Download PDF - Department of Navy Chief Information Officer - U.S. ...
Download PDF - Department of Navy Chief Information Officer - U.S. ...
Download PDF - Department of Navy Chief Information Officer - U.S. ...
- No tags were found...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
CHIPS Winter 2003<br />
1
<strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> <strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong><br />
Mr. Dave Wennergren<br />
Space & Naval Warfare Systems Command<br />
Rear Admiral Kenneth D. Slaght<br />
Space & Naval Warfare Systems Center, Charleston<br />
Commanding <strong>Officer</strong><br />
Captain Nancy L. Deitch<br />
Page 6<br />
“...the war on terrorism is just<br />
beginning ...”<br />
The Honorable Gordon R. England<br />
Secretary <strong>of</strong> the <strong>Navy</strong><br />
Page 8<br />
“... Our goal is to make the <strong>Navy</strong><br />
the employer <strong>of</strong> choice for our<br />
young men and women ...”<br />
Adm. Vern Clark<br />
<strong>Chief</strong> <strong>of</strong> Naval Operations<br />
Senior Editor<br />
Sharon Anderson<br />
Assistant Editor<br />
Nancy Reasor<br />
Web support by Bill Bunton and Tony Virata, DON-IT Umbrella<br />
Program.<br />
Page 12<br />
“... President Bush said that the<br />
success <strong>of</strong> the Pacific is essential<br />
to the entire world ...”<br />
Adm. Walter F. Doran<br />
Commander, U.S. Pacific Fleet<br />
CHIPS is sponsored by the <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> <strong>Chief</strong> <strong>Information</strong><br />
<strong>Officer</strong> (DON CIO) and the DON IT Umbrella Program Office, Space and<br />
Naval Warfare Systems Center, San Diego, CA.<br />
CHIPS is published quarterly by the Space & Naval Warfare Systems<br />
Center, Charleston. USPS 757-910 Periodical postage paid at<br />
Norfolk, VA and at additional mailing <strong>of</strong>fice. POSTMASTER: Send<br />
changes to CHIPS, SSC Charleston, Norfolk Office, 9456 Fourth<br />
Ave., Norfolk, VA 23511-2130.<br />
Submit article ideas to CHIPS editors at chips@spawar.navy.mil. We<br />
reserve the right to make editorial changes. All articles printed in<br />
CHIPS become the sole property <strong>of</strong> the publisher. Reprint authorization<br />
will be granted at the publisher's discretion.<br />
Requests for distribution changes or for other assistance should<br />
be directed to Editor, CHIPS, SSC Charleston, 9456 Fourth Ave.,<br />
Norfolk, VA 23511-2130, or call (757) 444-8704; DSN 564. E-mail<br />
address: chips@spawar.navy.mil; FAX (757) 445-2103; DSN 565.<br />
Web address: http://www.chips.navy.mil/.<br />
Disclaimer. The views and opinions contained in CHIPS are not<br />
necessarily those <strong>of</strong> the <strong>Department</strong> <strong>of</strong> Defense nor do they<br />
constitute endorsement or approval by the DON CIO, DON IT<br />
Umbrella Program Office or SPAWAR Systems Center, Charleston.<br />
The facts as presented in each article are verified ins<strong>of</strong>ar as possible,<br />
but the opinions are strictly those <strong>of</strong> the individual authors.<br />
Page 14<br />
“When President Theodore<br />
Roosevelt announced that the<br />
nation would ‘Speak s<strong>of</strong>tly and<br />
carry a big stick,’ the big stick he<br />
was referring to was the United<br />
States <strong>Navy</strong> ...”<br />
Vice Adm. Albert H. Konetzni, Jr.<br />
Deputy and <strong>Chief</strong> <strong>of</strong> Staff<br />
U.S. Atlantic Fleet<br />
Page 25<br />
“JITC’s relationship with the <strong>Navy</strong><br />
spans nearly three decades.”<br />
Page 21<br />
“I think one <strong>of</strong> the cornerstone<br />
joint applications is the Global<br />
Command and Control System.”<br />
Diann L. McCoy<br />
DISA Principal Director for<br />
Applications Engineering<br />
2<br />
CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
Volume XXI Issue I<br />
4 Editor’s Notebook<br />
By Sharon Anderson<br />
5 Embracing Change:<br />
Continuing Transformation<br />
By Dave Wennergren<br />
6 ... the war on terrorism is just beginning<br />
By the Honorable Gordon R. England<br />
Secretary <strong>of</strong> the <strong>Navy</strong><br />
8 Sea Power 21<br />
By Adm. Vern Clark, USN<br />
<strong>Chief</strong> <strong>of</strong> Naval Operations<br />
12 Uniting and Securing the Pacific<br />
Through Technology<br />
By Adm. Walter F. Doran, USN<br />
Commander, U.S. Pacific Fleet<br />
14 Talking with Vice Adm. Albert H.<br />
Konetzni, Jr., USN<br />
Deputy and <strong>Chief</strong> <strong>of</strong> Staff<br />
U.S. Atlantic Fleet<br />
15 Mine Warfare ...<br />
By Vice Adm. Albert H. Konetzni, Jr., USN<br />
20 U.S <strong>Navy</strong> and Air Force Hit<br />
Virtual Bull’s Eye<br />
21 Interview with Diann L. McCoy<br />
DISA Principal Director for<br />
Applications Engineering<br />
24 Revolution Comes to the Teddy Roosevelt<br />
Battle Group<br />
By JO2 Jd Walter, USN<br />
25 JITC Provides Essential Service to the Fleet<br />
By Chris Watson<br />
29 East Timor: A Case Study in<br />
C4 Communications<br />
By Col. Lyle M. Cross, USMC with Col.<br />
Randy P. Strong, USA, Lt. Col. Clinton D.<br />
Wadsworth, USMC and Dave Delaunay<br />
32 Restructuring Naval Education<br />
<strong>Navy</strong> Knowledge Management Portal<br />
By JO2 Jd Walter, USN<br />
Surface Combat Operations New Home<br />
By George Dunn<br />
33 Virtual Connecting Technology<br />
NAVAIR Response Center<br />
By Vicky Falcon<br />
34 CAP Launches New Web Site!<br />
35 A Brief History <strong>of</strong> Personal Computing Part III<br />
By Retired Major Dale J. Long, USAF<br />
38 Talking with Dinah Cohen<br />
Computer/Electronic Accommodations<br />
Program Director<br />
39 NAVAIR Connects with Army Special Forces<br />
By Renee Hatcher<br />
40 NASA Tests New Helmet Developed at NAVAIR<br />
By Renee Hatcher<br />
41 Using Technology to Provide Better Support<br />
for the Federal Workforce<br />
By Sandra J. Smith<br />
43 Security Made Easier Using the NMCI, PKI<br />
and the CAC<br />
By Josephine Smidt and Rebecca Nielson<br />
44 The <strong>Navy</strong>’s Web-based Reverse/Forward Auction<br />
By Cmdr. Steve Dollase, SC, USN<br />
45 CAC Middleware<br />
By Tim Russell<br />
46 How Can I<br />
By the SPAWAR SCC Technology<br />
Training Center Norfolk<br />
48 Under The Contract<br />
By the DON-IT Umbrella Program<br />
CHIPS Winter 2003 3
Apr. 26, 2002, at a<br />
ceremony at the<br />
Pentagon’s Hall <strong>of</strong><br />
Heroes, CNO Adm. Vern<br />
Clark presented the<br />
Purple Heart to Lt.<br />
Schaeffer for the<br />
injuries he sustained<br />
during the 9-11 attack.<br />
Director <strong>of</strong> the Army<br />
Staff Lt. Gen. Kevin<br />
Byrnes presented the<br />
Soldier’s Medal to Army Sgt. 1st Class Steve Workman for<br />
rescuing Schaeffer. Photo by PH1 Roseborough.<br />
Editor’s Notebook<br />
The photo top left is one <strong>of</strong> my favorites. I can’t think <strong>of</strong> a prettier<br />
site than a U.S. <strong>Navy</strong> ship with her proud crew standing topside<br />
— unless, <strong>of</strong> course, it is a <strong>Navy</strong> or Air Force F/A-18 Super Hornet<br />
with the sun glinting on her wings, or a speeding Coast Guard<br />
cutter, or a Marine standing watch, or an advancing Army<br />
battalion ... I think you get my point. In the months since 9-11,<br />
80,000 Americans have deployed in the fight against terrorism.<br />
Through these difficult months Combatant Commanders have<br />
repeatedly praised the bravery <strong>of</strong> military members across the<br />
Services. When questioned about the “toughness” <strong>of</strong> the<br />
younger generation <strong>of</strong> warfighters top military leadership and<br />
Combatant Commanders alike express pride and awe at the<br />
dedication and self-sacrifice <strong>of</strong> today’s servicemembers. They are<br />
eager to defend freedom — and embrace the latest in C2 and<br />
C4ISR innovations. In this issue we explore some <strong>of</strong> the new<br />
technologies that will arm our warfighters in the battle for<br />
freedom.<br />
At the USNI Warfare Exposition and Symposium, Oct. 2002, I had<br />
the privilege <strong>of</strong> briefly meeting retired <strong>Navy</strong> Lt. Kevin Schaeffer<br />
who sustained serious life threatening injuries and burns on 40<br />
percent <strong>of</strong> his body when the <strong>Navy</strong> Command Center where he<br />
worked exploded in a ball <strong>of</strong> fire after terrorists flew a hijacked<br />
airliner into the southwestern wedge <strong>of</strong> the Pentagon Sept. 11,<br />
2001. Meeting Lt. Schaeffer was a revelation for me. He said he<br />
doesn’t consider himself to be a hero, rather he says he is a<br />
survivor. Lt. Schaeffer said the real heroes today are U.S.<br />
servicemembers fighting the war on terrorism.<br />
Our heroes risk their lives 24x7, they aren’t faceless or nameless<br />
— they are our husbands, wives, brothers, sisters, children,<br />
neighbors, friends and fellow Americans. We must arm America’s<br />
best and bravest with the very latest in technology and warfare<br />
capability — they deserve nothing less.<br />
Sharon Anderson<br />
U.S. Marines assigned to 2nd Battalion, 2nd Marines, Echo<br />
Company, 24th Marine Expeditionary Unit (MEU) Special<br />
Operations Capable (SOC) disembark from an Amphibious<br />
Assault Vehicle (AAV) to conduct a live fire training<br />
exercise. Marines from the 24th MEU (SOC) are on a<br />
regularly scheduled deployment conducting exercises in<br />
the U.S. Central Command Area <strong>of</strong> Responsibility (AOR) in<br />
support <strong>of</strong> Operation Enduring Freedom. U.S. <strong>Navy</strong> photo<br />
by PH2 Michael Sandberg.<br />
U.S. Central Command Commander Army Gen. Tommy R.<br />
Franks speaks to Airmen, Soldiers, Sailors and Marines<br />
during a recent troop call. The general visited the base,<br />
which is supporting Operation Southern Watch, to thank the<br />
troops for their efforts in conducting the global war on<br />
terrorism and enforcing the Southern No-Fly Zone over Iraq.<br />
Photo by Senior Airman Nicole Bickford.<br />
4<br />
CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
<strong>Department</strong> <strong>of</strong> the <strong>Navy</strong>, <strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong>, Dave Wennergren<br />
Embracing Change: Continuing Transformation<br />
Change is inevitable. The work <strong>of</strong> a <strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong> revolves around change, and<br />
those that lead change must be prepared to live it too. And so it is with great respect and<br />
admiration that we wish “fair winds and following seas” to Mr. Dan Porter who retired from<br />
Federal Service and stepped down as the <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> CIO on December 1. Over a<br />
four year period, Mr. Porter successfully led the most aggressive and transformational<br />
<strong>Information</strong> Management/<strong>Information</strong> Technology (IM/IT) agenda in the Federal Government.<br />
His tenure included the launching <strong>of</strong> numerous groundbreaking and innovative efforts,<br />
including the <strong>Navy</strong> Marine Corps Intranet, DON eBusiness Operations Office, the first online<br />
reverse auction in Federal Government history,DoD Common Access Card,Critical Infrastructure Protection,Knowledge Management<br />
and Legacy Applications rationalization. It’s not <strong>of</strong>ten that you find an individual that embodies the traits <strong>of</strong> a great leader, great<br />
teacher, great innovator, great mentor and great friend, but those <strong>of</strong> you who worked with Dan know that he has been all these<br />
things, and more, during his almost 30 years <strong>of</strong> service to the U. S. <strong>Navy</strong> and nation.<br />
But change in the IM/IT world is as inevitable as the change in seasons, and so it with a great deal <strong>of</strong> enthusiasm and excitement<br />
that I am proud to continue championing the <strong>Department</strong>’s outstanding IM/IT work to ensure a knowledge- and network-centric<br />
<strong>Navy</strong> and Marine Corps team. Our vision remains clear — to create and maintain: (1) an integrated, results-oriented <strong>Navy</strong> and<br />
Marine Corps team characterized by strategic leadership, shared goals, ubiquitous communication, and invisible technology, (2) an<br />
effective, flexible and sustainable DON enterprise-wide information and technology environment that delivers decisive capability<br />
to the Naval Warfighting Team, and (3) a knowledge-centric culture that fosters innovation and organizational learning, enabling<br />
the rapid and effective transition <strong>of</strong> interoperable solutions in support <strong>of</strong> our expeditionary warfighting and homeland security<br />
missions.<br />
Having served as one <strong>of</strong> the <strong>Department</strong>’s Deputy CIOs for the last four years, I’ve had the tremendous opportunity and great<br />
pleasure <strong>of</strong> working with — and continuing to work with — the most phenomenal group <strong>of</strong> information pr<strong>of</strong>essionals: on the CIO<br />
staff, at the <strong>Navy</strong> and Marine Corps headquarters and throughout the entire <strong>Navy</strong> and Marine Corps team. I believe that the<br />
<strong>Department</strong>’s current IM/IT agenda and strategic plan is right on target: creating a seamless enterprise network; embracing<br />
knowledge management and eGovernment; rationalizing our legacy applications; moving our applications to the Web — accessed<br />
through an enterprise portal structure;establishing authoritative data sources and consolidating databases;providing career paths<br />
and growth opportunities for the IM/IT workforce; embracing new technologies, like wireless, to address the needs <strong>of</strong> our mobile<br />
workforce; providing tools to our people to help them implement these new strategies; championing Smart Cards and Public Key<br />
Infrastructure to increase security; and, aggressively focusing on Critical Infrastructure Protection as a part <strong>of</strong> our full dimensional<br />
protection strategy.<br />
The IM/IT world will continue to evolve. As we evolve with it, we must each keep an eye to the future and continue to ensure that<br />
the <strong>Navy</strong>-Marine Corps team remains agile and ready to embrace these new ideas and new technologies. Part <strong>of</strong> this evolution is<br />
the ongoing restructuring <strong>of</strong> IM/IT management in the <strong>Department</strong>, which will strengthen and align our efforts in several ways.<br />
First, it will establish a <strong>Navy</strong> Flag <strong>Officer</strong> and Marine Corps General <strong>Officer</strong> as Deputy <strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong>s for the <strong>Navy</strong> and<br />
Marine Corps. Formal reporting relationships will also be established between these Deputies and the <strong>Information</strong> <strong>Officer</strong>s at our<br />
major commands to align the DON’s IM/IT vision and execution. “Centers <strong>of</strong> Excellence” across the <strong>Department</strong> will become<br />
management partners, working on specific tasks on behalf <strong>of</strong> the CIO. Finally, a DON IM/IT Implementation Plan will be developed.<br />
This detailed document will link the <strong>Department</strong>’s vision and strategy to actual implementation guidance that will serve as the<br />
basis for funding and approving IM/IT initiatives.<br />
It is a very exciting time,and the opportunities to improve the ways our Sailors,Marines and Civilians fight and work are tremendous.<br />
But it is a time <strong>of</strong> change, and we must all do our part to be change leaders. Choosing to change almost inevitably means choosing<br />
to accept some risks; but choosing not to change, in the midst <strong>of</strong> the digital revolution, almost certainly risks irrelevancy. I look<br />
forward to working with each <strong>of</strong> you as we continue our transformational efforts to ensure that we continue to have the greatest<br />
<strong>Navy</strong> and Marine Corps in the world.<br />
“Putting <strong>Information</strong> to Work for Our People.”<br />
CHIPS Winter 2003 5
The Honorable Gordon R. England<br />
Secretary <strong>of</strong> the <strong>Navy</strong><br />
“Never forget that our great nation is still<br />
threatened and eternal vigilance is still<br />
essential to preserve freedom. Never forget<br />
the sacrifices <strong>of</strong> heroes past and present.”<br />
Edited from Secretary England’s address to<br />
the USNI Warfare Exposition and Symposium,<br />
Virginia Beach, Va., Oct. 3, 2002.<br />
... As our nation approaches the first anniversary<br />
... <strong>of</strong> our first blows for freedom in<br />
the War on Terror ... and I’m not speaking<br />
<strong>of</strong> 9-11, but rather, Oct. 7 [2001] — it will<br />
be exactly a year since Capt. Dave Mercer,<br />
CAG, Carrier Air Wing Eight, launched <strong>of</strong>f<br />
the deck <strong>of</strong> USS Enterprise to deliver the<br />
first strike against Taliban and al Qaeda positions<br />
in Afghanistan. Now,a year later,the<br />
terrorist camps have been destroyed, the<br />
terrorist networks disrupted, and the<br />
people <strong>of</strong> Afghanistan liberated ... but<br />
there are still many more battles to fight ...<br />
All manners <strong>of</strong> journalism will be a part <strong>of</strong><br />
this fight. The military and journalists are<br />
partners in freedom. The military defends<br />
our freedom. Journalists maintain our freedom<br />
... by defending the truth ...<br />
September 11 is indelibly etched in the<br />
collective memory <strong>of</strong> America. Even as we<br />
wrestled with the internal feelings <strong>of</strong> shock,<br />
disbelief, fear, anger and overwhelming<br />
grief ...America was already responding to<br />
the attacks. In New York and at the Pentagon<br />
... police, firefighters, emergency service<br />
providers and ordinary citizens<br />
worked feverishly to rescue survivors and<br />
treat the wounded ... and, <strong>of</strong> course, as we<br />
... the war on terrorism is just<br />
beginning ...<br />
all know very well, heroic actions aboard<br />
United Flight 93 foiled the terrorists’ last<br />
planned attack on our nation’s capital.<br />
While it would be comforting to believe<br />
that this war is drawing to an end, it’s unfortunately<br />
closer to the beginning than to<br />
the end. This is still a time <strong>of</strong> testing for<br />
America ... and for freedom and liberty.<br />
In my lifetime,there have been three“isms”<br />
that threatened America. It took a World<br />
War to defeat the first ism, which America<br />
entered when I was four years old. That was<br />
the war to defeat fascism. We prevailed<br />
militarily and were ultimately victorious by<br />
establishing a new government in Germany<br />
and in Japan.<br />
In 1950, a few short years after defeating<br />
fascism,the nation found itself in war again<br />
in Korea. At that time,we did not know that<br />
the Korean War was merely the first bloody<br />
battle <strong>of</strong> a long war that would last until<br />
the wall came down — almost 40 years<br />
later — in Berlin in 1989. Korea was the<br />
beginning <strong>of</strong> the Cold War when the free<br />
nations <strong>of</strong> the world stood shoulder-toshoulder<br />
to stop communism, the second<br />
ism <strong>of</strong> my lifetime. It took a World War to<br />
defeat fascism and a Cold War to defeat<br />
communism.<br />
Now we are embarked on the war against<br />
terrorism,the third ism,and history has not<br />
yet recorded how this war will be characterized.<br />
We do know, however, that it will<br />
be a long war. It is also a war in which the<br />
United States and its allies must prevail<br />
because the consequences are so pr<strong>of</strong>ound.<br />
For the first time in the history <strong>of</strong><br />
mankind, a small number <strong>of</strong> people with<br />
weapons <strong>of</strong> mass destruction can wreak<br />
untold havoc in our cities and against our<br />
citizens ... against our allies ... and against<br />
freedom loving people around the world.<br />
Several months ago, I was at Pearl Harbor<br />
in Hawaii and visited the USS Arizona. I was<br />
also on board the USS Missouri. These<br />
ships rest side by side. The Arizona is symbolic<br />
<strong>of</strong> the beginning <strong>of</strong> World War II for<br />
America ...and the Missouri symbolic <strong>of</strong> the<br />
ending <strong>of</strong> that war. The peace treaty with<br />
Japan was signed on the deck <strong>of</strong> the Missouri.<br />
These two memorials provide a visual<br />
perspective <strong>of</strong> the beginning and end<br />
<strong>of</strong> a terrible war. Now visualize the tragedy<br />
in New York when the airliners crashed<br />
into the World Trade Centers ... the beginning<br />
<strong>of</strong> the war on terrorism. Now, try to<br />
visualize how this war will end. It certainly<br />
will not end with a peace treaty as it did<br />
on the USS Missouri at the end <strong>of</strong> World<br />
War II. Rather, it will require the military<br />
defeat <strong>of</strong> terrorism followed by a change<br />
<strong>of</strong> governments in countries that support<br />
terrorism. Ultimately that was what was required<br />
to defeat fascism and communism.<br />
... Who could have imagined how fascism<br />
and communism would have ultimately<br />
ended by December 1942 or July 1951<br />
The weapon that ended World War II was<br />
still embryonic in December <strong>of</strong> 1942, and<br />
certainly no one could have imagined in<br />
July 1951 that the Cold War was going to<br />
last another 38 years or that it would ultimately<br />
be won economically rather than<br />
militarily.<br />
I can tell you one year into this war that<br />
our Naval services, our <strong>Navy</strong> and Marines,<br />
have never been better prepared than they<br />
are today. All <strong>of</strong> our readiness accounts are<br />
fully funded, our equipment is ready, our<br />
morale is high, and we are ready to prosecute<br />
the President’s orders. This does not<br />
mean that these are comfortable times.<br />
Rather,as we continue our war against terrorism,<br />
we are also in the process <strong>of</strong> transforming<br />
our military ... and transforming<br />
the very way that the DoD manages its<br />
enterprise to be better prepared to protect<br />
and defend our nation as we face new future<br />
threats. This is not,however,a new role<br />
— our Naval forces have continuously<br />
changed to protect and defend our nation<br />
for the past 227 years.<br />
One year into this war, I do know that victory<br />
in the war against terrorism will be<br />
much broader than just military. It will take<br />
our military, economic and diplomatic<br />
strength to win, and it will also take the<br />
strength <strong>of</strong> our journalists ... I also find it <strong>of</strong><br />
great personal interest that none <strong>of</strong> the<br />
countries associated with any <strong>of</strong> the three<br />
isms ... had or have a free press. Jefferson<br />
was certainly right when he uttered his<br />
now famous dictum,“Were it left to me to<br />
decide ... whether we should have a gov-<br />
6<br />
CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
ernment without newspapers ... or newspapers without a government<br />
... I should not hesitate a moment ... to prefer the latter.”<br />
... To pr<strong>of</strong>essionally challenge assumptions and conclusions and<br />
cause a measured and factual debate is beneficial and therefore<br />
encouraged. Dissent in the name <strong>of</strong> freedom is a virtue.<br />
I said this would likely be a long war and that means we will ask<br />
our sons and daughters, mothers and fathers, — members <strong>of</strong> our<br />
American families to shed blood and, when necessary, to make<br />
the ultimate sacrifice for freedom. That includes the press. Last<br />
year 51 journalists were killed around the globe. All <strong>of</strong> you ...play<br />
a critical role in maintaining public awareness ... and enhancing<br />
public understanding <strong>of</strong> our <strong>Navy</strong>’s daily action ... and the <strong>Navy</strong>’s<br />
role in protecting America.<br />
... I am reminded <strong>of</strong> the words President Bush spoke on his first<br />
visit to the Pentagon ... hours after the attack ... at 6:20 p.m. on<br />
September 12. The fires still burned in the Pentagon ro<strong>of</strong>line ...<br />
the smell <strong>of</strong> smoke permeated the building ... and the sound <strong>of</strong><br />
emergency sirens still pierced the air. Our military was on the<br />
highest alert. The Nation’s senior uniformed and civilian military<br />
leaders were in the room ... the Joint <strong>Chief</strong>s <strong>of</strong> Staff ... my fellow<br />
Service Secretaries ... the Secretary <strong>of</strong> Defense and his Deputy.<br />
The President looked hard at each <strong>of</strong> us in turn and said ...“NEVER<br />
FORGET ...what happened yesterday ...never forget how you felt.<br />
I will never forget. The nation will go on because the nation has<br />
to go on ... people will need to get on with their lives ... but you<br />
and I can never forget, because we are charged by the American<br />
people to protect and defend our nation.” We owe it to our children<br />
and our grandchildren to create a world that is free <strong>of</strong> the<br />
scourge <strong>of</strong> terrorism ... we owe it to the memory <strong>of</strong> those who<br />
have fallen in the line <strong>of</strong> duty ... We must remember the fallen as<br />
they would have wanted to be remembered — living in freedom<br />
as Americans. And it is the challenge to all <strong>of</strong> us ... to ensure that<br />
Americans ... across time and across this great land ... never forget:<br />
Never forget that our great nation is still threatened and eternal<br />
vigilance is still essential to preserve freedom. Never forget<br />
the sacrifices <strong>of</strong> heroes past and present. Never forget what happened<br />
in New York City ...at the Pentagon ... and in the skies over<br />
Somerset County, Pennsylvania. Never forget that as comradesin-arms,<br />
our military and the press have a solemn duty to preserve<br />
liberty and freedom.<br />
God bless each and every one <strong>of</strong> you ... God bless our fallen heroes<br />
and their families ... and God bless the United States <strong>of</strong> America.<br />
Unveiled during a dedication ceremony held on the first anniversary<br />
<strong>of</strong> the Sept. 11, 2001, terrorist attacks, a memorial wall located near<br />
the <strong>Navy</strong>’s newly-reconstructed <strong>Navy</strong> Operations Center in the<br />
Pentagon honors those DON personnel who perished when the<br />
hijacked American Airlines Flight 77 crashed into the building. The<br />
<strong>Navy</strong> lost 42 <strong>of</strong> its personnel, active duty, retired, and employees in<br />
the Pentagon and four retired <strong>of</strong>ficers and a <strong>Navy</strong> employee aboard<br />
Flight 77. U.S. <strong>Navy</strong> photo by PHC Philomena Gorenflo.<br />
Editor’s Note: When President Bush signed the Homeland Security<br />
Bill into law Nov.25, he established a new cabinet-level department<br />
to ensure the safety <strong>of</strong> the American people. Before Bush signed the<br />
bill in a White House ceremony, he announced he will nominate<br />
former Pennsylvania Governor Tom Ridge to be the first Secretary<br />
<strong>of</strong> Homeland Security. He also said he will nominate <strong>Navy</strong> Secretary<br />
Gordon England to be deputy at the 170,000-worker agency.<br />
“The trust and confidence that President Bush has shown in selecting<br />
me to join Governor Tom Ridge in this important work for our<br />
nation is deeply appreciated,” said England, who has served as Secretary<br />
<strong>of</strong> the <strong>Navy</strong> since May 2001. “My only regret is that my time<br />
as Secretary has been too short; however, the naval services continue<br />
in the good hands <strong>of</strong> the Secretariat, Adm. Vern Clark, Gen.<br />
Jim Jones and all the other leaders <strong>of</strong> the <strong>Navy</strong>-Marine Corps Team.<br />
Our naval services are well positioned to carry on their long and<br />
great tradition <strong>of</strong> defending liberty and freedom around the world.”<br />
The new department will analyze threats,guard borders, coordinate<br />
national responses and focus the “full resources <strong>of</strong> the American<br />
government on the safety <strong>of</strong> its people,” Bush said. The bill is a response<br />
to the Sept.11 attacks in New York and Washington D.C. The<br />
idea is to place all federal agencies involved with homeland security<br />
under one umbrella. The few exceptions are the military, the<br />
Federal Bureau <strong>of</strong> Investigation and the Central Intelligence Agency.<br />
He said the Homeland Security Act is the “next logical step” in defending<br />
America. The act amalgamates 22 agencies into one department.<br />
“To succeed in their mission, leaders <strong>of</strong> the new department<br />
must change the culture <strong>of</strong> many diverse agencies, directing<br />
all <strong>of</strong> them toward the principal objective <strong>of</strong> protecting the American<br />
people,” Bush said. “The effort will take time and focus and<br />
steady resolve.” He said adjustments in the department will be<br />
needed, as this is the largest reorganization <strong>of</strong> the U.S. Government<br />
since the 1947 act that established the Defense <strong>Department</strong>. He<br />
said the new department would analyze information collected by<br />
U.S.intelligence agencies and match that against American vulnerabilities.<br />
The new agency will work with other agencies, the private<br />
sector, and state and local governments to harden America’s defenses<br />
against terror, Bush stated.<br />
The agency will focus on safeguarding the U.S. computer network,<br />
and defend against the growing threat <strong>of</strong> chemical, biological or<br />
nuclear assaults. The <strong>Department</strong> <strong>of</strong> Homeland Security will be one<br />
point <strong>of</strong> contact for state and local <strong>of</strong>ficials, and place security for<br />
all U.S. transportation systems under one ro<strong>of</strong>. Bush noted the <strong>Department</strong><br />
<strong>of</strong> Homeland Security will end duplication and overlapping<br />
responsibilities.<br />
As we go to press Secretary England is expected to continue as Secretary<br />
<strong>of</strong> the <strong>Navy</strong> until January 2003.<br />
CHIPS Winter 2003 7
By Adm.Vern Clark, <strong>Chief</strong> <strong>of</strong> Naval Operations<br />
Adm. Clark has written numerous articles and continues to speak about his vision for a fullynetworked<br />
joint warfighter embodied in the vision for Sea Power 21. CHIPS’ editors had the<br />
opportunity to talk with Adm. Clark and hear him speak about how Sea Power 21 will tie together the<br />
Naval, Joint and national information grid, at the USNI Warfare Exposition and Symposium,Virginia<br />
Beach, Va., Oct. 2, 2002. At a lively question and answer session, one young Sailor challenged the<br />
CNO doubting that the <strong>Navy</strong>’s transformation could be done — the CNO countered,“You just watch<br />
us, but we would rather have you join us.” Excerpts are taken from the CNO’s article for Proceedings<br />
Magazine (October 2002 Volume 128/10/1,196), “Sea Power 21— Projecting Decisive Joint<br />
Capabilities” and the admiral’s remarks at the symposium. At left: U. S. <strong>Navy</strong> photo by PH3 Yesenia<br />
Rosas.<br />
...The 21st century sets the stage for tremendous increases in<br />
Naval precision, reach, and connectivity, ushering in a new era <strong>of</strong><br />
joint operational effectiveness. Innovative concepts and technologies<br />
will integrate sea, land, air, space and cyberspace to a<br />
greater extent than ever before. In this unified battlespace, the<br />
sea will provide a vast maneuver area from which to project direct<br />
and decisive power around the globe. Future Naval operations<br />
will use revolutionary information superiority and dispersed,<br />
networked force capabilities to deliver unprecedented <strong>of</strong>fensive<br />
power, defensive assurance, and operational independence to<br />
Joint Force Commanders. Our <strong>Navy</strong> and its partners will dominate<br />
the continuum <strong>of</strong> warfare from the maritime domain —<br />
deterring forward in peacetime, responding to crises, and fighting<br />
and winning wars. By doing so, we will continue the evolution<br />
<strong>of</strong> U.S. Naval power from the blue-water, war-at-sea focus <strong>of</strong><br />
the“Maritime Strategy”(1986), through the littoral emphasis <strong>of</strong>“.<br />
. . From the Sea” (1992) and “Forward . . . from the Sea” (1994), to a<br />
broadened strategy in which Naval forces are fully integrated into<br />
global joint operations against regional and transnational dangers.<br />
The events <strong>of</strong> 9-11,tragically illustrated that the promise <strong>of</strong> peace<br />
and security in the new century is fraught with pr<strong>of</strong>ound dangers:<br />
nations poised for conflict in key regions, widely dispersed<br />
and well-funded terrorist and criminal organizations, and failed<br />
states that deliver only despair to their people. These dangers<br />
will produce frequent crises, <strong>of</strong>ten with little warning <strong>of</strong> timing,<br />
size, location or intensity. Associated threats will be varied and<br />
deadly, including weapons <strong>of</strong> mass destruction, conventional<br />
warfare, and widespread terrorism. Future enemies will attempt<br />
to deny us access to critical areas <strong>of</strong> the world, threaten vital<br />
friends and interests overseas, and even try to conduct further<br />
attacks against the American homeland. These threats will pose<br />
increasingly complex challenges to national security and future<br />
warfighting.<br />
Previous strategies addressed regional challenges. Today,we must<br />
think more broadly. Enhancing security in this dynamic environment<br />
requires us to expand our strategic focus to include both<br />
evolving regional challenges and transnational threats. This combination<br />
<strong>of</strong> traditional and emerging dangers means increased<br />
risk to our nation. To counter that risk, our <strong>Navy</strong> must expand its<br />
striking power, achieve information dominance, and develop<br />
transformational ways <strong>of</strong> fulfilling our enduring missions <strong>of</strong> sea<br />
control, power projection, strategic deterrence, strategic sealift,<br />
and forward presence.<br />
Three fundamental concepts lie at the heart <strong>of</strong> the <strong>Navy</strong>’s continued<br />
operational effectiveness: Sea Strike,Sea Shield and Sea Basing,<br />
illustrated in Figure 1. Sea Strike is the ability to project precise<br />
and persistent <strong>of</strong>fensive power from the sea; Sea Shield extends<br />
defensive assurance throughout the world; and Sea Basing<br />
enhances operational independence and support for the joint<br />
force. These concepts build upon the solid foundation <strong>of</strong> the<br />
<strong>Navy</strong>-Marine Corps team, leverage U.S. asymmetric advantages,<br />
and strengthen joint combat effectiveness.<br />
We <strong>of</strong>ten cite asymmetric challenges when referring to enemy<br />
threats, virtually assuming such advantages belong only to our<br />
adversaries. Sea Power 21 is built on a foundation <strong>of</strong> American<br />
asymmetric strengths that are powerful and uniquely ours.<br />
Among others, these include the expanding power <strong>of</strong> computing,systems<br />
integration,a thriving industrial base,and the extraordinary<br />
capabilities <strong>of</strong> our people, whose innovative nature and<br />
desire to excel give us our greatest competitive advantage.<br />
Sea Strike,Sea Shield and Sea Basing will be enabled by ForceNet,<br />
an overarching effort to integrate warriors,sensors,networks,command<br />
and control, platforms, and weapons into a fully netted,<br />
combat force. We have been talking about network-centric warfare<br />
for a decade, and ForceNet will be the <strong>Navy</strong>’s plan to make it<br />
an operational reality. Supported by ForceNet, Sea Strike, Sea<br />
Shield and Sea Basing capabilities will be deployed by way <strong>of</strong> a<br />
Global Concept <strong>of</strong> Operations that widely distributes the firepower<br />
<strong>of</strong> the fleet, strengthens deterrence, improves crisis response,<br />
and positions us to win decisively in war.<br />
Projecting Decisive Combat Power<br />
Projecting decisive combat power has been critical to every commander<br />
who ever went into battle, and this will remain true in<br />
decades ahead. Sea Strike operations are how the 21st century<br />
<strong>Navy</strong> will exert direct, decisive, and sustained influence in joint<br />
campaigns. They will involve the dynamic application <strong>of</strong> persistent<br />
intelligence,surveillance,and reconnaissance;time-sensitive<br />
strike; ship-to-objective maneuver; information operations; and<br />
covert strike to deliver devastating power and accuracy in future<br />
campaigns. <strong>Information</strong> gathering and management are at the<br />
8<br />
CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
heart <strong>of</strong> this revolution in striking power. Networked, long-dwell<br />
Naval sensors will be integrated with national and joint systems<br />
to penetrate all types <strong>of</strong> cover and weather, assembling vast<br />
amounts <strong>of</strong> information. Data provided by <strong>Navy</strong> assets — manned<br />
and unmanned — will be vital to establishing a comprehensive<br />
understanding <strong>of</strong> enemy military, economic, and political<br />
vulnerabilities. Rapid planning processes will then use this<br />
knowledge to tailor joint strike packages that deliver calibrated<br />
effects at precise times and places.<br />
... <strong>Information</strong> superiority and flexible strike options will result in<br />
time-sensitive targeting with far greater speed and accuracy.<br />
Military operations will become more complicated as advanced<br />
intelligence, surveillance, and reconnaissance products proliferate.<br />
Expanded situational awareness will put massed forces at<br />
risk,for both friends and adversaries. This will compress timelines<br />
and prompt greater use <strong>of</strong> dispersed, low-visibility forces. Countering<br />
such forces will demand speed, agility and streamlined information<br />
processing tied to precision attack. Sea Strike will meet<br />
that challenge.<br />
The importance <strong>of</strong> information operations will grow in the years<br />
ahead as high-technology weapons and systems become more<br />
widely available. <strong>Information</strong> operations will mature into a major<br />
warfare area, to include electronic warfare, psychological operations,<br />
