1 / 15

Defense Acquisition University 21 st Annual Symposium

Defense Acquisition University 21 st Annual Symposium. Colonel Robert Gearhart, USMC Division Chief, J6I Directorate for Command, Control, Communications, and Computer Systems (J6) The Joint Staff. What is Network Centric Operations?.

mizell
Download Presentation

Defense Acquisition University 21 st Annual Symposium

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Defense Acquisition University21st Annual Symposium Colonel Robert Gearhart, USMC Division Chief, J6I Directorate for Command, Control, Communications, and Computer Systems (J6) The Joint Staff

  2. What is Network Centric Operations? • A “networked” Joint Force that is linked and synchronized in time and purpose • Decisive combat power derived from a fully connected and interoperable force • Shared battlespace awareness • Faster decision cycles… increased tempo • Information, knowledge, & decision superiority • Revised methods of conducting operations / C2? • Reduced sensor-to-shooter kill chain time • Massed “effects” rather than forces

  3. The “Playing” Field Shooters Sensors Command & Control People Networks

  4. The Global Information Grid Every battlespace entity is a potential node

  5. Potential Impacts of a Network Centric Force • What are the implications to doctrine, joint force organization, and the conduct of warfare of the Task, Post, Process, Use (TPPU)? • Unity of Effort vs. Unity of Command • How does the Joint Force Commander “manage critical information” in a “sea” of data? • Is decentralized execution feasible where higher level commanders and staffs will have near real time situational awareness and access to information? • Blurring of the lines between strategic / tactical level • How much to do we automate the “kill chain”? • Do will allow C2 systems to clear fire in close proximity to troops or civilians? • Impact on current processes for fire support coordination? • Impact of JTRS, where every platform is a potential node? Component vs. JFC positioning of network nodes to support objectives? • How do we manage the network? Does the J-6/G-6 direct the placement of weapon systems to support the network?

  6. ENDURING/IRAQI FREEDOM (2003) Forces vs. Bandwidth DEPLOYED FORCES BANDWIDTH 3200 542,000 350,000 250 99 51,400 DESERT STORM NOBLE ANVIL (1991) (1999)

  7. Acquisition Discipline Policy & Architecture Direction Policy & Architecture Direction IPV6 Implementation Completed (Goal) NCOW Reference Model ELIMINATE BANDWIDTH CONSTRAINTS Core Enterprise Services (9) + Application Program Interfaces Core Enterprise Services (9) + Application Program Interfaces Core Enterprise Services (9) + Application Program Interfaces Core Enterprise Services (9) + Application Program Interfaces Block 2 (All CESs) in 3 Spirals DEPLOY TRUSTED SERVICES CAC Fully Deployed 40 Gb Terrestrial HAIPE IP Identity Mgmt Infrastructure (PKI, Biometrics); Network Defense (Enterprise Sensor Grid) IMPROVE SENSEMAKING - FY04 FY 05 FY 06 FY07 FY08 FY09 Joint Tactical Radio System Joint Tactical Radio System Software Communications Architecture Software Communications Architecture Software Communications Architecture Software Communications Architecture Provides IP Provides IP - - based, self based, self - - managed, managed, Cluster 1 Vehicular & Army Rotary Wing Cluster 4 Airborne WNW BLOS, mobile data and voice BLOS, mobile data and voice Cluster 2 Handheld Cluster 5 Handheld, Manpack, Embedded IOC communications services communications services Cluster 3 Maritime & Fixed Station IOC Cluster 2 IOC Clusters 1,4,5 Cluster 3 Optical Mesh IP Network Optical Mesh IP Network Optical Mesh IP Network Optical Mesh IP Network GIG Bandwidth Expansion GIG Bandwidth Expansion Optical Bandwidth to Ground Sites Optical Bandwidth to IPV6 Provides ubiquitous, secure, robust Provides ubiquitous, secure, robust STEP and Teleport sites Integrated GIG Network Integrated GIG Network optical IP foundation network optical IP foundation network Integrated GIG Network Integrated GIG Network FOC IOC FY 11 TCA SATCOM TCA SATCOM 1 2 3 4 TSAT (CY10 Launch) Wideband Gapfiller TSAT (CY10 Launch) Wideband Gapfiller Incorporates mobile/tactical users and Incorporates mobile/tactical users and Optical IP Networking for global intelligence via optical cross global intelligence via optical cross Joint Operations Optical Bandwidth Support for Reachback Capabilities Wideband Networking Centers and ISR locations links and EHF IP links links and EHF IP links Additional Global Hawk UAVs for Deployed Forces for UAVs and Other ISR Net Net - - Centric Enterprise Services Centric Enterprise Services Provides information and data Provides information and data Block 1 (All CESs) in 3 Spirals services to all GIG users services to all GIG users - Enterprise Systems Management - Messaging - Discovery - Mediation - Collaboration - User Assist - IA/Security - Storage Services - Application Defense in Depth Defense in Depth Defense in Depth Defense in Depth IA Programs Enables trusted computer, networking, and data services to all GIG users 10 Gb Terrestrial HAIPE IP 1 Gb Terrestrial HAIPE IP 40 Gb Space HAIPE IP(FY2010) Op Op - - Intel Intel Data Data Applications Processes Applications Processes Op Op - - Intel Intel Data Data Applications Processes Applications Processes Horizontal Fusion Portfolio Global Net - centric Means/tools to enable the smart pull Multi - INT Automated Collaborative FY 10 Improved Shared Access to Surveillance and Fusion for Tagging of and fusion of data by users Collection Collateral ISR data Targeting Warfighters Selected Sensor Management and Combat Support Data Improved Shared Access Improved ISR Battle Deployment ISR Battle to Combat Support Strategic & of Collaborative Management Management Tactical C2 Applications Data Net - Centric to Joint ForceNet ForceNet Enterprise Services Commanders Deployable Future Combat System Deployable Future Combat System Net - Centric DCGS Net - Centric DCGS CJTF HQs (FCS) CJTF HQs (FCS) (examples)

  8. Satellite Communications • Advanced Extremely High Frequency System (AEHF) • Wideband Gapfiller System (WGS) • Transformational CommunicationalSatellite (TSAT) Must minimize program slippages and synchronize terminal/space segment fielding

  9. Joint Tactical Radio System (JTRS) TCS GIG-BE R R Teleport R Teleport R R JTRS

  10. Deployable Joint Warfighting • Deployable Joint C4 and C2 • Standing Joint Force Headquarters (SJFHQ) • Deployable Joint Command and Control (DJC2)

  11. Multinational Information Sharing • Multinational Information Sharing (MNIS) is consistently a top Combatant Command challenge • Technology and lessons learned can also apply to Interagency • There is no perfect solution – but we need to reduce the 84+ programs and initiatives • Coalitions are here to stay • Need secure, timely information exchange Future warfighting will be joint and coalition – relying on Interagency participants!

  12. Information Assurance We need to: • Refine our security posture and TTPs across the board • Field smart tools to alert us on network anomalies, intrusions, attacks and provide forensics • Reduce timelines for complying with Information Assurance Vulnerability Assessments (IAVAs) • A risk taken by one is a vulnerability assumed by all • Improve training standards for everyone who uses, operates and maintains networks • Continually assess and prepare for future threats As the network becomes our center of gravity, computer network defense becomes our Achilles heel

  13. Conclusion • We are at the brink of a major change in warfighting • C4 is the critical enabler to network centric operations • We need to face the many challenges ahead together • Regardless of technology it all comes down to people • The end result will be increased lethality, increased precision and reduced vulnerabilities

  14. UNCLASSIFIED Questions? UNCLASSIFIED

  15. Defense Acquisition University21st Annual Symposium COL Robert Gearhart Division Chief, J6I Directorate for Command, Control, Communications, and Computer Systems (J6) The Joint Staff

More Related