mit 16-7 (august 2012)

32
www.MIT-kmi.com C4 August 2012 Volume 16, Issue 7 The Voice of Military Communications and Computing Information Dominator Lt. Gen. Michael J. Basla Chief, Information Dominance Chief Information Officer Air Force Network Integration Evaluation O Cyber-Situational Awareness Bring Your Own Device O Comsatcom Center Update

Upload: kmi-media-group

Post on 06-Mar-2016

213 views

Category:

Documents


0 download

DESCRIPTION

Military Information Technology, Volume 16 Issue 7, August 2012

TRANSCRIPT

Page 1: MIT 16-7 (August 2012)

www.MIT-kmi.com

C4August 2012

Volume 16, Issue 7

The Voice of Military Communications and Computing

Information Dominator

Lt. Gen. Michael J. Basla

Chief, Information DominanceChief Information OfficerAir Force

Network Integration Evaluation O Cyber-Situational AwarenessBring Your Own Device O Comsatcom Center Update

Page 2: MIT 16-7 (August 2012)

Blue Coat is a leading provider of Web security and WAN optimization solutions. We offer solutions that provide the visibility, acceleration and security required to optimize and secure the flow of information to any user, on any network, anywhere.

ALWAYS ON. ALWAYS FAST. ALWAYS SAFE.

SECURE THE WEB while giving government visibility and control

Accelerate agency networks with WANOPTIMIZATION

Implement manageable, flexible and mobile CLOUD SERVICES – anywhere in the world

WEB: bluecoat.comBLOG: federalblueprint.com

Page 3: MIT 16-7 (August 2012)

Military inforMation technology august 2012 VoluMe 16 • issue 7

features coVer / Q&a

16

DepartMents

inDustry interView

28

Lieutenant General Michael J. BaslaChief, Information Dominance

Chief Information OfficerU.S. Air Force

Tim CollinsFederal Sales Director

Panasonic for Government

2

3

14

26

27

Editor’s Perspective

Program Notes/People

Data Bytes

COTSacopia

Resource Center

21

NIEs Guide Army Tactical CommsFollowing a massive field exercise that proved the network’s strength as a combat enabler, the Army is on the brink of fielding its new tactical communications network to up to eight brigade combat teams.By Claire Heininger Schwerin

23

On-the-Move TransformationAn initial operational test of the Warfighter Information Network-Tactical Increment 2 highlighted the ability to push and pull large files and big pieces of data to mobile units in the field.By Amy Walker

25

Command Posts for CompaniesAn interview with Major Brian Mack, the Network Integration Evaluation 12.2 Company Command Post trail boss for Product Manager for Command Post Systems and Integration.

7

Cyber-Situational AwarenessThe military and industry are stepping up efforts to enhance decision making by having greater visibility and awareness of the cyber-domain.By Peter Buxbaum

12

COMSATCOM Center UpdateAn update on the latest news from the Defense Information Systems Agency’s Commercial Satellite Communications (COMSATCOM) Center.

4

“Bring Your Own” DilemmaLike many large organizations today that are uncertain about how to handle the booming popularity of employee-owned smartphones and other personal electronic devices in the workplace, the Army and other services are eyeing the possible benefits and risks of “bring your own device” policies. By Karen E. Thuermer

Special Report: NIE 12.2

Page 4: MIT 16-7 (August 2012)

In addition to laying out the Department of Defense’s long-term approach to the migration to cloud computing, Chief Information Officer Teri Takai’s new cloud strategy document thrusts the Defense Information Systems Agency (DISA) into a vital new role.

The strategy, released in July, seeks to move the department’s current network applications from a duplicative, cumbersome and costly set of application silos to a more agile, secure and cost-effective service environment.  In addition, it names DISA as the enterprise cloud service broker to help maintain mission assurance and information interoperability within the new strategy. 

That role is critical because, as the document acknowledges, harvesting the potential benefits of cloud computing depends on the ability to manage “the new risks associated with an increasing dependence on rapidly emerging commercial technologies.”

While DoD has special security and other considerations that DISA will make sure are met, the need for a cloud services broker is also becoming evident in the private sector, as companies seek help in navigating the market and bundling services for greater cost efficiency. The field is still evolving, but already a number of firms have arisen that help organizations “turn cloud services into what they need to make their business run,” according to David Mitchell Smith, a Gartner fellow and vice president of research.

Similarly, DISA’s mission will be to consolidate demand for cloud services across the department and negotiate the best rates for usage. At the same time, it will help defense organizations tailor services to meet their unique needs, while also ensuring that the department’s information assurance and cybersecurity standards are met.

Noting that DISA’s role will be to promote private sector cloud services that “provide a better capability at a lower cost with the same or greater degree of security as government-provided services,” the document requires that agencies use the brokerage service unless they can obtain a waiver from the CIO’s office.

Harrison DonnellyEditor

EDITOR’S PERSPECTIVE

The Voice of Military Communications and Computing

eDitorial

Managing EditorHarrison Donnelly [email protected]

Online Editorial ManagerLaura Davis [email protected]

Copy EditorLaural Hobbes [email protected]

CorrespondentsAdam Baddeley • Peter Buxbaum Cheryl Gerber • Karen E. Thuermer

art & Design

Art DirectorJennifer Owers [email protected]

Senior Graphic DesignerJittima Saiwongnuan [email protected]

Graphic Designers Amanda Kirsch [email protected] Morris [email protected] Waring [email protected]

aDVertising

Account ExecutiveCheri Anderson [email protected]

KMi MeDia groupPublisherKirk Brown [email protected]

Chief Executive OfficerJack Kerrigan [email protected]

Chief Financial OfficerConstance Kerrigan [email protected]

Executive Vice PresidentDavid Leaf [email protected]

Editor-In-ChiefJeff McKaughan [email protected]

ControllerGigi Castro [email protected]

Operations AssistantCasandra Jones [email protected]

Trade Show CoordinatorHolly Foster [email protected]

operations, circulation & proDuction

Circulation & Marketing AdministratorDuane Ebanks [email protected]

Data SpecialistsArielle Hill [email protected] Johnson [email protected] Walker [email protected] Villanueva [email protected] Winston [email protected]

a prouD MeMber of

subscription inforMationMilitary Information Technology

ISSN 1097-1041is published 11 times a year by KMI Media Group.

All Rights Reserved. Reproduction without permission is strictly forbidden.

© Copyright 2012. Military Information Technology is free

to qualified members of the U.S. military, employees of the U.S. government and

non-U.S. foreign service based in the U.S. All others: $65 per year.Foreign: $149 per year.

corporate offices

KMI Media Group15800 Crabbs Branch Way, Suite 300

Rockville, MD 20855-2604 USATelephone: (301) 670-5700

Fax: (301) 670-5701Web: www.MIT-kmi.com

Military inforMation technology

Volume 16, Issue 7 • August 2012

KMi MeDia group Magazines anD websites

www.GIF-kmi.com

Geospatial Intelligence

Forum

www.BCD-kmi.com

June 2012Volume 1, Issue 1

www.BCD-kmi.com

Border Threat Prevention and CBRNE Response

Border Protector

Michael J. Fisher

ChiefU.S. Border PatrolU.S. Customs and Border Protection

Wide Area Aerial Surveillance O Hazmat Disaster ResponseTactical Communications O P-3 Program

SPECIAL SECTION:Integrated Fixed Towers

Leadership Insight:Robert S. BrayAssistant Administrator for Law Enforcement/Director of the Federal Air Marshal Service

Border & CBRNE Defense

www.MAE-kmi.com

Military AdvancedEducation

www.MIT-kmi.com

Military Information Technology

www.GCT-kmi.com

Ground Combat

Technology

www.MLF-kmi.com

Military Logistics Forum

www.M2VA-kmi.com

Military Medical & Veterans

Affairs Forum

www.MT2-kmi.com

Military Training Technology

www.SOTECH-kmi.com

Special Operations Technology

www.TISR-kmi.com

Tactical ISR Technology

www.USCGF-kmi.com

U.S. Coast Guard Forum

Page 5: MIT 16-7 (August 2012)

www.MIT-kmi.com MIT 16.7 | 3

Army Brigadier General Lawrence W. Brock III, U.S. Army Reserve, has been nominated for the rank of major general and for assignment as the commanding general, 335th Signal Command (Theater), East Point, Ga.  Brock is currently serving as the command’s deputy commanding general.

Air Force Brigadier General Donald S. George has been assigned as deputy chief, Central Security Service, National Security Agency.

Gregory L. Garcia, a member of the Senior Executive Service, has been named executive director of the Army Information Technology Agency. His previous experience includes serving as deputy director,

strategic communications for U.S. Forces-Iraq, and as director of the Air Force 754th Electronic Systems Group.

Mary M. Gillam has been appointed to the Senior Executive Service and is assigned as director, technology and innovation, Office of the Deputy Chief Management Officer.  Gillam previously served as an associate with Booz Allen Hamilton, supporting the secretary of the Air Force’s chief information officer.

Arati Prabhakar, who formerly headed the National Institute of Standards and Technology, has been named director of the Defense Advanced Research Projects Agency.

Dave Schmitz has been named for the newly created position of chief operating officer of Cubic Defense Applications, where he will be responsible for all facets of worldwide operations, engineering and product line day-to-day performance, and will

directly support business development initiatives.

General Dynamics Advanced Information Systems has hired Edward A. Timmes Jr. as vice president of its intelligence systems business in its Cyber Systems division. Timmes will lead an organization focused on providing innovative solutions designed to harden systems, reduce vulnerabilities and defend against cyber attacks.

Compiled by KMi Media Group staffPROGRAM NOTES

Compiled by KMi Media Group staffPEOPLE

The Army’s next-generation friendly force tracking and messaging system has crossed a key threshold in its path to fielding.

The recent Milestone C decision for Joint Battle Command-Platform (JBC-P) moved the program from the engineering and manufacturing development phase to the production and deployment phase. Next up for JBC-P is a limited user test at the Network Integration Evaluation (NIE) 13.1 this fall, followed by an initial operational test and evaluation at NIE 13.2 in the spring of 2013. Those tests will lead to a fielding decision by the Army.

JBC-P is the follow-on program of record for Force XXI Battle Command Brigade and Below/Blue Force Tracking (FBCB2/BFT), which allows warfighters in vehicles, aircraft and command posts to track friendly forces and exchange messages in order to synchronize operations and reduce fratricide. It introduces a new user interface with intuitive features like touch-to-zoom maps and drag-and-drop icons, which received positive feedback from soldiers at the recent NIE 12.2.

“The idea is to make it more user-friendly for the Nintendo-Xbox generation,” said Captain Ryan McNally, a company commander with the 2nd Brigade, 1st Armored Division who used JBC-P during NIE 12.2. “It’s almost as easy to use as your computer at home.”

The JBC-P screen also integrates the functionality of Tactical Ground Reporting (TIGR), a multimedia reporting system that allows lower-echelon soldiers to digitally capture, report and retrieve patrol data such as common inci-dents, residents and leaders of a village.

“It’s good enough to get you down to the street level view,” McNally said. “As long as somebody has been there before and has that imagery uploaded into TIGR, you can see what they’ve seen as you drive down the road.”

The other major step forward that comes with JBC-P is the introduction of networked handheld devices that will deliver a new level of mission command

and situational awareness to small units. For the first time, leaders in vehicles and command posts will be able to view the precise locations of dismounted forces.

A handheld version of JBC-P software will run on Nett Warrior, a soldier-worn, smartphone-like mission command system running various mission apps. These handhelds will be fielded to team leaders and above, allowing them to communicate seamlessly within their units and with higher headquarters. This combination, accomplished through the Rifleman Radio, will deliver timely blue force tracking information down to lower echelons, specifically at the team leader through platoon leader level.

An interim step in the evolution of FBCB2 to JBC-P is the Joint Capabilities Release (JCR), which equips users with a faster satellite network known as BFT 2, Marine Corps interoperability, secure data encryption, chat room capability and other features. JCR is being fielded as part of Capability Set 13, the Army’s first integrated package of tactical communications gear that will be fielded to up to eight brigade combat teams starting in October.

JBC-P also serves as the first version of the Mounted Computing Environment (MCE), one of six computing environments comprising the Army’s Common Operating Environment, a commercially based set of computing technologies and standards required for the network and each of its applica-tions and systems. The vehicle-based MCE will leverage JBC-P investment to provide an environment for an integrated suite of mission command appli-cations and services on various platforms. It will clearly define standards and processes for mission command software, reducing development time and cost. The system will use common data models with other CEs in order to achieve seamless, integrated mission command across echelons to the tactical edge.

New Generation of Friendly Force Tracking

Gregory L. Garcia

Page 6: MIT 16-7 (August 2012)

By Karen e. Thuermer

mIT CorrespondenT

mIlITary grapples wITh rIsKs and BenefITs of allowIng employees To use TheIr own eleCTronIC devICes for worK.

Like many large organizations today that are uncertain about how to handle the booming popularity of employee-owned smart-phones and other personal electronic devices in the workplace, the Army and other services are eyeing the possible benefits and risks of “bring your own device” (BYOD) policies.

“The primary interest of BYOD to the Army is that it has the potential to extend mobile capability to users who would not oth-erwise be provided a government furnished device,” said Lieutenant Colonel Matthew Dosmann, mobility lead for the office of the Army CIO/G-6. “BYOD also has the possibility of reducing the number of devices someone is forced to carry.”

Consider the video released on YouTube two years ago called the “Army Learning Concept 2015.” This fast-moving portrayal of warfighters in real situations shows how they could use smartphones to quickly train themselves for situations when they need it.

“Training is one of the more straightforward use cases for BYOD,” commented Dosmann. “The soldier would be able to access their training from their personal device to keep their skills current and to get training they may not normally be able to receive.”

