br />

of Management and Budget. A single<br />

server running multiple virtual machines<br />

can replace dozens or more of physical<br />

boxes, cutting not only costs but also<br />

reducing the space needed to run an effective<br />

data center.<br />

The question above is one I’m sure<br />

the Navy has considered since their<br />

recent announcement of a server buying<br />

freeze. Shifting to virtual desktop and<br />

server environments enables the military<br />

services to strengthen IT security, reduce<br />

32 | MIT 15.1<br />

Next Force Multiplier<br />

By David Kimball, Vice President of Public Sector<br />

SolarWinds<br />

david.kimball@solarwinds.com<br />

Consolidation for<br />

Efficiency<br />

The primary benefit of virtualization comes from<br />

the improved ability of centralized military data<br />

centers to manage and automate their operations.<br />

Finally, virtualization plays a big<br />

part in reducing training requirements,<br />

a major driving force in nearly every<br />

military unit. Virtual desktops will<br />

serve a powerful role in the military<br />

of the future, helping to bring highly<br />

mobile, lightweight computing devices<br />

to the field with an extremely small<br />

training footprint. For example, iPads<br />

equipped with virtual desktops are<br />

already being deployed to warfighters in<br />

Afghanistan. The desktop itself is controlled<br />

from a centralized military data<br />

center, giving the warfighter the power of<br />

a desktop sans form factor and training<br />

requirements.<br />

The downsides of virtualization, however,<br />

can be steep for project teams that<br />

aren’t prepared. First and foremost, managing<br />

a combined virtual and physical<br />

infrastructure is a tall task, something<br />

that most legacy network monitoring systems<br />

are poorly equipped to handle. The<br />

visibility necessary to meet the military’s<br />

stringent requirements is just not there,<br />

but can be once new management solutions<br />

are procured and deployed.<br />

Secondly, frontline technical support<br />

must also change; rebooting a virtual<br />

desktop isn’t done at the client side, but<br />

rather the server side. This means that<br />

By Sean Kenis, Director of Sales<br />

Citrix, Department of Defense and Special Programs division.<br />

IT management costs and consolidate<br />

datacenters and other IT infrastructure—all<br />

primary goals of recent DoD<br />

initiatives.<br />

Stronger IT security. A virtual desktop<br />

gives users access to data and applications<br />

a vast majority of technical concerns<br />

are shifted upstream to a centralized IT<br />

location, potentially requiring additional<br />

staff, training or ticketing systems.<br />

Finally, one of the biggest challenges<br />

around virtualization for the<br />

military is scale—implementing virtualization<br />

within a small agency is one<br />

thing, but deploying it across an entire<br />

military operation or global task force<br />

is completely different. Managing physical<br />

resource provisioning is key for<br />

project leaders to ensure that they are<br />

getting the most out of their virtual<br />

infrastructure, but it also means that<br />

units must invest in additional technology<br />

solutions to address capacity planning,<br />

optimization and waste reclamation<br />

and chargeback.<br />

So are the downsides of virtualization<br />

worth the benefits for military IT? In a<br />

word, yes. Not only is virtualization a key<br />

technology in and of itself, it’s also an<br />

enabler. Without virtualization, the military<br />

can forget about cloud computing<br />

and any other technologies that come<br />

afterwards. The military needs virtualization<br />

now—they can’t afford to wait any<br />

longer, and with the right management<br />

tools and strategies in place, they don’t<br />

need to.<br />

Virtualization will drive datacenter consolidation<br />

because it enables a single server to carry the storage<br />

and application workloads of multiple virtual servers.<br />

securely from any device, such as a PC,<br />

phone or personal laptop. Data never<br />

resides on the end device; rather, data<br />

and applications remain behind the firewall,<br />

in the cloud or data center. Information<br />

stays even more secure via controls<br />

www.MIT-kmi.com


that determine the level of access that<br />

users have to government data. For example,<br />

IT managers can set the security controls<br />

to allow a user access to only certain<br />

types of databases, while also prohibiting<br />

the user from printing or downloading<br />

information onto a storage device. These<br />

security protocols—including limits on<br />

download and upload capabilities—can<br />

also change based on the type and location<br />

of device used to access the data.<br />

This provides a strong level of security<br />

against internal as well as external<br />

threats, and can help prevent breaches<br />

similar to WikiLeaks. Finally, the virtual<br />

desktop and server environment provides<br />

more robust continuity of operations, an<br />

important requirement for every DoD<br />

organization.<br />

Reduced costs. Virtualization streamlines<br />

the management and provisioning<br />

of desktops and other devices. IT personnel<br />

can centrally manage user access,<br />

