Showing posts with label Area: Information Systems. Show all posts
Showing posts with label Area: Information Systems. Show all posts

December 14, 2011

Contract Award: Lockheed Martin to support U.S. Army's Logistics with its Radio Frequency In-Transit Visibility system

Makeshift and disarrayed remote area logistics yard
News Report

As announced in a recent press release, Lockheed Martin has been awarded work by the U.S. Army’s Product Manager, Joint-Automatic Identification Technology organization to provide operations and maintenance for the Radio Frequency In-Transit Visibility system (RF-ITV). If all options are exercised over the course of five years, the contract is valued at $126 million.

The System

In-Transit Visibility (ITV) is a capability that uses Radio Frequency (RF)/Automatic Identification Technology (AIT) and is designed to provide the logistics customer with maximum visibility and near real-time status on the movement of all classes of supply. By using ITV, logistics customer may identify, locate, and track the movement of all classes of supply from source of supply to user.

ITV is the fusion of logistics information and distribution technologies for rapid crisis response, deployment and sustainment, and it provides decision makers at all levels of command and throughout the logistics pipeline with accurate, near real-time data to collaboratively plan, prioritize and redirect logistics operations.

The RF-ITV system is a mission essential information system that supports U.S. Joint Warfighter operations, which used Radio Frequency Identification (RFID) devices to support the dissemination of In-Transit Visibility (ITV) information. RFID technology provides a powerful potential to the enhancement of using automated information systems to see the last location of the unit´s asset.

RF-ITV sites exist worldwide in support of combatant commands, making this a massive and complex effort since sites must be maintained at optimal levels of operational readiness to support joint forces. Through RF-ITV technology the system provides last known locations and in-the-container visibility for shipments that have active RF tags attached to pallets, containers, or equipment. Specifically, by using RF tags, the RF-ITV system traces the identity, status, and location of cargo from origin (depot or vendor) to destination. It also receives near real-time position reports for conveyances from numerous Satellite Tracking Systems (STS). Data from these two technologies is combined, processed, and accessed via web-based maps and reports, and provides global, logistics support to the Joint warfighter.

The scope of the Radio Frequency Identification (RFID) infrastructure includes four business process servers, strategically positioned globally to mitigate communication limitations. There are in excess of 2400 nodal read and write sites located in 30 countries worldwide. Locations include, but are not limited to, the United States, Great Britain, Republic of Germany, Iraq, Kuwait, Egypt, Luxemburg, Belgium, Norway, Netherlands, Qatar, Bahrain, Djibouti, Spain, Korea, Japan, Hungary, Kyrgyzstan, Greece, Macedonia, United Arab Emirates, Turkey, and Italy.

By accessing the system with a Common Access Card (CAC), users can log on to the RF-ITV Tracking Portal, the user interface to the ITV server that provides ITV information on in-transit shipments.

The Context

RFID is a transformational technology which plays a vital role in achieving the DOD vision for implementing knowledge-enabled logistic support to the warfighter through fully automated visibility and management of assets.

The RFID technology application of asset tagging for in-transit visibility has been in use by the DOD for over a decade. Tangible benefits for the U.S. DoD´s implementation of the RFID technology include improved asset visibility, enhanced shipment processing timeliness and accuracy, plus increased reliability in the vendor payment system. With benefits, however, come problems. Security is a major concern for RFID technology. Tags that are readable anywhere, anytime pose a risk to corporate and military security. Accuracy of information is another concern.

Currently, RF-ITV is a fielded capability that provides support to Commanders and logisticians in all branches of U.S. armed forces, NATO, and U.S. Coalition Partners, and it is the only DoD-approved system that provides in-transit visibility beyond the Theater Distribution Center (TDC).

Data from the RF-ITV system supports many high profile systems (i.e., Global Transportation Network (GTN), Battle Command Sustainment Support System (BCS3), DLA Asset Visibility (DLA AV)) and supports over 30 existing Joint and one Coalition, inbound and outbound, interface customers.

