25.01.2015 Views

Download PDF - Department of Navy Chief Information Officer - U.S. ...

Download PDF - Department of Navy Chief Information Officer - U.S. ...

Download PDF - Department of Navy Chief Information Officer - U.S. ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHIPS Winter 2003<br />

1


<strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> <strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong><br />

Mr. Dave Wennergren<br />

Space & Naval Warfare Systems Command<br />

Rear Admiral Kenneth D. Slaght<br />

Space & Naval Warfare Systems Center, Charleston<br />

Commanding <strong>Officer</strong><br />

Captain Nancy L. Deitch<br />

Page 6<br />

“...the war on terrorism is just<br />

beginning ...”<br />

The Honorable Gordon R. England<br />

Secretary <strong>of</strong> the <strong>Navy</strong><br />

Page 8<br />

“... Our goal is to make the <strong>Navy</strong><br />

the employer <strong>of</strong> choice for our<br />

young men and women ...”<br />

Adm. Vern Clark<br />

<strong>Chief</strong> <strong>of</strong> Naval Operations<br />

Senior Editor<br />

Sharon Anderson<br />

Assistant Editor<br />

Nancy Reasor<br />

Web support by Bill Bunton and Tony Virata, DON-IT Umbrella<br />

Program.<br />

Page 12<br />

“... President Bush said that the<br />

success <strong>of</strong> the Pacific is essential<br />

to the entire world ...”<br />

Adm. Walter F. Doran<br />

Commander, U.S. Pacific Fleet<br />

CHIPS is sponsored by the <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> <strong>Chief</strong> <strong>Information</strong><br />

<strong>Officer</strong> (DON CIO) and the DON IT Umbrella Program Office, Space and<br />

Naval Warfare Systems Center, San Diego, CA.<br />

CHIPS is published quarterly by the Space & Naval Warfare Systems<br />

Center, Charleston. USPS 757-910 Periodical postage paid at<br />

Norfolk, VA and at additional mailing <strong>of</strong>fice. POSTMASTER: Send<br />

changes to CHIPS, SSC Charleston, Norfolk Office, 9456 Fourth<br />

Ave., Norfolk, VA 23511-2130.<br />

Submit article ideas to CHIPS editors at chips@spawar.navy.mil. We<br />

reserve the right to make editorial changes. All articles printed in<br />

CHIPS become the sole property <strong>of</strong> the publisher. Reprint authorization<br />

will be granted at the publisher's discretion.<br />

Requests for distribution changes or for other assistance should<br />

be directed to Editor, CHIPS, SSC Charleston, 9456 Fourth Ave.,<br />

Norfolk, VA 23511-2130, or call (757) 444-8704; DSN 564. E-mail<br />

address: chips@spawar.navy.mil; FAX (757) 445-2103; DSN 565.<br />

Web address: http://www.chips.navy.mil/.<br />

Disclaimer. The views and opinions contained in CHIPS are not<br />

necessarily those <strong>of</strong> the <strong>Department</strong> <strong>of</strong> Defense nor do they<br />

constitute endorsement or approval by the DON CIO, DON IT<br />

Umbrella Program Office or SPAWAR Systems Center, Charleston.<br />

The facts as presented in each article are verified ins<strong>of</strong>ar as possible,<br />

but the opinions are strictly those <strong>of</strong> the individual authors.<br />

Page 14<br />

“When President Theodore<br />

Roosevelt announced that the<br />

nation would ‘Speak s<strong>of</strong>tly and<br />

carry a big stick,’ the big stick he<br />

was referring to was the United<br />

States <strong>Navy</strong> ...”<br />

Vice Adm. Albert H. Konetzni, Jr.<br />

Deputy and <strong>Chief</strong> <strong>of</strong> Staff<br />

U.S. Atlantic Fleet<br />

Page 25<br />

“JITC’s relationship with the <strong>Navy</strong><br />

spans nearly three decades.”<br />

Page 21<br />

“I think one <strong>of</strong> the cornerstone<br />

joint applications is the Global<br />

Command and Control System.”<br />

Diann L. McCoy<br />

DISA Principal Director for<br />

Applications Engineering<br />

2<br />

CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


Volume XXI Issue I<br />

4 Editor’s Notebook<br />

By Sharon Anderson<br />

5 Embracing Change:<br />

Continuing Transformation<br />

By Dave Wennergren<br />

6 ... the war on terrorism is just beginning<br />

By the Honorable Gordon R. England<br />

Secretary <strong>of</strong> the <strong>Navy</strong><br />

8 Sea Power 21<br />

By Adm. Vern Clark, USN<br />

<strong>Chief</strong> <strong>of</strong> Naval Operations<br />

12 Uniting and Securing the Pacific<br />

Through Technology<br />

By Adm. Walter F. Doran, USN<br />

Commander, U.S. Pacific Fleet<br />

14 Talking with Vice Adm. Albert H.<br />

Konetzni, Jr., USN<br />

Deputy and <strong>Chief</strong> <strong>of</strong> Staff<br />

U.S. Atlantic Fleet<br />

15 Mine Warfare ...<br />

By Vice Adm. Albert H. Konetzni, Jr., USN<br />

20 U.S <strong>Navy</strong> and Air Force Hit<br />

Virtual Bull’s Eye<br />

21 Interview with Diann L. McCoy<br />

DISA Principal Director for<br />

Applications Engineering<br />

24 Revolution Comes to the Teddy Roosevelt<br />

Battle Group<br />

By JO2 Jd Walter, USN<br />

25 JITC Provides Essential Service to the Fleet<br />

By Chris Watson<br />

29 East Timor: A Case Study in<br />

C4 Communications<br />

By Col. Lyle M. Cross, USMC with Col.<br />

Randy P. Strong, USA, Lt. Col. Clinton D.<br />

Wadsworth, USMC and Dave Delaunay<br />

32 Restructuring Naval Education<br />

<strong>Navy</strong> Knowledge Management Portal<br />

By JO2 Jd Walter, USN<br />

Surface Combat Operations New Home<br />

By George Dunn<br />

33 Virtual Connecting Technology<br />

NAVAIR Response Center<br />

By Vicky Falcon<br />

34 CAP Launches New Web Site!<br />

35 A Brief History <strong>of</strong> Personal Computing Part III<br />

By Retired Major Dale J. Long, USAF<br />

38 Talking with Dinah Cohen<br />

Computer/Electronic Accommodations<br />

Program Director<br />

39 NAVAIR Connects with Army Special Forces<br />

By Renee Hatcher<br />

40 NASA Tests New Helmet Developed at NAVAIR<br />

By Renee Hatcher<br />

41 Using Technology to Provide Better Support<br />

for the Federal Workforce<br />

By Sandra J. Smith<br />

43 Security Made Easier Using the NMCI, PKI<br />

and the CAC<br />

By Josephine Smidt and Rebecca Nielson<br />

44 The <strong>Navy</strong>’s Web-based Reverse/Forward Auction<br />

By Cmdr. Steve Dollase, SC, USN<br />

45 CAC Middleware<br />

By Tim Russell<br />

46 How Can I<br />

By the SPAWAR SCC Technology<br />

Training Center Norfolk<br />

48 Under The Contract<br />

By the DON-IT Umbrella Program<br />

CHIPS Winter 2003 3


Apr. 26, 2002, at a<br />

ceremony at the<br />

Pentagon’s Hall <strong>of</strong><br />

Heroes, CNO Adm. Vern<br />

Clark presented the<br />

Purple Heart to Lt.<br />

Schaeffer for the<br />

injuries he sustained<br />

during the 9-11 attack.<br />

Director <strong>of</strong> the Army<br />

Staff Lt. Gen. Kevin<br />

Byrnes presented the<br />

Soldier’s Medal to Army Sgt. 1st Class Steve Workman for<br />

rescuing Schaeffer. Photo by PH1 Roseborough.<br />

Editor’s Notebook<br />

The photo top left is one <strong>of</strong> my favorites. I can’t think <strong>of</strong> a prettier<br />

site than a U.S. <strong>Navy</strong> ship with her proud crew standing topside<br />

— unless, <strong>of</strong> course, it is a <strong>Navy</strong> or Air Force F/A-18 Super Hornet<br />

with the sun glinting on her wings, or a speeding Coast Guard<br />

cutter, or a Marine standing watch, or an advancing Army<br />

battalion ... I think you get my point. In the months since 9-11,<br />

80,000 Americans have deployed in the fight against terrorism.<br />

Through these difficult months Combatant Commanders have<br />

repeatedly praised the bravery <strong>of</strong> military members across the<br />

Services. When questioned about the “toughness” <strong>of</strong> the<br />

younger generation <strong>of</strong> warfighters top military leadership and<br />

Combatant Commanders alike express pride and awe at the<br />

dedication and self-sacrifice <strong>of</strong> today’s servicemembers. They are<br />

eager to defend freedom — and embrace the latest in C2 and<br />

C4ISR innovations. In this issue we explore some <strong>of</strong> the new<br />

technologies that will arm our warfighters in the battle for<br />

freedom.<br />

At the USNI Warfare Exposition and Symposium, Oct. 2002, I had<br />

the privilege <strong>of</strong> briefly meeting retired <strong>Navy</strong> Lt. Kevin Schaeffer<br />

who sustained serious life threatening injuries and burns on 40<br />

percent <strong>of</strong> his body when the <strong>Navy</strong> Command Center where he<br />

worked exploded in a ball <strong>of</strong> fire after terrorists flew a hijacked<br />

airliner into the southwestern wedge <strong>of</strong> the Pentagon Sept. 11,<br />

2001. Meeting Lt. Schaeffer was a revelation for me. He said he<br />

doesn’t consider himself to be a hero, rather he says he is a<br />

survivor. Lt. Schaeffer said the real heroes today are U.S.<br />

servicemembers fighting the war on terrorism.<br />

Our heroes risk their lives 24x7, they aren’t faceless or nameless<br />

— they are our husbands, wives, brothers, sisters, children,<br />

neighbors, friends and fellow Americans. We must arm America’s<br />

best and bravest with the very latest in technology and warfare<br />

capability — they deserve nothing less.<br />

Sharon Anderson<br />

U.S. Marines assigned to 2nd Battalion, 2nd Marines, Echo<br />

Company, 24th Marine Expeditionary Unit (MEU) Special<br />

Operations Capable (SOC) disembark from an Amphibious<br />

Assault Vehicle (AAV) to conduct a live fire training<br />

exercise. Marines from the 24th MEU (SOC) are on a<br />

regularly scheduled deployment conducting exercises in<br />

the U.S. Central Command Area <strong>of</strong> Responsibility (AOR) in<br />

support <strong>of</strong> Operation Enduring Freedom. U.S. <strong>Navy</strong> photo<br />

by PH2 Michael Sandberg.<br />

U.S. Central Command Commander Army Gen. Tommy R.<br />

Franks speaks to Airmen, Soldiers, Sailors and Marines<br />

during a recent troop call. The general visited the base,<br />

which is supporting Operation Southern Watch, to thank the<br />

troops for their efforts in conducting the global war on<br />

terrorism and enforcing the Southern No-Fly Zone over Iraq.<br />

Photo by Senior Airman Nicole Bickford.<br />

4<br />

CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


<strong>Department</strong> <strong>of</strong> the <strong>Navy</strong>, <strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong>, Dave Wennergren<br />

Embracing Change: Continuing Transformation<br />

Change is inevitable. The work <strong>of</strong> a <strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong> revolves around change, and<br />

those that lead change must be prepared to live it too. And so it is with great respect and<br />

admiration that we wish “fair winds and following seas” to Mr. Dan Porter who retired from<br />

Federal Service and stepped down as the <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> CIO on December 1. Over a<br />

four year period, Mr. Porter successfully led the most aggressive and transformational<br />

<strong>Information</strong> Management/<strong>Information</strong> Technology (IM/IT) agenda in the Federal Government.<br />

His tenure included the launching <strong>of</strong> numerous groundbreaking and innovative efforts,<br />

including the <strong>Navy</strong> Marine Corps Intranet, DON eBusiness Operations Office, the first online<br />

reverse auction in Federal Government history,DoD Common Access Card,Critical Infrastructure Protection,Knowledge Management<br />

and Legacy Applications rationalization. It’s not <strong>of</strong>ten that you find an individual that embodies the traits <strong>of</strong> a great leader, great<br />

teacher, great innovator, great mentor and great friend, but those <strong>of</strong> you who worked with Dan know that he has been all these<br />

things, and more, during his almost 30 years <strong>of</strong> service to the U. S. <strong>Navy</strong> and nation.<br />

But change in the IM/IT world is as inevitable as the change in seasons, and so it with a great deal <strong>of</strong> enthusiasm and excitement<br />

that I am proud to continue championing the <strong>Department</strong>’s outstanding IM/IT work to ensure a knowledge- and network-centric<br />

<strong>Navy</strong> and Marine Corps team. Our vision remains clear — to create and maintain: (1) an integrated, results-oriented <strong>Navy</strong> and<br />

Marine Corps team characterized by strategic leadership, shared goals, ubiquitous communication, and invisible technology, (2) an<br />

effective, flexible and sustainable DON enterprise-wide information and technology environment that delivers decisive capability<br />

to the Naval Warfighting Team, and (3) a knowledge-centric culture that fosters innovation and organizational learning, enabling<br />

the rapid and effective transition <strong>of</strong> interoperable solutions in support <strong>of</strong> our expeditionary warfighting and homeland security<br />

missions.<br />

Having served as one <strong>of</strong> the <strong>Department</strong>’s Deputy CIOs for the last four years, I’ve had the tremendous opportunity and great<br />

pleasure <strong>of</strong> working with — and continuing to work with — the most phenomenal group <strong>of</strong> information pr<strong>of</strong>essionals: on the CIO<br />

staff, at the <strong>Navy</strong> and Marine Corps headquarters and throughout the entire <strong>Navy</strong> and Marine Corps team. I believe that the<br />

<strong>Department</strong>’s current IM/IT agenda and strategic plan is right on target: creating a seamless enterprise network; embracing<br />

knowledge management and eGovernment; rationalizing our legacy applications; moving our applications to the Web — accessed<br />

through an enterprise portal structure;establishing authoritative data sources and consolidating databases;providing career paths<br />

and growth opportunities for the IM/IT workforce; embracing new technologies, like wireless, to address the needs <strong>of</strong> our mobile<br />

workforce; providing tools to our people to help them implement these new strategies; championing Smart Cards and Public Key<br />

Infrastructure to increase security; and, aggressively focusing on Critical Infrastructure Protection as a part <strong>of</strong> our full dimensional<br />

protection strategy.<br />

The IM/IT world will continue to evolve. As we evolve with it, we must each keep an eye to the future and continue to ensure that<br />

the <strong>Navy</strong>-Marine Corps team remains agile and ready to embrace these new ideas and new technologies. Part <strong>of</strong> this evolution is<br />

the ongoing restructuring <strong>of</strong> IM/IT management in the <strong>Department</strong>, which will strengthen and align our efforts in several ways.<br />

First, it will establish a <strong>Navy</strong> Flag <strong>Officer</strong> and Marine Corps General <strong>Officer</strong> as Deputy <strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong>s for the <strong>Navy</strong> and<br />

Marine Corps. Formal reporting relationships will also be established between these Deputies and the <strong>Information</strong> <strong>Officer</strong>s at our<br />

major commands to align the DON’s IM/IT vision and execution. “Centers <strong>of</strong> Excellence” across the <strong>Department</strong> will become<br />

management partners, working on specific tasks on behalf <strong>of</strong> the CIO. Finally, a DON IM/IT Implementation Plan will be developed.<br />

This detailed document will link the <strong>Department</strong>’s vision and strategy to actual implementation guidance that will serve as the<br />

basis for funding and approving IM/IT initiatives.<br />

It is a very exciting time,and the opportunities to improve the ways our Sailors,Marines and Civilians fight and work are tremendous.<br />

But it is a time <strong>of</strong> change, and we must all do our part to be change leaders. Choosing to change almost inevitably means choosing<br />

to accept some risks; but choosing not to change, in the midst <strong>of</strong> the digital revolution, almost certainly risks irrelevancy. I look<br />

forward to working with each <strong>of</strong> you as we continue our transformational efforts to ensure that we continue to have the greatest<br />

<strong>Navy</strong> and Marine Corps in the world.<br />

“Putting <strong>Information</strong> to Work for Our People.”<br />

CHIPS Winter 2003 5


The Honorable Gordon R. England<br />

Secretary <strong>of</strong> the <strong>Navy</strong><br />

“Never forget that our great nation is still<br />

threatened and eternal vigilance is still<br />

essential to preserve freedom. Never forget<br />

the sacrifices <strong>of</strong> heroes past and present.”<br />

Edited from Secretary England’s address to<br />

the USNI Warfare Exposition and Symposium,<br />

Virginia Beach, Va., Oct. 3, 2002.<br />

... As our nation approaches the first anniversary<br />

... <strong>of</strong> our first blows for freedom in<br />

the War on Terror ... and I’m not speaking<br />

<strong>of</strong> 9-11, but rather, Oct. 7 [2001] — it will<br />

be exactly a year since Capt. Dave Mercer,<br />

CAG, Carrier Air Wing Eight, launched <strong>of</strong>f<br />

the deck <strong>of</strong> USS Enterprise to deliver the<br />

first strike against Taliban and al Qaeda positions<br />

in Afghanistan. Now,a year later,the<br />

terrorist camps have been destroyed, the<br />

terrorist networks disrupted, and the<br />

people <strong>of</strong> Afghanistan liberated ... but<br />

there are still many more battles to fight ...<br />

All manners <strong>of</strong> journalism will be a part <strong>of</strong><br />

this fight. The military and journalists are<br />

partners in freedom. The military defends<br />

our freedom. Journalists maintain our freedom<br />

... by defending the truth ...<br />

September 11 is indelibly etched in the<br />

collective memory <strong>of</strong> America. Even as we<br />

wrestled with the internal feelings <strong>of</strong> shock,<br />

disbelief, fear, anger and overwhelming<br />

grief ...America was already responding to<br />

the attacks. In New York and at the Pentagon<br />

... police, firefighters, emergency service<br />

providers and ordinary citizens<br />

worked feverishly to rescue survivors and<br />

treat the wounded ... and, <strong>of</strong> course, as we<br />

... the war on terrorism is just<br />

beginning ...<br />

all know very well, heroic actions aboard<br />

United Flight 93 foiled the terrorists’ last<br />

planned attack on our nation’s capital.<br />

While it would be comforting to believe<br />

that this war is drawing to an end, it’s unfortunately<br />

closer to the beginning than to<br />

the end. This is still a time <strong>of</strong> testing for<br />

America ... and for freedom and liberty.<br />

In my lifetime,there have been three“isms”<br />

that threatened America. It took a World<br />

War to defeat the first ism, which America<br />

entered when I was four years old. That was<br />

the war to defeat fascism. We prevailed<br />

militarily and were ultimately victorious by<br />

establishing a new government in Germany<br />

and in Japan.<br />

In 1950, a few short years after defeating<br />

fascism,the nation found itself in war again<br />

in Korea. At that time,we did not know that<br />

the Korean War was merely the first bloody<br />

battle <strong>of</strong> a long war that would last until<br />

the wall came down — almost 40 years<br />

later — in Berlin in 1989. Korea was the<br />

beginning <strong>of</strong> the Cold War when the free<br />

nations <strong>of</strong> the world stood shoulder-toshoulder<br />

to stop communism, the second<br />

ism <strong>of</strong> my lifetime. It took a World War to<br />

defeat fascism and a Cold War to defeat<br />

communism.<br />

Now we are embarked on the war against<br />

terrorism,the third ism,and history has not<br />

yet recorded how this war will be characterized.<br />

We do know, however, that it will<br />

be a long war. It is also a war in which the<br />

United States and its allies must prevail<br />

because the consequences are so pr<strong>of</strong>ound.<br />

For the first time in the history <strong>of</strong><br />

mankind, a small number <strong>of</strong> people with<br />

weapons <strong>of</strong> mass destruction can wreak<br />

untold havoc in our cities and against our<br />

citizens ... against our allies ... and against<br />

freedom loving people around the world.<br />

Several months ago, I was at Pearl Harbor<br />

in Hawaii and visited the USS Arizona. I was<br />

also on board the USS Missouri. These<br />

ships rest side by side. The Arizona is symbolic<br />

<strong>of</strong> the beginning <strong>of</strong> World War II for<br />

America ...and the Missouri symbolic <strong>of</strong> the<br />

ending <strong>of</strong> that war. The peace treaty with<br />

Japan was signed on the deck <strong>of</strong> the Missouri.<br />

These two memorials provide a visual<br />

perspective <strong>of</strong> the beginning and end<br />

<strong>of</strong> a terrible war. Now visualize the tragedy<br />

in New York when the airliners crashed<br />

into the World Trade Centers ... the beginning<br />

<strong>of</strong> the war on terrorism. Now, try to<br />

visualize how this war will end. It certainly<br />

will not end with a peace treaty as it did<br />

on the USS Missouri at the end <strong>of</strong> World<br />

War II. Rather, it will require the military<br />

defeat <strong>of</strong> terrorism followed by a change<br />

<strong>of</strong> governments in countries that support<br />

terrorism. Ultimately that was what was required<br />

to defeat fascism and communism.<br />

... Who could have imagined how fascism<br />

and communism would have ultimately<br />

ended by December 1942 or July 1951<br />

The weapon that ended World War II was<br />

still embryonic in December <strong>of</strong> 1942, and<br />

certainly no one could have imagined in<br />

July 1951 that the Cold War was going to<br />

last another 38 years or that it would ultimately<br />

be won economically rather than<br />

militarily.<br />

I can tell you one year into this war that<br />

our Naval services, our <strong>Navy</strong> and Marines,<br />

have never been better prepared than they<br />

are today. All <strong>of</strong> our readiness accounts are<br />

fully funded, our equipment is ready, our<br />

morale is high, and we are ready to prosecute<br />

the President’s orders. This does not<br />

mean that these are comfortable times.<br />

Rather,as we continue our war against terrorism,<br />

we are also in the process <strong>of</strong> transforming<br />

our military ... and transforming<br />

the very way that the DoD manages its<br />

enterprise to be better prepared to protect<br />

and defend our nation as we face new future<br />

threats. This is not,however,a new role<br />

— our Naval forces have continuously<br />

changed to protect and defend our nation<br />

for the past 227 years.<br />

One year into this war, I do know that victory<br />

in the war against terrorism will be<br />

much broader than just military. It will take<br />

our military, economic and diplomatic<br />

strength to win, and it will also take the<br />

strength <strong>of</strong> our journalists ... I also find it <strong>of</strong><br />

great personal interest that none <strong>of</strong> the<br />

countries associated with any <strong>of</strong> the three<br />

isms ... had or have a free press. Jefferson<br />

was certainly right when he uttered his<br />

now famous dictum,“Were it left to me to<br />

decide ... whether we should have a gov-<br />

6<br />

CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


ernment without newspapers ... or newspapers without a government<br />

... I should not hesitate a moment ... to prefer the latter.”<br />

... To pr<strong>of</strong>essionally challenge assumptions and conclusions and<br />

cause a measured and factual debate is beneficial and therefore<br />

encouraged. Dissent in the name <strong>of</strong> freedom is a virtue.<br />

I said this would likely be a long war and that means we will ask<br />

our sons and daughters, mothers and fathers, — members <strong>of</strong> our<br />

American families to shed blood and, when necessary, to make<br />

the ultimate sacrifice for freedom. That includes the press. Last<br />

year 51 journalists were killed around the globe. All <strong>of</strong> you ...play<br />

a critical role in maintaining public awareness ... and enhancing<br />

public understanding <strong>of</strong> our <strong>Navy</strong>’s daily action ... and the <strong>Navy</strong>’s<br />

role in protecting America.<br />

... I am reminded <strong>of</strong> the words President Bush spoke on his first<br />

visit to the Pentagon ... hours after the attack ... at 6:20 p.m. on<br />

September 12. The fires still burned in the Pentagon ro<strong>of</strong>line ...<br />

the smell <strong>of</strong> smoke permeated the building ... and the sound <strong>of</strong><br />

emergency sirens still pierced the air. Our military was on the<br />

highest alert. The Nation’s senior uniformed and civilian military<br />

leaders were in the room ... the Joint <strong>Chief</strong>s <strong>of</strong> Staff ... my fellow<br />

Service Secretaries ... the Secretary <strong>of</strong> Defense and his Deputy.<br />

The President looked hard at each <strong>of</strong> us in turn and said ...“NEVER<br />

FORGET ...what happened yesterday ...never forget how you felt.<br />

I will never forget. The nation will go on because the nation has<br />

to go on ... people will need to get on with their lives ... but you<br />

and I can never forget, because we are charged by the American<br />

people to protect and defend our nation.” We owe it to our children<br />

and our grandchildren to create a world that is free <strong>of</strong> the<br />

scourge <strong>of</strong> terrorism ... we owe it to the memory <strong>of</strong> those who<br />

have fallen in the line <strong>of</strong> duty ... We must remember the fallen as<br />

they would have wanted to be remembered — living in freedom<br />

as Americans. And it is the challenge to all <strong>of</strong> us ... to ensure that<br />

Americans ... across time and across this great land ... never forget:<br />

Never forget that our great nation is still threatened and eternal<br />

vigilance is still essential to preserve freedom. Never forget<br />

the sacrifices <strong>of</strong> heroes past and present. Never forget what happened<br />

in New York City ...at the Pentagon ... and in the skies over<br />

Somerset County, Pennsylvania. Never forget that as comradesin-arms,<br />

our military and the press have a solemn duty to preserve<br />

liberty and freedom.<br />

God bless each and every one <strong>of</strong> you ... God bless our fallen heroes<br />

and their families ... and God bless the United States <strong>of</strong> America.<br />

Unveiled during a dedication ceremony held on the first anniversary<br />

<strong>of</strong> the Sept. 11, 2001, terrorist attacks, a memorial wall located near<br />

the <strong>Navy</strong>’s newly-reconstructed <strong>Navy</strong> Operations Center in the<br />

Pentagon honors those DON personnel who perished when the<br />

hijacked American Airlines Flight 77 crashed into the building. The<br />

<strong>Navy</strong> lost 42 <strong>of</strong> its personnel, active duty, retired, and employees in<br />

the Pentagon and four retired <strong>of</strong>ficers and a <strong>Navy</strong> employee aboard<br />

Flight 77. U.S. <strong>Navy</strong> photo by PHC Philomena Gorenflo.<br />

Editor’s Note: When President Bush signed the Homeland Security<br />

Bill into law Nov.25, he established a new cabinet-level department<br />

to ensure the safety <strong>of</strong> the American people. Before Bush signed the<br />

bill in a White House ceremony, he announced he will nominate<br />

former Pennsylvania Governor Tom Ridge to be the first Secretary<br />

<strong>of</strong> Homeland Security. He also said he will nominate <strong>Navy</strong> Secretary<br />

Gordon England to be deputy at the 170,000-worker agency.<br />

“The trust and confidence that President Bush has shown in selecting<br />

me to join Governor Tom Ridge in this important work for our<br />

nation is deeply appreciated,” said England, who has served as Secretary<br />

<strong>of</strong> the <strong>Navy</strong> since May 2001. “My only regret is that my time<br />

as Secretary has been too short; however, the naval services continue<br />

in the good hands <strong>of</strong> the Secretariat, Adm. Vern Clark, Gen.<br />

Jim Jones and all the other leaders <strong>of</strong> the <strong>Navy</strong>-Marine Corps Team.<br />

Our naval services are well positioned to carry on their long and<br />

great tradition <strong>of</strong> defending liberty and freedom around the world.”<br />

The new department will analyze threats,guard borders, coordinate<br />

national responses and focus the “full resources <strong>of</strong> the American<br />

government on the safety <strong>of</strong> its people,” Bush said. The bill is a response<br />

to the Sept.11 attacks in New York and Washington D.C. The<br />

idea is to place all federal agencies involved with homeland security<br />

under one umbrella. The few exceptions are the military, the<br />

Federal Bureau <strong>of</strong> Investigation and the Central Intelligence Agency.<br />

He said the Homeland Security Act is the “next logical step” in defending<br />

America. The act amalgamates 22 agencies into one department.<br />

“To succeed in their mission, leaders <strong>of</strong> the new department<br />

must change the culture <strong>of</strong> many diverse agencies, directing<br />

all <strong>of</strong> them toward the principal objective <strong>of</strong> protecting the American<br />

people,” Bush said. “The effort will take time and focus and<br />

steady resolve.” He said adjustments in the department will be<br />

needed, as this is the largest reorganization <strong>of</strong> the U.S. Government<br />

since the 1947 act that established the Defense <strong>Department</strong>. He<br />

said the new department would analyze information collected by<br />

U.S.intelligence agencies and match that against American vulnerabilities.<br />

The new agency will work with other agencies, the private<br />

sector, and state and local governments to harden America’s defenses<br />

against terror, Bush stated.<br />

The agency will focus on safeguarding the U.S. computer network,<br />

and defend against the growing threat <strong>of</strong> chemical, biological or<br />

nuclear assaults. The <strong>Department</strong> <strong>of</strong> Homeland Security will be one<br />

point <strong>of</strong> contact for state and local <strong>of</strong>ficials, and place security for<br />

all U.S. transportation systems under one ro<strong>of</strong>. Bush noted the <strong>Department</strong><br />

<strong>of</strong> Homeland Security will end duplication and overlapping<br />

responsibilities.<br />

As we go to press Secretary England is expected to continue as Secretary<br />

<strong>of</strong> the <strong>Navy</strong> until January 2003.<br />

CHIPS Winter 2003 7


By Adm.Vern Clark, <strong>Chief</strong> <strong>of</strong> Naval Operations<br />

Adm. Clark has written numerous articles and continues to speak about his vision for a fullynetworked<br />

joint warfighter embodied in the vision for Sea Power 21. CHIPS’ editors had the<br />

opportunity to talk with Adm. Clark and hear him speak about how Sea Power 21 will tie together the<br />

Naval, Joint and national information grid, at the USNI Warfare Exposition and Symposium,Virginia<br />

Beach, Va., Oct. 2, 2002. At a lively question and answer session, one young Sailor challenged the<br />

CNO doubting that the <strong>Navy</strong>’s transformation could be done — the CNO countered,“You just watch<br />

us, but we would rather have you join us.” Excerpts are taken from the CNO’s article for Proceedings<br />

Magazine (October 2002 Volume 128/10/1,196), “Sea Power 21— Projecting Decisive Joint<br />

Capabilities” and the admiral’s remarks at the symposium. At left: U. S. <strong>Navy</strong> photo by PH3 Yesenia<br />

Rosas.<br />

...The 21st century sets the stage for tremendous increases in<br />

Naval precision, reach, and connectivity, ushering in a new era <strong>of</strong><br />

joint operational effectiveness. Innovative concepts and technologies<br />

will integrate sea, land, air, space and cyberspace to a<br />

greater extent than ever before. In this unified battlespace, the<br />

sea will provide a vast maneuver area from which to project direct<br />

and decisive power around the globe. Future Naval operations<br />

will use revolutionary information superiority and dispersed,<br />

networked force capabilities to deliver unprecedented <strong>of</strong>fensive<br />

power, defensive assurance, and operational independence to<br />

Joint Force Commanders. Our <strong>Navy</strong> and its partners will dominate<br />

the continuum <strong>of</strong> warfare from the maritime domain —<br />

deterring forward in peacetime, responding to crises, and fighting<br />

and winning wars. By doing so, we will continue the evolution<br />

<strong>of</strong> U.S. Naval power from the blue-water, war-at-sea focus <strong>of</strong><br />

the“Maritime Strategy”(1986), through the littoral emphasis <strong>of</strong>“.<br />

. . From the Sea” (1992) and “Forward . . . from the Sea” (1994), to a<br />

broadened strategy in which Naval forces are fully integrated into<br />

global joint operations against regional and transnational dangers.<br />

The events <strong>of</strong> 9-11,tragically illustrated that the promise <strong>of</strong> peace<br />

and security in the new century is fraught with pr<strong>of</strong>ound dangers:<br />

nations poised for conflict in key regions, widely dispersed<br />

and well-funded terrorist and criminal organizations, and failed<br />

states that deliver only despair to their people. These dangers<br />

will produce frequent crises, <strong>of</strong>ten with little warning <strong>of</strong> timing,<br />

size, location or intensity. Associated threats will be varied and<br />

deadly, including weapons <strong>of</strong> mass destruction, conventional<br />

warfare, and widespread terrorism. Future enemies will attempt<br />

to deny us access to critical areas <strong>of</strong> the world, threaten vital<br />

friends and interests overseas, and even try to conduct further<br />

attacks against the American homeland. These threats will pose<br />

increasingly complex challenges to national security and future<br />

warfighting.<br />

Previous strategies addressed regional challenges. Today,we must<br />

think more broadly. Enhancing security in this dynamic environment<br />

requires us to expand our strategic focus to include both<br />

evolving regional challenges and transnational threats. This combination<br />

<strong>of</strong> traditional and emerging dangers means increased<br />

risk to our nation. To counter that risk, our <strong>Navy</strong> must expand its<br />

striking power, achieve information dominance, and develop<br />

transformational ways <strong>of</strong> fulfilling our enduring missions <strong>of</strong> sea<br />

control, power projection, strategic deterrence, strategic sealift,<br />

and forward presence.<br />

Three fundamental concepts lie at the heart <strong>of</strong> the <strong>Navy</strong>’s continued<br />

operational effectiveness: Sea Strike,Sea Shield and Sea Basing,<br />

illustrated in Figure 1. Sea Strike is the ability to project precise<br />

and persistent <strong>of</strong>fensive power from the sea; Sea Shield extends<br />

defensive assurance throughout the world; and Sea Basing<br />

enhances operational independence and support for the joint<br />

force. These concepts build upon the solid foundation <strong>of</strong> the<br />

<strong>Navy</strong>-Marine Corps team, leverage U.S. asymmetric advantages,<br />

and strengthen joint combat effectiveness.<br />

We <strong>of</strong>ten cite asymmetric challenges when referring to enemy<br />

threats, virtually assuming such advantages belong only to our<br />

adversaries. Sea Power 21 is built on a foundation <strong>of</strong> American<br />

asymmetric strengths that are powerful and uniquely ours.<br />

Among others, these include the expanding power <strong>of</strong> computing,systems<br />

integration,a thriving industrial base,and the extraordinary<br />

capabilities <strong>of</strong> our people, whose innovative nature and<br />

desire to excel give us our greatest competitive advantage.<br />

Sea Strike,Sea Shield and Sea Basing will be enabled by ForceNet,<br />

an overarching effort to integrate warriors,sensors,networks,command<br />

and control, platforms, and weapons into a fully netted,<br />

combat force. We have been talking about network-centric warfare<br />

for a decade, and ForceNet will be the <strong>Navy</strong>’s plan to make it<br />

an operational reality. Supported by ForceNet, Sea Strike, Sea<br />

Shield and Sea Basing capabilities will be deployed by way <strong>of</strong> a<br />

Global Concept <strong>of</strong> Operations that widely distributes the firepower<br />

<strong>of</strong> the fleet, strengthens deterrence, improves crisis response,<br />

and positions us to win decisively in war.<br />

Projecting Decisive Combat Power<br />

Projecting decisive combat power has been critical to every commander<br />

who ever went into battle, and this will remain true in<br />

decades ahead. Sea Strike operations are how the 21st century<br />

<strong>Navy</strong> will exert direct, decisive, and sustained influence in joint<br />

campaigns. They will involve the dynamic application <strong>of</strong> persistent<br />

intelligence,surveillance,and reconnaissance;time-sensitive<br />

strike; ship-to-objective maneuver; information operations; and<br />

covert strike to deliver devastating power and accuracy in future<br />

campaigns. <strong>Information</strong> gathering and management are at the<br />

8<br />

CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


heart <strong>of</strong> this revolution in striking power. Networked, long-dwell<br />