Such instruction, he explained, could take place inside or out-side of the classroom or at the point of need.

“Another use case is providing medical treatment to soldiers convalescing away from DoD medical facilities,” Dosmann added. “A strong BYOD solution would address the requirements for a clinical consult.”

While smartphone technology, driven by Google’s Android and Apple’s iOS operating systems, has been around for some years, the Department of Defense and other federal agencies have been slow at examining the potential benefits of allowing their employees to utilize their own smartphone devices at work. But the Army and Defense Information Systems Agency (DISA) now are plan-ning soon to issue a broad agency announcement for a third party approach to securing mobile devices.

polICy faCTors

While federal agencies are definitely moving in the direction of using BYOD, up until now the DoD has been slow because of policy, observed Eugene Liderman, director of public sector for the Office of the Chief Technology Officer at Good Technology.

“On the DoD side, BYOD is more a discussion topic because sev-eral things still have to happen,” Liderman said. “Today, it prohibits any government data on a personal device, and that is why we have policy guidelines.”

According to Liderman, the big challenge is the potential risk of sensitive data leaking onto or out of the network.

“When that happens, the policy dictates that the device on which that has occurred must be destroyed in most cases,” he said. “So this becomes a concern because the end user is not necessarily going to sign off on letting the federal government destroy their device.”

Dosmann points out that although policy is the most crucial element impacting the use of BYOD in DoD today, the department’s policy for BYOD is, to a great degree, undetermined.

“We have policies that govern our current remote access and teleworking use cases,” he said. “That would be the logical starting point.”

At the heart of that policy is DoD Directive 8100.2, “Use of Com-mercial Wireless Devices, Services, and Technologies in the Depart-ment of Defense Global Information Grid (GIG).” This assigns responsibilities for the use of commercial wireless devices, services and technologies in the GIG, and describes what is required of wire-less devices that attach or communicate with DoD networks and prohibits any government data from appearing on a personal device.

Along with Homeland Security Presidential Directive 12 (HSPD-12), the DoD directive is used by other federal agencies to define their own wireless security requirements. These standards require strong, two-factor authentication and credentialing solutions to gain access to government networks.

4 | MIT 16.7 www.MIT-kmi.com

Page 7: MIT 16-7 (August 2012)

There’s also the Federal Information Security Management Act

(FISMA), which mandates continuous monitoring of systems. As Daniel Ford, chief security officer of Fixmo, emphasized, “FISMA mandates continuous monitoring of all FISMA systems, but the gov-ernment cannot treat these smart devices in a manner consistent with the traditional computing environment.”

Essentially, FISMA defines a framework for managing informa-tion security that must be followed for all systems used or operated by a federal agency or by a contractor or other organization on behalf of a federal agency. This framework is further defined by the standards and guidelines developed by the National Institute of Standards and Technology.

Dosmann points out that as to DoD 8100.2 and FISMA, the use of a virtualized environment where the BYOD session is occurring on an Army server, versus on the device itself, would satisfy these requirements. “The virtualized environment also addresses data at rest issues as no data is stored on the device,” he stated.

seCurITy Issues

In some cases, the threats that afflict smart devices are the same as those from traditional laptops and desktops. Worms, viruses and Trojans are all present, as are privacy leaks within applications and websites.

“There are more attack vectors enabled particularly by smart-phones, however, such as fraudulent text messaging for profit, moni-toring voice calls, and extracting calendar and contact information,” noted James Brown, chief technology officer for StillSecure.

On a traditional operating system, calendar and contact appli-cations are not integrated into the operating system, so it’s more difficult for an application to access that data illicitly.

“On smartphone operating systems (like Android, iOS and Windows Mobile), these data stores are sharable across multiple applications—in fact, application capabilities are much more shar-able as well—which opens up a variety of new options for attackers,” Brown said.

The prominent threats include unauthorized access to business data on a lost or stolen device, which may occur due to weak pass-word controls on BYOD devices; OS rooting and jailbreaking, which leaves the device exposed to root access and dangerous permissions by third party apps; malicious applications and malware, which are amplified by the fact that IT can no longer restrict users from installing persona apps from third party storefronts; and privacy loss and identity theft.

“Here the iOS keychain can be easily compromised and cor-porate credentials can be retrieved, in many cases in plain-text format,” remarked Ford.

Also on the list are the increasing numbers of poorly designed commercial apps that access the user’s address book and upload the data to a third party server. While the creators of these apps may not have any malicious intent in mind, Ford pointed out that this mere threat could be developing into a compliance and regulatory issue.

Cyber-attacks that emanate from malicious code and exploits of web browsers and SMS on mobile devices represent yet another danger.

“Consumer-grade operating systems like iOS and Android have had known vulnerabilities in these areas, and hackers are now increasing their efforts on exploiting these devices as entry

points into corporate networks,” Ford remarked. “BYOD devices are prime targets thanks to more lax security policies and IT control.”

Another critical problem is the inability to wipe business data from a BYOD device due to personal privacy issues.

“For example, what happens if an employee leaves an organiza-tion?” Ford asked. “If it is a BYOD device, IT typically will not be permitted to wipe the device as it contains a considerable amount of personal information and is property of the individual. Even if they wipe the corporate email from the device, how do they ensure no other business documents and data are stored?”

Ford emphasized that secure distribution, monitoring and management of enterprise applications is becoming a critical topic, particularly with the rise of tablets. “Organizations need to under-stand the implications of distributing sensitive business apps to mobile devices, especially employee-owned devices where they may have less control and the device itself may be more vulnerable,” he said.

Consequently, Fixmo executives urge that a comprehensive solution must consider the use of an enterprise app store for man-aging distribution, application security analysis tools for vetting the security of applications, and on-device containment techniques to ensure that all business apps deployed to the device inherit the same core policies that are being applied to corporate email and other apps.

neTworK prIvIleges

The ways that IT administrators can identify which devices are government-issued and which are employee-owned, so that they can differentiate network access privileges, pose yet another issue. Brown suggests that perhaps the easiest and most consistent way to identify devices is to issue 802.1X client certificates and install them on government-issued devices, which can then be used to authenticate those devices and let them gain access to the proper parts of the network.

“Devices without these certificates may receive limited or no network access on government networks,” he said.

StillSecure’s network access control (NAC) product, Safe Access, aims to empower IT administrators to take control of their network, from a desktop to a mobile device and even a printer. “This elimi-nates risk to their corporate digital assets,” Brown said.

Fixmo SafeZone also simplifies the process dramatically. “For those devices that have the SafeZone workspace, organizations can choose which applications to expose to those users—whether it be corporate email, browsing, document access or custom applica-tions,” Ford said.

Another big issue is network performance and sufficient capac-ity, particularly as the use of tablets and smartphones on private Wi-Fi networks increases. “IT organizations will need to monitor and effectively forecast network and infrastructure requirements,” Ford said. “In this essence it is essential that networking best prac-tices are being used.”

“There are many networking and security devices out there today that can easily classify traffic based on the mission priority,” he said. “There is probably no legitimate reason why Facebook should receive the same priority on the network as an application that is required to perform the mission. So, use the tools that are already within the enterprise to ensure the mission.”

MIT 16.7 | 5www.MIT-kmi.com

Page 8: MIT 16-7 (August 2012)

While devices on their own generally use less data than a desk-top or laptop, the potential of a large number of devices significantly increases network requirements on an enterprise network.

“Generally, internal networks are likely to be minimally impacted, while the majority of the load is likely to be seen on Internet links,” remarked Brown. “It’s critical for network planners to take this additional load into account, and budget for it, as it can be a significant additional expense.”

Ultimately, the argument for a BYOD policy will have to rest on evidence that it will save the government money. Good Technol-ogy has successfully worked with the Department of Energy and its federally funded research and development labs to introduce a BYOD model as a means for reducing mobility costs due to budget-ary issues.

Liderman is adamant that BYOD “absolutely provides cost sav-ings to agencies and productivity. At the end of the day, when users have gone home from work, there is a high probability that they will take out their device and still check work,” he said.

Some in the industry contend that the jury is still out on whether or not BYOD can really save organizations money. Brown suggested that the BYOD movement is driven primarily by IT’s constituents. “Mobile devices are very popular and fast becoming an integral part of everyone’s lives. Even in the military, you can only say no so long before people tire of that answer and demand solu-tions that will allow them to work the way they want.”

DoD needs to ensure that the cost of the solution fits into its business case, Dosman said. “In addition, the appropriate terms of use agreement need to be in place, as well as determining what use cases are appropriate to the BYOD environment.”

“Mobile technology is a fast moving space with substantial developments every few months,” Dosman stated. “We are collabo-rating with our DoD partners and industry to ensure we are in a position to make best use of the technology as it becomes available.”

daTa managemenT soluTIons

So how might a vendor work with the military to advance its use of BYOD?

“Innovation that addresses a technological challenge is always helpful,” Dosmann said. “Currently, virtualization requires a lot of resources, such as bandwidth, and does not do well with intermit-tent connectivity.”

The Army has been exploring use of a Common Access Card (CAC) enabled virtualization mobile app, which has the additional benefit of streamlining the security process as a well designed vir-tual machine is not susceptible to malware infecting the device it runs on. But as Dosmann added, “CAC readers are cumbersome and expensive (though a portion of that is due to DoD and Army policy).”

Numerous mobile data management solutions are available that help set security policies, perform remote data wipes, require device encryption, limit the allowable apps on the device and other features. Some are limited, however, by each mobile operating system’s capabilities in each specific area, and also contribute to inconsistency in capabilities across different mobile operating sys-tems and versions.

StillSecure Safe Access offers the ability to identify mobile devices by their operating system type and limit their access to con-trolled resources across an enterprise network. “Mobile device users can authenticate themselves via a captive portal to gain additional

access to the network,” Brown said. “Safe Access can also place mobile users into specific virtual networks based on Windows Active Directory groups or user accounts so they receive the proper access on a user by user basis.”

StillSecure Safe Access is the most scalable and flexible network access control solution available, he maintained, adding that it has been successfully and continuously deployed in the military since the inception of the NAC market in 2004.

Safe Access is “highly reliable, offering active-active failover, fully integrated load balancing,” Brown said. “It has a purpose-built compliance testing engine, which is capable of checking literally thousands of compliance issues in seconds. It can be deployed in numerous locations on a network, using multiple methods for enforcement, and is network hardware agnostic, and it fully sup-ports BYOD.”

Good Technology has been teaming up and collaborating with a host of industry partners to enhance mobile application security, secure enterprise and government mobility solutions for iOS and Android, and to deliver new military grade secure Android devices for DoD agencies.

The integration of RSA’s Authentication Manager & Secure Authentication Engine with Good for Enterprise and Good Dynam-ics is resulting in the addition of two-factor authentication to iOS and Android apps, which will enhance mobile application security.

Good’s work with Actividentity, part of HID Global, is extending identify and access management capabilities to mobile devices with strong multi-factor authentication and smart card support. Since enterprises and government agencies must comply with standards such as the DoD Directive 8100.2 and HSPD-12, their technology aims to mobilize smart cards and secure element technology.

Good announced early this year that the first secure Android OS-based platform has been certified by DISA, which will allow Good for Government mobile device management and data loss prevention capabilities to be used on the GIG. This was the result of collaboration between Good Technology, Dell and other partners.

Fixmo’s two products, SafeZone and Sentinel, are designed to protect organizations from a wide host of potential threats. Fixmo Sentinel monitors the underlying system to detect potential com-promises, and OS rooting and tampering. Fixmo SafeZone keeps all corporate data and apps encrypted, contained and under IT control with application-level IT policies that are independent of the device-level policies. Fixmo SafeZone also blocks third party apps from accessing the business email, calendar or contact list since they are contained and controlled separate from the “native” personal apps.

Furthermore, Fixmo SafeZone protects against jailbroken or rooted OSs by not allowing the user to open the corporate work-space and any business-related apps if it detects that the OS has been rooted or jailbroken.

In addition, SafeZone addresses app issues in the event an employee leaves the organization. “IT can simply wipe SafeZone, and with it, all of the business apps and data including documents, the corporate browser cache and so on without impacting any of the personal data,” Ford said. O

www.MIT-kmi.com6 | MIT 16.7

For more information, contact MIT Editor Harrison Donnelly at [email protected] or search our online archives

for related stories at www.mit-kmi.com.

Page 9: MIT 16-7 (August 2012)

Commanders and warfighters constantly strive for battlefield situational awareness, in which information on movements and events is disseminated as they are hap-pening. At a higher level, harmful actions can—based on observation of individuals and objects, the analysis of sensor data and the interception of communications—be prevented.

These are the same goals that now also prevail in the cyber-domain: perform-ing reconnaissance on networks and sys-tems and keeping tabs on the actions of adversaries.

Cyber-situational awareness goes a step beyond cybersecurity and cyber-defense. Situational awareness needs to include a forward-leaning, proactive approach that enables network defenders to react to events in real time, instead of being constrained merely to analyzing occurrences after the fact.

The ability to quickly synthesize data, recognize patterns and dynamically adapt at machine speed is a critical factor in cyber-domain information dominance, observed Rich Gleason, director of cybersecurity at CSC.

Several military agen-cies, including the Defense Information Systems Agency, are devoting sig-nificant resources to cyber-situational awareness. One aspect of cyber-situational awareness that goes beyond other military domains is the involvement of the defense industrial base. Not only does the Department of Defense share information with con-tractors, but the private sec-tor is involved in providing cyber-environments to the military in many cases. The military also relies on the capabilities of its private-sec-tor partners to help achieve cyber-situational awareness.

As on the battlefield, achieving cyber-situational awareness involves the col-lection and analysis of enor-mous volumes of data. This presents technological challenges that the military often relies on the private sector to

solve. The private sector, for its part, is constantly devel-oping new technologies to allow better views and better analysis of the cyber-land-scape.

“Cyber-situational aware-ness seeks to enhance deci-sion making by having greater visibility and aware-ness of the cyber-domain,” said Manuel Hermosilla, chief of the NetOps Program Office at DISA. “It supports the full spectrum of opera-tions and includes the ability to direct and redirect capa-bilities to meet operational needs. We need to be aware of threats beyond the enter-prise. We need to know what is going on outside as well in order to defend ourselves.”

“The conversation should be around how to defeat a cyber-attack as it is happen-

ing,” said Diana Gowen, senior vice presi-dent and general manager at CenturyLink.

mIlITary and IndusTry sTep up efforTs To enhanCe deCIsIon maKIng By havIng greaTer vIsIBIlITy and awareness of The CyBer-domaIn.

MIT 16.7 | 7www.MIT-kmi.com

Cyber-Situational AwarenessBy peTer BuxBaum

mIT CorrespondenT

Kathy Warden

Diana Gowen

[email protected]

Page 10: MIT 16-7 (August 2012)

www.MIT-kmi.com8 | MIT 16.7

“The government recognizes that industry has some capa-bilities and skills in this area. Armed with some additional data the private sector can collaborate with govern-ment to do a much better job of defending the nation’s cyber-domains.”

“I look at cyber as another military domain, the same as air, space and ground,” said Kathy Warden, vice president of the Cyber Intelligence Divi-sion at Northrop Grumman. “The end result you want to achieve is the same. But is it harder to visualize what is going on inside a network. Cyber-situational awareness is another element that warf-ighters need to get a complete picture of their environment.”

Commanders and warf-ighters want information on cyber-situational awareness as it pertains to the missions they are executing, said Dylan DeAnda, director of technical solutions at Kratos Defense and Security Solutions. “There is a need to develop awareness at a high level, but with the ability to drill down to under-stand the impact on a specific mission.”

InsTrumenTIng The neTworK

The first step toward achieving cyber-situational awareness is in instrument-ing the network by placing sensors for collecting infor-mation, according to Warden. Next is continually updat-ing the sensors as the threat environment changes. Also important is the sharing of information throughout the enterprise and with outside partners in the defense indus-trial base and with coalition partners.

“You need sensors that hunt in the wilds of the Internet as well as those that protect your own domain,” said Warden. “Updating the sensors is critical so that you don’t gen-erate a lot of false positives or non-value-

added intelligence. These will be a waste of the ana-lysts’ time. The sensors are only as good as the tuning that goes into them.”

The monitoring of net-work traffic with sensors yields large volumes of data. “These need to be analyzed quickly,” said Jack Donnelly, director of cyber programs at Raytheon. “You also need the capability to report that information to key decision makers,” which could be analysts, military officers, or national leaders, “so they can make real-time or near real-time decisions.”

DISA owns and operates a huge chunk of the DoD cyber-infrastructure, and provides a variety of enter-prise services to its many military customers. “We use and provide tools that man-age and control the collec-tion of information about the infrastructure and about flows of information,” said Hermosilla. These include tools that continuously monitor network environ-ments, security gateways that seek out new vulner-abilities, and visualization tools that seek to provide a common operating picture to analysts, operators and decision makers.

“There are also various portals, widgets and other software that seek to pro-vide an analytic capability,” said Hermosilla. “We expect to see a push for more analytics capabilities as we move forward.”

“Analytics applications need to ride on top of the data to do the heavy lifting involved in sorting out the true nuggets of informa-

tion,” said Warden. “Visualization is not the hardest part of the process but it is the way the information gets presented to decision makers and therefore it is important.”

Sharing of cyber-information goes across both formal structures and informal

mechanisms. “It can be as formal as provid-ing information to a central group,” said Warden, “or as informal as chief informa-tion security officers calling each other when they see something that doesn’t look quite right.”

“The defense industrial base is part of the larger effort to achieve cyber-situational awareness,” said Hermosilla. “Industry and DoD are constantly sharing information. We also want to leverage private-sector capa-bilities so that we don’t have to reinvent the wheel. We are looking to academia, as well as companies like Google and Yahoo, to find open source technologies to deal with the big data issues involved in cyber-situational awareness.”

“The private sector is a two-fold part-ner with DoD,” said Warden, “in that we are providing capabilities and resources to develop the solution, and in the fact that the industrial base is part of providing the envi-ronment itself. It owns a significant piece of the cyber-domain that DoD relies on. In that role, the private sector has additional capa-bilities and responsibilities to provide solu-tion sets that ride on the infrastructure.”

Over the last three years, DoD has been developing an infrastructure for sharing information across its enterprise as well as with its industry partners, according to Warden.

“They are creating an environment, part of which is found in the U.S. Cyber Com-mand, where information can be shared and pushed back out,” she said. “It is starting to work across organizations that control various pieces of the network and it is a very positive development. The government is also working on ways to get information and make technologies available to those, such as small and medium sized businesses, without ready access to them, and those are also steps in the right direction.”

puBlIC-prIvaTe lInKs

In another example of links between government and the private sector, a pilot program inaugurated about a year ago brings together the National Security Agency and other intelligence community constituents with major telecommunica-tions carriers such as CenturyLink, as well as representatives of the defense industrial base. “The intelligence community has pro-vided us with classified signatures of actors we are able to look for to prevent attacks before they happen,” said Gowen.

Dylan DeAnda

dylan.deandra @kratosdefense.com

Jack Donnelly

[email protected]

Derek Gabbard

[email protected]

John Linkous

[email protected]

Page 11: MIT 16-7 (August 2012)

www.MIT-kmi.com MIT 16.7 | 9

The result is envisioned to be a commercial email filtering system designed to prevent network intru-sions. “Through this pilot program we have seen the willingness of the intelli-gence community and DoD to share information with industry and vice versa,” said Gowen. “As a result, we are able to create new capabilities that government and industry can share to better pro-tect all of our networks and all of our data.”

Century Link is also participating in a Department of Homeland Security pro-gram that will install the latest version of Einstein, an intrusion detection system that monitors government network gate-ways for traffic patterns that indicate the presence of unwanted traffic, onto carrier networks. By collecting traffic informa-tion at agency gateways, Einstein provides analysts a big-picture view, synthesized of potentially malicious activity across federal networks.

Einstein helps identify configuration problems, unauthorized network traffic, network backdoors, routing anomalies, network scanning activities and baseline network traffic patterns. It also enables rapid detection of cyber-attacks and pro-vides federal agencies with early incident detection.

“DHS saw what we are able to do with email filtering and asked us to migrate that to the dot-gov world,” said Gowen.

Emerging technologies for cyber-sit-uational awareness include those that set out to squeeze relevant information out of large volumes of data, visualize threat information at various system levels and integrate cyber-threat data from multiple sources.

Lookingglass Cyber Solutions built a system that takes data from 37 threat intelligence feeds and contextualizes and enriches the data so that decision makers get a clear picture of issues facing their corner of the universe.

Contextualization means facilitat-ing a view of data from a specific angle. “Decision makers want quick knowledge about the networks that matter to them,” said Derek Gabbard, chief executive officer of Lookingglass. “We take all that activity and overlay it on a map so users can define

what is important to them. Enrichment refers to the capability to drill down to get more information on areas or situations of interest. At the end, you can achieve one level of situational aware-ness by achieving con-text and another by going through the enrichment process.”

EIQnetworks provides a product called Secure-

Vue, which it describes as a unified situ-ational awareness platform. “You can buy 15 different monitoring tools, but

then how do you bring it all together to a single console?” said John Linkous, eIQ’s vice president and chief security and compliance officer. “To see how abnormal events are affecting network traffic you need to see relationships among complex data elements.”

SecureVue can deliver cyber-situational awareness in single platform, accord-ing to Linkous. “SecureVue natively monitors firewall performance, tracks net-work traffic and analyzes all these elements of security data. It can also work with the technologies you already have. We provide the ability to correlate all this information together.”

Military Grade CyberseCurity

aCross enterprise, taCtiCal and satellite networks

Assuring end-to-end availability, reliability and security of critical communications resources.

NeuralStar real-time situational awareness for a 360 view of IT, networks and cybersecurity.

SecureInfo complete services including continuous monitoring, cloud security and more.

CyberC4 real-time cybersecurity products designed specifically for satellite networks.

For more information, call 703-254-2000 or contact [email protected]

www.KratosDefense.com

Photo courtesy of U.S. Air Force

Kratos.Cyber.4.85x6.9.B.indd 1 7/31/12 11:40 AM

Jason Mical

[email protected]

Page 12: MIT 16-7 (August 2012)

www.MIT-kmi.com10 | MIT 16.7

SecureVue also facilitates continuous monitoring of compliance, a discipline advocated by the National Institute of Standards and Technology and which is being increasingly regarded as a best practice for information systems secu-rity. “SecureVue can provide reports on the system as a whole,” said Linkous. “It correlates information on the system at the application, database and user levels and can tell when the system falls out of compliance. It then reports who made the change and when and in what con-text and whether or not the change was intentional.”

AccessData Group recently launched a cyber-intelligence and response tech-nology that integrates network forensics and malware analysis in a single dash-board. “Organizations traditionally have deployed disparate tools without collabo-ration or integration capabilities,” said Jason Mical, the company’s director of network forensics. “Our new framework contains complete intelligence in a single pane of glass.”

The framework provides a view to data from multiple tools, including third-party tools that can be integrated with the product. The system also has a drill down capability, so that if an anomaly is found on a specific device, the operator can click on that device in a visualization and inves-tigate the configuration of and the activity on that device in a detailed manner.

“This significantly increases the ability to respond to and remediate a compro-mise within an organization,” said Mical.

Another important capability on the market is the Dynamic Adaptive Defense offering from CSC, which cuts enter-prisewide incident response from hours and days to minutes, and can completely automate responses to advance persistent threats and intrusion events so that paral-lel remediation actions can be carried out before damage can be done. Tying these capabilities into an advanced situational awareness solution that shows not only cyber-incidents, but also risk factors from throughout the enterprise, will provide a much clearer picture on enterprise risk in real time, while also providing the ability to mitigate those risks at the very moment of detection. This solution extended out of the enterprise and into the theater of mili-tary operations would give unprecedented capabilities in the blue force/red force tracking space, CSC officials say.

Visualization Platform

Kratos provides a visualization plat-form for cyber-situational awareness that accounts for configurations and compliance for all devices on a network. The company recently introduced a security informa-tion event manager called CyberC4-Alert, designed for satellite networks and opera-tions, that provides real-time situational awareness and incident response for cyber-security situational awareness and mission assurance.

“Network attacks look different in the radio-frequency domain as opposed to the packet-based domain,” said Michael Smith, senior vice president of enterprise tech-nology at Kratos. “Jamming on satellite networks degrades the signals and network performance. Because of our knowledge of the RF space, we can define what interfer-ence looks like and provide that informa-tion to users. You can’t run anti-virus software on a satellite network because of the higher performance requirements.”

Satellite systems can also encounter configuration management challenges and other vulnerabilities not typically found on terrestrial networks.

CyberC4-Alert constantly monitors for cybersecurity threats by gathering security event data from across the satellite net-work to provide situational awareness. “A correlation engine with user-defined rules and policies prioritizes events by their severity, alerting users of system threats, performance issues and compliance viola-tions through a drill-down dashboard,” said Smith.

For true cyber-situational awareness to become a reality, more work is needed to improve automation tools, according to Warden. “Threats are getting more sophis-ticated,” she said. “The problem is the abil-ity to extract the right data from a number of elements. You are trying to identify something that hasn’t happened before. It is a question of looking at indications and warnings and taking the time to build con-fidence in the identification of patterns.”

The military, in particular, must be able to deal with targeted attacks that have no existing signature or pattern, and have the ability to correlate unusual events inside the enterprise and the outside domain to try to identify hidden patterns of threats. Another significant concern is massive denial-of-service attacks that can compromise military communications and

mission systems at a pre-coordinated time and place.

Identifying, visualizing and pinpointing the cause of these threats in a situational awareness system takes a great deal of sophistication and “big data” correlation and compute power. Equally important is the ability to dynamically adapt and mitigate these threats at machine speed in an automated and reliable fashion, noted CSC’s Bernie Thomas.

But at the moment these analytical capabilities are “relatively immature,” War-den added. “Only in the last five to seven years has any real research and develop-ment been done in this space. We will see solutions over the next decade increase in sophistication and maturity with additional investments. This is one of the harder situ-ational awareness problems and it can’t be solved quickly or cheaply.”

The growing importance of wireless technologies and cloud computing also presents challenges to the future of cyber-situational awareness. “Wireless security is more about the device itself and how it is engineered,” said Warden. “In order to pro-tect the data on the devices, manufacturers have to build security into the devices or other ways must be found to layer security on top of the device itself.”

“I think we will experience challenges as various organizations move part of their IT capabilities to the cloud,” said Donnelly. “Trying to figure out what is being done where and isolating it will be a challenge. We are trying to anticipate customer needs so that when a situational awareness capa-bility will be required for the cloud, Ray-theon will already have products to offer.”

While DoD and intelligence community have been diligent in fostering partner-ships with the defense industrial base on cyber-situational awareness, observers say less progress has been made in coopera-tion with coalition partners. “Other nations fight side by side with our forces, but they have been reluctant to share information on cyber-situational awareness due to secu-rity classifications or mistrust,” said Dylan DeAnda of Kratos. “Information sharing across boundaries will be a huge field to embark on, but it is needed.” O

For more information, contact MIT Editor Harrison Donnelly at [email protected]

or search our online archives for related stories at www.mit-kmi.com.

Page 13: MIT 16-7 (August 2012)

IS YOUR MOBILITY NETWORK UP TO SPEED?