The Radio Frequency In-Transit Visibility system is managed by U.S. Army's Joint-Automatic Identification Technology (J-AIT), which operates as the U.S. DoD procurement activity for AIT and Radio Frequency Identification (RFID).

Comments

With the Government’s and Lockheed Martin’s focus on affordability, the RF-ITV system is critical to manage military shipments such as cargo, supplies, and unit movement,” said DeEtte Gray, Lockheed Martin IS&GS-Defense vice president for Enterprise IT Solutions. “The Lockheed Martin team is proud to support the Army’s efforts to prioritize, organize, and track assets.

References: Lockheed Martin (1), U.S. Army PEO EIS (2), JITC (3), PM J-AIT (4), U.S. Army CASCOM (5), Bowie State University (6), Defense Industry Daily (7)

November 30, 2011

Project Review: the Afghan Mission Network


All ISAF forces (~100,000 additional users) must move to a common network to more effectively share information and resources across Afghanistan
(General Stanley McChrystal, USA, COMISAF)
History

ISAF (International Security Assistance Force) was created in accordance with the Bonn Conference in December 2001. Afghan opposition leaders attending the conference began the process of reconstructing their country by setting up a new government structure, namely the Afghan Transitional Authority. The concept of a UN-mandated international force to assist the newly established Afghan Transitional Authority was also launched at this occasion to create a secure environment in and around Kabul and support the reconstruction of Afghanistan.

On 11 August 2003 NATO assumed leadership of the ISAF operation, ending the six-month national rotations. The Alliance became responsible for the command, coordination and planning of the force, including the provision of a force commander and headquarters on the ground in Afghanistan.

For the majority of organizations operating in Afghanistan, the problem was not data scarcity. This was particularly evident after the first years of operations and interaction with military units, local and national leaders, regional and global media, fact-finding teams, governmental and non-governmental survey organizations, and an alphabet soup of other international actors. Rather than scarcity of data, it was both data overload and the “glare” of ambiguous, contradictory, inconsistent, latent, and incomplete reporting that often caused ISAF forces to avert their eyes and diffuse their attention from the underlying dynamics and relationships of key actors and drivers that really matter in the Afghan operating environment.

Already in 2006 the U.S. and NATO embarked on an effort to establish mail exchange between the NATO and U.S. mission networks. The U.S. mission network at the time was the Combined Enterprise Regional Information Exchange System (called CENTRIXS) Global Counter Task Force (GCTF) and NATO operations were conducted on ISAF SECRET. This project sought to enable email exchange between the two networks. Although the objective was achieved (mail was exchanged), the solution included various guards, firewalls and intrusion detection systems that made it difficult to use and administer. It was so difficult that the system failed for 35 days without even being reported.

The next notable effort in NATO-national interoperability in Afghanistan was the UK-led effort, OVERTASK. With the UK forces deployed to Regional Command South and Helmand in 2005, there was a requirement for UK forces to be interoperable with coalition partners. The solution to meet this requirement was OVERTASK which was based on an enclave within the NATO mission network, ISAF SECRET. A portion of the ISAF SECRET was dedicated for the use of UK forces. As the UK operated on the same network as NATO forces, interoperability was assured. However, operating on the same network requires centralised configuration control. This centralised control maked it difficult for individual nations to install and operate their own nationally-developed systems without considerable coordination.

The real genesis of the Afghan Mission Network can be traced back to 2008, when the Afghanistan campaign plan was revised and the U.S. brass began to look for a way to develop a true mission network for Afghanistan. At that point the U.S. was mainly operating on SIPRnet and NIPRnet, while NATO and the coalition members were on the ISAF secret network. NATO funded an effort to provide voice, chat and Web access over a United Kingdom network called Overtask. But there was still not a real capability for the U.S. to communicate with coalition members at the secret level.

In order to increase situational awareness, Gen. Stanley McChrystal, commander of the ISAF and U.S. Forces Afghanistan, required each coalition nation to share information on a single information infrastructure, the Afghanistan Mission Network. On 7 April 2010, NATO’s resource committees formally approved the way ahead for the Afghan Mission Network project, which radically changed the way Nations contributing to the ISAF mission share information.