High-Performing<br />

Environment<br />

There have been many different definitions<br />

for virtualization in the IT industry.<br />

“Virtual” is a concept where an object<br />

appears to exist for all its functions, but may<br />

not be physical—similar to virtual private<br />

networks, for instance, where the network is<br />

not physically private, but appears and functions<br />

as a private network. Virtualization of<br />

hardware gives you a whole operating environment<br />

all inter-networked to each other,<br />

instead of a single server.<br />

evolutIon of<br />

vIrtualIzatIon<br />

Experiments were done with different<br />

architectures, where one “host” operating<br />

system was running one or more “guest”<br />

operating systems. However, the challenge of<br />

networking them and creating a stable and<br />

high-performing environment was solved<br />

in the past few years, making virtualization<br />

a reality. Modern virtual machine software<br />

provides an entire, networked virtual environment,<br />

where one gets an entire data<br />

center, all communicating with each other<br />

passwords, patches, provisioning and<br />

other tasks, saving time and money.<br />

Desktops, laptops and other devices last<br />

years longer, because the virtual desktop<br />

alleviates operating system and memory<br />

requirements on the end device itself.<br />

Getting users up and running following<br />

PC crashes is also much easier, because<br />

their entire desktop resides in the data<br />

center rather than on the device itself. In<br />

addition to saving money in IT management,<br />

organizations gain enormous efficiencies<br />

from the ability of employees to<br />

work securely on any authorized device at<br />

home, on the road or anywhere they have<br />

a connection.<br />

Effective consolidation. In January,<br />

Secretary of Defense Robert Gates<br />

said the Pentagon plans to consolidate<br />

hundreds of data centers. Virtualization<br />

will drive that consolidation because it<br />

enables a single server to carry the storage<br />

and application workloads of mul-<br />

Modern virtual machine software provides<br />

an entire, networked virtual environment,<br />

where one gets an entire data center.<br />

By Roger Raj, CISSP CISA, Senior Technical Director<br />

Oracle Corp. Advanced Technology Services<br />

roger.raj@oracle.com<br />

with logical TCP/IP connections, sharing a<br />

physical network card.<br />

key BenefIts of<br />

vIrtualIzatIon<br />

Virtualization of hardware has several<br />

benefits, including the following:<br />

• Smaller footprint, compared to<br />

physical, interconnected servers,<br />

but yet achieving most of the benefits<br />

of a distributed architecture.<br />

Such smaller footprints may be<br />

needed for quick deployments in<br />

military, especially in smaller planes<br />

and smaller ships used for war/rescue<br />

missions. Power requirements<br />

are also lower, due to the smaller<br />

footprint and uninterrupted power<br />

supply can get these machines running<br />

for many hours, when they are<br />

away from shore, with no access to<br />

full power supply.<br />

• Lower costs in most cases, as a<br />

single hardware can be effectively<br />

tiple virtual servers. Virtualization also<br />

automates and streamlines server management,<br />

further supporting the consolidation<br />

effort and cutting costs.<br />

Occasionally, someone who is unfamiliar<br />

with the virtualization concept may<br />

wonder whether a virtual desktop is just<br />

a thin client—a computer that accesses<br />

one or two simple applications or runs a<br />

routine operation, such as e-mail. This, of<br />

course, is incorrect. The virtual desktop<br />

delivers the end-user’s entire computer<br />

environment.<br />

Citrix delivers virtual desktops and<br />

services to all branches of the military,<br />

helping our DoD customers consolidate<br />

datacenters and streamline IT<br />

management while improving IT security.<br />

But the most important benefit of<br />

virtualization may be the resulting savings,<br />

which DoD can repurpose for other<br />

priority programs without sacrificing IT<br />

performance.<br />

www.MIT-kmi.com MIT 15.1 | 33


used to provide multiple “virtual”<br />

servers.<br />

• Efficient use of hardware—in many<br />

cases, hardware is of excess capacity,<br />

causing organizations to have<br />

wasted resources.<br />

• Backup/recovery of the operating<br />

environment is very much simplified—in<br />

most cases, the “guest”<br />

operating systems are simply one or<br />

two files, which can be copied to a<br />

backup media, without logical complications<br />

of copying out multiple<br />

volumes.<br />

• In addition to production deployment,<br />

virtual machines are also<br />

ideal for research and development<br />

and prototyping. Thus, organizations<br />

can create prototypes<br />

and demonstration environment,<br />

before settling for a high cost data<br />

Mature Technology<br />

Regarded as a novelty just a few years<br />

ago, virtualization has become a mature<br />

technology that will be the standard architecture<br />

for IT departments for the foreseeable<br />

future. The many concrete benefits<br />

of virtualizing an infrastructure make this<br />

paradigm shift inevitable, including reduced<br />

administration, better security, greater efficiency,<br />

more uptime, less power and cooling,<br />

and lower costs.<br />

“Virtualization” is a broad term that<br />

includes different types of solutions. Each<br />

provides the benefits of virtualization, but is<br />

better suited to a particular type of customer<br />

circumstances. CDS recognizes four major<br />

subgenres of virtualization:<br />

center and refine such a prototype,<br />

until decisions are made on<br />

the actual architecture of the data<br />

center.<br />

key ProvIders of<br />

vIrtualIzatIon<br />

Virtualization vendors are of different<br />

types; some are specific to operating systems<br />

such as Linux, Windows or Mac OS. Many<br />

are also many types of virtualizations, such<br />

as full virtualization, hardware assisted virtualization,<br />

operating system-level virtualization<br />

and so on.<br />

Key providers include Oracle/Sun, whose<br />

VirtualBox is a family of powerful x86 virtualization<br />

products for enterprise as well<br />

as home use. Not only is VirtualBox an<br />

extremely feature rich, high performance<br />

product for enterprise customers, it is also<br />

By Charles Rarick, Vice President of Sales and Technology<br />

CDS<br />

• Desktop virtualization, which transparently<br />

provides users a familiar<br />

work environment while centralizing<br />

their applications and data.<br />

• Server virtualization, which unties<br />

operating systems from the underlying<br />

hardware, enhancing flexibility<br />

and utilization<br />

• Storage virtualization, which simplifies<br />

data handling and improves<br />

34 | MIT 15.1<br />

the only professional solution that is freely<br />

available as open source software under the<br />

terms of the GNU <strong>Gen</strong>eral Public License.<br />

Among other providers are VMWare, Rightscale,<br />

eNormany, Gigaspaces and Citrix.<br />

some of the drawBaCks<br />

of vIrtualIzatIon<br />

Some key areas of caution include security<br />

of the environment. Since the machines<br />

can be easily cloned, there is some concern<br />

in the industry about data falling into unauthorized<br />

hands. There are several solutions<br />

to mitigate such as risk, including Oracle’s<br />

Transparent Data Encryption, where the<br />

keys can be stored separately from the virtual<br />

machine’s data files. Other concerns include<br />

misuse of licenses. But with proper license<br />

management enforcement within the organization,<br />

this concern can be overcome.<br />

Virtualization will be the standard architecture for IT<br />

departments for the foreseeable future.<br />

back end data protection and performance.<br />

• Cloud computing, which has<br />

become an abstraction related to<br />

remote access, utility computing,<br />

virtualization and SaaS/IaaS/PaaS.<br />

The objective is that the user does<br />

not necessarily know (or care)<br />

where his/her apps, data, or processing<br />

are, but only that they can<br />

be accessed through a variety of<br />

devices.<br />

Each of these types of virtualization can<br />

be implemented in several different ways,<br />

and combined to maximize the benefits of<br />

the virtualized infrastructure. In missioncritical<br />

environments a fully integrated<br />

platform is essential to ensure high availability,<br />

ease of migration and to future proof<br />

secure solutions.<br />

CDS’ proven approach is called Mission<br />

Application Virtualization Environment<br />

(MAVEN). MAVEN is a preconfigured virtual<br />

environment that automatically detects<br />

hardware failures and transfers critical applications<br />

to other physical servers, restarting<br />

them in 60 seconds or less. Administrators<br />

can upgrade applications and operating systems<br />

centrally, rather than attempting to<br />

manage patches and versions across hundreds<br />

of workstations.<br />

Migration from existing applications to<br />

the virtual MAVEN environment requires<br />

little or no modification. MAVEN also supports<br />

any application, such as Microsoft<br />

Exchange and SQL, COMPOSE, and Oracle<br />

Cross Domain Security Express. MAVEN is<br />

in active deployment at U.S. Coast Guard<br />

Headquarters CG-26, with further deployments<br />

planned at other military sites.<br />

A major benefit of this approach is the ability<br />

to take commodity server hardware from<br />

many IT providers, thus avoiding forklift<br />

upgrades.<br />

With the advent of the cloud-computing<br />

trend, organizations look toward a new<br />

range of possibilities for streamlining data<br />

center operations, as well as new concerns<br />

and threats. With the right expertise cloud<br />

computing offers managed expenses and<br />

administration, or in combination “private<br />

clouds” can also improve productivity while<br />

maintaining security and control. O<br />

www.MIT-kmi.com


The advertisers index is provided as a service to our readers. <strong>KMI</strong> cannot be held responsible for discrepancies due to last-minute changes or alterations.<br />

MIT CALEND A R & DI RECTO RY<br />

aDVertisers inDex<br />

Gamber-Johnson ............................ 9<br />

www.gamberjohnson.com/federal_military<br />

<strong>Gen</strong>eral Dynamics <strong>C4</strong> Systems-Needham ........<strong>C4</strong><br />

