cwid08 demonstrates rapid evolutionary acquisition model
play

CWID08 Demonstrates Rapid Evolutionary Acquisition Model of - PDF document

5/18/09 Government/Industry Partnership for Netcentric Engineering CWID08 Demonstrates Rapid Evolutionary Acquisition Model of Coalition C2 AFCEA-GMU C4I CENTER SYMPOSIUM Critical Issues in C4I 19-20 May 2009 Chris.Gunderson@W2COG.org


  1. 5/18/09 Government/Industry Partnership for Netcentric Engineering CWID08 Demonstrates Rapid Evolutionary Acquisition Model of Coalition C2 AFCEA-GMU C4I CENTER SYMPOSIUM Critical Issues in C4I 19-20 May 2009 Chris.Gunderson@W2COG.org National Conference Center David_H_Minton@Raytheon.com Lansdowne, Virginia (o) 703 262 5332 (m) 831 224 5182 1 www.w2cog.org Coalition Warrior Interoperability Demonstration (CWID) 08 Interoperability Trial #5.64 “Trusted Enterprise Service Bus” (T-ESB ) A service-oriented approach to “flattening” coalition networks… and delivering Valued Information at the Right Time (VIRT) via evolutionary, value-based, service-oriented acquisition. 1

  2. 5/18/09 Network Network Network F E J I M L N G K I D H A A A H C C B B B Coalition stovepipe “air gapped” network enclaves: Redundant physical infrastructure is expensive and clumsy. Agile, responsive information exchange is impossible 3 Network J K L I M H Trusted Enterprise N VIRT AuthN Service Bus (T-ESB) A AuthZ G B F C E D A framework to deploy High Assurance Tactical SOA (HATS) faster, cheaper, and better via a “Mission Thread Market” (MTM) of pre-approved net-ready Off-the-Shelf (OTS) components. 4 2

  3. 5/18/09 Network J K L High Assurance Government I Furnished Services for: M Authentication (AuthN) H Authorization (AuthZ) N VIRT AuthN A AuthZ COTS “Discovery” Services to G deliver Valued Information at the Right Time (VIRT) B F C E D  Same physical network with logical enclaving decreases maintenance costs & enables continuous re-capitalization  Smart push of critical information + dynamic security policy enables agile information exchange 5 Network J K L High Assurance Government I Furnished Services for: M Authentication (AuthN) H Authorization (AuthZ) N VIRT AuthN A AuthZ COTS “Discovery” Services to G deliver Valued Information at the Right Time (VIRT) B F C E D  Same physical network with logical enclaving decreases maintenance costs & enables continuous re-capitalization  Smart push of critical information + dynamic security policy enables agile information exchange 6 3

  4. 5/18/09 TESB Dynamic Security Policy + High Assurance AuthN & AuthZ services = Access to C4ISR Picture via Browser PL4 AuthN/ AuthZ RELEASABLE services AIS Tracks C2 + GIS service Blue Force Tracks 7 NOFORN PL4 E.g. Google Earth E.g. Joint Track Manager (PL4 SABI) (PL4 TSABI underway) 4

  5. 5/18/09 EMERGENCY Policy NORMAL Policy US C N O US C N O A Z C A Z C METOC (NOFORN) X METOC (NOFORN) X METOC (REL) X X X X METOC (REL) X X X X AIS (NOFORN) X X X AIS (NOFORN) X AIS (REL) X X X X AIS (REL) X X X X SENSOR (NOFORN) X SENSOR (NOFORN) X SELF DEFENSE Policy CA = CANADA Detail of national security US NZ = NEW ZEALAND policy is set by nations C N O A Z C US = UNITED STATES OC = OTHER COALITION METOC (NOFORN) X X Policy is presented as “black box” based on pre- METOC (REL) X X X X agreed states of urgency AIS (NOFORN) X X X These matrices show US AIS (REL) X X X X national policy “under the SENSOR (NOFORN) X X hood” per CWID IT 5.64 scenario 9 CWID DATA Portal Security Policy Sysadmin set policy by clicking on appropriate button . O NORMAL Policy O EMERGENCY Policy O SELF DEFENSE Policy 10 5

  6. 5/18/09 Targeting/sensor services Open std web service bus (TSB) aboard sensor platform, e.g. UAV, provides C4ISR Services sensor Occasionally connected UAV’s post SIGINT web-services at the service tactical edge of the GIG PL4 AuthN/ AuthZ services AIS Tracks C2 + GIS service Blue Force Tracks 11 Targeting/sensor services Process UNK track VIRT* Services Intelligent agents monitor pre-defined critical conditions of interest. When threshold criteria A exceeded. Exception to security policy is U u t N h enabled. K o r T i z r e a ISR sensor “sees” contact of c interest v k i e w o f C2 service requests sensor service via AuthN/AuthZ UNK Track inside 3 mile limit = Alert Criteria. Change VIRT* * VIRT = Valued Information at the Right Time. A VIRT Service is an release policy Service intelligent agent that provides a “smart push” or an alert when 12 emergent condition satisfy a client’s pre-defined critical conditions of interest profile 6