The Afghan Mission Network basically provided the connective tissue between the U.S. CENTRIXS (Combined Enterprise Regional Information Exchange System), which is the theater version of SIPRNet, and NATO’s ISAF Secret network, to which the networks of the other ISAF nations connect. By law, SIPRnet does not allow access to non-U.S. users.

Initial operating capability for the network was declared in July 2010, signifying the availability of the network to at least 50 percent of all ISAF forces. AMN’s initial capabilities facilitated human-to-human contact that includes chat, VoIP telephone connectivity, e-mail, Web browsing, friendly force tracking exchange and video teleconferencing.

Analysis

Tipycally, Coalition forces do not easily share information, and Commanders had to gather at a central location to discuss plans without the use of advanced technology. Often, one of their only viable alternatives is to share mission-related information via "Sneaker net". This cumbersome practice called for the warfighter to transfer information onto removable media and manually move it from one system to another, which often is not secure, is very labor intensive, and prohibits information from being shared in a timely manner.

The Afghan Mission Network marks a strategic shift in the sharing of data.

U.S. Defense leaders and their counterparts from other nations say a network infrastructure linking coalition partners in Afghanistan has fundamentally changed the way the multinational effort has been conducted over the last several years. NATO, the U.S. military and other national forces say the Afghan Mission Network (AMN) as it now exists has been a game changer for operations in Afghanistan. Earlier efforts didn't work so well. As already stated, one progenitor to the AMN, geared toward bridging simple email capabilities between U.S. and NATO, was so cumbersome and hard to use that it went out of service for more than a month and no one noticed.

From their respective secure networks, and at their individual discretion, separate Coalition forces can share data, situational awareness and Commander’s intent across the battlefield on a centralized network.

AMN is also an example of technology that allows expeditionary forces to move their data as they deploy. Divisions install the AMN in their headquarters, which allow them to virtually move data when they deploy. This keep the units from having to physically move their servers and there is in principle no lag in the data because it is constantly being updated.

Nowaday, the success of the AMN is spreading beyond the ISAF coalition. Civilian partners in Non-Governmental Organisations (NGOs) have expressed interest in being able to share information with the AMN.

AMN in brief

The Afghanistan Mission Network AMN is the primary Coalition C4ISR network in Afghanistan for all ISAF forces and operations consisting of the ISAF-Secret network as the core with national extensions.

The Afghan National Army furnishes the infrastructure to enable the U.S. and other Coalition forces to provide them with relevant, though selective, data and situational awareness, which does not compromise the security of any partner including the U.S. The Afghan National Army can then respond, making crucial decisions based on current and comprehensive data.

As already stated, the ISAF Secret Network provided by the NATO NC3A is the heart of the AMN. It is connected via six network interconnection points to CENTRIXS and to the networks contributed by Italy, the United Kingdom and Canada. “If Italy wants to talk to us, they can transition across the ISAF core from their network and talk to us over CENTRIXS,” said Lieutenant Colonel Andy McClelland, who is attached to NATO Allied Command Transformation headquarters in Norfolk. “The core is the glue the binds all of the networks together.

The AMN allows nations to operate their own network within the ISAF SECRET classification, which seamlessly connects to the ISAF SECRET core through a series of Network Interconnect Points (NIPs).

AMN enables the 45 nations of the Coalition to unite and fight the enemy as a single force, leveraging the combined strength of each partner.

Red, Blue, Green, White

Different national networks use different viewers to examine data, i.e. the Canadians use a system called BattleView, the U.S. uses Command Post of the Future and the British have a system called JADOCS. The firts task of AMN was to make data available to all these viewers. “Data is published on a server,” said U.S. Army Colonel Pete Gallagher, chief of the ISAF CJ6 branch, at ISAF headquarters in Kabul, Afghanistan, “and users subscribe to that data.