www.gdc4s.com/secureproducts<br />

Harris RF ................................. C2<br />

www.harris117g.com<br />

L-3 Communication Systems-West ............. 20<br />

www.l-3com.com/csw<br />

Redcom ................................... 5<br />

www.redcom.com<br />

Solarwinds ............................... 33<br />

www.solarwinds.com<br />

Sprint ................................... C3<br />

www.sprint.com/convergence<br />

Tactical <strong>C4</strong> Conference & Exhibition ........... 24<br />

www.tacticalc4.com<br />

TCS ...................................... 3<br />

www.telecomsys.com<br />

Tellabs ................................... 23<br />

www.tellabs.com/olan<br />

University of Maryland University College ....... 29<br />

http://military.umuc.edu/cyberspace<br />

ViaSat ................................... 27<br />

www.viasat.com/eclypt<br />

calenDar<br />

February 23-25, 2011<br />

AUSA ILW Winter<br />

Symposium<br />

Fort Lauderdale, Fla.<br />

www.ausa.org<br />

March 14-17, 2011<br />

Satellite 2011<br />

Washington, D.C.<br />

www.satellitetoday.com<br />

March 28-30, 2011<br />

AFCEA Belvoir<br />

Industry Days<br />

National Harbor, Md.<br />

www.afceabelvoir.org<br />

March 31-April 2, 2011<br />

CyberFutures<br />

Conference<br />

National Harbor, Md.<br />

www.afa.org<br />

April 11-13, 2011<br />

Sea-Air-Space 2011<br />

National Harbor, Md.<br />

www.seaairspace.org<br />

April 19-21, 2011<br />

Tactical <strong>C4</strong> Conference<br />

and Exhibition<br />

Atlanta, Ga.<br />

www.technologyforums.com<br />

NEXTISSUE<br />

Cover and In-Depth<br />

Interview with:<br />

Gary L. Winkler<br />

Program Executive Officer<br />

Enterprise Information<br />

Systems<br />

Army<br />

Features:<br />

Closing Deadline: March 4, 2011<br />

March 2011<br />

Volume 15, Issue 2<br />

Industry Roundtable: SATCOM<br />

What role do you see for the commercial SATCOM sector<br />

in providing connectivity for government/military UAVs<br />

and ISR capabilities?<br />

COTM Antennas<br />

Advances in antenna technology are offering warfighters<br />

enhanced communications-on-the-move (COTM)<br />

capabilities.<br />

Joint Interoperability<br />

Military exercises and research projects are probing the<br />

opportunities and challenges of achieving information<br />

interoperability among multi-service and multi-nation<br />

joint task forces.<br />

Message Classification<br />

Data leak and message classification companies are<br />

joining the fight to prevent the exposure of sensitive<br />

information such as that made public in recent WikiLeaks<br />

episodes.<br />

NGEN Contract<br />

As the Navy moves ahead with the Next <strong>Gen</strong>eration<br />

Enterprise Network (NGEN), which will be the follow-on<br />

to the Navy <strong>Marine</strong> Corps Intranet, companies are putting<br />

together their teams and strategies for winning this huge<br />

contract competition.<br />

www.MIT-kmi.com MIT 15.1 | 35


inDustry interView Military inforMation technology<br />

Q: What types of products and services does<br />

Deloitte offer to military and other government<br />

customers?<br />

A: Deloitte focuses almost exclusively on<br />

delivering professional services to our<br />

clients, and today is the largest private professional<br />

services organization in the world.<br />

Deloitte entered the federal consulting<br />

market about six years ago and significantly<br />

accelerated our commitment to the market<br />

through key acquisitions over the past two<br />

years. So while still relatively young in the<br />

federal and defense market, Deloitte already<br />

ranks in the top 20 of most government<br />

contractor lists. Deloitte’s professional services<br />