Naval sensors will be integrated with national and joint systems<br />

to penetrate all types <strong>of</strong> cover and weather, assembling vast<br />

amounts <strong>of</strong> information. Data provided by <strong>Navy</strong> assets — manned<br />

and unmanned — will be vital to establishing a comprehensive<br />

understanding <strong>of</strong> enemy military, economic, and political<br />

vulnerabilities. Rapid planning processes will then use this<br />

knowledge to tailor joint strike packages that deliver calibrated<br />

effects at precise times and places.<br />

... <strong>Information</strong> superiority and flexible strike options will result in<br />

time-sensitive targeting with far greater speed and accuracy.<br />

Military operations will become more complicated as advanced<br />

intelligence, surveillance, and reconnaissance products proliferate.<br />

Expanded situational awareness will put massed forces at<br />

risk,for both friends and adversaries. This will compress timelines<br />

and prompt greater use <strong>of</strong> dispersed, low-visibility forces. Countering<br />

such forces will demand speed, agility and streamlined information<br />

processing tied to precision attack. Sea Strike will meet<br />

that challenge.<br />

The importance <strong>of</strong> information operations will grow in the years<br />

ahead as high-technology weapons and systems become more<br />

widely available. <strong>Information</strong> operations will mature into a major<br />

warfare area, to include electronic warfare, psychological operations,<br />

computer network attack, computer network defense,<br />

operations security and military deception. <strong>Information</strong> operations<br />

will play a key role in controlling crisis escalation and preparing<br />

the battlefield for subsequent attack. This U.S. asymmetric<br />

[advantage] will be a critical part <strong>of</strong> Sea Strike.<br />

When we cannot achieve operational objectives from over the<br />

horizon, our <strong>Navy</strong>-Marine Corps team moves ashore. Using advanced<br />

vertical and horizontal envelopment techniques, fully<br />

netted ground forces will maneuver throughout the battlespace,<br />

employing speed and precision to generate combat power. Supported<br />

by sea bases, we will exploit superior situational awareness<br />

and coordinated fires to create shock, confusion and chaos<br />

in enemy ranks. <strong>Information</strong> superiority and networking will act<br />

as force multipliers, allowing agile ground units to produce the<br />

warfighting impact traditionally provided by far heavier forces,<br />

bringing expeditionary warfare to a new level <strong>of</strong> lethality and<br />

combat effectiveness.<br />

... Sea Strike operations will be fully integrated into joint campaigns,adding<br />

the unique independence,responsiveness,and onscene<br />

endurance <strong>of</strong> Naval forces to joint strike efforts. Combined<br />

sea-based and land-based striking power will produce devastating<br />

effects against enemy strategic,operational and tactical pressure<br />

points — resulting in rapid,decisive operations and the early<br />

termination <strong>of</strong> conflict.<br />

Sea Shield to Protect Our National Interests<br />

Traditionally, Naval defense has protected the unit, the fleet and<br />

the sea lines <strong>of</strong> communication. Tomorrow’s <strong>Navy</strong> will do much<br />

more. Sea Shield takes us beyond unit and task-force defense to<br />

provide the nation with sea-based theater and strategic defense.<br />

Sea Shield will protect our national interests with layered global<br />

defensive power based on control <strong>of</strong> the seas, forward presence<br />

and networked intelligence. It will use these strengths to enhance<br />

homeland defense,assure access to contested littorals and project<br />

defensive power deep inland. As with Sea Strike, the foundation<br />

Figure 1. Sea Power 21<br />

Sea Shield<br />

FORCENet<br />

Sea Basing<br />

Sea Strike<br />

<strong>of</strong> these integrated operations will be information superiority,total<br />

force networking,and an agile and flexible sea-based force. Homeland<br />

defense will be accomplished by a national effort that integrates<br />

forward-deployed Naval forces with the other military services,civil<br />

authorities,and intelligence and law-enforcement agencies.<br />

Working with the newly established Northern Command,<br />

we will identify, track, and intercept dangers long before they<br />

threaten our homeland ...<br />

Maritime patrol aircraft,ships,submarines and unmanned vehicles<br />

will provide comprehensive situational awareness to cue<br />

intercepting units. When sent to investigate a suspicious vessel,<br />

boarding parties will use advanced equipment to detect the<br />

presence <strong>of</strong> contraband by visual, chemical and radiological<br />

methods. Forward-deployed Naval forces will also protect the<br />

homeland by engaging inbound ballistic missiles in the boost or<br />

mid-course phase,when they are most vulnerable to interception.<br />

In addition,our nuclear-armed Trident ballistic missile submarine<br />

force will remain on silent patrol around the world, providing the<br />

ultimate measure <strong>of</strong> strategic deterrence. These highly survivable<br />

submarines are uniquely powerful assets for deterring aggressors<br />

who would contemplate using weapons <strong>of</strong> mass destruction.<br />

... In times <strong>of</strong> rising tension, prepositioned Naval units will sustain<br />

access for friendly forces and maritime trade by employing evolving<br />

expeditionary sensor grids and advanced deployable systems<br />

to locate and track enemy threats. Speed will be an ally as linked<br />

sensors,high-speed platforms,and improved kill vehicles consolidate<br />

area control, including the location and neutralization <strong>of</strong><br />

mines via state-<strong>of</strong>-the-art technology on dedicated mine warfare<br />

platforms and battle group combatants. Mission-reconfigurable<br />

Littoral Combat Ships, manned and unmanned aviation assets,<br />

and submarines with unmanned underwater vehicles will gain<br />

and maintain the operational advantage,while sea-based aircraft<br />

and missiles deliver air dominance. The result will be combatready<br />

forces that are prepared to “climb into the ring” to achieve<br />

and sustain access before and during crises.<br />

A next-generation long-range surface-to-air Standard Missile,<br />

modernized E-2 Hawkeye radar and Cooperative Engagement<br />

Capability will combine to extend sea-based cruise missile defense<br />

far inland. This will reinforce the impact <strong>of</strong> sea-based ballistic<br />

missile defense and greatly expand the coverage <strong>of</strong> Naval area<br />

defense. These capabilities represent a broadened mission for<br />

our <strong>Navy</strong> that will lessen the defensive burden on land forces and<br />

increase sea-based influence over operations ashore.<br />

CHIPS Winter 2003 9


“... In the role <strong>of</strong> ForceNet chief engineer, we must think outside the boundaries <strong>of</strong> SPAWAR’s traditional product lines to build a<br />

truly robust architecture encompassing the integration <strong>of</strong> weapon, sensor and information grids ... It is an exciting time to be a<br />

part <strong>of</strong> the SPAWAR team. Our mission is critical, now more than ever, to the <strong>Navy</strong> and Nation during the war against terrorism.<br />

In the weeks and months to come, we must continue to focus on providing the blue prints for ForceNet ...”<br />

Rear Adm. Kenneth D. Slaght, COMSPAWAR, addressing SPAWAR employees, June 21, 2002<br />

Offensive and Defensive Independence<br />

... Sea Basing serves as the foundation from which <strong>of</strong>fensive and<br />

defensive fires are projected — making Sea Strike and Sea Shield<br />

realities. As enemy access to weapons <strong>of</strong> mass destruction grows,<br />

and the availability <strong>of</strong> overseas bases declines, it is compelling<br />

both militarily and politically to reduce the vulnerability <strong>of</strong> U.S.<br />

forces through expanded use <strong>of</strong> secure, mobile, networked sea<br />

bases. Sea Basing capabilities will include providing Joint Force<br />

Commanders with global command and control extending integrated<br />

logistical support to other Services. Afloat positioning <strong>of</strong><br />

these capabilities strengthens force protection and frees airliftsealift<br />

to support missions ashore.<br />

Netted and dispersed sea bases will consist <strong>of</strong> numerous platforms,<br />

including nuclear-powered aircraft carriers, multi-mission<br />

destroyers, submarines with Special Forces and maritime prepositioned<br />

ships, providing greatly expanded power to joint operations.<br />

Sea-based platforms will also enhance coalition-building<br />

efforts, sharing their information and combat effectiveness<br />

with other nations in times <strong>of</strong> crisis.<br />

Sea Basing accelerates expeditionary deployment and employment<br />

timelines by prepositioning vital equipment and supplies<br />

in-theater, preparing the United States to take swift and decisive<br />

action during crises. We intend to develop these capabilities to<br />

the fullest extent. Strategic sealift will be central to this effort. It<br />

remains a primary mission <strong>of</strong> the U.S. <strong>Navy</strong> and will be critical<br />

during any large conflict fought ashore. Moreover, we will build<br />

prepositioned ships with at-sea-accessible cargo, awaiting closure<br />

<strong>of</strong> troops by way <strong>of</strong> high-speed sealift and airlift. Joint operational<br />

flexibility will be greatly enhanced by employing prepositioned<br />

shipping that does not have to enter port to <strong>of</strong>f-load.<br />

Twenty-first-century operations will require greater efficiencies<br />

through the development <strong>of</strong> joint logistical support ...<br />

ForceNet is the glue ...<br />

ForceNet is the “glue” that binds together Sea Strike, Sea Shield<br />

and Sea Basing. It is the operational construct and architectural<br />

framework for Naval warfare in the information age, integrating<br />

warriors,sensors, command and control, platforms, and weapons<br />

into a networked, distributed combat force. ForceNet will provide<br />

the architecture to increase substantially combat capabilities<br />

through aligned and integrated systems, functions, and missions.<br />

It will transform situational awareness, accelerate speed <strong>of</strong><br />

decision and allow us to greatly distribute combat power.<br />

ForceNet will harness information for knowledge-based combat<br />

operations and force survivability and provide real-time enhanced<br />

collaborative planning among joint and coalition partners.<br />

Using a total system approach, ForceNet will shape the<br />

development <strong>of</strong> integrated capabilities. These include maritime<br />

information processing and command and control components<br />

that are fully interoperable with joint systems; intelligence,<br />

surveillance, and reconnaissance fusion capabilities to support<br />

rapid targeting and maneuver; open systems architecture for<br />

broad and affordable interoperability; and safeguards to ensure<br />

networks are reliable and survivable. ForceNet also emphasizes<br />

the human factor in the development <strong>of</strong> advanced technologies.<br />

This philosophy acknowledges that the warrior is a premier<br />

element <strong>of</strong> all operational systems. Today, ForceNet is moving<br />

from concept to reality. Initial efforts will focus on integrating<br />

existing networks, sensors and command and control systems.<br />

In the years ahead, it will enable the Naval service to employ a<br />

fully netted force, engage with distributed combat power, and<br />

command with increased awareness and speed as an integral part<br />

<strong>of</strong> the joint team.<br />

Global Concept <strong>of</strong> Operations<br />

Sea Power 21 will be implemented by a Global Concept <strong>of</strong><br />

Operations that will provide our nation with widely dispersed<br />

combat power from platforms possessing unprecedented<br />

warfighting capabilities ... The Global Concept <strong>of</strong> Operations will<br />

disperse combat striking power by creating additional<br />

independent operational groups capable <strong>of</strong> responding<br />

simultaneously around the world. This increase <strong>of</strong> combat power<br />

is possible because technological advancements are dramatically<br />

transforming the capability <strong>of</strong> our ships, submarines and aircraft<br />

to act as power projection forces, netted together for expanded<br />

warfighting effect.<br />

... The Global Concept <strong>of</strong> Operations requires a fleet <strong>of</strong> approximately<br />

375 ships that will increase our striking power from today’s<br />

12 carrier battle groups, to 12 Carrier Strike Groups, 12 Expeditionary<br />

Strike Groups, and multiple missile-defense Surface Action<br />

Groups and guided-missile submarines. These groups will<br />

operate independently around the world to counter transnational<br />

threats and they will join together to form Expeditionary Strike<br />

Forces — the “gold standard” <strong>of</strong> Naval power — when engaged<br />

in regional conflict.<br />

Sea Trial, Sea Warrior and Sea Enterprise<br />

We are developing Sea Strike, Sea Shield and Sea Basing through<br />

a supporting triad <strong>of</strong> organizational processes: Sea Trial,Sea Warrior<br />

and Sea Enterprise — initiatives that will align and accelerate<br />

the development <strong>of</strong> enhanced warfighting capabilities for the<br />

fleet .... The <strong>Navy</strong> starts with the fleet, and Sea Trial will be fleetled.<br />

The Commander, U.S. Fleet Forces Command, will serve as<br />

Executive Agent for Sea Trial, with Second and Third Fleet commanders<br />

sponsoring the development <strong>of</strong> Sea Strike, Sea Shield<br />

and Sea Basing capabilities. These commanders will reach<br />

throughout the military and beyond to coordinate concept and<br />

technology development in support <strong>of</strong> future warfighting effectiveness.<br />

The Systems Commands and Program Executive Offices<br />

will be integral partners in this effort,bringing concepts to reality<br />

through technology innovation and the application <strong>of</strong> sound<br />

business principles.<br />

The <strong>Navy</strong> Warfare Development Command, reporting directly to<br />

the Commander, U.S. Fleet Forces Command, will coordinate Sea<br />

Trial. Working closely with the fleets, technology development<br />

10 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


centers and academic resources, the <strong>Navy</strong> Warfare Development<br />

Command will integrate wargaming, experimentation, and exercises<br />

to speed development <strong>of</strong> new concepts and technologies.<br />

They will do this by identifying candidates with the greatest potential<br />

to provide dramatic increases in warfighting capability.<br />

Embracing spiral development,these technologies and concepts<br />

will then be matured through targeted investment and guided<br />

through a process <strong>of</strong> rapid prototyping and fleet experimentation.<br />

“ ... I don’t need anymore R&D bills for the old <strong>Navy</strong><br />

stovepipe — everything we build or buy — will be for<br />

a joint environment ...”<br />

... The Sea Warrior program implements our <strong>Navy</strong>’s commitment<br />

to the growth and development <strong>of</strong> our people. It will serve as the<br />

foundation <strong>of</strong> warfighting effectiveness by ensuring the right skills<br />

are in the right place at the right time. Led by the <strong>Chief</strong> <strong>of</strong> Naval<br />

Personnel and Commander, Naval Education and Training Command,Sea<br />

Warrior will develop naval pr<strong>of</strong>essionals who are highly<br />

skilled, powerfully motivated, and optimally employed for mission<br />

success.<br />

Traditionally, our ships have relied on large crews to accomplish<br />

their missions. Today, our all-volunteer service is developing new<br />

combat capabilities and platforms that feature dramatic<br />

advancements in technology and reductions in crew size. The<br />

crews <strong>of</strong> modern warships are streamlined teams <strong>of</strong> operational,<br />

engineering and information technology experts who collectively<br />

operate some <strong>of</strong> the most complex systems in the world. As<br />

optimal manning policies and new platforms reduce crew size<br />

further,we will increasingly need Sailors who are highly educated<br />

and expertly trained.<br />

In July 2001,we established Task Force EXCEL (Excellence through<br />

our Commitment to Education and Learning) to begin a revolution<br />

in training that complements the revolution in technologies,<br />

systems, and platforms for tomorrow’s fleet. We are dedicated to<br />

improving our Sailors’ pr<strong>of</strong>essional and personal development,<br />

leadership, military education, and performance. Task Force EX­<br />

CEL will apply information-age methods to accelerate learning<br />

and improve pr<strong>of</strong>iciency, including advanced trainers and simulators,tailored<br />

skills training programs,improved mentoring techniques,and<br />

more effective performance measurement and counseling<br />

tools.<br />

... Central to Sea Warrior is Project SAIL (Sailor Advocacy through<br />

Interactive Leadership). Project SAIL is moving the <strong>Navy</strong> toward<br />

an interactive and incentivized distribution system that includes<br />

guaranteed schools for high-performing non-rated personnel,<br />

team detailing,Internet job listings,an information call center and<br />

expanded detailer outreach. These actions will put choice in the<br />

process for both gaining commands and Sailors, and it will empower<br />

our people to make more informed career decisions. Our<br />

goal is to create a <strong>Navy</strong> in which all Sailors — active and reserve,<br />

afloat and ashore — are optimally assessed,trained and assigned<br />

so that they can contribute their fullest to mission accomplishment.<br />

Among the critical challenges that we face today are finding and<br />

allocating resources to recapitalize the <strong>Navy</strong>. We must replace<br />

Cold War-era systems with significantly more capable sensors,networks,<br />

weapons, and platforms if we are to increase our ability to<br />

deter and defeat enemies.<br />

Sea Enterprise, led by the Vice <strong>Chief</strong> <strong>of</strong> Naval Operations, is key to<br />

this effort. Involving the <strong>Navy</strong> Headquarters, the Systems Commands<br />

and the Fleet,it seeks to improve organizational alignment,<br />

refine requirements, and reinvest savings to buy the platforms<br />

and systems needed to transform our <strong>Navy</strong>. Drawing on lessons<br />

from the business revolution,Sea Enterprise will reduce overhead,<br />

streamline processes, substitute technology for manpower and<br />

create incentives for positive change. Legacy systems and platforms<br />

no longer integral to mission accomplishment will be retired,<br />

and we will make our <strong>Navy</strong>’s business processes more efficient<br />

to achieve enhanced warfighting effectiveness in the most<br />

cost-effective manner.<br />

...It is also important that our leaders understand sound business<br />

practices so that we can provide the greatest return on the<br />

taxpayer’s investment. To meet this need, we are creating<br />

educational opportunities to teach our leaders about executive<br />

business management, finance and information technology. For<br />

example, the Center for Executive Education at the Naval<br />

Postgraduate School brings together rising flag <strong>of</strong>ficers and<br />

private industry decision-makers to discuss emerging business<br />

practices. We must also extend this understanding to the<br />

deckplates,so that our future leaders gain experience in a culture<br />

<strong>of</strong> strengthened productivity and continually measured<br />

effectiveness.<br />

Increased inter-service integration also holds great promise for<br />

achieving efficiencies. For example, the <strong>Navy</strong> and Marine Corps<br />

tactical aviation integration plan will save billions <strong>of</strong> dollars for<br />

both services, enhance our interoperability, and more fully integrate<br />

our people. Whether it is the U.S. Coast Guard’s Deepwater<br />

Integrated Systems Program, new munitions being developed<br />

with the U.S. Air Force, joint experiments with the U.S. Army on<br />

high-speed vessels,or a new combined intelligence structure with<br />

the U.S. Marine Corps, we will share technologies and systems<br />

whenever possible ...Savings captured by Sea Enterprise will play<br />

a critical role in the <strong>Navy</strong>’s transformation into a 21st-century force<br />

that delivers what truly matters: increased combat capability.<br />

“... Generation X, what is that ... All I can say is that<br />

the young people in the <strong>Navy</strong> today fighting in<br />

defense <strong>of</strong> freedom are the best. I am very proud <strong>of</strong><br />

the job they are doing ...”<br />

Global Naval Power<br />

The 21st century is clearly characterized by dangerous uncertainty<br />

and conflict. In this unpredictable environment, military forces<br />

will be required to defeat a growing range <strong>of</strong> conventional and<br />

asymmetric threats. Sea Power 21 is our vision to align, organize,<br />

integrate, and transform our <strong>Navy</strong> to meet the challenges that lie<br />

ahead ... It is global in scope, fully joint in execution, and dedicated<br />

to transformation. It reinforces and expands concepts being<br />

pursued by the other Services — long-range strike; global<br />

intelligence,surveillance,and reconnaissance; expeditionary maneuver<br />

warfare; and light, agile ground forces — to generate<br />

maximum combat power from the joint team ...<br />

CHIPS Winter 2003 11


Edited from a brief given by<br />

Adm. Doran at TechNet Asia-<br />

Pacific 2002, November 2002.<br />

“Uniting and Securing the<br />

Pacific through Technology”<br />

is an appropriate theme,<br />

considering the vastness,<br />

diversity,and importance <strong>of</strong><br />

the region. Earlier this year,<br />

while addressing the Diet in<br />

Tokyo, President Bush said<br />

that the success <strong>of</strong> the Pa-<br />

Adm. Walter F. Doran cific is essential to the entire<br />

Commander, U.S. Pacific Fleet world, and that he’s convinced<br />

“the 21st century will<br />

be the Pacific century.” That’s quite an endorsement ...and,it highlights<br />

for us that a stable, united, and secure Pacific is in our, and<br />

the world’s best interest. As the Pacific Fleet Commander, that is<br />

one <strong>of</strong> my primary tasks and I need the help <strong>of</strong> all <strong>of</strong> you to accomplish<br />

it.<br />

Another important responsibility that I have is to organize, train<br />

and equip our Naval Forces for the Pacific Commander, in carrying<br />

out that responsibility, I depend on you again ... because we<br />

equip our Sailors with the systems and technology that you develop<br />

so that they can accomplish the mission. I’ll discuss that<br />

mission and our current operations and touch upon the technology,developed<br />

by many <strong>of</strong> you,that enables Sailors to succeed ...<br />

then I’ll describe our vision and goals for the future ... <strong>of</strong> which<br />

you are an increasingly important part.<br />

We are a 310 ship <strong>Navy</strong>. Today, 161 <strong>of</strong> these ships are underway<br />

or away from their homeport, and <strong>of</strong> these, 115 are deployed ...<br />

more than half from the Pacific. The USS Abraham Lincoln is flying<br />

missions over Iraq enforcing the Southern No-Fly zone. The<br />

ships <strong>of</strong> her Battle Group are enforcing U.N.Sanctions against Iraq<br />

and hunting for terrorists on the high seas with our allies. The<br />

Belleau Wood Amphibious Ready Group is wrapping up her tour<br />

in the region supporting Operation Enduring Freedom and contingency<br />

operations,and is headed home via some well-deserved<br />

port visits. The USS Kitty Hawk, our forward-deployed carrier<br />

homeported inYokosuka,Japan,recently completed Carrier Qualifications<br />

with her air wing and is a “full-up round” after a brief<br />

respite and a much-needed maintenance period. The Forward<br />

Deployed Naval Force truly remains the “Tip <strong>of</strong> the Spear” in the<br />

Western Pacific.<br />

The Essex Amphibious Ready Group, also homeported in Japan,<br />

is ready for tasking and training hard. The Constellation Battle<br />

Group left San Diego almost three weeks ago en route to the war,<br />

and the Tarawa Amphibious Ready Group is in the final stages <strong>of</strong><br />

their training. The Carl Vinson Battle Group is also training hard<br />

and will deploy soon. No surprises here. This is what we do, and<br />

we do it better than any <strong>Navy</strong> in history. None <strong>of</strong> us know what<br />

the future will hold — but the Pacific Fleet will be ready if called.<br />

This past year in support <strong>of</strong> the Global War on Terror, the <strong>Navy</strong><br />

has deployed seven Carrier Battle Groups,five Amphibious Ready<br />

Groups, and more than 80,000 Sailors and Marines to Southwest<br />

Asia. Less than a month after September 11, our pilots were flying<br />

combat missions over 1,000 miles inland taking the fight to<br />

the Taliban and al Qaeda with a 70 percent bombing effectiveness<br />

rate. This is a tribute to our outstanding Airmen and hardworking<br />

Sailors, and to you — the technical community — who<br />

develop the tools that help us do our jobs better and more efficiently.<br />

Much has been said about our asymmetric scientific and technological<br />

advantage, and how we will use this advantage to continue<br />

to dominate the battlespace. Your work in the critical areas<br />

<strong>of</strong> communications,electronics,intelligence and information systems,<br />

is helping us win the war on terrorism,and will be critical as<br />

we continue the fight against a distributed, elusive and dangerous<br />

enemy. While we ARE winning, the war is far from over as<br />

demonstrated inYemen,Indonesia,the Philippines and elsewhere.<br />

Thanks to you, our Sailors on the frontline have some extraordinary<br />

tools to accomplish their mission. Communications systems<br />

are more automated and much more reliable. Radioman have<br />

been transformed into <strong>Information</strong> Technicians. They manage a<br />

myriad <strong>of</strong> communications and Link systems including SHF, EHF<br />

SATCOM MDR, Link 16, Satellite Link 16 and multiple forms <strong>of</strong> old<br />

reliable Link 11.<br />

In addition to being the first battle group to deploy the F/A-18 E/F<br />

and taking forward our Sea Swap initiative with USS Fletcher —<br />

the Abraham Lincoln Battle Group has brought the Joint Fires Network,<br />

a network-centric warfare system that enables real-time<br />

engagement <strong>of</strong> time critical targets. This capability will allow ships<br />

in a battle group to share real time targeting and intelligence data<br />

with each other, as well as with other warfighting assets in a joint<br />

or coalition task force.<br />

Area Air Defense Commander capabilities also accompanied<br />

Lincoln to the fight, and next year’s deployment <strong>of</strong> Nimitz Battle<br />

Group will introduce Cooperative Engagement Capability to the<br />

Pacific Fleet. Today, Collaboration at Sea and K-WEB are addressing<br />

the challenge that Naval Forces face in connecting a large<br />

group <strong>of</strong> worldwide users to a significant amount <strong>of</strong> information,<br />

in an environment <strong>of</strong> low bandwidth and intermittent connectivity.<br />

Collaboration at Sea and K-WEB are addressing these issues<br />

through the use <strong>of</strong> three important tools: a standardized<br />

operational Web site for non-real time collaboration, chat capability<br />

for real time collaboration, and customized Web site replication<br />

to mitigate bandwidth limitations. In the past,Battle Group<br />

Commanders’ fireside chats were conducted via a satellite command<br />

circuit — a Communications <strong>Officer</strong>’s nightmare! Today,in<br />

many cases, they are conducted via chat room. Warfare Commanders<br />

have separate chat rooms to help manage the war, as<br />

do operators to share expertise and experience.<br />

A Joint Task Force can now train via the Web ...In the Pacific Fleet,<br />

we have just demonstrated the value and efficiency <strong>of</strong> this innovative<br />

training tool. Sailors, Soldiers, Airmen and Marines, making<br />

up a standing Joint Task Force, can train through Web-based<br />

technology at their individual duty stations. Then, when called<br />

upon, can assemble as a JTF and carry out missions directed by<br />

12<br />

CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


the Pacific Commander. This is truly transformational<br />

and has great potential for use, not<br />

only here, but in every theater. We are also<br />

pushing the bandwidth envelope. Photos <strong>of</strong><br />

suspected oil smugglers or terrorists are relayed<br />

back from the front where their pr<strong>of</strong>iles<br />

can be compared in worldwide databases.<br />

Through Distance Support, ship technicians<br />

are reaching back to CONUS for help in<br />

troubleshooting and repairing casualties allowing<br />

ships to stay on station and minimize<br />

the expense <strong>of</strong> flying technicians to the theatre.<br />

There are many other examples. Advances<br />

in IT have taken the <strong>Navy</strong> into the 21st<br />

Century. We are breaking new ground with unmanned vehicles,<br />

shortening the timeline from sensor to shooter, and adding precision<br />

and lethality to our weapons.<br />

But, as we all know, advancement and innovation does not come<br />

without challenges. One such challenge is bandwidth. Our new<br />

Arleigh Burke Aegis Destroyers, even with a Dual Inmarsat capability,<br />

are limited to 64 kilo bits per second, and [they] have multiple<br />

antenna blind zones to manage. Bandwidth allocation and<br />

management — Fleet and Battle Group-wide — is still a challenge,<br />

as is interoperability with our coalition, and in some cases,<br />

joint partners. The Coalition Wide Area Network is a success and<br />

being used extensively during Operation Enduring Freedom as a<br />

critical communications link with our coalition partners. However,<br />

COWAN has many restrictions making information sharing<br />

across the coalition <strong>of</strong>ten very, very difficult. We must get this<br />

right.<br />

These are some <strong>of</strong> the nagging problems that Sailors work<br />

through daily. The future holds the solutions to these problems,<br />

because you will deliver them along with other advances and innovations<br />

not yet imagined. To achieve this goal — with your<br />

help and capability — we in uniform must share our vision <strong>of</strong> the<br />

future. I’m convinced the future is exciting for the U.S. <strong>Navy</strong> ...<br />

and while our focus remains unquestionably the Global War On<br />

Terrorism, we must plan and prepare for a dynamic and indeed<br />

an uncertain future. Today’s strategic environment is far less stable<br />

than the era <strong>of</strong> the Cold War where we had predominantly one<br />

competitor and adversary — the former Soviet Union.<br />

Today in the Pacific we face a multitude <strong>of</strong> threats from state and<br />

non-state actors magnified by the proliferation <strong>of</strong> weapons <strong>of</strong><br />

mass destruction. To effectively deal with this destabilizing and<br />

dangerous threat, we must recapitalize our force, transform, and<br />

distribute our combat power. As defined by Adm.Clark,our CNO,<br />

Sea Power 21 is the blueprint for this change organized around<br />

three core operational concepts: Sea Strike (projecting precise,<br />

persistent, and decisive firepower globally from the sea), Sea<br />

Shield (projecting defensive power deep overland to protect our<br />

joint forces and ensure our access to the littoral), and Sea Basing<br />

(projecting operational independence for our joint forces from<br />

the sea).<br />

The glue that binds these concepts together is ForceNet ... a concept<br />

that is being developed by Vice Adm.Dick Mayo and his crew<br />

at the new Naval Network Warfare Command. ForceNet, when<br />

fully developed,will integrate our ships,sensors and weapons into<br />

a networked combat force. The first step toward ForceNet is, in<br />

USS Abraham Lincoln (CVN 72)<br />

Nov. 24, 2002 — EWS2 Sarah<br />

Lanoo operates a Naval Tactical<br />

Data System (NTDS) console in<br />

the Combat Direction Center<br />

(CDC) aboard USS Abraham<br />

Lincoln. The Abraham Lincoln is<br />

on a regularly scheduled<br />

deployment conducting combat<br />

operations in support <strong>of</strong><br />

Operation Southern Watch. U.S.<br />

<strong>Navy</strong> photo by PH3 Patricia<br />

Totemeier.<br />

the near term, to network legacy systems and remove systems<br />

that can’t be networked. Sea Power 21 will be implemented by a<br />

Naval Global Concept <strong>of</strong> Operations that restructures our force<br />

and distributes our striking power. Tomorrow’s force will be made<br />

up <strong>of</strong> Carrier and Expeditionary Strike Groups, Missile Defense<br />

Surface Action Groups,the Cruise Missile Nuclear Submarine and<br />

a faster, more capable, and more versatile combat logistics force<br />

— all networked together.<br />

In fact,in the coming year, both the Pacific and Atlantic Fleets will<br />

use deployers to experiment with the Expeditionary Strike Group<br />

[ESG - an amphibious ship with embarked Marine Expeditionary<br />

Units,a cruiser,a destroyer,a frigate,an attack submarine and dedicated<br />

P-3 Orion surveillance aircraft] concept, it combines surface<br />

combatants and submarines with our Amphibious Ready<br />

Groups and gives us greater operational agility and <strong>of</strong>fensive capability.<br />

The experiments look different on each coast ... In the<br />

Pacific we will add a Flag <strong>Officer</strong> in command with an operational<br />

staff ...this will give us an opportunity to compare and learn from<br />

two different approaches. We will also experiment with this concept<br />

early next year during Exercise Tandum Thrust.<br />

Sea Power 21 supporting initiatives already in development are:<br />

Sea Trial (a fleet-led effort to identify and transition promising<br />

capabilities to our ships through aggressive experimentation),Sea<br />

Warrior (an innovative training and detailing approach to ensure<br />

our Sailors are given the right skills, and are detailed commensurate<br />

with these skills at the right time),and Sea Enterprise (a badly<br />

needed streamlining <strong>of</strong> our resource and acquisition process). In<br />

the development <strong>of</strong> ForceNet, clearly there is a role for the technology<br />

community — your intellect,and experience,at every step<br />

<strong>of</strong> the transformation process to make Sea Power 21 a reality. It’s<br />

going to be a fast and exciting ride and we will take it together. I<br />

will go further to say that your role in this process is absolutely<br />

vital. You are the source <strong>of</strong> our asymmetric advantage and the<br />

ones who, year after year, deliver our Sailors the tools to keep our<br />

nation safe.<br />

Earlier this year,at the Argonne National Laboratory in Illinois,the<br />

President said, “In this new war, we will rely upon the genius and<br />

creativity <strong>of</strong> the American people. Our scientific community is serving<br />

on the front lines <strong>of</strong> this war, by developing new technologies<br />

that will make America safer.” He couldn’t be more right and this<br />

is the charge for each and every one <strong>of</strong> you. I hope that I have<br />

given you an adequate picture <strong>of</strong> where the <strong>Navy</strong> is, where we<br />

are going, and how much we appreciate and depend on your<br />

service. We all have a great challenge ahead <strong>of</strong> us, and I am confident<br />

that together we will meet those challenges.<br />

CHIPS Winter 2003 13


It is a great pleasure to be with you to discuss<br />

the state <strong>of</strong> the U.S. <strong>Navy</strong> ... I had the<br />

great pleasure <strong>of</strong> welcoming the USS<br />

Monitor’s turret home to Hampton Roads<br />

a few weeks ago. It was an impressive occasion.<br />

I think Monitor’s story has great<br />

lessons for Americans.<br />

In many ways USS Monitor symbolizes<br />

both the best and worst about America. In<br />

my view, America’s greatest quality is our<br />

innovative spirit. Our freedom, ideas and<br />

actions have produced the world’s greatest<br />

inventions and subsequently the greatest<br />

economy. At the same time,Americans<br />

have short memories. We, too quickly forget<br />

the sacrifices that have been made by<br />

so many to make this nation what it is today.<br />

USS Monitor was clearly the most innovative<br />

ship <strong>of</strong> her day — an iron ship,172-feet<br />

long with a 41-feet, 6-inch beam and two<br />

12-inch guns housed in a revolving turret.<br />

There are many first’s associated with the<br />

USS Monitor, she was the first ship to have<br />

a revolving turret, she was the first ship<br />

where the <strong>of</strong>ficers and crew had to live<br />

entirely below the waterline, she was the<br />

first ship credited with having below waterline<br />

flushing toilets. [But] most important<br />

was the crew. The crew — like all <strong>of</strong><br />

our Sailors today — were strictly volunteers.<br />

Those young people valiantly fought the<br />

USS Virginia to a draw and ended Virginia’s<br />

unchallenged assault on the U.S.Fleet. But<br />

what too many people forget is that those<br />

men went down in a storm because Monitor<br />

wasn’t really ready for action. Our greatest<br />

weakness is that [our] memories are too<br />

short. USS Monitor was an innovative ship,<br />

but we could have done better.<br />

The fact is that the Monitor’s pumps were<br />

inadequate to keep her from sinking during<br />

stormy weather in December 1862.<br />

Talking with Vice Adm. Albert H. Konetzni, Jr., USN<br />

Deputy and <strong>Chief</strong> <strong>of</strong> Staff U.S. Atlantic Fleet<br />

“When President Theodore Roosevelt announced that the nation would ‘Speak s<strong>of</strong>tly<br />

and carry a big stick,’ the big stick he was referring to was the United States <strong>Navy</strong> ...”<br />

Edited from remarks given by Vice Adm. Konetzni at the USNI Warfare Exposition and Symposium,<br />

Oct. 2, 2002.<br />

The USS Monitor’s construction had been<br />

rushed because the U.S.<strong>Navy</strong> was too slow<br />

to embrace ironclads. In the end, Monitor<br />

sunk not from enemy fire, but from faulty<br />

systems and design. That is the message I<br />

want to bring to you today. We have a great<br />

country, capable <strong>of</strong> awesome Naval innovation.<br />

We have great young men and<br />

women, who will carry the day when the<br />

nation calls. If we ignore history we will allow<br />

our readiness to slip and our force<br />

structure to dwindle. Our young people<br />

are the ones who will suffer the consequences.<br />

Innovation, especially in America, is truly<br />

accelerating. Think <strong>of</strong> how the cellular telephone<br />

and personal computer have<br />

changed our lives. Technologies like the<br />

Global Positioning System and unmanned<br />

systems are changing the way we live and<br />

fight. I am convinced that these are just<br />

the tips <strong>of</strong> the technological iceberg <strong>of</strong><br />

change. The question is: How do we capture<br />

these innovations and use them correctly<br />

to ensure that we are ready for the<br />

challenges ahead In my view, great innovations<br />

will only be successful if they are<br />

formed by knowledge <strong>of</strong> history. We have<br />

not always applied American ingenuity<br />

soon enough to make a difference.<br />

History is full <strong>of</strong> examples <strong>of</strong> [America] not<br />

being ready for the worst: World War II —<br />

after a devastating blow at Pearl Harbor,we<br />

sent our submarines to the fight with torpedoes<br />

that didn’t work; in Korea — our<br />

soldiers froze because they didn’t have<br />

warm clothing and we didn’t have the<br />

bridge forging machines that we needed.<br />

In Vietnam — we didn’t build the national<br />

and military resolve necessary to win.<br />

Unfortunately, the war on terrorism in<br />

some ways is no different. I could go on all<br />

day about the [problems] <strong>of</strong> the nineties ...<br />

as a result, our <strong>Navy</strong> had some real problems<br />

at the start <strong>of</strong> the war [on terrorism].<br />

We didn’t have enough bombs to get the<br />

job done and were forced to borrow thousands<br />

from the U.S. Air Force. Years <strong>of</strong> neglect<br />

on maintaining the Fleet showed, as<br />

we had to pump millions <strong>of</strong> dollars into the<br />

USS John F. Kennedy to get her underway.<br />

The size <strong>of</strong> our Fleet is dwindling toward<br />

300 ships or lower — yet we don’t have the<br />

resources to build ships while at the same<br />

time maintain the ones we have.<br />

Our nation’s foreign policy with regard to<br />

terrorism was also rather naive. In hindsight,it<br />

is clear that our response to terrorism<br />

pre-9-11 was inadequate. If we had<br />

taken the time to understand history and<br />

our cultural differences with other people,<br />

we may have seen the signs <strong>of</strong> 9-11 on the<br />

horizon. Whether it was Lebanon, Khobar<br />

Towers, our embassies in Africa,or the USS<br />

Cole, our responses were piecemeal and<br />

ineffective ...<br />

History has told us that wars always result<br />

from miscalculation. We left the impression<br />

in the minds <strong>of</strong> the terrorists that we<br />

were weak and unwilling to risk going after<br />

them. We left the widespread idea that<br />

America would only lob a few rockets and<br />

then go home. How wrong they were ...<br />

...I don’t want you to get the impression<br />

that I am negative — quite the opposite.<br />

We are making real progress in this war.<br />

The Taliban that supported al Qaeda is no<br />

longer in power in Afghanistan. Almost<br />

2,000 terrorists and their supporters have<br />

been captured. President Bush is serious<br />

when he says that “We will not stop until<br />

we get them all.” Naval Forces are the<br />

14 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


difference-makers in this new war: ♦In the last year, six CVBGs<br />

Mine Warfare ...<br />

(Carrier Battle Groups) and seven ARGs (Amphibious Ready<br />

Groups) have sustained our Seals and Marines over 600 miles<br />

inland. ♦The USS Kitty Hawk (CV-63) deployed immediately to<br />

serve as a forward operating base for our special forces. ♦Carrier<br />

Aircraft have struck over 2,000 targets on missions that have<br />

sometimes lasted over 12 hours. ♦Our ships have launched over<br />

100 tomahawk missiles. ♦We have conducted over 200<br />

boardings in support <strong>of</strong> operations aimed at capturing fleeing<br />

terrorists.<br />

We are winning the war on terrorism mainly because <strong>of</strong> our wonderful<br />

people in the military. It comes as no surprise to me that<br />

our young people have performed so brilliantly. There has been<br />

a lot <strong>of</strong> talk about this generation or that generation,but let there<br />

be no doubt — this current generation is up to the challenge. I<br />

have vivid memories <strong>of</strong> meeting with a young Seal at the Portsmouth<br />

