Official Site of the U.S. Air Force   Right Corner Banner
Join the Air Force

News > Network would link defense functions, people
Network would link defense functions, people

Posted 4/25/2011 Email story   Print story

    


by Terri Moon Cronk
American Forces Press Service


4/25/2011 - WASHINGTON (AFNS) -- To optimize U.S. cybersecurity using a new information-sharing enterprise network in a reduced-budget era, a top Defense Department official gave industry leaders a challenge: "We need your innovation."

Robert J. Carey, the deputy assistant secretary of defense for information management integration and technology and the Pentagon's chief information officer, outlined the department's "enterprise strategy and roadmap" for members of the Armed Forces Communications and Electronics Association here April 22.

Mr. Carey said the plan would bring all branches of the military together on the same information-sharing network system.

"It's not about consolidation as much as it is about raising security, while keeping enterprise in view," he said. "Improving cybersecurity is what this is about."

Making sure firewalls get trusted information and driving costs down while raising the security bar form the nexus of the effort, Mr. Carey said.

"When a service member is downrange, he doesn't care where the information comes from, only that it's at hand and he can do something with it," Mr. Carey said. "Enterprise is actionable, timely, relevant, trusted information."

And while it seems simple to provide, he said, the existence of many networks makes it difficult.

Defense budget cuts have become the catalyst for change, Mr. Carey told the industry leaders, and finding efficiencies to run the department has become essential.

"If we keep doing what we've done (with past funding), we're not going to get there," he said.

The enterprise network, however, would cost little, because the system's architecture would result from a "bottom-up" approach, Mr. Carey said, with DOD making new uses out of existing network equipment from all military branches.

"It's really hard to defend (the department's) 15,000-ish networks and 10,000 applications and systems," he acknowledged.

But even with a substantial amount of details yet to be ironed out, including network optimization, data center consolidation, data tagging and others, Mr. Carey said some efficiency initiatives already are paying off after six to eight months of work, such as in tracking identity on classified networks.

"It's actually starting to happen," he said.

Email is another challenge.
"There are a lot of email systems out there," he told the group. "We've got to buy what we have better, and use what we have better."

Mr. Carey said all branches of the military bought email systems and set them up command by command, ship by ship, with no tightly knit communications system. But now, he added, enterprise system purchases for hardware and software will be viewed with a critical eye.

"We need to look at: 'Is it applicable at the enterprise level? If it is, how can I buy it better than I'm buying it now? How can I use my money more wisely for the taxpayer?'" Mr. Carey said.

The challenges of the new enterprise system will be many, Mr. Carey said, but he added that he believes it is a proven system that is both cost-effective and essential for improved cybersecurity.

"We are starting this pump with the water we already have," he said, noting the drop in funding for the enterprise network system. "And the defense leadership recognizes that factor."

Launching the system will take more time with less funding, Mr. Carey said, "but we're still going forward, because this can be done on its own gravity."



tabComments
4/26/2011 9:41:11 AM ET
What Mr. Casey has portrayed is not new. From various perspectives, if senior leaders listen and actually pay attention during a bottoms-up review they will realize that everything is achievable in a short term of period. We do not need to re-invent the wheel. What we need to do is look to which of the services has accomplished what needs to be done and use their approach as a model for all to follow. It has to be a straightforward and honest review with no compromise or attached strings involved to anyone in particular or any of the services. Too many times the senior leaders of each of the services have made the excuse that we are all different from each other and approach each problem differently. Cyber security is not different from one service to the next. The knowledge needed and the equipment used to accomplish that is not either. We do not need to look at industry, we need to look to our own innovators which have the knowledge and fortitude to accomplish what is being...
Jose A. Hernandez, Aviano AB Italy
 
Add a comment

 Inside AF.mil

ima cornerSearch

tabSubscribe AF.MIL
tabMore HeadlinesRSS feed 
Airman's sacrifice remembered around the world

Air Force Week in Photos  3

Air Force aims to invigorate energy efficiency programs

Do's and Don'ts for Airmen during political season  4

AF officials extend separation, retirement application window for active-duty Airmen

A history of 'there first' For AF special ops  2

Behind the red line: Vital OR staff supports 12 specialties

F-35A completes first in-flight JDAM release

Through Airmen's Eyes: Ultimate wingman helps save friend's life  7

Pacific Thunder gets jump start at Osan AB

AF soccer team wins 2nd straight armed forces championship  2

Through Airmen's Eyes: Airman keeps mission on target

Airmen missing from Vietnam War identified  2

Air Force adopts mascot in the 'Win the War Against Waste' campaign  10

tabCommentaryRSS feed 
Teal ropes to spotlight sexual assault response  28

Air Force Academy energy research will yield global benefits


Site Map      Contact Us     Questions     Security and Privacy notice     E-publishing