256 Kbps 10 Mbps

Others make the claim, but here’s the truth: Intelsat General is the

only provider that owns and operates their own global network and delivers

broadband mobile everywhere at speeds that dwarf legacy MSS solutions.

We support the full range of en-route communications at broadband speeds,

including mission-critical Intelligence, Surveillance and Reconnaissance

applications. And we offer unlimited data for an affordable, fi xed monthly

fee. All this plus customized, end-to-end communications solutions leveraging

the largest satellite communications network in the world.

Whether you’re maneuvering on land, sea or air, our C-, Ku- and X-band

mobility solutions provide capacity, coverage and connectivity for converged

voice, data and video applications. And, Intelsat General offers a real-time

network visibility tool so you have complete situational awareness.

• Five scheduled launches in 2012 providing additional Ku-band mobility

beams for key mobile transport routes worldwide

• Always-on broadband at committed information rates and fi xed costs

• Assured access

• Automatic Beam Switching (ABS) for seamless connectivity

• Antenna sizes as small as 30 cm

Step up to best-in-class mobility at Intelsat General.

Learn more at www.farmorethansatellites.com

Introducing Intelsat General’sGLOBAL MOBILITY SOLUTIONS

Page 14: MIT 16-7 (August 2012)

There are four key factors that can generally impact quality levels of SATCOM solutions and ultimately affect the outcome of user require-ments being met. The focus of this article is to highlight the importance these service guidelines for the COMSATCOM Center audience. The four service areas do not apply to all SATCOM user requirements, but gener-ally include:

• SATCOM link quality• Satellite coverage• SATCOM link capacity and system connectivity• SATCOM link availability and reliability

Link QualityData Requirements: Data transmitted over a SATCOM link is vul-

nerable to system errors, which compromise communications quality.

Measures such as the bit error rate (BER) and packet erasure rate (PER) indicate the probability of error over the link. The commercial satellite service request (CSSR) document, which is used to capture customer information and requirements, specifies the minimum acceptable BER or PER level to satisfy each requirement.

Receiving modem baseband link performance is measured by the bit energy-to-noise density ratio (Eb/No) and can be computed from SATCOM link budgets. For a SATCOM link to perform satisfactorily, the proposed link must offer an Eb/No value greater than the minimum thresh-old Eb/No needed by the modem to support the target BER. The SATCOM link margin is defined as the difference between the proposed Eb/No (required) and the threshold Eb/No. If this link margin is negative, then the SATCOM link will not have sufficient power resources to close the link.

The link margin must be sufficiently high to support the target BER, enhance link robustness, and counter the effect of rain and other

Inmarsat Transition Update Inmarsat Non-Validated and Expiring Legacy Services

12 | MIT 16.7 www.MIT-kmi.com

The Inmarsat indefinite quantity/indefinite delivery contracts, which supported Inmarsat Broadband Global Area Network (BGAN) and legacy mission requirements over the past 10 years, expired on June 5. To ensure continuity of services, the Defense Information Systems Agency (DISA) initiated an Inmarsat Bridge contract with a one-year base period end-ing June 5, 2013, and two six-month options thereafter. Meanwhile, the transition of ongoing Inmarsat Communications Service Authorizations (CSA) to the new General Service Administration SIN 132-55 is under-way. Success of the transition depends crucially on MILDEP cooperation to discontinue non-validated requirements and expiring legacy service requirements.

Non-Validated CSAs: The COMSATCOM Center is working with MILDEPs and the functional community to “validate” ongoing CSAs. This is important both to establish continuing need and ensure communica-tions with end-users to avoid disruptions during service transitions. The DISA Direct Order Entry System (DDOE) database reports more than 7,000 Inmarsat CSAs; over 3,500 of these have yet to be validated and contain obsolete contact information or represent services no longer in use. If these CSAs are no longer required, a discontinue order must be submitted using DDOE. This action is necessary for two reasons: It instructs DISA to release a contracting notice to the vendor to end the service and prevent unintended future charges; and it helps provide a better picture of the Global Information Grid and Department of Defense bandwidth usage by purging unused CSAs from DISA databases.

As the COMSATCOM Center transitions CSAs, we are requesting each MILDEP and functional community representative take action

to submit discontinue orders by June 2013. A breakdown of the non-validated CSAs by Services type can be provided upon request.

Expiring Inmarsat Legacy Services: The Inmarsat I3 satellites have been in inventory since 1996 and provide global Inmarsat legacy services, mainly at low speeds and data rates. Inmarsat is retiring this fleet as it continues to promote BGAN and next generation Mobile Sub-scription Services. In fiscal year 2011, Inmarsat released a schedule to notify the user community of the company’s planned phase-out timelines of specific legacy services. As we monitor the ordering and usage of these legacy services, we see a decline of their use within DoD.

In the fourth quarter of FY12, DISA plans to award a blanket pur-chase agreement (BPA) dedicated to legacy services only to ensure capabilities are available until scheduled expiration. Inmarsat plans to phase out five legacy services by the end of December 2012: Inmarsat B, Inmarsat M, Land Mini-M, D+, and M4. Only Inmarsat C will continue beyond the BPA period of performance.

Some legacy services will be available through an Aeronautical and Maritime Inmarsat services BPA. These include all aeronautical legacy services (such as Swift 64, Aero H and Aero H+), as well as maritime services such as Maritime Mini-M, Fleets 33, 55 and 77.

For those customers looking to fulfill a capabilities void, now is the time to budget and plan for BGAN services prior to the phaseout of Inmarsat’s legacy services. Customers would have to incur upfront costs of new BGAN terminals, but would benefit from faster throughput speeds and more robust capabilities. BGAN BPAs will offer competitive commercial pricing.

SATCOM Link Performance Drivers

(Editor’s Note: Following is an update on the latest news from the Defense Information Systems Agency’s Commercial Satellite Communications (COMSATCOM) Center, based on the center’s newsletter, “COMSATCOM Scoop,” available at: www.disa.mil/services/satcom/comsatcom-services/scoop-newsletter)

COMSATCOMCenter Update

Page 15: MIT 16-7 (August 2012)

propagation effects as well as antenna pointing errors and collateral degradations. SATCOM solutions should include a link margin to ensure user requirements are supported.

Voice and Video Requirements: Voice and video quality is mea-sured by the mean opinion score (MOS). MOS is a scale measure based on test-user feedback, ranging from 1 (impossible to communicate) to 5 (comparable to a good, face-to-face conversation). For voice over IP and web-based video applications, the quality of service (QoS) is another metric used to control of resource reservation. QoS comprises require-ments on all the aspects of a connection, such as service response time, loss, signal-to-noise ratio, cross-talk, echo, interrupts, frequency response and loudness levels. In this context, the QoS attempts to measure the level of user satisfaction. As a best practice, proposed SATCOM solutions should focus on ensuring MOS and QoS targets are met to ensure user requirements are met.

CoverageThe effective coverage area of a satellite transponder is defined by

its footprints: the transponder G/T (d/K) footprint and the transponder equivalent isotropically radiated power (EIRP) footprint. These are land/sea surfaces over which the transponder G/T and EIRP are projected. These projections are typically represented as contour lines mapping various G/T and EIRP values.

To ensure good communications, both the transmit and receive sites must be within their respective transponder footprints (satel-lite G/T footprint for the up-link and satellite EIRP footprint for the receive site).

For the same link capacity, a better set of satellite footprints (space segment parameters) can be traded off for cheaper ground resources—that is, antennas, high power amplifiers or receivers—a better end-to-end

link performance, or a higher link margin. The COMSATCOM Center considers space-segment resources as a premium asset in most satel-lite communications links, and generally endorses solutions that offer robust links with optimized satellite G/T and EIRP footprints whenever possible, along with efficient modulation and coding schemes capable of supporting the user requirement with adequate link margins.

Capacity and System Connectivity Most applications and baseband requirements, such as web

access, text, audio, image or video file transfers, can be converted to data rates in bits per second. The data rate requirement and a con-nectivity matrix are usually specified in the previously mentioned CSSR document. An efficient coupling of the data rates and the modulation and coding methods usually yield optimized bandwidth (MHz) solutions without compromising link quality. The COMSATCOM Center generally favors solutions that support the required applications, link capacity and network connectivity, coupled with efficient modulation and coding schemes.

Link Availability and Reliability Link availability is another key performance driver in satellite com-

munications link design. For Ku- and Ka-bands, rain attenuation and depolarization effects are the dominant factors in the determination of end-to-end link availability. Other contributors to link outage include equipment failure and sun transit. The desired link availability targets for various types of satellite communications links are listed in the CSSR document. The COMSATCOM Center recommends solutions that offer adequate margins and schemes to protect the link against downtime due to rain, propagation effects, equipment failures and power outages.

The Enhanced Mobile Satellite Services (EMSS) industry partner and service provider, Iridium, has announced the release of its Iridium 9603 two-way global satellite data transceiver, the next level of innovation in the Iridium family of products. The Iridium 9603 reduces the size and weight considerably and is one-fourth of the volume, one-half the footprint and one-third the weight from its predecessor, the Iridium 9602, without sacrificing any performance in the Iridium Short Burst Data (SBD) service. The device weighs 11 grams and has the diminutive dimensions of 31.5mm x 29.6mm x 8.1mm—a small package that can fit in most desired form factors and serves even the most covert of operations.

The Iridium 9603 is not currently offered on DDOE, but customers may purchase the device from Iridium resellers. For a list of Iridium resellers, visit the Iridium website at www.iridium.com and click on, “How to Buy.” Once a government customer purchases the device, they must purchase secure EMSS SBD service for data transceivers, through the DDOE website at https://www.disadirect.disa.mil/.

EMSS provides secure global SATCOM services under the COM-SATCOM Center. EMSS offers a breadth of services that includes voice, secure voice, Distributed Tactical Communications System, messaging and data to DoD, other federal departments, agencies, state and local govern-ments, and approved foreign and allied government users. EMSS offers SBD with automatic billing using the “usage based tiered” pricing structure. The pre-negotiated SBD service is exceptionally competitive with the

commercial sector and also offers two key advantages: Users have the flex-ibility of tiered data usage, to include unlimited data, and the added assur-ance of secure communications through the EMSS Gateway.

SBD Costs for FY12 (Includes 2.0 percent DITCO fee) $81.60 one-time activation fee $133.29 per month—unlimited $66.99 per month—up to 100 kb $26.19 per month—up to 30 kb $10.89 per month—inactive

For pricing updates, check DDOE at https://www.disadirect.disa.mil/. The EMSS 24/7 Help Desk is available to answer all customer questions about the full suite of EMSS devices, services, features and accessories.EMSS Help Desk (24/7) CML: 877-449-0600 DSN: 312-282-1048 Email: [email protected] O

For more information, contact MIT Editor Harrison Donnelly at [email protected] or search our online archives

for related stories at www.mit-kmi.com.

MIT 16.7 | 13www.MIT-kmi.com

EMSS Industry Partner Announces Release of Iridium 9603

Page 16: MIT 16-7 (August 2012)

www.MIT-kmi.com14 | MIT 16.7

DATA BYTES

Blue Coat Systems has introduced mobile application controls designed to close the security gap created by unsanc-tioned mobile applications on the corporate network. With its mobile application controls, Blue Coat uniquely gives IT the ability to manage the use of unsanctioned applications and consistently enforce policies across all devices on the network. To prevent unauthorized or undesired use of the corporate network, Blue Coat mobile application controls uniquely extend to mobile applications the same granular operational controls the company provides for web-based applications. With these operational controls, businesses can set policies around specific functions within both web-based and mobile applications. This enables businesses to consistently enforce policy across all devices and allows them to regain control over the applications on their network. The new mobile application

controls are integrated into the Blue Coat ProxySG appli-ances and the Blue Coat Cloud Service.

Cleversafe has announced plans to build the first dispersed compute storage solution by combining the power of Hadoop MapReduce with Cleversafe’s highly scalable object-based Dispersed Storage System. This solution will significantly alter the Big Data landscape by decreasing infra-structure costs for separate servers dedi-cated to analytical processes, reducing required storage capacity, and simul-taneously improving data integrity. In addition, the company’s solution will reduce network bottlenecks by bringing together computation and storage at any scale, petabytes to exabytes and beyond. Traditional storage systems are not designed for large-scale distributed computation and data analysis. Present implementations treat data storage

and analysis of that data separately, transferring data from storage area networks or network attached storage across the network to perform the computations used to gather insight. In this manner the network quickly becomes the bottleneck, making multi-site computation over the WAN partic-ularly challenging. Cleversafe solves this problem by combining Hadoop MapReduce alongside its Dispersed Storage Network system on the same platform and replacing the Hadoop Distributed File System (HDFS), which relies on three copies to protect data, with information dispersal algorithms, thereby significantly improving reli-ability and allowing analytics at a scale previously unattainable through tradi-tional HDFS configurations.

Harris CapRock Communications, a global provider of fully managed communi-cations for remote and harsh environments, has signed a multi-year, multi-channel agreement with Astrium Services to offer end-to-end Ultra-High Frequency (UHF) tactical satellite solutions to international and U.S. government users. The service will be launched in spring 2013. Harris CapRock now joins Astrium Services in providing UHF solutions across the entire Skynet Fleet as a global channel partner. Astrium Services owns and operates a fleet of military-grade geosynchronous communications satellites with both UHF and X-band payloads. UHF is the ultra-critical communications link designed for users at the tactical edge, and for command and control reachback. As the most robust beyond-line-of-sight communications available, access to scarce UHG satellite capacity is becoming increasingly important. The joint service offers domestic and international users access to an unprecedented level of control over UHF capacity over today. The service will include dedicated 25 kHz and 5 kHz satellite channels for use with any UHF tactical satellite-capable radios. Using a new Harris TACSAT waveform, offered as part of the end-to-end service, users will be able to actively manage their channels by splitting the capacity into multiple networks for simultaneous users.

