The Defense Information Systems Network (DISN) has been the United States Department of Defense 's enterprise telecommunications network for providing data, video, and voice services for 40 years.
21-487: The DISN end-to-end infrastructure is composed of three major segments: The DISN provides the following multiple networking services: The Organizational Messaging Service provides a range of assured services to the customer community that includes the military services, DoD agencies, combatant commands (CCMDs), non-DoD U.S. government activities, and the Intelligence Community (IC). These services include
42-533: A severe cyberattack in 2008, in the form of a computer virus which spread through military computer networks. As a result, the US Strategic Command banned all forms of removable media , including thumb drives , DVDs , and floppy disks . At the time, the GIG contained about 17 million military computers, and it was scanned millions of times daily. The Department of Defense Information Enterprise
63-630: Is a worldwide network of information transmission, of associated processes, and of personnel serving to collect, process, safeguard, transmit, and manage this information. It is an all-encompassing communications project of the United States Department of Defense . The GIG makes this immediately available to military personnel, to those responsible for military politics, and for support personnel. It includes all infrastructure, bought or loaned, of communications, electronics, informatics (including software and databases), and security. It
84-573: Is an integral part of a weapon or weapons system(s) or are critical to the direct fulfillment of military or intelligence missions. The Department of Defense chairs the committee. Membership consists of representatives from 21 U.S. Government Departments and Agencies with voting privileges, including the CIA , DIA , DOD , DOJ , FBI , NSA , and the National Security Council , and all United States Military Services. Members not on
105-562: Is defined as the DoD information resources, assets, and processes required to achieve an information advantage and share information across the Department of Defense and with mission partners. It includes: The Network-Centric Warfare (NCW) doctrine represents a fundamental shift in military culture, away from compartmentalized war machines and toward interconnected units operating cohesively. The tenets of Network Centric Warfare are: At
126-483: Is defined as the operational framework consisting of three essential tasks, Situational Awareness (SA) , and Command & Control (C2) that the Commander (CDR) of United States Strategic Command (USSTRATCOM), in coordination with DoD and Global NetOps Community, employs to operate and defend the GIG to ensure information superiority. The specifications for the GIG were published by the DoD on 22 September 1999, and
147-579: Is not, and will not be, connected to the enterprise network. This new definition removes references to the National Security Systems as defined in section 5142 of the Clinger-Cohen Act of 1996 . Further, this new definition removes the references to the GIG providing capabilities from all operating locations (bases, posts, camps, stations, facilities, mobile platforms, and deployed sites). And lastly, this definition removes
168-716: Is the most visible manifestation of network-centric warfare . It is the combination of technology and human activity that enables warfighters to access information on demand. It is defined as a "globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel". The GIG includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and National Security Systems . Non-GIG Information Technology (IT) includes stand-alone, self-contained, or embedded IT that
189-399: The assistant secretary of defense officially mandated it on 19 September 2002 to carry out the project. Although in 2008, the ambitious objectives of the program had not been realized, informatic communications between soldiers and commanders on the battlefield had been successfully realized, the most well-known examples having occurred during the 2003 invasion of Iraq . The GIG underwent
210-762: The Critical Infrastructure Protection in the Information Age, re-designating NSTISSC as the Committee on National Security Systems. The CNSS holds discussions of policy issues, sets national policy, directions, operational procedures, and guidance for the information systems operated by the U.S. Government, its contractors or agents that either contain classified information, involve intelligence activities, involve cryptographic activities related to national security, involve command and control of military forces, involve equipment that
231-738: The DISA-provided infrastructure. Additionally, information confidentiality and integrity are guaranteed through the use of NSA-approved Fortezza-based encryption and signature between the Automated Message Handling Systems (AMHSs) operated/maintained by the Services/agencies/COCOMs. Dedicated service is a private-line-transport service that provides point-to-point connectivity to mission partner locations. DISA mission partners require dedicated point-to-point layer 1 and layer 2 circuits because of