Naval Hospital. I can’t tell you his name, but his nickname<br />

is Turbo. Turbo went to some hellish places to take on al Qaeda.<br />

He gave his left leg for his country and some <strong>of</strong> his buddies gave<br />

their lives. You can be proud <strong>of</strong> your <strong>Navy</strong>’s performance during<br />

this war on terrorism. The simple fact is that we could not have<br />

executed the campaign in Afghanistan without our nation’s aircraft<br />

carriers and all the ships — and all the young people that<br />

support them. At the same time, however, we all know that the<br />

nation is not building enough ships and submarines to accomplish<br />

all we are being asked to do today and in the future. We<br />

need 8 to 10 [new ships] per year to sustain current force structure;<br />

we will build 5 in FY02.<br />

Our efforts in Afghanistan have proven the U.S. <strong>Navy</strong> is truly the<br />

key to success in 21st century warfare where we <strong>of</strong>ten will not<br />

have forward bases from which to operate. Our dilemma is that<br />

given our current resources, we can’t maintain a forward fleet,<br />

fight the war, maintain our ships at the right level <strong>of</strong> readiness,<br />

and build enough ships to have a future fleet that is adequate.<br />

First, we need to be more efficient — then we must argue for an<br />

appropriate bottom line. The nation needs to know the consequences<br />

for not maintaining and building an adequately sized<br />

fleet. So now, the problem that we as a nation face: Which vital<br />

missions do we ignore Which ships do we allow to rust at the<br />

pier Which world crisis do we neglect in order to respond to<br />

some other crisis, somewhere else We need to make the intellectual<br />

argument for fully funded depot level maintenance, and<br />

building the right number <strong>of</strong> ships and aircraft. In the end, the<br />

Congress and the public need to understand that maintaining<br />

the most capable <strong>Navy</strong> in the world is expensive. But it is still the<br />

best security investment for their dollar.<br />

I need your help in keeping the <strong>Navy</strong> at the forefront <strong>of</strong> the<br />

public’s mind. I ask you to read, speak, think and write about our<br />

<strong>Navy</strong>’s future. Start a debate. Try and answer some questions<br />

like: Do we need more ships,aircraft and submarines If so, why<br />

For what missions What should the future Fleet look like Do<br />

we have ship maintenance right or is more needed Are we on<br />

the right course with regard to attrition, retention and leadership<br />

How can we meet the threats <strong>of</strong> terrorism and weapons <strong>of</strong><br />

mass destruction Is Asia going to explode How can we ensure<br />

it doesn’t In the end, it’s your <strong>Navy</strong> and decisions made without<br />

a healthy debate are always flawed.<br />

Edited from a brief given by Vice Adm.Konetzni, Jr., Deputy and <strong>Chief</strong><br />

<strong>of</strong> Staff, U.S. Atlantic Fleet at the USNI Warfare Exposition and<br />

Symposium. Vice Adm. Konetzni invited the press to a dialogue on<br />

mine warfare to fully understand the scope <strong>of</strong> Naval requirements.<br />

Thanks to Rear Adm. Paul Ryan, Commander MINEWARCOM and Lt.<br />

j.g.Herlina Rojas,MINEWARCOM Public Affairs <strong>Officer</strong>,for their expert<br />

insight and comments regarding this article.<br />

Sea mines have been an historically important factor in naval warfare.<br />

Mines have caused major damage to naval ships, slowed or<br />

stopped commercial shipping, and forced the alteration <strong>of</strong> strategic<br />

and tactical plans. Fourteen U.S.<strong>Navy</strong> ships have been sunk<br />

or damaged by mines since World War II (see Figure 1), over three<br />

times the number damaged by air and missile attack. Today, advancing<br />

technology heightens the threat posed by mines, making<br />

them more difficult to detect, classify and neutralize. These<br />

experiences,plus the ready availability to potential adversaries <strong>of</strong><br />

inexpensive sea mines (see Figure 2) have increased interest in<br />

mine warfare within the U.S.<strong>Navy</strong>. In 1995, the <strong>Chief</strong> <strong>of</strong> Naval Operations<br />

directed that mine warfare receive greater emphasis and<br />

become an integral capability <strong>of</strong> battle forces rather than remain<br />

the sole province <strong>of</strong> a dedicated force.<br />

Mine warfare (MIW) is comprised <strong>of</strong> both mining operations and<br />

mine countermeasures, and may be either <strong>of</strong>fensive or defensive<br />

in nature. Mine countermeasures (MCM) incorporate much more<br />

than actual mine detection and neutralization. Key elements <strong>of</strong><br />

MCM include: intelligence; reconnaissance and warning; development<br />

and exploitation <strong>of</strong> environmental databases; reduction<br />

<strong>of</strong> ships’ magnetic and acoustic signatures; and specialized training<br />

in mine warfare tactics.<br />

Successful integration <strong>of</strong> MIW capability into battle group units<br />

requires its promotion as a major warfare area, similar to the traditional<br />

air, surface and submarine specialties. Each <strong>of</strong> these warfare<br />

specialties has a“sponsor,”specific to the platform type,within<br />

the OPNAV requirements division (N7). In contrast, MIW, in which<br />

effective execution requires use <strong>of</strong> platforms from various warfare<br />

specialties, has a capabilities-based sponsor, Expeditionary<br />

Warfare (N75). Public law [10 USC 505] mandates this sponsorship.<br />

Careful consideration should be given to the appropriate<br />

sponsorship for Mine Warfare so that the benefits <strong>of</strong> capabilitiesbased<br />

sponsorship can be maintained while advancing the emphasis<br />

on Mine Warfare as a vital warfare competency.<br />

The development <strong>of</strong> MIW capability within the battle force is<br />

known as“mainstreaming.” Mainstreaming <strong>of</strong> MIW can and should<br />

be happening today, independent <strong>of</strong> the introduction <strong>of</strong> organic<br />

mine warfare capabilities into the battle force. Fielding a MCM<br />

capability organic to battle force units provides increased impetus<br />

to development <strong>of</strong> MIW expertise. At the same time,<br />

mainstreaming provides the pr<strong>of</strong>essional foundation on which<br />

effective utilization <strong>of</strong> future organic assets will be built. However,<br />

mainstreaming, with its emphasis on development <strong>of</strong> capabilities<br />

within the battle force,may lead to the misconception that<br />

new organic mine countermeasures systems (OMCM) are<br />

replacements for existing dedicated platforms. This is not the case.<br />

CHIPS Winter 2003 15


USS COLE DDG-67<br />

TERRORIST<br />

ATTACK<br />

Mines Damage More U.S. Warships Since 1950<br />

KOREA 1950-52<br />

VIETNAM 1969-72<br />

ISRAEL 1967<br />

IRAN 1987-88<br />

IRAQ 1991<br />

USS STARK FFG-31<br />

MISSILE<br />

USS LIBERTY<br />

AGTR-5<br />

TORPEDO<br />

USS HIGBEE<br />

DDG-806<br />

USS LIBERTY<br />

AGTR-5<br />

AERIAL<br />

ATTACK<br />

Figure 1.<br />

A good way to view the distinction between organic and<br />

dedicated MIW resources is to classify them either as tactical or<br />

strategic assets. Organic MCM systems are tactical in nature. They<br />

are resident within the battle group, and are intended to provide<br />

the ability to detect mines and a limited minesweeping capability<br />

that permits “punching through” a minefield if necessary.<br />

Dedicated MCM systems are theater or strategic assets. They are<br />

intended to provide large area or long-term MCM capability.<br />

Mine Warfare Command (MINEWARCOM) demonstrated its capability<br />

during a ten day at sea training period in the Gulf <strong>of</strong><br />

Mexico in October 2002 with Norfolk-based USS Kearsarge<br />

(LHD 3). USS Kearsarge, acting as a stand-in Mine Warfare Command<br />

ship, embarked airborne, surface and undersea MCM personnel<br />

and equipment from Naval Station (NS) Ingleside and<br />

Naval Air Station (NAS) Corpus Christi during this simulated wartime<br />

scenario. According to Rear Adm. Paul Ryan, Commander,<br />

Mine Warfare Command, mine warfare forces are expeditionary<br />

by design. Packing up and going where needed and when<br />

needed is how mine warfare was conducted prior to Desert Storm<br />

and prior to having a dedicated mine warfare command and support<br />

ship. “This exercise familiarized a new generation <strong>of</strong> mine<br />

warfare personnel with the details <strong>of</strong> embarking on a ship <strong>of</strong> opportunity,”said<br />

Ryan.<br />

During the exercise,MINEWARCOM used USS Kearsarge as a host<br />

ship and exercised all three legs <strong>of</strong> the MCM triad: airborne, surface<br />

and underwater MCM. A squadron <strong>of</strong> MH-53 minehunting<br />

helicopters from NAS Corpus Christi provided airborne MCM. Explosive<br />

ordnance disposal (EOD) units embarked on USS<br />

Kearsarge provided underwater MCM. Three NS Ingleside<br />

minehunter and minesweeper ships, USS Sentry (MCM 3), USS<br />

Scout (MCM 8) and USS Devastator (MCM 6), provided surface<br />

MCM. “We utilized USS Kearsarge the same way we utilized USS<br />

Inchon. We hunted for exercise mines,swept the mines once they<br />

were located, and used EOD personnel to neutralize designated<br />

mines,” added Ryan. When the exercise was completed, USS<br />

Kearsarge returned to Norfolk.<br />

Since the decommissioning <strong>of</strong> USS Inchon in June 2002,the <strong>Navy</strong><br />

has been evaluating options for a permanent replacement. In<br />

October,the <strong>Navy</strong>’s Military Sealift Command awarded a $21 million<br />

one-year charter contract with renewable one-year options<br />

to Bollinger/Incat USA, L.L.C. for the leasing <strong>of</strong> a High Speed Ves-<br />

USS PRINCETON CG-59<br />

USS TRIPOLI LPH-10<br />

USS B. ROBERTS FFG-58<br />

USS WESTCHESTER COUNTY LST-1167<br />

USS BARTON DD-772<br />

USS MANSFIELD DD-728<br />

USS WALKE DD-723<br />

USS E.G. SMALL DDR-838<br />

USS BRUSH DD-745<br />

USS SARSI ATF-111<br />

USS PARTRIDGE AMS-31<br />

USS PLEDGE AM-277<br />

USS PIRATE AM-275<br />

USS MAGPIE AMS-25<br />

MINE<br />

What is the<br />

Threat<br />

•Cheap<br />

•Lethal<br />

•Asymmetric<br />

•Widely<br />

Proliferated<br />

275,000 Mines<br />

Worldwide<br />

Figure 2.<br />

sel (HSV). The ship will support U.S.<strong>Navy</strong> Mine Warfare Command<br />

and serve as a test platform for experiments with advanced hull<br />

and propulsion technology integrated with advanced communications<br />

technology. Currently, the HSV is slated to participate in<br />

three exercises from September to December 2003. These exercises<br />

include Atlantic Fleet Joint Task Force Exercise,Gulf <strong>of</strong> Mexico<br />

(GOMEX 04-1) Exercise and Pacific Fleet Joint Task Force Exercise.<br />

Top: EOD units embarked aboard USS Kearsarge (LHD 3) launch their<br />

RHIBs (Rigid Hull Inflatable Boats) from the ship’s well deck while<br />

three minesweepers from Naval Station Ingleside look on. Bottom:<br />

The <strong>Navy</strong>’s HSV-1X. (U.S. <strong>Navy</strong> photos.)<br />

Mine Countermeasures Ship (MCM/MHC) Reliability<br />

The need for U.S. Naval forces to maneuver and project power in<br />

the world’s littorals is increasing. Littorals are highly susceptible<br />

to extensive enemy mining. Current MCM force consists <strong>of</strong> 14<br />

MCMs with minesweeping (mechanical, magnetic and acoustic)<br />

and minehunting (detect,classify,identify,neutralize) capabilities,<br />

and 12 MHCs with mine hunting capabilities only. Dedicated MCM<br />

capability is required for deliberate, large-area mine clearance.<br />

Planned organic capabilities provide “See & Avoid” hunting and<br />

16 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


Near-Term Recommendations<br />

•With the decommissioning <strong>of</strong> Inchon, make MCS functions<br />

portable.<br />

•Plan to use “Large Deck <strong>of</strong> Opportunity.”<br />

•Exercise portable functions regularly.<br />

•Plan for a replacement MCS.<br />

•Re-engine MCM/MHCs with priority on MCMs (~ $100 million).<br />

-Consider intermediate maintenance contract for diesels.<br />

•Support long-range class modernization program.<br />

•Require frequent deployments to improve fleet engagement.<br />

Mid-Term Recommendations<br />

•Retain MH-53E until an adequate replacement is developed.<br />

•Upgrade MH-53E with “Organic” technologies.<br />

•Support “Organic” introduction plan.<br />

•Fund current dedicated MCM forces.<br />

•Upgrade dedicated MCM force with proven organic technology.<br />

•Fund phased acquisition <strong>of</strong> a stand<strong>of</strong>f mining capability.<br />

•Fund development and phased acquisition <strong>of</strong> modern mine<br />

inventory.<br />

Long-Term Recommendations<br />

•Make unmanned sweeping systems a fleet requirement.<br />

•Demonstrate concept with current systems.<br />

-Ex:Unmanned Surface Vessel (USV) tows MK-106 Sled/SQS-20.<br />

•Consider MCS(X) options with emphasis on unmanned systems.<br />

Figure 3. Mine Warfare Study Outline<br />

“Punch Through Clearance” but are insufficient for sustained,<br />

large-scale mine clearance. MCM ships require upgrades to improve<br />

equipment reliability through their planned service life<br />

(~2022). C4I upgrades are required to maintain MCM/MHC effectiveness.<br />

Mine Warfare<br />

MIW is composed <strong>of</strong> both Mining and MCM. The proliferation <strong>of</strong><br />

inexpensive, lethal sea mines makes MIW a critical war fighting<br />

capability. Combating mine threat requires an amalgam <strong>of</strong> surface,<br />

air and undersea capabilities. The variety <strong>of</strong> platforms and<br />

equipment involved makes assignment <strong>of</strong> the optimum OPNAV<br />

program sponsorship difficult. OPNAV program sponsorship must<br />

be properly aligned to ensure that maximum benefit is obtained<br />

from scarce resources. Capabilities-based rather than platformbased<br />

sponsorship may provide MIW with better representation.<br />

The future <strong>of</strong> MIW lies with emerging technologies,and will most<br />

likely include the use <strong>of</strong> unmanned,undersea vehicles (UUVs),remotely<br />

controlled sensor arrays and various other undersea platforms/weapons.<br />

The future vision <strong>of</strong> distributed sensor fields with<br />

embedded autonomous mines plus remotely controlled<br />

minefields will require extensive water space management.<br />

Organic Mine Countermeasures (OMCM) Capabilities<br />

A key requirement <strong>of</strong> Naval Studies Planning Group objectives is<br />

to develop mine detection and clearance capabilities organic to<br />

CV [carrier] battle groups (shown in Figure 4) permitting these<br />

forces to identify, avoid, or neutralize mines within operationally<br />

acceptable timelines and with acceptable levels <strong>of</strong> operational<br />

risk. On-scene MCM capabilities,through introduction <strong>of</strong> organic<br />

capabilities into all CVBGs, will be completed by 2012. Introduction<br />

<strong>of</strong> these capabilities to the first CVBG is planned for 2005.<br />

CVBGs are currently deployed with limited active MCM capabilities.<br />

MIW capabilities include intelligence collection and surveillance;<br />

notification <strong>of</strong> imminent mining; interdiction; post-interdiction<br />

intelligence evaluation and dissemination; and passive<br />

MCM (threat awareness and signature control). Embedded MIW<br />

capabilities are not being fully realized. Current C2F/C3F<br />

mainstreaming initiatives are focused on leveraging these embedded<br />

capabilities today. CVBGs today have no capability to<br />

detect or avoid mines (except for drifters or detecting minelayers<br />

and localizing the potential hazard area to avoid). The Kingfisher<br />

system (a funded s<strong>of</strong>tware upgrade to the SQS-53 Sonar)<br />

may provide a mine avoidance capability, but will require a dedicated<br />

operator training program that does not exist today.<br />

The proliferation <strong>of</strong> inexpensive, lethal sea mines<br />

makes MIW a critical war fighting capability.<br />

Combating mine threat requires an amalgam <strong>of</strong><br />

surface, air and undersea capabilities.<br />

Seven OMCM systems are currently under development and<br />

planned for battle group introduction. These systems are<br />

intended to instill an MCM capability “organic” to battle group<br />

forces. This capability will not be adequate to replace the<br />

dedicated MCM forces that currently exist. ♦The Long-term Mine<br />

Reconnaissance System (LMRS) is an autonomous UUV,launched<br />

and recovered from 688- and 744-class submarines, which<br />

provides clandestine mine reconnaissance (detection and limited<br />

classification) for advanced battle space preparation. A LMRS<br />

system on a host submarine would yield a total system area<br />

coverage <strong>of</strong> up to 400-650 square nautical miles. Engineering<br />

challenges include meeting mission reliability goals; achieving<br />

reliable launch and recovery;meeting ambitious reduced radiated<br />

noise goals; certifying an advanced high-density primary battery<br />

for submarine use; and developing effective computer-aided<br />

detection/classification algorithms. Nets, cables, nonmilitary<br />

shipping and other obstacles,or piracy <strong>of</strong> the unit can potentially<br />

cause premature mission abort. LMRS navigation accuracy<br />

remains a potential issue for contact reacquisition, identification<br />

and mine neutralization. ♦The Remote Mine-hunting System<br />

(RMS) includes a semiautonomous,semi-submersible vehicle that<br />

Figure 4.<br />

Organic Mine Warfare<br />

A Tactical Battle Group Asset<br />

Incorporates a mixture <strong>of</strong> low, medium and high risk<br />

options with a good anticipated rate <strong>of</strong> return<br />

CHIPS Winter 2003 17


tows mine reconnaissance sonar and is launched and recovered<br />

by surface ships. Engineering challenges include achieving<br />

desired high duty cycles and demonstrating reliable launch and<br />

recovery techniques even in high sea states. Nets, cables,<br />

nonmilitary shipping and other obstacles, or piracy <strong>of</strong> the unit<br />

can potentially cause premature mission abort.<br />

Five remaining MCM systems are airborne (AMCM) being developed<br />

primarily for the MH-60s with various launch dates between<br />

2003 and 2007. ♦The AN/AQS-20X, an evolution <strong>of</strong> current technology,<br />

is a towed mine hunting system that includes identification<br />

capability. A key engineering challenge includes enhanced<br />

CAD/CAC algorithms to achieve reduced false contact rates. ♦The<br />

Airborne Mine Neutralization System (AMNS) is an expendable,<br />

remotely operated, mine neutralization device compatible with<br />

both MH-60s and MH-53E. Deployment from MH-60s including<br />

associated munitions certification tests must be demonstrated.<br />

♦The Organic Airborne and Surface Influence Sweep (OASIS) is a<br />

combination magnetic/acoustic influence sweep towed system.<br />

It provides only OMCM influence sweep capability. Engineering<br />

challenges include ensuring the ability to survive shallow water<br />

detonations from various mines and achieving appropriate tow<br />

depths and speed to effectively sweep certain difficult shallow<br />

water bottom influence mines. Its 800 amp system provides<br />

roughly half the capability <strong>of</strong> the MK-105 sled. Significant depth<br />

and sweep limitations may prove inadequate for many areas.<br />

♦The Airborne Laser Mine Detection System (ALMDS) is an<br />

electro-optical-based mine reconnaissance system capable <strong>of</strong><br />

rapid detection,localization,and classification <strong>of</strong> mines on or very<br />

near the sea surface (about 40-feet water depth, dependent on<br />

turbidity). Engineering challenges include achieving desired or<br />

acceptable false contact rates and achieving adequate depth coverage<br />

under likely conditions. ♦The Rapid Airborne Mine Clearance<br />

System (RAMICS) is a gun system designed to rapidly acquire,<br />

target and neutralize floating and near-surface moored<br />

mines. It is the least mature <strong>of</strong> the airborne MCM systems. Engineering<br />

challenges include establishing safe helicopter stand<strong>of</strong>f<br />

distances from floating or very-near-surface mines,and establishing<br />

a gun and turret installation concept that minimizes the impact<br />

on the aircraft in terms <strong>of</strong> loads, recoil and flight dynamics.<br />

The <strong>Navy</strong>’s implementation plan for OMCM includes a mixture <strong>of</strong><br />

low, medium and high-risk options with good anticipated rates<br />

<strong>of</strong> return.<br />

Mining Issues and Recommendations<br />

For a variety <strong>of</strong> reasons, the U.S. <strong>Navy</strong> risks a severely limited ability<br />

to conduct mining operations. Without high-level attention<br />

and funding now, this critical warfare requirement will be seriously<br />

degraded within the next five years. Current mine inventories<br />

are adequate to meet requirements for most scenarios, however<br />

the small size and advanced age <strong>of</strong> the stockpile limit operational<br />

flexibility. A stand<strong>of</strong>f/high altitude mine delivery capability<br />

is necessary for mining to be a viable <strong>of</strong>fensive capability. A<br />

conversion kit is needed for the existing MK-62, MK-63 and MK­<br />

65 Quickstrike series mines. This is an unfunded requirement. A<br />

Tactical Decision Aid is necessary to restore a Fleet Level Minefield<br />

Planning capability. Currently all minefields must be planned by<br />

reachback. A replacement for the MK-56 intermediate depth<br />

moored mine is necessary to retain a mining response in the 150<br />

to 600 feet regime. The Submarine Launched Mobile Mine (SLMM)<br />

provides the only clandestine mining capability. This weapon is<br />

rapidly reaching end <strong>of</strong> service life and is not compatible with<br />

Virginia Class submarines. I-SLMM development was stopped<br />

when Australia backed out <strong>of</strong> a bilateral development agreement<br />

due to funding. I-SLMM would double the payload over SLMM (2<br />

mines vice 1), use the much more capable MK-48 torpedo, and<br />

provide a digital fire control capability/compatibility. The <strong>Navy</strong>’s<br />

core mining infrastructure has been reduced to 21 engineers and<br />

scientists, and we continue to lose this talent to other programs<br />

as funding continues to be reduced. Further reductions in infrastructure<br />

funding will soon eliminate our ability to develop replacement<br />

mines without a significant reinvestment in time and<br />

funding.<br />

Vision/Requirements<br />

The U.S. Naval Mine Warfare Plan (developed by Adm. Johnson/<br />

Gen. Jones, 2000) states that sea mines remain a classic, low-cost<br />

force multiplier <strong>of</strong> increased importance during fleet downsizing<br />

and increased littoral operations. It states that the <strong>Navy</strong> is to“develop,<br />

procure, maintain, and deploy a modern family <strong>of</strong> sea<br />

mines,” with features that permit remote control <strong>of</strong> sea mines,<br />

stand<strong>of</strong>f mining and full-water-depth mining.<br />

Current U.S. Naval mining capability is adequate to execute requirements<br />

<strong>of</strong> some scenarios. However, the inventory is composed<br />

<strong>of</strong> old mines, and mining capabilities are funded at near<br />

the minimum levels required to safely maintain the stockpile.<br />

Research and development for new mining capabilities is severely<br />

restricted. The <strong>Navy</strong> has no funded plans to acquire any new<br />

mines in the next 7 years. A low priority has been placed on mining<br />

attributed in part to lack <strong>of</strong> specific sponsorship within OPNAV.<br />

”Mines are weapons that contribute to control <strong>of</strong> the surface and<br />

undersea environment, but their delivery (with the exception <strong>of</strong><br />

small numbers <strong>of</strong> SLMMs ) is accomplished entirely by air — with<br />

U.S. Air Force bombers being the primary platforms for high-volume<br />

delivery. Although mines have many <strong>of</strong> the characteristics<br />

<strong>of</strong> strike warfare weapons, the nominal <strong>Navy</strong> sponsor for mining<br />

is Expeditionary Warfare [N75],which is quite properly more concerned<br />

with MCM shortfalls.” (NSB report, 2001)<br />

Long-term solutions include use <strong>of</strong> innovative, emerging<br />

technologies for remote control <strong>of</strong> mines,distributed sensor fields,<br />

stand<strong>of</strong>f deliveries,adaptation <strong>of</strong> new sensors for target influence<br />

(magnetic, acoustic, electric, pressure), miniaturization (easing<br />

delivery burdens), and the development <strong>of</strong> nonlethal mines to<br />

include devices for fouling propulsion, damaging electronic<br />

systems, etc. Recommendations include: The current war on<br />

terrorism suggests maintaining weapons stockpiles at levels<br />

greater than the minimum requirements; Modernize existing<br />

mine stocks with stand<strong>of</strong>f/high altitude delivery capability;Retain<br />

the mining core infrastructure and begin development <strong>of</strong> a<br />

replacement for the MK-56 mine to preclude a gap in capability<br />

expected to develop by 2010; Add funding to develop a stand<strong>of</strong>f<br />

mining capability. This might include production <strong>of</strong> I-SLMM or<br />

research and development on JDAM-ER type bomb conversion<br />

packages—or both; and Align functions within MIW community<br />

(OPNAV through COMINEWARCOM) to benefit the specific subset<br />

<strong>of</strong> mining operations in accordance with separate point paper<br />

on MIW Alignment. Realignment allows focus on operational<br />

18 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


Near-Term Mid-Term Long-Term<br />

Unmanned Systems Transform<br />

Mine Warfare and the MCS<br />

Smaller MCS<br />

•Portable MCS<br />

functions<br />

•MCM/MHC Reliability<br />

•Alignment<br />

•Organic Mine Warfare<br />

•AMCM Requirements<br />

•Mining<br />

Figure 5.<br />

Unmanned<br />

Systems<br />

mining requirements, which are currently barely met.<br />

Realignment also allows a forward-thinking vision <strong>of</strong> where we<br />

want to go —and encourages long-range planning for a phased<br />

program that addresses future needs.<br />

Maturing Technologies and Future Mine Clearance Systems<br />

The requirement for a large deck to support MH-53 helicopters<br />

for minesweeping is the largest cost driver in acquiring a dedicated<br />

MCS. Maturing technologies have the potential to dramatically<br />

alter our MIW capabilities in the next decade and transform<br />

the nature <strong>of</strong> future MCS. Programmed organic systems may<br />

greatly improve our mine hunting and neutralization capability.<br />

Employing AQS-20 sonar on an MH-60 helicopter, for instance,<br />

will be three times more effective than the current AQS-14 employed<br />

by the MH-53,even considering the substantial difference<br />

in range and endurance <strong>of</strong> the two helicopters. The AQS-20,<br />

coupled with the incorporation <strong>of</strong> the unmanned Remote Minehunting<br />

(RMS) and Long-term Mine Reconnaissance (LMRS) systems,<br />

<strong>of</strong>fer a significant increase in mine hunting capabilities.<br />

These improvements mean that fewer airborne assets will be<br />

needed to accomplish the mine hunting mission both in the dedicated<br />

(theater) and organic (tactical) MIW forces.<br />

Unfortunately, mine hunting is not effective in sixty-percent <strong>of</strong><br />

the littoral regions near potential adversaries. Sea access to these<br />

areas requires minesweeping. Currently, the MH-53 helicopter<br />

wedded to the MK-106 sled,or the MH-60s with the developmental<br />

OASIS system, are needed to meet OPLAN minesweeping requirements.<br />

AMCM sweeping capabilities require a large-deck<br />

design for MCS. Many <strong>of</strong> the same technologies that are driving<br />

the improvements in mine hunting could be leveraged in an effort<br />

to develop an unmanned minesweeping system. A desire to<br />

keep the man out <strong>of</strong> the minefield makes unmanned<br />

minesweeping systems an attractive option.<br />

Unmanned systems are the minesweepers and hunters <strong>of</strong> the<br />

future. Future MCS must incorporate emerging technologies. A<br />

focused technology effort is needed to incorporate unmanned<br />

systems into the MCS(X). Adequate study by appropriate technical<br />

authorities concluded that USVs have been shown to possess<br />

potential as effective low-observable MCM platforms, allowing<br />

mine hunting and minesweeping missions to be performed without<br />

a man onboard — eliminating the risk to personnel. It is time<br />

to press ahead with establishing fleet requirements for unmanned<br />

MCM systems that lead to programming decisions. Long-term<br />

HSV<br />

USV<br />

UUVs<br />

Recommendations:<br />

Make unmanned sweeping systems a fleet requirement<br />

Demonstrate Concept with current systems<br />

Consider MCS (X) Option with emphasis on UUVs<br />

Figure 6.<br />

recommendations include: Establish unmanned minesweeping<br />

systems as an emerging fleet requirement;Demonstrate the ability<br />

to launch MCM UUV/USV from HSV at the earliest opportunity;Leverage<br />

<strong>of</strong>f the Spartan ACTD (Advanced Concept Technology<br />

Demonstration) if possible; Request that the MCS(X) working<br />

group explore options <strong>of</strong> using a combination <strong>of</strong> unmanned<br />

systems and a smaller helicopter detachment; and Establish a focused<br />

technology effort to incorporate unmanned minesweeping<br />

systems into future acquisition plans for a new MCS(X). A summary<br />

<strong>of</strong> near- to long-term strategies is shown in Figures 5 and 6.<br />

Conclusion<br />

The 2001 Quadrennial Defense Review (QDR) reaffirmed that“advanced<br />

mines could threaten the ability <strong>of</strong> U.S. Naval and Amphibious<br />

forces to operate in littoral waters” and are a likely<br />

method through which “future adversaries may have the means<br />

to render ineffective much <strong>of</strong> our current ability to project U.S.<br />

power overseas.” The U.S.<strong>Navy</strong>’s long history <strong>of</strong> difficulty in combating<br />

the mine threat culminated in the response to Iraqi mining<br />

efforts during the Gulf War. Despite a rudimentary and aged<br />

mining capability,Iraq severely damaged two ships and effectively<br />

deterred the United States from conducting planned amphibious<br />

operations into Kuwait.<br />

Our ability to combat modern sea mines depends upon an amalgam<br />

<strong>of</strong> capabilities including MCS, AMCM squadrons, EOD units<br />

and Marine Mammal Systems. A central lesson <strong>of</strong> the Gulf War is<br />

that a dedicated MCS,capable <strong>of</strong> directing all aspects <strong>of</strong> the multifaceted<br />

MIW campaign plan,is needed to bring the various MCM<br />

capabilities together, providing unity <strong>of</strong> effort in defeating the<br />

mine threat. At the same time, it is clear that a heavy lift helicopter<br />

is essential to accomplish the airborne minesweeping mission.<br />

This will remain the case until maturing unmanned vehicle<br />

technologies replace the need for airborne minesweeping.<br />

The future <strong>of</strong> MIW is clearly with unmanned systems; the <strong>Navy</strong><br />

needs a focused effort to bring these technologies to maturity as<br />

they have the potential to transform the nature <strong>of</strong> MIW. Given<br />

the current state <strong>of</strong> technology, it is easy to envision a smaller,<br />

faster MCS that acts as a mother ship for a variety <strong>of</strong> unmanned<br />

systems that can rapidly move into theater and combat the mine<br />

threat without the presence <strong>of</strong> men in the minefield.<br />

CHIPS Winter 2003 19


U.S. <strong>Navy</strong> and Air Force Hit Virtual Bull’s Eye<br />

The Atlantic Fleet cruiser, USS<br />

Ticonderoga (CG 47), homeported<br />

in Pascagoula, Miss., USS Ticonderoga (CG 47)<br />

successfully demonstrated the<br />

<strong>Navy</strong>’s newest weapons system<br />

trainer while underway<br />

Nov. 14, 2002, in the Gulf <strong>of</strong><br />

Mexico. The ship’s test comes<br />

on the heels <strong>of</strong> successful trials<br />

the day before by the U.S.<br />

Air Force’s 46th Test Wing,<br />

based at Eglin Air Force Base in<br />

Florida, which dropped eighteen,<br />

500-pound, non-exploding<br />

bombs from an A-10 aircraft. The Virtual At Sea Training system,<br />

or “VAST,” allows warfighters to hone their live-fire combat<br />

skills while operating at sea.<br />

Ticonderoga’s crew successfully engaged a computer-simulated<br />

target with explosive and nonexplosive ordnance shot from the<br />

ship’s MK 45,5-inch/54-caliber gun. While the rounds hit nothing<br />

but water — the demonstration was right on target. Initial indications<br />

suggest that the VAST system was able to successfully<br />

“score”precisely where the ordnance rounds actually landed — a<br />

significant milestone in ensuring effective at sea combat training.<br />

VAST is actually comprised <strong>of</strong> a system by which the ship’s<br />

crew or “spotter”sees a realistic presentation,for example,a landmass<br />

with the topography <strong>of</strong> a “real world” target, which corresponds<br />

to an area actually located over open ocean. During training<br />

exercises, the operator fires at the simulation <strong>of</strong> what they<br />

might expect to see in combat,while the ordnance actually lands<br />

within an array <strong>of</strong> buoys in the water. Exercise evaluators, monitoring<br />

the target practice on a computer screen, could be either<br />

onboard a ship or somewhere ashore.<br />

Developed by the Office <strong>of</strong> Naval Research and tested by the U.S.<br />

Atlantic Fleet, this virtual reality training is one example <strong>of</strong> the<br />

<strong>Navy</strong>’s efforts to keep its Sailors combat ready as weapons systems<br />

become increasingly advanced. In addition to programmable<br />

targets,VAST has another distinct advantage: It is portable.<br />

Ships can take the at-sea trainer — including the firing range —<br />

with them wherever they go. The portable“range” is made up <strong>of</strong><br />

several buoys that form the target area. These buoys are actually<br />

placed into the water by the ship conducting the training, in this<br />

case by the crew <strong>of</strong> the Ticonderoga.<br />

Once the ship positions at the proper distance from the buoy field,<br />

it engages and shoots at the virtual target. The actual ordnance<br />

then falls into this buoy field, which in turn triangulates the point<br />

<strong>of</strong> impact. The IMPASS (Integrated Maritime Acoustic Scoring And<br />

Simulator) buoy system is equipped with Global Positioning System<br />

(GPS) sensors that enable the accurate triangulation <strong>of</strong> the<br />

rounds. For these initial demonstration trials, one computer provides<br />

feedback on accuracy while a second computer is used<br />

within the ship to help with the training. In the future, a satellite<br />

uplink will potentially allow over-the-horizon operations.<br />

As communications and satellite technology has advanced, the<br />

natural evolutionary development<br />

<strong>of</strong> weapons systems has advanced<br />

along with it. VAST is a logical next<br />

step in leveraging that technology<br />

to better train the crews <strong>of</strong> ships<br />

and aircraft that will ultimately deploy<br />

these weapons in battle.<br />

The Air Force’s 46th Test Wing used<br />

other existing systems to measure<br />

the effectiveness and accuracy <strong>of</strong><br />

the VAST buoys during the exercise.<br />

The older systems have initially<br />

validated the emerging technology.<br />

“While the results are preliminary, the data looks promising.<br />

We’re encouraged by the capability this system brings to our testing<br />

efforts and to our pilots. It’s exciting to think that we’ll be<br />

able to use this portable system and convert these wide open<br />

spaces to valuable testing areas,” said Col. Dennis F. Sager, <strong>of</strong> Seattle,Wash.,who<br />

is the commanding <strong>of</strong>ficer <strong>of</strong> the 46th Test Wing.<br />