  7. 5/18/09 Coalition Interdiction asset VIRT* Services VIRT service issues alert to opportune coalition interdiction platform. Issue alert to Interdiction asset UNK Track inside 3 C2 + GIS mile limit = Alert service Criteria. Change VIRT* release policy Service 13 Targeting/sensor National sensor service allows coalition services platform to view UNK Track targeting data Coalition platform requests targeting ISR sensor “sees” contact of interest service via AuthN/AuthZ TESB Emergent operational situation drives need to release NOFORN data to coalition asset 14 7

  8. 5/18/09 TESB Threat neutralized, security policy re-set to normal. PL4 AuthN/ AuthZ services RELEASABLE AIS Tracks C2 + GIS service Blue Force Tracks 15 NOFORN Netcentric “Business” Driver • At home, a US warfighter can text message his children and trade photos with them using his cell phone. At war he can use a stovepipe circuit to send e-mails without attachments • At home and at war, a terrorist can and does text his associates using Google earth. • How can we apply our vastly superior resources to overcome this asymmetrical disadvantage w/rt information processing? 16 8

  9. 5/18/09 Evolutionary Acquisition via NetCert Logo and Mission Thread Market • Problem: – Operators, dispersed worldwide, need networked IT resources. – The IT network must deliver just the right information in the right mission context. • Solution: – Create an enterprise IT experimentation infrastructure for rapid, low cost, mission-tailored demonstration, validation, verification & certification per “NetCert Logo”. – Transition validated/certified capability via COTS “Mission Thread Market” (MTM). 17 GIG acquisition objective: Reuse and continually improve shared infrastructure, i.e. routable networks + SOA, to enable netcentric operations Routable “cloud” + reusable SOA infrastructure Specialized Front Specialized Back End Process End Process Sensors Weapons Platforms Analysis Units Comms Define and Develop Value Consume Value Deliver Value Invest to develop Minimize time & cost by re- Invest to exploit valuable content using and continuously valuable content improving valuable community infrastructure 9

  10. 5/18/09 But…. • After many years and $B’s spent the promise of SOA remains largely unfilled across DoD…. 19 Observations.... • COTS s/w in government systems is generally out of date at IOC and falls farther behind throughout life cycle. • Government requirements process does not intercept new COTS s/w vectors or sunset archaic s/w requirements. • PMs use COTS as gap fillers that generally lack sustainment tails. • IRT the above, DoD top-down policy mandates SOA and “best” e-Biz practice (e.g., NESI, DoDAF 2.0, Open Technology Development, NR-KPP, etc.)  YET…. e-Biz un-mandated “best-policy” is to leverage competition in the marketplace… No one is in charge… 10

  11. 5/18/09 The DoD Acquisition Saying-Doing Gap JCIDS Says to define “Capability Based Rqmts”… GIG Policy Says to field “Netcentric Capability…” But….follow the money DoD Inst 5000.02  Single sponsor  Massive monolithic requirements  Expensive, repetitive, paper documentation  Long serial process 21 Program IOC ~ 10 years So…. • How can DoD leverage the SOA e-Biz value proposition within the constraints of the Federal Acquisition Regulations (FAR)? 22 11

  12. 5/18/09 Bottom Line • Establish GIG business model = e-Portal for consumable off-the-shelf (OTS) = COTS, GOTS & Open Source Software (OSS) certified net-ready components • Define generic and objective net-ready assessment categories and methods (not universal specifications!) per enterprise business objectives • Use a NR-KPP “logo” to create a federation of qualified, motivated, independent government, industry, and academic net-ready providers • Base GIG Acquisition on components that can reduce risk re: cost, performance, and schedule and deliver capability faster . – Require logo as “responsive” to GIG procurements – Bake evolutionary COTS process into FAR boilerplate – Hardwire cross-program collaborative work flow 23 NR-KPP Architecture and Engineering Principles • Objective is Value of Service (VoS), not just Quality of Service (QoS) – QoS = reliability – VoS = reliable, trusted, significant, content + continuous improvement “Information Assurance” (IA) is not just “Security” • – “Assurance” means increased predictability – “Security” is one value attribute, others are “supportability” and “availability.” • Assurance is necessary to make informed risk/reward tradeoffs Modularity, measurability, and accountability are key. • 24 12

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend