Title: INFORMATION ASSURANCE
1- INFORMATION ASSURANCE
- (SECURITY AGENT BROKER)
- Conceptual Overview
- LTC JEFF UNGER
2Background
- Senator Stevens (R-AK) congressional staff
visit to ITC-New Orleans (4Q-FY00) - Congressional funding in FY01
- Briefings to J-4
- Conceptual model from ITC-New Orleans
- Letter from SecDef to Defense Appropriations
Committee supporting Joint-ITC plan (1Q-FY02)
3Congressional Intent / Program Vision
- Creates a lasting entity in Hawaii and Alaska
that - supports prioritized DoD requirements
- modernize information technology systems using
state-of-the-art tools - provides federal jobs and private opportunity
- leverages on-going technology programs and
investments in Maui County and other Hawaii
venues - keeps talent in Hawaii and provides
opportunities for former residents - provides education and training opportunities
for local colleges and programs including
apprenticeships and internships
4Congressional Language
The conferees have provided 20,000,000 only for
the Joint Information Technology Center
Initiative. These funds shall be available only
to establish two, Pacific-based Information
Technology Centers (ITCs). These centers allow
DoD to integrate and implement the many
successful logistics and personnel initiatives
underway throughout the Department of Defense.
The centers will process the wide range and
volume of information essential to the day-to-day
operations of our military personnel and defense
civilians. The centers will allow DoD to
eliminate legacy systems and to upgrade to more
capable and more flexible information technology
tools. The conferees direct that the Secretary
of Defense provide a report to the congressional
defense committees no later than May 1, 2001,
which outlines DoDs plan for proceeding with the
establishment of these centers.
5Program Funding Sustainment Strategy
- Each of these programs is currently funded with
Research Demonstration, Testing and Evaluation,
(RDTE), P-6 funding from a specific
congressional appropriation - The programs are based on approved requirements
and, generally, have associated Programmed
Operations and Maintenance (POM) funding in the
near term. - The congressional funding will enable the
programs to be initiated prior to their original
programmed timeframe. - In the out years, the POM funding will align with
the designated program, and these efforts will be
supported by POM funding throughout the remaining
life of the program. - New congressional appropriations would then be
utilized to initiate other specific approved
programs. As the Joint ITC matures, there will
be multiple programs in varying stages of
development or sustainment supported by both
RDTE and POM funding.
6Joint Information Technology Centers Alaska
Hawaii
Requirements Joint Staff J-4
- Multi Security Level Capability
Program Mgmt ONR (Mid-Pac)
7Joint-ITC Requirements
- Current lead is the Joint Staff,
- J-4 Programs linked to JROC approved
requirementsJoint Staff, J-4 will continue
defining and influencing requirements
8Joint-ITC Framework
Small Business
9Information Assurance
- Develop a prototype system that will demonstrate
a baseline browse-down capability. - Build around existing guards
- Exploit success with further validation and
development - Request a low-side web page from the high side,
retrieve and display - Develop The Guard Guide
- Reference for the user and accrediting
communities on guarding and cross domain
solutions - Interactive CD-ROM product
10Joint Information Technology CenterInformation
Assurance
Akimeka is leading an effort for the DISA to
develop a capability that allows users on
classified networks to access information
resources and databases (i.e. JMAR) on
unclassified military networks using a standard
web-browser in support of the Global Combat
Support System (GCSS) family of systems.
- Systems Highlights
- Reduces costs associated with information
sharing, while improving security and
information flow - Supports reach-back capabilities for deployed
military forces - Supports increased data sharing between the
intelligence and law enforcement communities - Proof of concept in May 2003
11Requirement
- Information to the Edge
- timely, accurate, and actionable personnel and
logistics data to operational commanders at all
levels - Data fusion breaking the stovepipes
- Improved usability web-user-interface
12Development Goals
- Develop a prototype system that will demonstrate
a baseline browse-down capability. - Request a low-side web page from the high side,
retrieve and display
13Who Needs This?
- DOD needs increased information sharing between
people systems operating within its multiple
security levels (TS/SCI, Secret, Unclassified) - Increasing Coalition nature of military
humanitarian operations drives need requirement
for US ? Coalition information sharing - Homeland Security demands inter-community
inter-agency information sharing such as
Intelligence ? Law Enforcement and DIA? CIA
14Information Sharing Requirements
15Looking forward
- Develop a competency driven team in Information
Assurance - Agency buy-in
- Build a lifecycle management program capable of
support - Accredited and deployable system of systems,
supporting national defense, the intelligence
community, and homeland security
16Looking Forward
- Product testing completed
- NSA approval pending
- June 05 the product will be turned over to the
customer - Future international system applications pending
- Akimeka prime contractor SAIC, PEC and NG subs