computer network attack, computer network defense,<br />
operations security and military deception. <strong>Information</strong> operations<br />
will play a key role in controlling crisis escalation and preparing<br />
the battlefield for subsequent attack. This U.S. asymmetric<br />
[advantage] will be a critical part <strong>of</strong> Sea Strike.<br />
When we cannot achieve operational objectives from over the<br />
horizon, our <strong>Navy</strong>-Marine Corps team moves ashore. Using advanced<br />
vertical and horizontal envelopment techniques, fully<br />
netted ground forces will maneuver throughout the battlespace,<br />
employing speed and precision to generate combat power. Supported<br />
by sea bases, we will exploit superior situational awareness<br />
and coordinated fires to create shock, confusion and chaos<br />
in enemy ranks. <strong>Information</strong> superiority and networking will act<br />
as force multipliers, allowing agile ground units to produce the<br />
warfighting impact traditionally provided by far heavier forces,<br />
bringing expeditionary warfare to a new level <strong>of</strong> lethality and<br />
combat effectiveness.<br />
... Sea Strike operations will be fully integrated into joint campaigns,adding<br />
the unique independence,responsiveness,and onscene<br />
endurance <strong>of</strong> Naval forces to joint strike efforts. Combined<br />
sea-based and land-based striking power will produce devastating<br />
effects against enemy strategic,operational and tactical pressure<br />
points — resulting in rapid,decisive operations and the early<br />
termination <strong>of</strong> conflict.<br />
Sea Shield to Protect Our National Interests<br />
Traditionally, Naval defense has protected the unit, the fleet and<br />
the sea lines <strong>of</strong> communication. Tomorrow’s <strong>Navy</strong> will do much<br />
more. Sea Shield takes us beyond unit and task-force defense to<br />
provide the nation with sea-based theater and strategic defense.<br />
Sea Shield will protect our national interests with layered global<br />
defensive power based on control <strong>of</strong> the seas, forward presence<br />
and networked intelligence. It will use these strengths to enhance<br />
homeland defense,assure access to contested littorals and project<br />
defensive power deep inland. As with Sea Strike, the foundation<br />
Figure 1. Sea Power 21<br />
Sea Shield<br />
FORCENet<br />
Sea Basing<br />
Sea Strike<br />
<strong>of</strong> these integrated operations will be information superiority,total<br />
force networking,and an agile and flexible sea-based force. Homeland<br />
defense will be accomplished by a national effort that integrates<br />
forward-deployed Naval forces with the other military services,civil<br />
authorities,and intelligence and law-enforcement agencies.<br />
Working with the newly established Northern Command,<br />
we will identify, track, and intercept dangers long before they<br />
threaten our homeland ...<br />
Maritime patrol aircraft,ships,submarines and unmanned vehicles<br />
will provide comprehensive situational awareness to cue<br />
intercepting units. When sent to investigate a suspicious vessel,<br />
boarding parties will use advanced equipment to detect the<br />
presence <strong>of</strong> contraband by visual, chemical and radiological<br />
methods. Forward-deployed Naval forces will also protect the<br />
homeland by engaging inbound ballistic missiles in the boost or<br />
mid-course phase,when they are most vulnerable to interception.<br />
In addition,our nuclear-armed Trident ballistic missile submarine<br />
force will remain on silent patrol around the world, providing the<br />
ultimate measure <strong>of</strong> strategic deterrence. These highly survivable<br />
submarines are uniquely powerful assets for deterring aggressors<br />
who would contemplate using weapons <strong>of</strong> mass destruction.<br />
... In times <strong>of</strong> rising tension, prepositioned Naval units will sustain<br />
access for friendly forces and maritime trade by employing evolving<br />
expeditionary sensor grids and advanced deployable systems<br />
to locate and track enemy threats. Speed will be an ally as linked<br />
sensors,high-speed platforms,and improved kill vehicles consolidate<br />
area control, including the location and neutralization <strong>of</strong><br />
mines via state-<strong>of</strong>-the-art technology on dedicated mine warfare<br />
platforms and battle group combatants. Mission-reconfigurable<br />
Littoral Combat Ships, manned and unmanned aviation assets,<br />
and submarines with unmanned underwater vehicles will gain<br />
and maintain the operational advantage,while sea-based aircraft<br />
and missiles deliver air dominance. The result will be combatready<br />
forces that are prepared to “climb into the ring” to achieve<br />
and sustain access before and during crises.<br />
A next-generation long-range surface-to-air Standard Missile,<br />
modernized E-2 Hawkeye radar and Cooperative Engagement<br />
Capability will combine to extend sea-based cruise missile defense<br />
far inland. This will reinforce the impact <strong>of</strong> sea-based ballistic<br />
missile defense and greatly expand the coverage <strong>of</strong> Naval area<br />
defense. These capabilities represent a broadened mission for<br />
our <strong>Navy</strong> that will lessen the defensive burden on land forces and<br />
increase sea-based influence over operations ashore.<br />
CHIPS Winter 2003 9
“... In the role <strong>of</strong> ForceNet chief engineer, we must think outside the boundaries <strong>of</strong> SPAWAR’s traditional product lines to build a<br />
truly robust architecture encompassing the integration <strong>of</strong> weapon, sensor and information grids ... It is an exciting time to be a<br />
part <strong>of</strong> the SPAWAR team. Our mission is critical, now more than ever, to the <strong>Navy</strong> and Nation during the war against terrorism.<br />
In the weeks and months to come, we must continue to focus on providing the blue prints for ForceNet ...”<br />
Rear Adm. Kenneth D. Slaght, COMSPAWAR, addressing SPAWAR employees, June 21, 2002<br />
Offensive and Defensive Independence<br />
... Sea Basing serves as the foundation from which <strong>of</strong>fensive and<br />
defensive fires are projected — making Sea Strike and Sea Shield<br />
realities. As enemy access to weapons <strong>of</strong> mass destruction grows,<br />
and the availability <strong>of</strong> overseas bases declines, it is compelling<br />
both militarily and politically to reduce the vulnerability <strong>of</strong> U.S.<br />
forces through expanded use <strong>of</strong> secure, mobile, networked sea<br />
bases. Sea Basing capabilities will include providing Joint Force<br />
Commanders with global command and control extending integrated<br />
logistical support to other Services. Afloat positioning <strong>of</strong><br />
these capabilities strengthens force protection and frees airliftsealift<br />
to support missions ashore.<br />
Netted and dispersed sea bases will consist <strong>of</strong> numerous platforms,<br />
including nuclear-powered aircraft carriers, multi-mission<br />
destroyers, submarines with Special Forces and maritime prepositioned<br />
ships, providing greatly expanded power to joint operations.<br />
Sea-based platforms will also enhance coalition-building<br />
efforts, sharing their information and combat effectiveness<br />
with other nations in times <strong>of</strong> crisis.<br />
Sea Basing accelerates expeditionary deployment and employment<br />
timelines by prepositioning vital equipment and supplies<br />
in-theater, preparing the United States to take swift and decisive<br />
action during crises. We intend to develop these capabilities to<br />
the fullest extent. Strategic sealift will be central to this effort. It<br />
remains a primary mission <strong>of</strong> the U.S. <strong>Navy</strong> and will be critical<br />
during any large conflict fought ashore. Moreover, we will build<br />
prepositioned ships with at-sea-accessible cargo, awaiting closure<br />
<strong>of</strong> troops by way <strong>of</strong> high-speed sealift and airlift. Joint operational<br />
flexibility will be greatly enhanced by employing prepositioned<br />
shipping that does not have to enter port to <strong>of</strong>f-load.<br />
Twenty-first-century operations will require greater efficiencies<br />
through the development <strong>of</strong> joint logistical support ...<br />
ForceNet is the glue ...<br />
ForceNet is the “glue” that binds together Sea Strike, Sea Shield<br />
and Sea Basing. It is the operational construct and architectural<br />
framework for Naval warfare in the information age, integrating<br />
warriors,sensors, command and control, platforms, and weapons<br />
into a networked, distributed combat force. ForceNet will provide<br />
the architecture to increase substantially combat capabilities<br />
through aligned and integrated systems, functions, and missions.<br />
It will transform situational awareness, accelerate speed <strong>of</strong><br />
decision and allow us to greatly distribute combat power.<br />
ForceNet will harness information for knowledge-based combat<br />
operations and force survivability and provide real-time enhanced<br />
collaborative planning among joint and coalition partners.<br />
Using a total system approach, ForceNet will shape the<br />
development <strong>of</strong> integrated capabilities. These include maritime<br />
information processing and command and control components<br />
that are fully interoperable with joint systems; intelligence,<br />
surveillance, and reconnaissance fusion capabilities to support<br />
rapid targeting and maneuver; open systems architecture for<br />
broad and affordable interoperability; and safeguards to ensure<br />
networks are reliable and survivable. ForceNet also emphasizes<br />
the human factor in the development <strong>of</strong> advanced technologies.<br />
This philosophy acknowledges that the warrior is a premier<br />
element <strong>of</strong> all operational systems. Today, ForceNet is moving<br />
from concept to reality. Initial efforts will focus on integrating<br />
existing networks, sensors and command and control systems.<br />
In the years ahead, it will enable the Naval service to employ a<br />
fully netted force, engage with distributed combat power, and<br />
command with increased awareness and speed as an integral part<br />
<strong>of</strong> the joint team.<br />
Global Concept <strong>of</strong> Operations<br />
Sea Power 21 will be implemented by a Global Concept <strong>of</strong><br />
Operations that will provide our nation with widely dispersed<br />
combat power from platforms possessing unprecedented<br />
warfighting capabilities ... The Global Concept <strong>of</strong> Operations will<br />
disperse combat striking power by creating additional<br />
independent operational groups capable <strong>of</strong> responding<br />
simultaneously around the world. This increase <strong>of</strong> combat power<br />
is possible because technological advancements are dramatically<br />
transforming the capability <strong>of</strong> our ships, submarines and aircraft<br />
to act as power projection forces, netted together for expanded<br />
warfighting effect.<br />
... The Global Concept <strong>of</strong> Operations requires a fleet <strong>of</strong> approximately<br />
375 ships that will increase our striking power from today’s<br />
12 carrier battle groups, to 12 Carrier Strike Groups, 12 Expeditionary<br />
Strike Groups, and multiple missile-defense Surface Action<br />
Groups and guided-missile submarines. These groups will<br />
operate independently around the world to counter transnational<br />
threats and they will join together to form Expeditionary Strike<br />
Forces — the “gold standard” <strong>of</strong> Naval power — when engaged<br />
in regional conflict.<br />
Sea Trial, Sea Warrior and Sea Enterprise<br />
We are developing Sea Strike, Sea Shield and Sea Basing through<br />
a supporting triad <strong>of</strong> organizational processes: Sea Trial,Sea Warrior<br />
and Sea Enterprise — initiatives that will align and accelerate<br />
the development <strong>of</strong> enhanced warfighting capabilities for the<br />
fleet .... The <strong>Navy</strong> starts with the fleet, and Sea Trial will be fleetled.<br />
The Commander, U.S. Fleet Forces Command, will serve as<br />
Executive Agent for Sea Trial, with Second and Third Fleet commanders<br />
sponsoring the development <strong>of</strong> Sea Strike, Sea Shield<br />
and Sea Basing capabilities. These commanders will reach<br />
throughout the military and beyond to coordinate concept and<br />
technology development in support <strong>of</strong> future warfighting effectiveness.<br />
The Systems Commands and Program Executive Offices<br />
will be integral partners in this effort,bringing concepts to reality<br />
through technology innovation and the application <strong>of</strong> sound<br />
business principles.<br />
The <strong>Navy</strong> Warfare Development Command, reporting directly to<br />
the Commander, U.S. Fleet Forces Command, will coordinate Sea<br />
Trial. Working closely with the fleets, technology development<br />
10 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
centers and academic resources, the <strong>Navy</strong> Warfare Development<br />
Command will integrate wargaming, experimentation, and exercises<br />
to speed development <strong>of</strong> new concepts and technologies.<br />
They will do this by identifying candidates with the greatest potential<br />
to provide dramatic increases in warfighting capability.<br />
Embracing spiral development,these technologies and concepts<br />
will then be matured through targeted investment and guided<br />
through a process <strong>of</strong> rapid prototyping and fleet experimentation.<br />
“ ... I don’t need anymore R&D bills for the old <strong>Navy</strong><br />
stovepipe — everything we build or buy — will be for<br />
a joint environment ...”<br />
... The Sea Warrior program implements our <strong>Navy</strong>’s commitment<br />
to the growth and development <strong>of</strong> our people. It will serve as the<br />
foundation <strong>of</strong> warfighting effectiveness by ensuring the right skills<br />
are in the right place at the right time. Led by the <strong>Chief</strong> <strong>of</strong> Naval<br />
Personnel and Commander, Naval Education and Training Command,Sea<br />
Warrior will develop naval pr<strong>of</strong>essionals who are highly<br />
skilled, powerfully motivated, and optimally employed for mission<br />
success.<br />
Traditionally, our ships have relied on large crews to accomplish<br />
their missions. Today, our all-volunteer service is developing new<br />
combat capabilities and platforms that feature dramatic<br />
advancements in technology and reductions in crew size. The<br />
crews <strong>of</strong> modern warships are streamlined teams <strong>of</strong> operational,<br />
engineering and information technology experts who collectively<br />
operate some <strong>of</strong> the most complex systems in the world. As<br />
optimal manning policies and new platforms reduce crew size<br />
further,we will increasingly need Sailors who are highly educated<br />
and expertly trained.<br />
In July 2001,we established Task Force EXCEL (Excellence through<br />
our Commitment to Education and Learning) to begin a revolution<br />
in training that complements the revolution in technologies,<br />
systems, and platforms for tomorrow’s fleet. We are dedicated to<br />
improving our Sailors’ pr<strong>of</strong>essional and personal development,<br />
leadership, military education, and performance. Task Force EX<br />
CEL will apply information-age methods to accelerate learning<br />
and improve pr<strong>of</strong>iciency, including advanced trainers and simulators,tailored<br />
skills training programs,improved mentoring techniques,and<br />
more effective performance measurement and counseling<br />
tools.<br />
... Central to Sea Warrior is Project SAIL (Sailor Advocacy through<br />
Interactive Leadership). Project SAIL is moving the <strong>Navy</strong> toward<br />
an interactive and incentivized distribution system that includes<br />
guaranteed schools for high-performing non-rated personnel,<br />
team detailing,Internet job listings,an information call center and<br />
expanded detailer outreach. These actions will put choice in the<br />
process for both gaining commands and Sailors, and it will empower<br />
our people to make more informed career decisions. Our<br />
goal is to create a <strong>Navy</strong> in which all Sailors — active and reserve,<br />
afloat and ashore — are optimally assessed,trained and assigned<br />
so that they can contribute their fullest to mission accomplishment.<br />
Among the critical challenges that we face today are finding and<br />
allocating resources to recapitalize the <strong>Navy</strong>. We must replace<br />
Cold War-era systems with significantly more capable sensors,networks,<br />
weapons, and platforms if we are to increase our ability to<br />
deter and defeat enemies.<br />
Sea Enterprise, led by the Vice <strong>Chief</strong> <strong>of</strong> Naval Operations, is key to<br />
this effort. Involving the <strong>Navy</strong> Headquarters, the Systems Commands<br />
and the Fleet,it seeks to improve organizational alignment,<br />
refine requirements, and reinvest savings to buy the platforms<br />
and systems needed to transform our <strong>Navy</strong>. Drawing on lessons<br />
from the business revolution,Sea Enterprise will reduce overhead,<br />
streamline processes, substitute technology for manpower and<br />
create incentives for positive change. Legacy systems and platforms<br />
no longer integral to mission accomplishment will be retired,<br />
and we will make our <strong>Navy</strong>’s business processes more efficient<br />
to achieve enhanced warfighting effectiveness in the most<br />
cost-effective manner.<br />
...It is also important that our leaders understand sound business<br />
practices so that we can provide the greatest return on the<br />
taxpayer’s investment. To meet this need, we are creating<br />
educational opportunities to teach our leaders about executive<br />
business management, finance and information technology. For<br />
example, the Center for Executive Education at the Naval<br />
Postgraduate School brings together rising flag <strong>of</strong>ficers and<br />
private industry decision-makers to discuss emerging business<br />
practices. We must also extend this understanding to the<br />
deckplates,so that our future leaders gain experience in a culture<br />
<strong>of</strong> strengthened productivity and continually measured<br />
effectiveness.<br />
Increased inter-service integration also holds great promise for<br />
achieving efficiencies. For example, the <strong>Navy</strong> and Marine Corps<br />
tactical aviation integration plan will save billions <strong>of</strong> dollars for<br />
both services, enhance our interoperability, and more fully integrate<br />
our people. Whether it is the U.S. Coast Guard’s Deepwater<br />
Integrated Systems Program, new munitions being developed<br />
with the U.S. Air Force, joint experiments with the U.S. Army on<br />
high-speed vessels,or a new combined intelligence structure with<br />
the U.S. Marine Corps, we will share technologies and systems<br />
whenever possible ...Savings captured by Sea Enterprise will play<br />
a critical role in the <strong>Navy</strong>’s transformation into a 21st-century force<br />
that delivers what truly matters: increased combat capability.<br />
“... Generation X, what is that ... All I can say is that<br />
the young people in the <strong>Navy</strong> today fighting in<br />
defense <strong>of</strong> freedom are the best. I am very proud <strong>of</strong><br />
the job they are doing ...”<br />
Global Naval Power<br />
The 21st century is clearly characterized by dangerous uncertainty<br />
and conflict. In this unpredictable environment, military forces<br />
will be required to defeat a growing range <strong>of</strong> conventional and<br />
asymmetric threats. Sea Power 21 is our vision to align, organize,<br />
integrate, and transform our <strong>Navy</strong> to meet the challenges that lie<br />
ahead ... It is global in scope, fully joint in execution, and dedicated<br />
to transformation. It reinforces and expands concepts being<br />
pursued by the other Services — long-range strike; global<br />
intelligence,surveillance,and reconnaissance; expeditionary maneuver<br />
warfare; and light, agile ground forces — to generate<br />
maximum combat power from the joint team ...<br />
CHIPS Winter 2003 11
Edited from a brief given by<br />
Adm. Doran at TechNet Asia-<br />
Pacific 2002, November 2002.<br />
“Uniting and Securing the<br />
Pacific through Technology”<br />
is an appropriate theme,<br />
considering the vastness,<br />
diversity,and importance <strong>of</strong><br />
the region. Earlier this year,<br />
while addressing the Diet in<br />
Tokyo, President Bush said<br />
that the success <strong>of</strong> the Pa-<br />
Adm. Walter F. Doran cific is essential to the entire<br />
Commander, U.S. Pacific Fleet world, and that he’s convinced<br />
“the 21st century will<br />
be the Pacific century.” That’s quite an endorsement ...and,it highlights<br />
for us that a stable, united, and secure Pacific is in our, and<br />
the world’s best interest. As the Pacific Fleet Commander, that is<br />
one <strong>of</strong> my primary tasks and I need the help <strong>of</strong> all <strong>of</strong> you to accomplish<br />
it.<br />
Another important responsibility that I have is to organize, train<br />
and equip our Naval Forces for the Pacific Commander, in carrying<br />
out that responsibility, I depend on you again ... because we<br />
equip our Sailors with the systems and technology that you develop<br />
so that they can accomplish the mission. I’ll discuss that<br />
mission and our current operations and touch upon the technology,developed<br />
by many <strong>of</strong> you,that enables Sailors to succeed ...<br />
then I’ll describe our vision and goals for the future ... <strong>of</strong> which<br />
you are an increasingly important part.<br />
We are a 310 ship <strong>Navy</strong>. Today, 161 <strong>of</strong> these ships are underway<br />
or away from their homeport, and <strong>of</strong> these, 115 are deployed ...<br />
more than half from the Pacific. The USS Abraham Lincoln is flying<br />
missions over Iraq enforcing the Southern No-Fly zone. The<br />
ships <strong>of</strong> her Battle Group are enforcing U.N.Sanctions against Iraq<br />
and hunting for terrorists on the high seas with our allies. The<br />
Belleau Wood Amphibious Ready Group is wrapping up her tour<br />
in the region supporting Operation Enduring Freedom and contingency<br />
operations,and is headed home via some well-deserved<br />
port visits. The USS Kitty Hawk, our forward-deployed carrier<br />
homeported inYokosuka,Japan,recently completed Carrier Qualifications<br />
with her air wing and is a “full-up round” after a brief<br />
respite and a much-needed maintenance period. The Forward<br />
Deployed Naval Force truly remains the “Tip <strong>of</strong> the Spear” in the<br />
Western Pacific.<br />
The Essex Amphibious Ready Group, also homeported in Japan,<br />
is ready for tasking and training hard. The Constellation Battle<br />
Group left San Diego almost three weeks ago en route to the war,<br />
and the Tarawa Amphibious Ready Group is in the final stages <strong>of</strong><br />
their training. The Carl Vinson Battle Group is also training hard<br />
and will deploy soon. No surprises here. This is what we do, and<br />
we do it better than any <strong>Navy</strong> in history. None <strong>of</strong> us know what<br />
the future will hold — but the Pacific Fleet will be ready if called.<br />
This past year in support <strong>of</strong> the Global War on Terror, the <strong>Navy</strong><br />
has deployed seven Carrier Battle Groups,five Amphibious Ready<br />
Groups, and more than 80,000 Sailors and Marines to Southwest<br />
Asia. Less than a month after September 11, our pilots were flying<br />
combat missions over 1,000 miles inland taking the fight to<br />
the Taliban and al Qaeda with a 70 percent bombing effectiveness<br />
rate. This is a tribute to our outstanding Airmen and hardworking<br />
Sailors, and to you — the technical community — who<br />
develop the tools that help us do our jobs better and more efficiently.<br />
Much has been said about our asymmetric scientific and technological<br />
advantage, and how we will use this advantage to continue<br />
to dominate the battlespace. Your work in the critical areas<br />
<strong>of</strong> communications,electronics,intelligence and information systems,<br />
is helping us win the war on terrorism,and will be critical as<br />
we continue the fight against a distributed, elusive and dangerous<br />
enemy. While we ARE winning, the war is far from over as<br />
demonstrated inYemen,Indonesia,the Philippines and elsewhere.<br />
Thanks to you, our Sailors on the frontline have some extraordinary<br />
tools to accomplish their mission. Communications systems<br />
are more automated and much more reliable. Radioman have<br />
been transformed into <strong>Information</strong> Technicians. They manage a<br />
myriad <strong>of</strong> communications and Link systems including SHF, EHF<br />
SATCOM MDR, Link 16, Satellite Link 16 and multiple forms <strong>of</strong> old<br />
reliable Link 11.<br />
In addition to being the first battle group to deploy the F/A-18 E/F<br />
and taking forward our Sea Swap initiative with USS Fletcher —<br />
the Abraham Lincoln Battle Group has brought the Joint Fires Network,<br />
a network-centric warfare system that enables real-time<br />
engagement <strong>of</strong> time critical targets. This capability will allow ships<br />
in a battle group to share real time targeting and intelligence data<br />
with each other, as well as with other warfighting assets in a joint<br />
or coalition task force.<br />
Area Air Defense Commander capabilities also accompanied<br />
Lincoln to the fight, and next year’s deployment <strong>of</strong> Nimitz Battle<br />
Group will introduce Cooperative Engagement Capability to the<br />
Pacific Fleet. Today, Collaboration at Sea and K-WEB are addressing<br />
the challenge that Naval Forces face in connecting a large<br />
group <strong>of</strong> worldwide users to a significant amount <strong>of</strong> information,<br />
in an environment <strong>of</strong> low bandwidth and intermittent connectivity.<br />
Collaboration at Sea and K-WEB are addressing these issues<br />
through the use <strong>of</strong> three important tools: a standardized<br />
operational Web site for non-real time collaboration, chat capability<br />
for real time collaboration, and customized Web site replication<br />
to mitigate bandwidth limitations. In the past,Battle Group<br />
Commanders’ fireside chats were conducted via a satellite command<br />
circuit — a Communications <strong>Officer</strong>’s nightmare! Today,in<br />
many cases, they are conducted via chat room. Warfare Commanders<br />
have separate chat rooms to help manage the war, as<br />
do operators to share expertise and experience.<br />
A Joint Task Force can now train via the Web ...In the Pacific Fleet,<br />
we have just demonstrated the value and efficiency <strong>of</strong> this innovative<br />
training tool. Sailors, Soldiers, Airmen and Marines, making<br />
up a standing Joint Task Force, can train through Web-based<br />
technology at their individual duty stations. Then, when called<br />
upon, can assemble as a JTF and carry out missions directed by<br />
12<br />
CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
the Pacific Commander. This is truly transformational<br />
and has great potential for use, not<br />
only here, but in every theater. We are also<br />
pushing the bandwidth envelope. Photos <strong>of</strong><br />
suspected oil smugglers or terrorists are relayed<br />
back from the front where their pr<strong>of</strong>iles<br />
can be compared in worldwide databases.<br />
Through Distance Support, ship technicians<br />
are reaching back to CONUS for help in<br />
troubleshooting and repairing casualties allowing<br />
ships to stay on station and minimize<br />
the expense <strong>of</strong> flying technicians to the theatre.<br />
There are many other examples. Advances<br />
in IT have taken the <strong>Navy</strong> into the 21st<br />
Century. We are breaking new ground with unmanned vehicles,<br />
shortening the timeline from sensor to shooter, and adding precision<br />
and lethality to our weapons.<br />
But, as we all know, advancement and innovation does not come<br />
without challenges. One such challenge is bandwidth. Our new<br />
Arleigh Burke Aegis Destroyers, even with a Dual Inmarsat capability,<br />
are limited to 64 kilo bits per second, and [they] have multiple<br />
antenna blind zones to manage. Bandwidth allocation and<br />
management — Fleet and Battle Group-wide — is still a challenge,<br />
as is interoperability with our coalition, and in some cases,<br />
joint partners. The Coalition Wide Area Network is a success and<br />
being used extensively during Operation Enduring Freedom as a<br />
critical communications link with our coalition partners. However,<br />
COWAN has many restrictions making information sharing<br />
across the coalition <strong>of</strong>ten very, very difficult. We must get this<br />
right.<br />
These are some <strong>of</strong> the nagging problems that Sailors work<br />
through daily. The future holds the solutions to these problems,<br />
because you will deliver them along with other advances and innovations<br />
not yet imagined. To achieve this goal — with your<br />
help and capability — we in uniform must share our vision <strong>of</strong> the<br />
future. I’m convinced the future is exciting for the U.S. <strong>Navy</strong> ...<br />
and while our focus remains unquestionably the Global War On<br />
Terrorism, we must plan and prepare for a dynamic and indeed<br />
an uncertain future. Today’s strategic environment is far less stable<br />
than the era <strong>of</strong> the Cold War where we had predominantly one<br />
competitor and adversary — the former Soviet Union.<br />
Today in the Pacific we face a multitude <strong>of</strong> threats from state and<br />
non-state actors magnified by the proliferation <strong>of</strong> weapons <strong>of</strong><br />
mass destruction. To effectively deal with this destabilizing and<br />
dangerous threat, we must recapitalize our force, transform, and<br />
distribute our combat power. As defined by Adm.Clark,our CNO,<br />
Sea Power 21 is the blueprint for this change organized around<br />
three core operational concepts: Sea Strike (projecting precise,<br />
persistent, and decisive firepower globally from the sea), Sea<br />
Shield (projecting defensive power deep overland to protect our<br />
joint forces and ensure our access to the littoral), and Sea Basing<br />
(projecting operational independence for our joint forces from<br />
the sea).<br />
The glue that binds these concepts together is ForceNet ... a concept<br />
that is being developed by Vice Adm.Dick Mayo and his crew<br />
at the new Naval Network Warfare Command. ForceNet, when<br />
fully developed,will integrate our ships,sensors and weapons into<br />
a networked combat force. The first step toward ForceNet is, in<br />
USS Abraham Lincoln (CVN 72)<br />
Nov. 24, 2002 — EWS2 Sarah<br />
Lanoo operates a Naval Tactical<br />
Data System (NTDS) console in<br />
the Combat Direction Center<br />
(CDC) aboard USS Abraham<br />
Lincoln. The Abraham Lincoln is<br />
on a regularly scheduled<br />
deployment conducting combat<br />
operations in support <strong>of</strong><br />
Operation Southern Watch. U.S.<br />
<strong>Navy</strong> photo by PH3 Patricia<br />
Totemeier.<br />
the near term, to network legacy systems and remove systems<br />
that can’t be networked. Sea Power 21 will be implemented by a<br />
Naval Global Concept <strong>of</strong> Operations that restructures our force<br />
and distributes our striking power. Tomorrow’s force will be made<br />
up <strong>of</strong> Carrier and Expeditionary Strike Groups, Missile Defense<br />
Surface Action Groups,the Cruise Missile Nuclear Submarine and<br />
a faster, more capable, and more versatile combat logistics force<br />
— all networked together.<br />
In fact,in the coming year, both the Pacific and Atlantic Fleets will<br />
use deployers to experiment with the Expeditionary Strike Group<br />
[ESG - an amphibious ship with embarked Marine Expeditionary<br />
Units,a cruiser,a destroyer,a frigate,an attack submarine and dedicated<br />
P-3 Orion surveillance aircraft] concept, it combines surface<br />
combatants and submarines with our Amphibious Ready<br />
Groups and gives us greater operational agility and <strong>of</strong>fensive capability.<br />
The experiments look different on each coast ... In the<br />
Pacific we will add a Flag <strong>Officer</strong> in command with an operational<br />
staff ...this will give us an opportunity to compare and learn from<br />
two different approaches. We will also experiment with this concept<br />
early next year during Exercise Tandum Thrust.<br />
Sea Power 21 supporting initiatives already in development are:<br />
Sea Trial (a fleet-led effort to identify and transition promising<br />
capabilities to our ships through aggressive experimentation),Sea<br />
Warrior (an innovative training and detailing approach to ensure<br />
our Sailors are given the right skills, and are detailed commensurate<br />
with these skills at the right time),and Sea Enterprise (a badly<br />
needed streamlining <strong>of</strong> our resource and acquisition process). In<br />
the development <strong>of</strong> ForceNet, clearly there is a role for the technology<br />
community — your intellect,and experience,at every step<br />
<strong>of</strong> the transformation process to make Sea Power 21 a reality. It’s<br />
going to be a fast and exciting ride and we will take it together. I<br />
will go further to say that your role in this process is absolutely<br />
vital. You are the source <strong>of</strong> our asymmetric advantage and the<br />
ones who, year after year, deliver our Sailors the tools to keep our<br />
nation safe.<br />
Earlier this year,at the Argonne National Laboratory in Illinois,the<br />
President said, “In this new war, we will rely upon the genius and<br />
creativity <strong>of</strong> the American people. Our scientific community is serving<br />
on the front lines <strong>of</strong> this war, by developing new technologies<br />
that will make America safer.” He couldn’t be more right and this<br />
is the charge for each and every one <strong>of</strong> you. I hope that I have<br />
given you an adequate picture <strong>of</strong> where the <strong>Navy</strong> is, where we<br />
are going, and how much we appreciate and depend on your<br />
service. We all have a great challenge ahead <strong>of</strong> us, and I am confident<br />
that together we will meet those challenges.<br />
CHIPS Winter 2003 13
It is a great pleasure to be with you to discuss<br />
the state <strong>of</strong> the U.S. <strong>Navy</strong> ... I had the<br />
great pleasure <strong>of</strong> welcoming the USS<br />
Monitor’s turret home to Hampton Roads<br />
a few weeks ago. It was an impressive occasion.<br />
I think Monitor’s story has great<br />
lessons for Americans.<br />
In many ways USS Monitor symbolizes<br />
both the best and worst about America. In<br />
my view, America’s greatest quality is our<br />
innovative spirit. Our freedom, ideas and<br />
actions have produced the world’s greatest<br />
inventions and subsequently the greatest<br />
economy. At the same time,Americans<br />
have short memories. We, too quickly forget<br />
the sacrifices that have been made by<br />
so many to make this nation what it is today.<br />
USS Monitor was clearly the most innovative<br />
ship <strong>of</strong> her day — an iron ship,172-feet<br />
long with a 41-feet, 6-inch beam and two<br />
12-inch guns housed in a revolving turret.<br />
There are many first’s associated with the<br />
USS Monitor, she was the first ship to have<br />
a revolving turret, she was the first ship<br />
where the <strong>of</strong>ficers and crew had to live<br />
entirely below the waterline, she was the<br />
first ship credited with having below waterline<br />
flushing toilets. [But] most important<br />
was the crew. The crew — like all <strong>of</strong><br />
our Sailors today — were strictly volunteers.<br />
Those young people valiantly fought the<br />
USS Virginia to a draw and ended Virginia’s<br />
unchallenged assault on the U.S.Fleet. But<br />
what too many people forget is that those<br />
men went down in a storm because Monitor<br />
wasn’t really ready for action. Our greatest<br />
weakness is that [our] memories are too<br />
short. USS Monitor was an innovative ship,<br />
but we could have done better.<br />
The fact is that the Monitor’s pumps were<br />
inadequate to keep her from sinking during<br />
stormy weather in December 1862.<br />
Talking with Vice Adm. Albert H. Konetzni, Jr., USN<br />
Deputy and <strong>Chief</strong> <strong>of</strong> Staff U.S. Atlantic Fleet<br />
“When President Theodore Roosevelt announced that the nation would ‘Speak s<strong>of</strong>tly<br />
and carry a big stick,’ the big stick he was referring to was the United States <strong>Navy</strong> ...”<br />
Edited from remarks given by Vice Adm. Konetzni at the USNI Warfare Exposition and Symposium,<br />
Oct. 2, 2002.<br />
The USS Monitor’s construction had been<br />
rushed because the U.S.<strong>Navy</strong> was too slow<br />
to embrace ironclads. In the end, Monitor<br />
sunk not from enemy fire, but from faulty<br />
systems and design. That is the message I<br />
want to bring to you today. We have a great<br />
country, capable <strong>of</strong> awesome Naval innovation.<br />
We have great young men and<br />
women, who will carry the day when the<br />
nation calls. If we ignore history we will allow<br />
our readiness to slip and our force<br />
structure to dwindle. Our young people<br />
are the ones who will suffer the consequences.<br />
Innovation, especially in America, is truly<br />
accelerating. Think <strong>of</strong> how the cellular telephone<br />
and personal computer have<br />
changed our lives. Technologies like the<br />
Global Positioning System and unmanned<br />
systems are changing the way we live and<br />
fight. I am convinced that these are just<br />
the tips <strong>of</strong> the technological iceberg <strong>of</strong><br />
change. The question is: How do we capture<br />
these innovations and use them correctly<br />
to ensure that we are ready for the<br />
challenges ahead In my view, great innovations<br />
will only be successful if they are<br />
formed by knowledge <strong>of</strong> history. We have<br />
not always applied American ingenuity<br />
soon enough to make a difference.<br />
History is full <strong>of</strong> examples <strong>of</strong> [America] not<br />
being ready for the worst: World War II —<br />
after a devastating blow at Pearl Harbor,we<br />
sent our submarines to the fight with torpedoes<br />
that didn’t work; in Korea — our<br />
soldiers froze because they didn’t have<br />
warm clothing and we didn’t have the<br />
bridge forging machines that we needed.<br />
In Vietnam — we didn’t build the national<br />
and military resolve necessary to win.<br />
Unfortunately, the war on terrorism in<br />