Another key advantage <strong>of</strong> VAST is its training versatility. Rather<br />

than continuously firing on a static, predictable bombing range,<br />

the presentation viewed by the warfighter can be manipulated<br />

to more closely resemble the type <strong>of</strong> terrain or target, which operators<br />

face in battle.<br />

As the system develops, planners hope to incorporate models<br />

closely resembling geographic areas <strong>of</strong> interest. While <strong>Navy</strong> <strong>of</strong>ficials<br />

are initially encouraged by these preliminary results, more<br />

testing is planned. Provided the concept continues to prove successful<br />

over the next six-month evaluation period,the <strong>Navy</strong> plans<br />

to invest in as many as 10 additional systems by the end <strong>of</strong> FY03.<br />

There are currently three in the <strong>Navy</strong>’s inventory being tested.<br />

Finally, VAST <strong>of</strong>fers savings in time, logistical considerations and<br />

money when compared to live-fire ranges. <strong>Navy</strong> ships, for example,<br />

must typically travel hundreds <strong>of</strong> miles to practice Naval<br />

Gun Fire Support using live-fire ranges. This system shaves days<br />

<strong>of</strong>f transiting to and from these ranges. These savings can then<br />

allow more time for crews to focus on other critical prerequisites<br />

to deploying,including other necessary training,as well as equipment<br />

maintenance and repair.<br />

While it <strong>of</strong>fers distinct advantages over other training options,<br />

VAST is designed to supplement the available ranges used by the<br />

<strong>Navy</strong>,including ranges still required for coordinated battle group<br />

training. These types <strong>of</strong> innovations will continue to enhance the<br />

way Sailors train and prepare for combat.<br />

“This is exciting new technology and we’re encouraged with the<br />

results <strong>of</strong> joint <strong>Navy</strong> and Air Forces testing,” said Adm. Robert J.<br />

Natter, Commander, U.S. Atlantic Fleet. “VAST also provides tremendous<br />

flexibility in that we can train effectively wherever there<br />

is sufficient ocean space.<br />

VAST’s initial testing results are positive and we see clear potential<br />

for joint <strong>Navy</strong>, Marine Corps and Air Force use <strong>of</strong> this system.<br />

Ultimately, VAST will help us further enhance the combat readiness<br />

<strong>of</strong> our ships and aircraft.”<br />

20 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


Interview with Diann L. McCoy<br />

DISA Principal Director<br />

for Applications Engineering<br />

Diann L.McCoy is the Principal Director for Applications Engineering. She is responsible for engineering<br />

information systems to provide command and control, and combat support capabilities to the nation’s<br />

warfighter. She earned a Bachelor <strong>of</strong> Science degree in Mathematics from Wright State University in<br />

1974, and a Masters <strong>of</strong> Science degree in Logistics Management from the Air Force Institute <strong>of</strong><br />

Technology in 1978. She was selected for her current position in September 2000. Her awards include<br />

the Presidential Distinguished Executive Rank Award, the Technology Award for Government<br />

Leadership, the DoD Distinguished Civilian Service Award, the Meritorious Civilian Service Award, the<br />

Presidential Rank <strong>of</strong> Meritorious Executive Award, and the Certified Pr<strong>of</strong>essional Logistician from the<br />

Society <strong>of</strong> Logistics Engineers.<br />

CHIPS: When talking about Defense Transformation in terms <strong>of</strong><br />

the asymmetric threat spectrum (denial <strong>of</strong> service, insertion <strong>of</strong><br />

erroneous information that could cause loss <strong>of</strong> confidence in <strong>of</strong>ficial<br />

networks/systems,seizure <strong>of</strong> a network/system for criminal/<br />

terrorist purposes, malicious code, etc.) How is DISA responding<br />

Ms. McCoy: An asymmetrical threat can apply to more than just<br />

network attacks; it may apply to more than just the DoD critical<br />

infrastructure; the nation as a whole may be impacted,i.e., power<br />

plants, critical utilities, etc. While we engage in this type <strong>of</strong> security,our<br />

DISA focus is on the networks for DoD. In a general sense,<br />

DISA has the GNOSC, the Global Network Operations and Security<br />

Center. It isn’t under my direction but their responsibility is<br />

to look at the activities that are occurring on the network, assess<br />

them and respond appropriately. We do this in conjunction with<br />

the JTF-CNO,Joint Task Force-Computer Network Operations,U.S.<br />

Strategic Command. The JTF-CNO is led by Maj. Gen. James D.<br />

Bryan, U.S. Army, who is dual-hatted as the Vice Director <strong>of</strong> DISA<br />

and Commander <strong>of</strong> JTF-CNO. In Applications Engineering, we<br />

provide many <strong>of</strong> the capabilities and applications used to analyze<br />

the information,to identify trends or activities that could lead<br />

to potential denial <strong>of</strong> service on the network. We are engaged in<br />

developing tools and capabilities that will allow us to understand<br />

what activity may be occurring and producing methods that will<br />

allow us to respond. Everything DISA designs, builds and operates,<br />

incorporates required measures to protect against information<br />

warfare attacks.<br />

CHIPS: I’ve read comments from top DoD and DON leadership<br />

that there is concern from an information warfare perspective<br />

that there is potential for a terrorist/criminal threat that could<br />

bring down the whole DoD architecture. With all <strong>of</strong> DoD and federal<br />

agencies on high alert, do you think a threat <strong>of</strong> that nature is<br />

likely to occur — the worst-case scenario<br />

Ms. McCoy: No, I don’t believe so. One <strong>of</strong> the approaches we use<br />

to protect our environment is Defense in Depth, which means<br />

you have multiple layers <strong>of</strong> defense and diverse routing capability<br />

so if you lost an application or a communications capability,<br />

you still have access to other available capabilities — voice, data,<br />

Defense Red Switch Network, VTC, etc. The diversity and robustness<br />

in each <strong>of</strong> these networks or systems comprise the larger<br />

Defense <strong>Information</strong> Systems Network (DISN). You might have<br />

an isolated incident, but in terms <strong>of</strong> vulnerability <strong>of</strong> the entire<br />

system, I think that is highly unlikely. One <strong>of</strong> the reasons why we<br />

have the DISN is for its positive control and accountability —that’s<br />

why DISA manages the DISN.<br />

CHIPS: Do you mean if everything else fails we can always rely on<br />

the DISN<br />

Ms. McCoy: The DISN has successfully functioned through several<br />

major events that degraded Internet performance. More specifically,<br />

what I’m saying is because we have diverse routing and<br />

multiple paths, and the means to move information, either voice<br />

or data, we have redundancy so we don’t have to depend on a<br />

single way to communicate. Also the physical and electronic security<br />

is more robust than a typical network. In Applications Engineering,<br />

we provide some applications that allow us to monitor<br />

and analyze what is happening over the network. The Network<br />

Services organization actually designs and develops these<br />

networks with layers <strong>of</strong> Defense in Depth protection built in.<br />

CHIPS: Secretary Rumsfeld has stated numerous times that information<br />

technology is the enabler behind Defense transformation,<br />

but isn’t this a natural progression for military operations to rely<br />

on IT due to the technology advancements <strong>of</strong> the last 10 years,<br />

especially<br />

Ms. McCoy: The Secretary is looking not just at the technology<br />

per se, but the way it is employed in a joint environment to provide<br />

a quantum increase in capability to meet the operational<br />

goals <strong>of</strong> the transformation. What we do is leverage that technology<br />

to make it work in a warfighting environment. Given the IT<br />

capabilities we have today — we can do things differently; and<br />

our methods <strong>of</strong> operations are tied to the type <strong>of</strong> IT available. For<br />

example, we manage the Global Command and Control System,<br />

GCCS, which provides the common operational picture <strong>of</strong> the<br />

battlespace. It gives the warfighter a situational awareness <strong>of</strong><br />

what is happening and through technology we get better information<br />

flow and, more timely information, which gives the decision<br />

makers a better opportunity to respond to whatever is happening.<br />

Technology enables us to get closer in time to what is<br />

happening in the battlespace, as well as having a greater awareness<br />

<strong>of</strong> what is in the battlespace, a greater awareness <strong>of</strong> what<br />

capabilities we might have to bring into that particular environment<br />

— and what the status is <strong>of</strong> those assets.<br />

CHIPS: Is there any one technology or system that is key to linking<br />

command and control for joint fighting capability<br />

Ms. McCoy: I think one <strong>of</strong> the cornerstone joint applications is<br />

CHIPS Winter 2003 21


the Global Command and Control System, and we are incorporating<br />

multiple technologies and applications in GCCS. The most<br />

important feature <strong>of</strong> these joint capabilities is they have to be<br />

secure and interoperable. On the application side, they have to<br />

be able to share data in a certain way so that data has the same<br />

meaning, and in a secure way so that it cannot be compromised.<br />

This is central to Secretary Rumsfeld’s joint command and control<br />

initiative — the key being joint and interoperable capability.<br />

This is what DISA is in the business <strong>of</strong> providing every day.<br />

CHIPS: One <strong>of</strong> the things Dr. Myers (Principal Director, Deputy<br />

<strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong>,<strong>Department</strong> <strong>of</strong> Defense,CHIPS Summer<br />

2002,“Power to the Edge, the Transformation <strong>of</strong> the Global <strong>Information</strong><br />

Grid,”www.chips.navy.mil/archives/02_Summer/authors/<br />

index2_files/power_to_the_edge.htm) stated that is so important<br />

to Combatant Commanders is their confidence in the authenticity<br />

and timeliness <strong>of</strong> data.<br />

Ms. McCoy: What you are really talking about is the issue <strong>of</strong> latency<br />

and that is very important. One <strong>of</strong> the things we are focusing<br />

on with the GCCS is providing near real-time data, so decision-makers<br />

have the most current information and don’t have<br />

to gather and synthesize a lot <strong>of</strong> information. This lets warfighters<br />

shorten their decision-making cycle. Some <strong>of</strong> the tools and capabilities<br />

that we have today allow us to overlay information from<br />

various sources and fuse it together so the user has the most currently<br />

available information to act upon — that is very important.<br />

The other thing you asked about is the issue <strong>of</strong> data authenticity.<br />

We view both authenticity and data integrity as essential.<br />

We worry about these in every system we build and are also working<br />

on the DoD PKI as a key enabler to improve authentication<br />

and integrity in all DoD systems.<br />

CHIPS: Is DISA involved in the Homeland Defense Plan<br />

Ms. McCoy: DISA as an organization is involved in Homeland Defense<br />

from several different aspects. Most importantly we support<br />

the communications needs <strong>of</strong> other DoD organizations with<br />

a direct Homeland Defense role to include nation-to-nation leadership<br />

communications. We also directly provide and support<br />

Presidential communications. We do other things in all the different<br />

disciplines to include support <strong>of</strong> whatever type transport<br />

mechanisms are required. In particular,in my area <strong>of</strong> Applications<br />

Engineering we are working on an ACTD or Advanced Concept<br />

Technology Demonstration,to work with JFCOM initially and then<br />

with NORTHCOM — whomever has the Homeland Defense mission.<br />

We would take this Homeland Security ACTD and develop a<br />

common operational picture and situational awareness for that<br />

Combatant Commander. The point is to take some <strong>of</strong> the things<br />

that we have learned under command and control and, see how<br />

they can be used to support DoD’s role in Homeland Defense.<br />

CHIPS: I spoke with a Congressional Liaison, who has worked on<br />

security matters for the House Armed Forces Committee and she<br />

said that she is very impressed with the DoD response to Homeland<br />

Defense and the Sept.11 terrorist attacks. She indicated that<br />

federal agencies such as the FBI, FEMA, CIA, etc., could use the<br />

DoD model and that the national Homeland Defense strategy<br />

could also follow the DoD model. Is this feasible<br />

Ms. McCoy: In prior jobs that I have had I was involved in the<br />

larger federal community. I think where possible DoD is sharing<br />

its lessons learned from the kind <strong>of</strong> quick deployments we have<br />

to do. I found that in forums like the National Communications<br />

System other folks are willing to listen to our lessons learned.<br />

Through the Homeland Defense ACTD we have involvement from<br />

several other agencies. As you know there are many political issues<br />

in regard to Homeland Defense. In DoD we <strong>of</strong>fer our experience<br />

and we found that we may have some things that work, but<br />

also we have things that may be different because the whole issue<br />

<strong>of</strong> Homeland Defense is a little bit different. There are different<br />

rules <strong>of</strong> engagement as to who has responsibility. So we can’t<br />

say these other organizations should just pick up everything we<br />

are doing and move with it, but we do <strong>of</strong>fer our experience and<br />

capabilities for them to look at — perhaps as a way for them to<br />

move forward or begin.<br />

CHIPS: What role is DISA playing in the DoD transformation<br />

Ms. McCoy: In terms <strong>of</strong> DISA as an organization, we are playing in<br />

multiple forums. One <strong>of</strong> the biggest efforts we have is the GIG<br />

bandwidth expansion (GIG-BE). This will provide a robust network<br />

capability throughout the DoD environment. On the applications<br />

side, we are looking at the enablers <strong>of</strong> the “Power to the Edge”<br />

vision, the enablers to the transformation. We are involved directly<br />

in what we call the “right data strategy,” which means that<br />

we’ve changed the way we look at data and the way we provide<br />

data. We have begun to employ tools with XML to make it easy to<br />

share data across domains and we have designed and built a DoD<br />

XML registry to ensure that everyone in DoD who is using XML<br />

has access to existing naming standards (metadata tags) and can<br />

register new ones. We are also changing or updating our tools<br />

and capabilities so they are Web-enabled,making it easier for our<br />

customers to access applications and tools that can be used in<br />

different environments. A good example is the joint collaboration<br />

capability,such as the Defense Collaboration Tool Suite (DCTS)<br />

which we are providing to a wide range <strong>of</strong> users today worldwide,<br />

including Combatant Commanders.<br />

We are looking at methodologies and approaches for getting<br />

information out and having it available through a process we call<br />

content staging. In order to make the vision happen we have to<br />

figure out how to manage services in this net-centric environment.<br />

We are looking at what types <strong>of</strong> services are needed and how<br />

they should be managed. We call this Net-Centric Enterprise<br />

Services (NCES) — critical to the sustainment and technological<br />

evolution <strong>of</strong> the GIG. There are various places where these<br />

components are covered in detail as well as how they interact<br />

with each other. As an early pilot <strong>of</strong> these components, DISA will<br />

integrate Web-based intelligence services with emerging C3<br />

Enterprise Service to create a baseline C3I“electronic marketplace”<br />

on the SIPRNet that will enable mission planners to dynamically<br />

collaborate with the intelligence and combat support<br />

communities. An example <strong>of</strong> a managed service would be a Global<br />

Directory Service. So we have ongoing efforts to help with the<br />

transformational vision. All <strong>of</strong> these are geared to ensuring that<br />

we can provide interoperable capability down to the Joint Task<br />

Force Commander level and below — the guy on the battlefield<br />

— not just the people at headquarters.<br />

CHIPS: What services would be in Global Directory Services<br />

Ms. McCoy: A Global Directory Service could contain information<br />

as simple as a person’s name and e-mail address. As DoD<br />

information processing becomes ever more distributed, it could<br />

22 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


have information in terms <strong>of</strong> what types <strong>of</strong> capabilities, data<br />

services or databases are available or where they are staged.<br />

Directory Services is one <strong>of</strong> those capabilities that will increasingly<br />

become highly protected and more secure because it will contain<br />

information about what is available and perhaps even where it is<br />

located.<br />

CHIPS: When you talked about a user getting information and<br />

content staging, are you talking about the user’s ability to pull<br />

data rather than have it pushed at them<br />

Ms.McCoy: We are looking at the ability to do both because what<br />

we find is that in certain cases the user does not have the opportunity<br />

to go out and surf. The user needs to have certain pieces<br />

<strong>of</strong> information,which they can predefine,sent to them automatically.<br />

But we would have the capability to do either — a smart<br />

push or smart pull — or the user could surf the net.<br />

CHIPS: How do Web-enabling databases, information and processes,<br />

and process improvement for business and support functions<br />

help support the warfighter<br />

Ms. McCoy: There are a multitude <strong>of</strong> things that Web services will<br />

allow us to do. First it is easier for the user to get to the information.<br />

It provides the information to a broader set <strong>of</strong> users, who<br />

are able to get the information whenever they need it and in a<br />

faster method <strong>of</strong> delivery. By using Web technology you have<br />

the ability to do more <strong>of</strong> a real-time collaboration because everyone<br />

can pull up tailored information. You can update the information<br />

more frequently. It also allows us to take advantage <strong>of</strong><br />

wireless capability,which is the wave <strong>of</strong> the future. Another thing<br />

that we tend to forget about it is that there can be a very good<br />

return on investment. When you go to the Web environment you<br />

can carry more <strong>of</strong> these services in the NCES. So you can reduce<br />

the number <strong>of</strong> servers, which reduces the number <strong>of</strong> system administrators<br />

that may be required to manage those types <strong>of</strong> services.<br />

You also have the ability to do more configuration management<br />

to ensure that the same type <strong>of</strong> capability is being used<br />

across the infrastructure. This is key to net-centric warfare.<br />

CHIPS: Do you have security concerns with using wireless technology<br />

in the Defense environment where security is our number<br />

one priority<br />

Ms. McCoy: You said it exactly; we do have concerns in how we<br />

employ wireless. We are looking at the security and coming up<br />

with approaches that will allow us to use wireless in a secure<br />

manner. We have turned these approaches into standards for<br />

deploying wireless as securely as currently possible. We are also<br />

working with industry to improve the security in commercial wireless<br />

products and they are responding to that.<br />

CHIPS: In a recent interview I did with Grady Booch, chief scientist<br />

for Rational, (CHIPS Magazine Fall 2002; www.chips.navy.mil/<br />

archives/02_fall/index2_files/interview_with_grady_booch.htm)<br />

he commented that DoD does not fully exercise the influence<br />

they have in the marketplace in demanding secure technology<br />

products. He said that DoD shouldn’t have to spend additional<br />

money to build security into commercial products, rather industry<br />

should ensure security is built in at the front end.<br />

Ms. McCoy: When we moved to the Internet and the network<br />

environment the rules <strong>of</strong> security became different than when<br />

we were operating on a disconnected mainframe. I’m not sure<br />

anyone had a crystal ball on how security should be handled in a<br />

networked environment. This has really been a learning experience<br />

for industry as to what is needed in terms <strong>of</strong> security. I think<br />

we are demanding more <strong>of</strong> industry in terms <strong>of</strong> security. We are<br />

beginning to see the big companies, such as Micros<strong>of</strong>t, incorporate<br />

security as one <strong>of</strong> the key features <strong>of</strong> their products. We also<br />

have the NIAP (National <strong>Information</strong> Assurance Partnership) process<br />

that requires commercial products used in a certain way to<br />

be evaluated and certified. So I think we are getting there and<br />

vendors are responding.<br />

CHIPS: I was just reading about the DoD debate over open-source<br />

s<strong>of</strong>tware. Many in DoD believe open-source is the wave <strong>of</strong> the<br />

future for many reasons. One <strong>of</strong> the chief reasons is that the code<br />

is visible so it is easier to detect vulnerabilities.<br />

Ms. McCoy: I think in some cases we really need to know the<br />

source code because it is the only way to know what is inside<br />

that code. There are some applications where that may become<br />

very important because <strong>of</strong> the way those applications are utilized<br />

and how they actually fit into the architecture.<br />

CHIPS: There seem to be so many initiatives across Defense,with<br />

the Services working toward interoperability for command and<br />

control systems. Is there a plan or method <strong>of</strong> determining which<br />

are the most important to integrate first<br />

Ms. McCoy: That is exactly what the Joint Staff, in conjunction<br />

with the OSD principals, are working right now. They have reviewed<br />

the interoperability issues and analyzed which ones<br />

should be worked first. They are working a plan as to how we are<br />

going to get to interoperability faster. We work closely with<br />

JFCOM through experimentation and events like Millennium<br />

Challenge 2002 to demonstrate interoperability. We are also looking<br />

at a process that allows us to demonstrate interoperability<br />

through the development phase before we get to the operations<br />

phase so that interoperability is built in and then maintained<br />

throughout the life cycle. In terms <strong>of</strong> what capabilities or<br />

interoperability problems are worked first, DISA responds to<br />

prioritization decisions made by the designated approval<br />

authority.<br />

In all these endeavors, we are working hard to<br />

provide capabilities that our customers want and<br />

use, and we ensure that we always keep in mind<br />

the users’ experience<br />

so we can make our products and services<br />

even better.<br />

CHIPS: Are there three top systems or programs that Defense is<br />

focusing on first for interoperability<br />

Ms. McCoy: I believe from a Web capability standpoint, we are<br />

looking at the GCCS family <strong>of</strong> systems — our GCCS program is<br />

part <strong>of</strong> that. They are focusing on what we call the C2<br />

transformation, which looks at getting command and control<br />

information down to the JTF Commander and below. Another<br />

high priority is to ensure that we have the bandwidth capability<br />

down to the tactical level — so bandwidth expansion is high on<br />

the list <strong>of</strong> priorities.<br />

CHIPS Winter 2003 23


CHIPS: In Dr. Myers’ article she talked about the locations (CO­<br />

NUS/OCONUS) for the bandwidth expansion. Will the Fleet be<br />

able to share in this bandwidth expansion<br />

Ms. McCoy: This technology will support all warfighting. What<br />

we are talking about is ensuring that, as we transform and move<br />

to a net-centric environment,we have sufficient means and bandwidth<br />

to move the information wherever it’s needed. So it would<br />

be applicable to all. What we have to work is how we get that<br />

information to the tactical level, to a warfighter on a ship or even<br />

one who could potentially be on horseback, so to speak.<br />

CHIPS: Let’s talk about the work <strong>of</strong> Applications Engineering ...<br />

Ms. McCoy: The mission <strong>of</strong> the Applications Engineering Directorate<br />

is to provide responsive, secure and interoperable C2 and<br />

combat support capability for decision superiority to the President<br />

and Secretary <strong>of</strong> Defense, Combatant Commanders, Joint/<br />

Combined task forces,Services,<strong>Department</strong> <strong>of</strong> Defense and non-<br />

DoD agencies.<br />

We provide a wide range <strong>of</strong> products, services and expertise. I<br />

already mentioned the Global Command and Control System<br />

which is DoD’s Joint and interoperable C2 system, and the Defense<br />

Collaboration Tool Suite. These are providing situational<br />

awareness, readiness, planning, deployment support, collaboration<br />

and other capabilities for Combatant Commanders,JTF Commanders<br />

and below — today. The Global Combat Support<br />

System’s (GCSS) Combatant Commander JTF (CC-JTF) capability<br />

is using portal technology with links to Service and Agency logistics<br />

and sustainment systems, to provide DoD users access to<br />

shared data, and applications, regardless <strong>of</strong> their location.<br />

Over the next few years we are transforming the successful Common<br />

Operating Environment (COE) to fit OSD’s Net-Centric Enterprise<br />

Services (NCES) concept. COE is currently used or planned<br />

to be used for/in 125 C2 systems and in support <strong>of</strong> GCCS, at 650<br />

locations worldwide on 10,000+ joint and coalition workstations.<br />

The net-centric capabilities we provide will support the Power to<br />

the Edge vision <strong>of</strong> having tailored, fused information and tools<br />

available on the net, effectively supporting users wherever they<br />

are and with the means available to them.<br />

In the <strong>Information</strong> Assurance area we are supporting “Defensein-Depth”<br />

with expertise, products and services such as PKI, network<br />

and communications security,plus guards for cross-domain<br />

(e.g., Unclassified to Secret) and coalition information exchange.<br />

In addition to the Homeland Defense ACTD, we are also involved<br />

in Multiple Battlespace Awareness, Active Network Intrusion Defense,<br />

Coalition Theater Logistics, and C4I for the Coalition Warrior<br />

ACTDs, just to name a few. These are providing adaptive decision<br />

support, planning, and execution and collaboration tools<br />

through experimentation, demonstrations and spiral development.<br />

Our partnering with the Combatant Commanders and the<br />

operational community is very important. We are also partnered<br />

with the Defense Logistics Agency to provide a variety <strong>of</strong><br />

eBusiness applications and services for paperless contracting,secure<br />

business transactions, wide area work flow, and electronic<br />

document access. In all these endeavors, we are working hard to<br />

provide capabilities that our customers want and use, and we<br />

ensure that we always keep in mind the users’ experience so we<br />

can make our products and services even better.<br />

Revolution Comes to the<br />

Teddy Roosevelt Battle Group<br />

By JO2 Jd Walter, NPDC, Public Affairs Office<br />

The USS Theodore Roosevelt (CVN 71) Battle Group, including<br />

the USS Saipan (LHA 2) Amphibious Ready Group, is about to<br />

get underway without ever leaving port. Their new mission is<br />

to test and evaluate Revolution in Training initiatives designed<br />

to enhance the <strong>Navy</strong>’s mission readiness by providing Sailors<br />

with new tools and opportunities to develop both pr<strong>of</strong>essionally<br />

and personally. Working with Task Force for Excellence<br />

through Commitment to Education and Learning (EXCEL), the<br />

battle group will implement and test the Sailor Continuum in<br />

an operational environment,as well as test incentives designed<br />

to increase performance and productivity. Additionally, the<br />

battle group will demonstrate the utility <strong>of</strong> a new learning<br />

management system, <strong>Navy</strong> Knowledge Online (NKO) that will<br />

track each Sailor’s accomplishments.<br />

“The innovations being touted by Task Force EXCEL are being<br />

driven by the Fleet and are for the Sailors. The acid test has to<br />

be at the waterfront. The <strong>Navy</strong> is bringing the Revolution in<br />

Training to Sailors, and it is happening now,” said Director <strong>of</strong><br />

Surface Warfare Rear Adm. Harry Ulrich. “This is the best opportunity<br />

to put these ideas and programs to the test.” A working<br />

group consisting <strong>of</strong> executive <strong>of</strong>ficers (XO),command master<br />

chiefs (CMC) and other representatives from the Roosevelt<br />

battle group,Saipan ready group,Destroyer Squadron Two,and<br />

elements <strong>of</strong> Carrier Air Wing Eight (CVM 8) recently met in Norfolk,<br />

Va., to review and discuss the testing proposal.<br />

“The testing proposals have generated a lot <strong>of</strong> excitement and<br />

enthusiasm,” said Capt. Jamie Barnett, project leader for the<br />

beta test. “Private industry typically provides incentives for<br />

behaviors that enhance performance. That is what we will test<br />

within the battle group. We just need to work with the group<br />

to precisely define the tasks and how we will measure the outcomes.”<br />

The goal <strong>of</strong> this effort is directed at increasing job efficiency<br />

and productivity — more time for ship’s work by developing<br />

each Sailor pr<strong>of</strong>essionally and personally.<br />

At sea aboard USS Theodore Roosevelt (CVN 71) Oct. 28, 2002,<br />

MM3 Ryan Karlin checks the results <strong>of</strong> the September 2002<br />

advancement exam for division personnel. U.S. <strong>Navy</strong> photo by<br />

PH3 Phillip Nickerson, Jr.<br />

24 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


By Chris Watson<br />

For many years, the Joint Interoperability Test Command<br />

(JITC) has directly contributed to the success <strong>of</strong> U.S. <strong>Navy</strong><br />

fleet operations through the execution <strong>of</strong> complex test<br />

events and on-demand warfighter support efforts. From a technical<br />

standpoint, the <strong>Navy</strong> and other military services view JITC<br />

as the preeminent evaluator <strong>of</strong> systems interoperability. JITC is<br />

one <strong>of</strong> the key organizational elements <strong>of</strong> the Defense <strong>Information</strong><br />

Systems Agency (DISA) Interoperability (IN) Directorate and<br />

serves as DISA’s developmental and operational test organization.<br />

As designated by the Joint <strong>Chief</strong>s <strong>of</strong> Staff, JITC is also the authority<br />

that certifies that <strong>Department</strong> <strong>of</strong> Defense (DoD) <strong>Information</strong><br />

Technology (IT) and National Security Systems (NSS) meet<br />

interoperability requirements for joint military operations.<br />

JITC facilities are strategically located at Fort Huachuca, Ariz., and<br />

Indian Head, Md. The diverse capabilities <strong>of</strong> each location allow<br />

the Services to have access to a dynamic environment for laboratory<br />

tests and on-site field evaluations. <strong>Navy</strong> organizations from<br />

coast to coast have benefited from JITC’s robust test environment<br />

and continue to leverage <strong>of</strong>f <strong>of</strong> their vast resources and technical<br />

expertise.<br />

To understand JITC’s current relationship with the <strong>Navy</strong>,one must<br />

revisit the history <strong>of</strong> the organization and recognize how it has<br />

evolved over the past three decades. JITC’s relationship with the<br />

<strong>Navy</strong> spans back to the 1970s when the Joint Tactical Command,<br />

Control, and Communications Agency (JTC3A) Joint<br />

Interoperability Test Facility (JITF) established a partnership with<br />

the <strong>Navy</strong> Center for Tactical Systems Interoperability (NCTSI) for<br />

the interoperability testing <strong>of</strong> Tactical Digital <strong>Information</strong> Links<br />

(TADIL). In 1988, the Defense Communications Agency (DCA)<br />

absorbed the Tri-Service Tactical Communications (TRI-TAC) Joint<br />

Test Element (JTE) and the JTC3A JITF. DCA consolidated these<br />

organizations in 1989 to form the “JITC” in Fort Huachuca, Ariz.<br />

JITC’s primary mission was to provide interoperability compliance<br />

testing and certification. As the designated lead for DoD Command,<br />

Control, Communications and Intelligence<br />

(C3I) support, DCA tasked JITC to perform<br />

interoperability tests <strong>of</strong> various systems including<br />

High Frequency (HF) radio systems, Military Satellite<br />

Communications (MILSATCOM) systems, and<br />

the Worldwide Military Command and Control System<br />

(WWMCCS). On June 25, 1991, DCA was renamed<br />

“DISA” to reflect its expanded role in managing<br />

the Defense <strong>Information</strong> Infrastructure (DII),<br />

now known as the Global <strong>Information</strong> Grid (GIG).<br />

As a result, JITC’s responsibilities for ensuring joint<br />

interoperability <strong>of</strong> all military systems began to increase<br />

as well,causing the need for growth and expansion<br />

within the organization.<br />

In 1993, the Naval Computer and Telecommunications<br />

Command (NCTC) proposed an initiative to<br />

transfer the functions and resources <strong>of</strong> the Naval<br />

Telecommunications Systems Integration Center<br />

Above: JITC<br />

Headquarters, Fort<br />

Huachuca, Ariz. Right:<br />

JITC Washington<br />

Operations Division,<br />

Indian Head, Md.<br />

(NAVTELSYSIC) to JITC. Since 1976, the NAVTELSYSIC test facility<br />

had operated in Cheltenham, Md., and was the primary site for<br />

the Quality Assurance (QA) and Functional Certification testing<br />

<strong>of</strong> all <strong>Navy</strong>-messaging systems. DISA and the <strong>Chief</strong> <strong>of</strong> Naval Operations<br />

(CNO) agreed that the transfer <strong>of</strong> NAVTELSYSIC resources<br />

to JITC would improve both agencies’ ability to enhance operational<br />

fleet support. Thus, JITC’s East Coast arm, known as the<br />

Washington Operations Division, was established. In 1998, the<br />

Washington Operations Division moved its facility to the Naval<br />

Surface Warfare Center (NWSC) at Indian Head, Md., where they<br />

currently reside. Today, JITC’s East and West Coast divisions work<br />

closely to provide valuable test and exercise support to the <strong>Navy</strong><br />

and the other Services. The JITC organization is currently divided<br />

into eight divisions and a liaison <strong>of</strong>fice, each having unique responsibilities,<br />

these are shown in the text box on the next page.<br />

JITC’s superior test methodologies and extensive expertise are<br />

shown by the many success stories reported by various <strong>Navy</strong> organizations.<br />

For example, the JITC JDEP (Joint Distributed Engineering<br />

Plant) Division’s TADIL Branch at Fort Huachuca continues<br />

to work closely with NCTSI detachments in Dahlgren,Va.;Dam<br />

Neck, Va.; and San Diego, Calif., for TADIL interoperability assessments<br />

and certification. JITC uses the Joint Interoperability Evaluation<br />

System (JIES) for TADIL-A/B/J testing and the Joint Operational<br />

C4I Assessment Tool (JOCAT) for operational assessment<br />

<strong>of</strong> tactical data links. With JITC’s assistance, the <strong>Navy</strong> has been<br />

able to identify and correct deficiencies pertaining to Link 11<br />

(TADIL-A) and Link 16 (TADIL-J) data exchange with AEGIS destroyers<br />

and E-2C aircraft. The <strong>Navy</strong> has also improved<br />

interoperability between their embarked forces and key allies,<br />

through TADIL tests conducted by JITC.<br />

The JITC Washington Operations Division also continues to be<br />

the operational tester <strong>of</strong> all <strong>Navy</strong> legacy and transitional messaging<br />

systems, both strategic and tactical. JITC has been directly<br />

involved in the testing, training, and implementation <strong>of</strong> <strong>Navy</strong><br />

shore-based systems such<br />

as GateGuard, Personal<br />

Computer Message Terminal<br />

(PCMT), Manual Relay<br />

Center Modernization Program<br />

(MARCEMP), Multi-<br />

Level Mail Server (MMS),<br />

CHIPS Winter 2003 25


Nova,and the Message Conversion System<br />

(MCS). JITC’s consistent performance was<br />

demonstrated during the recent implementation<br />

<strong>of</strong> the Fleet Message Exchange/<br />

Directory Update & Service Center (FMX/<br />

DUSC),the replacement for the Naval Communications<br />

Processing and Routing System<br />

(NAVCOMPARS). JITC assisted the<br />

Space and Naval Warfare Systems Command<br />

(SPAWAR) in testing, troubleshooting,<br />

and bringing online this very intricate<br />

configuration at the three Naval Computer<br />

and Telecommunications Area Master Station<br />

(NCTAMS) locations under difficult<br />

conditions. <strong>Navy</strong> fleet systems such as the<br />

Common User Digital <strong>Information</strong> Exchange<br />

System (CUDIXS), Fleet SIPRNET<br />

Messaging (FSM) system, the Naval Modular<br />

Automated Communication Systems<br />

(NAVMACS - V2,V3,V5A and Version II), the<br />

Shipboard AN/SYQ-26 (V) Single Messaging<br />

Solution (SMS),and the Submarine AN/<br />

SYQ-28 (V) SMS have also gone through<br />

rigorous test evolutions at the Indian Head<br />

facility.<br />

In the summer <strong>of</strong> 2002,Rear Adm.Kenneth<br />

D.Slaght,Commander SPAWAR,recognized<br />

the JITC Washington Operations Division<br />

for their outstanding contributions to fleet<br />

operations. Several JITC representatives<br />

received the SPAWAR “Lightning Bolt<br />

Award <strong>of</strong> Excellence” for their support <strong>of</strong><br />

various mission-critical systems.<br />

JITC divisions at Indian Head and Fort<br />

Huachuca execute the developmental and<br />

operational testing <strong>of</strong> the Defense Message<br />

System (DMS) on behalf <strong>of</strong> the DISA<br />

DMS Program Management Office (PMO).<br />

The <strong>Navy</strong> is an important stakeholder in<br />

the overall DMS program and JITC works<br />

closely with selected <strong>Navy</strong> DMS operational<br />

sites for the successful collection <strong>of</strong><br />

data during DMS OT events,leading to subsequent<br />

DMS fielding decisions. JITC is also<br />

responsible for the developmental testing<br />

<strong>of</strong> <strong>Navy</strong>-developed non-core DMS products<br />

such as the Defense Message Dissemination<br />

System (DMDS). The SPAWAR developer<br />

and PM rely heavily on JITC’s test<br />

processes and results, which ensure that<br />

fully operational DMDS s<strong>of</strong>tware iterations<br />

are distributed to the field. Additionally,<br />

JITC validates unique <strong>Navy</strong> DMS strategic<br />

and tactical configurations and provides<br />

on-site training to <strong>Navy</strong> DMS Service Provider<br />

(DSP) sites.<br />

In the fall <strong>of</strong> 2002, the <strong>Navy</strong> Operational<br />

Test and Evaluation Force (OPTEVFOR) will<br />

The JITC Organization<br />

Plans, Policies and Warfighter Support Division (PPWFS) directly supports the Combatant<br />

