Official Site of the U.S. Air Force   Right Corner Banner
Join the Air Force

News > Network would link defense functions, people
Network would link defense functions, people

Posted 4/25/2011 Email story   Print story

    


by Terri Moon Cronk
American Forces Press Service


4/25/2011 - WASHINGTON (AFNS) -- To optimize U.S. cybersecurity using a new information-sharing enterprise network in a reduced-budget era, a top Defense Department official gave industry leaders a challenge: "We need your innovation."

Robert J. Carey, the deputy assistant secretary of defense for information management integration and technology and the Pentagon's chief information officer, outlined the department's "enterprise strategy and roadmap" for members of the Armed Forces Communications and Electronics Association here April 22.

Mr. Carey said the plan would bring all branches of the military together on the same information-sharing network system.

"It's not about consolidation as much as it is about raising security, while keeping enterprise in view," he said. "Improving cybersecurity is what this is about."

Making sure firewalls get trusted information and driving costs down while raising the security bar form the nexus of the effort, Mr. Carey said.

"When a service member is downrange, he doesn't care where the information comes from, only that it's at hand and he can do something with it," Mr. Carey said. "Enterprise is actionable, timely, relevant, trusted information."

And while it seems simple to provide, he said, the existence of many networks makes it difficult.

Defense budget cuts have become the catalyst for change, Mr. Carey told the industry leaders, and finding efficiencies to run the department has become essential.

"If we keep doing what we've done (with past funding), we're not going to get there," he said.

The enterprise network, however, would cost little, because the system's architecture would result from a "bottom-up" approach, Mr. Carey said, with DOD making new uses out of existing network equipment from all military branches.

"It's really hard to defend (the department's) 15,000-ish networks and 10,000 applications and systems," he acknowledged.

But even with a substantial amount of details yet to be ironed out, including network optimization, data center consolidation, data tagging and others, Mr. Carey said some efficiency initiatives already are paying off after six to eight months of work, such as in tracking identity on classified networks.

"It's actually starting to happen," he said.

Email is another challenge.
"There are a lot of email systems out there," he told the group. "We've got to buy what we have better, and use what we have better."

Mr. Carey said all branches of the military bought email systems and set them up command by command, ship by ship, with no tightly knit communications system. But now, he added, enterprise system purchases for hardware and software will be viewed with a critical eye.

"We need to look at: 'Is it applicable at the enterprise level? If it is, how can I buy it better than I'm buying it now? How can I use my money more wisely for the taxpayer?'" Mr. Carey said.

The challenges of the new enterprise system will be many, Mr. Carey said, but he added that he believes it is a proven system that is both cost-effective and essential for improved cybersecurity.

"We are starting this pump with the water we already have," he said, noting the drop in funding for the enterprise network system. "And the defense leadership recognizes that factor."

Launching the system will take more time with less funding, Mr. Carey said, "but we're still going forward, because this can be done on its own gravity."



tabComments
4/26/2011 9:41:11 AM ET
What Mr. Casey has portrayed is not new. From various perspectives, if senior leaders listen and actually pay attention during a bottoms-up review they will realize that everything is achievable in a short term of period. We do not need to re-invent the wheel. What we need to do is look to which of the services has accomplished what needs to be done and use their approach as a model for all to follow. It has to be a straightforward and honest review with no compromise or attached strings involved to anyone in particular or any of the services. Too many times the senior leaders of each of the services have made the excuse that we are all different from each other and approach each problem differently. Cyber security is not different from one service to the next. The knowledge needed and the equipment used to accomplish that is not either. We do not need to look at industry, we need to look to our own innovators which have the knowledge and fortitude to accomplish what is being...
Jose A. Hernandez, Aviano AB Italy
 
Add a comment

 Inside AF.mil

ima cornerSearch

tabSubscribe AF.MIL
tabMore HeadlinesRSS feed 
AF officials encourage Airmen to submit retraining packages before MilPDS upgrade

More than 900 rally to support wingman's cause

KC-46 enters critical design review phase

Slideshow: Fifth-generation formation  1

Air Force Week in Photos

Chaplains provide support and comfort for families

IDS agencies team up to teach life skills to new Airmen

ANG director discusses way forward

Carter: Sequestration would have effect of 'hidden tax'

CMSAF: 'Be the best, know your Airmen, tell your story'  1

Carter urges stepped up progress on cyber defense

Partnerships develop Air Force youth  1

Air Force leaders offer perspectives at four-star forum

Dempsey: Insider attacks won't affect NATO's Afghan strategy  1

tabCommentaryRSS feed 
Sept. 17: A day for Constitutional conversation  2

Losing Your Future to Sexual Assault   24


Site Map      Contact Us     Questions     Security and Privacy notice     E-publishing