Dispersed Compute Storage Solution Cuts Costs

Intelsat has announced that Harris CapRock will utilize the Intelsat Epic platform on Intelsat 29e for advanced fixed and mobile communica-tions services. Under a multi-year agreement, Harris CapRock will utilize the next-generation Intelsat Epic platform to expand its service offer-ings and offer new applications to its global customers across the energy, maritime and govern-ment markets. Harris CapRock currently has Ku-band capacity on multiple satellites on the Intelsat fleet, which will expand to Intelsat 29e when it is launched. The agreement, which will enable the provision of more than one gigabit of throughput on the Intelsat Epic satellite platform, furthers Harris CapRock’s global relationship with Intelsat. The Intelsat Epic platform, initially comprising Intelsat 29e and Intelsat 33e, will utilize multiple frequency bands, wide beams, spot beams and frequency reuse technology. Intelsat Epic will be complemented by Intelsat’s existing satellite fleet and IntelsatONE terrestrial network. The two satellites, which are expected to launch in 2015 and 2016 respectively, will serve all of the populated continents.

Platform Used for Advanced Fixed and

Mobile Comms

Mobile Application Controls Close Security Gap

Alliance Offers End-to-End UHF Tactical Satellite Solutions

Page 17: MIT 16-7 (August 2012)

www.MIT-kmi.com MIT 16.7 | 15

Compiled by KMi Media Group staff

Harris has released several new tactical communications products repre-senting a new generation of its Falcon III radio line. They include:

• The Falcon III RF-7800M-HH, which provides unprecedented access to information by allowing warfighters to communicate by voice, video and data anywhere on the battlefield. The 7800M wideband handheld supports network-enabled missions through applications such as video, collaborative chat and situational awareness. It uses the field-proven Harris Adaptive Networking Wideband Waveform, which is used in more than 20,000 radios.

• The Falcon III RF-7800H wideband manpack, the world’s smallest,

lightest and fastest wideband high frequency (HF) radio. The RF-7800H dramatically improves HF tactical communications by transmitting video clips, images, maps and other large data files from beyond-line-of-sight environments for the first time.

• The RF-7800-OU500, the next generation of the combat-proven Falcon III RF-7800W High-Capacity Line-of-Sight radio. The new unit provides the backbone for delivering command and control and situational awareness information between headquarters and the lowest echelons of the battlefield—allowing warfighters to use mission-critical applications such as real-time video, biometrics, IP telephony and teleconferencing.

Cross-Domain Solution Used to Access Classified Networks

ITT Exelis has been awarded a Rapid Equipping Force contract to provide mission command on the move (MCOTM) systems for the U.S. Army 2nd Infantry Division in South Korea. The Global Network on the Move-Active Distribution (GNOMAD) system provides broadband, on-the-move, satellite connectivity through the integration of several COTS products. It delivers a combat-proven, modular, reliable communications system to extend critical network connectivity to the lowest possible echelon on the battlefield. The contract award is in support of the unit’s operational needs statement that required a MCOTM system to support contingency missions in South Korea. Exelis also provided GNOMAD systems for the 4th Infantry Division while it was deployed to Iraq in 2011. The systems being delivered will have the same configuration as those used in Network Integration Exercise 12.1 at Fort Bliss, Texas, and White Sands Missile Range, N.M., that hosted mission command applica-tions such as Command Post of the Future. GNOMAD’s reduced size, weight and power make it a viable solution for integration into multiple Army ground platforms, including Mine-Resistant Ambush Protected All-Terrain Vehicles, M1(V) Abrams, M2 Bradleys and Strykers.

CSC has unveiled BizCloud for Government, which it describes as the industry’s first and only on-premise private cloud that is billed as a service and ready for application workloads in 10 weeks. As federal agencies strive to improve operational efficiencies, reduce costs, meet federal mandates and embrace cloud services, CSC’s BizCloud for Government provides the privacy, security and control of a private cloud with the agility, conve-nience and elasticity of a public cloud. Based on CSC’s standardized and proven commercial BizCloud, BizCloud for Government is tailored to address government agencies’ IT, security and mission requirements. BizCloud for Government accelerates government agencies’ adoption of a private cloud by eliminating long lead times for implementation and utilizing the convenience of an operational spending model. BizCloud for Government, a VMware vCloud Datacenter Service, gives users a private cloud behind their firewall or on their premises of choice and ready for workloads in just 10 weeks. By offering this service, CSC is also helping address the cybersecurity concerns related to cloud adoption. BizCloud for Government is a unique private cloud package of products and services that is designed to meet Federal Information Security Management Act certification and accreditation controls without the long lead times that “building your own” cloud requires.

New Tactical Products Offer Battlefield Data

Command On-the-Move System Supports U.S. Army in Korea

On-Premise Private Cloud Tailored for

Government Agencies

Raytheon Trusted Computer Solutions has announced that its Trusted Thin Client (TTC) is now being used by the intelli-gence community to access classified networks at remote loca-tions throughout the cloud. TTC is a cross-domain solution that enables secure access to multiple classified networks and virtual desktop infrastructure (VDI) environments from a thin client and single network connection. TTC consists of client and server software. The server component, or distribution console (DC), runs on a server at the data center and allows the TTC clients to securely access user desktops, data and applications from a VDI environment at each network security level. DC spanning enables TTC client access across the wide area network to other DCs in the cloud. This provides imme-diate access to distant VDI environments at security levels not available locally. DC Spanning can also be used to expand the number of network connections provided by a single DC.

Page 18: MIT 16-7 (August 2012)

www.MIT-kmi.com16 | MIT 16.7

Information DominatorIntegrating Information Power Across All Core Functions

Q&AQ&A

As chief, information dominance and chief information officer for the Air Force, Lieutenant General Michael J. Basla leads four direc-torates and supports 77,000 cyber operations and support personnel across the globe with a portfolio valued at $17 billion. He has overall responsibility for networks and network-centric policies, communica-tions, information resources management, information assurance, and related matters for the Department of the Air Force. As CIO, Basla provides oversight of portfolio management, delivers enterprise archi-tecture, and enforces freedom of information act and privacy act laws. He integrates Air Force war fighting and mission support capabilities by networking air, space and terrestrial assets. Additionally, he shapes doctrine, strategy, and policy for all cyberspace operations and support activities.

Basla received his commission in 1979 as a distinguished gradu-ate of Officer Training School. He has served in five operational com-munications units including commands at detachment, squadron and group levels. He has extensive joint experience, including a tour as director for C4 Systems, Joint Task Force Southwest Asia in Saudi Arabia, where he delivered integrated network operations in support of United Nations security resolution enforcement against Iraq. He has served on the staffs of the Joint Staff, U.S. Transportation Command, Headquarters Air Force, Air Mobility Command and Air Force Com-munications Command.

Prior to his current assignment, Basla was vice commander, Air Force Space Command, where he assisted the commander in orga-nizing, equipping, training and maintaining mission-ready space and cyberspace forces and capabilities for North American Aerospace Defense Command, U.S. Strategic Command and the other functional and geographic combatant commands with missile warning, position-ing, navigation and timing, communications and cyber capabilities.

Basla graduated in 1975 with a Bachelor of Science degree in mathematics from the University of New York, Albany.

Basla was interviewed by MIT Editor Harrison Donnelly.

Q: How would you describe your mission as chief of information dominance and CIO?

A: My role is to ensure that information power is integrated across all of the Air Force service core functions. We accomplish this by devel-oping the overarching policy for IT and advocate for resources that ensure Air Force capabilities satisfy Air Force and the joint warfighter requirements. I am also responsible for the training and development of airmen, to include civilians, in the cyberspace operations and support career fields. My team manages the training pipeline for the workforce to ensure our warriors are prepared for the unique requirements of the cyberspace domain.

Q: How do you define “information dominance”?

A: Information dominance affords airmen the ability to apply air, space and cyberspace power at the time and place of our choosing. It is achieved when we have a greater understanding of the strengths, weaknesses and centers of gravity of an adversary’s military, political, social and economic infrastructure than they have of ours. I see it as global in nature and an underpinning of global vigilance, global reach and global power.

Q: What do you see as the critical information technology issues fac-ing the Air Force?

A: There are several information technology issues facing our Air Force today, and many of them stem from the decentralized manner in which we acquired capabilities in the past. One major issue facing us is the proliferation of data centers across the department—we have hundreds of them. A few years ago, OMB issued a directive to the entire federal government, including the Department of Defense, to consolidate and reduce the number of data centers in an effort to reduce overall costs associated with the power and maintenance of running these facilities. In addition, by consolidating the data centers we will reduce our footprint, which will enable us to better protect our applications and information. This effort is ongoing, and we realize now we need to take it much further and do it faster.

We are in the process of consolidating and centralizing key ser-vices, such as email, on the Air Force enterprise. This will help us create a common infrastructure and environment for mission and

Lieutenant General Michael J. BaslaChief, Information Dominance

Chief Information OfficerAir Force

Page 19: MIT 16-7 (August 2012)

www.MIT-kmi.com MIT 16.7 | 17

support applications. Having a common environment will simplify the burden placed on system developers, since they will no longer have to engineer and build out the supporting infrastructure for their individ-ual systems. This will also reduce the life cycle total cost of ownership, speed deployment of capabilities, and streamline security accreditation. Developing a common environment available to all systems will foster certain uniformity across our data centers.

While the current budget constraints drive us towards a “fewer is better” mentality, we still need an architecture that is resilient and survivable. It will require a fail-over capability to maintain continuity of operations and data centers strategically located around the globe to help ensure adequate performance and mission availability. However, there is no reason we can’t go from hundreds to a few dozen and have a much more manageable construct. If we’re ever going to get to the cloud in a meaningful way, this is a key step.

Q: What about mobile devices?

A: Another issue, and a highly visible one, is mobility and mobile devices. In the commercial and private sectors, we’ve seen the rapid development and penetration of the new generation of smartphones and tablet devices into so many areas of our lives. Not only have these devices changed the way people conduct their personal and professional business, but also they have permanently changed our expectation of what it means to have access to data. Being connected when you’re on the move has gone from being a convenience to being a necessity for a large portion of the workforce.

Since many airmen already use mobile devices in their personal lives and see them as a potential mission-enabling capability, there is signifi-cant internal pressure to field the new generation of mobile devices into our enterprise and we are working on this. Before we can do this, we need to find the right balance between usability and security. Informa-tion contained on these devices needs to be properly protected, and user access and authentication need to meet our security requirements. We need to move beyond the device and focus the capabilities these devices bring to the fight. Again, the fundamental issue is protecting sensi-tive data and data sources on the device. We need a layer of security between the “untrusted” apps and our mission apps without crippling the device.

I should mention that these challenges, and many others, are being addressed in collaboration with the DoD chief information officer, Defense Information Systems Agency, the services and key DoD agen-cies. This collaboration is an imperative given today’s fiscal constraints and user demands.

Q: What outlook do you see for the Air Force IT budget in the coming years, and if savings are going to be needed, how will you achieve them?

A: I am sure it is no surprise to anyone that the defense budget is shrinking. However, I think the cyber and IT portion of the budget needs to grow as we increasingly rely on these capabilities. Our current efforts reflect the IT investment efforts to align and eliminate unneeded expenditures and rebalance spending. There is no question that difficult choices lie ahead in prioritizing our resources, but these decisions will set the foundation for the cyber and IT mission priorities.

We have linked our major investments with the priorities of the sec-retary of the Air Force and Air Force chief of staff. First, to continue to strengthen the Air Force nuclear enterprise, we will continue to provide

the most modern and reliable cryptographic program to ensure the safety of vital nuclear assets. The Air Force is dedicated to making the necessary IT investments to achieve our top priority of continuing to strengthen the nuclear enterprise by continuing to improve our cryp-tographic program. These investments provide a modern and reliable cryptographic program to ensure the safety and security of our nation’s most vital assets to include nuclear weapons and the IT systems that support this mission.

Second, in partnering with joint and coalition team members, we will build networks that ensure the safety of data in any environ-ment while ensuring the necessary data is shared appropriately across domains. The fiscal year 2013 budget request includes funding for end strength increases in cyberspace and command and control capa-bilities; enhanced and expanded network operations; network access engineering; adjustments for infrastructure to support remotely piloted aircraft combat air patrols by the end of fiscal 2013; and personnel to support the Distributed Common Ground System, which is critical to warfighter needs for information superiority.

Third, we will develop and care for airmen by providing them the best possible IT systems and support while ensuring they have the tools and training necessary to maintain them. As we continue to modernize end-user equipment, we must also provide the necessary training to develop our airmen. Integrating existing assets with augmented reality tools under the Enterprise Architecture for Live, Virtual and Construc-tive Environments [EA-LVCE] provides airmen in all functional areas the real-time decision making capability to prepare for the future. EA-LVCE will allow the Air Force to utilize existing inventories and augment them with virtual computer-generated capabilities to prepare, train and maintain a constant operations tempo without substantially increasing costs to capital equipment and fuel. Additionally, the Air Force is continuing to update and bolster undergraduate cyber-training courses, which saw its first graduates reach the field in fiscal 2011. This budget ensures that our airmen continue to have the foundational training necessary to defend and operate the Air Force network.

Fourth, our ability to smartly invest in IT helps provide valuable Air Force funding necessary to modernize all our aging air, space and cyberspace inventories. Seven initiatives play a vital role in achieving the savings necessary for investment while modernizing and improv-ing our networks. This will allow the Air Force to continue realign-ing funds toward the modernization of its major weapon system platforms.

Finally, we are committed to the role we play in new and ongoing acquisition and IT reform to recapture acquisition excellence in the Air Force and DoD, and we remain in concert with the DoD CIO’s 25 point reform effort. During FY12, we returned more than $1.2 billion of Air Force top line for higher Air Force and DoD priorities. This investment strategy is closely managed by Air Force CIO oversight to ensure vis-ibility into how our nation’s resources are spent.