Commanders,Services and Agencies by providing interoperability,operational and<br />

technical support during exercises, deployments and contingencies. Lead division for<br />

combined warfighting issues. Develops and executes the command’s strategic plan<br />

and establishes policies for testing and interoperability certification.<br />

Operational Test and Evaluation Division (OT&ED) provides independent operational<br />

test and evaluation (OT&E) and assessments <strong>of</strong> DISA programs to ensure that only operationally<br />

effective and suitable NSS/ITS systems are delivered to the warfighter. DISA<br />

programs include Global Command and Control System (GCCS), Defense <strong>Information</strong><br />

System Network (DISN) and Defense Message System (DMS). Also serves as the Operational<br />

Test Agent (OTA) for the Defense Logistics Agency (DLA), Defense Finance and<br />

Accounting Service (DFAS) and High Performance Computing Modernization Program<br />

(HPCMP), among others.<br />

JITC Washington Operations Division (JWOD) provides NSS/ITS interoperability test,<br />

evaluation and certification support with a specific focus on <strong>Department</strong> <strong>of</strong> Defense<br />

Intelligence <strong>Information</strong> Systems (DODIIS), <strong>Navy</strong> Programs, DMS, DoD Health Affairs,<br />

Logistics, <strong>Information</strong> Assurance and the Joint Warfighter Interoperability Demonstration<br />

(JWID).<br />

Combat Support and <strong>Information</strong> Systems Division (CSISD) provides developmental<br />

and interoperability test, evaluation and certification support with a specific focus on<br />

combat support,combat service support and information systems. Conducts standards<br />

validation and conformance testing <strong>of</strong> IT systems.<br />

Networks, Transmission and Intelligence Division (NTID) provides NSS/ITS (National<br />

Security Systems/<strong>Information</strong> Technology Systems) interoperability test,evaluation and<br />

certification support to DoD and other federal Agencies. Programs/functional areas<br />

supported include the Global <strong>Information</strong> Grid, information security, networks, transmission<br />

systems,switches,radios <strong>of</strong> all types,wireless systems; and intelligence, surveillance<br />

and reconnaissance systems. Conducts and participates in joint and combined<br />

exercises such as the DoD Interoperability Communications Exercise (DICE), the Joint<br />

User Interoperability Communications Exercise (JUICE), Combined Endeavor and CID<br />

(Coalition Interoperability Demonstration) Borealis.<br />

Joint Distributed Engineering Plant Division (JDEPD) leads DoD planning,coordination<br />

and engineering teams developing the JDEP. Provides management and oversight <strong>of</strong><br />

investment,coordination and general support functions. Oversees JDEP s<strong>of</strong>tware/hardware<br />

development and maintenance. Provides JDEP capability repository, network/<br />

simulation engineering,configuration management and infrastructure scheduling. Tests,<br />

evaluates and certifies command and control, and air and missile defense systems to<br />

interoperate with other Joint systems in accordance with tactical data link standards.<br />

Automated Systems and Test Support Division (AS&TSD) provides system engineering<br />

support in the design, development, installation, modernization and maintenance <strong>of</strong><br />

JITC automated test and test support systems,traffic and message loading devices,and<br />

strategic and tactical equipment. Manages,operates and maintains JITC test beds,laboratories,<br />

test systems, COMSEC account and related equipment in support <strong>of</strong> NSS/ITS<br />

testing. Implements and manages network management programs for JITC. Provides<br />

logistics support for JITC.<br />

Resource Management Division prepares and implements business, contract, and personnel<br />

policies/guidelines. Manages the command’s fiscal and human resource programs.<br />

NCR Liaison Office provides support to JITC customers based in the National Capital<br />

Region (NCR). Liaison to DISA PMs and Directorates, Joint Staff, OSD-level boards and<br />

committees, Major Range & Test Facility Base (MRTFB) activities, T&E policy working<br />

groups, tiger teams, allied interoperability groups, Combatant Command/Service/<br />

Agency activities. Represents DISA’s Central Test & Evaluation Investment Program<br />

(CTEIP) projects to OSD.<br />

26 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


JITC<br />

Advanced<br />

Technology<br />

Testbed<br />

(ATT)<br />

incorporates<br />

state-<strong>of</strong>the-art<br />

technologies<br />

such as<br />

Video<br />

Stream<br />

and Voiceover-IP.<br />

conduct an Operational Assessment (OA) <strong>of</strong> the <strong>Navy</strong> Marine<br />

Corps Intranet (NMCI). In conjunction with this OA,the JITC Combat<br />

Services and <strong>Information</strong> Systems Division will coordinate<br />

with OPTEVFOR to assess the joint information flow <strong>of</strong> selected<br />

Critical Joint Applications (CJA) to determine NMCI<br />

interoperability. The assessment will take place in an operational<br />

NMCI environment using JITC-developed test procedures. JITC<br />

will conduct its assessment at: Naval Air Systems Command, NAS<br />

Patuxent River, Md.; NAS Lemoore, Calif.; and Naval Air Facility<br />

Washington, Andrews Air Force Base, Md. When the assessment<br />

is completed, JITC will issue a “Status <strong>of</strong> Interoperability” letter,<br />

which will help the <strong>Navy</strong> thoroughly review their target NMCI<br />

implementation strategy and develop lessons learned.<br />

JITC’s <strong>Information</strong> Assurance (IA) team conducts code vulnerability<br />

assessments, penetration tests, commercial product testing,<br />

and security tool assessments. Testers also provide assistance<br />

during the DoD <strong>Information</strong> Technology Security Certification and<br />

Accreditation Process (DITSCAP), and the National <strong>Information</strong><br />

Assurance Certification and Accreditation Process (NIACAP). The<br />

IA laboratory at the Indian Head facility employs four individual<br />

enclaves that are networked over a three-tier architecture. The<br />

IA lab can replicate almost any <strong>Navy</strong> operational environment,<br />

thus providing added realism when testing a system’s reaction<br />

to an unauthorized intrusion. IA assessments <strong>of</strong> the Common<br />

Access Card (CAC) have been conducted relevant to the <strong>Navy</strong>’s<br />

implementation <strong>of</strong> Public Key Infrastructure (PKI) tokens within<br />

the NMCI architecture.<br />

The JITC NTID Surveillance & Reconnaissance Branch has begun<br />

to work closely with the <strong>Navy</strong> regarding developmental testing<br />

<strong>of</strong> the <strong>Navy</strong>’s Vertical Take<strong>of</strong>f and Landing Tactical Unmanned<br />

Aerial Vehicle (VTUAV). JITC became involved with this program<br />

early in the acquisition process,which will allow the <strong>Navy</strong> to mitigate<br />

much <strong>of</strong> the interoperability risks prior to future operational<br />

test events. JITC will soon work with the VTUAV Program Office<br />

to conduct interoperability assessments <strong>of</strong> the VTUAV at selected<br />

sites such as the Naval Weapons Center Detachment, China Lake,<br />

Calif. While conducting these assessments, JITC will determine<br />

the VTUAV’s ability to interoperate with numerous strategic and<br />

tactical C4I systems.<br />

To fulfill its interoperability mission, JITC has established laboratories<br />

and network connectivity to key DoD sites and employs<br />

state-<strong>of</strong>-the art technologies to replicate operational nodes. JITC’s<br />

Risk Mitigation Network employs central connectivity from Fort<br />

Huachuca to <strong>Navy</strong> and other DoD sites, and provides the capability<br />

to test systems in a distributed manner with minimal impact<br />

to operational networks. The Advanced Technology Testbed (ATT),<br />

located at Indian Head,enhances JITC’s current testing infrastructure.<br />

The ATT has positioned itself at the forefront <strong>of</strong> communication<br />

technology and keeps up with the latest communication innovations<br />

so JITC can mitigate the risk <strong>of</strong> introducing new technology<br />

within the DISN. The ATT includes modern communication<br />

technologies such as Gigabit Ethernet, Packet Over SONET<br />

(POS),Multi-Protocol Label Switching (MPLS),IP Telephony,Dense<br />

Wavelength Division Multiplexing and wireless LAN technology.<br />

JITC observed a transformation in the IT industry that warrants<br />

changes to test methods. Because <strong>of</strong> spiral development, the<br />

timeline for bringing a product to the field has been significantly<br />

reduced, which requires the tester to become involved early in<br />

the process. This demands a testing environment that can closely<br />

emulate a production setting with development features. For<br />

these reasons,the ATT employs a multi-vendor/multi-technology<br />

layout. Connectivity to the ATT will allow the <strong>Navy</strong> to take advantage<br />

<strong>of</strong> the lab’s many unique test capabilities.<br />

In the near future, the <strong>Navy</strong> and other services will also establish<br />

connectivity via the Joint Distributed Engineering Plant (JDEP) to<br />

conduct distributed test events. To a certain extent, the JDEP<br />

program (a diagram <strong>of</strong> the JDEP architecture is shown on the next<br />

page) was initiated based on the success <strong>of</strong> the <strong>Navy</strong>’s DEP. In<br />

accordance with Defense Planning Guidance, the JDEP program<br />

was established as a DoD-wide effort to link DoD and joint combat<br />

system engineering and test sites. It is designed to improve the<br />

interoperability <strong>of</strong> systems through rigorous testing and<br />

evaluation in a replicated battlefield environment. The DISA IN<br />

Directorate serves as the manager <strong>of</strong> the JDEP and oversees the<br />

execution <strong>of</strong> the program. The JITC JDEP Division serves as the<br />

JDEP Coordinator and is responsible for identifying candidate sites<br />

and federations, cataloging system and network capabilities, and<br />

defining the overall technical architecture. JDEP baseline sites<br />

include <strong>Navy</strong> activities such as NAVAIR Patuxent River, Md.; Naval<br />

Surface Warfare Center (NSWC) Dam Neck, Va.; SPAWARSYSCEN<br />

Charleston, S.C.; and SPAWARSYSCEN San Diego, Calif. JITC will<br />

work closely with these activities,as well as other DoD sites,during<br />

collaborative engineering team meetings and JDEP test events.<br />

JDEP strategies coincide with Joint Vision 2010 and 2020<br />

initiatives. JITC is poised to support the collaborative test<br />

opportunities and interoperable environment that JDEP <strong>of</strong>fers to<br />

joint warfighters.<br />

JITC is well known for the exercise<br />

and operational contingency<br />

support they provide to<br />

Combatant Commanders<br />

worldwide. JITC supports seven<br />

to nine exercises each year in<br />

support <strong>of</strong> joint and combined<br />

interoperability initiatives aug-<br />

JITC testers perform analysis <strong>of</strong><br />

the Submarine AN/SYQ-28(V)<br />

Single Messaging Solution<br />

(SMS) and other tactical<br />

systems.<br />

CHIPS Winter 2003 27


JDEP Joint Architecture<br />

menting combatant commander staffs with on-site technical support.<br />

JITC has supported exercises such as Combined Endeavor,<br />

Unified Endeavor, Foal Eagle and Roving Sands, as well as operational<br />

contingencies such as Desert Storm and Operation Enduring<br />

Freedom.<br />

The JITC NTID Networks and Integration Branch serves as the coordinator<br />

and test lead for the DICE on behalf <strong>of</strong> the Joint Forces<br />

Command (JFCOM). DICE represents a coast-to-coast joint service<br />

interoperability test that focuses on warfighting requirements.<br />

The DICE network is designed to emulate a JointTask Force<br />

(JTF) architecture. DICE distributed tests are accomplished in<br />

phases using JITC laboratory resources, assets from active units,<br />

and other DoD test facilities. The overall purpose <strong>of</strong> DICE is to<br />

assess new/improved DoD tactical and strategic switching systems,transmission<br />

systems and terminal devices,and certify these<br />

systems for joint interoperability. Naval ships such as the USS<br />

Mount Whitney, USS George Washington and USS Nassau have<br />

been active participants in past DICE events.<br />

The NTID Networks & Integration Branch also supports JUICE on<br />

behalf <strong>of</strong> JFCOM. JUICE allows the Services to evaluate deployable<br />

communication configurations and their interfaces to the GIG.<br />

Besides providing great training opportunities,this event affords<br />

the opportunity for the <strong>Navy</strong> and other Services to refine operational<br />

configurations, monitor the applicability <strong>of</strong> tool sets, and<br />

evaluate reporting procedures. JITC also provides 24-hour hot<br />

line support to Combatant Commanders and DoD personnel. For<br />

instance, if a Sailor needs technical assistance to restore a circuit,<br />

he/she may call 1-800-LET-JITC to receive troubleshooting information.<br />

If the JITC technical expert cannot provide the necessary<br />

assistance over the phone, it is likely that he/she will be dispatched<br />

to the Sailor’s location to resolve the problem.<br />

JITC developed the Joint Interoperability Tool (JIT) to further assist<br />

the warfighter. The JIT is a Web-based repository <strong>of</strong> information<br />

that is available via controlled access over the NIPRNET or<br />

directly over the SIPRNET. The JIT has a powerful search engine<br />

that permits users to access test reports, interoperability certification<br />

letters, reference manuals and valuable lessons learned.<br />

The JIT is constantly updated with new information, allowing the<br />

Services to obtain vital information that is always current.<br />

To ensure that warfighter objectives are satisfied, JITC must view<br />

its interaction with DoD services and agencies as a partnership.<br />

JITC works in tandem with some organizations by way <strong>of</strong> unspoken<br />

agreements or established written agreements. JITC recognizes<br />

the need to initiate“formal”partnerships with key <strong>Navy</strong> organizations<br />

in order to achieve joint interoperability goals.<br />

In May 2002, JITC Commander, Col. Terry Pricer, USAF, signed a<br />

Memorandum <strong>of</strong> Agreement (MOA) with several organizations,<br />

making JITC the newest member <strong>of</strong> the Chesapeake Regional<br />

Ranges Cooperative (CRRC). As a member <strong>of</strong> the CRRC, JITC will<br />

assist the <strong>Navy</strong> and the other Services in providing a streamlined<br />

T&E process for program managers and the acquisition community<br />

in the Chesapeake region and beyond. JITC will soon collaborate<br />

with CRRC partners (NAVAIR Atlantic Test Ranges (ATR),<br />

NAVSEA Combat Direction Systems Activity (CDSA),CINCLANTFLT,<br />

Aberdeen Test Center (ATC) and Fort A.P.Hill) for cooperative testing,assistance<br />

during Joint Task Force Exercises (JTFEX),and support<br />

<strong>of</strong> programs such as the Tactical Tomahawk. This partnership<br />

will demonstrate how collaborative testing and resource<br />

sharing will enhance military readiness, reduce costs, and support<br />

the RDT&E and interoperability requirements <strong>of</strong> DoD acquisition<br />

managers.<br />

In 2001, JITC and the SPAWAR CINC Interoperability Program Office<br />

(CIPO) began pursuing activities that would lead to closer<br />

relations with other DoD agencies responsible for joint<br />

interoperability. Both organizations determined that significant<br />

benefits could be gained by having a SPAWAR liaison on-site at<br />

JITC headquarters. In order to accomplish this, a JITC/SPAWAR<br />

CIPO Memorandum <strong>of</strong><br />

Agreement (MOA) was<br />

staffed and signed in June<br />

2002. It defined organizational<br />

responsibilities and<br />

<strong>of</strong>ficer at the Fort<br />

JITC Commander Col. Terry Pricer,<br />

USAF, (right) Capt. John Melear, USN<br />

(center) sign the JITC/SPAWAR CIPO<br />

MOA,while JITC Deputy Commander,<br />

Mr. Denis Beaugureau looks on.<br />

established a CIPO liaison<br />

at the Fort Huachuca facility.<br />

This MOA strengthens<br />

the relationship between<br />

JITC and the <strong>Navy</strong> and encourages<br />

the sharing <strong>of</strong> information<br />

and resources. It<br />

is also seen as a way to enhance<br />

exercise coordination,<br />

<strong>of</strong>fer SPAWAR direct<br />

access to the appropriate <strong>of</strong>fices at JITC, provide an interface between<br />

the JITC testing community and SPAWAR Code 053, and<br />

enhance systems design prior to programmatic testing and<br />

implementation.<br />

Through a follow-on Memorandum <strong>of</strong> Understanding (MOU)<br />

signed in September 2002,JITC and SPAWAR <strong>of</strong>ficially established<br />

a partnership for facilitating DT,OT,and joint interoperability certification<br />

<strong>of</strong> the <strong>Navy</strong>’s IT and NSS infrastructure. Ultimately, JITC<br />

will improve its fleet support posture and further cultivate its relationship<br />

with the <strong>Navy</strong>, as the <strong>Navy</strong>’s acquisition, engineering,<br />

and operational communities fully understand and institute joint<br />

interoperability test processes, procedures and doctrine.<br />

Chris Watson is an <strong>Information</strong> Technology Systems Project <strong>Officer</strong><br />

at the Joint Interoperability Test Command.<br />

28 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


East Timor: A Case Study in C4I Innovation<br />

By Col. Lyle M. Cross, USMC with Col. Randy P. Strong, USA, Lt. Col. Clinton D.Wadsworth, USMC and Dave Delaunay<br />

Introduction<br />

U.S. involvement in East Timor is a success story <strong>of</strong> peacemaking<br />

and country-rebuilding. The United States Pacific Command<br />

(USPACOM) and U.S. Forces continue to play a critical role in the<br />

international effort to assist the people <strong>of</strong> East Timor. East Timor<br />

is more than 5,600 miles from Hawaii and another 3,000 from<br />

locations in CONUS where many <strong>of</strong> the U.S. Forces that provided<br />

communications support were based. Timor is the Malay word<br />

for Orient; it is part <strong>of</strong> the Malay Archipelago, as shown in Figure<br />

1,and is the largest <strong>of</strong> the easternmost <strong>of</strong> the Lesser Sunda Islands.<br />

The population is 90 percent Roman Catholic, 4 percent Muslim<br />

and 3 percent Protestant.<br />

East Timor was a Portuguese colony for more than 400 years until<br />

1974, when Portugal sought to establish a provisional government<br />

and popular assembly to determine the future <strong>of</strong> East Timor.<br />

Civil war broke out between those who favored independence<br />

and those who advocated integration with Indonesia. Portugal<br />

withdrew when authorities were unable to maintain stability. Indonesia<br />

intervened militarily and integrated East Timor as its 27th<br />

province in 1976. The United Nations and the international community<br />

did not recognize this integration and both the U.N. Security<br />

Council and the General Assembly called for Indonesia’s<br />

withdrawal,but for nearly 20 years little action was taken. During<br />

this time the East Timorese lived under threat <strong>of</strong> death at the<br />

hands <strong>of</strong> the occupying Indonesian military. In June 1998, Indonesia,prompted<br />

by pressure from the U.N.General Assembly,proposed<br />

a limited autonomy for East Timor within Indonesia. The<br />

two governments entrusted the Secretary-General with organizing<br />

and conducting a“popular consultation”to ascertain whether<br />

the East Timorese people were in favor <strong>of</strong> special autonomy within<br />

the Republic <strong>of</strong> Indonesia.<br />

To carry out the consultation, the Security Council, by resolution<br />

1246 (1999) authorized the establishment <strong>of</strong> the United Nations<br />

Mission in East Timor (UNAMET) June 11, 1999. On voting day,<br />

August 30,1999,98 percent <strong>of</strong> registered voters went to the polls<br />

— 78 percent rejected the proposed autonomy in favor <strong>of</strong> full<br />

independence. Immediately following the announcement pro-<br />

Jakarta militia groups aided by Indonesian armed forces began a<br />

campaign <strong>of</strong> violence, looting and destruction. Many East<br />

Timorese were killed and as many as 500,000 were displaced from<br />

their homes. Indonesian authorities did not respond effectively<br />

to end the violence. The Secretary-General and Security Council<br />

undertook intense diplomatic efforts to press Indonesia into action.<br />

International pressure mounted.<br />

Finally,the U.N.Security Council voted unanimously Sept.14,1999,<br />

to authorize an Australian-led International Force East Timor<br />

(INTERFET) under Chapter 7 <strong>of</strong> the U.N. Charter. U.S. Forces, in<br />

support <strong>of</strong> OPERATION STABILISE (as the Australians called it),<br />

began deploying into Darwin. Brig. Gen. Castellaw, 3rd Marine<br />

Expeditionary Force on Okinawa, Commander <strong>of</strong> the U.S. Forces<br />

INTERFET (USFI) arrived Sept.17,followed by the USCINCPAC MSQ­<br />

126 with 18 personnel Sept. 19.<br />

Darwin<br />

East Timor<br />

Hawaii<br />

5,619 miles<br />

Figure 1.<br />

Communications support provided by U.S. Forces played a pivotal<br />

role in the success <strong>of</strong> the U.N. mission in East Timor. The U.S.<br />

military’s mission was to provide communications and intelligence<br />

planners, as well as ships and helicopters to move troops<br />

and equipment. The tyranny <strong>of</strong> distance, that is a constant factor<br />

in planning in the Pacific theater, was a distinct disadvantage to<br />

finding a solution to restore peace and a stable independent government<br />

to East Timor. The one saving grace <strong>of</strong> the geographical<br />

circumstances was the proximity <strong>of</strong> Darwin to East Timor and its<br />

capital, Dili. Darwin was used as an intermediate staging base<br />

and the location <strong>of</strong> the Commander U.S. Forces INTERFET headquarters.<br />

Essential to the success <strong>of</strong> our mission was the transition<br />

from military to a commercial solution for communications<br />

support.<br />

The entire international force was comprised <strong>of</strong> more than 8,000<br />

military members from 15 different countries including approximately<br />

5,000 U.S. military, most <strong>of</strong> which were stationed <strong>of</strong>fshore<br />

on ships. U.S. ground forces numbered about 300. At the height<br />

<strong>of</strong> the crisis, 40 different United Nations and humanitarian agencies<br />

were providing support. The timeline, shown below, illustrates<br />

significant events in East Timor’s quest for independence<br />

and coalition assistance.<br />

05 May 99 - Indonesia agrees to hold referendum in August<br />

11 Jun 99 - UNAMET is established<br />

30 Aug 99 - East Timorese reject autonomy via democratic election<br />

31 Aug 99 - Violence erupts for the next several days<br />

31 Aug 99 - USFI Liaison <strong>of</strong>ficers deploy to Brisbane<br />

11 Sep 99 - Planners deploy to Brisbane<br />

12 Sep 99 - Indonesian President requests international peacekeepers<br />

15 Sep 99 - U.N. Security Council authorizes INTERFET<br />

15 Sep 99 - Establishment <strong>of</strong> U.S. Forces INTERFET<br />

18 Sep 99 - U.S. Forces Darwin HQ established<br />

27 Sep 99 - COMUSF INTERFET Dili HQ established<br />

Feb 00 - U.N.Transitional Administration East Timor assumes responsibility<br />

for peacekeeping operation<br />

C4I Communications<br />

The area <strong>of</strong> operations presented many challenges for the communications<br />

units. Five-hundred miles separated Darwin (ISB) and<br />

Dili (FSB). When the first servicemembers arrived, East Timor lay<br />

in ruins, there was little infrastructure <strong>of</strong> any kind remaining in<br />

CHIPS Winter 2003 29


Figure 2. CINCPAC MSQ­<br />

126 Fly Away Command<br />

Post. The MSQ-126 can<br />

deploy via (1) C17, (1) C5<br />

or (4) C130s. It can<br />

support a staff <strong>of</strong> 30 with<br />

the full range <strong>of</strong> DISN<br />

services.<br />

Dili or the outlying areas due to the looting<br />

and arson,which had occurred. Almost<br />

total destruction <strong>of</strong> the infrastructure included<br />

electrical and sewage disposal systems.<br />

Most <strong>of</strong> the buildings had been<br />

burned and/or gutted <strong>of</strong> fixtures. (Within<br />

weeks U.S. Forces began to see the city recover<br />

due to massive humanitarian assistance<br />

administered by numerous agencies.)<br />

Additionally,the mountainous geography<br />

<strong>of</strong> East Timor hampered line-<strong>of</strong>-sight<br />

communications between tactical forces.<br />

These factors dictated the deployment <strong>of</strong><br />

U.S. military communications assets. From<br />

September 1999 through February 2000,<br />

U.S. Forces INTERFET met the highly dynamic<br />

C4 support requirements for peacekeeping<br />

and the subsequent humanitarian<br />

assistance operations effectively.<br />

This success was the result <strong>of</strong> effective<br />

planning and phasing <strong>of</strong> C4 forces. The<br />

CINCPAC MSQ (shown in Figure 2) is a<br />

USPACOM C4 asset designed for rapid<br />

deployment to provide DISN services for<br />

early entry forces. The MSQ-126 arrived in<br />

Darwin Sept. 19, and provided DSN,<br />

NIPRNET, SIPRNET, video, GCCS and<br />

AUTODIN messaging. The 31st Marine<br />

Expeditionary Unit’s JTF Enabler arrived in<br />

Dili Oct. 9, to support COMINTERFET,<br />

Australian Maj. Gen. Peter Cosgrove.<br />

Another early entry C4 capability, the<br />

Enabler package provided DSN, NIPRNET<br />

and SIPRNET. It departed on Oct. 23, after<br />

lead elements <strong>of</strong> Task Force Thunderbird<br />

(shown in Figure 3) arrived in Dili Oct. 20,<br />

to assume the mission for INTERFET. This<br />

task force, comprised <strong>of</strong> the 86th Signal<br />

Battalion, and elements <strong>of</strong> the 40th and<br />

504th Signal Battalions, all from Fort<br />

Huachuca, Ariz., provided the principle C4<br />

support promised to the U.N. effort.<br />

PACOM’s J6, Col. Randy Strong, USA, was<br />

assigned as the Commander, U.S. Forces<br />

East Timor. Five soldiers and one civilian<br />

contractor provided continuous support<br />

to INTERFET.<br />

Thirty-seven personnel provided Counterintelligence/Human<br />

Intelligence (CI/<br />

HUMINT) support to INTERFET. This support<br />

capability,shown in Figure 4,provided<br />

threat information and counterintelligence<br />

operations, and ensured commanding <strong>of</strong>ficers<br />

had the information they needed to<br />

carry out operations throughout East<br />

Timor. The network configuration that was<br />

used is shown in Figure 5. The diagram represents<br />

the major pieces <strong>of</strong> the final architecture<br />

to support U.S. Forces. It reflects a<br />

robust configuration with redundant paths<br />

to the two key entry points within the Pacific<br />

theater.<br />

Transition from military to commercial<br />

communications moved quickly with the<br />

approval <strong>of</strong> a detailed transition plan on<br />

Oct. 30, 1999. By Jan. 1, 2000 the communications<br />

commercialization was completed.<br />

Of the 300 U.S. personnel employed<br />

at the height <strong>of</strong> the operation, 150<br />

<strong>of</strong> them were dedicated to the military C4<br />

mission. The commercialization allowed<br />

them to return to their home stations with<br />

their equipment, which included seven<br />

SHF satellite terminals, six telephone<br />

switches and three data hubs,as well as numerous<br />

line-<strong>of</strong>-sight multichannel radios.<br />

The impact on operational to strategic resources<br />

was also alleviated, as four standard<br />

tactical entry point (STEP) missions for<br />

Figure 3. These are the assets<br />

<strong>of</strong> Task Force Thunderbird.<br />

Additionally, the 11th Signal<br />

Brigade used four satellite<br />

terminals, several voice and<br />

data switches and numerous<br />

line-<strong>of</strong>-sight multichannel<br />

radio systems.<br />

Figure 4. Intelligence support was provided<br />

by CINCPAC Unit 205th MI and JICPAC. The<br />

Trojan Spirit provided links to all-source<br />

intelligence and Intelink-C.<br />

DISN services were terminated. The<br />

timeline used to move to a commercial<br />

communications solution is shown below.<br />

13 Oct 99 - Contract for Telstra let<br />

21 Oct 99 - COMUS INTERFET C4 “green”<br />

30 Oct 99 - C4 transition plan approved<br />

15 Nov 99 - Redeployment <strong>of</strong> C4 units<br />

15 Dec 99 - TF Thunderbird departs Dili<br />

1 Jan 00 - Commercialization complete<br />

26 Jan 00 -Transition <strong>of</strong> USFI to USGET<br />

1 Feb 00 - USFI disestablished<br />

USGET established<br />

Telstra, jointly owned by the Australian<br />

government and private industry,installed<br />

the “Big Pipe” pictured in Figure 6. It was<br />

used to extend commercial bandwidth<br />

into Dili from Australia. Through this<br />

means, USGET (United States Support<br />

Group East Timor) had access to both the<br />

SIPRNET and NIPRNET through Cisco routers<br />

and Type 1 encryption devices (NES).<br />

Ericson provided commercial satellite telephones,<br />

which were later replaced by<br />

Iridium.<br />

Using this capability COMUSINTERFET was<br />

provisioned with NIPRNET and SIPRNET<br />

service. Secure voice service was provided<br />

through the use <strong>of</strong> a public telephone exchange<br />

and encrypted using STU IIIs. Redundant<br />

secure voice services were added<br />

using Inmarsat and Iridium. Cellular telephones<br />

and hand-held radios were used<br />

for non-secure voice. As the mission<br />

transitioned from peacekeeping to humanitarian<br />

assistance, the commercial architecture<br />

changed as well.<br />

In addition to a substantial savings in resources,<br />

equipment and personnel, commercialization<br />

resulted in a responsive and<br />

scalable C4 solution. COMUSGET has<br />

changed locations four times since their<br />

establishment, but each time the services<br />

30 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


were easily reinstalled to meet mission requirements.<br />

Central Command used commercial<br />

satellite deployable KU earth terminal<br />

(DKET), and encryption devices to<br />

provide DISN service in austere environments.<br />

The commercialization <strong>of</strong> communications<br />

for East Timor served as a prototype<br />

for future DoD commercialization efforts.<br />

The international community’s assistance<br />

in East Timor has been one <strong>of</strong> the most successful<br />

peace enforcement and country-rebuilding<br />

missions in recent years. As the<br />

mission in East Timor continues to evolve,<br />

U.S. Forces have sent in different assets.<br />

U.S. Forces have been instrumental in delivering<br />

food and other supplies,engaging<br />

in community projects and transporting<br />

diplomatic and peacekeeping representatives<br />

to East Timor.<br />

Even though East Timor became an independent<br />

nation May 29, 2002, the work is<br />

certainly not over. The United Nations continues<br />

to maintain a presence in East Timor<br />

to ensure its security and stability. The successor<br />

mission,the United Nations Mission<br />

<strong>of</strong> Support in East Timor (UNMISET) is planning<br />

a gradual withdrawal <strong>of</strong> the territory<br />

and supports the East Timorese authorities<br />

to maintain democracy and justice, internal<br />

security and law enforcement,and border<br />

control. Humanitarian agencies continue<br />

to provide assistance as well.<br />

Col. Cross is the <strong>Chief</strong>, C4 Operations and<br />

Plans Divisions, USCINCPAC.<br />

Ft. Buckner<br />

Gateway<br />

Baucau<br />

93<br />

LTU<br />

Thai<br />

Brigade<br />

LTU<br />

Network Diagram<br />

85<br />

Darwin<br />

85<br />

Dili<br />

93 93<br />

COMIFET<br />

174 175<br />

COMUSF<br />

Waihiwa<br />

Gateway<br />

173 173 138 138<br />

APOE<br />

FCC-100<br />

FCC-100<br />

Figure 5.<br />

Figure 6. The “Big Pipe” used to extend the<br />

commercial bandwidth into Dili from Australia for<br />

USGET access to SIPRNET and NIPRNET using Cisco<br />

routers and Type 1 encryption devices (NES). This<br />

was the “longest pole” ever used in exit strategy,<br />

which combined the talents <strong>of</strong> the U.S. Joint Staff<br />

J6, 11th Signal Brigade Program, Telstra, Cisco and<br />

Ericson, and was certainly an example <strong>of</strong> capitalism<br />

working at its best.<br />

FCC-100<br />

FCC-100<br />

SPOE ASG LCSG<br />

Humanitarian and Civic Assistance<br />

The United States has an ongoing commitment to<br />

the newly formed East Timor nation. U.S. <strong>Navy</strong><br />

personnel have completed numerous community<br />

service projects including painting <strong>of</strong> the August<br />

School in Feb. 2001. Aug. 2001, the Seabees with<br />

Naval Construction Battalion 5, U.S. Pacific Fleet,<br />

Calif., worked on the Bemos water treatment<br />

plant in the effort to rebuild the nation’s<br />

infrastructure. During this visit a local orphanage<br />

also benefited from structural improvements,<br />

and electrical and plumbing repairs. U.S. efforts<br />

have focused on assistance to improve basic<br />

health and social conditions, and the overall<br />

quality <strong>of</strong> life for the people <strong>of</strong> East Timor.<br />

Clockwise from top left to right: Dili, East Timor - Feb. 2001, a U.S. <strong>Navy</strong> corpsman assigned to USS Juneau takes a young<br />

girl’s temperature; Dec. 2001, U.S. <strong>Navy</strong> Seabees attached to the U.S. Support Group East Timor check an electrical panel at<br />