provide the government with a virtually<br />

unmatched breadth of capabilities ranging<br />

from strategy, operations, technology, human<br />

capital, business and technology risk, and<br />

financial advisory services. Deloitte strives<br />

to be the standard of excellence and the<br />

first choice of our clients to assist with their<br />

most complex, strategic challenges across<br />

our capability areas.<br />

Q: What different benefits does your company<br />

provide its customers in comparison<br />

with other companies in your field?<br />

A: The breadth of Deloitte’s capabilities combined<br />

with tight integration with Deloitte’s<br />

commercial practices distinguishes us in the<br />

market. The ability to leverage the knowledge,<br />

skills and experiences of our commercial<br />

practices, in addition to our government past<br />

performances and prior military experience<br />

of many of our professionals, allows Deloitte<br />

to provide services and solutions to agencies<br />

in support of achieving their strategic goals.<br />

In Deloitte’s federal technology practice, we<br />

help agencies in their efforts to address critical<br />

information and technology challenges,<br />

providing services related to data center consolidation,<br />

data analytics, virtualization and<br />

mobile applications, to name a few.<br />

Q: What are some of the most significant<br />

programs your company is currently working<br />

on with the military?<br />

A: Deloitte’s DoD practice serves a broad<br />

range of clients including each military<br />

36 | MIT 15.1<br />

James D. Brock<br />

Principal<br />

Deloitte Consulting LLP<br />

service, many OSD agencies and activities,<br />

as well as some of the COCOMs. While our<br />

practice is primarily supporting our clients<br />

in CONUS, we do have projects OCONUS.<br />

Deloitte’s culture and values create an environment<br />

where our professionals are constantly<br />

challenging themselves to identify<br />

new or additional ways to help our clients<br />

achieve their objectives.<br />

Some of Deloitte’s current programs<br />

include:<br />

• Assisting a client with an analysis of<br />

a large technology outsourcing situation<br />

where Deloitte helped identify<br />

very large savings for the client.<br />

• Leveraging the combination of<br />

Deloitte’s financial experience<br />

and ERP experience, where we are<br />

involved in seven of the 10 largest<br />

implementations in the world, to lead<br />

the development and implementation<br />

of a large intra-service ERP.<br />

• Supporting a number of commands<br />

and agencies in the analysis of data<br />

center consolidation and other technology<br />

cost savings initiatives leveraging<br />

our commercial merger and<br />

acquisitions experiences.<br />

• Supporting the operations of a large<br />

PEO office with a technology-oriented<br />

set of programs through many aspects<br />

of the PEO’s operations.<br />

• Providing many aspects of the business<br />

and technology operations support<br />

to a tier 1 data center within one<br />

of the services.<br />

• Providing financial data analytics,<br />

financial consolidations and budgeting<br />

support to a number of defense<br />

agencies.<br />

• Support for counter-threat finance<br />

analytics and anti-fraud analysis for<br />

multiple DoD organizations<br />

Q: How are you working to strengthen the<br />

security of your solutions?<br />

A: Deloitte’s technology risk practice has a<br />

depth of skills around the security and privacy<br />

requirements of our defense and government<br />

clients. Again, there is tight integration<br />

to our commercial business, leveraging the<br />