some ways is no different. I could go on all<br />
day about the [problems] <strong>of</strong> the nineties ...<br />
as a result, our <strong>Navy</strong> had some real problems<br />
at the start <strong>of</strong> the war [on terrorism].<br />
We didn’t have enough bombs to get the<br />
job done and were forced to borrow thousands<br />
from the U.S. Air Force. Years <strong>of</strong> neglect<br />
on maintaining the Fleet showed, as<br />
we had to pump millions <strong>of</strong> dollars into the<br />
USS John F. Kennedy to get her underway.<br />
The size <strong>of</strong> our Fleet is dwindling toward<br />
300 ships or lower — yet we don’t have the<br />
resources to build ships while at the same<br />
time maintain the ones we have.<br />
Our nation’s foreign policy with regard to<br />
terrorism was also rather naive. In hindsight,it<br />
is clear that our response to terrorism<br />
pre-9-11 was inadequate. If we had<br />
taken the time to understand history and<br />
our cultural differences with other people,<br />
we may have seen the signs <strong>of</strong> 9-11 on the<br />
horizon. Whether it was Lebanon, Khobar<br />
Towers, our embassies in Africa,or the USS<br />
Cole, our responses were piecemeal and<br />
ineffective ...<br />
History has told us that wars always result<br />
from miscalculation. We left the impression<br />
in the minds <strong>of</strong> the terrorists that we<br />
were weak and unwilling to risk going after<br />
them. We left the widespread idea that<br />
America would only lob a few rockets and<br />
then go home. How wrong they were ...<br />
...I don’t want you to get the impression<br />
that I am negative — quite the opposite.<br />
We are making real progress in this war.<br />
The Taliban that supported al Qaeda is no<br />
longer in power in Afghanistan. Almost<br />
2,000 terrorists and their supporters have<br />
been captured. President Bush is serious<br />
when he says that “We will not stop until<br />
we get them all.” Naval Forces are the<br />
14 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
difference-makers in this new war: ♦In the last year, six CVBGs<br />
Mine Warfare ...<br />
(Carrier Battle Groups) and seven ARGs (Amphibious Ready<br />
Groups) have sustained our Seals and Marines over 600 miles<br />
inland. ♦The USS Kitty Hawk (CV-63) deployed immediately to<br />
serve as a forward operating base for our special forces. ♦Carrier<br />
Aircraft have struck over 2,000 targets on missions that have<br />
sometimes lasted over 12 hours. ♦Our ships have launched over<br />
100 tomahawk missiles. ♦We have conducted over 200<br />
boardings in support <strong>of</strong> operations aimed at capturing fleeing<br />
terrorists.<br />
We are winning the war on terrorism mainly because <strong>of</strong> our wonderful<br />
people in the military. It comes as no surprise to me that<br />
our young people have performed so brilliantly. There has been<br />
a lot <strong>of</strong> talk about this generation or that generation,but let there<br />
be no doubt — this current generation is up to the challenge. I<br />
have vivid memories <strong>of</strong> meeting with a young Seal at the Portsmouth<br />
Naval Hospital. I can’t tell you his name, but his nickname<br />
is Turbo. Turbo went to some hellish places to take on al Qaeda.<br />
He gave his left leg for his country and some <strong>of</strong> his buddies gave<br />
their lives. You can be proud <strong>of</strong> your <strong>Navy</strong>’s performance during<br />
this war on terrorism. The simple fact is that we could not have<br />
executed the campaign in Afghanistan without our nation’s aircraft<br />
carriers and all the ships — and all the young people that<br />
support them. At the same time, however, we all know that the<br />
nation is not building enough ships and submarines to accomplish<br />
all we are being asked to do today and in the future. We<br />
need 8 to 10 [new ships] per year to sustain current force structure;<br />
we will build 5 in FY02.<br />
Our efforts in Afghanistan have proven the U.S. <strong>Navy</strong> is truly the<br />
key to success in 21st century warfare where we <strong>of</strong>ten will not<br />
have forward bases from which to operate. Our dilemma is that<br />
given our current resources, we can’t maintain a forward fleet,<br />
fight the war, maintain our ships at the right level <strong>of</strong> readiness,<br />
and build enough ships to have a future fleet that is adequate.<br />
First, we need to be more efficient — then we must argue for an<br />
appropriate bottom line. The nation needs to know the consequences<br />
for not maintaining and building an adequately sized<br />
fleet. So now, the problem that we as a nation face: Which vital<br />
missions do we ignore Which ships do we allow to rust at the<br />
pier Which world crisis do we neglect in order to respond to<br />
some other crisis, somewhere else We need to make the intellectual<br />
argument for fully funded depot level maintenance, and<br />
building the right number <strong>of</strong> ships and aircraft. In the end, the<br />
Congress and the public need to understand that maintaining<br />
the most capable <strong>Navy</strong> in the world is expensive. But it is still the<br />
best security investment for their dollar.<br />
I need your help in keeping the <strong>Navy</strong> at the forefront <strong>of</strong> the<br />
public’s mind. I ask you to read, speak, think and write about our<br />
<strong>Navy</strong>’s future. Start a debate. Try and answer some questions<br />
like: Do we need more ships,aircraft and submarines If so, why<br />
For what missions What should the future Fleet look like Do<br />
we have ship maintenance right or is more needed Are we on<br />
the right course with regard to attrition, retention and leadership<br />
How can we meet the threats <strong>of</strong> terrorism and weapons <strong>of</strong><br />
mass destruction Is Asia going to explode How can we ensure<br />
it doesn’t In the end, it’s your <strong>Navy</strong> and decisions made without<br />
a healthy debate are always flawed.<br />
Edited from a brief given by Vice Adm.Konetzni, Jr., Deputy and <strong>Chief</strong><br />
<strong>of</strong> Staff, U.S. Atlantic Fleet at the USNI Warfare Exposition and<br />
Symposium. Vice Adm. Konetzni invited the press to a dialogue on<br />
mine warfare to fully understand the scope <strong>of</strong> Naval requirements.<br />
Thanks to Rear Adm. Paul Ryan, Commander MINEWARCOM and Lt.<br />
j.g.Herlina Rojas,MINEWARCOM Public Affairs <strong>Officer</strong>,for their expert<br />
insight and comments regarding this article.<br />
Sea mines have been an historically important factor in naval warfare.<br />
Mines have caused major damage to naval ships, slowed or<br />
stopped commercial shipping, and forced the alteration <strong>of</strong> strategic<br />
and tactical plans. Fourteen U.S.<strong>Navy</strong> ships have been sunk<br />
or damaged by mines since World War II (see Figure 1), over three<br />
times the number damaged by air and missile attack. Today, advancing<br />
technology heightens the threat posed by mines, making<br />
them more difficult to detect, classify and neutralize. These<br />
experiences,plus the ready availability to potential adversaries <strong>of</strong><br />
inexpensive sea mines (see Figure 2) have increased interest in<br />
mine warfare within the U.S.<strong>Navy</strong>. In 1995, the <strong>Chief</strong> <strong>of</strong> Naval Operations<br />
directed that mine warfare receive greater emphasis and<br />
become an integral capability <strong>of</strong> battle forces rather than remain<br />
the sole province <strong>of</strong> a dedicated force.<br />
Mine warfare (MIW) is comprised <strong>of</strong> both mining operations and<br />
mine countermeasures, and may be either <strong>of</strong>fensive or defensive<br />
in nature. Mine countermeasures (MCM) incorporate much more<br />
than actual mine detection and neutralization. Key elements <strong>of</strong><br />
MCM include: intelligence; reconnaissance and warning; development<br />
and exploitation <strong>of</strong> environmental databases; reduction<br />
<strong>of</strong> ships’ magnetic and acoustic signatures; and specialized training<br />
in mine warfare tactics.<br />
Successful integration <strong>of</strong> MIW capability into battle group units<br />
requires its promotion as a major warfare area, similar to the traditional<br />
air, surface and submarine specialties. Each <strong>of</strong> these warfare<br />
specialties has a“sponsor,”specific to the platform type,within<br />
the OPNAV requirements division (N7). In contrast, MIW, in which<br />
effective execution requires use <strong>of</strong> platforms from various warfare<br />
specialties, has a capabilities-based sponsor, Expeditionary<br />
Warfare (N75). Public law [10 USC 505] mandates this sponsorship.<br />
Careful consideration should be given to the appropriate<br />
sponsorship for Mine Warfare so that the benefits <strong>of</strong> capabilitiesbased<br />
sponsorship can be maintained while advancing the emphasis<br />
on Mine Warfare as a vital warfare competency.<br />
The development <strong>of</strong> MIW capability within the battle force is<br />
known as“mainstreaming.” Mainstreaming <strong>of</strong> MIW can and should<br />
be happening today, independent <strong>of</strong> the introduction <strong>of</strong> organic<br />
mine warfare capabilities into the battle force. Fielding a MCM<br />
capability organic to battle force units provides increased impetus<br />
to development <strong>of</strong> MIW expertise. At the same time,<br />
mainstreaming provides the pr<strong>of</strong>essional foundation on which<br />
effective utilization <strong>of</strong> future organic assets will be built. However,<br />
mainstreaming, with its emphasis on development <strong>of</strong> capabilities<br />
within the battle force,may lead to the misconception that<br />
new organic mine countermeasures systems (OMCM) are<br />
replacements for existing dedicated platforms. This is not the case.<br />
CHIPS Winter 2003 15
USS COLE DDG-67<br />
TERRORIST<br />
ATTACK<br />
Mines Damage More U.S. Warships Since 1950<br />
KOREA 1950-52<br />
VIETNAM 1969-72<br />
ISRAEL 1967<br />
IRAN 1987-88<br />
IRAQ 1991<br />
USS STARK FFG-31<br />
MISSILE<br />
USS LIBERTY<br />
AGTR-5<br />
TORPEDO<br />
USS HIGBEE<br />
DDG-806<br />
USS LIBERTY<br />
AGTR-5<br />
AERIAL<br />
ATTACK<br />
Figure 1.<br />
A good way to view the distinction between organic and<br />
dedicated MIW resources is to classify them either as tactical or<br />
strategic assets. Organic MCM systems are tactical in nature. They<br />
are resident within the battle group, and are intended to provide<br />
the ability to detect mines and a limited minesweeping capability<br />
that permits “punching through” a minefield if necessary.<br />
Dedicated MCM systems are theater or strategic assets. They are<br />
intended to provide large area or long-term MCM capability.<br />
Mine Warfare Command (MINEWARCOM) demonstrated its capability<br />
during a ten day at sea training period in the Gulf <strong>of</strong><br />
Mexico in October 2002 with Norfolk-based USS Kearsarge<br />
(LHD 3). USS Kearsarge, acting as a stand-in Mine Warfare Command<br />
ship, embarked airborne, surface and undersea MCM personnel<br />
and equipment from Naval Station (NS) Ingleside and<br />
Naval Air Station (NAS) Corpus Christi during this simulated wartime<br />
scenario. According to Rear Adm. Paul Ryan, Commander,<br />
Mine Warfare Command, mine warfare forces are expeditionary<br />
by design. Packing up and going where needed and when<br />
needed is how mine warfare was conducted prior to Desert Storm<br />
and prior to having a dedicated mine warfare command and support<br />
ship. “This exercise familiarized a new generation <strong>of</strong> mine<br />
warfare personnel with the details <strong>of</strong> embarking on a ship <strong>of</strong> opportunity,”said<br />
Ryan.<br />
During the exercise,MINEWARCOM used USS Kearsarge as a host<br />
ship and exercised all three legs <strong>of</strong> the MCM triad: airborne, surface<br />
and underwater MCM. A squadron <strong>of</strong> MH-53 minehunting<br />
helicopters from NAS Corpus Christi provided airborne MCM. Explosive<br />
ordnance disposal (EOD) units embarked on USS<br />
Kearsarge provided underwater MCM. Three NS Ingleside<br />
minehunter and minesweeper ships, USS Sentry (MCM 3), USS<br />
Scout (MCM 8) and USS Devastator (MCM 6), provided surface<br />
MCM. “We utilized USS Kearsarge the same way we utilized USS<br />
Inchon. We hunted for exercise mines,swept the mines once they<br />
were located, and used EOD personnel to neutralize designated<br />
mines,” added Ryan. When the exercise was completed, USS<br />
Kearsarge returned to Norfolk.<br />
Since the decommissioning <strong>of</strong> USS Inchon in June 2002,the <strong>Navy</strong><br />
has been evaluating options for a permanent replacement. In<br />
October,the <strong>Navy</strong>’s Military Sealift Command awarded a $21 million<br />
one-year charter contract with renewable one-year options<br />
to Bollinger/Incat USA, L.L.C. for the leasing <strong>of</strong> a High Speed Ves-<br />
USS PRINCETON CG-59<br />
USS TRIPOLI LPH-10<br />
USS B. ROBERTS FFG-58<br />
USS WESTCHESTER COUNTY LST-1167<br />
USS BARTON DD-772<br />
USS MANSFIELD DD-728<br />
USS WALKE DD-723<br />
USS E.G. SMALL DDR-838<br />
USS BRUSH DD-745<br />
USS SARSI ATF-111<br />
USS PARTRIDGE AMS-31<br />
USS PLEDGE AM-277<br />
USS PIRATE AM-275<br />
USS MAGPIE AMS-25<br />
MINE<br />
What is the<br />
Threat<br />
•Cheap<br />
•Lethal<br />
•Asymmetric<br />
•Widely<br />
Proliferated<br />
275,000 Mines<br />
Worldwide<br />
Figure 2.<br />
sel (HSV). The ship will support U.S.<strong>Navy</strong> Mine Warfare Command<br />
and serve as a test platform for experiments with advanced hull<br />
and propulsion technology integrated with advanced communications<br />
technology. Currently, the HSV is slated to participate in<br />
three exercises from September to December 2003. These exercises<br />
include Atlantic Fleet Joint Task Force Exercise,Gulf <strong>of</strong> Mexico<br />
(GOMEX 04-1) Exercise and Pacific Fleet Joint Task Force Exercise.<br />
Top: EOD units embarked aboard USS Kearsarge (LHD 3) launch their<br />
RHIBs (Rigid Hull Inflatable Boats) from the ship’s well deck while<br />
three minesweepers from Naval Station Ingleside look on. Bottom:<br />
The <strong>Navy</strong>’s HSV-1X. (U.S. <strong>Navy</strong> photos.)<br />
Mine Countermeasures Ship (MCM/MHC) Reliability<br />
The need for U.S. Naval forces to maneuver and project power in<br />
the world’s littorals is increasing. Littorals are highly susceptible<br />
to extensive enemy mining. Current MCM force consists <strong>of</strong> 14<br />
MCMs with minesweeping (mechanical, magnetic and acoustic)<br />
and minehunting (detect,classify,identify,neutralize) capabilities,<br />
and 12 MHCs with mine hunting capabilities only. Dedicated MCM<br />
capability is required for deliberate, large-area mine clearance.<br />
Planned organic capabilities provide “See & Avoid” hunting and<br />
16 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
Near-Term Recommendations<br />
•With the decommissioning <strong>of</strong> Inchon, make MCS functions<br />
portable.<br />
•Plan to use “Large Deck <strong>of</strong> Opportunity.”<br />
•Exercise portable functions regularly.<br />
•Plan for a replacement MCS.<br />
•Re-engine MCM/MHCs with priority on MCMs (~ $100 million).<br />
-Consider intermediate maintenance contract for diesels.<br />
•Support long-range class modernization program.<br />
•Require frequent deployments to improve fleet engagement.<br />
Mid-Term Recommendations<br />
•Retain MH-53E until an adequate replacement is developed.<br />
•Upgrade MH-53E with “Organic” technologies.<br />
•Support “Organic” introduction plan.<br />
•Fund current dedicated MCM forces.<br />
•Upgrade dedicated MCM force with proven organic technology.<br />
•Fund phased acquisition <strong>of</strong> a stand<strong>of</strong>f mining capability.<br />
•Fund development and phased acquisition <strong>of</strong> modern mine<br />
inventory.<br />
Long-Term Recommendations<br />
•Make unmanned sweeping systems a fleet requirement.<br />
•Demonstrate concept with current systems.<br />
-Ex:Unmanned Surface Vessel (USV) tows MK-106 Sled/SQS-20.<br />
•Consider MCS(X) options with emphasis on unmanned systems.<br />
Figure 3. Mine Warfare Study Outline<br />
“Punch Through Clearance” but are insufficient for sustained,<br />
large-scale mine clearance. MCM ships require upgrades to improve<br />
equipment reliability through their planned service life<br />
(~2022). C4I upgrades are required to maintain MCM/MHC effectiveness.<br />
Mine Warfare<br />
MIW is composed <strong>of</strong> both Mining and MCM. The proliferation <strong>of</strong><br />
inexpensive, lethal sea mines makes MIW a critical war fighting<br />
capability. Combating mine threat requires an amalgam <strong>of</strong> surface,<br />
air and undersea capabilities. The variety <strong>of</strong> platforms and<br />
equipment involved makes assignment <strong>of</strong> the optimum OPNAV<br />
program sponsorship difficult. OPNAV program sponsorship must<br />
be properly aligned to ensure that maximum benefit is obtained<br />
from scarce resources. Capabilities-based rather than platformbased<br />
sponsorship may provide MIW with better representation.<br />
The future <strong>of</strong> MIW lies with emerging technologies,and will most<br />
likely include the use <strong>of</strong> unmanned,undersea vehicles (UUVs),remotely<br />
controlled sensor arrays and various other undersea platforms/weapons.<br />
The future vision <strong>of</strong> distributed sensor fields with<br />
embedded autonomous mines plus remotely controlled<br />
minefields will require extensive water space management.<br />
Organic Mine Countermeasures (OMCM) Capabilities<br />
A key requirement <strong>of</strong> Naval Studies Planning Group objectives is<br />
to develop mine detection and clearance capabilities organic to<br />
CV [carrier] battle groups (shown in Figure 4) permitting these<br />
forces to identify, avoid, or neutralize mines within operationally<br />
acceptable timelines and with acceptable levels <strong>of</strong> operational<br />
risk. On-scene MCM capabilities,through introduction <strong>of</strong> organic<br />
capabilities into all CVBGs, will be completed by 2012. Introduction<br />
<strong>of</strong> these capabilities to the first CVBG is planned for 2005.<br />
CVBGs are currently deployed with limited active MCM capabilities.<br />
MIW capabilities include intelligence collection and surveillance;<br />
notification <strong>of</strong> imminent mining; interdiction; post-interdiction<br />
intelligence evaluation and dissemination; and passive<br />
MCM (threat awareness and signature control). Embedded MIW<br />
capabilities are not being fully realized. Current C2F/C3F<br />
mainstreaming initiatives are focused on leveraging these embedded<br />
capabilities today. CVBGs today have no capability to<br />
detect or avoid mines (except for drifters or detecting minelayers<br />
and localizing the potential hazard area to avoid). The Kingfisher<br />
system (a funded s<strong>of</strong>tware upgrade to the SQS-53 Sonar)<br />
may provide a mine avoidance capability, but will require a dedicated<br />
operator training program that does not exist today.<br />
The proliferation <strong>of</strong> inexpensive, lethal sea mines<br />
makes MIW a critical war fighting capability.<br />
Combating mine threat requires an amalgam <strong>of</strong><br />
surface, air and undersea capabilities.<br />
Seven OMCM systems are currently under development and<br />
planned for battle group introduction. These systems are<br />
intended to instill an MCM capability “organic” to battle group<br />
forces. This capability will not be adequate to replace the<br />
dedicated MCM forces that currently exist. ♦The Long-term Mine<br />
Reconnaissance System (LMRS) is an autonomous UUV,launched<br />
and recovered from 688- and 744-class submarines, which<br />
provides clandestine mine reconnaissance (detection and limited<br />
classification) for advanced battle space preparation. A LMRS<br />
system on a host submarine would yield a total system area<br />
coverage <strong>of</strong> up to 400-650 square nautical miles. Engineering<br />
challenges include meeting mission reliability goals; achieving<br />
reliable launch and recovery;meeting ambitious reduced radiated<br />
noise goals; certifying an advanced high-density primary battery<br />
for submarine use; and developing effective computer-aided<br />
detection/classification algorithms. Nets, cables, nonmilitary<br />
shipping and other obstacles,or piracy <strong>of</strong> the unit can potentially<br />
cause premature mission abort. LMRS navigation accuracy<br />
remains a potential issue for contact reacquisition, identification<br />
and mine neutralization. ♦The Remote Mine-hunting System<br />
(RMS) includes a semiautonomous,semi-submersible vehicle that<br />
Figure 4.<br />
Organic Mine Warfare<br />
A Tactical Battle Group Asset<br />
Incorporates a mixture <strong>of</strong> low, medium and high risk<br />
options with a good anticipated rate <strong>of</strong> return<br />
CHIPS Winter 2003 17
tows mine reconnaissance sonar and is launched and recovered<br />
by surface ships. Engineering challenges include achieving<br />
desired high duty cycles and demonstrating reliable launch and<br />
recovery techniques even in high sea states. Nets, cables,<br />
nonmilitary shipping and other obstacles, or piracy <strong>of</strong> the unit<br />
can potentially cause premature mission abort.<br />
Five remaining MCM systems are airborne (AMCM) being developed<br />
primarily for the MH-60s with various launch dates between<br />
2003 and 2007. ♦The AN/AQS-20X, an evolution <strong>of</strong> current technology,<br />
is a towed mine hunting system that includes identification<br />
capability. A key engineering challenge includes enhanced<br />
CAD/CAC algorithms to achieve reduced false contact rates. ♦The<br />
Airborne Mine Neutralization System (AMNS) is an expendable,<br />
remotely operated, mine neutralization device compatible with<br />
both MH-60s and MH-53E. Deployment from MH-60s including<br />
associated munitions certification tests must be demonstrated.<br />
♦The Organic Airborne and Surface Influence Sweep (OASIS) is a<br />
combination magnetic/acoustic influence sweep towed system.<br />
It provides only OMCM influence sweep capability. Engineering<br />
challenges include ensuring the ability to survive shallow water<br />
detonations from various mines and achieving appropriate tow<br />
depths and speed to effectively sweep certain difficult shallow<br />
water bottom influence mines. Its 800 amp system provides<br />
roughly half the capability <strong>of</strong> the MK-105 sled. Significant depth<br />
and sweep limitations may prove inadequate for many areas.<br />
♦The Airborne Laser Mine Detection System (ALMDS) is an<br />
electro-optical-based mine reconnaissance system capable <strong>of</strong><br />
rapid detection,localization,and classification <strong>of</strong> mines on or very<br />
near the sea surface (about 40-feet water depth, dependent on<br />
turbidity). Engineering challenges include achieving desired or<br />
acceptable false contact rates and achieving adequate depth coverage<br />
under likely conditions. ♦The Rapid Airborne Mine Clearance<br />
System (RAMICS) is a gun system designed to rapidly acquire,<br />
target and neutralize floating and near-surface moored<br />
mines. It is the least mature <strong>of</strong> the airborne MCM systems. Engineering<br />
challenges include establishing safe helicopter stand<strong>of</strong>f<br />
distances from floating or very-near-surface mines,and establishing<br />
a gun and turret installation concept that minimizes the impact<br />
on the aircraft in terms <strong>of</strong> loads, recoil and flight dynamics.<br />
The <strong>Navy</strong>’s implementation plan for OMCM includes a mixture <strong>of</strong><br />
low, medium and high-risk options with good anticipated rates<br />
<strong>of</strong> return.<br />
Mining Issues and Recommendations<br />
For a variety <strong>of</strong> reasons, the U.S. <strong>Navy</strong> risks a severely limited ability<br />
to conduct mining operations. Without high-level attention<br />
and funding now, this critical warfare requirement will be seriously<br />
degraded within the next five years. Current mine inventories<br />
are adequate to meet requirements for most scenarios, however<br />
the small size and advanced age <strong>of</strong> the stockpile limit operational<br />
flexibility. A stand<strong>of</strong>f/high altitude mine delivery capability<br />
is necessary for mining to be a viable <strong>of</strong>fensive capability. A<br />
conversion kit is needed for the existing MK-62, MK-63 and MK<br />
65 Quickstrike series mines. This is an unfunded requirement. A<br />
Tactical Decision Aid is necessary to restore a Fleet Level Minefield<br />
Planning capability. Currently all minefields must be planned by<br />
reachback. A replacement for the MK-56 intermediate depth<br />
moored mine is necessary to retain a mining response in the 150<br />
to 600 feet regime. The Submarine Launched Mobile Mine (SLMM)<br />
provides the only clandestine mining capability. This weapon is<br />
rapidly reaching end <strong>of</strong> service life and is not compatible with<br />
Virginia Class submarines. I-SLMM development was stopped<br />
when Australia backed out <strong>of</strong> a bilateral development agreement<br />
due to funding. I-SLMM would double the payload over SLMM (2<br />
mines vice 1), use the much more capable MK-48 torpedo, and<br />
provide a digital fire control capability/compatibility. The <strong>Navy</strong>’s<br />
core mining infrastructure has been reduced to 21 engineers and<br />
scientists, and we continue to lose this talent to other programs<br />
as funding continues to be reduced. Further reductions in infrastructure<br />
funding will soon eliminate our ability to develop replacement<br />
mines without a significant reinvestment in time and<br />
funding.<br />
Vision/Requirements<br />
The U.S. Naval Mine Warfare Plan (developed by Adm. Johnson/<br />
Gen. Jones, 2000) states that sea mines remain a classic, low-cost<br />
force multiplier <strong>of</strong> increased importance during fleet downsizing<br />
and increased littoral operations. It states that the <strong>Navy</strong> is to“develop,<br />
procure, maintain, and deploy a modern family <strong>of</strong> sea<br />
mines,” with features that permit remote control <strong>of</strong> sea mines,<br />
stand<strong>of</strong>f mining and full-water-depth mining.<br />
Current U.S. Naval mining capability is adequate to execute requirements<br />
<strong>of</strong> some scenarios. However, the inventory is composed<br />
<strong>of</strong> old mines, and mining capabilities are funded at near<br />
the minimum levels required to safely maintain the stockpile.<br />
Research and development for new mining capabilities is severely<br />
restricted. The <strong>Navy</strong> has no funded plans to acquire any new<br />
mines in the next 7 years. A low priority has been placed on mining<br />
attributed in part to lack <strong>of</strong> specific sponsorship within OPNAV.<br />
”Mines are weapons that contribute to control <strong>of</strong> the surface and<br />
undersea environment, but their delivery (with the exception <strong>of</strong><br />
small numbers <strong>of</strong> SLMMs ) is accomplished entirely by air — with<br />
U.S. Air Force bombers being the primary platforms for high-volume<br />
delivery. Although mines have many <strong>of</strong> the characteristics<br />
<strong>of</strong> strike warfare weapons, the nominal <strong>Navy</strong> sponsor for mining<br />
is Expeditionary Warfare [N75],which is quite properly more concerned<br />
with MCM shortfalls.” (NSB report, 2001)<br />
Long-term solutions include use <strong>of</strong> innovative, emerging<br />
technologies for remote control <strong>of</strong> mines,distributed sensor fields,<br />
stand<strong>of</strong>f deliveries,adaptation <strong>of</strong> new sensors for target influence<br />
(magnetic, acoustic, electric, pressure), miniaturization (easing<br />
delivery burdens), and the development <strong>of</strong> nonlethal mines to<br />
include devices for fouling propulsion, damaging electronic<br />
systems, etc. Recommendations include: The current war on<br />
terrorism suggests maintaining weapons stockpiles at levels<br />
greater than the minimum requirements; Modernize existing<br />
mine stocks with stand<strong>of</strong>f/high altitude delivery capability;Retain<br />
the mining core infrastructure and begin development <strong>of</strong> a<br />
replacement for the MK-56 mine to preclude a gap in capability<br />
expected to develop by 2010; Add funding to develop a stand<strong>of</strong>f<br />
mining capability. This might include production <strong>of</strong> I-SLMM or<br />
research and development on JDAM-ER type bomb conversion<br />
packages—or both; and Align functions within MIW community<br />
(OPNAV through COMINEWARCOM) to benefit the specific subset<br />
<strong>of</strong> mining operations in accordance with separate point paper<br />
on MIW Alignment. Realignment allows focus on operational<br />
18 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
Near-Term Mid-Term Long-Term<br />
Unmanned Systems Transform<br />
Mine Warfare and the MCS<br />
Smaller MCS<br />
•Portable MCS<br />
functions<br />
•MCM/MHC Reliability<br />
•Alignment<br />
•Organic Mine Warfare<br />
•AMCM Requirements<br />
•Mining<br />
Figure 5.<br />
Unmanned<br />
Systems<br />
mining requirements, which are currently barely met.<br />
Realignment also allows a forward-thinking vision <strong>of</strong> where we<br />
want to go —and encourages long-range planning for a phased<br />
program that addresses future needs.<br />
Maturing Technologies and Future Mine Clearance Systems<br />
The requirement for a large deck to support MH-53 helicopters<br />
for minesweeping is the largest cost driver in acquiring a dedicated<br />
MCS. Maturing technologies have the potential to dramatically<br />
alter our MIW capabilities in the next decade and transform<br />
the nature <strong>of</strong> future MCS. Programmed organic systems may<br />
greatly improve our mine hunting and neutralization capability.<br />
Employing AQS-20 sonar on an MH-60 helicopter, for instance,<br />
will be three times more effective than the current AQS-14 employed<br />
by the MH-53,even considering the substantial difference<br />
in range and endurance <strong>of</strong> the two helicopters. The AQS-20,<br />
coupled with the incorporation <strong>of</strong> the unmanned Remote Minehunting<br />
(RMS) and Long-term Mine Reconnaissance (LMRS) systems,<br />
<strong>of</strong>fer a significant increase in mine hunting capabilities.<br />
These improvements mean that fewer airborne assets will be<br />
needed to accomplish the mine hunting mission both in the dedicated<br />
(theater) and organic (tactical) MIW forces.<br />
Unfortunately, mine hunting is not effective in sixty-percent <strong>of</strong><br />
the littoral regions near potential adversaries. Sea access to these<br />
areas requires minesweeping. Currently, the MH-53 helicopter<br />
wedded to the MK-106 sled,or the MH-60s with the developmental<br />
OASIS system, are needed to meet OPLAN minesweeping requirements.<br />
AMCM sweeping capabilities require a large-deck<br />
design for MCS. Many <strong>of</strong> the same technologies that are driving<br />
the improvements in mine hunting could be leveraged in an effort<br />
to develop an unmanned minesweeping system. A desire to<br />
keep the man out <strong>of</strong> the minefield makes unmanned<br />
minesweeping systems an attractive option.<br />
Unmanned systems are the minesweepers and hunters <strong>of</strong> the<br />
future. Future MCS must incorporate emerging technologies. A<br />
focused technology effort is needed to incorporate unmanned<br />
systems into the MCS(X). Adequate study by appropriate technical<br />
authorities concluded that USVs have been shown to possess<br />
potential as effective low-observable MCM platforms, allowing<br />
mine hunting and minesweeping missions to be performed without<br />
a man onboard — eliminating the risk to personnel. It is time<br />
to press ahead with establishing fleet requirements for unmanned<br />
MCM systems that lead to programming decisions. Long-term<br />
HSV<br />
USV<br />
UUVs<br />
Recommendations:<br />
Make unmanned sweeping systems a fleet requirement<br />
Demonstrate Concept with current systems<br />
Consider MCS (X) Option with emphasis on UUVs<br />
Figure 6.<br />
recommendations include: Establish unmanned minesweeping<br />
systems as an emerging fleet requirement;Demonstrate the ability<br />
to launch MCM UUV/USV from HSV at the earliest opportunity;Leverage<br />
<strong>of</strong>f the Spartan ACTD (Advanced Concept Technology<br />
Demonstration) if possible; Request that the MCS(X) working<br />
group explore options <strong>of</strong> using a combination <strong>of</strong> unmanned<br />
systems and a smaller helicopter detachment; and Establish a focused<br />
technology effort to incorporate unmanned minesweeping<br />
systems into future acquisition plans for a new MCS(X). A summary<br />
<strong>of</strong> near- to long-term strategies is shown in Figures 5 and 6.<br />
Conclusion<br />
The 2001 Quadrennial Defense Review (QDR) reaffirmed that“advanced<br />
mines could threaten the ability <strong>of</strong> U.S. Naval and Amphibious<br />
forces to operate in littoral waters” and are a likely<br />
method through which “future adversaries may have the means<br />
to render ineffective much <strong>of</strong> our current ability to project U.S.<br />
power overseas.” The U.S.<strong>Navy</strong>’s long history <strong>of</strong> difficulty in combating<br />
the mine threat culminated in the response to Iraqi mining<br />
efforts during the Gulf War. Despite a rudimentary and aged<br />
mining capability,Iraq severely damaged two ships and effectively<br />
deterred the United States from conducting planned amphibious<br />
operations into Kuwait.<br />
Our ability to combat modern sea mines depends upon an amalgam<br />
<strong>of</strong> capabilities including MCS, AMCM squadrons, EOD units<br />
and Marine Mammal Systems. A central lesson <strong>of</strong> the Gulf War is<br />
that a dedicated MCS,capable <strong>of</strong> directing all aspects <strong>of</strong> the multifaceted<br />
MIW campaign plan,is needed to bring the various MCM<br />
capabilities together, providing unity <strong>of</strong> effort in defeating the<br />
mine threat. At the same time, it is clear that a heavy lift helicopter<br />
is essential to accomplish the airborne minesweeping mission.<br />
This will remain the case until maturing unmanned vehicle<br />
technologies replace the need for airborne minesweeping.<br />
The future <strong>of</strong> MIW is clearly with unmanned systems; the <strong>Navy</strong><br />
needs a focused effort to bring these technologies to maturity as<br />
they have the potential to transform the nature <strong>of</strong> MIW. Given<br />
the current state <strong>of</strong> technology, it is easy to envision a smaller,<br />
faster MCS that acts as a mother ship for a variety <strong>of</strong> unmanned<br />
systems that can rapidly move into theater and combat the mine<br />
threat without the presence <strong>of</strong> men in the minefield.<br />
CHIPS Winter 2003 19
U.S. <strong>Navy</strong> and Air Force Hit Virtual Bull’s Eye<br />
The Atlantic Fleet cruiser, USS<br />
Ticonderoga (CG 47), homeported<br />
in Pascagoula, Miss., USS Ticonderoga (CG 47)<br />
successfully demonstrated the<br />
<strong>Navy</strong>’s newest weapons system<br />
trainer while underway<br />
Nov. 14, 2002, in the Gulf <strong>of</strong><br />
Mexico. The ship’s test comes<br />
on the heels <strong>of</strong> successful trials<br />
the day before by the U.S.<br />
Air Force’s 46th Test Wing,<br />
based at Eglin Air Force Base in<br />
Florida, which dropped eighteen,<br />
500-pound, non-exploding<br />
bombs from an A-10 aircraft. The Virtual At Sea Training system,<br />
or “VAST,” allows warfighters to hone their live-fire combat<br />
skills while operating at sea.<br />
Ticonderoga’s crew successfully engaged a computer-simulated<br />
target with explosive and nonexplosive ordnance shot from the<br />
ship’s MK 45,5-inch/54-caliber gun. While the rounds hit nothing<br />
but water — the demonstration was right on target. Initial indications<br />
suggest that the VAST system was able to successfully<br />
“score”precisely where the ordnance rounds actually landed — a<br />
significant milestone in ensuring effective at sea combat training.<br />
VAST is actually comprised <strong>of</strong> a system by which the ship’s<br />
crew or “spotter”sees a realistic presentation,for example,a landmass<br />
with the topography <strong>of</strong> a “real world” target, which corresponds<br />
to an area actually located over open ocean. During training<br />
exercises, the operator fires at the simulation <strong>of</strong> what they<br />
might expect to see in combat,while the ordnance actually lands<br />
within an array <strong>of</strong> buoys in the water. Exercise evaluators, monitoring<br />
the target practice on a computer screen, could be either<br />
onboard a ship or somewhere ashore.<br />
Developed by the Office <strong>of</strong> Naval Research and tested by the U.S.<br />
Atlantic Fleet, this virtual reality training is one example <strong>of</strong> the<br />
<strong>Navy</strong>’s efforts to keep its Sailors combat ready as weapons systems<br />
become increasingly advanced. In addition to programmable<br />
targets,VAST has another distinct advantage: It is portable.<br />
Ships can take the at-sea trainer — including the firing range —<br />
with them wherever they go. The portable“range” is made up <strong>of</strong><br />
several buoys that form the target area. These buoys are actually<br />
placed into the water by the ship conducting the training, in this<br />
case by the crew <strong>of</strong> the Ticonderoga.<br />
Once the ship positions at the proper distance from the buoy field,<br />
it engages and shoots at the virtual target. The actual ordnance<br />
then falls into this buoy field, which in turn triangulates the point<br />
<strong>of</strong> impact. The IMPASS (Integrated Maritime Acoustic Scoring And<br />
Simulator) buoy system is equipped with Global Positioning System<br />
(GPS) sensors that enable the accurate triangulation <strong>of</strong> the<br />
rounds. For these initial demonstration trials, one computer provides<br />
feedback on accuracy while a second computer is used<br />
within the ship to help with the training. In the future, a satellite<br />
uplink will potentially allow over-the-horizon operations.<br />
As communications and satellite technology has advanced, the<br />
natural evolutionary development<br />
<strong>of</strong> weapons systems has advanced<br />
along with it. VAST is a logical next<br />
step in leveraging that technology<br />
to better train the crews <strong>of</strong> ships<br />
and aircraft that will ultimately deploy<br />
these weapons in battle.<br />
The Air Force’s 46th Test Wing used<br />
other existing systems to measure<br />
the effectiveness and accuracy <strong>of</strong><br />
the VAST buoys during the exercise.<br />
The older systems have initially<br />
validated the emerging technology.<br />
“While the results are preliminary, the data looks promising.<br />
We’re encouraged by the capability this system brings to our testing<br />
efforts and to our pilots. It’s exciting to think that we’ll be<br />
able to use this portable system and convert these wide open<br />
spaces to valuable testing areas,” said Col. Dennis F. Sager, <strong>of</strong> Seattle,Wash.,who<br />
is the commanding <strong>of</strong>ficer <strong>of</strong> the 46th Test Wing.<br />
Another key advantage <strong>of</strong> VAST is its training versatility. Rather<br />
than continuously firing on a static, predictable bombing range,<br />
the presentation viewed by the warfighter can be manipulated<br />
to more closely resemble the type <strong>of</strong> terrain or target, which operators<br />
face in battle.<br />
As the system develops, planners hope to incorporate models<br />
closely resembling geographic areas <strong>of</strong> interest. While <strong>Navy</strong> <strong>of</strong>ficials<br />
are initially encouraged by these preliminary results, more<br />
testing is planned. Provided the concept continues to prove successful<br />
over the next six-month evaluation period,the <strong>Navy</strong> plans<br />
to invest in as many as 10 additional systems by the end <strong>of</strong> FY03.<br />
There are currently three in the <strong>Navy</strong>’s inventory being tested.<br />
Finally, VAST <strong>of</strong>fers savings in time, logistical considerations and<br />
money when compared to live-fire ranges. <strong>Navy</strong> ships, for example,<br />
must typically travel hundreds <strong>of</strong> miles to practice Naval<br />
Gun Fire Support using live-fire ranges. This system shaves days<br />
<strong>of</strong>f transiting to and from these ranges. These savings can then<br />
allow more time for crews to focus on other critical prerequisites<br />
to deploying,including other necessary training,as well as equipment<br />
maintenance and repair.<br />
While it <strong>of</strong>fers distinct advantages over other training options,<br />
VAST is designed to supplement the available ranges used by the<br />
<strong>Navy</strong>,including ranges still required for coordinated battle group<br />
training. These types <strong>of</strong> innovations will continue to enhance the<br />
way Sailors train and prepare for combat.<br />
“This is exciting new technology and we’re encouraged with the<br />
results <strong>of</strong> joint <strong>Navy</strong> and Air Forces testing,” said Adm. Robert J.<br />
Natter, Commander, U.S. Atlantic Fleet. “VAST also provides tremendous<br />
flexibility in that we can train effectively wherever there<br />
is sufficient ocean space.<br />
VAST’s initial testing results are positive and we see clear potential<br />
for joint <strong>Navy</strong>, Marine Corps and Air Force use <strong>of</strong> this system.<br />
Ultimately, VAST will help us further enhance the combat readiness<br />
<strong>of</strong> our ships and aircraft.”<br />
20 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
Interview with Diann L. McCoy<br />
DISA Principal Director<br />
for Applications Engineering<br />
Diann L.McCoy is the Principal Director for Applications Engineering. She is responsible for engineering<br />
information systems to provide command and control, and combat support capabilities to the nation’s<br />
warfighter. She earned a Bachelor <strong>of</strong> Science degree in Mathematics from Wright State University in<br />
1974, and a Masters <strong>of</strong> Science degree in Logistics Management from the Air Force Institute <strong>of</strong><br />
Technology in 1978. She was selected for her current position in September 2000. Her awards include<br />
the Presidential Distinguished Executive Rank Award, the Technology Award for Government<br />
Leadership, the DoD Distinguished Civilian Service Award, the Meritorious Civilian Service Award, the<br />
Presidential Rank <strong>of</strong> Meritorious Executive Award, and the Certified Pr<strong>of</strong>essional Logistician from the<br />
Society <strong>of</strong> Logistics Engineers.<br />
CHIPS: When talking about Defense Transformation in terms <strong>of</strong><br />
the asymmetric threat spectrum (denial <strong>of</strong> service, insertion <strong>of</strong><br />
erroneous information that could cause loss <strong>of</strong> confidence in <strong>of</strong>ficial<br />
networks/systems,seizure <strong>of</strong> a network/system for criminal/<br />
terrorist purposes, malicious code, etc.) How is DISA responding<br />
Ms. McCoy: An asymmetrical threat can apply to more than just<br />
network attacks; it may apply to more than just the DoD critical<br />
infrastructure; the nation as a whole may be impacted,i.e., power<br />
plants, critical utilities, etc. While we engage in this type <strong>of</strong> security,our<br />
DISA focus is on the networks for DoD. In a general sense,<br />
DISA has the GNOSC, the Global Network Operations and Security<br />
Center. It isn’t under my direction but their responsibility is<br />
to look at the activities that are occurring on the network, assess<br />
them and respond appropriately. We do this in conjunction with<br />
the JTF-CNO,Joint Task Force-Computer Network Operations,U.S.<br />
Strategic Command. The JTF-CNO is led by Maj. Gen. James D.<br />
Bryan, U.S. Army, who is dual-hatted as the Vice Director <strong>of</strong> DISA<br />
and Commander <strong>of</strong> JTF-CNO. In Applications Engineering, we<br />
provide many <strong>of</strong> the capabilities and applications used to analyze<br />
the information,to identify trends or activities that could lead<br />
to potential denial <strong>of</strong> service on the network. We are engaged in<br />
developing tools and capabilities that will allow us to understand<br />
what activity may be occurring and producing methods that will<br />
allow us to respond. Everything DISA designs, builds and operates,<br />
incorporates required measures to protect against information<br />
warfare attacks.<br />
CHIPS: I’ve read comments from top DoD and DON leadership<br />
that there is concern from an information warfare perspective<br />
that there is potential for a terrorist/criminal threat that could<br />
bring down the whole DoD architecture. With all <strong>of</strong> DoD and federal<br />
agencies on high alert, do you think a threat <strong>of</strong> that nature is<br />
likely to occur — the worst-case scenario<br />
Ms. McCoy: No, I don’t believe so. One <strong>of</strong> the approaches we use<br />
to protect our environment is Defense in Depth, which means<br />
you have multiple layers <strong>of</strong> defense and diverse routing capability<br />
so if you lost an application or a communications capability,<br />
you still have access to other available capabilities — voice, data,<br />
Defense Red Switch Network, VTC, etc. The diversity and robustness<br />
in each <strong>of</strong> these networks or systems comprise the larger<br />
Defense <strong>Information</strong> Systems Network (DISN). You might have<br />
an isolated incident, but in terms <strong>of</strong> vulnerability <strong>of</strong> the entire<br />
system, I think that is highly unlikely. One <strong>of</strong> the reasons why we<br />
have the DISN is for its positive control and accountability —that’s<br />
why DISA manages the DISN.<br />
CHIPS: Do you mean if everything else fails we can always rely on<br />
the DISN<br />
Ms. McCoy: The DISN has successfully functioned through several<br />
major events that degraded Internet performance. More specifically,<br />
what I’m saying is because we have diverse routing and<br />
multiple paths, and the means to move information, either voice<br />
or data, we have redundancy so we don’t have to depend on a<br />
single way to communicate. Also the physical and electronic security<br />
is more robust than a typical network. In Applications Engineering,<br />
we provide some applications that allow us to monitor<br />
and analyze what is happening over the network. The Network<br />
Services organization actually designs and develops these<br />
networks with layers <strong>of</strong> Defense in Depth protection built in.<br />
CHIPS: Secretary Rumsfeld has stated numerous times that information<br />
technology is the enabler behind Defense transformation,<br />
but isn’t this a natural progression for military operations to rely<br />
on IT due to the technology advancements <strong>of</strong> the last 10 years,<br />
especially<br />
Ms. McCoy: The Secretary is looking not just at the technology<br />
per se, but the way it is employed in a joint environment to provide<br />
a quantum increase in capability to meet the operational<br />
goals <strong>of</strong> the transformation. What we do is leverage that technology<br />
to make it work in a warfighting environment. Given the IT<br />
capabilities we have today — we can do things differently; and<br />
our methods <strong>of</strong> operations are tied to the type <strong>of</strong> IT available. For<br />
example, we manage the Global Command and Control System,<br />
GCCS, which provides the common operational picture <strong>of</strong> the<br />
battlespace. It gives the warfighter a situational awareness <strong>of</strong><br />
what is happening and through technology we get better information<br />
flow and, more timely information, which gives the decision<br />
makers a better opportunity to respond to whatever is happening.<br />
Technology enables us to get closer in time to what is<br />
happening in the battlespace, as well as having a greater awareness<br />
<strong>of</strong> what is in the battlespace, a greater awareness <strong>of</strong> what<br />
capabilities we might have to bring into that particular environment<br />
— and what the status is <strong>of</strong> those assets.<br />
CHIPS: Is there any one technology or system that is key to linking<br />
command and control for joint fighting capability<br />
Ms. McCoy: I think one <strong>of</strong> the cornerstone joint applications is<br />
CHIPS Winter 2003 21
the Global Command and Control System, and we are incorporating<br />
multiple technologies and applications in GCCS. The most<br />
important feature <strong>of</strong> these joint capabilities is they have to be<br />
secure and interoperable. On the application side, they have to<br />
be able to share data in a certain way so that data has the same<br />
meaning, and in a secure way so that it cannot be compromised.<br />
This is central to Secretary Rumsfeld’s joint command and control<br />
initiative — the key being joint and interoperable capability.<br />
This is what DISA is in the business <strong>of</strong> providing every day.<br />
CHIPS: One <strong>of</strong> the things Dr. Myers (Principal Director, Deputy<br />
<strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong>,<strong>Department</strong> <strong>of</strong> Defense,CHIPS Summer<br />
2002,“Power to the Edge, the Transformation <strong>of</strong> the Global <strong>Information</strong><br />
Grid,”www.chips.navy.mil/archives/02_Summer/authors/<br />
index2_files/power_to_the_edge.htm) stated that is so important<br />
to Combatant Commanders is their confidence in the authenticity<br />
and timeliness <strong>of</strong> data.<br />
Ms. McCoy: What you are really talking about is the issue <strong>of</strong> latency<br />
and that is very important. One <strong>of</strong> the things we are focusing<br />
on with the GCCS is providing near real-time data, so decision-makers<br />
have the most current information and don’t have<br />
to gather and synthesize a lot <strong>of</strong> information. This lets warfighters<br />
shorten their decision-making cycle. Some <strong>of</strong> the tools and capabilities<br />
that we have today allow us to overlay information from<br />
various sources and fuse it together so the user has the most currently<br />
available information to act upon — that is very important.<br />
The other thing you asked about is the issue <strong>of</strong> data authenticity.<br />
We view both authenticity and data integrity as essential.<br />
We worry about these in every system we build and are also working<br />
on the DoD PKI as a key enabler to improve authentication<br />
and integrity in all DoD systems.<br />
CHIPS: Is DISA involved in the Homeland Defense Plan<br />
Ms. McCoy: DISA as an organization is involved in Homeland Defense<br />
from several different aspects. Most importantly we support<br />
the communications needs <strong>of</strong> other DoD organizations with<br />
a direct Homeland Defense role to include nation-to-nation leadership<br />
communications. We also directly provide and support<br />
Presidential communications. We do other things in all the different<br />
disciplines to include support <strong>of</strong> whatever type transport<br />
mechanisms are required. In particular,in my area <strong>of</strong> Applications<br />
Engineering we are working on an ACTD or Advanced Concept<br />
Technology Demonstration,to work with JFCOM initially and then<br />
with NORTHCOM — whomever has the Homeland Defense mission.<br />
We would take this Homeland Security ACTD and develop a<br />
common operational picture and situational awareness for that<br />
Combatant Commander. The point is to take some <strong>of</strong> the things<br />
that we have learned under command and control and, see how<br />
they can be used to support DoD’s role in Homeland Defense.<br />
CHIPS: I spoke with a Congressional Liaison, who has worked on<br />
security matters for the House Armed Forces Committee and she<br />
said that she is very impressed with the DoD response to Homeland<br />
Defense and the Sept.11 terrorist attacks. She indicated that<br />
federal agencies such as the FBI, FEMA, CIA, etc., could use the<br />
DoD model and that the national Homeland Defense strategy<br />
could also follow the DoD model. Is this feasible<br />
Ms. McCoy: In prior jobs that I have had I was involved in the<br />
larger federal community. I think where possible DoD is sharing<br />
its lessons learned from the kind <strong>of</strong> quick deployments we have<br />
to do. I found that in forums like the National Communications<br />
System other folks are willing to listen to our lessons learned.<br />
Through the Homeland Defense ACTD we have involvement from<br />
several other agencies. As you know there are many political issues<br />
in regard to Homeland Defense. In DoD we <strong>of</strong>fer our experience<br />
and we found that we may have some things that work, but<br />
also we have things that may be different because the whole issue<br />
<strong>of</strong> Homeland Defense is a little bit different. There are different<br />
rules <strong>of</strong> engagement as to who has responsibility. So we can’t<br />
say these other organizations should just pick up everything we<br />
are doing and move with it, but we do <strong>of</strong>fer our experience and<br />
capabilities for them to look at — perhaps as a way for them to<br />
move forward or begin.<br />
CHIPS: What role is DISA playing in the DoD transformation<br />
Ms. McCoy: In terms <strong>of</strong> DISA as an organization, we are playing in<br />
multiple forums. One <strong>of</strong> the biggest efforts we have is the GIG<br />
bandwidth expansion (GIG-BE). This will provide a robust network<br />
capability throughout the DoD environment. On the applications<br />
side, we are looking at the enablers <strong>of</strong> the “Power to the Edge”<br />
vision, the enablers to the transformation. We are involved directly<br />
in what we call the “right data strategy,” which means that<br />
we’ve changed the way we look at data and the way we provide<br />
data. We have begun to employ tools with XML to make it easy to<br />
share data across domains and we have designed and built a DoD<br />
XML registry to ensure that everyone in DoD who is using XML<br />
has access to existing naming standards (metadata tags) and can<br />
register new ones. We are also changing or updating our tools<br />
and capabilities so they are Web-enabled,making it easier for our<br />
customers to access applications and tools that can be used in<br />
different environments. A good example is the joint collaboration<br />
capability,such as the Defense Collaboration Tool Suite (DCTS)<br />
which we are providing to a wide range <strong>of</strong> users today worldwide,<br />
including Combatant Commanders.<br />
We are looking at methodologies and approaches for getting<br />
information out and having it available through a process we call<br />
content staging. In order to make the vision happen we have to<br />
figure out how to manage services in this net-centric environment.<br />
We are looking at what types <strong>of</strong> services are needed and how<br />
they should be managed. We call this Net-Centric Enterprise<br />
Services (NCES) — critical to the sustainment and technological<br />
evolution <strong>of</strong> the GIG. There are various places where these<br />
components are covered in detail as well as how they interact<br />
with each other. As an early pilot <strong>of</strong> these components, DISA will<br />
integrate Web-based intelligence services with emerging C3<br />
Enterprise Service to create a baseline C3I“electronic marketplace”<br />
on the SIPRNet that will enable mission planners to dynamically<br />
collaborate with the intelligence and combat support<br />
communities. An example <strong>of</strong> a managed service would be a Global<br />
Directory Service. So we have ongoing efforts to help with the<br />
transformational vision. All <strong>of</strong> these are geared to ensuring that<br />
we can provide interoperable capability down to the Joint Task<br />
Force Commander level and below — the guy on the battlefield<br />
— not just the people at headquarters.<br />
CHIPS: What services would be in Global Directory Services<br />
Ms. McCoy: A Global Directory Service could contain information<br />
as simple as a person’s name and e-mail address. As DoD<br />
information processing becomes ever more distributed, it could<br />
22 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
have information in terms <strong>of</strong> what types <strong>of</strong> capabilities, data<br />
services or databases are available or where they are staged.<br />
Directory Services is one <strong>of</strong> those capabilities that will increasingly<br />
become highly protected and more secure because it will contain<br />
information about what is available and perhaps even where it is<br />
located.<br />
CHIPS: When you talked about a user getting information and<br />
content staging, are you talking about the user’s ability to pull<br />
data rather than have it pushed at them<br />
Ms.McCoy: We are looking at the ability to do both because what<br />
we find is that in certain cases the user does not have the opportunity<br />
to go out and surf. The user needs to have certain pieces<br />
<strong>of</strong> information,which they can predefine,sent to them automatically.<br />
But we would have the capability to do either — a smart<br />
push or smart pull — or the user could surf the net.<br />
CHIPS: How do Web-enabling databases, information and processes,<br />
and process improvement for business and support functions<br />
help support the warfighter<br />
Ms. McCoy: There are a multitude <strong>of</strong> things that Web services will<br />
allow us to do. First it is easier for the user to get to the information.<br />
It provides the information to a broader set <strong>of</strong> users, who<br />
are able to get the information whenever they need it and in a<br />
faster method <strong>of</strong> delivery. By using Web technology you have<br />
the ability to do more <strong>of</strong> a real-time collaboration because everyone<br />
can pull up tailored information. You can update the information<br />
more frequently. It also allows us to take advantage <strong>of</strong><br />
wireless capability,which is the wave <strong>of</strong> the future. Another thing<br />
that we tend to forget about it is that there can be a very good<br />
return on investment. When you go to the Web environment you<br />
can carry more <strong>of</strong> these services in the NCES. So you can reduce<br />
the number <strong>of</strong> servers, which reduces the number <strong>of</strong> system administrators<br />
that may be required to manage those types <strong>of</strong> services.<br />
You also have the ability to do more configuration management<br />
to ensure that the same type <strong>of</strong> capability is being used<br />
across the infrastructure. This is key to net-centric warfare.<br />
CHIPS: Do you have security concerns with using wireless technology<br />
in the Defense environment where security is our number<br />
one priority<br />
Ms. McCoy: You said it exactly; we do have concerns in how we<br />
employ wireless. We are looking at the security and coming up<br />
with approaches that will allow us to use wireless in a secure<br />
manner. We have turned these approaches into standards for<br />
deploying wireless as securely as currently possible. We are also<br />
working with industry to improve the security in commercial wireless<br />
products and they are responding to that.<br />
CHIPS: In a recent interview I did with Grady Booch, chief scientist<br />
for Rational, (CHIPS Magazine Fall 2002; www.chips.navy.mil/<br />
archives/02_fall/index2_files/interview_with_grady_booch.htm)<br />
he commented that DoD does not fully exercise the influence<br />
they have in the marketplace in demanding secure technology<br />
products. He said that DoD shouldn’t have to spend additional<br />
money to build security into commercial products, rather industry<br />
should ensure security is built in at the front end.<br />
Ms. McCoy: When we moved to the Internet and the network<br />
environment the rules <strong>of</strong> security became different than when<br />
we were operating on a disconnected mainframe. I’m not sure<br />
anyone had a crystal ball on how security should be handled in a<br />
networked environment. This has really been a learning experience<br />
for industry as to what is needed in terms <strong>of</strong> security. I think<br />
we are demanding more <strong>of</strong> industry in terms <strong>of</strong> security. We are<br />
beginning to see the big companies, such as Micros<strong>of</strong>t, incorporate<br />
security as one <strong>of</strong> the key features <strong>of</strong> their products. We also<br />
have the NIAP (National <strong>Information</strong> Assurance Partnership) process<br />
that requires commercial products used in a certain way to<br />
be evaluated and certified. So I think we are getting there and<br />
vendors are responding.<br />
CHIPS: I was just reading about the DoD debate over open-source<br />
s<strong>of</strong>tware. Many in DoD believe open-source is the wave <strong>of</strong> the<br />
future for many reasons. One <strong>of</strong> the chief reasons is that the code<br />
is visible so it is easier to detect vulnerabilities.<br />
Ms. McCoy: I think in some cases we really need to know the<br />
source code because it is the only way to know what is inside<br />
that code. There are some applications where that may become<br />
very important because <strong>of</strong> the way those applications are utilized<br />
and how they actually fit into the architecture.<br />
CHIPS: There seem to be so many initiatives across Defense,with<br />
the Services working toward interoperability for command and<br />
control systems. Is there a plan or method <strong>of</strong> determining which<br />
are the most important to integrate first<br />
Ms. McCoy: That is exactly what the Joint Staff, in conjunction<br />
with the OSD principals, are working right now. They have reviewed<br />
the interoperability issues and analyzed which ones<br />
should be worked first. They are working a plan as to how we are<br />
going to get to interoperability faster. We work closely with<br />
JFCOM through experimentation and events like Millennium<br />
Challenge 2002 to demonstrate interoperability. We are also looking<br />
at a process that allows us to demonstrate interoperability<br />
through the development phase before we get to the operations<br />
phase so that interoperability is built in and then maintained<br />
throughout the life cycle. In terms <strong>of</strong> what capabilities or<br />
interoperability problems are worked first, DISA responds to<br />
prioritization decisions made by the designated approval<br />
authority.<br />
In all these endeavors, we are working hard to<br />
provide capabilities that our customers want and<br />
use, and we ensure that we always keep in mind<br />
the users’ experience<br />
so we can make our products and services<br />
even better.<br />
CHIPS: Are there three top systems or programs that Defense is<br />
focusing on first for interoperability<br />
Ms. McCoy: I believe from a Web capability standpoint, we are<br />
looking at the GCCS family <strong>of</strong> systems — our GCCS program is<br />
part <strong>of</strong> that. They are focusing on what we call the C2<br />
transformation, which looks at getting command and control<br />
information down to the JTF Commander and below. Another<br />
high priority is to ensure that we have the bandwidth capability<br />
down to the tactical level — so bandwidth expansion is high on<br />
the list <strong>of</strong> priorities.<br />
CHIPS Winter 2003 23
CHIPS: In Dr. Myers’ article she talked about the locations (CO<br />
NUS/OCONUS) for the bandwidth expansion. Will the Fleet be<br />
able to share in this bandwidth expansion<br />
Ms. McCoy: This technology will support all warfighting. What<br />
we are talking about is ensuring that, as we transform and move<br />
to a net-centric environment,we have sufficient means and bandwidth<br />
to move the information wherever it’s needed. So it would<br />
be applicable to all. What we have to work is how we get that<br />
information to the tactical level, to a warfighter on a ship or even<br />
one who could potentially be on horseback, so to speak.<br />
CHIPS: Let’s talk about the work <strong>of</strong> Applications Engineering ...<br />
Ms. McCoy: The mission <strong>of</strong> the Applications Engineering Directorate<br />
is to provide responsive, secure and interoperable C2 and<br />
combat support capability for decision superiority to the President<br />
and Secretary <strong>of</strong> Defense, Combatant Commanders, Joint/<br />
Combined task forces,Services,<strong>Department</strong> <strong>of</strong> Defense and non-<br />
DoD agencies.<br />
We provide a wide range <strong>of</strong> products, services and expertise. I<br />
already mentioned the Global Command and Control System<br />
which is DoD’s Joint and interoperable C2 system, and the Defense<br />
Collaboration Tool Suite. These are providing situational<br />
awareness, readiness, planning, deployment support, collaboration<br />
and other capabilities for Combatant Commanders,JTF Commanders<br />
and below — today. The Global Combat Support<br />
System’s (GCSS) Combatant Commander JTF (CC-JTF) capability<br />
is using portal technology with links to Service and Agency logistics<br />
and sustainment systems, to provide DoD users access to<br />
shared data, and applications, regardless <strong>of</strong> their location.<br />
Over the next few years we are transforming the successful Common<br />
Operating Environment (COE) to fit OSD’s Net-Centric Enterprise<br />
Services (NCES) concept. COE is currently used or planned<br />
to be used for/in 125 C2 systems and in support <strong>of</strong> GCCS, at 650<br />
locations worldwide on 10,000+ joint and coalition workstations.<br />
The net-centric capabilities we provide will support the Power to<br />
the Edge vision <strong>of</strong> having tailored, fused information and tools<br />
available on the net, effectively supporting users wherever they<br />
are and with the means available to them.<br />
In the <strong>Information</strong> Assurance area we are supporting “Defensein-Depth”<br />
with expertise, products and services such as PKI, network<br />
and communications security,plus guards for cross-domain<br />
(e.g., Unclassified to Secret) and coalition information exchange.<br />
In addition to the Homeland Defense ACTD, we are also involved<br />
in Multiple Battlespace Awareness, Active Network Intrusion Defense,<br />
Coalition Theater Logistics, and C4I for the Coalition Warrior<br />
ACTDs, just to name a few. These are providing adaptive decision<br />
support, planning, and execution and collaboration tools<br />
through experimentation, demonstrations and spiral development.<br />
Our partnering with the Combatant Commanders and the<br />
operational community is very important. We are also partnered<br />
with the Defense Logistics Agency to provide a variety <strong>of</strong><br />
eBusiness applications and services for paperless contracting,secure<br />
business transactions, wide area work flow, and electronic<br />
document access. In all these endeavors, we are working hard to<br />
provide capabilities that our customers want and use, and we<br />
ensure that we always keep in mind the users’ experience so we<br />
can make our products and services even better.<br />
Revolution Comes to the<br />
Teddy Roosevelt Battle Group<br />
By JO2 Jd Walter, NPDC, Public Affairs Office<br />
The USS Theodore Roosevelt (CVN 71) Battle Group, including<br />
the USS Saipan (LHA 2) Amphibious Ready Group, is about to<br />
get underway without ever leaving port. Their new mission is<br />
to test and evaluate Revolution in Training initiatives designed<br />
to enhance the <strong>Navy</strong>’s mission readiness by providing Sailors<br />
with new tools and opportunities to develop both pr<strong>of</strong>essionally<br />
and personally. Working with Task Force for Excellence<br />
through Commitment to Education and Learning (EXCEL), the<br />
battle group will implement and test the Sailor Continuum in<br />
an operational environment,as well as test incentives designed<br />
to increase performance and productivity. Additionally, the<br />
battle group will demonstrate the utility <strong>of</strong> a new learning<br />
management system, <strong>Navy</strong> Knowledge Online (NKO) that will<br />
track each Sailor’s accomplishments.<br />
“The innovations being touted by Task Force EXCEL are being<br />
driven by the Fleet and are for the Sailors. The acid test has to<br />
be at the waterfront. The <strong>Navy</strong> is bringing the Revolution in<br />
Training to Sailors, and it is happening now,” said Director <strong>of</strong><br />
Surface Warfare Rear Adm. Harry Ulrich. “This is the best opportunity<br />
to put these ideas and programs to the test.” A working<br />
group consisting <strong>of</strong> executive <strong>of</strong>ficers (XO),command master<br />
chiefs (CMC) and other representatives from the Roosevelt<br />
battle group,Saipan ready group,Destroyer Squadron Two,and<br />
elements <strong>of</strong> Carrier Air Wing Eight (CVM 8) recently met in Norfolk,<br />
Va., to review and discuss the testing proposal.<br />
“The testing proposals have generated a lot <strong>of</strong> excitement and<br />
enthusiasm,” said Capt. Jamie Barnett, project leader for the<br />
beta test. “Private industry typically provides incentives for<br />
behaviors that enhance performance. That is what we will test<br />
within the battle group. We just need to work with the group<br />
to precisely define the tasks and how we will measure the outcomes.”<br />
The goal <strong>of</strong> this effort is directed at increasing job efficiency<br />
and productivity — more time for ship’s work by developing<br />
each Sailor pr<strong>of</strong>essionally and personally.<br />
At sea aboard USS Theodore Roosevelt (CVN 71) Oct. 28, 2002,<br />
MM3 Ryan Karlin checks the results <strong>of</strong> the September 2002<br />
advancement exam for division personnel. U.S. <strong>Navy</strong> photo by<br />
PH3 Phillip Nickerson, Jr.<br />
24 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
By Chris Watson<br />
For many years, the Joint Interoperability Test Command<br />
(JITC) has directly contributed to the success <strong>of</strong> U.S. <strong>Navy</strong><br />
fleet operations through the execution <strong>of</strong> complex test<br />
events and on-demand warfighter support efforts. From a technical<br />
standpoint, the <strong>Navy</strong> and other military services view JITC<br />
as the preeminent evaluator <strong>of</strong> systems interoperability. JITC is<br />
one <strong>of</strong> the key organizational elements <strong>of</strong> the Defense <strong>Information</strong><br />
Systems Agency (DISA) Interoperability (IN) Directorate and<br />
serves as DISA’s developmental and operational test organization.<br />
As designated by the Joint <strong>Chief</strong>s <strong>of</strong> Staff, JITC is also the authority<br />
that certifies that <strong>Department</strong> <strong>of</strong> Defense (DoD) <strong>Information</strong><br />
Technology (IT) and National Security Systems (NSS) meet<br />
interoperability requirements for joint military operations.<br />
JITC facilities are strategically located at Fort Huachuca, Ariz., and<br />
Indian Head, Md. The diverse capabilities <strong>of</strong> each location allow<br />
the Services to have access to a dynamic environment for laboratory<br />
tests and on-site field evaluations. <strong>Navy</strong> organizations from<br />
coast to coast have benefited from JITC’s robust test environment<br />
and continue to leverage <strong>of</strong>f <strong>of</strong> their vast resources and technical<br />
expertise.<br />
To understand JITC’s current relationship with the <strong>Navy</strong>,one must<br />
revisit the history <strong>of</strong> the organization and recognize how it has<br />
evolved over the past three decades. JITC’s relationship with the<br />
<strong>Navy</strong> spans back to the 1970s when the Joint Tactical Command,<br />
Control, and Communications Agency (JTC3A) Joint<br />
Interoperability Test Facility (JITF) established a partnership with<br />
the <strong>Navy</strong> Center for Tactical Systems Interoperability (NCTSI) for<br />
the interoperability testing <strong>of</strong> Tactical Digital <strong>Information</strong> Links<br />
(TADIL). In 1988, the Defense Communications Agency (DCA)<br />
absorbed the Tri-Service Tactical Communications (TRI-TAC) Joint<br />
Test Element (JTE) and the JTC3A JITF. DCA consolidated these<br />
organizations in 1989 to form the “JITC” in Fort Huachuca, Ariz.<br />
JITC’s primary mission was to provide interoperability compliance<br />
testing and certification. As the designated lead for DoD Command,<br />
Control, Communications and Intelligence<br />
(C3I) support, DCA tasked JITC to perform<br />
interoperability tests <strong>of</strong> various systems including<br />
High Frequency (HF) radio systems, Military Satellite<br />
Communications (MILSATCOM) systems, and<br />
the Worldwide Military Command and Control System<br />
(WWMCCS). On June 25, 1991, DCA was renamed<br />
“DISA” to reflect its expanded role in managing<br />
the Defense <strong>Information</strong> Infrastructure (DII),<br />
now known as the Global <strong>Information</strong> Grid (GIG).<br />
As a result, JITC’s responsibilities for ensuring joint<br />
interoperability <strong>of</strong> all military systems began to increase<br />
as well,causing the need for growth and expansion<br />
within the organization.<br />
In 1993, the Naval Computer and Telecommunications<br />
Command (NCTC) proposed an initiative to<br />
transfer the functions and resources <strong>of</strong> the Naval<br />
Telecommunications Systems Integration Center<br />
Above: JITC<br />
Headquarters, Fort<br />
Huachuca, Ariz. Right:<br />
JITC Washington<br />
Operations Division,<br />
Indian Head, Md.<br />
(NAVTELSYSIC) to JITC. Since 1976, the NAVTELSYSIC test facility<br />
had operated in Cheltenham, Md., and was the primary site for<br />
the Quality Assurance (QA) and Functional Certification testing<br />
<strong>of</strong> all <strong>Navy</strong>-messaging systems. DISA and the <strong>Chief</strong> <strong>of</strong> Naval Operations<br />
(CNO) agreed that the transfer <strong>of</strong> NAVTELSYSIC resources<br />
to JITC would improve both agencies’ ability to enhance operational<br />
fleet support. Thus, JITC’s East Coast arm, known as the<br />
Washington Operations Division, was established. In 1998, the<br />
Washington Operations Division moved its facility to the Naval<br />
Surface Warfare Center (NWSC) at Indian Head, Md., where they<br />
currently reside. Today, JITC’s East and West Coast divisions work<br />
closely to provide valuable test and exercise support to the <strong>Navy</strong><br />
and the other Services. The JITC organization is currently divided<br />
into eight divisions and a liaison <strong>of</strong>fice, each having unique responsibilities,<br />
these are shown in the text box on the next page.<br />
JITC’s superior test methodologies and extensive expertise are<br />
shown by the many success stories reported by various <strong>Navy</strong> organizations.<br />
For example, the JITC JDEP (Joint Distributed Engineering<br />
Plant) Division’s TADIL Branch at Fort Huachuca continues<br />
to work closely with NCTSI detachments in Dahlgren,Va.;Dam<br />
Neck, Va.; and San Diego, Calif., for TADIL interoperability assessments<br />
and certification. JITC uses the Joint Interoperability Evaluation<br />
System (JIES) for TADIL-A/B/J testing and the Joint Operational<br />
C4I Assessment Tool (JOCAT) for operational assessment<br />
<strong>of</strong> tactical data links. With JITC’s assistance, the <strong>Navy</strong> has been<br />
able to identify and correct deficiencies pertaining to Link 11<br />
(TADIL-A) and Link 16 (TADIL-J) data exchange with AEGIS destroyers<br />
and E-2C aircraft. The <strong>Navy</strong> has also improved<br />
interoperability between their embarked forces and key allies,<br />
through TADIL tests conducted by JITC.<br />
The JITC Washington Operations Division also continues to be<br />
the operational tester <strong>of</strong> all <strong>Navy</strong> legacy and transitional messaging<br />
systems, both strategic and tactical. JITC has been directly<br />
involved in the testing, training, and implementation <strong>of</strong> <strong>Navy</strong><br />
shore-based systems such<br />
as GateGuard, Personal<br />
Computer Message Terminal<br />
(PCMT), Manual Relay<br />
Center Modernization Program<br />
(MARCEMP), Multi-<br />
Level Mail Server (MMS),<br />
CHIPS Winter 2003 25
Nova,and the Message Conversion System<br />
(MCS). JITC’s consistent performance was<br />
demonstrated during the recent implementation<br />
<strong>of</strong> the Fleet Message Exchange/<br />
Directory Update & Service Center (FMX/<br />
DUSC),the replacement for the Naval Communications<br />
Processing and Routing System<br />
(NAVCOMPARS). JITC assisted the<br />
Space and Naval Warfare Systems Command<br />
(SPAWAR) in testing, troubleshooting,<br />
and bringing online this very intricate<br />
configuration at the three Naval Computer<br />
and Telecommunications Area Master Station<br />
(NCTAMS) locations under difficult<br />
conditions. <strong>Navy</strong> fleet systems such as the<br />
Common User Digital <strong>Information</strong> Exchange<br />
System (CUDIXS), Fleet SIPRNET<br />
Messaging (FSM) system, the Naval Modular<br />
Automated Communication Systems<br />
(NAVMACS - V2,V3,V5A and Version II), the<br />
Shipboard AN/SYQ-26 (V) Single Messaging<br />
Solution (SMS),and the Submarine AN/<br />