Bemos water treatment plant; Oct. 2002, a U.S. <strong>Navy</strong> doctor examines a patient as part <strong>of</strong> the Amphibious Ready Group’s<br />

medical support during a three-day rotation in East Timor; Apr. 2002, a service member teaches basic math skills to some<br />

children.<br />

CHIPS Winter 2003 31


Restructuring<br />

Naval Education<br />

By JO2 Jd Walter, NPDC, Public Affairs Office<br />

The <strong>Navy</strong> recently created the Naval Personnel<br />

Development Command (NPDC) to<br />

standardize and integrate the training processes<br />

and technology <strong>of</strong> its Learning Centers.<br />

NPDC evolved from the Task Force for<br />

Excellence through Commitment to Education<br />

and Learning (EXCEL) and its efforts<br />

to institutionalize the precepts <strong>of</strong> the<br />

<strong>Navy</strong>’s Revolution in Training.<br />

Currently, there are plans for 15 functional<br />

Learning Centers under NPDC with each<br />

being directly responsible for the end-toend<br />

development <strong>of</strong> learning tools and<br />

opportunities within a given occupational<br />

arena. By providing the formal connection<br />

between the Fleet and individual training,<br />

the Learning Centers will facilitate a relationship<br />

with Fleet representatives to identify<br />

human performance deficiencies,build<br />

and deliver solutions,and evaluate results.<br />

The Learning Centers comprise the core <strong>of</strong><br />

the new organization. The centers will utilize<br />

the Sailor Continuum and Human Performance<br />

Systems Model to develop pr<strong>of</strong>essional<br />

continuums and serve as the<br />

knowledge managers for all occupational<br />

fields and mission areas. Additionally, centers<br />

for leadership and pr<strong>of</strong>essional development<br />

will be established to ensure the<br />

whole person development <strong>of</strong> Sailors. The<br />

Center for Naval Leadership in Norfolk,Va.;<br />

Center for Naval Intelligence at Dam Neck,<br />

Va.; and Centers for Naval Aviation Technical<br />

Training and Cryptology in Pensacola,<br />

Fla., all stood up on a provisional basis in<br />

September 2002. The remaining centers<br />

will be provisionally stood up in the near<br />

future. They will assume responsibility for<br />

the operations and functions <strong>of</strong> their core<br />

areas. Each center will have a Commanding<br />

<strong>Officer</strong> and the final organizational construct<br />

and manning will be determined billet<br />

by billet to best support mission needs.<br />

So,just as the <strong>Navy</strong>’s Revolution in Training<br />

steers toward the complete development<br />

<strong>of</strong> Sailors, it is likewise piloting the<br />

improvements to the <strong>Navy</strong>’s training organization,<br />

giving both Sailors and the <strong>Navy</strong><br />

the tools to learn, grow, lead and excel. To<br />

learn more about this revolutionary structure,visit<br />

<strong>Navy</strong> Knowledge Online,at https:/<br />

/www.nko.navy.mil<br />

<strong>Navy</strong> Knowledge<br />

Management Portal<br />

<strong>Navy</strong> education and training created a new<br />

way for Sailors to manage their careers via<br />

the Internet. <strong>Navy</strong> Knowledge Online<br />

(NKO), the knowledge management portal,<br />

gives Sailors instant access to all training<br />

and educational information related to<br />

their occupational field.<br />

Knowledge management is the gathering<br />

<strong>of</strong> organizational processes,systems,methodologies,visions<br />

and resources into a centralized<br />

location. For Sailors, the knowledge<br />

management portal will identify career<br />

paths, milestones, and educational<br />

tools and opportunities. For the <strong>Navy</strong>, this<br />

will result in greater operational efficiency<br />

and eliminate organizational redundancies.<br />

To develop the portal, the <strong>Navy</strong><br />

teamed with Appian, a provider <strong>of</strong> largescale<br />

s<strong>of</strong>tware solutions. “We wanted to<br />

provide every Sailor with a personalized<br />

gateway to the <strong>Navy</strong>’s knowledge base for<br />

all pr<strong>of</strong>essional and personal development,”<br />

said Rear Adm. Kevin Moran, Commander<br />

Naval Personnel Development<br />

Command/Director, Task Force for Excellence<br />

through Commitment to Education<br />

and Learning. “We selected Appian based<br />

on their track record.”<br />

The faceplate <strong>of</strong> the portal will be individualized<br />

Web pages that Sailors can customize.<br />

This portable Web page will be assigned<br />

to Sailors during boot camp and<br />

will remain accessible throughout their<br />

<strong>Navy</strong> careers. The portal will give Sailors<br />

access to the most relevant and up-to-date<br />

career information as easy as point, click,<br />

and learn. To visit NKO go to https://<br />

www.nko.navy.mil. To learn more about the<br />

development <strong>of</strong> the knowledge management<br />

portal, visit www.excel.navy.mil.<br />

Surface Combat Operations<br />

New Home<br />

By George Dunn, CSCS, Public Affairs<br />

The <strong>Navy</strong>’s surface combat systems community<br />

has a new home, courtesy <strong>of</strong> the<br />

Revolution in Training. The Center for Surface<br />

Combat Systems (CSCS) has been established<br />

in Dahlgren, Va., and will be responsible<br />

for training the commissioned<br />

and enlisted personnel who operate,maintain,<br />

and employ the various combat systems<br />

found on the <strong>Navy</strong>’s surface warships.<br />

Initially, CSCS is being staffed by Aegis<br />

Training and Readiness Center (ATRC)<br />

headquarters personnel, also located in<br />

Dahlgren,and key surface combat systems<br />

training activities’ personnel from around<br />

the Fleet. Capt. Paul Stanton, ATRC commanding<br />

<strong>of</strong>ficer, will be dual-hatted as<br />

CSCS commanding <strong>of</strong>ficer. ATRC, which<br />

trains <strong>Navy</strong> personnel in the operation,<br />

maintenance, and employment <strong>of</strong> the Aegis<br />

Combat System found aboard the<br />

<strong>Navy</strong>’s fleet <strong>of</strong> Aegis cruisers and destroyers,<br />

will be realigned and come under the<br />

auspices <strong>of</strong> the new command. Naval Sea<br />

Systems Command has overseen ATRC<br />

since its establishment in 1985.<br />

“ATRC has had tremendous success in<br />

training the <strong>Navy</strong>’s Aegis Combat Systems<br />

personnel,” said Commander, Naval Personnel<br />

Development Command, Rear<br />

Adm.Kevin Moran. “Their approach to,and<br />

experience with waterfront training,acquisition<br />

support, and weapons systems<br />

interoperability training provides a great<br />

model for future successes <strong>of</strong> the Center.<br />

By leveraging the Aegis training model,the<br />

Center is poised to create a more dynamic<br />

training environment for other surface<br />

combat systems personnel, and will play<br />

an important role in developing the CNO’s<br />

vision to revolutionize <strong>Navy</strong> training.”<br />

In addition to Aegis Fire Control Technician<br />

training and Aegis <strong>of</strong>ficer pipeline training,<br />

CSCS will train the Sonar Technician,<br />

Torpedoman, Gunner’s Mate, Operations<br />

Specialist,Fire Control Technician,Electronics<br />

Technician and Mineman ratings. For<br />

additional information on CSCS and the<br />

Revolution in Training visit https://<br />

www.nko.navy.mil<br />

“The vision <strong>of</strong> the Revolution<br />

in Training is to increase<br />

Sailor pr<strong>of</strong>iciencies by<br />

providing the best training in<br />

the most efficient manner<br />

possible.” <strong>Chief</strong> <strong>of</strong> Naval<br />

Operations, Adm. Vern Clark<br />

said,“What we have now is a<br />

structure that advocates<br />

excellence not only in the<br />

individual, but also excellence<br />

in the management <strong>of</strong><br />

training and education.”<br />

32 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


Virtual Connecting Technology Fall 2002, December 3-17,<br />

was engineered to arm the warfighter with 21st century<br />

<strong>Information</strong> Technology (IT). The CT staff provided loyal<br />

attendees and newcomers alike with an integrated avenue to<br />

keep abreast <strong>of</strong> emerging IT supporting the <strong>Navy</strong>’s role in homeland<br />

security.<br />

Visitors to Virtual CT at www.ct.navy.mil were informed and<br />

challenged with the latest in wireless technology,NMCI updates,<br />

the C4ISR vision, Knowledge Management, eBusiness,<br />

eCommerce, eLearning, Data Warehousing, pr<strong>of</strong>essional development<br />

opportunities and much more. Our goal was to provide<br />

the warfighter, and those who support and direct the<br />

warfighter, with the most current IT resources needed to remain<br />

on the cutting edge <strong>of</strong> homeland defense.<br />

The Virtual Connecting Technology Fall 2002 event was FREE to<br />

all attendees and exhibitors! Those who participated had the<br />

opportunity to:<br />

♦Explore emerging products,Government and Industry visions,<br />

policies, and services that increase the effectiveness <strong>of</strong> the<br />

warfighter.<br />

♦Gain perspectives on topics affecting the future <strong>of</strong> IT and <strong>Information</strong><br />

Management (IM) throughout the <strong>Department</strong> <strong>of</strong> the<br />

<strong>Navy</strong>, <strong>Department</strong> <strong>of</strong> Defense, Federal Government, Academia,<br />

and Industry.<br />

♦Explore the Virtual Exhibition and Presentation Halls using a<br />

variety <strong>of</strong> search functions.<br />

♦Forge new partnerships with IT/IM Leaders by creating an<br />

eBusiness Card to deposit with exhibitors and presenters.<br />

♦Send a Virtual eCard from the event to friends and colleagues.<br />

♦Leave the event with an understanding <strong>of</strong> who can be contacted<br />

to provide their organization with the services and products<br />

they need.<br />

Mark your calendar now for CT Spring 2003, May 20-22, planned<br />

for the Pavilion Convention Center Virginia Beach, Va., and CT<br />

Fall 2003, Nov. 18-20, planned for the Town and Country Resort<br />

Hotel and Convention Center, San Diego, Calif.<br />

Please visit our Web site at www.ct.navy.mil for more information.<br />

You may also contact the Connecting Technology staff via<br />

e-mail at conntech@spawar.navy.mil or call (757) 444-9967.<br />

Please join us as we support the 21st century warfighter through<br />

an exchange <strong>of</strong> IT ideas and innovations.<br />

Connecting Technology is sponsored by the<br />

DON <strong>Information</strong> Technology Umbrella Program<br />

Visit us at www.it-umbrella.navy.mil<br />

NAVAIR Response Center<br />

By Vicky Falcon, NAVAIR Public Affairs<br />

Onboard the deployed USS Boxer (LHD-4), AT1 Roger Rever was<br />

upgrading a computer processor on a CH-53D“Sea Stallion”helicopter<br />

as part <strong>of</strong> his job as a Quality Assurance Representative in<br />

the Aircraft Intermediate Maintenance <strong>Department</strong> onboard. The<br />

upgrade was part <strong>of</strong> an Avionics Change (AVC) ordered through<br />

a <strong>Navy</strong> Technical Directive for the AN/AAR-47 Missile Warning Set<br />

installed onboard. The AN/AAR-47 is a passive missile detection<br />

system that detects attacking missiles and provides an audio and<br />

visual approach sector warning to the crew.<br />

“While upgrading from a -3 model to a -4 model we discovered<br />

that one <strong>of</strong> the processors onboard had never been upgraded<br />

from the -2 version,” said Rever. “We suspected that we could<br />

update the -2 to a -4 through the incorporation <strong>of</strong> the current<br />

AVC,but we needed to be sure — after all,lives could be at stake!”<br />

Usually, Rever would find the Fleet Support Team (FST) for the<br />

item in question and contact them for direction. However, in this<br />

case he was unable to locate a contact for the AAR-47 system.<br />

Rever decided to take advantage <strong>of</strong> the <strong>Navy</strong> Distance Support<br />

infrastructure by submitting his request via an online form found<br />

at www.anchordesk.navy.mil/index.htm. The request was processed,<br />

given a tracking number, and forwarded to the NAVAIR<br />

Response Center (NRC) for action. Rever could also have reached<br />

the NRC by calling 877-41-TOUCH (press option 2),or by e-mailing<br />

fleetresponse@navair.navy.mil.<br />

The NRC coordinates and facilitates the resolution <strong>of</strong> Naval aviation-related<br />

questions and issues, assisting customers who have<br />

been unable to find answers via their appropriate chains <strong>of</strong> command.<br />

According to Fillip Behrman,program manager for the NRC,<br />

the center links customers with experts across the Naval Aviation<br />

community, ensuring the most current, comprehensive and accurate<br />

responses possible in a timely manner. Delays can <strong>of</strong>ten<br />

be reduced or avoided by utilizing the resources <strong>of</strong> the NRC. “Our<br />

warfighters have the right to expect timely, accurate answers to<br />

their questions — and that’s what we provide,” said Behrman.<br />

Rever was impressed with the efficient and timely response to<br />

his question. “I cannot speak highly enough about the outstanding<br />

job that these (people) do,” said Rever. “I have employed the<br />

NRC on several occasions and their performance has been nothing<br />

less than outstanding — even amazing.”<br />

As part <strong>of</strong> the <strong>Navy</strong>’s Distance Support program the NRC can support<br />

remotely located fleet, Federal Government agencies and<br />

contract customers. The NRC works around-the-clock across traditional<br />

organizational boundaries providing coordinated solutions<br />

to Naval aviation-related questions. For more information<br />

about the NAVAIR Response Center, authorized users can go to<br />

http://nrc.navair.navy.mil.<br />

NAVAIR provides seamless,integrated,advanced warfare technology<br />

through the efforts <strong>of</strong> a worldwide network <strong>of</strong> aviation technology<br />

experts. Services include: pr<strong>of</strong>essional training; carrier<br />

launch and recovery; sensor data and precision targeting; realtime<br />

communications; aircraft and weapons development; and<br />

successful deployment and sustainment. NAVAIR provides matchless<br />

combat capabilities to the warfighter. For more information<br />

about NAVAIR, go to www.navair.navy.mil.<br />

CHIPS Winter 2003 33


CAP Launches<br />

New Web Site!<br />

The <strong>Department</strong> <strong>of</strong> Defense (DoD)<br />

Computer/Electronic Accommodations<br />

Program (CAP) announced the activation<br />

<strong>of</strong> a new, user-friendly Web site, which<br />

provides information on assistive<br />

technology accommodations and related<br />

services for persons with disabilities<br />

within the DoD and other Federal<br />

agencies. The Web site,<br />

www.tricare.osd.mil/cap, showcases<br />

how individuals with disabilities may use<br />

accessible online tools to find information<br />

and accommodations to enhance<br />

job performance.<br />

“When users log on to the CAP Web site,<br />

they will see a new and improved layout<br />

designed to be more accommodating to<br />

our users,” said Dinah Cohen, CAP<br />

Director. “The CAP team worked to<br />

develop a site that allows customers,<br />

people with disabilities, and Federal<br />

managers to customize their personal<br />

search for program and contact information,”she<br />

added.<br />

The site features more resources —<br />

including an enhanced online accommodation<br />

process, a better assistive technology<br />

section, and an improved virtual CAP<br />

Technical Center (CAPTEC) tour — to<br />

assist individuals in selecting the most<br />

appropriate and reasonable accommodations.<br />

The Defense <strong>Department</strong><br />

established CAP in 1990 to eliminate<br />

employment barriers for people with<br />

visual, hearing, dexterity and cognitive<br />

disabilities. Since its inception, CAP has<br />

funded and provided more than 30,000<br />

accommodation solutions for individuals<br />

with visual, hearing, dexterity, and<br />

cognitive disabilities within DoD and<br />

about 50 other Federal agencies.<br />

CAP SERVICES<br />

CAP is the Federal Government’s centrally-funded<br />

accommodations program.<br />

Much <strong>of</strong> CAP’s success lies in its ability to<br />

provide reasonable accommodations to<br />

employees quickly, easily, and in a cost<br />

efficient manner. CAP can assist your<br />

organization by: Purchasing assistive<br />

technology and services; Conducting<br />

needs assessments;<br />

Assisting in technology<br />

integration; Assistive<br />

technology training;<br />

Assisting in accommodations<br />

for work-related<br />

injuries; Supporting<br />

Telework participants<br />

with disabilities; and<br />

Conducting presentations<br />

on CAP services<br />

and other accessibility issues.<br />

THE TECHNOLOGY<br />

CAP pays for a wide variety <strong>of</strong> assistive<br />

technology, devices, and services for<br />

people with disabilities, CAP also provides<br />

training on the technology and<br />

purchases s<strong>of</strong>tware upgrades. Frequently<br />

requested accommodations<br />

include:<br />

•Blind/Low Vision: Magnification systems,<br />

speech and Braille output systems,<br />

scanner/reader systems, Braille embossers,<br />

Closed Circuit Televisions (CCTVs),<br />

and Braille notetakers.<br />

•Deaf/Hard <strong>of</strong> Hearing: Teletypewriters<br />

(TTYs), PC-TTY modems, telephone<br />

amplifiers, assistive listening systems, and<br />

visual signaling devices.<br />

•Dexterity Disabilities: Alternative<br />

keyboards, alternative input devices,<br />

word prediction s<strong>of</strong>tware, speech<br />

recognition systems, pointing devices,<br />

hands-free computer interface systems<br />

and keyguards.<br />

•Cognitive/Learning Disabilities: Talking<br />

dictionaries and scanner/reader systems.<br />

•Communication Disabilities: Electronic<br />

communication aids and speech output<br />

systems to augment communication.<br />

TECHNOLOGY EVALUATION CENTER<br />

The CAP Technology Evaluation Center<br />

(CAPTEC) is a facility dedicated to the<br />

evaluation and demonstration <strong>of</strong><br />

assistive technology. It was established<br />

to assist employees and supervisors in<br />

choosing appropriate assistive technology<br />

to create work environments that<br />

are accessible to persons with disabilities.<br />

CAPTEC also hosts open houses designed<br />

to highlight particular advances<br />

in assistive technology.<br />

The CAP Staff conducts needs assessments<br />

to help identify the most appropriate<br />

solution to meet individual<br />

requirements. CAPTEC consists <strong>of</strong><br />

computer workstations configured with a<br />

wide variety <strong>of</strong> assistive technology.<br />

People in the process <strong>of</strong> evaluating<br />

assistive technology who have questions<br />

about compatibility or functionality, or<br />

who need to compare several solutions,<br />

may visit CAPTEC to test and evaluate<br />

equipment.<br />

Since the release <strong>of</strong> the new Web site,<br />

activity has increased dramatically. Over<br />

400,000 hits were received in October<br />

2002 and CAP continues to experience<br />

daily activity increases.<br />

If you are interested in learning more<br />

about CAP services, disability accommodations,<br />

or other methods <strong>of</strong> impacting<br />

the recruitment, hiring, and retention <strong>of</strong><br />

people with disabilities within the<br />

Federal Government, please visit the new<br />

CAP Web site!<br />

All services are available by<br />

visiting CAPTEC, located in the<br />

Pentagon, Room 2A259, or by<br />

contacting CAPTEC at 703-693­<br />

5160 (V) or 703-693-6189 (TTY).<br />

Regular hours <strong>of</strong> operation are<br />

Monday - Thursday from 9:00<br />

a.m. to 3:00 p.m. or by<br />

appointment. Services are also<br />

available online at<br />

www.tricare.osd.mil/cap<br />

34 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


A Brief History<br />

<strong>of</strong><br />

Personal Computing<br />

Part III<br />

By Retired Major Dale J. Long, USAF<br />

Welcome back to the third in a series <strong>of</strong> articles reviewing the<br />

history <strong>of</strong> personal computing. In the summer issue <strong>of</strong> CHIPS, we<br />

looked at the development <strong>of</strong> the modern personal computer.<br />

In the fall issue,we examined the evolution <strong>of</strong> personal computer<br />

(PC) operating systems and application s<strong>of</strong>tware. In this issue,<br />

we will look at the technologies that tie our PCs together through<br />

networking.<br />

We tend to think <strong>of</strong> digital networking as a relatively new concept,<br />

but the roots <strong>of</strong> modern networking extend back over 150<br />

years. Many years before Charles Babbage created what is considered<br />

the first computer,his“Differential Engine,”the telegraph<br />

ushered in the age <strong>of</strong> digital communications in 1844 when<br />

Samuel Morse sent a message 37 miles from Washington D.C. to<br />

Baltimore using his new invention. While the telegraph is a long<br />

way from today’s computer networks, it was arguably the single<br />

most significant event in human communication since the development<br />

<strong>of</strong> language. For the first time in human history, we<br />

had a reliable method <strong>of</strong> communicating in real-time beyond line<strong>of</strong>-sight.<br />

As long as you could connect two locations with wires,<br />

you could exchange information almost instantaneously without<br />

regard to distance. Much as modern data networks use 1s and 0s<br />

to encode and transfer information,Morse code was the language<br />

<strong>of</strong> the telegraph. Morse code is a binary-like system that uses<br />

dots and dashes in different combinations to represent letters<br />

and numbers. The big difference is, that while the telegraph operators<br />

<strong>of</strong> the mid-19th century could perhaps transmit four or<br />

five dots and dashes per second, computers now communicate<br />

at speeds <strong>of</strong> up to one billion 1s and 0s every second, which we<br />

refer to in digital shorthand as one gigabit or “1Gb.”<br />

Not long after Morse invented the telegraph,a Frenchman named<br />

Emile Baudot developed a typewriter-style telegraph machine<br />

that allowed users to key in their messages using the basic alphabet<br />

and print out received messages using automatic translators<br />

built into the machine. These early precursors to modern<br />

modems allowed virtually anyone to send and receive telegraph<br />

messages without having to understand the code used to transmit<br />

the message. However, Morse code did not lend itself well to<br />

automation due to the variable length <strong>of</strong> each character, so<br />

Baudot developed a more uniform code for his system. Baudot<br />

used a five-bit binary code to represent each character. As that<br />

only gave 32 possible characters (00000 to 11111 = 32), it wasn’t<br />

going to be enough to include all 26 letters and 10 digits. He<br />

solved this problem by adding two “shift characters” for figures<br />

and letters that performed in much the same way as a typewriter<br />

shift key. This gave him 62 combinations (not quite six-bit computing)<br />

for letters,figures and punctuation marks. Western Union,<br />

the most famous telegraph company in history, eventually replaced<br />

all <strong>of</strong> its Morse telegraph equipment with Baudot’s “teletypewriters.”<br />

In honor <strong>of</strong> Baudot’s pioneering contributions, the<br />

speed <strong>of</strong> serial communications is still measured today by measuring<br />

the“Baud rate.”<br />

However, despite being the dominant digital communications<br />

code for over a century, the Baudot five-bit code was not suited<br />

to 20th century computing. Computers, which were developed<br />

independently <strong>of</strong> the telegraph, needed the ability to discriminate<br />

between upper and lowercase letters. Baudot’s code only<br />

provided for uppercase letters. In response to the need for a new<br />

standard information exchange format,a group <strong>of</strong> American communications<br />

companies got together in the 1960s to devise a new<br />

code. Their new standard used seven bits that could represent<br />

128 characters. This new standard came to be known as the<br />

American Standard Code for <strong>Information</strong> Interchange (ASCII).<br />

ASCII was immediately accepted by virtually everyone in the communications<br />

world, with one notable exception: IBM. IBM decided<br />

to make its own standard,the Extended Binary Coded Decimal<br />

Interchange Code (EBCDIC). The IBM code used eight bits<br />

and could represent 256 characters. However, aside from IBM using<br />

it in their mid-range and mainframe computers,EBCDIC never<br />

really caught on. Once it became clear that IBM would not be<br />

able to force their proprietary standard on the rest <strong>of</strong> the world,<br />

they eventually adopted the ASCII code. However, as they still<br />

wanted the extra capabilities inherent in the 8-bit format, they<br />

“extended”ASCII by using an eighth bit so it could represent 256<br />

characters and called it “Extended ASCII.” Now that a common<br />

language for computer data had<br />

been invented,the stage was set for<br />

real computer networking to begin.<br />

Early Networking<br />

The origins <strong>of</strong> the Internet were distilled<br />

from the visions and work <strong>of</strong><br />

computer visionaries <strong>of</strong> the 1960s.<br />

Three <strong>of</strong> the most influential were<br />

the Massachusetts Institute <strong>of</strong> Technology<br />

(MIT) trio <strong>of</strong> J.C.R. Licklider,<br />

Leonard Kleinrock and Lawrence<br />

Roberts. Licklider first proposed a global network <strong>of</strong> computers<br />

in 1962. Later that year he moved to the Advanced Research<br />

Projects Agency (ARPA) to head the work to develop it. Kleinrock<br />

developed the theory <strong>of</strong> packet switching, which would form the<br />

basis <strong>of</strong> Internet connections. Roberts confirmed Kleinrock’s<br />

theory in 1965 when he connected a Massachusetts computer<br />

with a California computer over dial-up telephone lines. However,while<br />

this demonstrated the feasibility <strong>of</strong> wide area networking,<br />

it also showed that the circuit switching technology available<br />

through a standard telephone line was not sufficient to support<br />

any large-scale networking. Shortly after this project,in 1966,<br />

Roberts began work at ARPA and developed the plan for what<br />

eventually became ARPANET.<br />

CHIPS Winter 2003 35


Finding True Believers<br />

When ARPA sent out a request for<br />

proposals to build the initial network<br />

<strong>of</strong> four Interface Message<br />

Processors (IMPs), many <strong>of</strong> the<br />

large computer and telecommunications<br />

organizations did not<br />

bother responding, because they<br />

thought the task was impossible.<br />

Turning ARPA’s networking theory<br />

into reality fell to another group <strong>of</strong><br />

visionaries at a small company<br />

named BBN (Bolt, Beranek and Newman). We take much <strong>of</strong> the<br />

support activities that sustain the Internet for granted today, but<br />

BBN literally created most <strong>of</strong> them from scratch. They wrote code<br />

that would automatically reload crashed servers,pull packets into<br />

the machine, figure out how to route them, and send them on<br />

their way. They also developed a routing scheme that would automatically<br />

route data packets around troubled links in the network<br />

and update itself several times per second. BBN had to<br />

handle some stiff challenges, not the least <strong>of</strong> which was dealing<br />

with the timing and error-control problems associated with sending<br />

data over telephone lines. This was pretty cosmic stuff in an<br />

era where most engineers still carried a slide rule and the microprocessors<br />

that power modern CPUs had not been invented yet.<br />

The key to the design <strong>of</strong> ARPANET was the construction <strong>of</strong> an<br />

autonomous subnet, independent <strong>of</strong> the operation <strong>of</strong> any host<br />

computer. An IMP can take on one <strong>of</strong> two distinct roles: Host or<br />

“store-and-forward.” In any host-to-host connection, the IMPs at<br />

the respective host sites are the source and destination IMPs for<br />

that connection, and the IMPs in the network path between the<br />

host sites comprise the store-and-forward sub-network. The IMPs<br />

<strong>of</strong> the sub-network received packets, performed error control,<br />

determined the route and forwarded them to the next IMP in the<br />

network path. In addition to these tasks, the source IMP and destination<br />

IMP were responsible for end-to-end connection management<br />

and message processing procedures for the duration<br />

<strong>of</strong> the connection. These procedures included flow control, storage<br />

allocation, and message fragmentation and reassembly.<br />

There were many factors that affected the development <strong>of</strong> message<br />

processing requirements. First, there was some likelihood<br />

<strong>of</strong> delay in acknowledging packets due to finite bandwidth or<br />

differing bandwidth at the source or destination. This would result<br />

in packets arriving out <strong>of</strong> order, becoming duplicated if they<br />

weren’t acknowledged by the receiving host in time, or becoming<br />

just plain lost. Also, IMPs only had a limited amount <strong>of</strong> storage<br />

space, so they needed to pass packets on as quickly as possible.<br />

After spending months customizing s<strong>of</strong>tware and systems,<br />

BBN eventually got the first two IMPs set up at the University <strong>of</strong><br />

California at Los Angeles and Stanford. ARPANET was born on<br />

October 1, 1969, when the first characters were transmitted over<br />

the new network. The network quietly expanded to 13 sites by<br />

January 1971 and 23 by April 1972.<br />

Outside <strong>of</strong> BBN and a small group <strong>of</strong> researchers, ARPA, the network<br />

that would transform the world was virtually unknown until<br />

the International Conference on Computer Communication in<br />

Washington,D.C.,October 1972. The ARPANET was the only demonstration<br />

at the conference and conclusively proved the feasibility<br />

<strong>of</strong> packet switching networks. Though most <strong>of</strong> the world<br />

still did not know it,we had taken our<br />

first steps toward wiring the world for<br />

data.<br />

Ethernet<br />

The next big development in networking<br />

after ARPANET and packet<br />

switching was Ethernet, which is still<br />

the dominant network technology<br />

today. The roots <strong>of</strong> the modern<br />

Ethernet were planted in a 1973<br />

Xerox Corporation patent memo that<br />

described a new protocol for multiple computers communicating<br />

over a single cable. Originally intended to help design internal<br />

computer-to-computer communications within Xerox copiers<br />

and duplicators, Ethernet eventually became a global standard<br />

for interconnecting computers on local area networks.<br />

Ethernet was developed by Xerox at their Palo Alto Research Center<br />

(PARC) in California. In 1979, Digital Equipment Corporation<br />

and Intel joined forces with Xerox to standardize the Ethernet system.<br />

The first specification by the three companies, called the<br />

“Ethernet Blue Book” was released in 1980. Ethernet was originally<br />

a 10 megabit per second system (10Mbps = 10 million 1s<br />

and 0s per second). It used a large coaxial backbone cable running<br />

throughout the building, with smaller coax cables attached<br />

at short intervals (usually around six feet) to connect to the workstations.<br />

The large coax became known as “Thick Ethernet” or<br />

“10Base5.” The “10” refers to the speed, which in this case is<br />

10Mbps. “Base”means it is a base band system that uses all <strong>of</strong> its<br />

bandwidth for each transmission,as opposed to a broadband system<br />

that splits the bandwidth into separate channels to be used<br />

concurrently. The“5”refers to the systems maximum cable length,<br />

in this case 500 meters. In 1983, the Institute <strong>of</strong> Electrical and<br />

Electronic Engineers (IEEE) released the <strong>of</strong>ficial Ethernet standard,<br />

IEEE 802.3. This second version is commonly known as Thin<br />

Ethernet or 10Base2 (10Mbps, base band, 200 meters).<br />

In 1985, the Computer Communications Industry Association<br />

(CCIA) asked the Electronics Industries Association (EIA) to develop<br />

a cabling standard which would define a generic telecommunications<br />

wiring system for commercial buildings to support<br />

a multi-product, multi-vendor environment. This would be a cabling<br />

system that would run all current and future networking<br />

systems over a common topology using a common media and<br />

common connectors. By 1987 several manufacturers had developed<br />

Ethernet equipment that could utilize twisted-pair cable,<br />

and in 1990 the IEEE released the 802.3I Ethernet standard<br />

10BaseT ( T refers to twisted-pair cable). In 1991 the EIA together<br />

with the Telecommunications Industry Association (TIA) published<br />

a standard for telecommunications cabling (EIA/TIA 568).<br />

It was based on Cat[egory] 3 Unshielded Twisted Pair cable (UTP),<br />

and was closely followed one month later by a Technical Systems<br />

Bulletin (TSB-36) which specified higher grades <strong>of</strong> UTP cable, Cat<br />

4 and Cat 5. Cat 4 specified data rates <strong>of</strong> up to 20MHz and Cat 5<br />

up to 100MHz, which at the time seemed like a lot <strong>of</strong> bandwidth.<br />

However,as George Carlin observed,“stuff accumulates to fill available<br />

space.” Given the exponential growth <strong>of</strong> networking tech­<br />

36 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


nology, even Cat 5 is being pushed to its limits. The current state<br />

<strong>of</strong> the art is Cat 6, and Cat 7 is waiting in the wings.<br />

Despite being pronounced “about to be dead” several times in<br />

the last 15 years,Ethernet has successfully defended itself against<br />

all comers in the networking standards world, including LAN<br />

Token-Ring, Fiber Distributed Data Interface (FDDI) and<br />

Asynchronous Transfer Mode (ATM). You can tell who is winning<br />

simply by looking at the type <strong>of</strong> equipment people are buying.<br />

Network interface cards (NICs) and switches are generally<br />

replaced every two to three years. Since 1998, 90 percent <strong>of</strong> all<br />

NICs and switch ports shipped have been some flavor <strong>of</strong> Ethernet.<br />

Case closed, at least for now.<br />

There are two basic reasons Ethernet still rules. First, the invention<br />

and installation <strong>of</strong> fiber-optic cable,with its huge bandwidth<br />

potential,means you can use a“cheaper,dumber”technology like<br />

Ethernet as efficiently as“expensive, smart”technology like ATM.<br />

Without fiber optics, we would need all <strong>of</strong> the ATM horsepower<br />

to squeeze every last drop <strong>of</strong> data into the scarce bandwidth available<br />

on copper wire. With fiber, that bandwidth constraint has<br />

pretty much gone away. Also,Ethernet has been getting smarter<br />

in useful ways. Because Ethernet adapters can auto-sense<br />

10Mbps, 100Mbps and 1,000Mbps operations, it’s now possible<br />

to establish a tiered Ethernet network that supports all three<br />

speeds using the same standard. For example, a LAN may have a<br />

Gigabit Ethernet backbone and departmental servers that are<br />

connected by Fast Ethernet,and then connected to conventional<br />

10Mbps Ethernet switches and hubs that tie into desktops. Without<br />

that ability to automatically sense what speed your backbone<br />

is using, we might need to integrate three different network protocols<br />

to do the same thing Ethernet does on its own. There are<br />

other technologies and standards that I really wish we had time<br />

to review here, including FTP (file transfer protocol) and TCP/IP<br />

(Telecommunications Protocol/Internet Protocol,also developed<br />

at BBN). But the issue I’ve saved for last that incorporates both <strong>of</strong><br />

those issues is the Big Kahuna <strong>of</strong> networking — e-mail.<br />

You’ve Got Mail!<br />

Seventeen years ago, when I first<br />

started fooling around with computers,<br />

the only people who had e-mail<br />

were the few thousand hardy souls<br />

who had access to ARPANET or large<br />

private or corporate systems like General<br />

Electric. Everything was in plain<br />

text and files were exchanged via FTP<br />

over Unix-based systems. Think about<br />

this: the Internet, with its millions <strong>of</strong><br />

servers, and the World Wide Web, with its billions <strong>of</strong> pages, are all<br />

essentially the result <strong>of</strong> the human desire to communicate. I submit<br />

to the jury that e-mail, more so than any other single factor, is<br />

the application that is primarily responsible for the development<br />

<strong>of</strong> the modern Internet. Here is my case. E-mail first appeared in<br />

the 1960s when users on time-sharing systems wanted a way to<br />

leave messages for each other. These early e-mail systems were<br />

very simple. Mailboxes consisted <strong>of</strong> a text file, readable only by a<br />

single user, to which new messages were appended. There were<br />

no mail reader programs. Users had to scroll through the text file<br />

to the most current entries. If the reader didn’t edit out old material<br />

fairly frequently large mail files could become very long and<br />

hard to get through. These primordial e-mail systems were initially<br />

limited to the physical reach <strong>of</strong> the local system.<br />

ARPANET added“reach”to e-mail by connecting systems together.<br />

The first recorded case <strong>of</strong> e-mail traveling from one site to another<br />

occurred in 1972 when Ray Tomlinson, then an engineer at<br />

BBN,delivered an electronic message by copying it a across a network<br />

link connecting two DEC PDP-10s. Tomlinson,by the way, is<br />

also the person who decided to use the “@” symbol to separate<br />

the user from the host part <strong>of</strong> an e-mail address. E-mail caught<br />

on quickly. Less than a year later, 75 percent <strong>of</strong> the traffic on the<br />

ARPANET was e-mail. There were no protocols that specifically<br />

covered e-mail. Mail was sent via FTP, which had commands specific<br />

to mail transfer. Mail delivery and tracking information was<br />

included in the mail headers, but no defined mail header standards.<br />

Also, mail programs that disagreed over formats would<br />

<strong>of</strong>ten refuse to talk to one another. For example, Multics systems<br />

used the @ symbol as a“line kill”command.<br />

At the time <strong>of</strong> most <strong>of</strong> these events,TCP/IP, which eventually provided<br />

a standard exchange format for all networks, had not yet<br />

appeared on the scene. The ARPANET used Network Control Protocol<br />

(NCP) as its core network protocol,and was not able to communicate<br />

with any other packet network in existence at the time.<br />

Deliverance from the e-mail Tower <strong>of</strong> Babel first appeared in the<br />

form <strong>of</strong> “delivermail,” which was developed by Eric Allman and<br />

originally shipped with BSD (Berkeley S<strong>of</strong>tware Distribution) Unix<br />

versions 4.0 and 4.1 in 1979. Delivermail successfully handled e-<br />

mail using FTP over NCP and was soon incorporated into the<br />

ARPANET community. Delivermail eventually evolved into<br />

sendmail, which is arguably the most influential and important<br />

e-mail program developed to date.<br />

About the same time that e-mail was developing on ARPANET,<br />

Vint Cerf (Father <strong>of</strong> the World Wide Web) and Bob Kahn (from<br />

BBN) were working on a way to connect packet networks together.<br />

The results <strong>of</strong> their work would become the TCP/IP protocol,which<br />

defined standards for data exchange and communication between<br />

networks. ARPANET transitioned to TCP/IP in 1982, and<br />

the widespread implementation <strong>of</strong> TCP/IP paved the way for<br />

today’s standard for e-mail: Simple Mail Transfer Protocol (SMTP).<br />

In response to the development <strong>of</strong> SMTP, Allman evolved his<br />

delivermail program into sendmail, which extended the reach <strong>of</strong><br />

e-mail beyond the ARPANET system and allowed users to communicate<br />

between all the various private packet networks that<br />

would eventually form what we now know as the Internet. The<br />

drive to communicate, coupled with the development <strong>of</strong> a universal<br />

system <strong>of</strong> point-to-point communications embodied in e-<br />

mail, are what brought the Internet together.<br />

Billions, perhaps trillions <strong>of</strong> dollars have been spent over the last<br />

150 years devising faster, more robust ways to allow people to<br />

set lunch dates,ask“whassup,”send sales pitches,and — squabble.<br />

E-mail further evolved in the 1990s with the introduction <strong>of</strong> more<br />

feature-laden mail programs, including Lotus ccMail and Notes,<br />

Micros<strong>of</strong>t Outlook, and various other programs. But other than<br />

adding the ability to transmit richer types <strong>of</strong> information (including,<br />

unfortunately, potentially hostile payloads), they have basically<br />

just extended the functionality originally codified by<br />

sendmail and SMTP. The final evidence in support <strong>of</strong> my belief in<br />

CHIPS Winter 2003<br />

37


e-mail’s pivotal role in the development <strong>of</strong> modern networking<br />

is this: current estimates from people who watch Internet traffic<br />

patterns say that the Internet will pass over 36 billion e-mails this<br />

year. That comes out to 114 e-mails to roughly a second, every<br />

second <strong>of</strong> the year. And that figure will only grow as more areas<br />

<strong>of</strong> the world gain access.<br />

Closing Words<br />

There are various opinions on what it takes to build a network,<br />

but one that caught my eye recently was <strong>of</strong>fered by Van Macatee,<br />

an executive at Level 3 Communications,in the November 1,2002,<br />

issue <strong>of</strong> the Web magazine America’s Network: “Any schmuck can<br />

build a network.” I’m not sure how Macatee defines a schmuck,so<br />

I’ll <strong>of</strong>fer a definition: a network schmuck is someone who knows<br />

what the technology can do and how to plug it in and turn it on,<br />

but not how the technology works or what effect it will have on<br />

the people connected to it.<br />

The Internet,is only relatively simple today because <strong>of</strong> the efforts<br />

<strong>of</strong> the pioneers in the field who had the vision to see the future,<br />

the skills and will to make it happen, and the wisdom to cooperate<br />

to achieve common goals. The development <strong>of</strong> the hardware,<br />

s<strong>of</strong>tware,and transport protocols and technologies that make up<br />

modern networking are the products <strong>of</strong> many dedicated, intelligent,talented<br />

people whose efforts rival the building <strong>of</strong> the Pyramids<br />

and the Apollo space program as cooperative human endeavors.<br />

Schmucks did not build the Internet. Despite the probable<br />

difference in our salaries, I strongly disagree with Macatee’s<br />

assertion. Perhaps just about anyone can buy a network out <strong>of</strong> a<br />

box and just plug it in. But plugging in and turning on a network<br />

are not the same as building one.<br />

A modern parallel to the development <strong>of</strong> the Internet is the <strong>Navy</strong>’s<br />