Our consistent goal is to enhance the Air Force portion of the Global Information Grid to one that is global and integrated across all Air Force domains—air, space and cyberspace. Our continued priority is to modernize and develop the proper safeguards to secure our data, without restricting critical war fighting information needed in the joint and coalition environment or the personal networks necessary for the training, morale and welfare of our soldiers and airmen.

Q: As vice commander of Air Force Space Command (AFSPC), you were very involved with cyberspace and security issues. What role will you play on those issues as CIO?

Page 20: MIT 16-7 (August 2012)

www.MIT-kmi.com18 | MIT 16.7

A: With information assurance being a key enabler of cyberspace operations, specifically defensive cyberspace operations, my role as CIO will be to partner with the cyber core function lead integrator to provide oversight and management of the AF information assurance program, implement enterprisewide IA governance and enterprise risk management activities, while ensuring AF compliance with statutory DoD compliance. Our relationship with AFSPC is critical, and the CIO plays a significant role in advocacy for cyber-initiatives to strengthen our enterprise security posture. Not only does this effort protect our mission, operations, and business process information and systems, but it also fosters improved cyber C2 capability. As we move to the Joint Information Environment, DISA Cloud Computing Services, and other cyberspace security initiatives, our partnership with AFSPC is impera-tive to ensure success. Finally, my role as CIO in relation to AFSPC is to ensure AF policies and instructions support cyberspace operations and synchronized in a fast moving operational environment all in an effort to provide our combatant commanders and warfighters mission assurance.

Q: Shortly before being named Air Force CIO, you and then-CIO Lieutenant General Lord signed a “Cyberspace Operations Support Community Transformation” document. What are you trying to accomplish with that, and how will you work to achieve those goals?

A: The intent of the transformation plan is to establish the cyberspace operations and support community as the premier provider of unparal-leled cyberpower to the Air Force and the joint warfighter. It is based on guidance found in national, DoD and Air Force high level strategies, including the Air Force Cyberspace Superiority Core Function Master Plan. The plan defines and articulates the future of the community. It provides a roadmap that describes our future state capabilities and our required actions and timelines for achieving the vision. The plan outlines five core competencies: cyberspace operations, knowledge operations, cyberspace operations support, war fighting integration and governance.

Q: How would you assess Air Force progress in recent years in responding to the challenge of cyberspace?

A: The Air Force has been and will continue to organize, train and equip the service to conduct operations in cyberspace. We’ve made great orga-nizational progress in standing up the 24th Air Force and designating AFCYBER as the Air Force component to U.S. Cyber Command.

Over the past year the Air Force has streamlined processes to bet-ter support the Air Force overall and combatant commanders. With the 24th Air Force as the service’s lead for cyber operations, all orders/tasks that originate from USCYBER flow out to the Air Force via the 624th Operations Center [OC], the execution arm for the 24th Air Force. The 624th OC issues orders, tasks and notices to the Air Force for the protection, operation and defense of the Air Force network and its information.

Operations in the cyberspace arena depend heavily on the timely availability of precise intelligence on targeted systems. The author-ity to access the necessary information for planning purposes, in the absence of an EXORD, is vital to ensuring that operations are properly planned and executed. 624th OC established an ISR division to assist in providing intelligence support on threats and vulnerabilities, as well as producing cyber-threat newsletters to assist in protecting Air Force information and resources.

Q: Where do you see Air Force policy on mobile devices going in the next few years? How would you assess the risks and benefits of allowing airmen to use their own devices for work?

A: Air Force policy will evolve to enable the deployment of mobile, device-agnostic capability to support operational needs. Our policy will be consistent with the assessment and use new commercially available devices and technology that can scale up to enterprise implementation.

The security and safeguard of Air Force data will continue to be a top priority as mobile devices springboard us to a more mobile and agile workforce. Mobile devices posture Air Force personnel to be mission-effective anytime and anywhere. If a bring-your-own-device policy is enacted by DoD and the Air Force, a proper balance of technical and procedural guidelines will have to be strictly followed to protect Air Force data stored on a device. Protection of Air Force data on personal devices is equally important as protecting data on government systems.

The 688th Information Operations Wing is doing some great work for us in this area and conducting several pilots with different devices within separate major commands. The results of these pilots will be released soon and help inform us to set the right policy on the use of these tools.

Q: What role do you see for cloud computing in Air Force operations?

A: Cloud computing has a major role in the future of Air Force operations. Everything we’re doing on the back end of the enter-prise—data center consolidation, migration to centralized email and services, web-enabled applications and many other activities—puts us on a course for cloud computing, whether that be public, private or hybrid, or inside the DoD or from industry.

However, things aren’t so simple. Moving to the cloud and data security remains our major issues. Depending on the sensitivity of the information and applications, cloud services and the associated data may reside in one of a variety of cloud environments. Air Force clouds may run the full gambit from purely commercial, fee-for-service environments to entirely government-owned and -operated clouds. There will be a lot of trade-space in the “hybrid cloud” arena, where some aspects of particular cloud service may be supported by a contractor or commercial entity and others supported by the Air Force or DoD. There are many permutations of who owns the physi-cal computing center, who manages the data, who maintains the application. One of our challenges is to find the right balance without reinventing the wheel each time we field or transition to a new cloud service.

The DoD CIO has issued guidance on what type of cloud is appro-priate based on the sensitivity of the system that is hosted in that environment. We’re actively working with the DoD CIO, DISA and the other services as we move closer towards the cloud. In a general sense, we want to outsource as much of the cloud operation and maintenance as we can while maintaining security and keeping costs under control. We also need to be careful to avoid being locked in to a particular vendor’s proprietary cloud solution. The cost benefit of cloud will partially come from competition, so our cloud services will need to be flexible and agile.

Q: Do you see the Air Force moving to a DoD-wide enterprise email system?

Page 21: MIT 16-7 (August 2012)

At your service since 1947

Learn more • 877-275-UMUC • military.umuc.edu/anyplace

University of Maryland University College is the nation’s largest public university.

Since 1947, we’ve been creating learning opportunities—from a hotel ballroom in Wiesbaden to online classes at sea, to forward bases in Afghanistan. Today, University of Maryland University College (UMUC) offers more than 90 undergraduate and graduate programs entirely online. We’re on base or on-site in more than 25 countries, because we can turn just about anyplace into a campus.

some people only see A cAmp. We see A cAmpus.

UMUC15688 9.1_MIT_Campus_8.375x10.875.indd 1 7/23/12 3:53 PM

Page 22: MIT 16-7 (August 2012)

www.MIT-kmi.com20 | MIT 16.7

A: Absolutely. We’ve already committed to do this. I previously mentioned that we’re consolidating the Air Force enterprise into a centrally managed construct with centralized services, including email. We expect to accomplish this after the AFNET migration is completed in 2013. Though this is a ways off, the fact of the matter is we’re doing the really difficult legwork now. The current approach of consolidating base by base would be necessary in either case. We’ll standardize the Air Force first then transition our consolidated archi-tecture into the DoD implementation.

Q: In a recent speech, you promised as CIO to do more to promote homogeneity in acquisition. How do you intend to achieve that, and do you see that as being in conflict with acquisition rules aimed at competitiveness and an open environment for industry?

A: Promoting homogeneity in IT acquisition supports acquiring agile and interoperable IT solutions. This is not in conflict, and in fact promotes the use of acquisition rules aimed at competitiveness and an open environment for industry. As CIO, by implementing and executing initiatives to standardize how we share, store and secure our information, we are not only advancing the AF to a leaner, more effective IT portfolio, but are also providing industry with expected criterion and benchmarks for success. This encourages industry to offer innovative, competitive solutions to help meet our mission needs.

Q: What are some of the other areas under your jurisdiction that you plan to devote special attention to in the coming months, and what programs and initiatives are you considering?

A: Later this fall, the secretary of the Air Force will host a Cyber Summit, and he has directed me and my staff to lead this effort. The goal is to articulate the Air Force’s cyberspace vision and set a strat-egy to achieve it. We will discuss the cyberspace mission, capabili-ties, manpower, career path, resources, and recruiting of cyberspace talent in order to offer results or recommendations to OSD to meet fiscal year 2014 POM timelines.

My top three cyber priorities to support the joint fight are to: develop premier cyber-airmen; enable cross-domain resilient cyber-space capabilities; and deliver effective IT enterprise solutions. With these priorities in mind, I will focus on supporting the Joint Infor-mation Environment initiative, implementing the IT efficiencies and continuing to focus on the workforce transformation.

Q: Is there anything else you would like to add?

A: These are exciting times for the Air Force as we confront IT challenges and work through the IT efficiencies. They pres-ent huge opportunities and a new way of doing business. We are postured to work with our joint partners and develop solu-tions to secure information superiority in support of the joint fight. O

Information lost in translation?

Ancient history.

THAT WAS THEN. MOBILITY NOW.With the changing nature of the battlefield, the need for advanced networking and unified communications has never been greater. Turn to LGS Innovations- we’re The Network ExpertsTM.

1-866-LGS-4243An Alcatel-Lucent Company

Go to lgsmobile.com to download our 4G LTE Playbook.

Page 23: MIT 16-7 (August 2012)

www.MIT-kmi.com MIT 16.7 | 21

Following a massive field exercise that proved the network’s strength as a combat enabler, the Army is on the brink of fielding its new tactical communications network to up to eight brigade combat teams.

The five-week Network Integration Evaluation (NIE) 12.2 in May and June served to validate and finalize the makeup of Capability Set (CS) 13, the Army’s first package of network components, associated equipment and software that provides integrated connectivity from the static tactical operations center to the commander on-the-move, and to the dismounted soldier.

Soldiers will begin training on the new equipment in Octo-ber. The CS 13 network, Army officials say, will give U.S. forces a significant advantage over adversaries by enhancing situational aware-ness, improving maneuverability, speeding decision cycles and con-necting soldiers at the lowest level with one another and their higher headquarters.

“There are two big things this capability set is going to do,” said Brigadier General John Morrison, director of the Army G-3/5/7 LandWarNet-Battle Command Directorate. “The first one is mission command on-the-move—so now truly wherever the commander is, that is the command post, because the network is mobile with the com-mander. The second big piece is that we’re going to connect soldiers to the network. We’re going to be able to know where all of our troopers are down to the dismounted level, pass information on where the bad guys are, and then engage as appropriate. And just as important, all that capability will be integrated.”

Capability Set 13, which will be fielded to up to eight infantry bri-gade combat teams during the next year, delivers an integrated network solution capable of supporting mission command requirements for the full range of Army operations. It addresses more than 10 validated oper-ational need statements submitted by theater combatant commanders.

The capability set was validated by the 2nd Brigade, 1st Armored Division (2/1 AD), the first unit equipped with the set and the unit that executes the semi-annual NIEs at Fort Bliss, Texas, and White Sands Missile Range, N.M.

Stretched across more than 100 miles of punishing terrain, the 3,800-soldier brigade fought a rigorous, intelligence-driven operational

scenario against a battalion-sized opposing force. Facing a hybrid threat comprising conventional forces, insurgents, criminals and electronic warfare, 2/1 AD executed combined arms maneuver, counterinsurgency and stability operations.

hyBrId ThreaT envIronmenT

NIE 12.2 was the largest NIE accomplished to date, as well as the first full brigade-level validation of CS 13 network architecture conducted in a hybrid threat environment. The exercise also accom-plished three program tests for record and evaluated 35 government and industry systems under evaluation. NIE 12.2 marked the first unit equipped with CS 13 baseline systems throughout the brigade combat team (BCT) and established the CS 13 baseline that will be fielded starting in October.

In addition, the NIE completed the Warfighter Information Net-work-Tactical (WIN-T) Increment 2 initial operational test and evalu-ation and marked significant vehicle integration across the BCT, with more than 350 vehicles integrated with CS 13 baseline systems, includ-ing infantry BCT, Stryker BCT and armored BCT platforms.

“This is really the first time that we had the entire BCT kitted out with the integrated network baseline, so it was really the first time across the entire formation we had an operational network and were conducting missions,” Morrison said. “And because of that, we’re able to now take a look at that integrated network baseline and really figure out where we need to tweak the architecture to enable mission com-mand.”

The integrated package of radios, satellite systems, software appli-cations, smartphone-like devices and other network components sup-ported 2/1 AD as the unit spread across the desert and mountains to complete its mission. As soldiers fought to secure the fictional country of Attica, which confronted an incursion by the army of a neighboring country and an insurgency, the network allowed the brigade to rapidly pass information within and across echelons.

Directing the fight from Fort Campbell, Ky., was the 101st Airborne Division, acting as the higher headquarters for 2/1 AD and a virtual sister brigade. Just as it would in combat operations, the division

The laTesT neTworK InTegraTIon evaluaTIon proved The sTrengTh of The neTworK as a ComBaT enaBler.

Special Report: NIE 12.2

By ClaIre heInInger sChwerIn

NIEs Guide Army Tactical Comms

Page 24: MIT 16-7 (August 2012)

www.MIT-kmi.com22 | MIT 16.7

commanded and coordinated across subordinate elements, which included 2/1 AD at White Sands, the 1st Sustainment Brigade at Fort Riley, Kan., and a “simulation brigade” that was notionally fighting alongside 2/1 AD to provide added realism and network traffic.

NIE 12.2 was the first time Army planners incorporated the role of higher headquarters into the NIE. Another critical achievement with NIE 12.2 occurred as the Army was able to employ all early phases of the Agile process prior to the NIE start, including using new laboratories at Aberdeen Proving Ground, Md., to their full capability conducting assessments and mitigating risk prior to executing the NIE. (See MIT, May 2012, page 20.)