SYQ-28 (V) SMS have also gone through<br />
rigorous test evolutions at the Indian Head<br />
facility.<br />
In the summer <strong>of</strong> 2002,Rear Adm.Kenneth<br />
D.Slaght,Commander SPAWAR,recognized<br />
the JITC Washington Operations Division<br />
for their outstanding contributions to fleet<br />
operations. Several JITC representatives<br />
received the SPAWAR “Lightning Bolt<br />
Award <strong>of</strong> Excellence” for their support <strong>of</strong><br />
various mission-critical systems.<br />
JITC divisions at Indian Head and Fort<br />
Huachuca execute the developmental and<br />
operational testing <strong>of</strong> the Defense Message<br />
System (DMS) on behalf <strong>of</strong> the DISA<br />
DMS Program Management Office (PMO).<br />
The <strong>Navy</strong> is an important stakeholder in<br />
the overall DMS program and JITC works<br />
closely with selected <strong>Navy</strong> DMS operational<br />
sites for the successful collection <strong>of</strong><br />
data during DMS OT events,leading to subsequent<br />
DMS fielding decisions. JITC is also<br />
responsible for the developmental testing<br />
<strong>of</strong> <strong>Navy</strong>-developed non-core DMS products<br />
such as the Defense Message Dissemination<br />
System (DMDS). The SPAWAR developer<br />
and PM rely heavily on JITC’s test<br />
processes and results, which ensure that<br />
fully operational DMDS s<strong>of</strong>tware iterations<br />
are distributed to the field. Additionally,<br />
JITC validates unique <strong>Navy</strong> DMS strategic<br />
and tactical configurations and provides<br />
on-site training to <strong>Navy</strong> DMS Service Provider<br />
(DSP) sites.<br />
In the fall <strong>of</strong> 2002, the <strong>Navy</strong> Operational<br />
Test and Evaluation Force (OPTEVFOR) will<br />
The JITC Organization<br />
Plans, Policies and Warfighter Support Division (PPWFS) directly supports the Combatant<br />
Commanders,Services and Agencies by providing interoperability,operational and<br />
technical support during exercises, deployments and contingencies. Lead division for<br />
combined warfighting issues. Develops and executes the command’s strategic plan<br />
and establishes policies for testing and interoperability certification.<br />
Operational Test and Evaluation Division (OT&ED) provides independent operational<br />
test and evaluation (OT&E) and assessments <strong>of</strong> DISA programs to ensure that only operationally<br />
effective and suitable NSS/ITS systems are delivered to the warfighter. DISA<br />
programs include Global Command and Control System (GCCS), Defense <strong>Information</strong><br />
System Network (DISN) and Defense Message System (DMS). Also serves as the Operational<br />
Test Agent (OTA) for the Defense Logistics Agency (DLA), Defense Finance and<br />
Accounting Service (DFAS) and High Performance Computing Modernization Program<br />
(HPCMP), among others.<br />
JITC Washington Operations Division (JWOD) provides NSS/ITS interoperability test,<br />
evaluation and certification support with a specific focus on <strong>Department</strong> <strong>of</strong> Defense<br />
Intelligence <strong>Information</strong> Systems (DODIIS), <strong>Navy</strong> Programs, DMS, DoD Health Affairs,<br />
Logistics, <strong>Information</strong> Assurance and the Joint Warfighter Interoperability Demonstration<br />
(JWID).<br />
Combat Support and <strong>Information</strong> Systems Division (CSISD) provides developmental<br />
and interoperability test, evaluation and certification support with a specific focus on<br />
combat support,combat service support and information systems. Conducts standards<br />
validation and conformance testing <strong>of</strong> IT systems.<br />
Networks, Transmission and Intelligence Division (NTID) provides NSS/ITS (National<br />
Security Systems/<strong>Information</strong> Technology Systems) interoperability test,evaluation and<br />
certification support to DoD and other federal Agencies. Programs/functional areas<br />
supported include the Global <strong>Information</strong> Grid, information security, networks, transmission<br />
systems,switches,radios <strong>of</strong> all types,wireless systems; and intelligence, surveillance<br />
and reconnaissance systems. Conducts and participates in joint and combined<br />
exercises such as the DoD Interoperability Communications Exercise (DICE), the Joint<br />
User Interoperability Communications Exercise (JUICE), Combined Endeavor and CID<br />
(Coalition Interoperability Demonstration) Borealis.<br />
Joint Distributed Engineering Plant Division (JDEPD) leads DoD planning,coordination<br />
and engineering teams developing the JDEP. Provides management and oversight <strong>of</strong><br />
investment,coordination and general support functions. Oversees JDEP s<strong>of</strong>tware/hardware<br />
development and maintenance. Provides JDEP capability repository, network/<br />
simulation engineering,configuration management and infrastructure scheduling. Tests,<br />
evaluates and certifies command and control, and air and missile defense systems to<br />
interoperate with other Joint systems in accordance with tactical data link standards.<br />
Automated Systems and Test Support Division (AS&TSD) provides system engineering<br />
support in the design, development, installation, modernization and maintenance <strong>of</strong><br />
JITC automated test and test support systems,traffic and message loading devices,and<br />
strategic and tactical equipment. Manages,operates and maintains JITC test beds,laboratories,<br />
test systems, COMSEC account and related equipment in support <strong>of</strong> NSS/ITS<br />
testing. Implements and manages network management programs for JITC. Provides<br />
logistics support for JITC.<br />
Resource Management Division prepares and implements business, contract, and personnel<br />
policies/guidelines. Manages the command’s fiscal and human resource programs.<br />
NCR Liaison Office provides support to JITC customers based in the National Capital<br />
Region (NCR). Liaison to DISA PMs and Directorates, Joint Staff, OSD-level boards and<br />
committees, Major Range & Test Facility Base (MRTFB) activities, T&E policy working<br />
groups, tiger teams, allied interoperability groups, Combatant Command/Service/<br />
Agency activities. Represents DISA’s Central Test & Evaluation Investment Program<br />
(CTEIP) projects to OSD.<br />
26 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
JITC<br />
Advanced<br />
Technology<br />
Testbed<br />
(ATT)<br />
incorporates<br />
state-<strong>of</strong>the-art<br />
technologies<br />
such as<br />
Video<br />
Stream<br />
and Voiceover-IP.<br />
conduct an Operational Assessment (OA) <strong>of</strong> the <strong>Navy</strong> Marine<br />
Corps Intranet (NMCI). In conjunction with this OA,the JITC Combat<br />
Services and <strong>Information</strong> Systems Division will coordinate<br />
with OPTEVFOR to assess the joint information flow <strong>of</strong> selected<br />
Critical Joint Applications (CJA) to determine NMCI<br />
interoperability. The assessment will take place in an operational<br />
NMCI environment using JITC-developed test procedures. JITC<br />
will conduct its assessment at: Naval Air Systems Command, NAS<br />
Patuxent River, Md.; NAS Lemoore, Calif.; and Naval Air Facility<br />
Washington, Andrews Air Force Base, Md. When the assessment<br />
is completed, JITC will issue a “Status <strong>of</strong> Interoperability” letter,<br />
which will help the <strong>Navy</strong> thoroughly review their target NMCI<br />
implementation strategy and develop lessons learned.<br />
JITC’s <strong>Information</strong> Assurance (IA) team conducts code vulnerability<br />
assessments, penetration tests, commercial product testing,<br />
and security tool assessments. Testers also provide assistance<br />
during the DoD <strong>Information</strong> Technology Security Certification and<br />
Accreditation Process (DITSCAP), and the National <strong>Information</strong><br />
Assurance Certification and Accreditation Process (NIACAP). The<br />
IA laboratory at the Indian Head facility employs four individual<br />
enclaves that are networked over a three-tier architecture. The<br />
IA lab can replicate almost any <strong>Navy</strong> operational environment,<br />
thus providing added realism when testing a system’s reaction<br />
to an unauthorized intrusion. IA assessments <strong>of</strong> the Common<br />
Access Card (CAC) have been conducted relevant to the <strong>Navy</strong>’s<br />
implementation <strong>of</strong> Public Key Infrastructure (PKI) tokens within<br />
the NMCI architecture.<br />
The JITC NTID Surveillance & Reconnaissance Branch has begun<br />
to work closely with the <strong>Navy</strong> regarding developmental testing<br />
<strong>of</strong> the <strong>Navy</strong>’s Vertical Take<strong>of</strong>f and Landing Tactical Unmanned<br />
Aerial Vehicle (VTUAV). JITC became involved with this program<br />
early in the acquisition process,which will allow the <strong>Navy</strong> to mitigate<br />
much <strong>of</strong> the interoperability risks prior to future operational<br />
test events. JITC will soon work with the VTUAV Program Office<br />
to conduct interoperability assessments <strong>of</strong> the VTUAV at selected<br />
sites such as the Naval Weapons Center Detachment, China Lake,<br />
Calif. While conducting these assessments, JITC will determine<br />
the VTUAV’s ability to interoperate with numerous strategic and<br />
tactical C4I systems.<br />
To fulfill its interoperability mission, JITC has established laboratories<br />
and network connectivity to key DoD sites and employs<br />
state-<strong>of</strong>-the art technologies to replicate operational nodes. JITC’s<br />
Risk Mitigation Network employs central connectivity from Fort<br />
Huachuca to <strong>Navy</strong> and other DoD sites, and provides the capability<br />
to test systems in a distributed manner with minimal impact<br />
to operational networks. The Advanced Technology Testbed (ATT),<br />
located at Indian Head,enhances JITC’s current testing infrastructure.<br />
The ATT has positioned itself at the forefront <strong>of</strong> communication<br />
technology and keeps up with the latest communication innovations<br />
so JITC can mitigate the risk <strong>of</strong> introducing new technology<br />
within the DISN. The ATT includes modern communication<br />
technologies such as Gigabit Ethernet, Packet Over SONET<br />
(POS),Multi-Protocol Label Switching (MPLS),IP Telephony,Dense<br />
Wavelength Division Multiplexing and wireless LAN technology.<br />
JITC observed a transformation in the IT industry that warrants<br />
changes to test methods. Because <strong>of</strong> spiral development, the<br />
timeline for bringing a product to the field has been significantly<br />
reduced, which requires the tester to become involved early in<br />
the process. This demands a testing environment that can closely<br />
emulate a production setting with development features. For<br />
these reasons,the ATT employs a multi-vendor/multi-technology<br />
layout. Connectivity to the ATT will allow the <strong>Navy</strong> to take advantage<br />
<strong>of</strong> the lab’s many unique test capabilities.<br />
In the near future, the <strong>Navy</strong> and other services will also establish<br />
connectivity via the Joint Distributed Engineering Plant (JDEP) to<br />
conduct distributed test events. To a certain extent, the JDEP<br />
program (a diagram <strong>of</strong> the JDEP architecture is shown on the next<br />
page) was initiated based on the success <strong>of</strong> the <strong>Navy</strong>’s DEP. In<br />
accordance with Defense Planning Guidance, the JDEP program<br />
was established as a DoD-wide effort to link DoD and joint combat<br />
system engineering and test sites. It is designed to improve the<br />
interoperability <strong>of</strong> systems through rigorous testing and<br />
evaluation in a replicated battlefield environment. The DISA IN<br />
Directorate serves as the manager <strong>of</strong> the JDEP and oversees the<br />
execution <strong>of</strong> the program. The JITC JDEP Division serves as the<br />
JDEP Coordinator and is responsible for identifying candidate sites<br />
and federations, cataloging system and network capabilities, and<br />
defining the overall technical architecture. JDEP baseline sites<br />
include <strong>Navy</strong> activities such as NAVAIR Patuxent River, Md.; Naval<br />
Surface Warfare Center (NSWC) Dam Neck, Va.; SPAWARSYSCEN<br />
Charleston, S.C.; and SPAWARSYSCEN San Diego, Calif. JITC will<br />
work closely with these activities,as well as other DoD sites,during<br />
collaborative engineering team meetings and JDEP test events.<br />
JDEP strategies coincide with Joint Vision 2010 and 2020<br />
initiatives. JITC is poised to support the collaborative test<br />
opportunities and interoperable environment that JDEP <strong>of</strong>fers to<br />
joint warfighters.<br />
JITC is well known for the exercise<br />
and operational contingency<br />
support they provide to<br />
Combatant Commanders<br />
worldwide. JITC supports seven<br />
to nine exercises each year in<br />
support <strong>of</strong> joint and combined<br />
interoperability initiatives aug-<br />
JITC testers perform analysis <strong>of</strong><br />
the Submarine AN/SYQ-28(V)<br />
Single Messaging Solution<br />
(SMS) and other tactical<br />
systems.<br />
CHIPS Winter 2003 27
JDEP Joint Architecture<br />
menting combatant commander staffs with on-site technical support.<br />
JITC has supported exercises such as Combined Endeavor,<br />
Unified Endeavor, Foal Eagle and Roving Sands, as well as operational<br />
contingencies such as Desert Storm and Operation Enduring<br />
Freedom.<br />
The JITC NTID Networks and Integration Branch serves as the coordinator<br />
and test lead for the DICE on behalf <strong>of</strong> the Joint Forces<br />
Command (JFCOM). DICE represents a coast-to-coast joint service<br />
interoperability test that focuses on warfighting requirements.<br />
The DICE network is designed to emulate a JointTask Force<br />
(JTF) architecture. DICE distributed tests are accomplished in<br />
phases using JITC laboratory resources, assets from active units,<br />
and other DoD test facilities. The overall purpose <strong>of</strong> DICE is to<br />
assess new/improved DoD tactical and strategic switching systems,transmission<br />
systems and terminal devices,and certify these<br />
systems for joint interoperability. Naval ships such as the USS<br />
Mount Whitney, USS George Washington and USS Nassau have<br />
been active participants in past DICE events.<br />
The NTID Networks & Integration Branch also supports JUICE on<br />
behalf <strong>of</strong> JFCOM. JUICE allows the Services to evaluate deployable<br />
communication configurations and their interfaces to the GIG.<br />
Besides providing great training opportunities,this event affords<br />
the opportunity for the <strong>Navy</strong> and other Services to refine operational<br />
configurations, monitor the applicability <strong>of</strong> tool sets, and<br />
evaluate reporting procedures. JITC also provides 24-hour hot<br />
line support to Combatant Commanders and DoD personnel. For<br />
instance, if a Sailor needs technical assistance to restore a circuit,<br />
he/she may call 1-800-LET-JITC to receive troubleshooting information.<br />
If the JITC technical expert cannot provide the necessary<br />
assistance over the phone, it is likely that he/she will be dispatched<br />
to the Sailor’s location to resolve the problem.<br />
JITC developed the Joint Interoperability Tool (JIT) to further assist<br />
the warfighter. The JIT is a Web-based repository <strong>of</strong> information<br />
that is available via controlled access over the NIPRNET or<br />
directly over the SIPRNET. The JIT has a powerful search engine<br />
that permits users to access test reports, interoperability certification<br />
letters, reference manuals and valuable lessons learned.<br />
The JIT is constantly updated with new information, allowing the<br />
Services to obtain vital information that is always current.<br />
To ensure that warfighter objectives are satisfied, JITC must view<br />
its interaction with DoD services and agencies as a partnership.<br />
JITC works in tandem with some organizations by way <strong>of</strong> unspoken<br />
agreements or established written agreements. JITC recognizes<br />
the need to initiate“formal”partnerships with key <strong>Navy</strong> organizations<br />
in order to achieve joint interoperability goals.<br />
In May 2002, JITC Commander, Col. Terry Pricer, USAF, signed a<br />
Memorandum <strong>of</strong> Agreement (MOA) with several organizations,<br />
making JITC the newest member <strong>of</strong> the Chesapeake Regional<br />
Ranges Cooperative (CRRC). As a member <strong>of</strong> the CRRC, JITC will<br />
assist the <strong>Navy</strong> and the other Services in providing a streamlined<br />
T&E process for program managers and the acquisition community<br />
in the Chesapeake region and beyond. JITC will soon collaborate<br />
with CRRC partners (NAVAIR Atlantic Test Ranges (ATR),<br />
NAVSEA Combat Direction Systems Activity (CDSA),CINCLANTFLT,<br />
Aberdeen Test Center (ATC) and Fort A.P.Hill) for cooperative testing,assistance<br />
during Joint Task Force Exercises (JTFEX),and support<br />
<strong>of</strong> programs such as the Tactical Tomahawk. This partnership<br />
will demonstrate how collaborative testing and resource<br />
sharing will enhance military readiness, reduce costs, and support<br />
the RDT&E and interoperability requirements <strong>of</strong> DoD acquisition<br />
managers.<br />
In 2001, JITC and the SPAWAR CINC Interoperability Program Office<br />
(CIPO) began pursuing activities that would lead to closer<br />
relations with other DoD agencies responsible for joint<br />
interoperability. Both organizations determined that significant<br />
benefits could be gained by having a SPAWAR liaison on-site at<br />
JITC headquarters. In order to accomplish this, a JITC/SPAWAR<br />
CIPO Memorandum <strong>of</strong><br />
Agreement (MOA) was<br />
staffed and signed in June<br />
2002. It defined organizational<br />
responsibilities and<br />
<strong>of</strong>ficer at the Fort<br />
JITC Commander Col. Terry Pricer,<br />
USAF, (right) Capt. John Melear, USN<br />
(center) sign the JITC/SPAWAR CIPO<br />
MOA,while JITC Deputy Commander,<br />
Mr. Denis Beaugureau looks on.<br />
established a CIPO liaison<br />
at the Fort Huachuca facility.<br />
This MOA strengthens<br />
the relationship between<br />
JITC and the <strong>Navy</strong> and encourages<br />
the sharing <strong>of</strong> information<br />
and resources. It<br />
is also seen as a way to enhance<br />
exercise coordination,<br />
<strong>of</strong>fer SPAWAR direct<br />
access to the appropriate <strong>of</strong>fices at JITC, provide an interface between<br />
the JITC testing community and SPAWAR Code 053, and<br />
enhance systems design prior to programmatic testing and<br />
implementation.<br />
Through a follow-on Memorandum <strong>of</strong> Understanding (MOU)<br />
signed in September 2002,JITC and SPAWAR <strong>of</strong>ficially established<br />
a partnership for facilitating DT,OT,and joint interoperability certification<br />
<strong>of</strong> the <strong>Navy</strong>’s IT and NSS infrastructure. Ultimately, JITC<br />
will improve its fleet support posture and further cultivate its relationship<br />
with the <strong>Navy</strong>, as the <strong>Navy</strong>’s acquisition, engineering,<br />
and operational communities fully understand and institute joint<br />
interoperability test processes, procedures and doctrine.<br />
Chris Watson is an <strong>Information</strong> Technology Systems Project <strong>Officer</strong><br />
at the Joint Interoperability Test Command.<br />
28 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
East Timor: A Case Study in C4I Innovation<br />
By Col. Lyle M. Cross, USMC with Col. Randy P. Strong, USA, Lt. Col. Clinton D.Wadsworth, USMC and Dave Delaunay<br />
Introduction<br />
U.S. involvement in East Timor is a success story <strong>of</strong> peacemaking<br />
and country-rebuilding. The United States Pacific Command<br />
(USPACOM) and U.S. Forces continue to play a critical role in the<br />
international effort to assist the people <strong>of</strong> East Timor. East Timor<br />
is more than 5,600 miles from Hawaii and another 3,000 from<br />
locations in CONUS where many <strong>of</strong> the U.S. Forces that provided<br />
communications support were based. Timor is the Malay word<br />
for Orient; it is part <strong>of</strong> the Malay Archipelago, as shown in Figure<br />
1,and is the largest <strong>of</strong> the easternmost <strong>of</strong> the Lesser Sunda Islands.<br />
The population is 90 percent Roman Catholic, 4 percent Muslim<br />
and 3 percent Protestant.<br />
East Timor was a Portuguese colony for more than 400 years until<br />
1974, when Portugal sought to establish a provisional government<br />
and popular assembly to determine the future <strong>of</strong> East Timor.<br />
Civil war broke out between those who favored independence<br />
and those who advocated integration with Indonesia. Portugal<br />
withdrew when authorities were unable to maintain stability. Indonesia<br />
intervened militarily and integrated East Timor as its 27th<br />
province in 1976. The United Nations and the international community<br />
did not recognize this integration and both the U.N. Security<br />
Council and the General Assembly called for Indonesia’s<br />
withdrawal,but for nearly 20 years little action was taken. During<br />
this time the East Timorese lived under threat <strong>of</strong> death at the<br />
hands <strong>of</strong> the occupying Indonesian military. In June 1998, Indonesia,prompted<br />
by pressure from the U.N.General Assembly,proposed<br />
a limited autonomy for East Timor within Indonesia. The<br />
two governments entrusted the Secretary-General with organizing<br />
and conducting a“popular consultation”to ascertain whether<br />
the East Timorese people were in favor <strong>of</strong> special autonomy within<br />
the Republic <strong>of</strong> Indonesia.<br />
To carry out the consultation, the Security Council, by resolution<br />
1246 (1999) authorized the establishment <strong>of</strong> the United Nations<br />
Mission in East Timor (UNAMET) June 11, 1999. On voting day,<br />
August 30,1999,98 percent <strong>of</strong> registered voters went to the polls<br />
— 78 percent rejected the proposed autonomy in favor <strong>of</strong> full<br />
independence. Immediately following the announcement pro-<br />
Jakarta militia groups aided by Indonesian armed forces began a<br />
campaign <strong>of</strong> violence, looting and destruction. Many East<br />
Timorese were killed and as many as 500,000 were displaced from<br />
their homes. Indonesian authorities did not respond effectively<br />
to end the violence. The Secretary-General and Security Council<br />
undertook intense diplomatic efforts to press Indonesia into action.<br />
International pressure mounted.<br />
Finally,the U.N.Security Council voted unanimously Sept.14,1999,<br />
to authorize an Australian-led International Force East Timor<br />
(INTERFET) under Chapter 7 <strong>of</strong> the U.N. Charter. U.S. Forces, in<br />
support <strong>of</strong> OPERATION STABILISE (as the Australians called it),<br />
began deploying into Darwin. Brig. Gen. Castellaw, 3rd Marine<br />
Expeditionary Force on Okinawa, Commander <strong>of</strong> the U.S. Forces<br />
INTERFET (USFI) arrived Sept.17,followed by the USCINCPAC MSQ<br />
126 with 18 personnel Sept. 19.<br />
Darwin<br />
East Timor<br />
Hawaii<br />
5,619 miles<br />
Figure 1.<br />
Communications support provided by U.S. Forces played a pivotal<br />
role in the success <strong>of</strong> the U.N. mission in East Timor. The U.S.<br />
military’s mission was to provide communications and intelligence<br />
planners, as well as ships and helicopters to move troops<br />
and equipment. The tyranny <strong>of</strong> distance, that is a constant factor<br />
in planning in the Pacific theater, was a distinct disadvantage to<br />
finding a solution to restore peace and a stable independent government<br />
to East Timor. The one saving grace <strong>of</strong> the geographical<br />
circumstances was the proximity <strong>of</strong> Darwin to East Timor and its<br />
capital, Dili. Darwin was used as an intermediate staging base<br />
and the location <strong>of</strong> the Commander U.S. Forces INTERFET headquarters.<br />
Essential to the success <strong>of</strong> our mission was the transition<br />
from military to a commercial solution for communications<br />
support.<br />
The entire international force was comprised <strong>of</strong> more than 8,000<br />
military members from 15 different countries including approximately<br />
5,000 U.S. military, most <strong>of</strong> which were stationed <strong>of</strong>fshore<br />
on ships. U.S. ground forces numbered about 300. At the height<br />
<strong>of</strong> the crisis, 40 different United Nations and humanitarian agencies<br />
were providing support. The timeline, shown below, illustrates<br />
significant events in East Timor’s quest for independence<br />
and coalition assistance.<br />
05 May 99 - Indonesia agrees to hold referendum in August<br />
11 Jun 99 - UNAMET is established<br />
30 Aug 99 - East Timorese reject autonomy via democratic election<br />
31 Aug 99 - Violence erupts for the next several days<br />
31 Aug 99 - USFI Liaison <strong>of</strong>ficers deploy to Brisbane<br />
11 Sep 99 - Planners deploy to Brisbane<br />
12 Sep 99 - Indonesian President requests international peacekeepers<br />
15 Sep 99 - U.N. Security Council authorizes INTERFET<br />
15 Sep 99 - Establishment <strong>of</strong> U.S. Forces INTERFET<br />
18 Sep 99 - U.S. Forces Darwin HQ established<br />
27 Sep 99 - COMUSF INTERFET Dili HQ established<br />
Feb 00 - U.N.Transitional Administration East Timor assumes responsibility<br />
for peacekeeping operation<br />
C4I Communications<br />
The area <strong>of</strong> operations presented many challenges for the communications<br />
units. Five-hundred miles separated Darwin (ISB) and<br />
Dili (FSB). When the first servicemembers arrived, East Timor lay<br />
in ruins, there was little infrastructure <strong>of</strong> any kind remaining in<br />
CHIPS Winter 2003 29
Figure 2. CINCPAC MSQ<br />
126 Fly Away Command<br />
Post. The MSQ-126 can<br />
deploy via (1) C17, (1) C5<br />
or (4) C130s. It can<br />
support a staff <strong>of</strong> 30 with<br />
the full range <strong>of</strong> DISN<br />
services.<br />
Dili or the outlying areas due to the looting<br />
and arson,which had occurred. Almost<br />
total destruction <strong>of</strong> the infrastructure included<br />
electrical and sewage disposal systems.<br />
Most <strong>of</strong> the buildings had been<br />
burned and/or gutted <strong>of</strong> fixtures. (Within<br />
weeks U.S. Forces began to see the city recover<br />
due to massive humanitarian assistance<br />
administered by numerous agencies.)<br />
Additionally,the mountainous geography<br />
<strong>of</strong> East Timor hampered line-<strong>of</strong>-sight<br />
communications between tactical forces.<br />
These factors dictated the deployment <strong>of</strong><br />
U.S. military communications assets. From<br />
September 1999 through February 2000,<br />
U.S. Forces INTERFET met the highly dynamic<br />
C4 support requirements for peacekeeping<br />
and the subsequent humanitarian<br />
assistance operations effectively.<br />
This success was the result <strong>of</strong> effective<br />
planning and phasing <strong>of</strong> C4 forces. The<br />
CINCPAC MSQ (shown in Figure 2) is a<br />
USPACOM C4 asset designed for rapid<br />
deployment to provide DISN services for<br />
early entry forces. The MSQ-126 arrived in<br />
Darwin Sept. 19, and provided DSN,<br />
NIPRNET, SIPRNET, video, GCCS and<br />
AUTODIN messaging. The 31st Marine<br />
Expeditionary Unit’s JTF Enabler arrived in<br />
Dili Oct. 9, to support COMINTERFET,<br />
Australian Maj. Gen. Peter Cosgrove.<br />
Another early entry C4 capability, the<br />
Enabler package provided DSN, NIPRNET<br />
and SIPRNET. It departed on Oct. 23, after<br />
lead elements <strong>of</strong> Task Force Thunderbird<br />
(shown in Figure 3) arrived in Dili Oct. 20,<br />
to assume the mission for INTERFET. This<br />
task force, comprised <strong>of</strong> the 86th Signal<br />
Battalion, and elements <strong>of</strong> the 40th and<br />
504th Signal Battalions, all from Fort<br />
Huachuca, Ariz., provided the principle C4<br />
support promised to the U.N. effort.<br />
PACOM’s J6, Col. Randy Strong, USA, was<br />
assigned as the Commander, U.S. Forces<br />
East Timor. Five soldiers and one civilian<br />
contractor provided continuous support<br />
to INTERFET.<br />
Thirty-seven personnel provided Counterintelligence/Human<br />
Intelligence (CI/<br />
HUMINT) support to INTERFET. This support<br />
capability,shown in Figure 4,provided<br />
threat information and counterintelligence<br />
operations, and ensured commanding <strong>of</strong>ficers<br />
had the information they needed to<br />
carry out operations throughout East<br />
Timor. The network configuration that was<br />
used is shown in Figure 5. The diagram represents<br />
the major pieces <strong>of</strong> the final architecture<br />
to support U.S. Forces. It reflects a<br />
robust configuration with redundant paths<br />
to the two key entry points within the Pacific<br />
theater.<br />
Transition from military to commercial<br />
communications moved quickly with the<br />
approval <strong>of</strong> a detailed transition plan on<br />
Oct. 30, 1999. By Jan. 1, 2000 the communications<br />
commercialization was completed.<br />
Of the 300 U.S. personnel employed<br />
at the height <strong>of</strong> the operation, 150<br />
<strong>of</strong> them were dedicated to the military C4<br />
mission. The commercialization allowed<br />
them to return to their home stations with<br />
their equipment, which included seven<br />
SHF satellite terminals, six telephone<br />
switches and three data hubs,as well as numerous<br />
line-<strong>of</strong>-sight multichannel radios.<br />
The impact on operational to strategic resources<br />
was also alleviated, as four standard<br />
tactical entry point (STEP) missions for<br />
Figure 3. These are the assets<br />
<strong>of</strong> Task Force Thunderbird.<br />
Additionally, the 11th Signal<br />
Brigade used four satellite<br />
terminals, several voice and<br />
data switches and numerous<br />
line-<strong>of</strong>-sight multichannel<br />
radio systems.<br />
Figure 4. Intelligence support was provided<br />
by CINCPAC Unit 205th MI and JICPAC. The<br />
Trojan Spirit provided links to all-source<br />
intelligence and Intelink-C.<br />
DISN services were terminated. The<br />
timeline used to move to a commercial<br />
communications solution is shown below.<br />
13 Oct 99 - Contract for Telstra let<br />
21 Oct 99 - COMUS INTERFET C4 “green”<br />
30 Oct 99 - C4 transition plan approved<br />
15 Nov 99 - Redeployment <strong>of</strong> C4 units<br />
15 Dec 99 - TF Thunderbird departs Dili<br />
1 Jan 00 - Commercialization complete<br />
26 Jan 00 -Transition <strong>of</strong> USFI to USGET<br />
1 Feb 00 - USFI disestablished<br />
USGET established<br />
Telstra, jointly owned by the Australian<br />
government and private industry,installed<br />
the “Big Pipe” pictured in Figure 6. It was<br />
used to extend commercial bandwidth<br />
into Dili from Australia. Through this<br />
means, USGET (United States Support<br />
Group East Timor) had access to both the<br />
SIPRNET and NIPRNET through Cisco routers<br />
and Type 1 encryption devices (NES).<br />
Ericson provided commercial satellite telephones,<br />
which were later replaced by<br />
Iridium.<br />
Using this capability COMUSINTERFET was<br />
provisioned with NIPRNET and SIPRNET<br />
service. Secure voice service was provided<br />
through the use <strong>of</strong> a public telephone exchange<br />
and encrypted using STU IIIs. Redundant<br />
secure voice services were added<br />
using Inmarsat and Iridium. Cellular telephones<br />
and hand-held radios were used<br />
for non-secure voice. As the mission<br />
transitioned from peacekeeping to humanitarian<br />
assistance, the commercial architecture<br />
changed as well.<br />
In addition to a substantial savings in resources,<br />
equipment and personnel, commercialization<br />
resulted in a responsive and<br />
scalable C4 solution. COMUSGET has<br />
changed locations four times since their<br />
establishment, but each time the services<br />
30 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
were easily reinstalled to meet mission requirements.<br />
Central Command used commercial<br />
satellite deployable KU earth terminal<br />
(DKET), and encryption devices to<br />
provide DISN service in austere environments.<br />
The commercialization <strong>of</strong> communications<br />
for East Timor served as a prototype<br />
for future DoD commercialization efforts.<br />
The international community’s assistance<br />
in East Timor has been one <strong>of</strong> the most successful<br />
peace enforcement and country-rebuilding<br />
missions in recent years. As the<br />
mission in East Timor continues to evolve,<br />
U.S. Forces have sent in different assets.<br />
U.S. Forces have been instrumental in delivering<br />
food and other supplies,engaging<br />
in community projects and transporting<br />
diplomatic and peacekeeping representatives<br />
to East Timor.<br />
Even though East Timor became an independent<br />
nation May 29, 2002, the work is<br />
certainly not over. The United Nations continues<br />
to maintain a presence in East Timor<br />
to ensure its security and stability. The successor<br />
mission,the United Nations Mission<br />
<strong>of</strong> Support in East Timor (UNMISET) is planning<br />
a gradual withdrawal <strong>of</strong> the territory<br />
and supports the East Timorese authorities<br />
to maintain democracy and justice, internal<br />
security and law enforcement,and border<br />
control. Humanitarian agencies continue<br />
to provide assistance as well.<br />
Col. Cross is the <strong>Chief</strong>, C4 Operations and<br />
Plans Divisions, USCINCPAC.<br />
Ft. Buckner<br />
Gateway<br />
Baucau<br />
93<br />
LTU<br />
Thai<br />
Brigade<br />
LTU<br />
Network Diagram<br />
85<br />
Darwin<br />
85<br />
Dili<br />
93 93<br />
COMIFET<br />
174 175<br />
COMUSF<br />
Waihiwa<br />
Gateway<br />
173 173 138 138<br />
APOE<br />
FCC-100<br />
FCC-100<br />
Figure 5.<br />
Figure 6. The “Big Pipe” used to extend the<br />
commercial bandwidth into Dili from Australia for<br />
USGET access to SIPRNET and NIPRNET using Cisco<br />
routers and Type 1 encryption devices (NES). This<br />
was the “longest pole” ever used in exit strategy,<br />
which combined the talents <strong>of</strong> the U.S. Joint Staff<br />
J6, 11th Signal Brigade Program, Telstra, Cisco and<br />
Ericson, and was certainly an example <strong>of</strong> capitalism<br />
working at its best.<br />
FCC-100<br />
FCC-100<br />
SPOE ASG LCSG<br />
Humanitarian and Civic Assistance<br />
The United States has an ongoing commitment to<br />
the newly formed East Timor nation. U.S. <strong>Navy</strong><br />
personnel have completed numerous community<br />
service projects including painting <strong>of</strong> the August<br />
School in Feb. 2001. Aug. 2001, the Seabees with<br />
Naval Construction Battalion 5, U.S. Pacific Fleet,<br />
Calif., worked on the Bemos water treatment<br />
plant in the effort to rebuild the nation’s<br />
infrastructure. During this visit a local orphanage<br />
also benefited from structural improvements,<br />
and electrical and plumbing repairs. U.S. efforts<br />
have focused on assistance to improve basic<br />
health and social conditions, and the overall<br />
quality <strong>of</strong> life for the people <strong>of</strong> East Timor.<br />
Clockwise from top left to right: Dili, East Timor - Feb. 2001, a U.S. <strong>Navy</strong> corpsman assigned to USS Juneau takes a young<br />
girl’s temperature; Dec. 2001, U.S. <strong>Navy</strong> Seabees attached to the U.S. Support Group East Timor check an electrical panel at<br />
Bemos water treatment plant; Oct. 2002, a U.S. <strong>Navy</strong> doctor examines a patient as part <strong>of</strong> the Amphibious Ready Group’s<br />
medical support during a three-day rotation in East Timor; Apr. 2002, a service member teaches basic math skills to some<br />
children.<br />
CHIPS Winter 2003 31
Restructuring<br />
Naval Education<br />
By JO2 Jd Walter, NPDC, Public Affairs Office<br />
The <strong>Navy</strong> recently created the Naval Personnel<br />
Development Command (NPDC) to<br />
standardize and integrate the training processes<br />
and technology <strong>of</strong> its Learning Centers.<br />
NPDC evolved from the Task Force for<br />
Excellence through Commitment to Education<br />
and Learning (EXCEL) and its efforts<br />
to institutionalize the precepts <strong>of</strong> the<br />
<strong>Navy</strong>’s Revolution in Training.<br />
Currently, there are plans for 15 functional<br />
Learning Centers under NPDC with each<br />
being directly responsible for the end-toend<br />
development <strong>of</strong> learning tools and<br />
opportunities within a given occupational<br />
arena. By providing the formal connection<br />
between the Fleet and individual training,<br />
the Learning Centers will facilitate a relationship<br />
with Fleet representatives to identify<br />
human performance deficiencies,build<br />
and deliver solutions,and evaluate results.<br />
The Learning Centers comprise the core <strong>of</strong><br />
the new organization. The centers will utilize<br />
the Sailor Continuum and Human Performance<br />
Systems Model to develop pr<strong>of</strong>essional<br />
continuums and serve as the<br />
knowledge managers for all occupational<br />
fields and mission areas. Additionally, centers<br />
for leadership and pr<strong>of</strong>essional development<br />
will be established to ensure the<br />
whole person development <strong>of</strong> Sailors. The<br />
Center for Naval Leadership in Norfolk,Va.;<br />
Center for Naval Intelligence at Dam Neck,<br />
Va.; and Centers for Naval Aviation Technical<br />
Training and Cryptology in Pensacola,<br />
Fla., all stood up on a provisional basis in<br />
September 2002. The remaining centers<br />
will be provisionally stood up in the near<br />
future. They will assume responsibility for<br />
the operations and functions <strong>of</strong> their core<br />
areas. Each center will have a Commanding<br />
<strong>Officer</strong> and the final organizational construct<br />
and manning will be determined billet<br />
by billet to best support mission needs.<br />
So,just as the <strong>Navy</strong>’s Revolution in Training<br />
steers toward the complete development<br />
<strong>of</strong> Sailors, it is likewise piloting the<br />
improvements to the <strong>Navy</strong>’s training organization,<br />
giving both Sailors and the <strong>Navy</strong><br />
the tools to learn, grow, lead and excel. To<br />
learn more about this revolutionary structure,visit<br />
<strong>Navy</strong> Knowledge Online,at https:/<br />
/www.nko.navy.mil<br />
<strong>Navy</strong> Knowledge<br />
Management Portal<br />
<strong>Navy</strong> education and training created a new<br />
way for Sailors to manage their careers via<br />