NMCI project. The goal is similar: build a single extended network<br />

to serve the entire service in much the same way that the<br />

Internet now serves the world. The <strong>Navy</strong> has many <strong>of</strong> the same<br />

challenges in building the NMCI that faced the people who built<br />

the Internet: defining common standards, integrating technologies,<br />

and getting everyone to agree on the one right way to do<br />

certain things. The <strong>Navy</strong> is at a pivotal point. In building the NMCI<br />

you can,right now,shape the work environment <strong>of</strong> the entire <strong>Navy</strong><br />

for decades to come. Please remember,though,that simply building<br />

a big network that adheres to a single set <strong>of</strong> technical standards<br />

is not the goal. NMCI will ultimately be judged on how it<br />

supports the <strong>Navy</strong> as an organization. What the world has done<br />

with the Internet, I believe can be done with NMCI.<br />

That’s all for now. In the next issue, we will conclude this serial<br />

history <strong>of</strong> personal computing with a look at the development <strong>of</strong><br />

the World Wide Web and what it means to be part <strong>of</strong> today’s wired,<br />

interconnected world. Until then...<br />

Happy Networking!<br />

Long is a retired Air Force communications <strong>of</strong>ficer who has written<br />

for CHIPS since 1993. He holds a Master <strong>of</strong> Science degree in <strong>Information</strong><br />

Resource Management from the Air Force Institute <strong>of</strong> Technology.<br />

He is the Telecommunications Manager for the Eastern Region<br />

<strong>of</strong> the U.S. Immigration & Naturalization Service.<br />

Talking with Dinah Cohen<br />

Computer/Electronic Accommodations<br />

Program (CAP) Director<br />

CHIPS: Many people talk about the “digital divide” separating<br />

those with access to computers and the Internet to those<br />

who do not have access opportunities for financial reasons.<br />

But isn’t there another digital divide separating private<br />

citizens with disabilities from technology CAP does such a<br />

great job assisting DoD and Federal employees with disabilities<br />

to bridge the gap, but is there an agency to assist private<br />

citizens with disabilities who may be cut <strong>of</strong>f from technology<br />

Ms. Cohen: The digital divide falls into two categories. The<br />

first, people who have access to a computer, but cannot<br />

access the information. I hope and think that Section 508 is<br />

reducing this divide by working with industry and Federal<br />

Government to ensure that electronic and information<br />

technology is accessible and usable by people with disabilities.<br />

For assisting people in obtaining access to a computer, I<br />

am aware <strong>of</strong> some bold actions regarding universal design<br />

and assistive technology/computer access that are part <strong>of</strong><br />

President Bush’s New Freedom Initiative. You can see more<br />

on this issue at www. disabilityinfo.gov.<br />

Editor’s Note: The New Freedom Initiative was established to<br />

ensure that the more than 54 million Americans with<br />

disabilities learn and develop skills, find meaningful work,<br />

and realize the promises <strong>of</strong> the Americans with Disabilities<br />

Act. To achieve equality <strong>of</strong> opportunity, independent living,<br />

and economic self-sufficiency, this comprehensive plan<br />

promotes the full participation <strong>of</strong> people with disabilities in<br />

all aspects <strong>of</strong> American life. The Federal Web site,<br />

www.disabilityinfo.gov, provides resource information and<br />

links to agencies and programs designed to assist citizens<br />

with disabilities. Just a sampling <strong>of</strong> links follow. Comprehensive<br />

information about Federal job opportunities can be<br />

found at www.usajobs.opm.gov or call 1-478-757-3000/<br />

TDD 1-478-744-2299. A free service <strong>of</strong> the Office <strong>of</strong> Disability<br />

Employment Policy (ODEP) <strong>of</strong> the U.S. <strong>Department</strong> <strong>of</strong><br />

Labor, the Job Accommodation Network available at<br />

www.jan. wvu.edu or 1-800-526-7234 (V/TTY), provides<br />

information about job accommodations, the Americans with<br />

Disabilities Act (ADA), and the employability <strong>of</strong> people with<br />

disabilities. The RESNA Alternative Financing Technical<br />

Assistance Project (Agreement No. H224C000200) is funded<br />

by the National Institute on Disability and Rehabilitation<br />

Research (NIDRR) under Title III <strong>of</strong> the Assistive Technology<br />

Act <strong>of</strong> 1998. This Web site, www.resna.org/AFTAP/<br />

index.html, was developed with grant funds and is designed<br />

to assist individuals in receiving loans to ensure they can<br />

access assistive technology. The information on these pages<br />

does not necessarily reflect the position <strong>of</strong> NIDRR/U.S.<br />

<strong>Department</strong> <strong>of</strong> Education or RESNA, and no <strong>of</strong>ficial endorsement<br />

<strong>of</strong> the materials should be inferred.<br />

38 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


By Renee Hatcher<br />

The Naval Air Systems Command F-14<br />

Program Office (PMA-241) sent one <strong>of</strong><br />

its own to the front lines <strong>of</strong> the war in<br />

June 2002 to help improve the<br />

situational awareness <strong>of</strong> Army Green<br />

Berets on the ground. “The thrust <strong>of</strong><br />

PMA-241 has always been to provide<br />

service to the fleet,” said Capt. Peter<br />

Williams, F-14 Program manager. “We<br />

have been the ultimate technology<br />

provider for the F-14 community, but<br />

when we can go beyond that and<br />

help our brethren in the Army, it’s an<br />

exceptional thing.”<br />

Kevin Morse, PMA-241’s deputy<br />

assistant program manager for<br />

logistics, and two contractor support<br />

personnel spent about three weeks in<br />

Afghanistan establishing connectivity<br />

between Army Special Forces and<br />

<strong>Navy</strong> tactical aircraft for the exchange <strong>of</strong> imagery and intelligence.<br />

NAVAIR loaned the Army four Fast Tactical Imagery (FTI)<br />

laptops, a technology developed by PMA-241, that can retrieve<br />

and send information in near real-time.<br />

The need for such a capability was identified by an F-14 aviator<br />

from Carrier Air Group 7 who was on a one-month assignment<br />

with the intelligence center at the Army Air Base in Bagram. He<br />

saw that the Special Forces group in the Kabul area were not<br />

getting imagery intelligence as quickly as they needed. He<br />

recognized the challenge and knew who could meet it. The<br />

original request for support came to PMA-241 May 20, and the<br />

program <strong>of</strong>fice had the <strong>Navy</strong> and Army exchanging images by<br />

June 22.<br />

“This is just one example <strong>of</strong> NAVAIR using its advanced<br />

warfighting capabilities to solve the problems <strong>of</strong> modern<br />

warfare,”Williams said. “Working hand-in-hand with the Army<br />

against al Qaeda forces, PMA-241 demonstrated the value <strong>of</strong><br />

Kevin Morse, third from left, PMA-241’s deputy assistant<br />

program manager for logistics, joins U.S. Army Special<br />

Forces and Afghanistan coalition force members in<br />

Kabul. Morse went to Afghanistan in June to establish<br />

connectivity between Army Special Forces and <strong>Navy</strong><br />

tactical aircraft.<br />

Kevin Morse, PMA-241’s deputy assistant program manager for<br />

logistics, gave his first briefing on Fast Tactical Imagery to the<br />

Green Berets in a bombed-out building similar to those shown<br />

here in Afghanistan. The wall was painted white and window<br />

openings were covered with boards to block the light so the<br />

presentation could be seen clearly.<br />

network centric warfare capability<br />

in a real-time theater <strong>of</strong> operations.”<br />

Morse left for Afghanistan on June<br />

12. He located the equipment,<br />

made the necessary connections,<br />

and trained the Army Green Berets<br />

on how to use FTI laptops to<br />

communicate with <strong>Navy</strong> F-14<br />

squadrons VF-143 and VF-11. “The<br />

special forces were not getting any<br />

near real-time imagery from tactical<br />

aircraft in the theater <strong>of</strong> operations,”<br />

Morse said. “FTI enabled the<br />

F-14 crews to transmit images to<br />

ground troops within two minutes.”<br />

This is a two-way communication<br />

system that lets ground troops<br />

send images back to the Tomcats.<br />

This capability is also compatible<br />

with the Army’s AH-64 Apache<br />

helicopter and FTI is expected to be used on the F/A-18E/F<br />

Super Hornet. “The Tomcat is mature, but it’s still leading the<br />

way with new technology and it’s setting the stage for the<br />

Super Hornet,”Williams said. “We are helping to establish<br />

requirements in the spiral development <strong>of</strong> the Super Hornet.”<br />

FTI was first used during operation Southern Watch in 1999. It<br />

allowed aircraft to launch from a carrier without a predetermined<br />

target, acquire a target, transmit imagery back to the<br />

ship and get permission to strike during flight. “This capability<br />

represents the highest standard in warfare technology,”<br />

Williams said. “Our mission is to enable absolute combat power<br />

through technologies that deliver matchless capabilities.”<br />

Meeting these high standards and delivering superior technology<br />

is no small feat, but doing it in a third world country during<br />

a war presents unique challenges. A former Army Ranger,<br />

Morse is no stranger to hazardous and primitive conditions, but<br />

what he experienced in Afghanistan was unlike anything he<br />

had ever seen. He spent three weeks living in a tent with camel<br />

CHIPS Winter 2003 39


NASA Tests New Helmet<br />

Developed at NAVAIR<br />

Kevin Morse, PMA-241’s deputy assistant<br />

program manager for logistics, and two<br />

contractor support personnel spent about<br />

three weeks in Afghanistan staying in tents<br />

like these at the Army Air Base in Bagram.<br />

spiders the size <strong>of</strong> a hand in temperatures<br />

exceeding 106 degrees at 5,000<br />

feet — where dust storms were a part <strong>of</strong><br />

daily life. A harsh climate, however, was<br />

not the only challenge Morse faced. It<br />

took more than a week to locate the<br />

equipment after it arrived in Afghanistan<br />

and European electrical connectivity<br />

presented other problems.<br />

Morse overcame these obstacles and<br />

gave his first briefing on FTI to the Green<br />

Berets in a bombed-out building in<br />

Bagram. He used a projector to show the<br />

presentation on a wall the team painted<br />

white so that the slides could be seen.<br />

Windows were covered with boards to<br />

block the light.<br />

“It was a really bad place to be with<br />

a lot <strong>of</strong> people going through a lot<br />

<strong>of</strong> hardships,” Morse said. “But, it<br />

was very rewarding to know I was<br />

doing something in support <strong>of</strong> the<br />

war against terrorism.”<br />

“It was a really bad place to be with a lot<br />

<strong>of</strong> people going through a lot <strong>of</strong> hardships,”<br />

Morse said. “But, it was very<br />

rewarding to know I was doing something<br />

in support <strong>of</strong> the war against<br />

terrorism.” The Army will continue to use<br />

<strong>Navy</strong> assets to collect imagery. While<br />

Morse was in Afghanistan, PMA-241 sent<br />

contractor support personnel from<br />

Signal Corporation to Fort Bragg to<br />

provide FTI training for another Army<br />

division preparing to leave for Afghanistan.<br />

“The special forces were very grateful for<br />

the help we provided in performing their<br />

mission,” Morse said. “There was no<br />

separation between <strong>Navy</strong> and Army —<br />

we were just Americans working together.”<br />

A pilot at NASA’s Dryden Flight Research<br />

Center in Edwards, Calif., prepares for a<br />

flight test in an F/A-18 Hornet with the new<br />

two-part helmet concept developed by<br />

NAVAIR engineers in the Crew Systems<br />

Research and Engineering Competency<br />

Program. Photo courtesy <strong>of</strong> NASA.<br />

By Renee Hatcher<br />

Engineers from NAVAIR’s Crew Systems Research and Engineering Competency Program<br />

(AIR-4.6), have developed a new helmet concept that they expect will enhance<br />

the stability and reliability <strong>of</strong> helmet mounted devices, ultimately improving the accuracy<br />

<strong>of</strong> information available to the aircrew on <strong>Navy</strong> and Marine Corps aircraft.<br />

In July, pilots began wearing the modular, two-part helmet prototype during limited<br />

flight testing in an F/A-18 Hornet at NASA’s Dryden Flight Research Center in Edwards,<br />

Calif. The helmet will be fully flight-qualified by the <strong>Navy</strong> before it can be transitioned<br />

to the warfighter through NAVAIR’s Aircrew Systems Program Office (PMA-202). Continually<br />

evolving operational requirements for the <strong>Navy</strong> and Marine Corps call for a<br />

variety <strong>of</strong> helmet-mounted devices. These technologies <strong>of</strong>ten pose significant challenges<br />

in terms <strong>of</strong> aircrew systems safety,<br />

comfort and acceptability. Dr. James<br />

Sheehy is leading NAVAIR’s Aircrew Systems<br />

Science and Technology Program<br />

effort to provide a stable platform to support<br />

the expanded range <strong>of</strong> helmetmounted<br />

devices. The two-part helmet<br />

concept, originated by the Gentex Corp.,<br />

was adopted and further developed by<br />

the <strong>Navy</strong> to meet the specific requirements<br />

<strong>of</strong> the warfighter. “It is lightweight,<br />

comfortable and stable,” Sheehy said.<br />

“The helmet is easily adaptable to outer<br />

mission modules including the basic tactical<br />

outer helmet assembly recently<br />

flown in the F/A-18.”<br />

An F/A-18C Hornet assigned to Strike Force<br />

Squadron Two Five (VFA-25)— the“ Fist <strong>of</strong> the<br />

Fleet.” U.S. <strong>Navy</strong> photo by PHA Philip A.<br />

McDaniel.<br />

Advanced materials, new suspension techniques, and precision fitting enable the twopart<br />

helmet to outperform current helmet technology. The inner helmet assembly is<br />

“eye-referenced”which means it is individually fit to each pilot to ensure that his or her<br />

eye is always in the proper location for the outer modules. The outer helmet is a shell<br />

that can be tailor-made to fit various missions and can range from a plain helmet for<br />

impact protection to a high resolution helmet mounted display. The ability to split the<br />

protection between the inner and outer modules allows the helmet to cross platforms<br />

between rotary and fixed wing aircraft.<br />

“Providing the required tactical capability while preserving and advancing aircrew<br />

safety and protection is an extremely important objective,” Sheehy said. “As the ultimate<br />

technology provider to the warfighter, our mission is to enable absolute combat<br />

power through technologies that deliver matchless capabilities.”<br />

40 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


Using Technology to Provide Better<br />

Support for the Federal Workforce<br />

By Sandra J. Smith<br />

The world <strong>of</strong> e-Government is full <strong>of</strong><br />

exciting possibilities for how the U.S.<br />

Government can improve its interactions<br />

with its citizens. Concepts like one-stop shopping, online town<br />

hall meetings for direct contact with <strong>of</strong>ficials, or “OurTown.Gov”<br />

(which helps local leaders to coordinate community services) give<br />

new meaning to the phrase“<strong>of</strong> the people, by the people, and for<br />

the people.” In the future, it seems almost inevitable that citizens<br />

and businesses will conduct more and more government interactions<br />

online. The transformations resulting from e-Government<br />

will continue to impact every facet <strong>of</strong> our lives, especially those<br />

<strong>of</strong> government employees. Training,recruitment,clearances,payroll,<br />

enterprise human resource system integration, and career<br />

planning are areas that are changing to provide better service<br />

and resources to government employees.<br />

The nearly ubiquitous nature <strong>of</strong> the Internet affords a tremendous<br />

opportunity for agencies and communities alike to leverage<br />

and transform their operational procedures and processes.<br />

One such community benefiting from the Internet is the Federal<br />

Human Resources (HR) Community. As the Internet and Webbased<br />

services continue to marshal efficiencies and improve organizational<br />

processes, government employees will become the<br />

beneficiaries <strong>of</strong> the transformational power <strong>of</strong> e-Government.<br />

The mandate <strong>of</strong> the President’s Management Agenda to strategically<br />

manage human capital has helped to serve as a catalyst<br />

for the HR Community to examine how they conduct business<br />

and highlights them as a model for other agencies as they pave<br />

inroads into e-Government. A few key HR-related e-Government<br />

initiatives (shown in Figure 1) being led by the Office <strong>of</strong> Personnel<br />

Management (OPM) currently underway are:<br />

e-Training<br />

The Government Online Learning Center or, GoLearn is a Government-wide<br />

resource that supports developmental opportunities<br />

<strong>of</strong> the Federal workforce through simplified and one-stop<br />

access to high quality e-Training products and services. The creation<br />

<strong>of</strong> this center is the first phase <strong>of</strong> the President’s Management<br />

Agenda e-Training Initiative and will continue to grow with<br />

the addition <strong>of</strong> products and services that meet the common<br />

needs <strong>of</strong> the workforce,including a competency-based individual<br />

career planning tool called the <strong>Information</strong> Technology (IT)<br />

Roadmap. The IT Roadmap will be a valuable tool for IT pr<strong>of</strong>essionals<br />

and their managers to identify the right skills for optimal<br />

job performance and at the same time target pr<strong>of</strong>essional development<br />

needed to obtain those skills. This site is designed as a<br />

virtual campus that houses free training courses and knowledge<br />

resources in each <strong>of</strong> its rooms. You can explore the center and all<br />

that GoLearn has to <strong>of</strong>fer by going to www.golearn.gov.<br />

e-Clearance<br />

Security has taken on a greater significance since 9-11;now more<br />

than ever information security is crucial. The e-Clearance initia-<br />

tive will improve the processing <strong>of</strong> investigations for personnel<br />

who must have security clearances. The elimination <strong>of</strong> paperbased<br />

security applications will permit sharing <strong>of</strong> clearance information<br />

among other agencies, and accelerate the clearance<br />

process. The OPM e-Clearance project team expects the e-Government<br />

initiative to meet its next milestone early.<br />

Office <strong>of</strong> Management and Budget (OMB) Director, Mitchell E.<br />

Daniels Jr., recently sent a memo to agencies requiring them to<br />

automate their security clearance systems and transfer employee<br />

files to OPM’s Security/Suitability Investigations Index (SII) by Jan.<br />

3, 2003. The memo is the latest in a recent series <strong>of</strong> letters invoking<br />

OMB’s authorities under the Clinger-Cohen Act to prompt<br />

agencies to work together on e-Government initiatives.<br />

Recruitment One-Stop<br />

A significant challenge for government agencies is the difficulty<br />

in attracting and retaining skilled IT pr<strong>of</strong>essionals. Despite the<br />

recent economic downturn, the private sector demand for IT<br />

workers — fueled by the Internet“gold rush”— continues to grow<br />

at a rate faster than the supply <strong>of</strong> newly educated IT pr<strong>of</strong>essionals.<br />

In an attempt to simplify the government recruiting process<br />

and provide a one-stop approach to federal employment applications<br />

and job postings,OPM conducted a virtual IT fair for individuals<br />

interested in working in the Federal Government. The job<br />

fair was intended for positions in the GS-2210 IT Management<br />

Specialist series at the GS-7 through 13 grade levels. Approximately<br />

20 Federal agencies participated in this first <strong>of</strong> its kind<br />

event which was held in April 2002. The entire application and<br />

assessment process was administered via the Internet at<br />

www.usajobs.opm.gov.<br />

EHRI<br />

The goals <strong>of</strong> the e-Government Enterprise Human Resources Initiative<br />

(EHRI) are to provide timely and accurate access to human<br />

resources data and deliver accurate, current data on all Federal<br />

employees — active and separated. EHRI will eliminate the need<br />

for a paper employee record through the creation <strong>of</strong> an electronic<br />

Official Personnel Folder that will eliminate more than 100 multiple<br />

forms that are currently maintained for a minimum <strong>of</strong> 65<br />

years after employee separation. This initiative will enable the<br />

management <strong>of</strong> reporting benefits and electronic transfer <strong>of</strong> HR<br />

data throughout a Federal employee’s career life cycle. These enhancements<br />

will fundamentally change the way in which employees,managers,<br />

and HR <strong>of</strong>ficers retrieve and use Official Personnel<br />

Folder data for transaction processing, workforce reporting and<br />

analysis. The <strong>Department</strong> <strong>of</strong> Defense has funded the Modern Defense<br />

Civilian Personnel Data System (DCPDS) to achieve the<br />

majority <strong>of</strong> the EHRI goals, and will eventually be funded to develop<br />

an interface with the EHRI.<br />

The Modern DCPDS currently supports multiple HR applications<br />

and is designed to replace a number <strong>of</strong> information systems used<br />

today, throughout the <strong>Department</strong>, to manage civilian human<br />

CHIPS Winter 2003 41


Recruitment, Employment and Retirement Initiatives<br />

Application<br />

Recruitment<br />

One-Stop<br />

Clearance<br />

<strong>Information</strong><br />

Recruitment<br />

Hire<br />

E-Clearance<br />

Agency HR<br />

Systems<br />

Employee<br />

Transfer<br />

Employee<br />

Transfer<br />

Data<br />

Initial OPF<br />

Data<br />

Employee Investigation<br />

EHRI<br />

Training<br />

History<br />

E-Training<br />

Employment<br />

Figure 1.<br />

Payroll<br />

Data<br />

OPF<br />

E-Payroll<br />

OPF<br />

Employee<br />

Development<br />

Pay<br />

Retire<br />

Rehire<br />

Course Catalog<br />

tion <strong>of</strong> pr<strong>of</strong>essional development opportu­<br />

nities. Pr<strong>of</strong>essional development opportunities<br />

will come from a compendium <strong>of</strong> federal training sources<br />

that are directly linked to one or more specific competencies. The<br />

IT Roadmap will provide an integrated approach toward training<br />

and career development,identify competencies required for successful<br />

job performance, and be flexible enough to support a variety<br />

<strong>of</strong> IT career development planning strategies and<br />

customization. The tool will include feedback from employees<br />

on courses and provide a source <strong>of</strong> aggregate statistics for agency<br />

planning. The prototype <strong>of</strong> the tool was released early December<br />

2002 and initial operational capability is projected by spring<br />

2003.<br />

resources. The Modern DCPDS will move the <strong>Department</strong> away<br />

from multiple systems to a single information system for civilian<br />

employees.<br />

e-Payroll<br />

OPM has established a Standardization Action Team, with <strong>of</strong>ficials<br />

from various <strong>Department</strong>s. The team’s goal is to provide<br />

simple, easy-to-use, cost-effective, standardized, integrated HR/<br />

Payroll services to support the mission and employees <strong>of</strong> the Federal<br />

Government. The team developed a modernization plan using<br />

agency and industry best practices to identify data fields<br />

needed for payroll processing. The group also is identifying the<br />

methods for making changes, whether legislatively or through<br />

the regulatory process.<br />

The Federal IT Roadmap<br />

Recognizing the criticality <strong>of</strong> a skilled IT workforce, the Federal<br />

<strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong> Council (CIOC) engaged OPM in the development<br />

<strong>of</strong> the <strong>Information</strong> Technology Group, GS-2200. Under<br />

this standard, the GS-2210, <strong>Information</strong> Technology Management<br />

Specialist series with 10 parenthetical titles was developed.<br />

As a follow-on thrust, the Federal CIOC, Workforce and Human<br />

Capital for IT Committee, sponsored the IT Roadmap initiative as<br />

a means to engage and provide a developmental resource for<br />

the Federal IT Workforce. The IT Roadmap Team spent several<br />

months exploring best practices within private and public sector<br />

products and recommended a way ahead in developing such a<br />

tool. After extensive review, the Roadmap Team recommended<br />

adopting the <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> <strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong><br />

(DON CIO) Career Planning Tool as a best practice.<br />

The Committee adopted the recommendation and launched an<br />

effort to develop the IT Roadmap — a Federal career planning<br />

tool for current and prospective Federal IT employees. The tool is<br />

a Web-enabled, database-driven career planning tool that outlines<br />

general and technical competencies relevant to the various<br />

parenthetical titles (Policy & Planning; <strong>Information</strong> Security; Systems<br />

Analysis;Application S<strong>of</strong>tware;Operating Systems;Network<br />

Retirement<br />

System<br />

Modernization<br />

IT Roadmap<br />

Career Planning<br />

Retirement<br />

Services; Data Management; Internet; Systems<br />

Administration; and Customer Support)<br />

associated with the GS-2210, IT Management<br />

Specialist Series.<br />

The GS-2210 series is designed to cover all<br />

positions currently assigned to the Computer<br />

Specialist Series, GS-334, as well as<br />

positions classified in other series (e.g., the<br />

Telecommunications Series,GS-391,and the<br />

Miscellaneous Administrative and Program<br />

Series,GS-301),where IT knowledge is paramount.<br />

The tool will assist individuals in<br />

performing self-assessment <strong>of</strong> their pr<strong>of</strong>iciency<br />

in those competencies. Based on<br />

identified pr<strong>of</strong>iciency gaps,the IT Roadmap<br />

will assist users in developing career-long<br />

training and development plans to achieve<br />

their career goals. The career development<br />

plan will be derived from the user’s self-assessment<br />

<strong>of</strong> competencies and the selec­<br />

A Winning Proposition<br />

An exciting future awaits the workforce <strong>of</strong> the future. Not only<br />

will systems and procedures be greatly enhanced by technology<br />

but the people who manage and implement those systems and<br />

procedures will be better equipped and more competent to do<br />

their jobs. President Bush has said that he will expand the use <strong>of</strong><br />

the Internet to empower citizens by allowing them to request<br />

customized information from Washington when they need it,not<br />

just when Washington wants to give it to them. The President<br />

believes true reform involves not just giving people information,<br />

but giving citizens the freedom to act upon it. The DON CIO supports<br />

e-Government initiatives and believes they are winning<br />

propositions for using technology to gain efficiencies and provide<br />

better support for the DON and Federal Workforce <strong>of</strong> the<br />

future.<br />

To learn more about e-Government go to:<br />

www.gcn.com/egovernment<br />

www.golearn.gov<br />

www.egov.gov<br />

www. senate.gov<br />

Sandra J. Smith is the DON CIO Competency Management Team<br />

Leader.<br />

42 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


Security Made Easy<br />

with the NMCI, PKI, and the CAC<br />

By Josephine Smidt with Rebecca Nielsen<br />

You have heard <strong>of</strong> the <strong>Navy</strong> Marine Corps<br />

Intranet (NMCI), the <strong>Department</strong> <strong>of</strong> Defense<br />

(DoD) Public Key Infrastructure (PKI),<br />

and the Common Access Card (CAC). You<br />

may even have heard about Public Key Enabled<br />

(PKE) applications. Here at the <strong>Department</strong><br />

<strong>of</strong> the <strong>Navy</strong> <strong>Chief</strong> <strong>Information</strong><br />

<strong>Officer</strong> (DON CIO), these aren’t abstract<br />

concepts. They are woven into daily workplace<br />

activities,ensuring that DoD Defense<br />

in Depth information assurance requirements<br />

are met. One <strong>of</strong> the benefits <strong>of</strong> working<br />

in my <strong>of</strong>fice is that we test the technology<br />

that will be deployed to the DON community.<br />

This is both good and bad: we use<br />

all the cool, new technology, but we have<br />

to work out the bugs prior to deployment.<br />

I’ll explain how implementation <strong>of</strong> the new<br />

PKI technology has helped me do my job<br />

better as a member <strong>of</strong> the <strong>Information</strong> Assurance<br />

Team at DON CIO. The PKI provides<br />

digital certificates to subscribers — people<br />

and computer systems. Digital certificates<br />

and their associated keys are credentials,<br />

similar to photo identification. Unlike a<br />

photo ID, however, digital certificates can<br />

also be used for electronic signatures and<br />

encryption — assuring secure communications<br />

between users. By itself,PKI doesn’t<br />

do anything. However,the security services<br />

that PKI provides: authentication, data integrity,<br />

confidentiality, and non-repudiation<br />

(described in the text box above),<br />

transform time-consuming,insecure paper<br />

processes into streamlined, secure electronic<br />

systems. Applications like e-mail and<br />

the Defense Travel System (DTS), that are<br />

programmed to use digital certificates are<br />

PK Enabled.<br />

Like any credential, my digital certificates<br />

are only useful if I have them when I need<br />

them. So, I carry them with me on my CAC.<br />

The CAC contains a small chip (almost as<br />

powerful as the first personal computers)<br />

that not only contains my certificates and<br />

associated keys, but also the processing<br />

power to use the keys and to protect them<br />

The National <strong>Information</strong> Systems Security<br />

(Infosec) Glossary defines the following five<br />

security services. PKI provides all but<br />

authorization.<br />

•Authentication: Establish the validity <strong>of</strong> a<br />

transmission, message or originator.<br />

•Authorization: Access privileges granted to<br />

a user, program or process.<br />

•Confidentiality: Assurance that information<br />

is not disclosed to unauthorized persons,<br />

processes or devices.<br />

•Data Integrity: Data is unchanged from its<br />

source and has not been accidentally or<br />

maliciously modified, altered, or destroyed.<br />

•Non-Repudiation: Assurance the sender <strong>of</strong><br />

data is provided with pro<strong>of</strong> <strong>of</strong> delivery and the<br />

recipient is provided with pro<strong>of</strong> <strong>of</strong> the sender’s<br />

identity, so neither can later deny having<br />

processed the data.<br />

from unauthorized disclosure. The CAC<br />

also has other technologies, including a<br />

photo (for visual identification),a magnetic<br />

stripe and a bar code. Since all <strong>of</strong> these are<br />

on the same card, I will soon only have to<br />

carry one card and remember one password<br />

— the one that tells the computer<br />

chip that I am the authorized user. There is<br />

an icon at the bottom <strong>of</strong> my screen that<br />

changes color when my CAC is being used<br />

to verify or authorize something. This is<br />

especially helpful, when your workstation<br />

seems to take longer than usual to do<br />

something, as the verification process<br />

sometimes takes a couple <strong>of</strong> seconds.<br />

I use my CAC and PKI on a daily basis. My<br />

<strong>of</strong>fice has recently been designated as classified,<br />

and as a result, we decided to test<br />

how easily the CAC can work with biometrics<br />

to enter the secure area. When I arrive<br />

in the morning, I swipe my CAC and put<br />

my thumb on the reader and the door<br />

opens. Right next to the reader that we<br />

currently use is one that we will be using<br />

in the not-too-distant future. This reader<br />

doesn’t require swiping,but reads my CAC<br />

from the chain around my neck as I press<br />

my finger. How cool is that<br />

Our <strong>of</strong>fice has not switched over to NMCI<br />

yet,but we have been using the CAC to log<br />

on to the network — the CAC contains our<br />

userid and password. Some personnel use<br />

PKI to log on by inserting the CAC into a<br />

card reader located on the side <strong>of</strong> their<br />

laptop and typing in the CAC Personal<br />

Identification Number (PIN). The chip on<br />

the card communicates with PKE Micros<strong>of</strong>t<br />

Windows 2000 to authenticate the identity<br />

certificate. Since the PIN is useless without<br />

the card, they don’t even have to<br />

change it every 90 days. We will all be using<br />

this method when we switch over to<br />

NMCI.<br />

I digitally sign each e-mail I send so that<br />

the recipient will know that the e-mail<br />

came from me, and that the contents have<br />

not changed since I sent it. The NMCI workstation<br />

comes with both Outlook and the<br />

middleware needed for Outlook to work<br />

with the CAC. All I have to know is the PIN.<br />

Someone who wants to send me an encrypted<br />

e-mail, either can retrieve my e-<br />

mail encryption certificate from the Global<br />

Address List or from a signed e-mail I have<br />

already sent. This certificate can encrypt<br />

information that is sensitive and should<br />

not be sent in a manner that allows anyone<br />

to read it. When I receive an encrypted<br />

e-mail, Outlook communicates with my<br />

CAC to decrypt the information.<br />

Since I used the CAC to log onto the workstation,if<br />

I have to step away from my desk,<br />

all I have to do is remove the CAC from the<br />

reader and my desktop is automatically<br />

locked so that no one else can access it.<br />

When I return, I put the card back into the<br />

reader and enter my PIN to return to where<br />

I left <strong>of</strong>f. Since unattended workstations<br />

are not secure, and security is a primary<br />

concern, I really like this feature. Even if I<br />

forget to take my CAC out <strong>of</strong> the reader,<br />

my screen saver will kick in after fifteen<br />

minutes and I’ll need both my CAC and my<br />

PIN to return to the desktop (since I need<br />

the CAC to get into my <strong>of</strong>fice, I try not to<br />

forget and leave it in the reader).<br />

CHIPS Winter 2003 43


E-mail isn’t the only application that is PKE.<br />

I use PKI to submit travel requests and process<br />

travel claims using DTS. Once I have<br />

filled out my travel voucher, I digitally<br />

stamp it. This is the equivalent <strong>of</strong> digitally<br />

signing an e-mail, and I can’t do it without<br />

my CAC. I click on the button that says<br />

stamp, and the CAC and the PK Enabled<br />

DTS work together to verify who I am and<br />

to encrypt my authorization or voucher.<br />

Since the process is electronic,there are no<br />

paper forms to get lost and my reimbursement<br />

is sent directly to my bank account<br />

in about one week.<br />

When I am on travel or working from home,<br />

I can use my CAC and my NMCI laptop for<br />

remote access to the network. I log on just<br />

as I would at work with my CAC in the card<br />

reader and dial in. The communication<br />

between my workstation and the network<br />

remote access server validates my identity,<br />

verifies that I am permitted to access the<br />

network, and establishes an encrypted<br />

communication link — all based on my<br />

identity certificate.<br />

When I think about how many passwords<br />

I had to remember,how long it would take<br />

to get a travel authorization approved/reimbursed<br />

for travel expenses and, how it<br />

was not even possible to encrypt my e-mail<br />

outside <strong>of</strong> the SIPRnet, it hits me just how<br />

much this little card has simplified my daily<br />

work life. Not to mention how it will continue<br />

to influence my work in the future,<br />

with things like contact-less CACs (where I<br />

don’t swipe the CAC, but it is read from a<br />

distance); using my CAC to send signed<br />

e-mails with my Blackberry and,using a variety<br />

<strong>of</strong> applications from personnel management<br />

s<strong>of</strong>tware to financial programs<br />

and not having to remember a different<br />

password for each.<br />

While technology is never a substitute for<br />

security awareness,the implementation <strong>of</strong><br />

NMCI, PKI and the CAC show how implementation<br />

<strong>of</strong> robust security can make our<br />

jobs easier. It is definitely a very exciting<br />

time to be in the DON.<br />

Josephine Smidt is a Management Analyst<br />

on the DON CIO IA Team.<br />

The <strong>Navy</strong>’s Web-based<br />

Reverse/Forward Auction<br />

Sept. 5, 2002, NAVICP (Naval Inventory<br />

Control Point) conducted<br />

the <strong>Navy</strong>’s first online forward auctions.<br />

The two auctions ran in two phases,<br />

with each phase consisting <strong>of</strong> the sale <strong>of</strong><br />

two damaged CH-53D helicopters and associated<br />

parts packages. Three firms registered<br />

to participate as bidders. The winning<br />

bidders are expected to refurbish the<br />

aircraft for commercial applications such<br />

as firefighting,a requirement that has generated<br />

significant demand for heavy lift<br />

aircraft in the past few years. The two contracts<br />

resulting from the auctions are valued<br />

at nearly $5 million. Naval Air Systems<br />

Command (NAVAIR) will receive the aircraft<br />

proceeds and NAVICP will retain the remaining<br />

proceeds to purchase similar helicopter<br />

parts.<br />

The forward auctions, leverage the latest<br />

commercial technology and are part <strong>of</strong><br />

NAVICP’s innovative strategy to reduce U.S.<br />

<strong>Navy</strong> excess inventory, which consists <strong>of</strong><br />

weapons system parts that the <strong>Navy</strong> might<br />

need later,but will most likely replace with<br />

state-<strong>of</strong>-the-art designs. The auctions also<br />

create a commercial marketplace for future<br />

sales. In fact,both <strong>of</strong> the winning bidders<br />

will have the option to buy additional<br />

CH-53D helicopters and parts within six<br />

months <strong>of</strong> contract award. This creative<br />

initiative allowed NAVICP to transform unusable<br />

assets that might otherwise deteriorate<br />

— into funding to support the next<br />

generation <strong>of</strong> weapons systems.<br />

The forward auctions are the latest success<br />

story in NAVICP’s Internet-based action<br />

program. In May 2000,NAVICP conducted<br />

the first Internet-based reverse auction in<br />

the Federal Government. The auction,<br />

which lasted 51 minutes, provided the<br />

competitive pricing mechanism for<br />

NAVICP to award a contract for aircraft<br />

ejection seat recovery sequencers (the<br />

“brains”<strong>of</strong> the ejection seats). The auction<br />

saved an estimated 28 percent from the<br />

historical price for recovery sequencers.<br />

NAVICP awarded the contract within an<br />

hour <strong>of</strong> the auction closing — a significant<br />

time savings.<br />

NAVICP conducted four additional auc-<br />

By Cmdr. Steve Dollase, SC, USN<br />

tions under the pilot reverse auction program,<br />

resulting in estimated savings <strong>of</strong> 21<br />

percent,or $14.8 million. Internet-based reverse<br />

auction technology allows online<br />

bidders to compete in real-time for contracts<br />

by lowering their price <strong>of</strong>fers (or raising<br />

them in a forward auction) as they see<br />

other bids posted. Bidders are unable to<br />

identify competitors, only the current low<br />

bid is visible. The auctions are conducted<br />

in a secure, Web-based environment. Participants<br />

are screened in advance before<br />

granting access to the auctions to ensure<br />

that they are qualified sources for the items<br />

under consideration. This is particularly important<br />

with complex weapons systems.<br />

Auctions work best when there are three<br />

or more bidders, and when specifications<br />

permit easy comparison between products.<br />

Convinced <strong>of</strong> the power <strong>of</strong> the concept,<br />

NAVICP, with the sponsorship <strong>of</strong> its parent<br />

command,the Naval Supply Systems Command<br />

(NAVSUP), awarded two five-year,<br />

best-value contracts for auction services;<br />

one to Procuri for a self-service, desktop<br />

tool and the other to eBreviate for a fullservice<br />

tool. The eBreviate solution also <strong>of</strong>fers<br />

market research services, helpful in<br />

determining suppliers for a particular requirement.<br />

In the first year, NAVICP contracts<br />

were used by NAVSUP activities and<br />

twelve other Federal Government agencies<br />

to conduct 43 auctions valued at over $144<br />

million with typical savings <strong>of</strong> 8 to 24 percent.<br />

The auction tools are available, free<br />

<strong>of</strong> charge,to <strong>Navy</strong> and Marine Corps activities,<br />

and to other Federal Government activities<br />

on a fee-for-service basis.<br />

The NAVSUP/NAVICP Reverse Auction<br />

Team earned a FY 2000 <strong>Department</strong> <strong>of</strong> the<br />

<strong>Navy</strong> Competition and Procurement Excellence<br />

Award for their success. NAVSUP/<br />

NAVICP recently launched a <strong>Navy</strong> auction<br />

Web site at www.auctions.navy.mil.<br />

These tools are just one more way that the<br />

<strong>Navy</strong> and Marine Corps team can maximize<br />

resources and improve combat readiness.<br />

Cmdr. Steve Dollase is NAVICP’s Director <strong>of</strong><br />

Acquisition Policy.<br />

44 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


CAC Middleware...<br />

Putting the CAC to Work<br />

for <strong>Information</strong> Security<br />

By Tim Russell<br />

As <strong>of</strong> July 2002, more than one million <strong>Department</strong> <strong>of</strong> Defense<br />