Compared with the previous two NIEs, when more troubleshoot-ing occurred in the field, the process for 12.2 allowed the 2/1 AD “to run more threads and more execution, and give the Army better feedback on the system as a whole,” said Colonel Dan Pinnell, the brigade commander.

While there are still elements of the network that can be improved, Pinnell said, giving the systems a realistic tryout has produced valuable information that the Army can now act on.

“The soldier’s voice is coming out now, finally, directly to senior leaders,” he said. “I’m very happy with the quality of feedback the sol-diers are providing.”

The Army is also listening to feedback from industry. Private companies play a critical role in the Agile process by bringing for-ward emerging technologies for evaluation at the NIE to determine whether they meet the Army’s defined capability gaps. In response to

industry feedback following the first two NIEs, the Army is now taking several steps to ensure participating companies see a tangible return on investment.

The Army is also working processes to help lower the bar for small businesses to participate in NIE. These include taking steps to poten-tially buy prototypes when multiple systems are needed for evaluation, instituting methods to offset labor and field service representative costs, and working with the Army’s science and technology community to explore small business grants and development agreements to help offset small business costs.

proCess sTreamlInIng

In addition, the Army has written and is in the process of approving an Agile process standard operating procedure that will explain exactly how the Army plans to acquire mature technologies demonstrating operational relevance against existing capability gaps. That will allow it to move more quickly to acquire and field technologies that clear the threshold at NIE.

“We need to streamline these processes so we can go buy some-thing quickly, especially information technology,” said Brigadier Gen-eral Dan Hughes, Army director of system of systems integration. “If you’re looking at an 18-month procurement, you’re two generations off. I always tell folks, look at your cell phone. If your cell phone is two years old, it’s time to get a new cell phone.”

Interest from industry continues to grow. While 43 companies were interested in participating in NIE 12.1, 105 companies sought to participate in NIE 12.2, and 146 companies are seeking to participate in NIE 13.1 this fall.

NIE 13.1 will conduct four program tests for record at Fort Bliss and White Sands, plus three more from distributed sites, and evalu-ate 24 systems under evaluation. Key NIE 13.1 network-related goals include initial evaluations of the Capability Set 14 integrated network baseline, integration and assessment of CS 14 onto heavy platforms and continued network operations (NETOPS) convergence. NIE 13.2 is expected to feature the final NETOPS baseline and assessments of operations-intelligence convergence.

By then, synchronized fielding efforts for CS 13 brigades will be well underway. The delivery of CS 13 marks a significant increase in capability over theater-provided network equipment—both for com-manders’ decision-making and situational awareness of the battlefield, Hughes said.

“This allows us to have a greater communications capability at every echelon, from individual soldier to the battalion to the brigade combat team,” he said. “They have communications that we never envisioned 10 years ago.” O

Claire Heininger Schwerin is a staff writer for Symbolic Systems, supporting Army network modernization strategic communications (Program Executive Office Command, Control and Communications-Tactical and Assistant Secretary of the Army for Acquisition, Logistics and Technology, System of Systems Integration Directorate).

For more information, contact MIT Editor Harrison Donnelly at [email protected] or search our online archives

for related stories at www.mit-kmi.com.

CSSS.NET DeliversCSSS.NET helps our federal clients reduce total cost of ownership and free up budget for new priorities. Celebrating 15 years serving our federal clients, we offer proven solutions to critical challenges for a variety of military, intelligence and civilian agencies nationwide. We provide:

Premier Practice Areas• Cyber Security

Information Assurance• Process Engineering

• CMMI Level 3 – SEI Certified

• Systems Engineering Network & Desktop Operations

• Software Engineering

Mission RequirementsMission Solutions

[email protected]

Washington, DC: (202) 393-5464Bellevue, NE: (402) 393-8059

SBA 8(m) SDB WOSB VOSB SDVOSB

Wide range of contract vehicles• 8(a) STARS II GWAC:

GS-06F-0675Z • Constellation I/FAs 1, 2, 3, 4• Constellation II/FAs 1, 2, 3, 4

• Other Contract Vehicles• GSA IT 70, GSA VETS GWAC• USAMS II, NETCENTS I/II• Navy SeaPort-e• TIPSS 4- CS & ITS

Subject Matter Expertise

Page 25: MIT 16-7 (August 2012)

By amy walKer

On-the-Move

During the major operational test for Warfighter Information Network-Tactical (WIN-T) Increment 2, the second genera-tion of the Army’s tactical communication network backbone, Colonel Daniel Pinnell was able to command his troops from the front seat of his point of presence (PoP) vehicle, instead of being tethered to his brigade command post far from the edge of the battlefield.

The PoP is a WIN-T Increment 2 con-figuration item to be installed on select platforms at division, brigade and battalion echelons. It enables mobile mission com-mand by providing on-the-move network connectivity, both line-of-sight (terrestrial) and beyond line-of-sight (satellite).

“[It’s an] incredibly fast ‘pipe’ for push-ing and pulling large files and big pieces of data,” said Pinnell, commander of the 2nd Brigade, 1st Armored Division (2/1 AD), the maneuver unit for the test. “All of that ‘pipe,’ as we call it, allows me to push and pull very critical information—to see it and use it. That’s pretty darn impressive.”

The three-week WIN-T Increment 2 ini-tial operational test and evaluation (IOT&E)

was conducted in May, with the main effort held at White Sands Missile Range (WSMR), N.M., as part of Network Integration Evalu-ation (NIE) 12.2. To truly stress and test the system, WIN-T Increment 2 nodes were also spread across 2,000 miles.

At Fort Campbell, Ky., more than 1,300 miles away from the evaluations at WSMR, leaders of the 101st Airborne Division acted as higher headquarters issuing orders, via WIN-T Increment 2, to the WMSR-based brigade as it conducted operations. For the first time, the brigade leadership was able to download orders and send critical infor-mation to division headquarters while on the move in WIN-T Increment 2 equipped vehicles.

During the event, Pinnell was able to increase his personal situational awareness through on-board mission command tools that enable reporting to come in from sub-ordinate units on the battlefield in near real time. He often kept three chat rooms open simultaneously to watch his three primary units in action, he said, and also used a mapping function on board his PoP, which showed him where each of his individual

soldiers, equipment or vehicles were located at any given time.

“It has improved my situational aware-ness,” Pinnell said. “I can absolutely see this as being a major value added for command-ers. It gave me a huge leap in understand-ing of where I was and I can use my prior experience with the enemy to guess where he would be and get there in front of him.”

Similar to a home Internet connection, WIN-T Increment 1 provides soldiers with high-speed, high-capacity voice, data and video communications down to battalion level units at the halt. WIN-T Increment 2 introduces networking radios, enhances Network Operations (NetOps) for network planning and monitoring, pushes capability to the company level and supports opera-tions while on the move. It is a vital piece of Capability Set 13—the first integrated group of network technologies out of the NIE and Agile process that will be fielded to eight Army brigade combat teams starting in October 2012.

“WIN-T Increment 2 puts equivalent capability into mobile platforms, down to the company level, that had previously only

Special Report: NIE 12.2

TesT of wIn-T InCremenT 2 hIghlIghTs aBIlITy To push and pull large fIles and BIg pIeCes of daTa To moBIle unITs In The fIeld.

MIT 16.7 | 23www.MIT-kmi.com

Transformation

Page 26: MIT 16-7 (August 2012)

www.MIT-kmi.com24 | MIT 16.7

been found in fixed Command Posts at bat-talion and above,” said Lieutenant Colonel Robert Collins, product manager for WIN-T Increment 2 and 3. “Commanders on the battlefield from division down to company will be able to share a common operating picture and have greater capability to reli-ably send and receive critical information in near real time, which can often mark the difference between mission failure and success.”

mIssIon Command applICaTIons

Among the on-the-move mission com-mand applications leveraged by WIN-T Increment 2 during the IOT&E were Tacti-cal Ground Reporting, a multimedia, patrol-level reporting system; Command Post of the Future, which provides a collaborative common operating picture; and Joint Capa-bilities Release, the second generation of Force XXI Battle Command Brigade and Below, which tracks friendly and enemy forces on a geospatial imagery map. From the front seat of their own vehicles, com-manders were also able to take advantage of enterprise services accessible via the net-work and chat.

Down at the company echelon, the WIN-T Increment 2 Soldier Network Exten-sion (SNE) will be installed on select vehi-cles to extend the network from the brigade down to the company level for the first time. Using its on-the-move satellite communica-tion systems, the SNE will be used to heal and extend lower echelon tactical radio networks for geographically separated ele-ments blocked by terrain features. The SNE allows the company level to connect into the WIN-T backbone and provide them with big-ger “pipes” for more capacity to reliably send and receive messages.

“WIN-T Increment 2 will allow units to deploy from the U.S. to an austere location and set up satellite and wireless communica-tion with their units all the way down to the soldier edge,” said Colonel David Wellons, director of the BMC’s Integration Test and Evaluation Directorate, during the IOT&E.

With the SNE extended down to the lower echelon radio nets, such as the Wide-band Networking Waveform, Soldier Radio Waveform, Enhanced Position Location Reporting System, and Single Channel Ground and Airborne Radio System, soldiers

can now “touch” the communications net-work backbone. On-the-move platforms at company-level with Army radios can then complete an all encompassing network.

To recreate a relevant and current oper-ating environment in which to test the net-work, IOT&E operations simulated a hybrid threat. Not only did the 2/1 AD have to combat components of conventional enemy forces, but it also had to contend with insur-gent and criminal elements with goals and motives of their own. The unit was required to set up tactical network operations; con-duct host nation support activities, delib-erate attack operations and stabilization; re-establish security operations and eventu-ally withdraw out of the replicated country.

The exercise also provided simulated enemy forces with electronic warfare capa-bility to attack the network, on both wire-less and wired connections. During the operation, the brigade marched north and attacked from the south, stretching the net-work across a 100-mile expanse of deserts, grasslands and mountainous terrain.

“This free play and being fully immersed is what allows us to get WIN-T Increment 2 and the rest of the systems out there into an environment that puts that proper rigor on everything to get the right shape,” said Colonel Dave Miller, deputy director of the Army’s Brigade Modernization Command (BMC).

The IOT&E was the Army’s record test to fully assess the suitability, survivability

and effectiveness of the WIN-T Increment 2 equipment with an operational unit. It will provide the Army with valuable feedback to make any needed doctrine, organization, material or training improvements. The analysis and test results from the IOT&E will be used to support the full rate production decision scheduled for mid-September. A successful decision would allow for the field-ing of WIN-T Increment 2 to maneuver units across the Army.

“None of these electronic tools replaces human judgment, period, but they are an aid to speed up decision making, to speed up my activities, my navigation and my move-ment,” Pinnell said. “They can give me that edge I need over my opponent, to see first, see faster, move faster, decide faster, get in front of the enemy and act more decisively. That is really the key of what we are trying to get at here.” O

Amy Walker is a staff writer for Sym-bolic Systems, supporting Project Manager WIN-T, which is assigned to the Army Pro-gram Executive Office for Command, Con-trol and Communications-Tactical.

For more information, contact MIT Editor Harrison Donnelly at [email protected]

or search our online archives for related stories at www.mit-kmi.com.

A soldier from the 2nd Brigade, 1st Armored Division stands before the brigade Warfighter Information Network-Tactical Increment 2 Point of Presence vehicle during the WIN-T Increment 2 initial operational test and evaluation at White Sands Missile Range, N.M.[Photo courtesy of U.S. Army/Amy Walker]

Special Report: NIE 12.2

Page 27: MIT 16-7 (August 2012)

www.MIT-kmi.com MIT 16.7 | 25

Major Brian Mack is the Network Inte-gration Evaluation (NIE) 12.2 Company Command Post (CoCP) trail boss for Prod-uct Manager for Command Post Systems and Integration (PdM CPS&I). PdM CPS&I is an organization of Project Manager Warfighter Information Network-Tactical (PM WIN-T), which is assigned to Program Executive Office for Command, Control, Communications-Tactical (PEO C3T).

NIE trail bosses, managed by the Army’s System of Systems Inte-gration (SoSI) Directorate, are the conduits between their assigned 2/1 AD battalion and a workforce of engineers, logisticians, testers, evalu-ators and industry partners to ensure flawless execution of the evalua-tions. Their daily activities can include anything from training soldiers and supporting field service representatives to advising leadership on the status of schedules, physical integration, training, preparation and execution of activities associated with each exercise.

Mack was interviewed by Amy Walker, a staff writer for Symbolic Systems, supporting PM WIN-T.

Discuss the special Command Post requirements of a company as opposed to a battalion or brigade solution.

A maneuver company requires a command post that is scalable, supports mobile and short halt operations, and maintains reliability with fewer field support representatives required to sustain it. The main difference between a maneuver company and higher echelon units is the number of personnel in the unit to man a command post (CP) and process information for the commander. Battalion and brigade com-manders have authorized staff for each war fighting function to assist the commander to execute mission command. Company commanders do not, so they receive enablers such as a two- to three-soldier com-munication team from the expeditionary signal battalions and a two- to three-soldier Company Intelligence Support Team. These enablers may help the commander, but they often still need to get additional soldiers from platoons to assist. These soldiers require specialized training typi-cally not associated with their military occupation specialties to operate mission command systems within the CP to support the commander.

What are the basic elements of a CoCP and what was the difference between the various CoCP solutions at NIE 12.2?

The basic elements of a company command post include infrastruc-ture, power, beyond-line-of-sight communications, tactical radios and mission command systems. These elements combined should provide a commander a complete picture of his battlespace that can be shared

with adjacent and higher units. They enhance the commander’s ability to make informed decisions and execute troop leading procedures.