SECTION 10
#1732782879893252-586: The GIG-BE program achieved the milestone of full operational capability at all of the almost 100 Joint Staff approved sites. As defined in CJCSI 6211.02C, Defense Information Systems Network (DISN) Policy and Responsibilities, 9 July 2008, end-to-end is defined as the fusion of requisite components to deliver a defined capability. For the GIG , this implies components from the user access and display devices and sensors to
273-818: The United States. As one of few on time, within budget, to required performance standard DoD ACAT 1AM programs, GIG-BE shows how a government integrated, contractor assisted acquisition can achieve transformational results. The $ 877 million programs was the largest DoD information technology transport structure ever built. GIG-BE created a ubiquitous "bandwidth-available" environment to improve national security intelligence, surveillance, reconnaissance, information assurance, and command and control at locations worldwide. After extensive component integration and operational testing, implementation began in early 2004 and extended through 2005. GIG-BE achieved initial operational capability (IOC) at six sites 30 Sept. 2004. On 20 Dec. 2005,
294-521: The ability to exchange official information between military organizations and to support interoperability with allied nations, non-DoD activities, and the IC operating in both the strategic/fixed-base and the tactical/deployed environments. Organizational Messaging supports the assured secure delivery of organizational messages within strict service parameters. This includes delivery times of three minutes or less for high precedence (flash and above) messages across
315-612: The enterprise level, forging new paths with whom components of the military communicate will ease logistics burdens, improve communication and combat effectiveness of the war fighter, decrease instances of confusion-related fratricide , accelerate the trend in minimizing collateral damage, and hasten the flow of business. For the warfighter , situational awareness would be improved tremendously by linking what he sees with what an overhead satellite sees. The fog of war would be lifted by seamless communication between unit members, off site detection devices, and commanders operating behind
336-559: The inherent simplicity and security. To satisfy this demand, Dedicated services are currently offered and are available in a variety of bit rates and interfaces. The technical core of the DISN is provided by the capabilities built by DISA from 2002–2006 called the Global Information Grid-Bandwidth Expansion (GIG-BE). This program remains to this day the core of the services provided by DISA to serve
357-539: The line. Improved coordination may also assist in delivering appropriate firepower or other tangible assets to first responders during domestic attacks and natural disasters worldwide. Committee on National Security Systems The Committee on National Security Systems ( CNSS ) is a United States intergovernmental organization that sets policies for the security of the US security systems. The CIA triad ( data confidentiality , data integrity , and data availability ) are
378-421: The part of the definition that discusses the interfaces to coalition, allied, and non-Department of Defense users and systems. The DoD's use of the term "GIG" is undergoing changes as the Department deals with new concepts such as Cyberspace Operations, GIG 2.0 (A Joint Staff J6 Initiative), and the Department of Defense Information Enterprise (DIE). The GIG is managed by a construct known as NetOps . NetOps
399-681: The three main security goals of CNSS. The Committee dates its establishment back to 1953, under the name of U.S. Communications Security Board ( USCSB ). Under the name National Security Telecommunications and Information Systems Security Committee ( NSTISSC ) the committee was established by the National Security Directive 42, "National Policy for the Security of National Security Telecommunications and Information Systems", dated 5 July 1990. On October 16, 2001, President George W. Bush signed Executive Order 13231 ,
420-436: The various levels of networking and processing, associated applications, and related transport and management services. For DISN services, end-to-end encompasses service user to service user (e.g., PC-to-PC, phone-to-phone). Global Information Grid The Global Information Grid ( GIG ) is a network of information transmission and processing maintained by the United States Department of Defense . More descriptively, it
441-846: The voting committee include the DISA , NGA , NIST , and the NRO . The operating Agency for CNSS appears to be the National Security Agency , which serves as the primary contact for public inquiries. The CNSS defines several standards, which include standards on training in IT security . Current certifications include: CNSS launched the National Information Assurance Certification and Accreditation Process (NIACAP) in 2000 (was cancelled in 2012). This United States government–related article
SECTION 20
#1732782879893#892107