skills developed serving many of our financial<br />

services clients and those from other industries.<br />

The technology risk practice works very<br />

closely with our other groups to strengthen<br />

the security and privacy of the services we<br />

offer to clients.<br />

In addition, because we are broadly vendor<br />

neutral, we have been able to work with a<br />

number of our clients on their overall cyberstrategies<br />

without creating OCI issues or having<br />

a potential internal bias toward particular<br />

solutions. While Deloitte will clearly make<br />

collaborating decisions with a particular vendor<br />

in certain situations where the client’s<br />

need requires it, Deloitte’s position as an<br />

organization is to remain vendor neutral and<br />

make recommendations based on a particular<br />

client’s requirements. This approach is part<br />

of Deloitte’s culture and values that permeate<br />

the entire organization.<br />

Q: Is there anything else you’d like to add?<br />

A: We are passionate about serving the<br />

Department of Defense. Many of our leaders<br />

either served in uniform or in civil service<br />

and we are actively involved with multiple<br />

wounded warrior and veteran organizations.<br />

While Deloitte is very proud of our position as<br />

the largest private professional services organization<br />

in the world, we are really excited<br />

when others recognize our success through<br />

external rankings. In most technology and<br />

functional areas, as well as most industries,<br />

Deloitte is continually ranked in the top<br />

three by multiple outside researchers. We are<br />

proud of those rankings and believe it is<br />

a reflection of the high caliber professionals<br />

who make up our practices along with<br />

our continued focus on helping our clients<br />

achieve their objectives. O<br />

www.MIT-kmi.com


Give your agency<br />

the fl exibility to adapt<br />

to any situation. Get a secure, reliable and affordable<br />

connection to all the information that’s critical to your agency.<br />

Converged Solutions from Sprint utilizes a fl exible IP core for<br />

voice, video and data. And our Networx Enterprise contract will<br />

consolidate your costs for maximum effi ciency. So you can prepare<br />

your workforce for anything. Welcome to the Now Network. <br />

1-800-SPRINT-1 sprint.com/convergence<br />

Coverage not available everywhere. The 3G Sprint Mobile Broadband Network reaches over 258 million people. Check sprint.com for Sprint 4G coverage. ©2010 Sprint. Sprint and the logo are trademarks of Sprint. Other marks are the property of their respective owners.


At risk.<br />

At ease.<br />

With over 135,000 units fielded, TACLANE ® encryptors make up the largest<br />

deployed base of certified In-Line Network Encryptors (INEs) in the world.<br />

Reliable, durable and field proven, this dependable powerhouse eliminates<br />

the risk of interception.<br />

TACLANE-Micro (KG-175D)<br />

• 200 Mb/s Full Bandwidth Encryptor<br />

• Low Size, Weight and Power (SWaP)<br />

• Foreign Interoperable<br />

• Fast Setup and Easy to Use<br />

• Superior Customer Support<br />

• Trade-in Program Available<br />

The TACLANE-Micro: It takes the risk out of securing communications.<br />

781-455-2800<br />

888-897-3148 (toll-free)<br />

infosec@gdc4s.com<br />

www.gdc4s.com/secureproducts<br />

TACLANE is a registered trademark of <strong>Gen</strong>eral Dynamics. © 2011 <strong>Gen</strong>eral Dynamics. ® Reg. U.S. Pat. & Tm. Off. <strong>Gen</strong>eral Dynamics reserves the right to make changes in its products and specifications at anytime and without notice.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!