During NIE 12.2, the Command Post Systems Integration team supported the integration and fielding of 12 CoCPs. Approximately a dozen systems under evaluation (SUEs) existed within these command posts. A majority of the SUEs focused on which Small Form Factor Very Small Aperture Terminals (SFF VSAT) satellite terminal to field to CoCPs as part of Capability Set 13. SFF VSATs will provide the satellite transport necessary to conduct beyond-line-of-sight (satellite) com-munications at the company level. Other systems evaluated focused on mobile power and infrastructure requirements such as on board vehicle power and an air beam tent sponsored by Project Manager Mobile Electric Power.

How is having mission command systems at the company level going to change the way the Army fights on the battlefield?

Mission command systems at the company level allow the com-mander to anticipate and see the enemy first. That commander can use this initiative to defeat the enemy. Proper use of information or intel-ligence provided by these systems often expands a commander’s options to deal with a situation on the battlefield. These systems should enable, not overwhelm, squads and platoons operating at the tactical edge of the battlefield. These systems not only help us see the enemy first, but they also help us see ourselves or our allies. This improves coordination and logistics on the battlefield and reduces risk of fratricide to friendly coalition forces.

Discuss “jumping” the command post at the company level and the importance of mission command on-the-move during the jump.

Each company jumped anywhere from three to six times during the evaluation. This was important to validate maneuverability require-ments of not only individual systems, but the capability as a whole. The most limited resource on the battlefield is time, so it’s important that units are not burdened with non-value added activities to set up and employ systems. With limited personnel at the company, the need for speed is magnified. WIN-T Increment 2, the Army’s tactical communications network backbone, provides a company commander with on-the-move mission command, but his command post should be flexible and scalable to support mission command throughout any operation. O

Special Report: NIE 12.2

For more information, contact MIT Editor Harrison Donnelly at [email protected] or search our online archives

for related stories at www.mit-kmi.com.

Command Posts for CompaniesaT nIe, Company Command posT TraIl

Boss guIded The searCh for soluTIons ThaT are sCalaBle, relIaBle and moBIle.

Page 28: MIT 16-7 (August 2012)

www.MIT-kmi.com26 | MIT 16.7

Compiled by KMi Media Group staffCOTSACOPIA Commercial Off - the - Shelf Technology

Defense-Grade Security to Enhance Mobile Devices

The SRX 2200 Combat Radio from Motorola Solutions is a ruggedized, reli-able two-way radio specifically designed to enhance warfighter safety and produc-tivity by delivering greater coverage and improved audio clarity for intra-squad communications. The next generation of an AN/PRC-153 Integrated Intra-Squad Radio by Motorola that already is deployed by the Marine Corps, the SRX 2200 combines the easy-to-use ergonomics of Motorola’s advanced APX series portables with the scal-ability of a COTS platform. The result is a reliable and affordable solution for public safety, base training, and tactical or special operations. The SRX 2200 is backward and forward compatible with all Motorola

mission-critical radio systems, including the Project 25 stan-dard for interoperability. With an 80 dB receiver, the SRX 2200 has greater coverage and improved audio quality compared to other radios in its class. The SRX 2200 is compliant with Department of Defense standards for wave-form and encryption and meets Federal Information Processing Standard 140-2 Level 3 security, allowing for deployment in the most sensi-tive operations.

A new version of the Ultra High-Capacity Radio (HCR) from Ultra Electronics, TCS, is now capable of 400 Mbps of bandwidth throughput. The HCR is a small form-factor and highly ruggedized tactical radio that delivers high bandwidth throughput over long distances using point-to-point microwave wireless technology. The radio’s dramatic increase in bandwidth capa-bility over previous-generation radios is expected to accelerate the adoption of handheld devices and next-generation appli-cations at the tactical edge, a key trend within many militaries around the world. The new radio’s much smaller form factor

requires fewer assets to deploy and less logistical support than previous generation high-capacity line-of-sight (HCLOS) radios, providing users with secure voice, data, video and sensor backhaul communications in difficult, hard to reach operating environ-ments. The HCR incorporates and improves on the best features of Ultra’s battle-proven AN/GRC-245 and AN/GRC-512 radios to form a new platform that can perform multiple roles. The single box mast mount radio supports the roles of a HCLOS radio relay, including spectrum efficiency and long range waveforms, as well as a true full-band elec-tronic counter-countermeasure radio relay.

The Armor X7et and Armor X7ad from the Tactical Systems division of DRS Technologies, a Finmeccanica Company, are new, thin, lightweight tablets based on customers requesting even more portable computers. These sleek, 7-inch multi-touch tablets shatter the perception of bulky, rugged computing and offer field service workforces the ability to choose between the Android OS and Microsoft Windows platform. The Armor X7et is a Windows-based tablet that weighs just under 1.5 pounds and provides six hours of battery life. It features an Intel Atom Z670 processor and runs Microsoft Windows 7 Professional. Its Android counterpart, the Armor X7ad, weighs 1.3 pounds and operates for up to eight hours. It features a NVIDIA Tegra 2, 1.0Ghz dual core processor and operates on Android v3.2. Both lightweight tablets feature a 7-inch outdoor-readable multi-touch screen display. They are certified to MIL-STD 810G for extremes in temperature, vibration, shock and four-foot drops, and have an IP65 rating for ingress protection.

Combat Radio Delivers Coverage, Audio Clarity

General Dynamics C4 Systems has announced plans to integrate its defense-grade cyber and informa-tion security technologies into the family of Samsung Approved for Enterprise (SAFE) smartphones and tablet computers. These SAFE devices will also be upgraded with the new Samsung Secure Android

platform, and are designed to deliver a cost-effective commercial solution for a wide range of military and other customers. The secure technologies that General Dynamics will integrate into the Samsung prod-ucts are similar to those trusted to protect informa-tion classified from the Secret level and below for

the Department of Defense, Department of Homeland Security, federal agencies and coalition partners. The enhanced Samsung prod-ucts should be available by mid-2013 and will be sold by General Dynamics and through government contract vehicles such as the General Services Administration.

Tactical Radio Increases Bandwidth Capability

Lightweight Tablets Meet Demand for Greater Portability

Page 29: MIT 16-7 (August 2012)

www.MIT-kmi.com MIT 16.7 | 27

The

adve

rtise

rs in

dex

is pr

ovid

ed a

s a se

rvic

e to

our

read

ers.

KMI c

anno

t be

held

resp

onsib

le fo

r disc

repa

ncie

s due

to la

st-m

inut

e ch

ange

s or a

ltera

tions

. aDVertisers inDex

calenDar

AccessData . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C4www.accessdata.com/cirtBlue Coat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C2www.bluecoat.comCSSS.Net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22www.csss.netIntelsat General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11www.farmorethansatellites.comKratos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9www.kratosdefense.comLGS Innovations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20www.lgsmobile.comPanasonic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C3www.panasonic.comUniversity of Maryland University College . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19http://military.umuc.edu/anyplaceUSGIF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27www.geoint2012.com

August 14-16, 2012TechNet Land Forces—EastBaltimore, Md.www.afcea.org

September 17-19, 2012Air and Space Conference and Technology ExhibitionNational Harbor, Md.www.afa.org

MIT RESOURCE CENTER

Lt. Gen. Susan LawrenceArmy Chief Information Officer/G-6

Cover and In-Depth Interview with:

Insertion Order Deadline: August 31, 2012 Ad Materials Deadline: September 7, 2012

September 2012Volume 16, Issue 8NEXTISSUE

Features• Big Data • Airborne Networks• Long-Term Evolution• Mobile Forensics• Multi-Band Antennas

Page 30: MIT 16-7 (August 2012)

www.MIT-kmi.com28 | MIT 16.7

Q: What types of products and services does your company offer to military and other government customers?

A: If you’ve been on the battlefield in the past decade, there’s a good chance you’ve worked on a Panasonic Toughbook computer. Panasonic is a leading sup-plier of rugged mobile computers for the military, civilian law enforcement agen-cies, field service employees and other workers whose jobs put them in tough conditions. Our computers are designed to provide the rugged reliability to survive drops, falls, spills, sand, grime and extreme temperatures.

Built with this same storied engineer-ing foundation and reliability are Panason-ic’s other products for public and private organizations. Earlier this year, Panasonic went through a corporate realignment to sharpen its focus on offering unified, integrated vertical market-specific tech-nology solutions all designed to work together to drive value. Through one vendor, government customers now can make investments in mobile computers, such as Toughbook laptops and Toughpad tablets; audiovisual equipment including flat-panel displays, projectors and profes-sional video equipment; security systems; business phones; document management tools, including printers, scanners and copiers; and other technologies.

Q: How is your company different from its competitors?

A: Budget cuts have become the new nor-mal, and every government department has entered an age of austerity that isn’t ending any time soon. The cost of pur-chasing any type of technology must be weighed against countless other priorities.

With this in mind, government cus-tomers want reliable technology that is going to provide the highest return on investment possible. You want a partner who can help choose integrated technol-ogy solutions that are greater than the sum of their parts. You want to do business

with a company that takes care of its customers, including offering some of the longest standard warranties available, 24/7 lifetime support and rapid turnaround times on repairs if needed. You understand that quality matters, and you know the difference between the price of a product and its value.

Toughbook computers have been used by our forward-deployed warfighters for in-theater operations for more than a decade. As an integral part of their systems and tools, reliability is critical to their mission.

Q: Are you currently developing new products and services relevant to military and government customers that you hope to bring to the market in the future?

A: Since we began development of the first standard form-factor rugged PC in 1993, Panasonic has been a leader in innova-tive technology for the military and other government customers. We were the first to integrate CD-ROMs into laptops, the first to deliver 3G wireless with support for EDGE/HSPA and EV-DO in a laptop computer, and the first to offer a rugged convertible tablet PC.

In 2012, we are the first to offer a tab-let computer using the Android operating system built for the rugged demands of government use. The Toughpad tablet is developed from the inside out to offer the same ruggedness, security and quality as a Toughbook laptop, along with the mobility and flexibility of an Android tablet.

The Toughpad A1 tablet, available now, has a 10-inch, daylight-viewable screen; security embedded at the hardware level with FIPS 140-2 compliance; 4G mobile broadband; integrated cameras; a replace-able battery; and a stylus and active digi-tizer, enabling flexible data entry in the field. The Toughpad B1 tablet, available later this year, will offer these same fea-tures in a 7-inch format for users where mobility and portability are critical.

Our military customers have asked us for a tablet that is made to address the needs of the 21st-century soldier—offer-ing the features that professional users require as well as the durability to excel in extreme environments. The Toughpad is our answer. Panasonic’s excellent effi-ciency in the design-and-build process allows us to respond to the specific needs of our government customers.

Q: How do you see military information technology evolving in the next few years?

A: This year will be a turning point for mobile technology, and a good indicator of things to come for the military market. Mobile technology, including laptops, tab-lets and smartphones are becoming the norm, with desktop computers increas-ingly becoming a thing of the past. World-wide, analysts are predicting this will be the first year that mobile computers and smartphones will surpass PCs in both spending and shipments for the first time ever, as well as the first time that mobile data network spending will exceed fixed data network spending.

The growth of mobility is a seismic shift in how humans interact with infor-mation technology, and we’ll see the same trend reverberate in the government space. The service members of today and tomorrow are used to having real-time data at their fingertips wherever they are—on a flight deck, in a military vehicle or in combat. It’s up to government tech-nology providers to meet that demand with dependable, high-quality rugged and tough products. O

Tim CollinsFederal Sales Director

Panasonic for Government

INDUSTRY INTERVIEW Military Information Technology

Page 31: MIT 16-7 (August 2012)

Client:

Project:

Campaign:

Creative:

AE:

Sigma Group - 295205

2012-07 Jul PAN TB

Federal Government

PSC5109: Controlling the Air

SL

Publication:

IO #:

Issue:

Ad Type:

Proofs:

Military Information Technology

005406-00

2012-08(Aug)

P4CB

B: = 8.875” x 11.375”

T: = 8.375” x 10.875”

S: = 7.875” x 10.375”

1

Ship Info: Military Information Technology

KMI Media Group

15800 Crabbs Branch Way, Suite 300

Rockville, MD 20855

Attn: Art Department

T: 301.670.5700

E: [email protected]

Contact Jane Fidler with any questions regarding these materials.ph: 646-230-1946 email: [email protected]

33 East 17th Street, New York, NY 10003 • 646-230-1900

K100 K75 K50 K25 C100 C75 C50 C25 M100 M75 M50 M25 Y100 Y75 Y50 Y25 R100 R75 R50 R25 G100 G75 G50 G25 B100 B75 B50 B25PAPER

SOLUTIONS FOR U.S. AIR FORCE

Panasonic recommends Windows® 7.

Toughbook 53 Toughbook 31 Toughbook H2Now available on AFWay through the E-Tools Program.

Toughbook 19

Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation in the U.S. and/or other countries. Toughbook notebook PCs are covered by a 3-year limited warranty, parts and labor. To view the full text of the warranty, log on to panasonic.com/toughbook/warranty. Please consult your Panasonic representative prior to purchase. Panasonic is constantly enhancing product specifi cations and accessories. Specifi cations subject to change without notice. ©2012 Panasonic Corporation of North America. All rights reserved. Controlling_the_air_ FG_FY12-2

Controlling the air starts from the ground up. Rugged Panasonic Toughbook® mobile computers powered by the Intel® Core™ i5 vPro™ processor. Giving Air Force specialists the e-tools they need to effi ciently manage maintenance operations in any environment is how we’re engineering a better world.

Contact us at [email protected]

S:7.875”S:10.375”

T:8.375”T:10.875”

B:8.875”B:11.375”

PSC5109-2_FG_MilitaryInfoTech_Aug2012_P4CB.indd 1 7/18/12 4:14 PM

Page 32: MIT 16-7 (August 2012)