But while the common perception is that battlefield systems provide information about friendly and enemy forces - so called blue and red forces - in Afghanistan, it may be the green and white icons on the screen that make the real difference. Green is the color for the Afghanistan government and security forces, while white represents the local population centers. “We’re trying to separate the red and the white, the insurgents from the population, and insert the green between them, which is the Afghan government and the security forces,” said Col. Derek Orndorff, USA, the communications director for the ISAF Joint Command in Kabul, Afghanistan. “That information is not in the normal, everyday battle command systems that we just pull off the shelf. This is all stuff that is created from the bottom up, from the guys who are on patrol walking around in the bazaars, who had a key leader engagement with an elder in a village. That information has to get into the system in ways that we’ve never done it before. We’ve been getting after that here in Afghanistan.

One way of providing access to that information has been to add a wiki capability to the AMN that allows tip-of-the-spear forces to share vital human intelligence at all levels. By clicking on a particular city or region, for example, a commander can research local leaders, based on impressions and information provided by personnel who have had first-hand encounters.

Cyber Issues

The Conficker computer virus, which was first detected in 2008, reared its ugly head on April 2011 in Afghanistan, where it was detected on the Afghan Mission Network.

We had an older virus that showed up on the network, and when that older virus was discovered, we immediately isolated it, protected the rest of the network, identified what we needed to do, and in about five hours, everybody was operating normally again,” says Col. Derek Orndorff. “It was the Conficker worm. It was a success story from our perspective because our tools picked it up, we identified it, we protected the entire network, and we were able to defeat the challenge relatively quickly and get back to business instead of letting it become debilitating to us.

Col. Orndorff credited network transparency for helping to quickly stamp out Conficker. “AFN is a very open and flat network, so if a user on an ISAF machine wants to see something on the United Kingdom OVERTASK, there’s no login, no firewalls, no certificates, no passwords. There’s nothing. What that means is that everyone who is part of the network has a shared vulnerability. Everybody shares the same risks. So therefore, when we have challenges, we have to have transparency between all the different parts and pieces or you’re going have problems with it,” he explained. Without that transparency, CENTRIXS network operators could have chosen to remain mum about the Conficker vulnerability, which would have allowed it to spread. “This incident was a perfect example of why this is so successful, because everybody understands where their piece is in this so we can all work together.

Comments

On the battlefields of Afghanistan, AMN has transformed the way Coalition Commanders share information,” said Brig. Gen. N. Lee S. Price, PEO for C3T. “Independent discussions and planning efforts between separate Commanders of different nations have been replaced by data sharing across AMN.

References: DefenseSystems.com (1,2,6,10), NATO (3,4), CimicWeb (5), AFCEA (7,11), Military Information Technology (8), KZO Innovations (9)

October 20, 2011

THALES deploys the first national Command and Information System for the French Gendarmerie


News Report

As announced in a recent press release, Thales has successfully deployed the BDSP (Base de Données de Sécurité Publique – Public Security Database), the command and information system for the Gendarmerie Nationale for conducting operations and processing operational information. In concrete terms this means that Thales, via BDSP, is able to unify and modernise the operations management and operational information applications over the entire national territory, including French overseas departments and territories.

Thales BDSP allows gendarmes, from command centre level through to the units on patrol, to access summaries of all available information associated with a mission or intervention. In this way, gendarmes can get all the information they need for executing their duties, securing intervention zones and optimising the resources deployed.

Thanks to Thales's BDSP solution, access to enriched information is possible both nationally and locally. Ultimately, this will lead to some 60,000 gendarmes on over 4300 sites permanently using and feeding data into a central database equipped with a semantic search engine and extremely high-performance operational intelligence analysis and exploitation tools.

Comments

"BDSP is a highly efficient system capable of summarising a large quantity of information and making it available in real time to gendarmes in order to facilitate the running of operationson the ground," explains Pascale Sourisse, Senior Vice President, Defence and Security C4I Systems, Thales. "We are very proud to make available to the Gendarmerie Nationale all of Thales's expertise in order to help them in their daily duties."

References: Thales (1)