the Internet. <strong>Navy</strong> Knowledge Online<br />
(NKO), the knowledge management portal,<br />
gives Sailors instant access to all training<br />
and educational information related to<br />
their occupational field.<br />
Knowledge management is the gathering<br />
<strong>of</strong> organizational processes,systems,methodologies,visions<br />
and resources into a centralized<br />
location. For Sailors, the knowledge<br />
management portal will identify career<br />
paths, milestones, and educational<br />
tools and opportunities. For the <strong>Navy</strong>, this<br />
will result in greater operational efficiency<br />
and eliminate organizational redundancies.<br />
To develop the portal, the <strong>Navy</strong><br />
teamed with Appian, a provider <strong>of</strong> largescale<br />
s<strong>of</strong>tware solutions. “We wanted to<br />
provide every Sailor with a personalized<br />
gateway to the <strong>Navy</strong>’s knowledge base for<br />
all pr<strong>of</strong>essional and personal development,”<br />
said Rear Adm. Kevin Moran, Commander<br />
Naval Personnel Development<br />
Command/Director, Task Force for Excellence<br />
through Commitment to Education<br />
and Learning. “We selected Appian based<br />
on their track record.”<br />
The faceplate <strong>of</strong> the portal will be individualized<br />
Web pages that Sailors can customize.<br />
This portable Web page will be assigned<br />
to Sailors during boot camp and<br />
will remain accessible throughout their<br />
<strong>Navy</strong> careers. The portal will give Sailors<br />
access to the most relevant and up-to-date<br />
career information as easy as point, click,<br />
and learn. To visit NKO go to https://<br />
www.nko.navy.mil. To learn more about the<br />
development <strong>of</strong> the knowledge management<br />
portal, visit www.excel.navy.mil.<br />
Surface Combat Operations<br />
New Home<br />
By George Dunn, CSCS, Public Affairs<br />
The <strong>Navy</strong>’s surface combat systems community<br />
has a new home, courtesy <strong>of</strong> the<br />
Revolution in Training. The Center for Surface<br />
Combat Systems (CSCS) has been established<br />
in Dahlgren, Va., and will be responsible<br />
for training the commissioned<br />
and enlisted personnel who operate,maintain,<br />
and employ the various combat systems<br />
found on the <strong>Navy</strong>’s surface warships.<br />
Initially, CSCS is being staffed by Aegis<br />
Training and Readiness Center (ATRC)<br />
headquarters personnel, also located in<br />
Dahlgren,and key surface combat systems<br />
training activities’ personnel from around<br />
the Fleet. Capt. Paul Stanton, ATRC commanding<br />
<strong>of</strong>ficer, will be dual-hatted as<br />
CSCS commanding <strong>of</strong>ficer. ATRC, which<br />
trains <strong>Navy</strong> personnel in the operation,<br />
maintenance, and employment <strong>of</strong> the Aegis<br />
Combat System found aboard the<br />
<strong>Navy</strong>’s fleet <strong>of</strong> Aegis cruisers and destroyers,<br />
will be realigned and come under the<br />
auspices <strong>of</strong> the new command. Naval Sea<br />
Systems Command has overseen ATRC<br />
since its establishment in 1985.<br />
“ATRC has had tremendous success in<br />
training the <strong>Navy</strong>’s Aegis Combat Systems<br />
personnel,” said Commander, Naval Personnel<br />
Development Command, Rear<br />
Adm.Kevin Moran. “Their approach to,and<br />
experience with waterfront training,acquisition<br />
support, and weapons systems<br />
interoperability training provides a great<br />
model for future successes <strong>of</strong> the Center.<br />
By leveraging the Aegis training model,the<br />
Center is poised to create a more dynamic<br />
training environment for other surface<br />
combat systems personnel, and will play<br />
an important role in developing the CNO’s<br />
vision to revolutionize <strong>Navy</strong> training.”<br />
In addition to Aegis Fire Control Technician<br />
training and Aegis <strong>of</strong>ficer pipeline training,<br />
CSCS will train the Sonar Technician,<br />
Torpedoman, Gunner’s Mate, Operations<br />
Specialist,Fire Control Technician,Electronics<br />
Technician and Mineman ratings. For<br />
additional information on CSCS and the<br />
Revolution in Training visit https://<br />
www.nko.navy.mil<br />
“The vision <strong>of</strong> the Revolution<br />
in Training is to increase<br />
Sailor pr<strong>of</strong>iciencies by<br />
providing the best training in<br />
the most efficient manner<br />
possible.” <strong>Chief</strong> <strong>of</strong> Naval<br />
Operations, Adm. Vern Clark<br />
said,“What we have now is a<br />
structure that advocates<br />
excellence not only in the<br />
individual, but also excellence<br />
in the management <strong>of</strong><br />
training and education.”<br />
32 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
Virtual Connecting Technology Fall 2002, December 3-17,<br />
was engineered to arm the warfighter with 21st century<br />
<strong>Information</strong> Technology (IT). The CT staff provided loyal<br />
attendees and newcomers alike with an integrated avenue to<br />
keep abreast <strong>of</strong> emerging IT supporting the <strong>Navy</strong>’s role in homeland<br />
security.<br />
Visitors to Virtual CT at www.ct.navy.mil were informed and<br />
challenged with the latest in wireless technology,NMCI updates,<br />
the C4ISR vision, Knowledge Management, eBusiness,<br />
eCommerce, eLearning, Data Warehousing, pr<strong>of</strong>essional development<br />
opportunities and much more. Our goal was to provide<br />
the warfighter, and those who support and direct the<br />
warfighter, with the most current IT resources needed to remain<br />
on the cutting edge <strong>of</strong> homeland defense.<br />
The Virtual Connecting Technology Fall 2002 event was FREE to<br />
all attendees and exhibitors! Those who participated had the<br />
opportunity to:<br />
♦Explore emerging products,Government and Industry visions,<br />
policies, and services that increase the effectiveness <strong>of</strong> the<br />
warfighter.<br />
♦Gain perspectives on topics affecting the future <strong>of</strong> IT and <strong>Information</strong><br />
Management (IM) throughout the <strong>Department</strong> <strong>of</strong> the<br />
<strong>Navy</strong>, <strong>Department</strong> <strong>of</strong> Defense, Federal Government, Academia,<br />
and Industry.<br />
♦Explore the Virtual Exhibition and Presentation Halls using a<br />
variety <strong>of</strong> search functions.<br />
♦Forge new partnerships with IT/IM Leaders by creating an<br />
eBusiness Card to deposit with exhibitors and presenters.<br />
♦Send a Virtual eCard from the event to friends and colleagues.<br />
♦Leave the event with an understanding <strong>of</strong> who can be contacted<br />
to provide their organization with the services and products<br />
they need.<br />
Mark your calendar now for CT Spring 2003, May 20-22, planned<br />
for the Pavilion Convention Center Virginia Beach, Va., and CT<br />
Fall 2003, Nov. 18-20, planned for the Town and Country Resort<br />
Hotel and Convention Center, San Diego, Calif.<br />
Please visit our Web site at www.ct.navy.mil for more information.<br />
You may also contact the Connecting Technology staff via<br />
e-mail at conntech@spawar.navy.mil or call (757) 444-9967.<br />
Please join us as we support the 21st century warfighter through<br />
an exchange <strong>of</strong> IT ideas and innovations.<br />
Connecting Technology is sponsored by the<br />
DON <strong>Information</strong> Technology Umbrella Program<br />
Visit us at www.it-umbrella.navy.mil<br />
NAVAIR Response Center<br />
By Vicky Falcon, NAVAIR Public Affairs<br />
Onboard the deployed USS Boxer (LHD-4), AT1 Roger Rever was<br />
upgrading a computer processor on a CH-53D“Sea Stallion”helicopter<br />
as part <strong>of</strong> his job as a Quality Assurance Representative in<br />
the Aircraft Intermediate Maintenance <strong>Department</strong> onboard. The<br />
upgrade was part <strong>of</strong> an Avionics Change (AVC) ordered through<br />
a <strong>Navy</strong> Technical Directive for the AN/AAR-47 Missile Warning Set<br />
installed onboard. The AN/AAR-47 is a passive missile detection<br />
system that detects attacking missiles and provides an audio and<br />
visual approach sector warning to the crew.<br />
“While upgrading from a -3 model to a -4 model we discovered<br />
that one <strong>of</strong> the processors onboard had never been upgraded<br />
from the -2 version,” said Rever. “We suspected that we could<br />
update the -2 to a -4 through the incorporation <strong>of</strong> the current<br />
AVC,but we needed to be sure — after all,lives could be at stake!”<br />
Usually, Rever would find the Fleet Support Team (FST) for the<br />
item in question and contact them for direction. However, in this<br />
case he was unable to locate a contact for the AAR-47 system.<br />
Rever decided to take advantage <strong>of</strong> the <strong>Navy</strong> Distance Support<br />
infrastructure by submitting his request via an online form found<br />
at www.anchordesk.navy.mil/index.htm. The request was processed,<br />
given a tracking number, and forwarded to the NAVAIR<br />
Response Center (NRC) for action. Rever could also have reached<br />
the NRC by calling 877-41-TOUCH (press option 2),or by e-mailing<br />
fleetresponse@navair.navy.mil.<br />
The NRC coordinates and facilitates the resolution <strong>of</strong> Naval aviation-related<br />
questions and issues, assisting customers who have<br />
been unable to find answers via their appropriate chains <strong>of</strong> command.<br />
According to Fillip Behrman,program manager for the NRC,<br />
the center links customers with experts across the Naval Aviation<br />
community, ensuring the most current, comprehensive and accurate<br />
responses possible in a timely manner. Delays can <strong>of</strong>ten<br />
be reduced or avoided by utilizing the resources <strong>of</strong> the NRC. “Our<br />
warfighters have the right to expect timely, accurate answers to<br />
their questions — and that’s what we provide,” said Behrman.<br />
Rever was impressed with the efficient and timely response to<br />
his question. “I cannot speak highly enough about the outstanding<br />
job that these (people) do,” said Rever. “I have employed the<br />
NRC on several occasions and their performance has been nothing<br />
less than outstanding — even amazing.”<br />
As part <strong>of</strong> the <strong>Navy</strong>’s Distance Support program the NRC can support<br />
remotely located fleet, Federal Government agencies and<br />
contract customers. The NRC works around-the-clock across traditional<br />
organizational boundaries providing coordinated solutions<br />
to Naval aviation-related questions. For more information<br />
about the NAVAIR Response Center, authorized users can go to<br />
http://nrc.navair.navy.mil.<br />
NAVAIR provides seamless,integrated,advanced warfare technology<br />
through the efforts <strong>of</strong> a worldwide network <strong>of</strong> aviation technology<br />
experts. Services include: pr<strong>of</strong>essional training; carrier<br />
launch and recovery; sensor data and precision targeting; realtime<br />
communications; aircraft and weapons development; and<br />
successful deployment and sustainment. NAVAIR provides matchless<br />
combat capabilities to the warfighter. For more information<br />
about NAVAIR, go to www.navair.navy.mil.<br />
CHIPS Winter 2003 33
CAP Launches<br />
New Web Site!<br />
The <strong>Department</strong> <strong>of</strong> Defense (DoD)<br />
Computer/Electronic Accommodations<br />
Program (CAP) announced the activation<br />
<strong>of</strong> a new, user-friendly Web site, which<br />
provides information on assistive<br />
technology accommodations and related<br />
services for persons with disabilities<br />
within the DoD and other Federal<br />
agencies. The Web site,<br />
www.tricare.osd.mil/cap, showcases<br />
how individuals with disabilities may use<br />
accessible online tools to find information<br />
and accommodations to enhance<br />
job performance.<br />
“When users log on to the CAP Web site,<br />
they will see a new and improved layout<br />
designed to be more accommodating to<br />
our users,” said Dinah Cohen, CAP<br />
Director. “The CAP team worked to<br />
develop a site that allows customers,<br />
people with disabilities, and Federal<br />
managers to customize their personal<br />
search for program and contact information,”she<br />
added.<br />
The site features more resources —<br />
including an enhanced online accommodation<br />
process, a better assistive technology<br />
section, and an improved virtual CAP<br />
Technical Center (CAPTEC) tour — to<br />
assist individuals in selecting the most<br />
appropriate and reasonable accommodations.<br />
The Defense <strong>Department</strong><br />
established CAP in 1990 to eliminate<br />
employment barriers for people with<br />
visual, hearing, dexterity and cognitive<br />
disabilities. Since its inception, CAP has<br />
funded and provided more than 30,000<br />
accommodation solutions for individuals<br />
with visual, hearing, dexterity, and<br />
cognitive disabilities within DoD and<br />
about 50 other Federal agencies.<br />
CAP SERVICES<br />
CAP is the Federal Government’s centrally-funded<br />
accommodations program.<br />
Much <strong>of</strong> CAP’s success lies in its ability to<br />
provide reasonable accommodations to<br />
employees quickly, easily, and in a cost<br />
efficient manner. CAP can assist your<br />
organization by: Purchasing assistive<br />
technology and services; Conducting<br />
needs assessments;<br />
Assisting in technology<br />
integration; Assistive<br />
technology training;<br />
Assisting in accommodations<br />
for work-related<br />
injuries; Supporting<br />
Telework participants<br />
with disabilities; and<br />
Conducting presentations<br />
on CAP services<br />
and other accessibility issues.<br />
THE TECHNOLOGY<br />
CAP pays for a wide variety <strong>of</strong> assistive<br />
technology, devices, and services for<br />
people with disabilities, CAP also provides<br />
training on the technology and<br />
purchases s<strong>of</strong>tware upgrades. Frequently<br />
requested accommodations<br />
include:<br />
•Blind/Low Vision: Magnification systems,<br />
speech and Braille output systems,<br />
scanner/reader systems, Braille embossers,<br />
Closed Circuit Televisions (CCTVs),<br />
and Braille notetakers.<br />
•Deaf/Hard <strong>of</strong> Hearing: Teletypewriters<br />
(TTYs), PC-TTY modems, telephone<br />
amplifiers, assistive listening systems, and<br />
visual signaling devices.<br />
•Dexterity Disabilities: Alternative<br />
keyboards, alternative input devices,<br />
word prediction s<strong>of</strong>tware, speech<br />
recognition systems, pointing devices,<br />
hands-free computer interface systems<br />
and keyguards.<br />
•Cognitive/Learning Disabilities: Talking<br />
dictionaries and scanner/reader systems.<br />
•Communication Disabilities: Electronic<br />
communication aids and speech output<br />
systems to augment communication.<br />
TECHNOLOGY EVALUATION CENTER<br />
The CAP Technology Evaluation Center<br />
(CAPTEC) is a facility dedicated to the<br />
evaluation and demonstration <strong>of</strong><br />
assistive technology. It was established<br />
to assist employees and supervisors in<br />
choosing appropriate assistive technology<br />
to create work environments that<br />
are accessible to persons with disabilities.<br />
CAPTEC also hosts open houses designed<br />
to highlight particular advances<br />
in assistive technology.<br />
The CAP Staff conducts needs assessments<br />
to help identify the most appropriate<br />
solution to meet individual<br />
requirements. CAPTEC consists <strong>of</strong><br />
computer workstations configured with a<br />
wide variety <strong>of</strong> assistive technology.<br />
People in the process <strong>of</strong> evaluating<br />
assistive technology who have questions<br />
about compatibility or functionality, or<br />
who need to compare several solutions,<br />
may visit CAPTEC to test and evaluate<br />
equipment.<br />
Since the release <strong>of</strong> the new Web site,<br />
activity has increased dramatically. Over<br />
400,000 hits were received in October<br />
2002 and CAP continues to experience<br />
daily activity increases.<br />
If you are interested in learning more<br />
about CAP services, disability accommodations,<br />
or other methods <strong>of</strong> impacting<br />
the recruitment, hiring, and retention <strong>of</strong><br />
people with disabilities within the<br />
Federal Government, please visit the new<br />
CAP Web site!<br />
All services are available by<br />
visiting CAPTEC, located in the<br />
Pentagon, Room 2A259, or by<br />
contacting CAPTEC at 703-693<br />
5160 (V) or 703-693-6189 (TTY).<br />
Regular hours <strong>of</strong> operation are<br />
Monday - Thursday from 9:00<br />
a.m. to 3:00 p.m. or by<br />
appointment. Services are also<br />
available online at<br />
www.tricare.osd.mil/cap<br />
34 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
A Brief History<br />
<strong>of</strong><br />
Personal Computing<br />
Part III<br />
By Retired Major Dale J. Long, USAF<br />
Welcome back to the third in a series <strong>of</strong> articles reviewing the<br />
history <strong>of</strong> personal computing. In the summer issue <strong>of</strong> CHIPS, we<br />
looked at the development <strong>of</strong> the modern personal computer.<br />
In the fall issue,we examined the evolution <strong>of</strong> personal computer<br />
(PC) operating systems and application s<strong>of</strong>tware. In this issue,<br />
we will look at the technologies that tie our PCs together through<br />
networking.<br />
We tend to think <strong>of</strong> digital networking as a relatively new concept,<br />
but the roots <strong>of</strong> modern networking extend back over 150<br />
years. Many years before Charles Babbage created what is considered<br />
the first computer,his“Differential Engine,”the telegraph<br />
ushered in the age <strong>of</strong> digital communications in 1844 when<br />
Samuel Morse sent a message 37 miles from Washington D.C. to<br />
Baltimore using his new invention. While the telegraph is a long<br />
way from today’s computer networks, it was arguably the single<br />
most significant event in human communication since the development<br />
<strong>of</strong> language. For the first time in human history, we<br />
had a reliable method <strong>of</strong> communicating in real-time beyond line<strong>of</strong>-sight.<br />
As long as you could connect two locations with wires,<br />
you could exchange information almost instantaneously without<br />
regard to distance. Much as modern data networks use 1s and 0s<br />
to encode and transfer information,Morse code was the language<br />
<strong>of</strong> the telegraph. Morse code is a binary-like system that uses<br />
dots and dashes in different combinations to represent letters<br />
and numbers. The big difference is, that while the telegraph operators<br />
<strong>of</strong> the mid-19th century could perhaps transmit four or<br />
five dots and dashes per second, computers now communicate<br />
at speeds <strong>of</strong> up to one billion 1s and 0s every second, which we<br />
refer to in digital shorthand as one gigabit or “1Gb.”<br />
Not long after Morse invented the telegraph,a Frenchman named<br />
Emile Baudot developed a typewriter-style telegraph machine<br />
that allowed users to key in their messages using the basic alphabet<br />
and print out received messages using automatic translators<br />
built into the machine. These early precursors to modern<br />
modems allowed virtually anyone to send and receive telegraph<br />
messages without having to understand the code used to transmit<br />
the message. However, Morse code did not lend itself well to<br />
automation due to the variable length <strong>of</strong> each character, so<br />
Baudot developed a more uniform code for his system. Baudot<br />
used a five-bit binary code to represent each character. As that<br />
only gave 32 possible characters (00000 to 11111 = 32), it wasn’t<br />
going to be enough to include all 26 letters and 10 digits. He<br />
solved this problem by adding two “shift characters” for figures<br />
and letters that performed in much the same way as a typewriter<br />
shift key. This gave him 62 combinations (not quite six-bit computing)<br />
for letters,figures and punctuation marks. Western Union,<br />
the most famous telegraph company in history, eventually replaced<br />
all <strong>of</strong> its Morse telegraph equipment with Baudot’s “teletypewriters.”<br />
In honor <strong>of</strong> Baudot’s pioneering contributions, the<br />
speed <strong>of</strong> serial communications is still measured today by measuring<br />
the“Baud rate.”<br />
However, despite being the dominant digital communications<br />
code for over a century, the Baudot five-bit code was not suited<br />
to 20th century computing. Computers, which were developed<br />
independently <strong>of</strong> the telegraph, needed the ability to discriminate<br />
between upper and lowercase letters. Baudot’s code only<br />
provided for uppercase letters. In response to the need for a new<br />
standard information exchange format,a group <strong>of</strong> American communications<br />
companies got together in the 1960s to devise a new<br />
code. Their new standard used seven bits that could represent<br />
128 characters. This new standard came to be known as the<br />
American Standard Code for <strong>Information</strong> Interchange (ASCII).<br />
ASCII was immediately accepted by virtually everyone in the communications<br />
world, with one notable exception: IBM. IBM decided<br />
to make its own standard,the Extended Binary Coded Decimal<br />
Interchange Code (EBCDIC). The IBM code used eight bits<br />
and could represent 256 characters. However, aside from IBM using<br />
it in their mid-range and mainframe computers,EBCDIC never<br />
really caught on. Once it became clear that IBM would not be<br />
able to force their proprietary standard on the rest <strong>of</strong> the world,<br />
they eventually adopted the ASCII code. However, as they still<br />
wanted the extra capabilities inherent in the 8-bit format, they<br />
“extended”ASCII by using an eighth bit so it could represent 256<br />
characters and called it “Extended ASCII.” Now that a common<br />
language for computer data had<br />
been invented,the stage was set for<br />
real computer networking to begin.<br />
Early Networking<br />
The origins <strong>of</strong> the Internet were distilled<br />
from the visions and work <strong>of</strong><br />
computer visionaries <strong>of</strong> the 1960s.<br />
Three <strong>of</strong> the most influential were<br />
the Massachusetts Institute <strong>of</strong> Technology<br />
(MIT) trio <strong>of</strong> J.C.R. Licklider,<br />
Leonard Kleinrock and Lawrence<br />
Roberts. Licklider first proposed a global network <strong>of</strong> computers<br />
in 1962. Later that year he moved to the Advanced Research<br />
Projects Agency (ARPA) to head the work to develop it. Kleinrock<br />
developed the theory <strong>of</strong> packet switching, which would form the<br />
basis <strong>of</strong> Internet connections. Roberts confirmed Kleinrock’s<br />
theory in 1965 when he connected a Massachusetts computer<br />
with a California computer over dial-up telephone lines. However,while<br />
this demonstrated the feasibility <strong>of</strong> wide area networking,<br />
it also showed that the circuit switching technology available<br />
through a standard telephone line was not sufficient to support<br />
any large-scale networking. Shortly after this project,in 1966,<br />
Roberts began work at ARPA and developed the plan for what<br />
eventually became ARPANET.<br />
CHIPS Winter 2003 35
Finding True Believers<br />
When ARPA sent out a request for<br />
proposals to build the initial network<br />
<strong>of</strong> four Interface Message<br />
Processors (IMPs), many <strong>of</strong> the<br />
large computer and telecommunications<br />
organizations did not<br />
bother responding, because they<br />
thought the task was impossible.<br />
Turning ARPA’s networking theory<br />
into reality fell to another group <strong>of</strong><br />
visionaries at a small company<br />
named BBN (Bolt, Beranek and Newman). We take much <strong>of</strong> the<br />
support activities that sustain the Internet for granted today, but<br />
BBN literally created most <strong>of</strong> them from scratch. They wrote code<br />
that would automatically reload crashed servers,pull packets into<br />
the machine, figure out how to route them, and send them on<br />
their way. They also developed a routing scheme that would automatically<br />
route data packets around troubled links in the network<br />
and update itself several times per second. BBN had to<br />
handle some stiff challenges, not the least <strong>of</strong> which was dealing<br />
with the timing and error-control problems associated with sending<br />
data over telephone lines. This was pretty cosmic stuff in an<br />
era where most engineers still carried a slide rule and the microprocessors<br />
that power modern CPUs had not been invented yet.<br />
The key to the design <strong>of</strong> ARPANET was the construction <strong>of</strong> an<br />
autonomous subnet, independent <strong>of</strong> the operation <strong>of</strong> any host<br />
computer. An IMP can take on one <strong>of</strong> two distinct roles: Host or<br />
“store-and-forward.” In any host-to-host connection, the IMPs at<br />
the respective host sites are the source and destination IMPs for<br />
that connection, and the IMPs in the network path between the<br />
host sites comprise the store-and-forward sub-network. The IMPs<br />
<strong>of</strong> the sub-network received packets, performed error control,<br />
determined the route and forwarded them to the next IMP in the<br />
network path. In addition to these tasks, the source IMP and destination<br />
IMP were responsible for end-to-end connection management<br />
and message processing procedures for the duration<br />
<strong>of</strong> the connection. These procedures included flow control, storage<br />
allocation, and message fragmentation and reassembly.<br />
There were many factors that affected the development <strong>of</strong> message<br />
processing requirements. First, there was some likelihood<br />
<strong>of</strong> delay in acknowledging packets due to finite bandwidth or<br />
differing bandwidth at the source or destination. This would result<br />
in packets arriving out <strong>of</strong> order, becoming duplicated if they<br />
weren’t acknowledged by the receiving host in time, or becoming<br />
just plain lost. Also, IMPs only had a limited amount <strong>of</strong> storage<br />
space, so they needed to pass packets on as quickly as possible.<br />
After spending months customizing s<strong>of</strong>tware and systems,<br />
BBN eventually got the first two IMPs set up at the University <strong>of</strong><br />
California at Los Angeles and Stanford. ARPANET was born on<br />
October 1, 1969, when the first characters were transmitted over<br />
the new network. The network quietly expanded to 13 sites by<br />
January 1971 and 23 by April 1972.<br />
Outside <strong>of</strong> BBN and a small group <strong>of</strong> researchers, ARPA, the network<br />
that would transform the world was virtually unknown until<br />
the International Conference on Computer Communication in<br />
Washington,D.C.,October 1972. The ARPANET was the only demonstration<br />
at the conference and conclusively proved the feasibility<br />
<strong>of</strong> packet switching networks. Though most <strong>of</strong> the world<br />
still did not know it,we had taken our<br />
first steps toward wiring the world for<br />
data.<br />
Ethernet<br />
The next big development in networking<br />
after ARPANET and packet<br />
switching was Ethernet, which is still<br />
the dominant network technology<br />
today. The roots <strong>of</strong> the modern<br />
Ethernet were planted in a 1973<br />
Xerox Corporation patent memo that<br />
described a new protocol for multiple computers communicating<br />
over a single cable. Originally intended to help design internal<br />
computer-to-computer communications within Xerox copiers<br />
and duplicators, Ethernet eventually became a global standard<br />
for interconnecting computers on local area networks.<br />
Ethernet was developed by Xerox at their Palo Alto Research Center<br />
(PARC) in California. In 1979, Digital Equipment Corporation<br />
and Intel joined forces with Xerox to standardize the Ethernet system.<br />
The first specification by the three companies, called the<br />
“Ethernet Blue Book” was released in 1980. Ethernet was originally<br />
a 10 megabit per second system (10Mbps = 10 million 1s<br />
and 0s per second). It used a large coaxial backbone cable running<br />
throughout the building, with smaller coax cables attached<br />
at short intervals (usually around six feet) to connect to the workstations.<br />
The large coax became known as “Thick Ethernet” or<br />
“10Base5.” The “10” refers to the speed, which in this case is<br />
10Mbps. “Base”means it is a base band system that uses all <strong>of</strong> its<br />
bandwidth for each transmission,as opposed to a broadband system<br />
that splits the bandwidth into separate channels to be used<br />
concurrently. The“5”refers to the systems maximum cable length,<br />
in this case 500 meters. In 1983, the Institute <strong>of</strong> Electrical and<br />
Electronic Engineers (IEEE) released the <strong>of</strong>ficial Ethernet standard,<br />
IEEE 802.3. This second version is commonly known as Thin<br />
Ethernet or 10Base2 (10Mbps, base band, 200 meters).<br />
In 1985, the Computer Communications Industry Association<br />
(CCIA) asked the Electronics Industries Association (EIA) to develop<br />
a cabling standard which would define a generic telecommunications<br />
wiring system for commercial buildings to support<br />
a multi-product, multi-vendor environment. This would be a cabling<br />
system that would run all current and future networking<br />
systems over a common topology using a common media and<br />
common connectors. By 1987 several manufacturers had developed<br />
Ethernet equipment that could utilize twisted-pair cable,<br />
and in 1990 the IEEE released the 802.3I Ethernet standard<br />
10BaseT ( T refers to twisted-pair cable). In 1991 the EIA together<br />
with the Telecommunications Industry Association (TIA) published<br />
a standard for telecommunications cabling (EIA/TIA 568).<br />
It was based on Cat[egory] 3 Unshielded Twisted Pair cable (UTP),<br />
and was closely followed one month later by a Technical Systems<br />
Bulletin (TSB-36) which specified higher grades <strong>of</strong> UTP cable, Cat<br />
4 and Cat 5. Cat 4 specified data rates <strong>of</strong> up to 20MHz and Cat 5<br />
up to 100MHz, which at the time seemed like a lot <strong>of</strong> bandwidth.<br />
However,as George Carlin observed,“stuff accumulates to fill available<br />
space.” Given the exponential growth <strong>of</strong> networking tech<br />
36 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
nology, even Cat 5 is being pushed to its limits. The current state<br />
<strong>of</strong> the art is Cat 6, and Cat 7 is waiting in the wings.<br />
Despite being pronounced “about to be dead” several times in<br />
the last 15 years,Ethernet has successfully defended itself against<br />
all comers in the networking standards world, including LAN<br />
Token-Ring, Fiber Distributed Data Interface (FDDI) and<br />
Asynchronous Transfer Mode (ATM). You can tell who is winning<br />
simply by looking at the type <strong>of</strong> equipment people are buying.<br />
Network interface cards (NICs) and switches are generally<br />
replaced every two to three years. Since 1998, 90 percent <strong>of</strong> all<br />
NICs and switch ports shipped have been some flavor <strong>of</strong> Ethernet.<br />
Case closed, at least for now.<br />
There are two basic reasons Ethernet still rules. First, the invention<br />
and installation <strong>of</strong> fiber-optic cable,with its huge bandwidth<br />
potential,means you can use a“cheaper,dumber”technology like<br />
Ethernet as efficiently as“expensive, smart”technology like ATM.<br />
Without fiber optics, we would need all <strong>of</strong> the ATM horsepower<br />
to squeeze every last drop <strong>of</strong> data into the scarce bandwidth available<br />
on copper wire. With fiber, that bandwidth constraint has<br />
pretty much gone away. Also,Ethernet has been getting smarter<br />
in useful ways. Because Ethernet adapters can auto-sense<br />
10Mbps, 100Mbps and 1,000Mbps operations, it’s now possible<br />
to establish a tiered Ethernet network that supports all three<br />
speeds using the same standard. For example, a LAN may have a<br />
Gigabit Ethernet backbone and departmental servers that are<br />
connected by Fast Ethernet,and then connected to conventional<br />
10Mbps Ethernet switches and hubs that tie into desktops. Without<br />
that ability to automatically sense what speed your backbone<br />
is using, we might need to integrate three different network protocols<br />
to do the same thing Ethernet does on its own. There are<br />
other technologies and standards that I really wish we had time<br />
to review here, including FTP (file transfer protocol) and TCP/IP<br />
(Telecommunications Protocol/Internet Protocol,also developed<br />
at BBN). But the issue I’ve saved for last that incorporates both <strong>of</strong><br />
those issues is the Big Kahuna <strong>of</strong> networking — e-mail.<br />
You’ve Got Mail!<br />
Seventeen years ago, when I first<br />
started fooling around with computers,<br />
the only people who had e-mail<br />
were the few thousand hardy souls<br />
who had access to ARPANET or large<br />
private or corporate systems like General<br />
Electric. Everything was in plain<br />
text and files were exchanged via FTP<br />
over Unix-based systems. Think about<br />
this: the Internet, with its millions <strong>of</strong><br />
servers, and the World Wide Web, with its billions <strong>of</strong> pages, are all<br />
essentially the result <strong>of</strong> the human desire to communicate. I submit<br />
to the jury that e-mail, more so than any other single factor, is<br />
the application that is primarily responsible for the development<br />
<strong>of</strong> the modern Internet. Here is my case. E-mail first appeared in<br />
the 1960s when users on time-sharing systems wanted a way to<br />
leave messages for each other. These early e-mail systems were<br />
very simple. Mailboxes consisted <strong>of</strong> a text file, readable only by a<br />
single user, to which new messages were appended. There were<br />
no mail reader programs. Users had to scroll through the text file<br />
to the most current entries. If the reader didn’t edit out old material<br />
fairly frequently large mail files could become very long and<br />
hard to get through. These primordial e-mail systems were initially<br />
limited to the physical reach <strong>of</strong> the local system.<br />
ARPANET added“reach”to e-mail by connecting systems together.<br />
The first recorded case <strong>of</strong> e-mail traveling from one site to another<br />
occurred in 1972 when Ray Tomlinson, then an engineer at<br />
BBN,delivered an electronic message by copying it a across a network<br />
link connecting two DEC PDP-10s. Tomlinson,by the way, is<br />
also the person who decided to use the “@” symbol to separate<br />
the user from the host part <strong>of</strong> an e-mail address. E-mail caught<br />
on quickly. Less than a year later, 75 percent <strong>of</strong> the traffic on the<br />
ARPANET was e-mail. There were no protocols that specifically<br />
covered e-mail. Mail was sent via FTP, which had commands specific<br />
to mail transfer. Mail delivery and tracking information was<br />
included in the mail headers, but no defined mail header standards.<br />
Also, mail programs that disagreed over formats would<br />
<strong>of</strong>ten refuse to talk to one another. For example, Multics systems<br />
used the @ symbol as a“line kill”command.<br />
At the time <strong>of</strong> most <strong>of</strong> these events,TCP/IP, which eventually provided<br />
a standard exchange format for all networks, had not yet<br />
appeared on the scene. The ARPANET used Network Control Protocol<br />
(NCP) as its core network protocol,and was not able to communicate<br />
with any other packet network in existence at the time.<br />
Deliverance from the e-mail Tower <strong>of</strong> Babel first appeared in the<br />
form <strong>of</strong> “delivermail,” which was developed by Eric Allman and<br />
originally shipped with BSD (Berkeley S<strong>of</strong>tware Distribution) Unix<br />
versions 4.0 and 4.1 in 1979. Delivermail successfully handled e-<br />
mail using FTP over NCP and was soon incorporated into the<br />
ARPANET community. Delivermail eventually evolved into<br />
sendmail, which is arguably the most influential and important<br />
e-mail program developed to date.<br />
About the same time that e-mail was developing on ARPANET,<br />
Vint Cerf (Father <strong>of</strong> the World Wide Web) and Bob Kahn (from<br />
BBN) were working on a way to connect packet networks together.<br />
The results <strong>of</strong> their work would become the TCP/IP protocol,which<br />
defined standards for data exchange and communication between<br />
networks. ARPANET transitioned to TCP/IP in 1982, and<br />
the widespread implementation <strong>of</strong> TCP/IP paved the way for<br />
today’s standard for e-mail: Simple Mail Transfer Protocol (SMTP).<br />
In response to the development <strong>of</strong> SMTP, Allman evolved his<br />
delivermail program into sendmail, which extended the reach <strong>of</strong><br />
e-mail beyond the ARPANET system and allowed users to communicate<br />
between all the various private packet networks that<br />
would eventually form what we now know as the Internet. The<br />
drive to communicate, coupled with the development <strong>of</strong> a universal<br />
system <strong>of</strong> point-to-point communications embodied in e-<br />
mail, are what brought the Internet together.<br />
Billions, perhaps trillions <strong>of</strong> dollars have been spent over the last<br />
150 years devising faster, more robust ways to allow people to<br />
set lunch dates,ask“whassup,”send sales pitches,and — squabble.<br />
E-mail further evolved in the 1990s with the introduction <strong>of</strong> more<br />
feature-laden mail programs, including Lotus ccMail and Notes,<br />
Micros<strong>of</strong>t Outlook, and various other programs. But other than<br />
adding the ability to transmit richer types <strong>of</strong> information (including,<br />
unfortunately, potentially hostile payloads), they have basically<br />
just extended the functionality originally codified by<br />
sendmail and SMTP. The final evidence in support <strong>of</strong> my belief in<br />
CHIPS Winter 2003<br />
37
e-mail’s pivotal role in the development <strong>of</strong> modern networking<br />
is this: current estimates from people who watch Internet traffic<br />
patterns say that the Internet will pass over 36 billion e-mails this<br />
year. That comes out to 114 e-mails to roughly a second, every<br />
second <strong>of</strong> the year. And that figure will only grow as more areas<br />