(DoD) users have been introduced to the Common Access Card<br />

(CAC) — the DoD’s new standard identification and benefits card<br />

that provides active duty and selected Reserve, civilian and contractor<br />

personnel with physical access to buildings and secure<br />

areas,and authentication for accessing computer networks. While<br />

the card represents the most tangible element <strong>of</strong> the CAC program<br />

and the part most visible to DoD personnel, the s<strong>of</strong>tware<br />

that functions to support a user’s CAC card on PC workstations is<br />

an equally vital part <strong>of</strong> the equation, even though many users<br />

don’t realize it or might not even know it’s there. But without<br />

s<strong>of</strong>tware, the CAC card can’t perform the secure logical access<br />

applications for which the card is intended. This August,Datakey<br />

was notified,along with three other vendors (Schlumberger,SSP-<br />

Litronic and Spyrus), that it had been selected as an approved<br />

supplier <strong>of</strong> middleware for the DoD CAC program.<br />

Working jointly under a partnership agreement with the National<br />

Institute <strong>of</strong> Standards and Technology (NIST) on behalf <strong>of</strong> DoD<br />

agencies,Datakey electronic memory key technology was revised<br />

and reengineered to develop a prototype secure token for computer<br />

workstation authentication in 1989. Based on this secure<br />

token, Datakey manufactured the first cryptographic Smart Card<br />

used for digital signatures in 1991. Former President Clinton used<br />

Datakey technology on two occasions while in <strong>of</strong>fice — to digitally<br />

sign an intergovernmental agreement with Ireland in 1998<br />

— and to sign the Electronic Signatures in Global and National<br />

Commerce Act (E-SIGN), legislation that took effect Oct. 1, 2000,<br />

making electronic signatures as legally valid as signatures on paper<br />

in the United States.<br />

Datakey began developing a version <strong>of</strong> s<strong>of</strong>tware specifically engineered<br />

for the CAC program following the specification requirements,and<br />

implemented PKCS #11,MS-CAPI and the DoD-defined<br />

Basic Services Interface (BSI), allowing users to take advantage <strong>of</strong><br />

any DoD CAC card to run their information security applications,<br />

including encrypted and digitally signed e-mail, VPN access and<br />

PC login applications. Beyond supporting all on-card cryptographic<br />

operations, Datakey CAC middleware also includes its<br />

supporting s<strong>of</strong>tware library to perform a complete range <strong>of</strong> cryptographic<br />

operations in s<strong>of</strong>tware. The middleware provides users<br />

with the utilities that are necessary to manage their Smart<br />

Card, including a PIN manager, the ability to view digital credentials,<br />

and the ability to register certificates within Micros<strong>of</strong>t environments.<br />

Datakey CAC middleware can also be field-enabled to<br />

support the full list <strong>of</strong> current Datakey Smart Card/token options,<br />

including all configurations <strong>of</strong> its Model 330 cryptographic Smart<br />

Card, for seamless integration with leading PKI and VPN products.<br />

Datakey also provides GSA-ready Smart Card technology for the<br />

Smart Access Common ID Card program. Government customers<br />

who have deployed Datakey Smart Card technology include:<br />

(1) The <strong>Department</strong> <strong>of</strong> State - 40,000 Diplomatic Security users<br />

will carry a Smart Card for facility access to DoS buildings and<br />

embassies and for secure network access. In addition to security,<br />

benefits include increased efficiencies and user productivity. Personnel<br />

can access corporate networks by using the same ID card<br />

that grants physical access to buildings. By using a single ID card<br />

for many applications and uses, the <strong>Department</strong> leverages its investment<br />

for the greatest possible return on investment. Old paper<br />

processes and applications can be securely transitioned online<br />

for time savings and 24x7 availability; (2) The Federal Deposit Insurance<br />

Corporation - 3,500 field agents and more than 7,000 internal<br />

users digitally sign/encrypt e-mail messages and documents,<br />

and access corporate facilities. FDIC field agents use an<br />

Electronic Travel Voucher (ETV) System application with Smart<br />

Cards and laptops for reimbursement <strong>of</strong> travel expenses. The electronic<br />

system interfaces with the National Finance Center (NFC).<br />

Previously, it took up to two months for field employees to be<br />

repaid, but by using Smart Cards it now takes two days for a direct<br />

deposit to an employee’s account. The paper reimbursement<br />

costs about $50 per transaction to process,whereas the new process<br />

costs less than $10. Since the FDIC processes 80,000 to<br />

100,000 vouchers every year, this results in savings <strong>of</strong> about $3.2<br />

to $4 million. Due to the success <strong>of</strong> the ETV pilot program, the<br />

FDIC has expanded the program to a fully operational, ongoing<br />

cryptographic Smart Card endeavour. Other customers using<br />

Smart Card technology include: the <strong>Department</strong> <strong>of</strong> Energy,Rocky<br />

Flats Environmental Technology Site, the Bureau <strong>of</strong> Labor Statistics<br />

and the Canadian <strong>Department</strong> <strong>of</strong> National Defence, which<br />

deployed 90,000 Smart Cards.<br />

As more and more DoD users (up to 4 million) receive the CAC<br />

card, the missing link is the s<strong>of</strong>tware required to put the card to<br />

work in information security applications (secure network access,<br />

digitally signed and encrypted e-mail, etc.,). Datakey CAC<br />

middleware bridges that gap and enables a powerful,<br />

interoperable and CAC-compliant solution that works with any<br />

CAC-compliant Smart Card. Through Datakey’s contract with the<br />

government, any DoD organization can order Datakey<br />

middleware and begin taking full advantage <strong>of</strong> the CAC card.<br />

For more information on CAC Middleware contracts visit the DON IT<br />

Umbrella Web site at www.it-umbrella.navy.mil or the DoD ESI site<br />

at www.don-imit.navy.mil/esi. DoD organizations can order Enterprise<br />

S<strong>of</strong>tware Initiative (ESI) CAC Middleware directly from the DON<br />

Web site, ITEC-Direct, at www.itec-direct.navy.mil or by contacting a<br />

Datakey representative at 1-888-328-2539 or 1-301-261-9150 in<br />

Washington,D.C.<br />

Tim Russell is vice president and general manager <strong>of</strong> Datakey<br />

Inc.<br />

CHIPS Winter 2003 45


SPAWAR Systems Center Charleston Technology Training Center Norfolk is undergoing<br />

an exciting revitalization with a focus on arming the warfighter with 21st century<br />

technology. The transformation will result in the standup <strong>of</strong> SPAWAR Institute —<br />

delivering C4ISR training solutions. We are enthusiastically looking forward to meeting<br />

the training demands <strong>of</strong> the 21st century warrior and exceeding expectations for quality,<br />

service and pr<strong>of</strong>essionalism.<br />

With opportunity comes change, the popular column,“How Can I” by the training team<br />

<strong>of</strong> SPAWAR Systems Center Charleston Technology Training Center Norfolk will be phased<br />

out. Through the years many <strong>Information</strong> Technology users have come to depend on<br />

the expert advice the training team has shared, but it is time to move in a fascinating<br />

new direction to meet the warfighter’s requirements with right on target C4ISR training.<br />

SPAWAR Institute will partner with <strong>Navy</strong> trainers and customers to bridge the gap<br />

between informal SPAWAR installation training and formal schoolhouse instruction. This<br />

nontraditional, integrated approach will provide timely and flexible C4ISR training to<br />

meet today’s shipboard requirements.<br />

Thanks to the following SPAWAR Systems Center Charleston Technology Training Center<br />

Norfolk instructors for their input: Alice Butler, Ronald Bailey, Katie Bierman, Gregory<br />

Browning, Colleen Jobe, Glynda R<strong>of</strong>fman and Muriel Taylor. Some <strong>of</strong> their most<br />

recent inquiries are listed below. If you would like further information or have questions,<br />

please call (757) 444-7976, DSN 564 or e-mail to forinfo@spawar.navy.mil. Visit<br />

their Web site at www.training.norfolk.navy.mil<br />

Micros<strong>of</strong>t Access<br />

QUESTION: Is there a way to create a shortcut on the desktop that will open Access, open a specific database and open a<br />

form<br />

ANSWER: Open the database. Use Tools ... Startup to set the opening form. Make a desktop shortcut to the Access database. When<br />

you click on the shortcut, Access will open the correct database and the selected form.<br />

QUESTION: What should you do when you set the database to open to a form and want to then gain access to the other<br />

objects in the database<br />

ANSWER: Hold the shift key while opening the database to bypass any start-up settings.<br />

Micros<strong>of</strong>t Outlook XP<br />

QUESTION: I lost the envelope that pops up when you get new mail. How do I get it back<br />

ANSWER: To restore the Envelope icon in your system tray follow the steps below.<br />

♦Start Outlook.<br />

♦Click the Tools menu, Select Options.<br />

♦On the Preferences Tab, Click E-mail Options.<br />

♦Click Advanced E-mail Options.<br />

♦Check to select the Show an envelope icon.<br />

Micros<strong>of</strong>t PowerPoint<br />

QUESTION: How can I change things that are the same color in a piece <strong>of</strong> clip art into a variety <strong>of</strong> different colors<br />

ANSWER: To get pieces <strong>of</strong> the clip art to each be a different color, double-click the piece <strong>of</strong> clip art - click “yes” to convert to a<br />

Micros<strong>of</strong>t Office drawing object (this will ungroup the image) - left click outside <strong>of</strong> the image to deselect it - double-click on any<br />

piece you would like to recolor - click the drop down list to change the fill color - regroup the image when you’re finished.<br />

In order to regroup, click on each part <strong>of</strong> the image using both the shift and control keys until all pieces <strong>of</strong> the image have been<br />

selected. Then, right click on the image and choose the Grouping option and then Group.<br />

*Tip* You can keep ungrouping and regrouping the image as <strong>of</strong>ten as you like to change the colors.<br />

CHIPS Winter 2003


SPAWAR<br />

Institute<br />

...C4ISR Training Solutions for the 21st Century Warfighter<br />

The SPAWAR Institute provides pr<strong>of</strong>essional instructors in Integrated Battle Force, Advanced<br />

Systems Training, Network Essentials, Unix Operating Systems, Micros<strong>of</strong>t Systems Engineer,<br />

A+ Certified Pr<strong>of</strong>essional and Network + Certified Pr<strong>of</strong>essional. SPAWAR Institute provides<br />

Curriculum Development services including requirements validation,training objectives<br />

development, alignment with governing standards and directives, curriculum production and<br />

delivery, and metrics for evaluation and modification based on student feedback. SPAWAR<br />

Institute delivers eLearning tools such as Computer Based Training<br />

and Web-enabled modules for C4ISR systems.<br />

We can design customized training solutions for every requirement.<br />

SPAWAR Intitute Services<br />

Integrated Battleforce Training<br />

Advanced Systems Training<br />

Afloat Training Teams<br />

Curriculum Development<br />

eLearning Resources<br />

757.444.4945<br />

DSN 564.4945<br />

Located Near Our Fleet Customers<br />

on the Norfolk Naval Station


ViViD Contracts<br />

N68939-97-D-0040<br />

Contractor: Avaya Incorporated<br />

N68939-97-D-0041<br />

Contractor: General Dynamics<br />

ViViD provides digital switching systems, cable plant components,<br />

communications and telecommunications equipment<br />

and services required to engineer, maintain, operate and modernize<br />

base level and ships afloat information infrastructure. This<br />

includes pier side connectivity and afloat infrastructure with purchase,<br />

lease and lease-to-own options. Outsourcing is also available.<br />

Awarded to:<br />

Avaya Incorporated (N68939-97-D-0040); (888) VIVID4U<br />

or (888) 848-4348. Avaya also provides local access and local<br />

usage services.<br />

General Dynamics (N68939-97-D-0041); (888) 483-8831<br />

Modifications<br />

Latest contract modifications are available at http://www.itumbrella.navy.mil<br />

Ordering <strong>Information</strong><br />

Ordering Expires:<br />

26 Jul 05 for all CLINs/SLINs<br />

26 Jul 07 for Support Services and Spare Parts<br />

Authorized users: DoD and U.S. Coast Guard<br />

Warranty: Four years after government acceptance. Exceptions<br />

are OEM equipment warranties on catalog items.<br />

Acquisition, Contracting & Technical Fee: Included<br />

in all CLINs/SCLINs<br />

Web Link<br />

http://www.it-umbrella.navy.mil/<br />

TAC Solutions BPAs<br />

Listed Below<br />

TAC Solutions provides PCs, notebooks, workstations, servers,<br />

networking equipment, and all related equipment and services<br />

necessary to provide a completely integrated solution. BPAs<br />

have been awarded to the following:<br />

Compaq Federal, LLC (N68939-96-A-0005); (800) 727­<br />

5472<br />

Control Concepts (N68939-97-A-0001); (800) 922-9259<br />

Dell (N68939-97-A-0011); (800) 727-1100, ext. 61973<br />

GTSI (N68939-96-A-0006); (800) 999-4874, ext. 2549<br />

Hewlett-Packard (N68939-97-A-0006); (301) 258-2063<br />

McBride and Associates, Inc. (N68939-96-A-0007);<br />

(800) 829-9409, ext. 7612<br />

SUN (N68939-97-A-0005); (800) 786-0404<br />

Ordering Expires: Indefinite with annual review for all<br />

BPAs.<br />

Authorized Users: DON, U.S. Coast Guard, DoD, and other<br />

federal agencies with prior approval.<br />

Warranty: IAW GSA Schedule. Additional warranty options available.<br />

Web Link<br />

http://www.it-umbrella.navy.mil/contract/tac-solutions/<br />

tac-sol.html<br />

Enterprise S<strong>of</strong>tware Agreements<br />

Listed Below<br />

The Enterprise S<strong>of</strong>tware Initiative (ESI) is a <strong>Department</strong> <strong>of</strong> Defense (DoD) initiative<br />

to streamline the acquisition process and provide best-priced, standards-compliant<br />

information technology (IT). The ESI is a business discipline used to coordinate<br />

multiple IT investments and leverage the buying power <strong>of</strong> the government<br />

for commercial IT products and services. By consolidating IT requirements and<br />

negotiating Enterprise Agreements with s<strong>of</strong>tware vendors, the DoD realizes significant<br />

Total Cost <strong>of</strong> Ownership (TCO) savings in IT acquisition and maintenance.<br />

The goal is to develop and implement a process to identify, acquire, distribute,<br />

and manage IT from the enterprise level.<br />

In September 2001, the ESI was approved as a “quick hit” initiative under the DoD<br />

Business Initiative Council (BIC). Under the BIC, the ESI will become the benchmark<br />

acquisition strategy for the licensing <strong>of</strong> commercial s<strong>of</strong>tware and will extend<br />

a S<strong>of</strong>tware Asset Management Framework across the DoD. Additionally, the<br />

DAR Council has approved a final rule which will incorporate the ESI into the Defense<br />

Federal Acquisition Regulation Supplement (DFARS) Section 208.74.<br />

Authorized ESI users include all Defense components, U.S. Coast Guard, Intelligence<br />

Community, and Defense contractors when authorized by their contracting<br />

<strong>of</strong>ficer. For more information on the ESI or to obtain product information, visit<br />

the ESI Web site at http://www.don-imit.navy.mil/esi.<br />

ASAP (N00039-A-9002) for Novell products; and (N00104-02-A-ZE78) for<br />

Micros<strong>of</strong>t products; Small Business; (800) 883-7413 for Novell products and<br />

(800) 248-2727, ext. 5303 for Micros<strong>of</strong>t products<br />

GTSI (N00104-00-A-Q242) for JetForm products; and (N00104-02-A-ZE79) for<br />

Micros<strong>of</strong>t products; Small Business; (800) 999-GTSI<br />

Crunchy Technologies, Inc. (N00104-01-A-Q446) for PageScreamer<br />

S<strong>of</strong>tware (Section 508 Tool), Crunchy Pr<strong>of</strong>essional Services and Training; Small<br />

Business Disadvantaged; (877) 379-9185 or (703) 469-2010<br />

CorpS<strong>of</strong>t, Inc. (N00104-01-A-Q506) for Adobe products; and (N00104-02-A­<br />

ZE82) for Micros<strong>of</strong>t products; Call (800) 808-1944 for Adobe products and<br />

(800) 677-4009, ext. 5248 or (781) 440-1000 (OCONUS) for Micros<strong>of</strong>t products<br />

HiS<strong>of</strong>tware, DLT Solutions, Inc. (N00104-01-A-Q570) for HiS<strong>of</strong>tware<br />

Section 508 Tools; Small Business; (888) 223-7083 or (703) 708-9658<br />

SAP Public Sector and Education, Inc. (N00104-02-ZE77) for SAP<br />

s<strong>of</strong>tware, installation, implementation technical support, maintenance and<br />

training services; (610) 661-5711<br />

S<strong>of</strong>tchoice (Beyond.com) (N00104-02-A-ZE81) for Micros<strong>of</strong>t products;<br />

Small Business; (877) 804-4995, ext. 305<br />

COMPAQ (N00104-02-A-ZE80) for Micros<strong>of</strong>t products; (800) 535-2563 pin<br />

6246 or (317) 228-3424 (OCONUS)<br />

DELL (N00104-02-A-ZE83) for Micros<strong>of</strong>t products; (512) 723-7010<br />

S<strong>of</strong>tmart (N00104-02-A-ZE84) for Micros<strong>of</strong>t products; (610) 518-4000,<br />

ext. 6492<br />

CDW-G (N00104-02-A-ZE85) for Micros<strong>of</strong>t products; (703) 726-5011<br />

S<strong>of</strong>tware House International (N00104-02-A-ZE86) for Micros<strong>of</strong>t<br />

products; Small Business Disadvantaged; (301) 294-9439<br />

Datakey (N00104-02-D-Q666) IDIQ Contract for CAC Middleware products;<br />

(301) 261-9150<br />

Litronic (N00104-02-D-Q667) IDIQ Contract for CAC Middleware products;<br />

(703) 905-9700<br />

Schlumberger (N00104-02-D-Q668) IDIQ Contract for CAC Middleware<br />

products; (410) 723-2428<br />

Spyrus (N00104-02-D-Q669) IDIQ Contract for CAC Middleware products;<br />

(408) 953-0700, ext. 155<br />

CHIPS Winter 2003


Ordering Expires:<br />

Ordering <strong>Information</strong><br />

Micros<strong>of</strong>t products: 26 Jun 03<br />

Novell products: 31 Mar 07<br />

JetForm products: 23 Feb 03<br />

Crunchy products: 04 Jun 04<br />

Adobe products: 14 Aug 03<br />

HiS<strong>of</strong>tware products: 16 Aug 04<br />

CAC Middleware products: 06 Aug 05<br />

SAP products: Upon expiration <strong>of</strong> the GSA schedule<br />

Authorized Users: Adobe products, Micros<strong>of</strong>t products, Section 508 Tools,<br />

CAC Middleware and SAP: All DoD. For purposes <strong>of</strong> this agreement, DoD is defined<br />

as: all DoD Components and their employees, including Reserve Component<br />

(Guard and Reserve) and the U.S. Coast Guard mobilized or attached to DoD;<br />

other government employees assigned to and working with DoD; non-appropriated<br />

funds instrumentalities such as NAFI employees; Intelligence Community<br />

(IC) covered organizations to include all DoD Intel System member organizations<br />

and employees, but not the CIA nor other IC employees unless they are assigned<br />

to and working with DoD organizations; DoD contractors authorized in accordance<br />

with the FAR; and authorized Foreign Military Sales.<br />

JetForm: All DoD and U.S. Coast Guard (excluding Air Force and Army).<br />

Warranty: IAW GSA Schedule. Additional warranty and maintenance options<br />

available. Acquisition, Contracting and Technical fee included in all BLINS.<br />

Web Links<br />

ASAP S<strong>of</strong>tware Express<br />

http://www.it-umbrella.navy.mil/contract/msesa/asap/asap.html<br />

Government Technology Services, Inc. (GTSI)<br />

http://www.it-umbrella.navy.mil/contract/msesa/gtsi/gtsi.html<br />

CorpS<strong>of</strong>t, Inc.<br />

http://www.it-umbrella.navy.mil/contract/adobe/adobe.html<br />

Crunchy Technologies, Inc.<br />

http://www.it-umbrella.navy.mil/contract/508/crunchy/crunchy.html<br />

HiS<strong>of</strong>tware, DLT Solutions, Inc.<br />

http://www.it-umbrella.navy.mil/contract/508/dlt/dlt.html<br />

SAP<br />

http://www.it-umbrella.navy.mil/contract/enterprise/sap/sap.html<br />

Micros<strong>of</strong>t Products<br />

http://www.it-umbrella.navy.mil/contract/enterprise/micros<strong>of</strong>t/ms-ela.html<br />

Datakey, Inc.<br />

http://www.it-umbrella.navy.mil/contract/middleware-esa/datakey/index.html<br />

SSP-Litronic, Inc.<br />

http://www.it-umbrella.navy.mil/contract/middleware-esa/litronic/index.html<br />

Schlumberger<br />

http://www.it-umbrella.navy.mil/contract/middleware-esa/Schlumberger/<br />

index.html<br />

Spyrus, Inc.<br />

http://www.it-umbrella.navy.mil/contract/middleware-esa/spyrus/index.html<br />

<strong>Navy</strong> Contract:<br />

N68939-97-A-0008<br />

<strong>Department</strong> <strong>of</strong> the <strong>Navy</strong><br />

Enterprise Solutions BPA<br />

The <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> Enterprise Solutions (DON ES) BPA provide a wide<br />

range <strong>of</strong> technical services, specially structured to meet tactical requirements,<br />

including worldwide logistical support, integration and engineering services<br />

(including rugged solutions), hardware, s<strong>of</strong>tware and network communications<br />

solutions. DON ES has one BPA.<br />

Computer Sciences Corporation (CSC) (N68939-97-A-0008);<br />

(619) 225-2412; Awarded 07 May 97; Ordering expires 31 Mar 06, with two oneyear<br />

options<br />

Authorized Users: All DoD.<br />

Web Link<br />

http://www.it-umbrella.navy.mil/contract/tac-don-es/csc/csc.html<br />

<strong>Information</strong> Technology Support Services<br />

BPAs<br />

Listed Below<br />

The <strong>Information</strong> Technology Support Services (ITSS) BPAs provide a wide range<br />

<strong>of</strong> IT support services such as networks,Web development, communications, training,<br />

systems engineering, integration, consultant services, programming, analysis<br />

and planning. ITSS has five BPAs. They have been awarded to:<br />

Booz Allen Hamilton Inc. (N68939-97-A-0014); (415) 281-4942;<br />

Awarded 02 Jul 97; Ordering expires 31 Mar 04<br />

Lockheed Martin (N68939-97-A-0017); (240) 725-5950; Awarded 01 Jul 97;<br />

Ordering expires 30 Jun 05, with two one-year options<br />

Northrop Grumman <strong>Information</strong> Technology<br />

(N68939-97-A-0018); (571) 203-6114; Awarded 01 Jul 97;<br />

Ordering expires 12 Feb 05, with two one-year options<br />

SAIC (N68939-97-A-0020); (703) 676-5096; Awarded 01 Jul 97; Ordering<br />

expires 30 Jun 05, with two one-year options<br />

TDS (Sm Business) (N00039-98-A-3008); (619) 224-1100;<br />

Awarded 15 Jul 98; Ordering expires 15 Jul 05, with two one-year options<br />

Authorized Users: All DoD, federal agencies, and U.S. Coast Guard.<br />

Web Link<br />

http://www.it-umbrella.navy.mil/contract/itss/itss.html<br />

<strong>Navy</strong> Contract:<br />

N00039-99-A-3193<br />

Networking Solutions BPA<br />

The Networking Solutions contract provides access to significant discounts on<br />

Cisco networking products and solutions. The items include a large variety <strong>of</strong><br />

ATM and Ethernet switches, edge devices and s<strong>of</strong>tware. This Networking BPA is<br />

primarily intended for equipment purchases. Customers requiring total solutions<br />

or significant integration services should consider placing their order(s) using the<br />

ViViD Contracts. A BPA has been awarded to:<br />

Federal Data Corporation (N00039-99-A-3193); (425) 793-3847<br />

Ordering Expires: Indefinite with annual review for BPA<br />

Authorized Users: DON, U.S. Coast Guard, DoD, and other federal<br />

agencies with prior approval.<br />

Warranty: IAW GSA schedule. Additional warranty and options available.<br />

Web Link<br />

http://www.it-umbrella.navy.mil/contract/net-solutions/fdc/fdc.html<br />

Research and Advisory BPAs<br />

Listed Below<br />

Research and Advisory Services BPAs provide unlimited access to telephone inquiry<br />

support, access to research via Web sites and analyst support for the number<br />

<strong>of</strong> users registered. In addition, the services provide independent advice on<br />

tactical and strategic IT decisions. Advisory services provide expert advice on a<br />

broad range <strong>of</strong> technical topics and specifically focus on industry and market<br />

trends. BPAs listed below.<br />

Gartner Group (N00104-03-A-ZE77); (703) 226-4815; Awarded Nov 02;<br />

one-year base period with three one-year options.<br />

CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


Acquisition Solutions (N00104-99-A-Q150); (703) 378-3226;<br />

Awarded 14 Jan 00; one-year base period with three one-year options.<br />

Ordering Expires:<br />

Gartner Group: Nov 06<br />

Acquisition Solutions: Jan 04<br />

Authorized Users:<br />

Gartner Group: This <strong>Navy</strong> BPA is open for ordering by all <strong>of</strong> the DoD components<br />

and their employees, including Reserve Components (Guard and Reserve); the<br />

U.S. Coast Guard; other government employees assigned to and working with<br />

DoD; non-appropriated funds instrumentalities <strong>of</strong> the DoD; DoD contractors<br />

authorized in accordance with the FAR and authorized Foreign Military Sales (FMS).<br />

Acquisition Solutions: All DoD. For purposes <strong>of</strong> this agreement, DoD is defined<br />

as: all DoD Components and their employees, including Reserve Component<br />

(Guard and Reserve) and the U.S. Coast Guard mobilized or attached to DoD; other<br />

government employees assigned to and working with DoD; non-appropriated<br />

funds instrumentalities such as NAFI employees; Intelligence Community (IC)<br />

covered organizations to include all DoD Intel System member organizations and<br />

employees, but not the CIA nor other IC employees unless they are assigned to<br />

and working with DoD organizations; DoD contractors authorized in accordance<br />

with the FAR; and authorized Foreign Military Sales.<br />

Web Links<br />

From the DON IT Umbrella Program Web Site:<br />

Gartner Group<br />

http://www.it-umbrella.navy.mil/contract/r&a/gartner/gartner.html<br />

Acquisition Solutions<br />

http://www.acqsolinc.com<br />

TurboPrep Messaging Solution<br />

N00039-00-C-3112<br />

Contractor: Ice Communications<br />

TurboPrep s<strong>of</strong>tware for generation, preparation, validation and formatting <strong>of</strong><br />

messages has been purchased by the SPAWAR Program Office for the DON Enterprise.<br />

No additional cost to authorized users. Order issued to:<br />

Ice Communications, Inc. (N00039-00-C-3112 <strong>of</strong> Feb 00); Small Business;<br />

(703) 938-1465; Awarded Aug 00<br />

Ordering <strong>Information</strong><br />

Ordering Expires: 14 Feb 03<br />

Authorized Users: All DON and U.S. Coast Guard<br />

Warranty: 3-year which includes s<strong>of</strong>tware updates and upgrades.<br />

http://www.icecomm.com.<br />

Web Link<br />

SEWP III<br />

Listed Below<br />

NASA’s Scientific and Engineering Workstation Procurement III government-wide<br />

contracts provide Class 10 Computer Support Devices and Class 12 Security Systems<br />

and Tools. SEWP III is an indefinite delivery, indefinite quantity (IDIQ) type<br />

contract. Contracts have been awarded to the following:<br />

Hewlett-Packard (NAS5-01133) and (NAS5-01141); (781) 505-7676<br />

GTSI/SUN (NAS5-01134); (703) 502-2172<br />

IBM (NAS5-01135); (800) 426-2255<br />

Silicon Graphics Federal, Inc. (NAS5-01136) and (NAS5-01140);<br />

(301) 572-1980<br />

GMR/Cray (NAS5-01138); (703) 330-1199<br />

Compaq Federal, LLC (NAS5-01139); (301) 918-5360<br />

GTSI (NAS5-01142) and (NAS5-01146); (703) 502-2172<br />

Logicon FDC (NAS5-01143) and (NAS5-01147); (301) 446-3100<br />

UNISYS Corporation (NAS5-01144); (800) 398-8090<br />

Government Micro Resources (NAS5-01145); (703) 330-1199<br />

Ordering Expires: 30 Jul 06 (Contracts awarded for five years starting<br />

30 Jul 01.)<br />

Authorized Users: DON, U.S. Coast Guard, DoD, and other federal agencies.<br />

Warranty: 36-month extended warranty available<br />

Web Link<br />

http://www.it-umbrella.navy.mil/contract/sewp3/sewp3.htm<br />

The U.S. Army Small Computer Program<br />

(ASCP) Maxi-Mini<br />

and Database (MMAD) Program<br />

Listed Below<br />

The Maxi-Mini And Database (MMAD) Program is supported by two fully competed<br />

Indefinite Delivery/Indefinite Quantity (ID/IQ) contracts with IBM Global<br />

Services and GTSI Corporation. The MMAD Program is intended to be DoD’s follow-on<br />

to the <strong>Navy</strong> administered Supermini Program in fulfilling high and medium<br />

level IT product and service requirements. Like its predecessor, MMAD provides<br />

items to modernize, upgrade, refresh and consolidate current systems, as<br />

well as to establish new ones.<br />

Products include:<br />

64-bit Servers (RISC and Itanium): HP, IBM, Compaq<br />

64-bit RISC and NT Workstations: HP, Compaq<br />

Routers/Network: Cisco, 3COM<br />

Storage Systems: IBM, RMSI, Compaq, Dot Hill, System Upgrade, EMC<br />

Ancillaries include network hardware items, upgrades, peripherals and s<strong>of</strong>tware.<br />

Services are geared toward providing solutions needed to effectively manage<br />

and support the complexities <strong>of</strong> agency or program system environments, to include:<br />

consultants, analysts, engineers, programmers, trainers and administrators.<br />

MMAD is designed to ensure the latest products and services are available in a<br />

flexible manner to meet the various requirements identified by DoD and other<br />

agencies. This flexibility includes special solution CLINs, technology insertion provisions,<br />

ODC (Other Direct Cost) provisions for ordering related non-contract items,<br />

and no dollar/ratio limitation for ordering services and hardware.<br />

Latest product additions include EMC and McData storage solutions, and Tivoli<br />

Storage Manager s<strong>of</strong>tware. Both IBM and GTSI now provide HP, Cisco and EMC<br />

products and services with MMAD terms and conditions.<br />

Awarded to:<br />

GTSI Corporation (DAAB07-00-D-H251); (800) 999-GTSI<br />

IBM Global Services-Federal (DAAB07-00-D-H252); CONUS:<br />

(866) IBM-MMAD (1-866-426-6623) OCONUS: (703) 724-3660 (Collect)<br />

Ordering <strong>Information</strong><br />

Ordering: Decentralized. Any federal contracting <strong>of</strong>ficer may issue delivery<br />

orders directly to the contractor.<br />

Ordering Expires:<br />

GTSI: 24 May 06 (includes three option periods)<br />

IBM: 19 Feb 06 (includes three option periods)<br />

CHIPS Winter 2003


Authorized Users: DoD and other federal agencies including FMS<br />

Warranty: 5 years or OEM options<br />

Delivery: 35 days from date <strong>of</strong> order (50 days during surge period, August<br />

and September)<br />

No separate acquisition, contracting and technical fees.<br />

Web Links<br />

GTSI<br />

http://pmscp.monmouth.army.mil/contracts/mmad_gtsi/mmad_gtsi.asp<br />

IBM<br />

http://pmscp.monmouth.army.mil/contracts/mmad_ibm/mmad_ibm.asp<br />

The U.S. Army<br />

Enterprise S<strong>of</strong>tware Initiative BPA<br />

DAAB15-99-A-1002<br />

As <strong>of</strong> February, 28, 2002, the <strong>Navy</strong> holds inventory <strong>of</strong> Oracle Database Enterprise<br />

Edition (9i and 9ias) perpetual licenses (either named-user, multi-server or<br />

processor), and additional options and tools (i.e., security options, partitioning,<br />

spatial, clustering, diagnostics management packs, Tuning Management Pack,<br />

Change Management Pack, Internet Application Server Enterprise, Internet<br />

Developer Suite, and Balanced Scorecard). Initial orders will include a warranty<br />

period <strong>of</strong> March 1 through May 31, 2002, and s<strong>of</strong>tware support for the period<br />

June 1 through May 31, 2003. Placing orders early will result in the best deal for<br />

end users. Four (4) additional out years <strong>of</strong> Silver Technical Support and product<br />

update support have also been negotiated.<br />

The initial purchase price for end users is an average <strong>of</strong> a 64 percent discount <strong>of</strong>f<br />

GSA prices and total package discounts (including out year technical support)<br />

average a 70 percent discount <strong>of</strong>f GSA prices. Customers with small requirements<br />

can benefit from discounts normally reserved for customers with orders over $10<br />

million. These licenses can be distributed throughout the <strong>Navy</strong>. In accordance<br />

with the Federal Acquisition Regulations (FAR) and DoD policy, <strong>Navy</strong> customers<br />

who have selected Oracle to satisfy new requirements must purchase the “new”<br />

Oracle licenses from the inventory.<br />

This virtual inventory was established through the <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> <strong>Chief</strong><br />

<strong>Information</strong> <strong>Officer</strong> (DON CIO) Enterprise Licensing Team and the <strong>Department</strong> <strong>of</strong><br />

Defense Enterprise S<strong>of</strong>tware Initiative (DoD ESI). The DoD ESI is a joint initiative,<br />

which has been approved by the DoD Business Initiative Council (BIC).<br />

This inventory will be managed by the <strong>Department</strong> <strong>of</strong> the <strong>Navy</strong> <strong>Information</strong><br />

Technology (DON IT) Umbrella Program Office at Space and Naval Warfare Systems<br />

Center, San Diego.<br />

For complete contract<br />

information go to the<br />

DON IT Umbrella Program<br />

Web site at:<br />

www.it-umbrella.navy.mil<br />

CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience


52 CHIPS Dedicated to Sharing <strong>Information</strong>*Technology*Experience

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!