<strong>of</strong> the world gain access.<br />
Closing Words<br />
There are various opinions on what it takes to build a network,<br />
but one that caught my eye recently was <strong>of</strong>fered by Van Macatee,<br />
an executive at Level 3 Communications,in the November 1,2002,<br />
issue <strong>of</strong> the Web magazine America’s Network: “Any schmuck can<br />
build a network.” I’m not sure how Macatee defines a schmuck,so<br />
I’ll <strong>of</strong>fer a definition: a network schmuck is someone who knows<br />
what the technology can do and how to plug it in and turn it on,<br />
but not how the technology works or what effect it will have on<br />
the people connected to it.<br />
The Internet,is only relatively simple today because <strong>of</strong> the efforts<br />
<strong>of</strong> the pioneers in the field who had the vision to see the future,<br />
the skills and will to make it happen, and the wisdom to cooperate<br />
to achieve common goals. The development <strong>of</strong> the hardware,<br />
s<strong>of</strong>tware,and transport protocols and technologies that make up<br />
modern networking are the products <strong>of</strong> many dedicated, intelligent,talented<br />
people whose efforts rival the building <strong>of</strong> the Pyramids<br />
and the Apollo space program as cooperative human endeavors.<br />
Schmucks did not build the Internet. Despite the probable<br />
difference in our salaries, I strongly disagree with Macatee’s<br />
assertion. Perhaps just about anyone can buy a network out <strong>of</strong> a<br />
box and just plug it in. But plugging in and turning on a network<br />
are not the same as building one.<br />
A modern parallel to the development <strong>of</strong> the Internet is the <strong>Navy</strong>’s<br />
NMCI project. The goal is similar: build a single extended network<br />
to serve the entire service in much the same way that the<br />
Internet now serves the world. The <strong>Navy</strong> has many <strong>of</strong> the same<br />
challenges in building the NMCI that faced the people who built<br />
the Internet: defining common standards, integrating technologies,<br />
and getting everyone to agree on the one right way to do<br />
certain things. The <strong>Navy</strong> is at a pivotal point. In building the NMCI<br />
you can,right now,shape the work environment <strong>of</strong> the entire <strong>Navy</strong><br />
for decades to come. Please remember,though,that simply building<br />
a big network that adheres to a single set <strong>of</strong> technical standards<br />
is not the goal. NMCI will ultimately be judged on how it<br />
supports the <strong>Navy</strong> as an organization. What the world has done<br />
with the Internet, I believe can be done with NMCI.<br />
That’s all for now. In the next issue, we will conclude this serial<br />
history <strong>of</strong> personal computing with a look at the development <strong>of</strong><br />
the World Wide Web and what it means to be part <strong>of</strong> today’s wired,<br />
interconnected world. Until then...<br />
Happy Networking!<br />
Long is a retired Air Force communications <strong>of</strong>ficer who has written<br />
for CHIPS since 1993. He holds a Master <strong>of</strong> Science degree in <strong>Information</strong><br />
Resource Management from the Air Force Institute <strong>of</strong> Technology.<br />
He is the Telecommunications Manager for the Eastern Region<br />
<strong>of</strong> the U.S. Immigration & Naturalization Service.<br />
Talking with Dinah Cohen<br />
Computer/Electronic Accommodations<br />
Program (CAP) Director<br />
CHIPS: Many people talk about the “digital divide” separating<br />
those with access to computers and the Internet to those<br />
who do not have access opportunities for financial reasons.<br />
But isn’t there another digital divide separating private<br />
citizens with disabilities from technology CAP does such a<br />
great job assisting DoD and Federal employees with disabilities<br />
to bridge the gap, but is there an agency to assist private<br />
citizens with disabilities who may be cut <strong>of</strong>f from technology<br />
Ms. Cohen: The digital divide falls into two categories. The<br />
first, people who have access to a computer, but cannot<br />
access the information. I hope and think that Section 508 is<br />
reducing this divide by working with industry and Federal<br />
Government to ensure that electronic and information<br />
technology is accessible and usable by people with disabilities.<br />
For assisting people in obtaining access to a computer, I<br />
am aware <strong>of</strong> some bold actions regarding universal design<br />
and assistive technology/computer access that are part <strong>of</strong><br />
President Bush’s New Freedom Initiative. You can see more<br />
on this issue at www. disabilityinfo.gov.<br />
Editor’s Note: The New Freedom Initiative was established to<br />
ensure that the more than 54 million Americans with<br />
disabilities learn and develop skills, find meaningful work,<br />
and realize the promises <strong>of</strong> the Americans with Disabilities<br />
Act. To achieve equality <strong>of</strong> opportunity, independent living,<br />
and economic self-sufficiency, this comprehensive plan<br />
promotes the full participation <strong>of</strong> people with disabilities in<br />
all aspects <strong>of</strong> American life. The Federal Web site,<br />
www.disabilityinfo.gov, provides resource information and<br />
links to agencies and programs designed to assist citizens<br />
with disabilities. Just a sampling <strong>of</strong> links follow. Comprehensive<br />
information about Federal job opportunities can be<br />
found at www.usajobs.opm.gov or call 1-478-757-3000/<br />
TDD 1-478-744-2299. A free service <strong>of</strong> the Office <strong>of</strong> Disability<br />
Employment Policy (ODEP) <strong>of</strong> the U.S. <strong>Department</strong> <strong>of</strong><br />
Labor, the Job Accommodation Network available at<br />
www.jan. wvu.edu or 1-800-526-7234 (V/TTY), provides<br />
information about job accommodations, the Americans with<br />
Disabilities Act (ADA), and the employability <strong>of</strong> people with<br />
disabilities. The RESNA Alternative Financing Technical<br />
Assistance Project (Agreement No. H224C000200) is funded<br />
by the National Institute on Disability and Rehabilitation<br />
Research (NIDRR) under Title III <strong>of</strong> the Assistive Technology<br />
Act <strong>of</strong> 1998. This Web site, www.resna.org/AFTAP/<br />
index.html, was developed with grant funds and is designed<br />
to assist individuals in receiving loans to ensure they can<br />
access assistive technology. The information on these pages<br />
does not necessarily reflect the position <strong>of</strong> NIDRR/U.S.<br />
<strong>Department</strong> <strong>of</strong> Education or RESNA, and no <strong>of</strong>ficial endorsement<br />
<strong>of</strong> the materials should be inferred.<br />
38 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
By Renee Hatcher<br />
The Naval Air Systems Command F-14<br />
Program Office (PMA-241) sent one <strong>of</strong><br />
its own to the front lines <strong>of</strong> the war in<br />
June 2002 to help improve the<br />
situational awareness <strong>of</strong> Army Green<br />
Berets on the ground. “The thrust <strong>of</strong><br />
PMA-241 has always been to provide<br />
service to the fleet,” said Capt. Peter<br />
Williams, F-14 Program manager. “We<br />
have been the ultimate technology<br />
provider for the F-14 community, but<br />
when we can go beyond that and<br />
help our brethren in the Army, it’s an<br />
exceptional thing.”<br />
Kevin Morse, PMA-241’s deputy<br />
assistant program manager for<br />
logistics, and two contractor support<br />
personnel spent about three weeks in<br />
Afghanistan establishing connectivity<br />
between Army Special Forces and<br />
<strong>Navy</strong> tactical aircraft for the exchange <strong>of</strong> imagery and intelligence.<br />
NAVAIR loaned the Army four Fast Tactical Imagery (FTI)<br />
laptops, a technology developed by PMA-241, that can retrieve<br />
and send information in near real-time.<br />
The need for such a capability was identified by an F-14 aviator<br />
from Carrier Air Group 7 who was on a one-month assignment<br />
with the intelligence center at the Army Air Base in Bagram. He<br />
saw that the Special Forces group in the Kabul area were not<br />
getting imagery intelligence as quickly as they needed. He<br />
recognized the challenge and knew who could meet it. The<br />
original request for support came to PMA-241 May 20, and the<br />
program <strong>of</strong>fice had the <strong>Navy</strong> and Army exchanging images by<br />
June 22.<br />
“This is just one example <strong>of</strong> NAVAIR using its advanced<br />
warfighting capabilities to solve the problems <strong>of</strong> modern<br />
warfare,”Williams said. “Working hand-in-hand with the Army<br />
against al Qaeda forces, PMA-241 demonstrated the value <strong>of</strong><br />
Kevin Morse, third from left, PMA-241’s deputy assistant<br />
program manager for logistics, joins U.S. Army Special<br />
Forces and Afghanistan coalition force members in<br />
Kabul. Morse went to Afghanistan in June to establish<br />
connectivity between Army Special Forces and <strong>Navy</strong><br />
tactical aircraft.<br />
Kevin Morse, PMA-241’s deputy assistant program manager for<br />
logistics, gave his first briefing on Fast Tactical Imagery to the<br />
Green Berets in a bombed-out building similar to those shown<br />
here in Afghanistan. The wall was painted white and window<br />
openings were covered with boards to block the light so the<br />
presentation could be seen clearly.<br />
network centric warfare capability<br />
in a real-time theater <strong>of</strong> operations.”<br />
Morse left for Afghanistan on June<br />
12. He located the equipment,<br />
made the necessary connections,<br />
and trained the Army Green Berets<br />
on how to use FTI laptops to<br />
communicate with <strong>Navy</strong> F-14<br />
squadrons VF-143 and VF-11. “The<br />
special forces were not getting any<br />
near real-time imagery from tactical<br />
aircraft in the theater <strong>of</strong> operations,”<br />
Morse said. “FTI enabled the<br />
F-14 crews to transmit images to<br />
ground troops within two minutes.”<br />
This is a two-way communication<br />
system that lets ground troops<br />
send images back to the Tomcats.<br />
This capability is also compatible<br />
with the Army’s AH-64 Apache<br />
helicopter and FTI is expected to be used on the F/A-18E/F<br />
Super Hornet. “The Tomcat is mature, but it’s still leading the<br />
way with new technology and it’s setting the stage for the<br />
Super Hornet,”Williams said. “We are helping to establish<br />
requirements in the spiral development <strong>of</strong> the Super Hornet.”<br />
FTI was first used during operation Southern Watch in 1999. It<br />
allowed aircraft to launch from a carrier without a predetermined<br />
target, acquire a target, transmit imagery back to the<br />
ship and get permission to strike during flight. “This capability<br />
represents the highest standard in warfare technology,”<br />
Williams said. “Our mission is to enable absolute combat power<br />
through technologies that deliver matchless capabilities.”<br />
Meeting these high standards and delivering superior technology<br />
is no small feat, but doing it in a third world country during<br />
a war presents unique challenges. A former Army Ranger,<br />
Morse is no stranger to hazardous and primitive conditions, but<br />
what he experienced in Afghanistan was unlike anything he<br />
had ever seen. He spent three weeks living in a tent with camel<br />
CHIPS Winter 2003 39
NASA Tests New Helmet<br />
Developed at NAVAIR<br />
Kevin Morse, PMA-241’s deputy assistant<br />
program manager for logistics, and two<br />
contractor support personnel spent about<br />
three weeks in Afghanistan staying in tents<br />
like these at the Army Air Base in Bagram.<br />
spiders the size <strong>of</strong> a hand in temperatures<br />
exceeding 106 degrees at 5,000<br />
feet — where dust storms were a part <strong>of</strong><br />
daily life. A harsh climate, however, was<br />
not the only challenge Morse faced. It<br />
took more than a week to locate the<br />
equipment after it arrived in Afghanistan<br />
and European electrical connectivity<br />
presented other problems.<br />
Morse overcame these obstacles and<br />
gave his first briefing on FTI to the Green<br />
Berets in a bombed-out building in<br />
Bagram. He used a projector to show the<br />
presentation on a wall the team painted<br />
white so that the slides could be seen.<br />
Windows were covered with boards to<br />
block the light.<br />
“It was a really bad place to be with<br />
a lot <strong>of</strong> people going through a lot<br />
<strong>of</strong> hardships,” Morse said. “But, it<br />
was very rewarding to know I was<br />
doing something in support <strong>of</strong> the<br />
war against terrorism.”<br />
“It was a really bad place to be with a lot<br />
<strong>of</strong> people going through a lot <strong>of</strong> hardships,”<br />
Morse said. “But, it was very<br />
rewarding to know I was doing something<br />
in support <strong>of</strong> the war against<br />
terrorism.” The Army will continue to use<br />
<strong>Navy</strong> assets to collect imagery. While<br />
Morse was in Afghanistan, PMA-241 sent<br />
contractor support personnel from<br />
Signal Corporation to Fort Bragg to<br />
provide FTI training for another Army<br />
division preparing to leave for Afghanistan.<br />
“The special forces were very grateful for<br />
the help we provided in performing their<br />
mission,” Morse said. “There was no<br />
separation between <strong>Navy</strong> and Army —<br />
we were just Americans working together.”<br />
A pilot at NASA’s Dryden Flight Research<br />
Center in Edwards, Calif., prepares for a<br />
flight test in an F/A-18 Hornet with the new<br />
two-part helmet concept developed by<br />
NAVAIR engineers in the Crew Systems<br />
Research and Engineering Competency<br />
Program. Photo courtesy <strong>of</strong> NASA.<br />
By Renee Hatcher<br />
Engineers from NAVAIR’s Crew Systems Research and Engineering Competency Program<br />
(AIR-4.6), have developed a new helmet concept that they expect will enhance<br />
the stability and reliability <strong>of</strong> helmet mounted devices, ultimately improving the accuracy<br />
<strong>of</strong> information available to the aircrew on <strong>Navy</strong> and Marine Corps aircraft.<br />
In July, pilots began wearing the modular, two-part helmet prototype during limited<br />
flight testing in an F/A-18 Hornet at NASA’s Dryden Flight Research Center in Edwards,<br />
Calif. The helmet will be fully flight-qualified by the <strong>Navy</strong> before it can be transitioned<br />
to the warfighter through NAVAIR’s Aircrew Systems Program Office (PMA-202). Continually<br />
evolving operational requirements for the <strong>Navy</strong> and Marine Corps call for a<br />
variety <strong>of</strong> helmet-mounted devices. These technologies <strong>of</strong>ten pose significant challenges<br />
in terms <strong>of</strong> aircrew systems safety,<br />
comfort and acceptability. Dr. James<br />
Sheehy is leading NAVAIR’s Aircrew Systems<br />
Science and Technology Program<br />
effort to provide a stable platform to support<br />
the expanded range <strong>of</strong> helmetmounted<br />
devices. The two-part helmet<br />
concept, originated by the Gentex Corp.,<br />
was adopted and further developed by<br />
the <strong>Navy</strong> to meet the specific requirements<br />
<strong>of</strong> the warfighter. “It is lightweight,<br />
comfortable and stable,” Sheehy said.<br />
“The helmet is easily adaptable to outer<br />
mission modules including the basic tactical<br />
outer helmet assembly recently<br />
flown in the F/A-18.”<br />
An F/A-18C Hornet assigned to Strike Force<br />
Squadron Two Five (VFA-25)— the“ Fist <strong>of</strong> the<br />
Fleet.” U.S. <strong>Navy</strong> photo by PHA Philip A.<br />
McDaniel.<br />
Advanced materials, new suspension techniques, and precision fitting enable the twopart<br />
helmet to outperform current helmet technology. The inner helmet assembly is<br />
“eye-referenced”which means it is individually fit to each pilot to ensure that his or her<br />
eye is always in the proper location for the outer modules. The outer helmet is a shell<br />
that can be tailor-made to fit various missions and can range from a plain helmet for<br />
impact protection to a high resolution helmet mounted display. The ability to split the<br />
protection between the inner and outer modules allows the helmet to cross platforms<br />
between rotary and fixed wing aircraft.<br />
“Providing the required tactical capability while preserving and advancing aircrew<br />
safety and protection is an extremely important objective,” Sheehy said. “As the ultimate<br />
technology provider to the warfighter, our mission is to enable absolute combat<br />
power through technologies that deliver matchless capabilities.”<br />
40 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
Using Technology to Provide Better<br />
Support for the Federal Workforce<br />
By Sandra J. Smith<br />
The world <strong>of</strong> e-Government is full <strong>of</strong><br />
exciting possibilities for how the U.S.<br />
Government can improve its interactions<br />
with its citizens. Concepts like one-stop shopping, online town<br />
hall meetings for direct contact with <strong>of</strong>ficials, or “OurTown.Gov”<br />
(which helps local leaders to coordinate community services) give<br />
new meaning to the phrase“<strong>of</strong> the people, by the people, and for<br />
the people.” In the future, it seems almost inevitable that citizens<br />
and businesses will conduct more and more government interactions<br />
online. The transformations resulting from e-Government<br />
will continue to impact every facet <strong>of</strong> our lives, especially those<br />
<strong>of</strong> government employees. Training,recruitment,clearances,payroll,<br />
enterprise human resource system integration, and career<br />
planning are areas that are changing to provide better service<br />
and resources to government employees.<br />
The nearly ubiquitous nature <strong>of</strong> the Internet affords a tremendous<br />
opportunity for agencies and communities alike to leverage<br />
and transform their operational procedures and processes.<br />
One such community benefiting from the Internet is the Federal<br />
Human Resources (HR) Community. As the Internet and Webbased<br />
services continue to marshal efficiencies and improve organizational<br />
processes, government employees will become the<br />
beneficiaries <strong>of</strong> the transformational power <strong>of</strong> e-Government.<br />
The mandate <strong>of</strong> the President’s Management Agenda to strategically<br />
manage human capital has helped to serve as a catalyst<br />
for the HR Community to examine how they conduct business<br />
and highlights them as a model for other agencies as they pave<br />
inroads into e-Government. A few key HR-related e-Government<br />
initiatives (shown in Figure 1) being led by the Office <strong>of</strong> Personnel<br />
Management (OPM) currently underway are:<br />
e-Training<br />
The Government Online Learning Center or, GoLearn is a Government-wide<br />
resource that supports developmental opportunities<br />
<strong>of</strong> the Federal workforce through simplified and one-stop<br />
access to high quality e-Training products and services. The creation<br />
<strong>of</strong> this center is the first phase <strong>of</strong> the President’s Management<br />
Agenda e-Training Initiative and will continue to grow with<br />
the addition <strong>of</strong> products and services that meet the common<br />
needs <strong>of</strong> the workforce,including a competency-based individual<br />
career planning tool called the <strong>Information</strong> Technology (IT)<br />
Roadmap. The IT Roadmap will be a valuable tool for IT pr<strong>of</strong>essionals<br />
and their managers to identify the right skills for optimal<br />
job performance and at the same time target pr<strong>of</strong>essional development<br />
needed to obtain those skills. This site is designed as a<br />
virtual campus that houses free training courses and knowledge<br />
resources in each <strong>of</strong> its rooms. You can explore the center and all<br />
that GoLearn has to <strong>of</strong>fer by going to www.golearn.gov.<br />
e-Clearance<br />
Security has taken on a greater significance since 9-11;now more<br />
than ever information security is crucial. The e-Clearance initia-<br />
tive will improve the processing <strong>of</strong> investigations for personnel<br />
who must have security clearances. The elimination <strong>of</strong> paperbased<br />
security applications will permit sharing <strong>of</strong> clearance information<br />
among other agencies, and accelerate the clearance<br />
process. The OPM e-Clearance project team expects the e-Government<br />
initiative to meet its next milestone early.<br />
Office <strong>of</strong> Management and Budget (OMB) Director, Mitchell E.<br />
Daniels Jr., recently sent a memo to agencies requiring them to<br />
automate their security clearance systems and transfer employee<br />
files to OPM’s Security/Suitability Investigations Index (SII) by Jan.<br />
3, 2003. The memo is the latest in a recent series <strong>of</strong> letters invoking<br />
OMB’s authorities under the Clinger-Cohen Act to prompt<br />
agencies to work together on e-Government initiatives.<br />
Recruitment One-Stop<br />
A significant challenge for government agencies is the difficulty<br />
in attracting and retaining skilled IT pr<strong>of</strong>essionals. Despite the<br />
recent economic downturn, the private sector demand for IT<br />
workers — fueled by the Internet“gold rush”— continues to grow<br />
at a rate faster than the supply <strong>of</strong> newly educated IT pr<strong>of</strong>essionals.<br />
In an attempt to simplify the government recruiting process<br />
and provide a one-stop approach to federal employment applications<br />
and job postings,OPM conducted a virtual IT fair for individuals<br />
interested in working in the Federal Government. The job<br />
fair was intended for positions in the GS-2210 IT Management<br />
Specialist series at the GS-7 through 13 grade levels. Approximately<br />
20 Federal agencies participated in this first <strong>of</strong> its kind<br />
event which was held in April 2002. The entire application and<br />
assessment process was administered via the Internet at<br />
www.usajobs.opm.gov.<br />
EHRI<br />
The goals <strong>of</strong> the e-Government Enterprise Human Resources Initiative<br />
(EHRI) are to provide timely and accurate access to human<br />
resources data and deliver accurate, current data on all Federal<br />
employees — active and separated. EHRI will eliminate the need<br />
for a paper employee record through the creation <strong>of</strong> an electronic<br />
Official Personnel Folder that will eliminate more than 100 multiple<br />
forms that are currently maintained for a minimum <strong>of</strong> 65<br />
years after employee separation. This initiative will enable the<br />
management <strong>of</strong> reporting benefits and electronic transfer <strong>of</strong> HR<br />
data throughout a Federal employee’s career life cycle. These enhancements<br />
will fundamentally change the way in which employees,managers,<br />
and HR <strong>of</strong>ficers retrieve and use Official Personnel<br />
Folder data for transaction processing, workforce reporting and<br />
analysis. The <strong>Department</strong> <strong>of</strong> Defense has funded the Modern Defense<br />
Civilian Personnel Data System (DCPDS) to achieve the<br />
majority <strong>of</strong> the EHRI goals, and will eventually be funded to develop<br />
an interface with the EHRI.<br />
The Modern DCPDS currently supports multiple HR applications<br />
and is designed to replace a number <strong>of</strong> information systems used<br />
today, throughout the <strong>Department</strong>, to manage civilian human<br />
CHIPS Winter 2003 41
Recruitment, Employment and Retirement Initiatives<br />
Application<br />
Recruitment<br />
One-Stop<br />
Clearance<br />
<strong>Information</strong><br />
Recruitment<br />
Hire<br />
E-Clearance<br />
Agency HR<br />
Systems<br />
Employee<br />
Transfer<br />
Employee<br />
Transfer<br />
Data<br />
Initial OPF<br />
Data<br />
Employee Investigation<br />
EHRI<br />
Training<br />
History<br />
E-Training<br />
Employment<br />
Figure 1.<br />
Payroll<br />
Data<br />
OPF<br />
E-Payroll<br />
OPF<br />
Employee<br />
Development<br />
Pay<br />
Retire<br />
Rehire<br />
Course Catalog<br />
tion <strong>of</strong> pr<strong>of</strong>essional development opportu<br />
nities. Pr<strong>of</strong>essional development opportunities<br />
will come from a compendium <strong>of</strong> federal training sources<br />
that are directly linked to one or more specific competencies. The<br />
IT Roadmap will provide an integrated approach toward training<br />
and career development,identify competencies required for successful<br />
job performance, and be flexible enough to support a variety<br />
<strong>of</strong> IT career development planning strategies and<br />
customization. The tool will include feedback from employees<br />
on courses and provide a source <strong>of</strong> aggregate statistics for agency<br />
planning. The prototype <strong>of</strong> the tool was released early December<br />
2002 and initial operational capability is projected by spring<br />
2003.<br />
resources. The Modern DCPDS will move the <strong>Department</strong> away<br />
from multiple systems to a single information system for civilian<br />
employees.<br />
e-Payroll<br />
OPM has established a Standardization Action Team, with <strong>of</strong>ficials<br />
from various <strong>Department</strong>s. The team’s goal is to provide<br />
simple, easy-to-use, cost-effective, standardized, integrated HR/<br />
Payroll services to support the mission and employees <strong>of</strong> the Federal<br />
Government. The team developed a modernization plan using<br />
agency and industry best practices to identify data fields<br />
needed for payroll processing. The group also is identifying the<br />
methods for making changes, whether legislatively or through<br />
the regulatory process.<br />
The Federal IT Roadmap<br />
Recognizing the criticality <strong>of</strong> a skilled IT workforce, the Federal<br />
<strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong> Council (CIOC) engaged OPM in the development<br />
<strong>of</strong> the <strong>Information</strong> Technology Group, GS-2200. Under<br />
this standard, the GS-2210, <strong>Information</strong> Technology Management<br />
Specialist series with 10 parenthetical titles was developed.<br />
As a follow-on thrust, the Federal CIOC, Workforce and Human<br />
Capital for IT Committee, sponsored the IT Roadmap initiative as<br />
a means to engage and provide a developmental resource for<br />
the Federal IT Workforce. The IT Roadmap Team spent several<br />
months exploring best practices within private and public sector<br />
products and recommended a way ahead in developing such a<br />
tool. After extensive review, the Roadmap Team recommended<br />
adopting the <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> <strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong><br />
(DON CIO) Career Planning Tool as a best practice.<br />
The Committee adopted the recommendation and launched an<br />
effort to develop the IT Roadmap — a Federal career planning<br />
tool for current and prospective Federal IT employees. The tool is<br />
a Web-enabled, database-driven career planning tool that outlines<br />
general and technical competencies relevant to the various<br />
parenthetical titles (Policy & Planning; <strong>Information</strong> Security; Systems<br />
Analysis;Application S<strong>of</strong>tware;Operating Systems;Network<br />
Retirement<br />
System<br />
Modernization<br />
IT Roadmap<br />
Career Planning<br />
Retirement<br />
Services; Data Management; Internet; Systems<br />
Administration; and Customer Support)<br />
associated with the GS-2210, IT Management<br />
Specialist Series.<br />
The GS-2210 series is designed to cover all<br />
positions currently assigned to the Computer<br />
Specialist Series, GS-334, as well as<br />
positions classified in other series (e.g., the<br />
Telecommunications Series,GS-391,and the<br />
Miscellaneous Administrative and Program<br />
Series,GS-301),where IT knowledge is paramount.<br />
The tool will assist individuals in<br />
performing self-assessment <strong>of</strong> their pr<strong>of</strong>iciency<br />
in those competencies. Based on<br />
identified pr<strong>of</strong>iciency gaps,the IT Roadmap<br />
will assist users in developing career-long<br />
training and development plans to achieve<br />
their career goals. The career development<br />
plan will be derived from the user’s self-assessment<br />
<strong>of</strong> competencies and the selec<br />
A Winning Proposition<br />
An exciting future awaits the workforce <strong>of</strong> the future. Not only<br />
will systems and procedures be greatly enhanced by technology<br />
but the people who manage and implement those systems and<br />
procedures will be better equipped and more competent to do<br />
their jobs. President Bush has said that he will expand the use <strong>of</strong><br />
the Internet to empower citizens by allowing them to request<br />
customized information from Washington when they need it,not<br />
just when Washington wants to give it to them. The President<br />
believes true reform involves not just giving people information,<br />
but giving citizens the freedom to act upon it. The DON CIO supports<br />
e-Government initiatives and believes they are winning<br />
propositions for using technology to gain efficiencies and provide<br />
better support for the DON and Federal Workforce <strong>of</strong> the<br />
future.<br />
To learn more about e-Government go to:<br />
www.gcn.com/egovernment<br />
www.golearn.gov<br />
www.egov.gov<br />
www. senate.gov<br />
Sandra J. Smith is the DON CIO Competency Management Team<br />
Leader.<br />
42 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
Security Made Easy<br />
with the NMCI, PKI, and the CAC<br />
By Josephine Smidt with Rebecca Nielsen<br />
You have heard <strong>of</strong> the <strong>Navy</strong> Marine Corps<br />
Intranet (NMCI), the <strong>Department</strong> <strong>of</strong> Defense<br />
(DoD) Public Key Infrastructure (PKI),<br />
and the Common Access Card (CAC). You<br />
may even have heard about Public Key Enabled<br />
(PKE) applications. Here at the <strong>Department</strong><br />
<strong>of</strong> the <strong>Navy</strong> <strong>Chief</strong> <strong>Information</strong><br />
<strong>Officer</strong> (DON CIO), these aren’t abstract<br />
concepts. They are woven into daily workplace<br />
activities,ensuring that DoD Defense<br />
in Depth information assurance requirements<br />
are met. One <strong>of</strong> the benefits <strong>of</strong> working<br />
in my <strong>of</strong>fice is that we test the technology<br />
that will be deployed to the DON community.<br />
This is both good and bad: we use<br />
all the cool, new technology, but we have<br />
to work out the bugs prior to deployment.<br />
I’ll explain how implementation <strong>of</strong> the new<br />
PKI technology has helped me do my job<br />
better as a member <strong>of</strong> the <strong>Information</strong> Assurance<br />
Team at DON CIO. The PKI provides<br />
digital certificates to subscribers — people<br />
and computer systems. Digital certificates<br />
and their associated keys are credentials,<br />
similar to photo identification. Unlike a<br />
photo ID, however, digital certificates can<br />
also be used for electronic signatures and<br />
encryption — assuring secure communications<br />
between users. By itself,PKI doesn’t<br />
do anything. However,the security services<br />
that PKI provides: authentication, data integrity,<br />
confidentiality, and non-repudiation<br />
(described in the text box above),<br />
transform time-consuming,insecure paper<br />
processes into streamlined, secure electronic<br />
systems. Applications like e-mail and<br />
the Defense Travel System (DTS), that are<br />
programmed to use digital certificates are<br />
PK Enabled.<br />
Like any credential, my digital certificates<br />
are only useful if I have them when I need<br />
them. So, I carry them with me on my CAC.<br />
The CAC contains a small chip (almost as<br />
powerful as the first personal computers)<br />
that not only contains my certificates and<br />
associated keys, but also the processing<br />
power to use the keys and to protect them<br />
The National <strong>Information</strong> Systems Security<br />
(Infosec) Glossary defines the following five<br />
security services. PKI provides all but<br />
authorization.<br />
•Authentication: Establish the validity <strong>of</strong> a<br />
transmission, message or originator.<br />
•Authorization: Access privileges granted to<br />
a user, program or process.<br />
•Confidentiality: Assurance that information<br />
is not disclosed to unauthorized persons,<br />
processes or devices.<br />
•Data Integrity: Data is unchanged from its<br />
source and has not been accidentally or<br />
maliciously modified, altered, or destroyed.<br />
•Non-Repudiation: Assurance the sender <strong>of</strong><br />
data is provided with pro<strong>of</strong> <strong>of</strong> delivery and the<br />
recipient is provided with pro<strong>of</strong> <strong>of</strong> the sender’s<br />
identity, so neither can later deny having<br />
processed the data.<br />
from unauthorized disclosure. The CAC<br />
also has other technologies, including a<br />
photo (for visual identification),a magnetic<br />
stripe and a bar code. Since all <strong>of</strong> these are<br />
on the same card, I will soon only have to<br />
carry one card and remember one password<br />
— the one that tells the computer<br />
chip that I am the authorized user. There is<br />
an icon at the bottom <strong>of</strong> my screen that<br />
changes color when my CAC is being used<br />
to verify or authorize something. This is<br />
especially helpful, when your workstation<br />
seems to take longer than usual to do<br />
something, as the verification process<br />
sometimes takes a couple <strong>of</strong> seconds.<br />
I use my CAC and PKI on a daily basis. My<br />
<strong>of</strong>fice has recently been designated as classified,<br />
and as a result, we decided to test<br />
how easily the CAC can work with biometrics<br />
to enter the secure area. When I arrive<br />
in the morning, I swipe my CAC and put<br />
my thumb on the reader and the door<br />
opens. Right next to the reader that we<br />
currently use is one that we will be using<br />
in the not-too-distant future. This reader<br />
doesn’t require swiping,but reads my CAC<br />
from the chain around my neck as I press<br />
my finger. How cool is that<br />
Our <strong>of</strong>fice has not switched over to NMCI<br />
yet,but we have been using the CAC to log<br />
on to the network — the CAC contains our<br />
userid and password. Some personnel use<br />
PKI to log on by inserting the CAC into a<br />
card reader located on the side <strong>of</strong> their<br />
laptop and typing in the CAC Personal<br />
Identification Number (PIN). The chip on<br />
the card communicates with PKE Micros<strong>of</strong>t<br />
Windows 2000 to authenticate the identity<br />
certificate. Since the PIN is useless without<br />
the card, they don’t even have to<br />
change it every 90 days. We will all be using<br />
this method when we switch over to<br />
NMCI.<br />
I digitally sign each e-mail I send so that<br />
the recipient will know that the e-mail<br />
came from me, and that the contents have<br />
not changed since I sent it. The NMCI workstation<br />
comes with both Outlook and the<br />
middleware needed for Outlook to work<br />
with the CAC. All I have to know is the PIN.<br />
Someone who wants to send me an encrypted<br />
e-mail, either can retrieve my e-<br />
mail encryption certificate from the Global<br />
Address List or from a signed e-mail I have<br />
already sent. This certificate can encrypt<br />
information that is sensitive and should<br />
not be sent in a manner that allows anyone<br />
to read it. When I receive an encrypted<br />
e-mail, Outlook communicates with my<br />
CAC to decrypt the information.<br />
Since I used the CAC to log onto the workstation,if<br />
I have to step away from my desk,<br />
all I have to do is remove the CAC from the<br />
reader and my desktop is automatically<br />
locked so that no one else can access it.<br />
When I return, I put the card back into the<br />
reader and enter my PIN to return to where<br />
I left <strong>of</strong>f. Since unattended workstations<br />
are not secure, and security is a primary<br />
concern, I really like this feature. Even if I<br />
forget to take my CAC out <strong>of</strong> the reader,<br />
my screen saver will kick in after fifteen<br />
minutes and I’ll need both my CAC and my<br />
PIN to return to the desktop (since I need<br />
the CAC to get into my <strong>of</strong>fice, I try not to<br />
forget and leave it in the reader).<br />
CHIPS Winter 2003 43
E-mail isn’t the only application that is PKE.<br />
I use PKI to submit travel requests and process<br />
travel claims using DTS. Once I have<br />
filled out my travel voucher, I digitally<br />
stamp it. This is the equivalent <strong>of</strong> digitally<br />
signing an e-mail, and I can’t do it without<br />
my CAC. I click on the button that says<br />
stamp, and the CAC and the PK Enabled<br />
DTS work together to verify who I am and<br />
to encrypt my authorization or voucher.<br />
Since the process is electronic,there are no<br />
paper forms to get lost and my reimbursement<br />
is sent directly to my bank account<br />
in about one week.<br />
When I am on travel or working from home,<br />
I can use my CAC and my NMCI laptop for<br />
remote access to the network. I log on just<br />
as I would at work with my CAC in the card<br />
reader and dial in. The communication<br />
between my workstation and the network<br />
remote access server validates my identity,<br />
verifies that I am permitted to access the<br />
network, and establishes an encrypted<br />
communication link — all based on my<br />
identity certificate.<br />
When I think about how many passwords<br />
I had to remember,how long it would take<br />
to get a travel authorization approved/reimbursed<br />
for travel expenses and, how it<br />
was not even possible to encrypt my e-mail<br />
outside <strong>of</strong> the SIPRnet, it hits me just how<br />
much this little card has simplified my daily<br />
work life. Not to mention how it will continue<br />
to influence my work in the future,<br />
with things like contact-less CACs (where I<br />
don’t swipe the CAC, but it is read from a<br />
distance); using my CAC to send signed<br />
e-mails with my Blackberry and,using a variety<br />
<strong>of</strong> applications from personnel management<br />
s<strong>of</strong>tware to financial programs<br />
and not having to remember a different<br />
password for each.<br />
While technology is never a substitute for<br />
security awareness,the implementation <strong>of</strong><br />
NMCI, PKI and the CAC show how implementation<br />
<strong>of</strong> robust security can make our<br />
jobs easier. It is definitely a very exciting<br />
time to be in the DON.<br />
Josephine Smidt is a Management Analyst<br />
on the DON CIO IA Team.<br />
The <strong>Navy</strong>’s Web-based<br />
Reverse/Forward Auction<br />
Sept. 5, 2002, NAVICP (Naval Inventory<br />
Control Point) conducted<br />
the <strong>Navy</strong>’s first online forward auctions.<br />
The two auctions ran in two phases,<br />
with each phase consisting <strong>of</strong> the sale <strong>of</strong><br />
two damaged CH-53D helicopters and associated<br />
parts packages. Three firms registered<br />
to participate as bidders. The winning<br />
bidders are expected to refurbish the<br />
aircraft for commercial applications such<br />
as firefighting,a requirement that has generated<br />
significant demand for heavy lift<br />
aircraft in the past few years. The two contracts<br />
resulting from the auctions are valued<br />
at nearly $5 million. Naval Air Systems<br />
Command (NAVAIR) will receive the aircraft<br />
proceeds and NAVICP will retain the remaining<br />
proceeds to purchase similar helicopter<br />
parts.<br />
The forward auctions, leverage the latest<br />
commercial technology and are part <strong>of</strong><br />
NAVICP’s innovative strategy to reduce U.S.<br />
<strong>Navy</strong> excess inventory, which consists <strong>of</strong><br />
weapons system parts that the <strong>Navy</strong> might<br />
need later,but will most likely replace with<br />
state-<strong>of</strong>-the-art designs. The auctions also<br />
create a commercial marketplace for future<br />
sales. In fact,both <strong>of</strong> the winning bidders<br />
will have the option to buy additional<br />
CH-53D helicopters and parts within six<br />
months <strong>of</strong> contract award. This creative<br />
initiative allowed NAVICP to transform unusable<br />
assets that might otherwise deteriorate<br />
— into funding to support the next<br />
generation <strong>of</strong> weapons systems.<br />
The forward auctions are the latest success<br />
story in NAVICP’s Internet-based action<br />
program. In May 2000,NAVICP conducted<br />
the first Internet-based reverse auction in<br />
the Federal Government. The auction,<br />
which lasted 51 minutes, provided the<br />
competitive pricing mechanism for<br />
NAVICP to award a contract for aircraft<br />
ejection seat recovery sequencers (the<br />
“brains”<strong>of</strong> the ejection seats). The auction<br />
saved an estimated 28 percent from the<br />
historical price for recovery sequencers.<br />
NAVICP awarded the contract within an<br />
hour <strong>of</strong> the auction closing — a significant<br />
time savings.<br />
NAVICP conducted four additional auc-<br />
By Cmdr. Steve Dollase, SC, USN<br />
tions under the pilot reverse auction program,<br />
resulting in estimated savings <strong>of</strong> 21<br />
percent,or $14.8 million. Internet-based reverse<br />
auction technology allows online<br />
bidders to compete in real-time for contracts<br />
by lowering their price <strong>of</strong>fers (or raising<br />
them in a forward auction) as they see<br />
other bids posted. Bidders are unable to<br />
identify competitors, only the current low<br />
bid is visible. The auctions are conducted<br />
in a secure, Web-based environment. Participants<br />
are screened in advance before<br />
granting access to the auctions to ensure<br />
that they are qualified sources for the items<br />
under consideration. This is particularly important<br />
with complex weapons systems.<br />
Auctions work best when there are three<br />
or more bidders, and when specifications<br />
permit easy comparison between products.<br />
Convinced <strong>of</strong> the power <strong>of</strong> the concept,<br />
NAVICP, with the sponsorship <strong>of</strong> its parent<br />
command,the Naval Supply Systems Command<br />
(NAVSUP), awarded two five-year,<br />
best-value contracts for auction services;<br />
one to Procuri for a self-service, desktop<br />
tool and the other to eBreviate for a fullservice<br />
tool. The eBreviate solution also <strong>of</strong>fers<br />
market research services, helpful in<br />
determining suppliers for a particular requirement.<br />
In the first year, NAVICP contracts<br />
were used by NAVSUP activities and<br />
twelve other Federal Government agencies<br />
to conduct 43 auctions valued at over $144<br />
million with typical savings <strong>of</strong> 8 to 24 percent.<br />
The auction tools are available, free<br />
<strong>of</strong> charge,to <strong>Navy</strong> and Marine Corps activities,<br />
and to other Federal Government activities<br />
on a fee-for-service basis.<br />
The NAVSUP/NAVICP Reverse Auction<br />
Team earned a FY 2000 <strong>Department</strong> <strong>of</strong> the<br />
<strong>Navy</strong> Competition and Procurement Excellence<br />
Award for their success. NAVSUP/<br />
NAVICP recently launched a <strong>Navy</strong> auction<br />
Web site at www.auctions.navy.mil.<br />
These tools are just one more way that the<br />
<strong>Navy</strong> and Marine Corps team can maximize<br />
resources and improve combat readiness.<br />
Cmdr. Steve Dollase is NAVICP’s Director <strong>of</strong><br />
Acquisition Policy.<br />
44 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
CAC Middleware...<br />
Putting the CAC to Work<br />
for <strong>Information</strong> Security<br />
By Tim Russell<br />
As <strong>of</strong> July 2002, more than one million <strong>Department</strong> <strong>of</strong> Defense<br />
(DoD) users have been introduced to the Common Access Card<br />
(CAC) — the DoD’s new standard identification and benefits card<br />
that provides active duty and selected Reserve, civilian and contractor<br />
personnel with physical access to buildings and secure<br />
areas,and authentication for accessing computer networks. While<br />
the card represents the most tangible element <strong>of</strong> the CAC program<br />
and the part most visible to DoD personnel, the s<strong>of</strong>tware<br />
that functions to support a user’s CAC card on PC workstations is<br />
an equally vital part <strong>of</strong> the equation, even though many users<br />
don’t realize it or might not even know it’s there. But without<br />
s<strong>of</strong>tware, the CAC card can’t perform the secure logical access<br />
applications for which the card is intended. This August,Datakey<br />
was notified,along with three other vendors (Schlumberger,SSP-<br />
Litronic and Spyrus), that it had been selected as an approved<br />
supplier <strong>of</strong> middleware for the DoD CAC program.<br />
Working jointly under a partnership agreement with the National<br />
Institute <strong>of</strong> Standards and Technology (NIST) on behalf <strong>of</strong> DoD<br />
agencies,Datakey electronic memory key technology was revised<br />
and reengineered to develop a prototype secure token for computer<br />
workstation authentication in 1989. Based on this secure<br />
token, Datakey manufactured the first cryptographic Smart Card<br />
used for digital signatures in 1991. Former President Clinton used<br />
Datakey technology on two occasions while in <strong>of</strong>fice — to digitally<br />
sign an intergovernmental agreement with Ireland in 1998<br />
— and to sign the Electronic Signatures in Global and National<br />
Commerce Act (E-SIGN), legislation that took effect Oct. 1, 2000,<br />
making electronic signatures as legally valid as signatures on paper<br />
in the United States.<br />
Datakey began developing a version <strong>of</strong> s<strong>of</strong>tware specifically engineered<br />
for the CAC program following the specification requirements,and<br />
implemented PKCS #11,MS-CAPI and the DoD-defined<br />
Basic Services Interface (BSI), allowing users to take advantage <strong>of</strong><br />
any DoD CAC card to run their information security applications,<br />
including encrypted and digitally signed e-mail, VPN access and<br />
PC login applications. Beyond supporting all on-card cryptographic<br />
operations, Datakey CAC middleware also includes its<br />
supporting s<strong>of</strong>tware library to perform a complete range <strong>of</strong> cryptographic<br />
operations in s<strong>of</strong>tware. The middleware provides users<br />
with the utilities that are necessary to manage their Smart<br />
Card, including a PIN manager, the ability to view digital credentials,<br />
and the ability to register certificates within Micros<strong>of</strong>t environments.<br />
Datakey CAC middleware can also be field-enabled to<br />
support the full list <strong>of</strong> current Datakey Smart Card/token options,<br />
including all configurations <strong>of</strong> its Model 330 cryptographic Smart<br />
Card, for seamless integration with leading PKI and VPN products.<br />
Datakey also provides GSA-ready Smart Card technology for the<br />
Smart Access Common ID Card program. Government customers<br />
who have deployed Datakey Smart Card technology include:<br />
(1) The <strong>Department</strong> <strong>of</strong> State - 40,000 Diplomatic Security users<br />
will carry a Smart Card for facility access to DoS buildings and<br />
embassies and for secure network access. In addition to security,<br />
benefits include increased efficiencies and user productivity. Personnel<br />
can access corporate networks by using the same ID card<br />
that grants physical access to buildings. By using a single ID card<br />
for many applications and uses, the <strong>Department</strong> leverages its investment<br />
for the greatest possible return on investment. Old paper<br />
processes and applications can be securely transitioned online<br />
for time savings and 24x7 availability; (2) The Federal Deposit Insurance<br />
Corporation - 3,500 field agents and more than 7,000 internal<br />
users digitally sign/encrypt e-mail messages and documents,<br />
and access corporate facilities. FDIC field agents use an<br />
Electronic Travel Voucher (ETV) System application with Smart<br />
Cards and laptops for reimbursement <strong>of</strong> travel expenses. The electronic<br />
system interfaces with the National Finance Center (NFC).<br />
Previously, it took up to two months for field employees to be<br />
repaid, but by using Smart Cards it now takes two days for a direct<br />
deposit to an employee’s account. The paper reimbursement<br />
costs about $50 per transaction to process,whereas the new process<br />
costs less than $10. Since the FDIC processes 80,000 to<br />
100,000 vouchers every year, this results in savings <strong>of</strong> about $3.2<br />
to $4 million. Due to the success <strong>of</strong> the ETV pilot program, the<br />
FDIC has expanded the program to a fully operational, ongoing<br />
cryptographic Smart Card endeavour. Other customers using<br />
Smart Card technology include: the <strong>Department</strong> <strong>of</strong> Energy,Rocky<br />
Flats Environmental Technology Site, the Bureau <strong>of</strong> Labor Statistics<br />
and the Canadian <strong>Department</strong> <strong>of</strong> National Defence, which<br />
deployed 90,000 Smart Cards.<br />
As more and more DoD users (up to 4 million) receive the CAC<br />
card, the missing link is the s<strong>of</strong>tware required to put the card to<br />
work in information security applications (secure network access,<br />
digitally signed and encrypted e-mail, etc.,). Datakey CAC<br />
middleware bridges that gap and enables a powerful,<br />
interoperable and CAC-compliant solution that works with any<br />
CAC-compliant Smart Card. Through Datakey’s contract with the<br />
government, any DoD organization can order Datakey<br />
middleware and begin taking full advantage <strong>of</strong> the CAC card.<br />
For more information on CAC Middleware contracts visit the DON IT<br />
Umbrella Web site at www.it-umbrella.navy.mil or the DoD ESI site<br />
at www.don-imit.navy.mil/esi. DoD organizations can order Enterprise<br />
S<strong>of</strong>tware Initiative (ESI) CAC Middleware directly from the DON<br />
Web site, ITEC-Direct, at www.itec-direct.navy.mil or by contacting a<br />
Datakey representative at 1-888-328-2539 or 1-301-261-9150 in<br />
Washington,D.C.<br />
Tim Russell is vice president and general manager <strong>of</strong> Datakey<br />
Inc.<br />
CHIPS Winter 2003 45
SPAWAR Systems Center Charleston Technology Training Center Norfolk is undergoing<br />
an exciting revitalization with a focus on arming the warfighter with 21st century<br />
technology. The transformation will result in the standup <strong>of</strong> SPAWAR Institute —<br />
delivering C4ISR training solutions. We are enthusiastically looking forward to meeting<br />
the training demands <strong>of</strong> the 21st century warrior and exceeding expectations for quality,<br />
service and pr<strong>of</strong>essionalism.<br />
With opportunity comes change, the popular column,“How Can I” by the training team<br />
<strong>of</strong> SPAWAR Systems Center Charleston Technology Training Center Norfolk will be phased<br />
out. Through the years many <strong>Information</strong> Technology users have come to depend on<br />
the expert advice the training team has shared, but it is time to move in a fascinating<br />
new direction to meet the warfighter’s requirements with right on target C4ISR training.<br />
SPAWAR Institute will partner with <strong>Navy</strong> trainers and customers to bridge the gap<br />
between informal SPAWAR installation training and formal schoolhouse instruction. This<br />
nontraditional, integrated approach will provide timely and flexible C4ISR training to<br />
meet today’s shipboard requirements.<br />
Thanks to the following SPAWAR Systems Center Charleston Technology Training Center<br />
Norfolk instructors for their input: Alice Butler, Ronald Bailey, Katie Bierman, Gregory<br />
Browning, Colleen Jobe, Glynda R<strong>of</strong>fman and Muriel Taylor. Some <strong>of</strong> their most<br />
recent inquiries are listed below. If you would like further information or have questions,<br />
please call (757) 444-7976, DSN 564 or e-mail to forinfo@spawar.navy.mil. Visit<br />
their Web site at www.training.norfolk.navy.mil<br />
Micros<strong>of</strong>t Access<br />
QUESTION: Is there a way to create a shortcut on the desktop that will open Access, open a specific database and open a<br />
form<br />
ANSWER: Open the database. Use Tools ... Startup to set the opening form. Make a desktop shortcut to the Access database. When<br />
you click on the shortcut, Access will open the correct database and the selected form.<br />
QUESTION: What should you do when you set the database to open to a form and want to then gain access to the other<br />
objects in the database<br />
ANSWER: Hold the shift key while opening the database to bypass any start-up settings.<br />
Micros<strong>of</strong>t Outlook XP<br />
QUESTION: I lost the envelope that pops up when you get new mail. How do I get it back<br />
ANSWER: To restore the Envelope icon in your system tray follow the steps below.<br />
♦Start Outlook.<br />
♦Click the Tools menu, Select Options.<br />
♦On the Preferences Tab, Click E-mail Options.<br />
♦Click Advanced E-mail Options.<br />
♦Check to select the Show an envelope icon.<br />
Micros<strong>of</strong>t PowerPoint<br />
QUESTION: How can I change things that are the same color in a piece <strong>of</strong> clip art into a variety <strong>of</strong> different colors<br />
ANSWER: To get pieces <strong>of</strong> the clip art to each be a different color, double-click the piece <strong>of</strong> clip art - click “yes” to convert to a<br />
Micros<strong>of</strong>t Office drawing object (this will ungroup the image) - left click outside <strong>of</strong> the image to deselect it - double-click on any<br />
piece you would like to recolor - click the drop down list to change the fill color - regroup the image when you’re finished.<br />
In order to regroup, click on each part <strong>of</strong> the image using both the shift and control keys until all pieces <strong>of</strong> the image have been<br />
selected. Then, right click on the image and choose the Grouping option and then Group.<br />
*Tip* You can keep ungrouping and regrouping the image as <strong>of</strong>ten as you like to change the colors.<br />
CHIPS Winter 2003
SPAWAR<br />
Institute<br />
...C4ISR Training Solutions for the 21st Century Warfighter<br />
The SPAWAR Institute provides pr<strong>of</strong>essional instructors in Integrated Battle Force, Advanced<br />
Systems Training, Network Essentials, Unix Operating Systems, Micros<strong>of</strong>t Systems Engineer,<br />
A+ Certified Pr<strong>of</strong>essional and Network + Certified Pr<strong>of</strong>essional. SPAWAR Institute provides<br />
Curriculum Development services including requirements validation,training objectives<br />
development, alignment with governing standards and directives, curriculum production and<br />
delivery, and metrics for evaluation and modification based on student feedback. SPAWAR<br />
Institute delivers eLearning tools such as Computer Based Training<br />
and Web-enabled modules for C4ISR systems.<br />
We can design customized training solutions for every requirement.<br />
SPAWAR Intitute Services<br />
Integrated Battleforce Training<br />
Advanced Systems Training<br />
Afloat Training Teams<br />
Curriculum Development<br />
eLearning Resources<br />
757.444.4945<br />
DSN 564.4945<br />
Located Near Our Fleet Customers<br />
on the Norfolk Naval Station
ViViD Contracts<br />
N68939-97-D-0040<br />
Contractor: Avaya Incorporated<br />
N68939-97-D-0041<br />
Contractor: General Dynamics<br />
ViViD provides digital switching systems, cable plant components,<br />
communications and telecommunications equipment<br />
and services required to engineer, maintain, operate and modernize<br />
base level and ships afloat information infrastructure. This<br />
includes pier side connectivity and afloat infrastructure with purchase,<br />
lease and lease-to-own options. Outsourcing is also available.<br />
Awarded to:<br />
Avaya Incorporated (N68939-97-D-0040); (888) VIVID4U<br />
or (888) 848-4348. Avaya also provides local access and local<br />
usage services.<br />
General Dynamics (N68939-97-D-0041); (888) 483-8831<br />
Modifications<br />
Latest contract modifications are available at http://www.itumbrella.navy.mil<br />
Ordering <strong>Information</strong><br />
Ordering Expires:<br />
26 Jul 05 for all CLINs/SLINs<br />
26 Jul 07 for Support Services and Spare Parts<br />
Authorized users: DoD and U.S. Coast Guard<br />
Warranty: Four years after government acceptance. Exceptions<br />
are OEM equipment warranties on catalog items.<br />
Acquisition, Contracting & Technical Fee: Included<br />
in all CLINs/SCLINs<br />
Web Link<br />
http://www.it-umbrella.navy.mil/<br />
TAC Solutions BPAs<br />
Listed Below<br />
TAC Solutions provides PCs, notebooks, workstations, servers,<br />
networking equipment, and all related equipment and services<br />
necessary to provide a completely integrated solution. BPAs<br />
have been awarded to the following:<br />
Compaq Federal, LLC (N68939-96-A-0005); (800) 727<br />
5472<br />
Control Concepts (N68939-97-A-0001); (800) 922-9259<br />
Dell (N68939-97-A-0011); (800) 727-1100, ext. 61973<br />
GTSI (N68939-96-A-0006); (800) 999-4874, ext. 2549<br />
Hewlett-Packard (N68939-97-A-0006); (301) 258-2063<br />
McBride and Associates, Inc. (N68939-96-A-0007);<br />
(800) 829-9409, ext. 7612<br />
SUN (N68939-97-A-0005); (800) 786-0404<br />
Ordering Expires: Indefinite with annual review for all<br />
BPAs.<br />
Authorized Users: DON, U.S. Coast Guard, DoD, and other<br />
federal agencies with prior approval.<br />
Warranty: IAW GSA Schedule. Additional warranty options available.<br />
Web Link<br />
http://www.it-umbrella.navy.mil/contract/tac-solutions/<br />
tac-sol.html<br />
Enterprise S<strong>of</strong>tware Agreements<br />
Listed Below<br />
The Enterprise S<strong>of</strong>tware Initiative (ESI) is a <strong>Department</strong> <strong>of</strong> Defense (DoD) initiative<br />
to streamline the acquisition process and provide best-priced, standards-compliant<br />
information technology (IT). The ESI is a business discipline used to coordinate<br />
multiple IT investments and leverage the buying power <strong>of</strong> the government<br />
for commercial IT products and services. By consolidating IT requirements and<br />
negotiating Enterprise Agreements with s<strong>of</strong>tware vendors, the DoD realizes significant<br />
Total Cost <strong>of</strong> Ownership (TCO) savings in IT acquisition and maintenance.<br />
The goal is to develop and implement a process to identify, acquire, distribute,<br />
and manage IT from the enterprise level.<br />
In September 2001, the ESI was approved as a “quick hit” initiative under the DoD<br />
Business Initiative Council (BIC). Under the BIC, the ESI will become the benchmark<br />
acquisition strategy for the licensing <strong>of</strong> commercial s<strong>of</strong>tware and will extend<br />
a S<strong>of</strong>tware Asset Management Framework across the DoD. Additionally, the<br />
DAR Council has approved a final rule which will incorporate the ESI into the Defense<br />
Federal Acquisition Regulation Supplement (DFARS) Section 208.74.<br />
Authorized ESI users include all Defense components, U.S. Coast Guard, Intelligence<br />
Community, and Defense contractors when authorized by their contracting<br />
<strong>of</strong>ficer. For more information on the ESI or to obtain product information, visit<br />
the ESI Web site at http://www.don-imit.navy.mil/esi.<br />
ASAP (N00039-A-9002) for Novell products; and (N00104-02-A-ZE78) for<br />
Micros<strong>of</strong>t products; Small Business; (800) 883-7413 for Novell products and<br />
(800) 248-2727, ext. 5303 for Micros<strong>of</strong>t products<br />
GTSI (N00104-00-A-Q242) for JetForm products; and (N00104-02-A-ZE79) for<br />
Micros<strong>of</strong>t products; Small Business; (800) 999-GTSI<br />
Crunchy Technologies, Inc. (N00104-01-A-Q446) for PageScreamer<br />
S<strong>of</strong>tware (Section 508 Tool), Crunchy Pr<strong>of</strong>essional Services and Training; Small<br />
Business Disadvantaged; (877) 379-9185 or (703) 469-2010<br />
CorpS<strong>of</strong>t, Inc. (N00104-01-A-Q506) for Adobe products; and (N00104-02-A<br />
ZE82) for Micros<strong>of</strong>t products; Call (800) 808-1944 for Adobe products and<br />
(800) 677-4009, ext. 5248 or (781) 440-1000 (OCONUS) for Micros<strong>of</strong>t products<br />
HiS<strong>of</strong>tware, DLT Solutions, Inc. (N00104-01-A-Q570) for HiS<strong>of</strong>tware<br />
Section 508 Tools; Small Business; (888) 223-7083 or (703) 708-9658<br />
SAP Public Sector and Education, Inc. (N00104-02-ZE77) for SAP<br />
s<strong>of</strong>tware, installation, implementation technical support, maintenance and<br />
training services; (610) 661-5711<br />
S<strong>of</strong>tchoice (Beyond.com) (N00104-02-A-ZE81) for Micros<strong>of</strong>t products;<br />
Small Business; (877) 804-4995, ext. 305<br />
COMPAQ (N00104-02-A-ZE80) for Micros<strong>of</strong>t products; (800) 535-2563 pin<br />
6246 or (317) 228-3424 (OCONUS)<br />
DELL (N00104-02-A-ZE83) for Micros<strong>of</strong>t products; (512) 723-7010<br />
S<strong>of</strong>tmart (N00104-02-A-ZE84) for Micros<strong>of</strong>t products; (610) 518-4000,<br />
ext. 6492<br />
CDW-G (N00104-02-A-ZE85) for Micros<strong>of</strong>t products; (703) 726-5011<br />
S<strong>of</strong>tware House International (N00104-02-A-ZE86) for Micros<strong>of</strong>t<br />
products; Small Business Disadvantaged; (301) 294-9439<br />
Datakey (N00104-02-D-Q666) IDIQ Contract for CAC Middleware products;<br />
(301) 261-9150<br />
Litronic (N00104-02-D-Q667) IDIQ Contract for CAC Middleware products;<br />
(703) 905-9700<br />
Schlumberger (N00104-02-D-Q668) IDIQ Contract for CAC Middleware<br />
products; (410) 723-2428<br />
Spyrus (N00104-02-D-Q669) IDIQ Contract for CAC Middleware products;<br />
(408) 953-0700, ext. 155<br />
CHIPS Winter 2003
Ordering Expires:<br />
Ordering <strong>Information</strong><br />
Micros<strong>of</strong>t products: 26 Jun 03<br />
Novell products: 31 Mar 07<br />
JetForm products: 23 Feb 03<br />
Crunchy products: 04 Jun 04<br />
Adobe products: 14 Aug 03<br />
HiS<strong>of</strong>tware products: 16 Aug 04<br />
CAC Middleware products: 06 Aug 05<br />
SAP products: Upon expiration <strong>of</strong> the GSA schedule<br />
Authorized Users: Adobe products, Micros<strong>of</strong>t products, Section 508 Tools,<br />
CAC Middleware and SAP: All DoD. For purposes <strong>of</strong> this agreement, DoD is defined<br />
as: all DoD Components and their employees, including Reserve Component<br />
(Guard and Reserve) and the U.S. Coast Guard mobilized or attached to DoD;<br />
other government employees assigned to and working with DoD; non-appropriated<br />
funds instrumentalities such as NAFI employees; Intelligence Community<br />
(IC) covered organizations to include all DoD Intel System member organizations<br />
and employees, but not the CIA nor other IC employees unless they are assigned<br />
to and working with DoD organizations; DoD contractors authorized in accordance<br />
with the FAR; and authorized Foreign Military Sales.<br />
JetForm: All DoD and U.S. Coast Guard (excluding Air Force and Army).<br />
Warranty: IAW GSA Schedule. Additional warranty and maintenance options<br />
available. Acquisition, Contracting and Technical fee included in all BLINS.<br />
Web Links<br />
ASAP S<strong>of</strong>tware Express<br />
http://www.it-umbrella.navy.mil/contract/msesa/asap/asap.html<br />
Government Technology Services, Inc. (GTSI)<br />
http://www.it-umbrella.navy.mil/contract/msesa/gtsi/gtsi.html<br />
CorpS<strong>of</strong>t, Inc.<br />
http://www.it-umbrella.navy.mil/contract/adobe/adobe.html<br />
Crunchy Technologies, Inc.<br />
http://www.it-umbrella.navy.mil/contract/508/crunchy/crunchy.html<br />
HiS<strong>of</strong>tware, DLT Solutions, Inc.<br />
http://www.it-umbrella.navy.mil/contract/508/dlt/dlt.html<br />
SAP<br />
http://www.it-umbrella.navy.mil/contract/enterprise/sap/sap.html<br />
Micros<strong>of</strong>t Products<br />
http://www.it-umbrella.navy.mil/contract/enterprise/micros<strong>of</strong>t/ms-ela.html<br />
Datakey, Inc.<br />
http://www.it-umbrella.navy.mil/contract/middleware-esa/datakey/index.html<br />
SSP-Litronic, Inc.<br />
http://www.it-umbrella.navy.mil/contract/middleware-esa/litronic/index.html<br />
Schlumberger<br />
http://www.it-umbrella.navy.mil/contract/middleware-esa/Schlumberger/<br />
index.html<br />
Spyrus, Inc.<br />
http://www.it-umbrella.navy.mil/contract/middleware-esa/spyrus/index.html<br />
<strong>Navy</strong> Contract:<br />
N68939-97-A-0008<br />
<strong>Department</strong> <strong>of</strong> the <strong>Navy</strong><br />
Enterprise Solutions BPA<br />
The <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> Enterprise Solutions (DON ES) BPA provide a wide<br />
range <strong>of</strong> technical services, specially structured to meet tactical requirements,<br />
including worldwide logistical support, integration and engineering services<br />
(including rugged solutions), hardware, s<strong>of</strong>tware and network communications<br />
solutions. DON ES has one BPA.<br />
Computer Sciences Corporation (CSC) (N68939-97-A-0008);<br />
(619) 225-2412; Awarded 07 May 97; Ordering expires 31 Mar 06, with two oneyear<br />
options<br />
Authorized Users: All DoD.<br />
Web Link<br />
http://www.it-umbrella.navy.mil/contract/tac-don-es/csc/csc.html<br />
<strong>Information</strong> Technology Support Services<br />
BPAs<br />
Listed Below<br />
The <strong>Information</strong> Technology Support Services (ITSS) BPAs provide a wide range<br />
<strong>of</strong> IT support services such as networks,Web development, communications, training,<br />
systems engineering, integration, consultant services, programming, analysis<br />
and planning. ITSS has five BPAs. They have been awarded to:<br />
Booz Allen Hamilton Inc. (N68939-97-A-0014); (415) 281-4942;<br />
Awarded 02 Jul 97; Ordering expires 31 Mar 04<br />
Lockheed Martin (N68939-97-A-0017); (240) 725-5950; Awarded 01 Jul 97;<br />
Ordering expires 30 Jun 05, with two one-year options<br />
Northrop Grumman <strong>Information</strong> Technology<br />
(N68939-97-A-0018); (571) 203-6114; Awarded 01 Jul 97;<br />
Ordering expires 12 Feb 05, with two one-year options<br />
SAIC (N68939-97-A-0020); (703) 676-5096; Awarded 01 Jul 97; Ordering<br />
expires 30 Jun 05, with two one-year options<br />
TDS (Sm Business) (N00039-98-A-3008); (619) 224-1100;<br />
Awarded 15 Jul 98; Ordering expires 15 Jul 05, with two one-year options<br />
Authorized Users: All DoD, federal agencies, and U.S. Coast Guard.<br />
Web Link<br />
http://www.it-umbrella.navy.mil/contract/itss/itss.html<br />
<strong>Navy</strong> Contract:<br />
N00039-99-A-3193<br />
Networking Solutions BPA<br />
The Networking Solutions contract provides access to significant discounts on<br />
Cisco networking products and solutions. The items include a large variety <strong>of</strong><br />
ATM and Ethernet switches, edge devices and s<strong>of</strong>tware. This Networking BPA is<br />
primarily intended for equipment purchases. Customers requiring total solutions<br />
or significant integration services should consider placing their order(s) using the<br />
ViViD Contracts. A BPA has been awarded to:<br />
Federal Data Corporation (N00039-99-A-3193); (425) 793-3847<br />
Ordering Expires: Indefinite with annual review for BPA<br />
Authorized Users: DON, U.S. Coast Guard, DoD, and other federal<br />
agencies with prior approval.<br />
Warranty: IAW GSA schedule. Additional warranty and options available.<br />
Web Link<br />
http://www.it-umbrella.navy.mil/contract/net-solutions/fdc/fdc.html<br />
Research and Advisory BPAs<br />
Listed Below<br />
Research and Advisory Services BPAs provide unlimited access to telephone inquiry<br />
support, access to research via Web sites and analyst support for the number<br />
<strong>of</strong> users registered. In addition, the services provide independent advice on<br />
tactical and strategic IT decisions. Advisory services provide expert advice on a<br />
broad range <strong>of</strong> technical topics and specifically focus on industry and market<br />
trends. BPAs listed below.<br />
Gartner Group (N00104-03-A-ZE77); (703) 226-4815; Awarded Nov 02;<br />
one-year base period with three one-year options.<br />
CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
Acquisition Solutions (N00104-99-A-Q150); (703) 378-3226;<br />
Awarded 14 Jan 00; one-year base period with three one-year options.<br />
Ordering Expires:<br />
Gartner Group: Nov 06<br />
Acquisition Solutions: Jan 04<br />
Authorized Users:<br />
Gartner Group: This <strong>Navy</strong> BPA is open for ordering by all <strong>of</strong> the DoD components<br />
and their employees, including Reserve Components (Guard and Reserve); the<br />
U.S. Coast Guard; other government employees assigned to and working with<br />
DoD; non-appropriated funds instrumentalities <strong>of</strong> the DoD; DoD contractors<br />
authorized in accordance with the FAR and authorized Foreign Military Sales (FMS).<br />
Acquisition Solutions: All DoD. For purposes <strong>of</strong> this agreement, DoD is defined<br />
as: all DoD Components and their employees, including Reserve Component<br />
(Guard and Reserve) and the U.S. Coast Guard mobilized or attached to DoD; other<br />
government employees assigned to and working with DoD; non-appropriated<br />
funds instrumentalities such as NAFI employees; Intelligence Community (IC)<br />
covered organizations to include all DoD Intel System member organizations and<br />
employees, but not the CIA nor other IC employees unless they are assigned to<br />
and working with DoD organizations; DoD contractors authorized in accordance<br />
with the FAR; and authorized Foreign Military Sales.<br />
Web Links<br />
From the DON IT Umbrella Program Web Site:<br />
Gartner Group<br />
http://www.it-umbrella.navy.mil/contract/r&a/gartner/gartner.html<br />
Acquisition Solutions<br />
http://www.acqsolinc.com<br />
TurboPrep Messaging Solution<br />
N00039-00-C-3112<br />
Contractor: Ice Communications<br />
TurboPrep s<strong>of</strong>tware for generation, preparation, validation and formatting <strong>of</strong><br />
messages has been purchased by the SPAWAR Program Office for the DON Enterprise.<br />
No additional cost to authorized users. Order issued to:<br />
Ice Communications, Inc. (N00039-00-C-3112 <strong>of</strong> Feb 00); Small Business;<br />
(703) 938-1465; Awarded Aug 00<br />
Ordering <strong>Information</strong><br />
Ordering Expires: 14 Feb 03<br />
Authorized Users: All DON and U.S. Coast Guard<br />
Warranty: 3-year which includes s<strong>of</strong>tware updates and upgrades.<br />
http://www.icecomm.com.<br />
Web Link<br />
SEWP III<br />
Listed Below<br />
NASA’s Scientific and Engineering Workstation Procurement III government-wide<br />
contracts provide Class 10 Computer Support Devices and Class 12 Security Systems<br />
and Tools. SEWP III is an indefinite delivery, indefinite quantity (IDIQ) type<br />
contract. Contracts have been awarded to the following:<br />
Hewlett-Packard (NAS5-01133) and (NAS5-01141); (781) 505-7676<br />
GTSI/SUN (NAS5-01134); (703) 502-2172<br />
IBM (NAS5-01135); (800) 426-2255<br />
Silicon Graphics Federal, Inc. (NAS5-01136) and (NAS5-01140);<br />
(301) 572-1980<br />
GMR/Cray (NAS5-01138); (703) 330-1199<br />
Compaq Federal, LLC (NAS5-01139); (301) 918-5360<br />
GTSI (NAS5-01142) and (NAS5-01146); (703) 502-2172<br />
Logicon FDC (NAS5-01143) and (NAS5-01147); (301) 446-3100<br />
UNISYS Corporation (NAS5-01144); (800) 398-8090<br />
Government Micro Resources (NAS5-01145); (703) 330-1199<br />
Ordering Expires: 30 Jul 06 (Contracts awarded for five years starting<br />
30 Jul 01.)<br />
Authorized Users: DON, U.S. Coast Guard, DoD, and other federal agencies.<br />
Warranty: 36-month extended warranty available<br />
Web Link<br />
http://www.it-umbrella.navy.mil/contract/sewp3/sewp3.htm<br />
The U.S. Army Small Computer Program<br />
(ASCP) Maxi-Mini<br />
and Database (MMAD) Program<br />
Listed Below<br />
The Maxi-Mini And Database (MMAD) Program is supported by two fully competed<br />
Indefinite Delivery/Indefinite Quantity (ID/IQ) contracts with IBM Global<br />
Services and GTSI Corporation. The MMAD Program is intended to be DoD’s follow-on<br />
to the <strong>Navy</strong> administered Supermini Program in fulfilling high and medium<br />
level IT product and service requirements. Like its predecessor, MMAD provides<br />
items to modernize, upgrade, refresh and consolidate current systems, as<br />
well as to establish new ones.<br />
Products include:<br />
64-bit Servers (RISC and Itanium): HP, IBM, Compaq<br />
64-bit RISC and NT Workstations: HP, Compaq<br />
Routers/Network: Cisco, 3COM<br />
Storage Systems: IBM, RMSI, Compaq, Dot Hill, System Upgrade, EMC<br />
Ancillaries include network hardware items, upgrades, peripherals and s<strong>of</strong>tware.<br />
Services are geared toward providing solutions needed to effectively manage<br />
and support the complexities <strong>of</strong> agency or program system environments, to include:<br />
consultants, analysts, engineers, programmers, trainers and administrators.<br />
MMAD is designed to ensure the latest products and services are available in a<br />
flexible manner to meet the various requirements identified by DoD and other<br />
agencies. This flexibility includes special solution CLINs, technology insertion provisions,<br />
ODC (Other Direct Cost) provisions for ordering related non-contract items,<br />
and no dollar/ratio limitation for ordering services and hardware.<br />
Latest product additions include EMC and McData storage solutions, and Tivoli<br />
Storage Manager s<strong>of</strong>tware. Both IBM and GTSI now provide HP, Cisco and EMC<br />
products and services with MMAD terms and conditions.<br />
Awarded to:<br />
GTSI Corporation (DAAB07-00-D-H251); (800) 999-GTSI<br />
IBM Global Services-Federal (DAAB07-00-D-H252); CONUS:<br />
(866) IBM-MMAD (1-866-426-6623) OCONUS: (703) 724-3660 (Collect)<br />
Ordering <strong>Information</strong><br />
Ordering: Decentralized. Any federal contracting <strong>of</strong>ficer may issue delivery<br />
orders directly to the contractor.<br />
Ordering Expires:<br />
GTSI: 24 May 06 (includes three option periods)<br />
IBM: 19 Feb 06 (includes three option periods)<br />
CHIPS Winter 2003
Authorized Users: DoD and other federal agencies including FMS<br />
Warranty: 5 years or OEM options<br />
Delivery: 35 days from date <strong>of</strong> order (50 days during surge period, August<br />
and September)<br />
No separate acquisition, contracting and technical fees.<br />
Web Links<br />
GTSI<br />
http://pmscp.monmouth.army.mil/contracts/mmad_gtsi/mmad_gtsi.asp<br />
IBM<br />
http://pmscp.monmouth.army.mil/contracts/mmad_ibm/mmad_ibm.asp<br />
The U.S. Army<br />
Enterprise S<strong>of</strong>tware Initiative BPA<br />
DAAB15-99-A-1002<br />
As <strong>of</strong> February, 28, 2002, the <strong>Navy</strong> holds inventory <strong>of</strong> Oracle Database Enterprise<br />
Edition (9i and 9ias) perpetual licenses (either named-user, multi-server or<br />
processor), and additional options and tools (i.e., security options, partitioning,<br />
spatial, clustering, diagnostics management packs, Tuning Management Pack,<br />
Change Management Pack, Internet Application Server Enterprise, Internet<br />
Developer Suite, and Balanced Scorecard). Initial orders will include a warranty<br />
period <strong>of</strong> March 1 through May 31, 2002, and s<strong>of</strong>tware support for the period<br />
June 1 through May 31, 2003. Placing orders early will result in the best deal for<br />
end users. Four (4) additional out years <strong>of</strong> Silver Technical Support and product<br />
update support have also been negotiated.<br />
The initial purchase price for end users is an average <strong>of</strong> a 64 percent discount <strong>of</strong>f<br />
GSA prices and total package discounts (including out year technical support)<br />
average a 70 percent discount <strong>of</strong>f GSA prices. Customers with small requirements<br />
can benefit from discounts normally reserved for customers with orders over $10<br />
million. These licenses can be distributed throughout the <strong>Navy</strong>. In accordance<br />
with the Federal Acquisition Regulations (FAR) and DoD policy, <strong>Navy</strong> customers<br />
who have selected Oracle to satisfy new requirements must purchase the “new”<br />
Oracle licenses from the inventory.<br />
This virtual inventory was established through the <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> <strong>Chief</strong><br />
<strong>Information</strong> <strong>Officer</strong> (DON CIO) Enterprise Licensing Team and the <strong>Department</strong> <strong>of</strong><br />
Defense Enterprise S<strong>of</strong>tware Initiative (DoD ESI). The DoD ESI is a joint initiative,<br />
which has been approved by the DoD Business Initiative Council (BIC).<br />
This inventory will be managed by the <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> <strong>Information</strong><br />
Technology (DON IT) Umbrella Program Office at Space and Naval Warfare Systems<br />
Center, San Diego.<br />
For complete contract<br />
information go to the<br />
DON IT Umbrella Program<br />
Web site at:<br />
www.it-umbrella.navy.mil<br />
CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience
52 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience