MIT 16-2 (March 2012)

32
www.MIT-kmi.com C4 March 2012 Volume 16, Issue 2 PRSRT STD U.S. POSTAGE PAID LEBANON JCT., KY PERMIT # 805 The Voice of Military Communications and Computing Efficiency Leader Douglas K. Wiltsie PEO EIS U.S. Army SATCOM Savings O DISA COMSATCOM Update O Fires Control Android Security O Boutelle on the Issues

description

Military Information Technology, Volume 16 Issue 2, March 2012

Transcript of MIT 16-2 (March 2012)

Page 1: MIT 16-2 (March 2012)

www.MIT-kmi.com

C4March 2012

Volume 16, Issue 2

PRSRT STDU.S. POSTAGE

PAIDLEBANON JCT., KY

PERMIT # 805

The Voice of Military Communications and Computing

Efficiency Leader

Douglas K. Wiltsie

PEO EISU.S. Army

SATCOM Savings O DISA COMSATCOM Update O Fires ControlAndroid Security O Boutelle on the Issues

Page 2: MIT 16-2 (March 2012)

Connections made simple.Whether connecting with a single unit deep in the field or a large contingent back at base, defense and intelligence operations need more from their communications solutions. More innovation to support new applications and changing missions. More cost-effective solutions to weather tightening budgets. Harris CapRock makes getting more from your communications simple.

We believe every customer mission is a Harris CapRock mission. That’s why we take pride in pioneering the latest in military-specific communications. Offering X-band managed services, quick-deploy man-pack terminals and even Ultra-High Frequency-based solutions, we anticipate our clients’ needs. And as the world’s largest commercial buyer of satellite capacity we’re even helping to shape the design of next-generation spacecraft.

Leveraging more than a dozen self-owned and -operated international teleports and customer support centers and a global backbone network with more than 80 convenient points-of-presence, we put it all together to deliver global communications you can always count on.

Connecting your operations just doesn’t get easier than that.

www.harriscaprock.com

© 2012 Harris CapRock Communications, Inc. All rights reserved.

(U.S. Army photo by Spc. De’Yonte Mosley/Released)(100429-A-6285M-020) ReLiAbiLiTy NeveR ReACHed SO FAR™

HarrisCapRock_GovtAd_MIT_3-12.indd 1 2/28/12 11:18 AM

Page 3: MIT 16-2 (March 2012)

Military inforMation technology March 2012 VoluMe 16 • issue 2

features coVer / Q&a

17

DepartMents

inDustry interView

28

Douglas K. WiltsieProgram Executive Officer

Enterprise Information SystemsU.S. Army

Barry LeffewVice President, Public Sector

Adobe

2

4

14

26

27

Editor’s Perspective

Program Notes/People

Data Bytes

COTSacopia

Calendar, Directory

www.Mit-kMi.coM

21

Saving on SATCOMIndustry experts say there is more the government can do to make the process of acquiring SATCOM bandwidth and services by defense, intelligence and other government agencies more efficient and economical.By Peter Buxbaum

24

COMSATCOM Center UpdateAn update on the latest news from the Defense Information Systems Agency’s Commercial Satellite Communications (COMSATCOM) Center.

12

Precision Fire Support Chain Originates with Handheld ApplicationsMobile fire support systems being developed by the Army allow soldiers at the tactical edge to collaborate with the commander to choose the correct weapon-target pairing for precise munitions delivery.By Kathryn Bailey

6

Seeking Smartphone SecurityAs the Army and DoD look to greater use of mobile devices, the security of the popular Android system is a key concern.By William Murray

10

Everything over IP ChampionTop defense officials need to exercise strong leadership in order to transform the military’s information systems into a global enterprise based on Everything over IP, according to Lieutenant General Steven Boutelle (Ret.), a former Army chief information officer/G6.By Harrison Donnelly

Page 4: MIT 16-2 (March 2012)

The Network Integration Evaluations (NIE) being conducted by the Army have attracted a lot of positive comments for their focus on testing of communications and related systems as they operate and interact under demanding field conditions.

But while the tests have drawn active industry participation, there apparently has been skepticism in some quarters about how much actual effect the NIE results will have on procurement. As Major General Alan Lynn, commanding general of the Army Signal Center of Excellence, observed in a recent interview, “I know that many are waiting to see if the Army will end up making an acquisition decision at the conclusion of an NIE event.”

In the interview, scheduled to run in the next issue of MIT, Lynn makes clear that the NIE results will have an impact. As if to validate his promise, the Army recently announced the first procurement action resulting from the NIEs and the Agile Process. The latter is the Army’s new quick-reaction acquisition methodology to address defined capability gaps and insert new technologies into the overall network at a lower cost.

The Army issued a “sources sought” notice for a single-channel, vehicle-mounted radio. Running the Joint Tactical Radio System ( JTRS) Soldier Radio Waveform (SRW), the radios will transmit information between the squad- and team-level JTRS Rifleman Radio and the Army’s larger tactical communications network.

The Army plans to buy approximately 5,000 of the vehicle-mounted radios, also known as SRW Appliqué. Recently conducted NIEs confirmed an operational need for these single channel radios.

“This procurement illustrates how the NIEs and the Agile Process allow the Army and industry to work together to quickly fulfill our network hardware and software capability gaps,” said Colonel Dan Hughes, director of the Army’s System of Systems Integration Directorate. “This is the first formal procurement action for commercial technologies as the Army continues to mature the Agile Process and align existing acquisition policy with our new way of doing business.”

Harrison DonnellyEditor

The Voice of Military Communications and Computing

eDitorial

Managing EditorHarrison Donnelly [email protected] Editorial ManagerLaura Davis [email protected] EditorLaural Hobbes [email protected] Baddeley • Peter Buxbaum • Cheryl GerberScott Gourley • Karen E. Thuermer

art & Design

Art DirectorJennifer Owers [email protected] Graphic Designer Jittima Saiwongnuan [email protected] DesignersAmanda Kirsch [email protected] Morris [email protected] Waring [email protected]

aDVertising

Account ExecutiveCheri Anderson [email protected] Call [email protected]

kMi MeDia group

PublisherKirk Brown [email protected] Executive OfficerJack Kerrigan [email protected] Financial OfficerConstance Kerrigan [email protected] Vice PresidentDavid Leaf [email protected] McKaughan [email protected] Castro [email protected] AssistantCasandra Jones [email protected] Show CoordinatorHolly Foster [email protected]

operations, circulation & proDuction

Distribution CoordinatorDuane Ebanks [email protected] SpecialistsRebecca Hunter [email protected] Johnson [email protected] Villanueva [email protected] Walker [email protected] Winston [email protected]

a prouD MeMber of

subscription inforMationMilitary Information Technology

ISSN 1097-1041is published 11 times a year by KMI Media Group.

All Rights Reserved. Reproduction without permission is strictly forbidden. © Copyright 2012.

Military Information Technology is free to qualified members of the U.S. military, employees

of the U.S. government and non-U.S. foreign service based in the U.S.

All others: $65 per year.Foreign: $149 per year.

Corporate OfficesKMI Media Group

15800 Crabbs Branch Way, Suite 300Rockville, MD 20855-2604 USA

Telephone: (301) 670-5700Fax: (301) 670-5701

Web: www.MIT-kmi.com

Military inforMation technology

VoluMe 16, issue 2 March 2012

EDITOR’S PERSPECTIVE

kMi MeDia group Magazines anD websites

www.GIF-kmi.com

Geospatial Intelligence

Forum

www.MAE-kmi.com

Military AdvancedEducation

www.MIT-kmi.com

Military Information Technology

www.MLF-kmi.com

Military Logistics

Forum

www.MMT-kmi.com

Military Medical/CBRN

Technology

www.GCT-kmi.com www.MT2-kmi.com www.SOTECH-kmi.com www.TISR-kmi.com www.USCGF-kmi.com

Ground Combat

Technology

Military Training

Technology

Special Operations Technology

Tactical ISR Technology

U.S. Coast Guard Forum

Page 5: MIT 16-2 (March 2012)

GSA offers a full suite of services to help optimize the performance, increase the security, and improve the efficiency of your data center.

As the leading source for government solutions, GSA is ready to help you make smart decisions to achieve your cost savings, environmental sustainability, cybersecurity, and consolidation goals. We provide easy access to a customizable suite of commercial IT products and services and end-to-end IT solutions through established contract vehicles and world-class vendors. Best of all, we’re here to help you focus on your mission, even during an emergency.

We make it easy. We’re GSA — delivering great government through technology.

For more information, visit gsa.gov/datacentersad or speak to a GSA customer representative at (888) 377-0070.

Do More With Lessto optimize your IT infrastructure

Business Continuity and Disaster Recovery

Data Center Architecture

Data Center Operations

Data Storage

Hosting & Warehousing

…and much more.

To read this code, download a free QR reader app on your smartphone and scan.

Page 6: MIT 16-2 (March 2012)

www.MIT-kmi.com4 | MIT 16.2

Compiled by KMi Media Group staffPROGRAM NOTES

The list of Air Force brigadier generals recently nominated for appointment to the rank of major general includes Brigadier General Jim H. Keffer, who is currently serving as the deputy chief, Central Security Service, National Security Agency, and Brigadier General Craig S. Olson, who is currently serving as the program executive officer for business and enter-prise systems/director of the

enterprise information systems directorate, Air Force Materiel Command, Maxwell Air Force Base-Gunter Annex, Ala.

Navy Reserve Rear Admiral (lower half) David G. Russell has been nominated for appointment to the rank of rear admiral. Russell is currently serving as reserve component deputy commander, Navy Cyber Forces, Virginia Beach, Va.

David Bennett has been assigned as vice component acquisition executive, Defense Information Systems Agency, Fort Meade, Md. Bennett previ-ously served as DISA program executive officer for GIG enter-prise services.

Z Microsystems has named Bob Kopas, a former Navy surface warfare officer with more than 28 years of military experience, to the position of vice president of military programs.

General Dynamics C4 Systems has named Thomas Kreidler as vice president of worldwide product sales, a new position reporting directly to Chris Marzilli, president. Kreidler will be based at a new General Dynamics C4 Systems’ facility in Annapolis Junction, Md.

Iridium Communications has appointed Admiral Eric T. Olson (Ret.), former commander of U.S. Special Operations Command, to its board of directors.

Quest Software Public Sector Inc., a subsidiary of Quest Software, has announced the appointment of Michael Singer as vice president of federal sales.

QinetiQ North America has announced the appointment of John Sutton as general manager and executive vice president of its Mission and Information Solutions Business.

Michael Singer

Compiled by KMi Media Group staffPEOPLE

Brig. Gen.Craig S. Olson

The Defense Information Systems Agency (DISA) and General Services Administration (GSA) have selected four small businesses to help military and other government agencies in designing and deploying satellite communica-tions capabilities that meet their unique needs.

As part of the Future Commercial Satellite Communications Services Acquisition (FCSA) program, DISA and GSA recently awarded the Custom Satellite Communications  Solutions-Small Business (CS2-SB) contract to AIS Engineering; By Light, Professional IT Services; Knight Sky Consulting and Associates; and UltiSat. The CS2-SB contracts have a five-year contract period (three base years with two, one-year options) and a ceiling of $900 million. 

CS2, the overall contract vehicle that includes the recent small business awards, represents the third of three legs of the two

agencies’ FCSA program. The first two parts of the contract, covering transponded capacity-dedicated satellite bandwidth on commercially available frequency bands, and subscription services, pre-engineered, off-the-shelf fixed and mobile satellite service solutions, have already been awarded.

CS2 is distinguished from its cohorts by its emphasis on custom-tailored products and services. The contract is expected to be worth $3.5 billion over five years, including the $900 million set aside for small businesses.

The CS2-SB contract holders can compete for task orders that consist solely of satellite professional support services such as analysis and testing. CS2-SB, along with the future award of CS2, provides access to customer-defined end-to-end solutions that include satellite band-width, teleport access, network management, the equipment needed for satellite communica-

tions, and engineering support such as integra-tion, operations and maintenance. 

Awards for the companion CS2 full and open contracts for large scale end-to-end solu-tions are expected soon.

The GSA and DISA satellite communi-cations partnership for FCSA was formed in August 2009 to help control the burgeoning costs associated with federal agency’s use of satellite services, and to provide the government with single point access for the purchase and delivery of mission-critical services with signifi-cant savings for taxpayers.

“FCSA offers the U.S. government, and particularly the Department of Defense, unpar-alleled access to the best technologies, the most capable staff and the agility to economi-cally solve our global communications issues,” said DISA Program Executive Officer for Communications Bruce T. Bennett.

Small Businesses Offer Customized SATCOM Services

Page 7: MIT 16-2 (March 2012)

KMI_PrintAd.indd 1 3/2/12 12:23 PM

Page 8: MIT 16-2 (March 2012)

As the Army And dod look to greAter use

of mobile devices, the security of the populAr

Android system is A key concern.

www.MIT-kmi.com6 | MIT 16.2

Recent approvals by key defense agencies of technol-ogy designed to improve the security of Android mobile operating devices have marked important milestones in the quest to combine the protection of information with the mobility and ease of access offered by smartphones and other devices.

Early this year, the Defense Information Systems Agency (DISA) certified the first secure android OS-based platform, enabling mobile device management and data loss prevention capabilities offered by a com-pany called Good Technology to be used on the Global Information Grid.

In addition, the National Security Agency recently certified SE Android, the first version of a security-enhanced version of the popular mobile operating sys-tem that has improved access control features.

Meanwhile, the Army, which has been leading military efforts in this area, is continuing to study the options of either Android or the other mobile operating system most popular with consumers, the Apple iOS.

In that competition, observers say, the issue of potential security vulnerabilities in Android is of critical impor-tance.

“They have to look at deploying the Android very carefully,” said Andy Hayter, anti-malware program manager at ICSA Labs, an independent division of Verizon Business that offers third-party validation of security products. “The fact that the Android is an open operating system is a sore point for many people.”

Android’s status as open source software is a ben-efit and a detriment, analysts say. The benefits of open source software are that the publication of the software code enables multiple parties to work to improve it.

The detriment, as Hayter points out, is that both “good guys” and “bad guys” have access to the open source code. The openness of the Android operating system, furthermore, makes it hard for users to verify the security certificates that developers use. Users also have to trust that the permissions used by developers are legitimate.

by WilliAm murrAymit correspondent

Page 9: MIT 16-2 (March 2012)

www.MIT-kmi.com MIT 16.2 | 7

“There’s too much opportunity for rogue applications and geolocation,” Hayter said, since the GPS capabilities on an Android smartphone can enable adversaries to locate a service-member who has neglected to disable GPS on his or her phone.

“For use in a military environment where security is a prime consideration, the Android is not quite there. There are too many security issues,” Hayter said, while acknowledging that Android version 4.0 has improved security fea-tures over previous versions.

locAtion, encryption issues

The issue of geolocation is an important one, said John Dickson, chief executive officer with Denim Group, a software developer, security assessment and developer training company. “It’s hard to know when geolocation is turned on or off,” he said, noting that Android devices use their GPS capabilities to geo-tag photos and that malware on an Android smartphone could enable outside parties to track the movements of users and individual military units.

There are also device-level encryption and authentication weaknesses to Android smart-phones that adversaries could manipulate by implanting malicious code into a host smart-phone and seeking escalating privileges on a network, according to Dickson. This means that the malicious code allows its architects to exploit the vulnerability to gain access to gain increased access to information that is normally protected from a user or application. An application with more privileges than intended can then perform unauthorized actions.

“With an application written in Java running on a virtual machine, it’s relatively easy for an outside party to do analysis” in a wireless environment to diagnose vulnerabilities, Dickson said.

Android’s application security model is based on the default Linux discretionary access control. “At the end of the day, an Android phone is a mobile Linux box,” Dickson said, adding that he sees significant opportunities for vendors to train Army users to develop secure mobile applications.

The Army “needs secure systems with minimal security risks,” said Mark Bigham, vice president of business develop-ment for Raytheon Intelligence and Information Systems.

Bigham said he doesn’t necessarily foresee widespread adop-tion of hardened encrypted smartphones in the Army, seeing a strong preference for the commercially available smartphones both for their price and look and feel. “As soon as you start going with a custom phone, the price goes up exponentially and creativity also goes down,” he said.

Bigham sees progress made by the Army and its vendors with the smartphone hardware and applications. “There con-tinues to be a positive outlook for us for commercial handheld devices in the Army. There are important lessons to be learned,” he added.

There is likely to be continued interest in a militarized ver-sion of a commercial smartphone, moreover, he said.

third-pArty testing

Dan Cornell of the Denim Group questions how Android applications would be nominated for approved use in the Army.

He thinks it’s important for Air Force, Army and Navy officials to develop a nomination process with third party testing measuring trust and authentication for Android and other smartphone applications.“You don’t want military Android users to be able to get applications from any store,” Hayter said.

Bigham is also very concerned about the Army and other Department of Defense organizations potentially purchasing Android phones through vendors that would have difficulty guaranteeing that the Android phones they sold were made in a trusted manufacturing facility.

There are two other major smartphone oper-ating systems—Research in Motion’s BlackBerry and Microsoft Windows Mobile. BlackBerry’s adoption in the Army has been dogged by the com-pany’s overall business problems and less-than-certain corporate future, but it is a very secure operating system, according to Cornell.  

The FIPS 140-2 certification for the Black-Berry 6 cryptographic module qualifies it for use by the government for sensitive but unclassified information.

“The Android and iPhones are well ahead in terms of user acceptance” in the Army, according to Raytheon’s Bigham. “The BlackBerry has some

fundamental challenges, and Microsoft (Windows Mobile) is run-ning way behind.”

“Microsoft has demonstrated over and over again their inabil-ity to do this type of work,” Cornell said of adopting the Windows Mobile platform for use in the military. “I don’t know how com-mercially successful or viable it’s going to be.”

Cornell noted that Apple iOS is a platform controlled by the company, as opposed to the open source Android. “It doesn’t have the openness and malleability” of Android, he said of iOS. With Apple’s strengths in the consumer market, furthermore, Cornell doesn’t see the company putting forth much effort to develop business in DoD.

Despite this lack of effort in the military, there appear to be a significant number of Apple users in uniform. A former Air Force officer, Dickson said that he is hearing anecdotally that the adoption of iPads and smartphones in the Air Force and Army is being partially driven “top down,” with general officers telling chief information officers that they need to make the ever-popular iPad work with military portals, for example.

“Figure it out,” is the common refrain that general officers reply with when told that the enterprise can’t accommodate the iPad, Dickson said. “You don’t want to be the CTO, J-6 or A-6 who says ‘no’” to such a request, he added.

For example, there is a significant number of military aviators who want to work with iPads rather than haul 50 to 80 pounds of maps with them on missions, according to Dickson. He calls this demand for the iPad a “bottom up” adoption.

John Dickson

[email protected]

Dan Cornell

[email protected]

Page 10: MIT 16-2 (March 2012)

www.MIT-kmi.com8 | MIT 16.2

In early January, meanwhile, NSA released SE Android, the first security-enhanced ver-sion of the operating system that has improved access control features. It follows NSA’s work with Security Enhanced (SE) Linux, which began in 2000. SE Linux is a collection of Linux kernel security modules and other tools that provide a flexible mechanism for restricting what resources users or applications can access.

ICSA’s Hayter recommended that the Army follow a similar approach: Select a version of Android and add hardened security features to the software. He thinks the Army needs to look closely, moreover, at the issue of Android appli-cations talking with each other.

The major smartphone carriers are AT&T, Sprint, T-Mobile and Verizon, and they are migrating towards offering multiple operating systems.

According to Melanie Ortel, a spokesperson for Verizon Wireless, her company has “built our government services around addressing the here-and-now needs and down-to-earth budgets of our government customers, while delivering the nation’s most reliable wireless network and best-in-class support.

“The company has the stability, infrastruc-ture, culture and relationships” to best support the Army, she said.

pc replAcements

Ortel predicted that smartphones could replace larger, heavier and pricier PCs in the Army, enabling soldiers to securely access appli-cations and data from the field.

Not so fast, said Dickson, who pointed out that while GSM is a well-known international cellular standard, he’s concerned about how thoroughly it’s been tested for security. “I’m more concerned internationally with govern-ment control of networks,” he added.

“The lost device threat is very real interna-tionally,” he said, speaking of scenarios where devices lost by American servicemembers could end up in the wrong hands.

“Our goal is to help bring new efficiencies to daily agency operations and powerful new capabilities to the field,” Verizon’s Ortel said in a statement. “As the nation’s largest wireless company and owner and operator of the nation’s most reliable wired network, we’re able to leverage our relationships with device manufacturers and partners across all mobile operating systems—Android, iOS, BlackBerry and Windows Mobile—and with Mobile Device Management partners, like Good Tech-nology, which secures devices to meet Security Technical Implementation Guide (STIG) certification by the Defense information Systems Agency. We support Good Technology’s Secure Android partner program that works with device makers to develop STIG-compliant services.”

Like Verizon, Raytheon Intelligence and Information Sys-tems is “platform agnostic,” said Bigham. The company works with the Android, BlackBerry, iOS and Windows Mobile operat-ing systems. What Bigham likes about the Android is its open-ness, which he says is in contrast to the iOS.

“There are literally thousands of Android apps” accord-ing to Bigham, and he’s fascinated by some that have been developed in the field by Army users. One can learn to do an Army-approved pushup through an Android app or can watch a video file with the Army Bugle Call through Android. Another application allows users to order supplies.

A more sophisticated app is a “buddy tracking” app, which allows users to do blue force tracking. “Every soldier’s a sensor

While experts search for ways to improve the security of Android and other mobile operating systems, some in the security industry are voicing concerns about the approach being taken and the implications of deploying technologies based on the consumer market.

One such industry player is Tony Busseri, chief executive officer of Route1, a provider of security and identity management solutions based on FIPS 140-2 cryptographic modules.

Using the analogy of a medieval castle, Bus-seri says that Android-based and other mobile devices are essentially bringing data out into the open, where it is vulnerable and protected only by software authentication, rather than protecting it within the safety of the castle walls—or in the modern case, the firewall.

“Why should we take what is most important to us and allow it to go outside of the castle walls?” Busseri asked. “The argument for doing so is that we need the data, whether it’s an Android operating system-based tablet or any other form of computing. But we believe strongly that data should always stay behind the fire-wall—where administrators know who has access to it, where it’s going and how it’s going to be used.

“Data has entitlements with it—some people can use it, and some can just read it. As soon as you allow it outside the fortress, you lose complete control over those elements. We’re big believers that whether it be military or civilian applications, the principle shouldn’t change,” he said.

“Android has become a lightning rod, but this issue is not specific to Android. We have allowed ourselves to get comfortable with the idea that software applica-tions are sufficient to authenticate an individual,” Busseri continued. “Some people talk about having multi-factor or two-factor authentication, but they really don’t. A true factor is having a separate and discrete enabling device and then having a password or PIN. Using a tablet is a fancy form of a single-factor authentication and isn’t better than having a hardware multi-factor authentication. There is a degrada-tion that the tablet manufacturers will have us believe is acceptable.

“We’re not saying no to tablets, but there are better ways of providing a mobile computing experience, whether for in-theater military operations or for a secretary working from home,” he said.

“There’s a compromise being made to go along with this particular product’s approach,” Busseri warned. “It’s great to see the government being progressive and using the latest consumer tools, but I think there is a real issue about security degradation if that approach is followed.”

Tony Busseri

[email protected]

Breaching the Castle Walls?

Page 11: MIT 16-2 (March 2012)

www.MIT-kmi.com MIT 16.2 | 9

who is reporting back” through the application, according to Bigham.

He is excited about the mixture of free and pay-for-use apps that should spring from the “range of ideas” that are germinating among the Army’s smartphone users, but he thinks there will continue to be tension between the creativity of users and devel-opers in the field and the Army’s security needs. “The Army needs to be comfortable with the apps used,” he added. “With the [Android app] pilots coming up, how do you control the devices with-out stifling creativity?”

The Army’s increased use of smartphones, in Bigham’s mind, creates an interesting procure-ment challenge that he hopes will be resolved within a few months. “For procurements below $500,000, it comes more to do the acquisition than the [value of the] acquisition itself,” he said. He wonders what would happen if the Army agrees to pay per use of an application and then the apps go viral, getting far broader usage than military procure-ment officials would have expected.

Despite the obvious squeeze that security officers and chief information officers are feeling as users in the field are anxious to use smartphones, much progress has been made since late 2011 based on conferences that have taken place in recent months, according to Clark DeHaven, general manager for the

Mobile Business Unit at LGS Innovations. “They’re trying to balance the use of commercial technology while also meeting DoD’s security needs,” he commented.

With the Android’s open applications develop-ment, Army officials can decide to restrict users from using Android applications from public markets, which would tend to carry malware, according to Nicole Nemer, smart device soft-ware architect at LGS Innovations. “Through management security, the government can set up approved app stores for the Android. There are definitely ways around,” the malware application problem.

“There are problems to be worked out, but they’re not show stoppers,” DeHaven added.

LGS Innovations is trying to help DoD orga-nizations improve network security by authenticating smart-phone data and also “wipe data clean when you leave,” the network, DeHaven said. O

Clark DeHaven

For more information, contact MIT Editor Harrison Donnelly at [email protected] or search our online archives

for related stories at www.mit-kmi.com.

BB-2590 Battery ChargerThe Lind BB-2590 Battery Charger is designed to charge a single BB-2590 military battery, with or without the SMBUS (BB-2590 battery not included).

• Compatible with BB-2590 military battery and BB-2590 militarybattery with SMBUS

• Velcrostrapsecurestheconnectortothebatterytoensureasolidconnection with the battery contacts

• GreenLEDonchargerindicateschargingstate• Otherinputcableoptionsavailableuponrequest(someoptionsincludeNATOSlaveconnector,barewireleadorsolarpanelconnections)

Charge BB-2590 Military Batteries

1.800.897.8994 •[email protected] •www.lindelectronics.comPOWER SPECIALISTS FOR MOBILE COMPUTING

NatO slave CONNeCtOr

sOlar ChargiNg systeM

Bare Wire lead CONNeCtiON

sOMe BB-2590 Battery Charger iNput CaBle OptiONs iNClude:

Page 12: MIT 16-2 (March 2012)

Top defense officials need to step up and exercise strong leadership in acquisition, satellite policy and other areas in order to transform the military’s information systems into a global enterprise based on Everything over IP (EoIP), according to a former Army chief information officer/G6.

Lieutenant General Steven Boutelle (Ret.), now a Cisco executive, has been taking his longstanding EoIP message on the road of late with an active schedule of addresses at government and industry conferences. He recently spent some time with MIT outlining his overall vision as well as providing an update on the Internet Routing in Space (IRIS) project he has headed.

Boutelle, who served as Army CIO from 2003 to 2007, currently serves as a vice president of business develop-ment for the company’s Global Government Solutions Group.

Speaking a few weeks before Department of Defense officials outlined plans for major funding reductions, Boutelle emphasized both the need for an enterprise strategy in a time of limited resources and the benefits to the military of closer cooperation with industry, in par-ticular commercial satellite companies, in pursuing that approach.

“We need to have IP on a global constellation of satel-lites. It’s not hard, or a technical issue to move the DoD satellite programs into an enterprise commercial program. A lot of people talk about it, but no one is doing anything about it,” he said.

“The industry wants to move forward. If government organizations stepped up today and invited major satellite companies to provide schedules and make proposals to launch hosted payloads, they would cooperate immedi-ately.  The organization is what is missing. The require-ments are fragmented, with the Air Force having one set of requirements and the Navy another,” Boutelle observed.

former Army cio urges bold leAdership to trAnsform militAry systems into A globAl enterprise bAsed on eoip.

by hArrison donnelly

mit editor

Lt. Gen. Steven Boutelle (Ret.)

www.MIT-kmi.com10 | MIT 16.2

Everything Over IP Champion

Page 13: MIT 16-2 (March 2012)

What is needed is an organization with acquisition authority that can step up to define the requirements, put them together and lay out a program. “I believe Congress would be very open to that,” he said, pointing to the National Geospatial-Intelligence Agency’s commercial imagery programs as a successful example.

“Industry is ready to do this, but there has to be leadership in the acquisition community,” he suggested. “They have to say, we’re going to do this, we’re going to drive down costs and create a global capability that is based on commercial EoIP. We’re going to minimize the legacy systems that we have.”

It’s a different way of doing business, Boutelle observed. “Those who built the legacy systems will not be your best friends. They won’t be an advocate for that, because it changes their business model, which is very lucrative. It’s like what happened in the 1980s with the telephone system—you had one provider with one wired line to your house. After the phone systems were broken up and IP came alive, we moved to voice, data and video and the choices we have today.

“The commercial satellite industry needs the same transformation that hap-pened to the telephone industry. It has to be driven by senior leadership in DoD, and executed by the services and the Defense Information Systems Agency. If that isn’t there, it will be done eventually, but it will cost DoD more and take longer,” Boutelle warned.

The end-to-end IP network has to extend to the ground as well, he said. “Looking at the global IP architecture for satellites, agencies need to look at where it comes down to earth, and to modify and converge DoD’s ground environment in the same way as an enterprise IP network, just as the commercial world is doing today. We need to emulate that and look not only at the satellites, but also at how it is brought to earth. The goal is to create a clean, efficient and more cost-effective enterprise IP network.”

routing in spAce

Launched in 2009, the IRIS program comprises a router and modem installed on Intelsat’s IS-14 satellite. By routing IP traffic in space, it enables IP users to directly communicate over satellite with-out having to double-hop data to and from

an intermediate earth station, thus saving time and money.

Cisco last year turned over operation of IRIS service to TeleCommunication Sys-tems (TCS), which is now offering the world’s first commercial service offering of a Cisco enabled IRIS managed network service.

In the interview, Boutelle focused on the results of the IRIS Joint Capabilities Technology Demonstration (JCTD) man-aged by Cisco for the DoD.

The tests were extremely successful, Boutelle reported. “What people found is that once you move to an all-IP network, you dramatically drive down costs of voice, video, data and other communications. You also increase the capability and user friendliness. The same devices that you can buy for your home can be used on IP on the ground or in space.”

While the system performed well in the area selected by U.S. Strategic Command, covering much of the Americas, Africa, Western Europe and the Mediterranean, the tests also reflected some of the techni-cal and other challenges involved in imple-menting this approach.

“The downside is that anytime you build something for DoD, they look at a global footprint—something that can operate in the U.S., Asia and the Middle East,” Boutelle noted. “The footprint only covered a piece of that. So the users would say they liked it in Europe and the U.S., but they needed to train on what they were going to be using in Southwest Asia. So they would have to go back to their legacy systems, because that was what they were going to take into theater. So it was a great demonstration of IRIS, but the utility of it to military personnel who were transitioning back and forth to the Gulf was minimal. They have to have some-thing that they can train on in the U.S. and then use in Afghanistan or wherever they are.”

Now that TCS is operating IRIS, Cisco is working on the next generation system, which is envisioned as a router and modem combined with a channelizer. Currently being used in the military’s Wideband Global SATCOM program, channelizers enable the movement of bandwidth on demand between users and locations, thus achieving greater efficiencies.

“We are seeing increased use of chan-nelizers. We’re putting together systems that have a router behind a channelizer,

which appears to be the optimal solution in the commercial sector,” Boutelle said.

“If you look at what you can do with a channelizer and router, there are some dramatic things that provide the same capa-bilities for a lot less cost than what DoD is spending today, or do a lot more for the same cost,” he continued. “As we start to see a draw down of the budget and forces, you have to look at how you can maintain what you have for less, or get more capability for the same cost. If we start to focus on Asia, for example, we can look at global constel-lations of capabilities.”

“Why would routing and channelizing help you?” Boutelle asked. “First of all, we found that when you put a router on a sat-ellite, many things happen that we at Cisco, which isn’t officially a satellite company, didn’t understand. Now that we’ve been in this for a couple of years, we’ve learned a lot. We’ve learned that you can have double the capacity on the same satellite dish when you move it to IP, and that when you put a router on a satellite, you can decrease the size of the power amplifiers by half, so you can build a smaller satellite or add more capability to the satellite.”

“The fact that the system is software controlled from the ground offers tremen-dous versatility,” he added. “You can put multiple routers and modems on, and you can upload the entire router from the ground. Redundancy is provided by upload-ing multiple routers, and you can change or upgrade the software from the ground. Today, when you launch a satellite, what you have on it is what will be on it in 15 years. But on Intelsat 14, which IRIS is riding on, we’ve uploaded that satellite, changed the software and added capabilities multiple times, from the ground,” Boutelle said.

Over the coming years, IRIS will sup-port the deployment of a truly mobile network that allows users to connect and communicate how, when and where they need to, and that continuously adapts to changing needs without depending on a fixed terrestrial infrastructure. This tech-nology will transform how government agencies and commercial organizations use IP-based network services to accomplish their missions, Boutelle said. O

For more information, contact MIT Editor Harrison Donnelly at [email protected]

or search our online archives for related stories at www.mit-kmi.com.

MIT 16.2 | 11www.MIT-kmi.com

Page 14: MIT 16-2 (March 2012)

www.MIT-kmi.com12 | MIT 16.2

Perched on the edge of a rugged moun-tainside, a soldier peers at an intended target that is located three kilometers away. He retrieves his pocket-sized forward entry device (PFED), a handheld device used to transmit and receive fire support messages over stan-dard military line-of-sight, high frequency and satellite communications.

The warfighter aims a laser range finder, connected to the PFED, toward the target and requests a call for fire. Within a few minutes, the target is destroyed. Behind the scenes, a conglomerate of sophisticated applications, interacting harmoniously, played a crucial role to bring about this precise strike.

Developed and supported by Project Man-ager Mission Command (PM MC), assigned to the Army’s Program Executive Office, Com-mand, Control and Communications-Tactical (PEO C3T), fire support systems such as PFED allow soldiers at the tactical edge to collaborate with the commander to choose the correct weapon-target pairing for precise munitions delivery. PM MC’s Fire Support Command and Control (FSC2) office devel-ops and maintains all fire support system capabilities.

Through the use of the integrated preci-sion fires image viewer, the soldier has access to a digital image in which every pixel repre-sents a measured coordinate, shown in a view that corresponds to the terrain the soldier is assessing. Once the soldier aims the laser at a target, the grid location is automatically plugged into a call for fire message.

During the Army’s recent Network Inte-gration Evaluation 12.1 at White Sands Mis-sile Range, N.M., Sergeant Steven Wilson of the 2nd Brigade, 1st Armored Division (2/1 AD) and 3,800 fellow soldiers evaluated dozens of networked systems, including fires capa-bilities, in a realistic operational environment.

Wilson has been in the forward observer role for more than seven years and has first-hand knowledge of how communications sent through a PFED are received more accurately than through a standard radio to initiate digi-tally aided close air support.

“I can enter the grid in my box as an inac-tive target,” he said. “If I want to engage, I make it active and send it out.”

Without the laser and PFED, the time to key in the coordinates not only slows down the process, but also leaves open a chance for human error, and at worst, fratricide. “If you’re using a PFED in conjunction with the laser, it speeds up what you’re doing,” Wilson said.

chAin of communicAtions

As with any call for fire support, an accu-rate transmittal of technical and human communications up and down the chain must occur.

To proceed with the transmission, the forward observer accesses the image on the PFED to locate the target. He receives pre-cise coordinates and an auto-load call-for-fire message that he sends up the fires chain to the company commander via the mounted lightweight forward entry device (LFED). The LFED is a ruggedized handheld computer that hosts the forward observer system software, which enables mounted forward observers and fire support officers to plan, control and execute fire support operations in coordina-tion with the commander’s plan and scheme of maneuver at the platoon and company levels.

At this point, the commander and for-ward observers can collaborate to determine if a short-range strike is viable, and if so, the commander relays the call to the mortar fire

direction center (FDC). This team ensures the strikes aren’t violating restricted loca-tions, such as places of worship or schools, or using unapproved ammunition. These crucial details are previously coordinated with the commander and higher fire support authorities.

For additional approvals or longer range fires, the company can send the message to the battalion fire support element (FSE), which houses the Advanced Field Artillery Tactical Data System (AFATDS), an automated system that processes, analyzes and exchanges combat information to support planning, coordinating, controlling and executing fires and effects. All this information is coordinated with the maneuver commander in support of his plan and scheme of maneuver, priorities and guidance. Both LFED and the AFATDS EMT use Precision Strike Suite-Special Oper-ations Force, which provides accurate coordi-nates from multiple satellite pictures taken at different angles.

“The AFATDS is basically the central hub for all of our fires within the companies,” said 2nd Lieutenant Richard Miller, who is in charge of the fires unit inside the battalion TOC for 1-35 Armor, a battalion within the 2/1 AD. “We review it and then send it down to the guns,” he said. “You can adjust shells that you’ll be using and adjust ammunition trajectory for high and low.”

The main message they change concerns volleys, or the number of shells fired, Miller explained. The forward observers send down the number of volleys they want and they adjust to what’s on hand.

The system has multiple built-in capa-bilities that ensure that it and the troops are ready to engage. A “red gumball” on the AFATDS screen tells the user not to proceed with the mission. The FSE checks to ensure

forWArd entry devices link soldiers, commAnders for AccurAte munitions delivery.

Precision Fire Support Chain Originates with Handheld Applications

by kAthryn bAiley

Page 15: MIT 16-2 (March 2012)

the fire area is safe and the fire direction offi-cer ensures the location of the intended target is correct.

Many factors can affect the trajectory, including computational and meteorologi-cal data, explained Sergeant John Howell of the 2/1 AD, who participated in NIE 12.1 by operating AFATDS mounted in a Caiman vehicle.

“If you’re outside in negative 30 degree weather or in 110 degree weather, the same charge may land in different places,” he said. “Since we’re in the desert, one minute it could be calm and the next minute it could be out-rageous, so we try to keep the weather data updated every four hours so that if something drastic does change we’ll still be shooting within safety parameters.”

“The communications string takes less than two minutes, depending on how fast we can clear the ground and air,” said Miller.

Some instances require the battalion commander to send the request for fires up to brigade. The brigade may determine that resources are not available and that an air strike may be a better choice. Sometimes the

amount of air traffic can be a determining factor.

“What happens is you have various restricted operating zones, and you will see you have one that restricts aircraft to oper-ating above 10 kilometers above ground level,” said Wilson. “You can fire anything below that, such as mortars, without brigade intervention.”

computing the QuAdrAnt

Once the tactical decision is made about which platform and unit will perform the fires, it’s time to make technical gunnery decisions. Technical fire control will com-pute the quadrant (elevation of the tube) and deflection (the direction the tube points) for the firing unit. AFATDS then computes and sends the information to the gun display unit-replacement (GDU-R).

The GDU-R receives and displays firing commands with data such as method of con-trol, quadrant elevation, deflection, shell-fuze combination, powder charge and number of rounds to allow accurate cannon firing.

Back at the beginning of the fires chain, the forward observer remains positioned throughout the call for fire, as they are the final validation point in the process. The FDC announces “shot” when the rounds are fired and “splash” five seconds prior to impact.

The FDC then announces “rounds com-plete,” digitally or by voice, after the last round in a fire mission is shot.

Speed and accuracy are the reasons why FSC2 systems continue to receive high marks from the soldiers. When asked what it would be like if he couldn’t coordinate the call for fires digitally, Miller responded, “It would be a very difficult process. Just the transmissions alone would double the time, two to four min-utes, and when you’re in contact you really don’t want to be waiting that long.” O

Kathryn Bailey is a staff writer for the PEO C3T.

MIT 16.2 | 13www.MIT-kmi.com

For more information, contact MIT Editor Harrison Donnelly at [email protected]

or search our online archives for related stories at www.mit-kmi.com.

Page 16: MIT 16-2 (March 2012)

www.MIT-kmi.com14 | MIT 16.2

DATA BYTES

Air Force Orders More Airborne

GatewaysThe Air Force has awarded

Northrop Grumman a $47.2 million contract for the purchase and inte-gration of two more Battlefield Airborne Communications Node (BACN) payloads on two existing Block 20 Global Hawk aircraft. BACN is a high-altitude, airborne communications and informa-tion gateway system that main-tains round-the-clock operational communications support. The persistent connectivity that BACN provides improves situational awareness and enables better coordination between forward-edge warfighters and commanders. BACN bridges and extends voice communications and battlespace awareness information from numerous sources using a suite of computers and radio systems. After the BACN payloads have been integrated on the Block 20 Global Hawks, the aircraft will be desig-nated as USAF EQ-4B unmanned systems, providing long endur-ance and high persistence gateway capabilities.

Harris has introduced new capabilities in electronic counter-countermeasures (ECCM) aimed at enhancing the information security and reliability of tactical communications for international armed forces. The company has developed two new high-performing wave-forms—Quicklook 3 and Quicklook-Wide—that deliver significant advances in ECCM techniques. The first provides enhanced agility through ultra-fast frequency hopping rates, while the second delivers improved throughput of 64 Kbps of IP data while frequency hopping.

The waveforms will be available on the Harris Falcon III RF-7800V VHF series. The new Harris waveforms are part of an expanded line of ECCM for protecting tactical commu-nications from jammers or unfavorable atmo-spheric conditions. Quicklook 3 offers a 10-fold increase in frequency hopping rates over tradi-tional frequency hopping options and will be available in the Falcon III RF-7800V Combat Net Radio. Quicklook-Wide provides a five-fold increase in data throughput for frequency hopping.

Counter-Countermeasures Protect Tactical Comms

Quintron Systems has completed the initial delivery of a major DICES Voice over Internet Protocol (VoIP) system to the White Sands Missile Range (WSMR), N.M. This DICES system will be the first major IP-based user system introduced onto the WSMR Test Support Network and will replace several dispa-rate, aging voice systems. This upgrade will put WSMR at the leading edge for U.S. ranges in the migration to net-centric archi-tectures. An incremental delivery process was planned from the initial contract award, with several major engineering enhancements also incorporated to support the overall WSMR requirements. Key in this

regard are two new user stations that will provide direct drop-in replace-

ments for existing stations to simplify the implemen-tation process. Major soft-ware enhancements include

distributed central servers with database replication to support independent North and South Range operations at WSMR while keeping a hot back-up server available for either. A planned DICES VoIP feature, the IP Trunk was activated for the

WSMR project as well. This feature provides for direct sharing of audio circuits between the distributed central servers to facilitate common operations with least bandwidth utilization.

Missile Range Readies Major VoIP System

Using the Joint Tactical Radio System Handheld, Manpack, Small Form Fit two-channel networking radio (AN/PRC-155), General Dynamics C4 Systems recently completed the first demonstration of secure voice and data communications via the Mobile User Objective System (MUOS) satellite-communications wave-form. The demonstration used an AN/PRC-155 manpack radio running the MUOS waveform software to transmit encrypted voice through a MUOS-satellite simulator

to the MUOS ground station equipment that will soon be deployed in Sicily. MUOS is a military satellite communications system that will enable secure, mobile networked communications worldwide, in even the most austere environments. Development of the MUOS waveform remains on track for completion in the third quarter of 2012. By year-end, the MUOS capability will be available on the AN/PRC-155 manpack radio, the first MUOS terminal that will be available to soldiers.

SATCOM Waveform Offers Secure Voice and Data

Page 17: MIT 16-2 (March 2012)

www.MIT-kmi.com MIT 16.2 | 15

Compiled by KMi Media Group staff

ITT Exelis has delivered an updated Joint Tactical Radio System ( JTRS) Bowman Waveform ( JBW) to the JTRS Information Repository as part of a $4.2 million delivery order that also included Soldier Radio-Multifunctional (SR-M) software-defined radios. The JBW allows U.S. forces to communicate directly and securely with U.K. allies using the Bowman

VHF waveform on the battlefield. JBW func-tionality enables users from both countries to work as a cohesive team during combat operations, sharing situational awareness information more efficiently and effec-tively, rather than using separate chan-nels to pass information back and forth. Functional qualification of the waveform in the JTRS Information Repository has

been completed. The SR-M radios deliv-ered to the JTRS Program Executive Office in this sale will be transferred to the U.K. government for upcoming assessment and trials for the JBW. JBW development and production of SR-M radios were completed at Exelis Electronic Systems facilities in Fort Wayne, Ind., Clifton, N.J., and Tempe, Ariz.

The Air Force Space and Missile Systems Center (SMC) has awarded Integral Systems, a subsidiary of Kratos Defense and Security Solutions, a $15.69 million extension to its Command and Control System-Consolidated (CCS-C) contract. Under the terms of the contract extension, Integral Systems will continue to provide the Air Force and SMC with its EPOCH Integrated Product Suite (IPS)

to simplify operations by consolidating satellite ground systems. The award extends CCS-C system sustainment, hardware maintenance, software maintenance and operations support through 2012. The CCS-C contract, first awarded in 2002, enables a unified C2 capability for the 50th Space Wing’s complete family of MILSATCOM satellite programs. CCS-C is currently configured to support

MILSATCOM satellites across four systems: the Defense Satellite Communications System, Milstar, Wideband Global SATCOM and AEHF system. CCS-C consists of high-specification, commercially avail-able computer servers and workstations running commercially available telemetry, tracking and command software packages on a local area network-based client/server architecture.

Consolidated Satellite Ground Systems Simplify Operations

The Air Force has selected the Getac B300 fully rugged notebook computer as part of its Quantum Enterprise Buy (QEB) program. The Air Force Information Technology Commodity Council, which includes senior Air Force offi-cials, led the QEB selection process, evaluating vendor solutions for quality, performance, price and compatibility with the Air Force’s strict

security requirements. The B300 rugged notebook computer was selected for the program for meeting those stringent requirements while delivering performance, reliability and consistent ability to withstand harsh work and environmental condi-tions. The Getac B300 rugged notebook is powered by a 2.5 GHz Intel Core i5 processor with Turbo Boost Technology up to 3.2 GHz.

Platform-as-a-Service Supports Army Cloud

Migration

Seeking to aid the Army’s pursuit of data center consolidation, a new contract provides the Architecture Services Division of the Software Engineering Center (SEC), part of the Army’s Communications-Electronics Command, with a license for OutSystems’ Agile Platform, supporting services to deliver the first migration project and training for initial rollout to Army personnel.  A primary component of the federal government’s data center consolidation initiative is the creation of a private cloud infrastructure. Motivated by this initiative, SEC needed a high-performance application development and delivery environ-ment that could function with platform-as-a-service (PaaS) capabilities.  OutSystems’ Agile Platform provides SEC with a rapid application development PaaS solution that works out-of-the-box and is easily leveraged in the Army’s new private cloud environment. Beyond being able to quickly develop new applications in the cloud, the Agile Platform provides the Army’s IT personnel with the ability to quickly, safely and efficiently migrate legacy systems to the new cloud architecture.

Waveform Links U.S., U.K. Forces on the Battlefield

Air Force Enterprise Program Selects Rugged Notebook

Page 18: MIT 16-2 (March 2012)

where can you find umuc? check out our campus map.

877-275-UMUC • military.umuc.edu/myfuture • enroll now

at your service since 1947

You’ll find us worldwide, offering more than 100 bachelor’s and master’s programs entirely online. You’ll also find us on base or on-site in more than 25 countries. Since 1947, University of Maryland University College (UMUC) has been educating America’s armed forces. So wherever your mission takes you, there’s a good chance we’re already there.

University of Maryland University College is the nation’s largest public university.

UMUC14637 MIT_World_Map_8.375x10.875.indd 1 2/28/12 4:11 PM

Page 19: MIT 16-2 (March 2012)

www.MIT-kmi.com MIT 16.2 | 17

Efficiency LeaderManaging Procurement for Business, War Fighting and the Enterprise

Q&AQ&A

Douglas K. Wiltsie assumed command of the Program Executive Office Enterprise Information Systems (PEO EIS) on October 5, 2011. His responsibilities include program management of more than 60 Department of Defense and Army acquisition programs across the business, war fighting and enterprise information environment mis-sion areas. These systems support Army and DoD-wide communica-tions, logistics, medical, finance, personnel, biometrics, training and procurement operations. He also has responsibility for five major enterprise resource planning efforts representing a projected Army investment of $8 billion over their life cycles. The PEO EIS organiza-tion consists of approximately 2,650 military, civilian and contractor staff around the world, and executes approximately $4 billion per year.

Prior to his assignment as PEO EIS, Wiltsie was appointed to the Senior Executive Service in June 2008 and served as the deputy pro-gram executive officer for intelligence, electronic warfare and sensors until October 2011. In this position, he was responsible for the develop-ment, acquisition, fielding and life cycle support of the Army’s portfolio of intelligence, electronic warfare and target acquisition programs.

Previously, Wiltsie served as the assistant deputy for acquisition and systems management in the Office of the Assistant Secretary of the Army for Acquisition, Logistics and Technology from 2004 to 2008. He also has held a wide range of acquisition and technology positions in ISR and other fields.

Wiltsie holds an M.S. in national resource strategy from the Indus-trial College of the Armed Forces and a B.S. in mechanical engineering from Virginia Tech.

Wiltsie was interviewed by MIT Editor Harrison Donnelly.

Q: How would you describe your overall approach to your new position in light of expected budget restrictions?

A: First, PEO EIS has been the leading organization providing the Army with enterprise-level capability for a long time. The team continues to lead Army technology modernization by developing and delivering integrated, net-centric capabilities to meet the needs of the nation, with recognition of and planning for a new and changing environment. The team has done a remarkable job, so my first objective is to not sig-nificantly change the way we execute our business. With an anticipated reduction in funding, we need to ensure that we execute the mission that Army has entrusted us to do in the most efficient way. Using a system-of-systems portfolio approach forces us to look at the various alternatives available to execute an integrated solution for the required capability. That may mean modifying an existing program instead of starting a new system or negotiating a lower requirement.

The Army will achieve significant efficiencies from the programs under development and/or in production within EIS. The business

systems that we develop and field help the Army to better manage installations, pay systems, equipment accountability, communications and computer infrastructure. The reality, however, is that the depart-ment will face significant reductions in funding. While the specifics of the funding reductions will be made public when the budget request is presented to Congress, we are working to ensure that the innova-tive capabilities promised to our warfighters are delivered on time and within budget, regardless of changes in the fiscal environment.

Other initiatives we are implementing as we go forward are Better Buying Power, aligning our priorities with the priorities that are emerg-ing from the capability portfolio reviews, and challenging requirements to get 80 percent capability in the field sooner through incremental deliveries.

One of PEO EIS’ major strengths is in leveraging government and industry partnerships to successfully shape the Army’s technology evolution, ensuring readiness today and preparedness for tomorrow. PEO EIS leads the Army in transforming technology efficiently and effectively, managing close to 35 percent of the Army’s IT budget. We continue to deliver innovative, leading-edge capabilities with a commit-ment to responsible management of taxpayer dollars.

Q: What is your strategy for achieving greater efficiency and effectiveness in PEO EIS operations?

Douglas K. WiltsieProgram Executive Officer

Enterprise Information Systems U.S. Army

where can you find umuc? check out our campus map.

877-275-UMUC • military.umuc.edu/myfuture • enroll now

at your service since 1947

You’ll find us worldwide, offering more than 100 bachelor’s and master’s programs entirely online. You’ll also find us on base or on-site in more than 25 countries. Since 1947, University of Maryland University College (UMUC) has been educating America’s armed forces. So wherever your mission takes you, there’s a good chance we’re already there.

University of Maryland University College is the nation’s largest public university.

UMUC14637 MIT_World_Map_8.375x10.875.indd 1 2/28/12 4:11 PM

Page 20: MIT 16-2 (March 2012)

www.MIT-kmi.com18 | MIT 16.2

A: EIS embraced the Army Affordability initiatives to seek program efficiencies through the Better Buying Power mandate, and many of our programs are producing strong results.

The fiscal year 2011 consolidated buys from the Product Direc-tor, Computer Hardware Enterprise Software and Solutions [PD CHESS] have yielded $46.1 million in cost avoidance to Army and DoD customers. CHESS has also leveraged enterprise license agree-ments to reduce direct life cycle license costs by $30 million over five years, avoiding $10 million in administrative costs and maintenance renewals. Another example is the Project Manager, Army Enterprise Systems Integration Program [AESIP], which negotiated a multi-year SAP user license for ERPs, reaping a $30 million savings.

PEO EIS will continue to focus on integrated services and on large-scale applications that inherently save money, while also provid-ing greater capability to the warfighter—abiding by the mandate to “do more without more.” As DoD evolves the guidance for the should-cost initiative, customers can expect greater efficiencies and savings from EIS programs.

Q: How will you measure success in 2012, and at what numbers will you be looking most closely?

A: Simply put, PEO EIS measures success by the capabilities we’ve delivered to our DoD customers. We can track this success by fre-quently assessing our programs’ cost, schedule and performance. Ensuring that the development and fielding of our programs does not run over budget, yet provides the greatest return on investment pos-sible, is what drives our success, as does a timely obligation of funds. Setting and maintaining our development and fielding schedule is our promise to our customer—that we will deliver the capability they need when they need it, which we achieve by meeting milestone deci-sion schedules.

We modify and field a wide range of commercial off-the-shelf and government off-the-shelf products and services that support the sol-dier. Our goal is to get the best solution into their hands as quickly as possible. That measure of success is most critical.

Q: Among PEO EIS programs, what are some of the recent successes that you would like to highlight?

A: The enterprise resource planning systems [ERPs] are critical components in ensuring that the Army meets the goal of financial auditability by September 2017. The systems provide a seamless, enterprisewide environment for logistics, financial and manpower visibility spanning the factory to the foxhole.

Several significant accomplishments were realized in 2011 by the Global Combat Support System-Army [GCSS-Army] and its technical component, AESIP. In August 2011, the milestone decision authority granted GCSS-Army a Milestone C approval to enter the production and deployment phase of the acquisition life cycle. The Milestone C decision was largely a result of the successful operational assessment of GCSS-Army at the 11th Armored Cavalry Regiment, Fort Irwin, Calif., following the “go live” in July 2010.

In June 2011, General Fund Enterprise Business System [GFEBS] was granted a full deployment decision. This decision affirmed the deployment readiness of the GFEBS solution and authorized system implementation Armywide. GFEBS is a web-based ERP system that brings the majority of Army financial and real property management processes into a single system. GFEBS provides accurate, reliable

and real-time financial and real property data, which enables cost management activities that lead toward full auditability of the Army’s financial statements. It will provide the core financial systems capa-bility to support an unqualified audit opinion for the Army’s General Fund in compliance with the Chief Financial Officers Act and other statutory requirements. GFEBS records financial transactions with supporting documentation, tracks transactions to the detailed level and will produce an auditable trial balance. The Army Audit Agency’s most recent evaluation found that GFEBS complies with 1,054 of 1,113 requirements, or 94.7 percent, from the Federal Financial Man-agement Improvement Act.

The Integrated Pay and Personnel System was just awarded, establishing the development of a single ERP to improve our ability to manage Army personnel across the active, reserve and National Guard components.

In fiscal year 2011, the Program Manager, DoD Biometrics pro-gram collected, processed, stored, shared and matched approximately 1.8 million biometric records supporting military and homeland security missions. Deployed forces used biometrics to distinguish between adversaries and innocents, and were provided the neces-sary information to decide and act based on scientific processing. These activities positively matched 657,397 identities, including more than 6,600 individuals identified on U.S. and coalition partner watch lists, while maintaining operational availability of greater than 98 percent. DoD Biometrics also completed the acquisi-tion of a new handheld device, which will be deployed to soldiers and Marines in theater, that utilizes significantly faster process-ing capabilities on higher quality fingerprint data for analysis and matching.

The Program Manager, Medical Communications for Combat Casualty Care [PM MC4] allowed deployable medical forces to gain quick, accurate access to patient histories and forward casualty resus-citation information, and to deliver health care services remotely through MC4 tele-health capabilities. Prior to MC4, documentation of soldiers’ deployed health care was inadequate. When documented, medical records were often lost or indecipherable, soldiers endured repeated tests, continuity of care suffered, and commanders lacked data needed to make fully informed medical decisions. MC4 has addressed those deficiencies.

Supporting a Joint Staff and Central Command urgent need in early 2011, MC4 completed a major software upgrade, fielding Elec-tronic Medical Record version 2.1.2.1 to all operational Army medical forces. The upgrade provided enhanced traumatic brain injury report-ing and documentation capabilities three weeks ahead of schedule and $500,000 under budget, making it easier for deployed facilities to digitally manage their medical supplies and better track in-transit patients and equipment.

Additionally, in mid-2011, MC4 fielded commercial technology, combined with existing military systems, to digitally connect remote soldiers with mental health specialists in support of the Army’s suicide prevention campaign. By electronically connecting at-risk soldiers with mental health providers, MC4 directly supported the Army vice chief of staff-led suicide prevention campaign, facilitating faster recogni-tion and treatment of post-traumatic stress disorder symptoms and other mental health issues. This “tele-health” capability significantly intensified Army mental health providers’ ability to conduct private virtual medical consultations with at-risk soldiers, often deployed to remote combat/forward operating bases. It was fielded within six weeks of requirement identification for less than $50,000. MC4 remains the

Page 21: MIT 16-2 (March 2012)

www.MIT-kmi.com MIT 16.2 | 19

most widely used, comprehensive information management medical system on the battlefield today.

Our communications PMs continue to provide outstanding capa-bility for both strategic communications as well as upgrading the IT infrastructure on our posts, camps and stations, both in the U.S. as well as abroad, to support one of the Army’s highest priorities—the network. The scope and level of effort in this regard is exorbitant, and requires the right mix of effective technology and efficient processes.

I could speak all day about the outstanding accomplishments each of our PEO EIS programs have achieved, but these are probably the most significant and far-reaching accomplishments I will address here.

Q: On what issues or initiatives are you spending the most of your time, and where do you see the most challenging areas facing your organization?

A: Our top challenge is to prepare for the future. In the next year, we will review the service’s portfolio of IT capabilities with sensitivity to shrinking budgets. How and when money is obligated for execution of programs will drive rapid and efficient deployment of products and services.

We also need to search out and eliminate program redundancies. Early partnership with industry and other components of DoD will help us to plan for our future requirements from a macro-level perspec-tive—getting the right information to the decision-makers at the right time is critical to our success.

Finally, Secretary Panetta issued an IT reform memorandum in September 2011, charging the generating force with transformation and modernization in order to deliver optimized and cost-effective IT capabilities to our globally deployed force. The vision is for one global network that is “integrated, secure, accessible, interoperable and afford-able” for all soldiers, civilians and mission partners. PEO EIS will have a critical role in modernization of the Army’s network for delivery by the end of fiscal year 2015. Transitioning IT capabilities such as email, collaboration and storage are key initiatives within the Army, and EIS is leading that execution.

Our focus on the upgrade of IT infrastructure for posts, camps and stations is critical to ensuring that soldiers have the ability to execute their mission whether deployed or back in home station. This effort includes the highly visible Korean installation transformation and Yongsan relocation; EIS is responsible for the IT infrastructure.

Finally, the continued success of our development programs, to include the ERPs and the biometrics program of records, is critical to our Army’s future success.

Q: What is your approach to system-of-systems portfolio level management, and why do you think it is important?

A: The system-of-systems approach allows the Army leadership to make decisions on programs based on the holistic capability provided by the combination of programs that support it. Portfolio solutions need to be both data and system driven, and I’m convinced that if we can establish a standardized process to evaluate requirements at a higher, systems-level perspective, we will be able to implement requirements in a more cost-effective and efficient way. As I said before, this approach allows the Army leadership to determine whether a desired additional capability can be best implemented by modifying an existing program or series of programs instead of establishing a new program potentially reduc-ing development time and cost. In addition, the system-of-systems

approach can provide an analytical understanding of where the “knee on the curve” for a certain requirement[s] exists based on the holistic capability, thereby eliminating the need to design a system to a more risky requirement. PEO EIS is committed to supporting and sustain-ing key Army IT programs through synchronization of requirements and resources, aligning programs throughout the fielding process and during operations.

Q: You have emphasized the need to move from a “reactionary” to a proactive stance in dealing with issues. What does that mean in practice?

A: In the dynamic, evolving environment of today’s Army, our tradi-tional process is to wait until the Army leadership asks for input to various programming drills. I believe that it is our responsibility to develop a better way to provide the Army leadership with accurate and quantifiable alternatives that capture all of the second order affects. Again, by managing at the system-of-systems level, we should be able to look ahead and predict trends and future requirements, position-ing our manpower and putting the tools in place to execute future missions.

The PEO EIS’ key focus is on acquisition speed and honing our core competencies. We have a responsibility to execute the Army’s development and production programs as quickly as possible. By work-ing together with the contracting commands and industry, I believe we can build teams that enable us to reduce the overall source selection timeframe. It’s a proactive approach to rapidly changing requirements, and it draws on our partnerships, which strengthens our capabilities.

Q: What is your perspective on efforts to have more “insourcing” of operations by government employees rather than contractors?

A: I believe there is a clear balance that needs to be established between insourcing and competing operations. We will approach it on a case by case basis. I do believe that with our exit from Iraq and the planned redeployment from Afghanistan, a lot of the operational functions cur-rently performed by contractors will be reduced.

With regard to the ERPs, we had a successful initiative in 2011 where our AESIP program completed transition of lead system inte-grator [LSI] responsibilities for its hub services, business intelligence/business warehouse and master data development and sustainment to the government organization, Army Materiel Command, Research and Development Center, Army Shared Services Center [ASSC]. This transition of services provides government LSI oversight and paves the way for transition of sustainment services from the other ERP systems to the ASSC.

As this effort proves successful, we may look at other areas where this process may be benchmarked for additional government lead opportunities.

Q: What is your organization doing to support the data center consolidation initiative?

A: PEO EIS is and has been working closely with the Army chief infor-mation officer/G6 in support of the Army Data Center Consolidation Plan [ADCCP] to relocate systems out of data centers scheduled for closure and into the officially designated data centers that will remain. PEO-EIS has worked very closely with the G6 and the Defense Informa-tion Systems Agency [DISA] to transition ALTESS at Radford into an

Page 22: MIT 16-2 (March 2012)

www.MIT-kmi.com20 | MIT 16.2

Army-operated DISA data center. This prevents Army programs cur-rently at ALTESS from having to migrate again.

Additionally, PEO EIS is designated as the lead in the development of the Data Center/Cloud Computing Environment [DC CE] of the Army’s Common Operating Environment [COE] for the assistant sec-retary of the Army for acquisition, logistics and technology [ASA (ALT)]. The DC CE will be an integral component of the ADCCP and the migra-tion to the Army data centers of the future. We are in close collabora-tion with CIO/G6 and ASA [ALT] to incorporate COE compliance into all PEO EIS programs and to facilitate the migration of all applications to the COE data center computing environment. ALTESS is developing this capability to allow us to better understand the costs programs can expect to virtualize their systems while executing the data tag structure standards that will be established.

Q: What is your office’s role in countering the cyber-threat?

A: One of the major thrusts for the department is the establishment of CYBERCOM as the lead against this growing threat. Our challenge is to continue acquiring, fielding and sustaining IT technologies that meet current and future Army needs in an uncertain security environment. PEO EIS has the responsibility to work with ARCYBER to ensure that the IT infrastructure and programs we provide meet all of the latest requirements. We continue to work with ARCYBER and other leading DoD and Army agencies to ensure all enterprise cyber initiatives are incorporated into all of our systems to meet all Information Assurance compliance and reporting requirements. Ensuring system compliance with current DoD and Army policy remains a top priority for PEO EIS.

In order to combat the ever-growing threat to our cyberspace, we are also working with ASA [ALT] to implement program protection educa-tion and awareness for all PMs in order to identify and protect critical program information. This will support our efforts to utilize supply chain risk management and its techniques to protect Army data and systems. Developing program protection plans and learning how the Army manages damage assessment will also be a key focus in 2012.

Q: What message would you most like to communicate to industry about how it will work with your organization in 2012?

A: In the latest Army posture statement, Secretary Panetta communi-cated the goal of maintaining OPTEMPO within an ever-changing and challenging environment of conflict. He emphasized the importance of the Army’s efforts to transform the business systems of our generating force through the development of a fully integrated management sys-tem, adopting an enterprise approach and reforming the requirements and resource processes that synchronize materiel distribution, training and staffing.

Clearly, funding will be reduced in the future, which equates to potential reduced opportunities. I want to be extremely transparent with industry—my goal is to continue to partner with industry to deliver on time and on budget for any and every opportunity that pres-ents itself. We are tasked with managing change in user requirements and developing strategies for handling technology transition. Our industry partners are critical components in achieving these goals, and I intend to maximize the results of that collaboration for the benefit of the soldier and the Army as a whole. O

PM /PD Project Scope RFP Release Date Vehicle

PD AKO Management Services Task order management, system operations, development engineering and transition/migration planning 2Q12 Full & Open

PM DCATS Communications & Trans System (CTS) Comprehensive system & services for DCATS 2Q12 Multi-award IDIQ

PM DCATS Land Mobile Radio Systems (LMRS) Engineer, furnish, install & test LMR systems 2Q12 Full & Open

PM DCATS CSS SATCOM Network Services Network services for bandwidth & operations support 2Q12 DSTS-G

PM DCATS CSS SATCOM Condition Based Replacement Procure hardware for CBRs and new modems 3Q13 COMSATCOM FCSA

PM DCATS J-AIT Passive RFI II (pRFID II) IDIQ contract for pRFID products & services 2Q12 Full & Open

PD FMS FMS Development & Maintenance Base year plus 2 option year contract Feb 2012 CHESS ITES2S

PM P2E Afghanistan – Bagram AFB / 6 Projects Outside plant & transmission systems 2Q12 BPA RICC – ACC

PM P2E Afghanistan – Kabul / 5 Projects Outside / inside plant; data 2Q12 BPA RICC – ESS IDIQ

PM P2E Afghanistan – Kandahar Air Field / 10 Projects Outside / inside plant; data 2Q12 BPA RICC – ESS IDIQ

PM P2E Afghanistan / 8 Projects Outside / inside plant 2Q12 BPA RICC – NETCENTS

PM P2E Kuwait – Camp Arifjan / 4 Projects Outside / inside plant; data; voice; HVAC; Power 2Q12 BPA RICC – IMOD RICC

PM P2E Kuwait – Camp Buehring / 2 Projects Outside / inside plant; HVAC; Power 1Q12 BPA RICC

PD CHESS Information Tech Enterprise Sol – Hardware Commercial IT equipment and related services 3QFY12 Full & Open

PEO EIS Program Management Supt Services 3 Contract vehicles providing performance based services 2Q12 Full & Open

PM GFEBS Procure to Pay (P2P) Design, develop and field SAP supplier relationship management TBD Full & Open

PM GFEBS GFEBS Sensitive Activities Scope, design, develop & field GFEBS app in a secure network Feb 2012 Full & Open

PM GFEBS GFEBS Time and Attendance Integrating GFEBS solution into Army finance system TBD Full & Open

PD HR Solutions HR Task Orders / Multiple Task Orders Management & admin support, personnel service, studies &

recruitment TBD HR Sol IDIQ Contracts

PD IMS-A ISM/RFMSS Support Systems Provide post deployment software support 3Q12 TBD

PD FMS FMS Development & Maintenance Operate, maintain, and develop FMS IT capabilities 2Q12 ITES-2S

PEO EIS Key 2012 Contracts

Page 23: MIT 16-2 (March 2012)

www.MIT-kmi.com MIT 16.2 | 21

As the U.S. military looks ahead to a future marked by both tight budget limits and a seemingly unstoppable demand for sat-ellite communications bandwidth, industry experts say there is more the government can do to make the process of acquiring bandwidth and services by defense, intelli-gence and other government agencies more efficient and economical. These include: mak-ing multi-year procurement commitments, limiting the numbers of eligible vendors, incorporating the acquisition of commercial bandwidth more formally into policies and programs and otherwise thinking and acting more creatively.

The emphasis on cost effectiveness in the procurement of commercial SATCOM bandwidth and services comes as the Defense Information Systems Agency (DISA) and Gen-eral Services Administration (GSA) imple-ment their new strategy for the acquisition of satellite bandwidth and services.

The Future Comsatcom Services Acqui-sition (FCSA) program, which represents a consolidation of four legacy Department of Defense and GSA contracts for the provi-sion of satellite communications, is aimed at leveraging economies of scale, streamlining

the procurement process, promoting compe-tition among vendors and, ultimately, obtain-ing lower prices for bandwidth.

FCSA hit a bump in the road early in its roll-out, as the initial bandwidth prices avail-able from vendors unexpectedly rose, spur-ring concern and frustration among some government customers. Most observers now agree that the price hikes were a hiccup, the result of several years of frozen prices and of the supply and demand situation in the Afghanistan theater.

Meanwhile, FCSA imple-mentation proceeds apace. The first two of three con-tracts under FCSA have been awarded and the consen-sus is that they are working smoothly. The third contract, Custom SATCOM Solutions (CS2), has been delayed but is expected to be awarded soon.

FCSA consolidated the Defense Satellite Transmission Services-Global (DSTS-G), SAT-COM II, Inmarsat and Schedule 70, the GSA’s catchall IT contract vehicle, into mammoth

IDIQ contracts. The point of the consolida-tion was to reduce the number of SATCOM contracts that needed to be managed.

The first two parts of FCSA, covering transponded capacity (the dedicated satel-lite bandwidth on commercially available

frequency bands) and subscrip-tion services (pre-engineered, off-the-shelf fixed and mobile satellite service solutions) have already been awarded. CS2, the third leg of FCSA, will emphasize custom-tai-lored products and services.

“I noticed early on, when the first task orders were being awarded for transpon-ded capacity, that there was some concerns from DISA about prices going up,” said

David Myers, president of government solu-tions at Harris CapRock.

Harris CapRock, as a provider of SATCOM solutions, is the largest commercial buyer and consumer of transponded bandwidth. The price increases affected the companies’ proposals under the subscription services aspect of FCSA.

Saving on

government And industry seek neW WAys to Achieve greAter efficiency in procurement of commerciAl sAtellite bAndWidth.

by peter buxbAum

mit correspondent

Special Report: COMSATCOM

SATCOM

David Myers

[email protected]

Page 24: MIT 16-2 (March 2012)

“We tried to hold prices as steady as we could,” Myers added. “But operators under DSTS-G had their prices locked in for five years so they took price increases when the first FCSA vehicle was awarded. The turmoil was tamped down when they explained to the market that it had benefited from long-term pricing under DSTS-G, and that with the new contract everything got reset to market rates.”

supply And demAnd

The price increases were also fueled by supply and demand, according to Skot Butler, director of strategic initiatives at Intelsat General, a SATCOM solutions pro-vider. “There is a great need for capacity in the Afghanistan theater,” he explained, “but there is not a lot of inventory and bandwidth is very con-strained.”

Price increases aside, Myers praised DISA for its management of the transition from the legacy contracts to FCSA. “In terms of how it was awarded, I tip my hat to DISA,” he said. “It processed many re-competes pretty quickly. To my knowledge, none of the end customers missed a beat or went without service.”

“FCSA is an improved way to buy transponded capac-ity,” said Ric VanderMeulen, government broadband general manager at ViaSat. “This way, the government can buy directly from the source. Under DSTS-G, the government could buy only from three companies. Anyone with satellite tran-sponder capacity to offer had to go through them.”

FCSA represents more options for the government and its vendors alike, accord-ing to Andrew Ruszkowski, vice president for global sales and marketing for XTAR, a provider of X-band satellite capacity. “In our experience, FCSA is an improvement over DSTS-G, both from the vendor and cus-tomer perspectives,” he said. “It has opened up options for both.”

XTAR is a prime contractor under the transponded services portion of FCSA, which

was awarded last October, and has recently begun to provide services under the contract on two task orders.

“A small operator like XTAR can’t possibly cover all the opportunities and requirements coming out of various users within the U.S. government,” Ruszkowski added. “We rely on integrators to extend our reach into the com-munity of users while we pursue opportuni-ties directly with users as well. That has always been our strategy.”

The subscription services aspect of FCSA also has the potential to provide flexibility and

enhanced service to the gov-ernment, Myers said. “These are user-defined services,” he said. “The vendor pro-vides the customers with the equipment and bandwidth, the customer pays a fixed fee, and they can use it for what-ever they want. They can buy one site or they can buy a network.”

Harris CapRock offers a solution called Comman-

dAccess, a pre-packaged, COTS subscription service that matches the require-ments of the contract, accord-ing to Myers. “Only a small portion of our business is in reselling bandwidth,” he said. “We have seen growth in our subscription services with the introduction of our Comman-dAccess product.”

The CS2 contract will enable government agencies

to procure custom network solutions. The award of the CS2 contract represents comple-tion of the “bridge phase” between the legacy contract vehicles and the new FCSA regime, Ruszkowski observed. “XTAR is optimistic that CS2 will work well and bring more effi-ciency to the government and industry.”

“What we think would be a typical task order under CS2,” said Myers, “is where a cus-tomer wants a network solution for a mission type, with teleports, terrestrial interconnects, ground equipment and field services to install and maintain the system. It will short-circuit the process for the armed services because instead of the Army and Navy separately pro-curing these types of systems, with all that entails, it will just become a task order under CS2.”

The GSA-DISA approach to FCSA and CS2 is a smart move for a couple of other reasons, Myers added. “We have seen more customers in the last couple of years looking for complete solutions. They don’t want to do integration of piece parts. They want one-stop shopping.”

The IDIQ feature of CS2, with its second level of competition at the task order level, will keep a lid on costs, according to Myers, at a time when government spending is under the knife.

cs2 AWArds

Awards on the CS2 contract were sup-posed to have been made last fall but have been held up for unspecified reasons. Industry observers speculate that DISA and GSA simply took longer than expected to nail down all aspects of the program and its procedures, in hopes of preventing frustrated bidders from successfully filing protests against the eventual award.

“Vendors are looking forward to the point where there is clarity on CS2,” said Rusz-kowski. “We anticipate five to seven CS2 awardees and we intend to work closely with them. Integrators need to know where to make their investments. The party that I think is suffering the most is the end-user. Certainly it is to their benefit to have the program up and running efficiently and quickly.”

XTAR expects to see some subcontract-ing work out of CS2. “We see both parts of CS2, full and open as well as small business set-asides, fitting well into our sales strategy,” said Ruszkowski. “XTAR looks forward to moving beyond the current transition period to collaborate with the prime contractors of CS2 to bring the greatest possible value to government users.”

XTAR supports the FCSA CS2 model of pro-viding end-to-end services, Ruszkowski noted. “XTAR is an integral vendor to its integrator partners, providing efficient, cost-effective and reliable solutions to help meet each unique mission requirement. XTAR serves govern-ment users with space segment resources and allows integrators to bring all of the critical elements and technical expertise together as one complete, end-to-end capability. For CS2, XTAR will actively enable the possible primes to deliver these key services to the government end-users.”

Intelsat General is also eagerly awaiting the outcome of the CS2 bidding process. “We think it is viable for the government to have

Andrew Ruszkowski

[email protected]

Skot Butler

[email protected]

Special Report: COMSATCOM

www.MIT-kmi.com22 | MIT 16.2

Page 25: MIT 16-2 (March 2012)

a mix of bidders from among integrators and operators,” said Butler. “Intelsat is not just 55 satellites. It is also a terrestrial network and added value aspects that can satisfy custom-ers’ end-to-end requirements.”

Myers hopes that DISA and GSA will learn from the legacy contracts and not award CS2 to too many vendors. The agencies reportedly have received around 60 proposals, and have downselected potential awardees from among half that number.

Harris CapRock is an incumbent prime contractor on all four legacy contacts that were rolled into FCSA.

“My hope is that they keep the number to a select few, half a dozen to a dozen quali-fied awardees,” said Myers. “If they award too many slots, it becomes tough to manage and end customers are reluctant to use the vehi-cle because they get too many proposals for each requisition. There are also too many levels of contention, a higher poten-tial for vendor protests and the end result is that services take longer to get up.”

That was the case with the SATCOM II and Schedule 70 contracts, Myers reported.

“The government should consider multi-year procurements,” said Jim Mitchell, vice president of Boeing Satellite Systems International. “That is how it is done on the commercial side. Making a multi-year commitment to capacity encourages industry to build capacity. The government is sacrific-ing savings that could be secured if it went to a multi-year approach.”

Boeing currently has a proposal before GSA to join the subscriber services FCSA con-tract. “We are trying to expand our services business,” said Mitchell.

“Buying on terms longer than one year at a time can guarantee the government has the capacity it will need and better pricing,” said Myers. “Committing to three to five years at a time doesn’t fit the way they do things today. But the government needs to learn that the old mechanisms don’t fit the supply and demand in the space segment anymore.”

commodity buying?

A single-year procurement approach also sacrifices interoperability, according to Mitch-ell. “With a commitment of only one year at

a time, it is rare for commercial operators to put up payloads that are interoperable with the current constellation. If the government doesn’t want or need the capacity after one year, the commercial vendor has no market for that capacity.”

Butler differs with the government approach of buying bandwidth in bulk as if it were a commodity. “Their intention is to reduce cost on a per megahertz basis by buying in bulk,” he said. “But unfortunately, bandwidth is not usually a commodity. There are a lot of differences among satellites in cov-erage and power. Making huge bulk purchases narrows down the options.”

The government’s program requirements are sometimes overly rigid, Butler continued.

“The government often wants satellite traffic from Afghani-stan to land in Germany,” he explained. “Industry would like to land traffic in other locations like Italy or at per-manent Middle East bases. It is easier said than done because it requires additional staffing, but I think it would open up additional options.”

Along the same vein, Myers urges the government to define its requirements

without defining the solution. “Let industry come up with different approaches,” he said. “In the past, customers and DISA sometimes predefined the solution. They got what they asked for but that didn’t always meet mission requirements. If, instead, the government more generally articulated its need for capac-ity, uptime, availability and areas of coverage, it will be pleasantly surprised at the innovative thinking it will get from industry.”

Myers also called on federal officials to think innovatively as well by accepting the concept of hosted payloads. The term ‘hosted payloads’ can refer to a payload being placed aboard a commercial satellite being orbited for other purposes, as well as to a time-sharing type of arrangement in which the customer has access to a defined portion of the satellite’s capacity.

“The market is tight and there is little free capacity,” said Myers. “If a customer needs a big block of capacity, it is often hard to find. The government needs to look at the public-private partnership model like the Skynet fleet in the United Kingdom. They have access to the satellite but don’t have to fund the whole

thing, and the commercial operator can sell excess capacity. That model has worked well in the U.K. This is a concept that is now emerg-ing in the commercial space segment as well.”

The government could also do a better job articulating its projected future capacity needs to industry, according to Butler. “Commercial operators can only supply what they are aware of. One thing DoD has talked about in the past is developing a global baseline for capacity. If DoD could sign up for longer terms, it could be sure that the capacity would be available on a global basis and industry would also be better prepared to handle surge demands for capacity.”

At a higher level, Ruszkowski believes that DoD needs to act on its already-articulated policy of integrating commercial satellite pro-viders within the overall space capacity strat-egy. “The government needs to start thinking about commercial space resources as an integral part of their solution set,” he said. “Despite a clear statement to that effect in the president’s space strategy, there appears to be a shift toward the use of government-owned assets at the expense of the commercial.”

Government officials should keep two things in mind, Ruszkowski suggested. “They should think about requirements and capa-bilities rather than systems. And they also need to think about commercial capacity as fully integrated into the capabilities that they deploy. If they do that, they will help establish a healthy space industry that will be able to provide capacity for the long term on a global basis. When a conflict breaks out or a need arises, they won’t have to go scrambling to get capacity in place.”

That seems like good advice, considering that demand for bandwidth is expected to increase in coming years. “Despite all of the news about budget cuts, all indications are that we will see satellite bandwidth require-ments growing over the next few years,” Myers said. “Even as troops are being pulled out of theaters of operations, the military will be running more ISR missions requiring satellite bandwidth. My sense is that govern-ment demands will increase even as supply is getting tighter.” O

Jim Mitchell

For more information, contact MIT Editor Harrison Donnelly at [email protected]

or search our online archives for related stories at www.mit-kmi.com.

[email protected]

Special Report: COMSATCOM

MIT 16.2 | 23www.MIT-kmi.com

Page 26: MIT 16-2 (March 2012)

(Editor’s Note: Following is an update on the latest news from the Defense Information Systems Agency’s Commercial Satellite Communications (COMSATCOM) Center, based on the center’s newsletter, “COMSATCOM Scoop,” www.disa.mil/services/satcom/comsatcom-services/scoop-newsletter)

In 2009, the Military Sealift Command (MSC) approached the Commercial Satellite Communications Center with a need to replace its aging Bandwidth Efficient Satellite Transport (BEST) system. MSC implemented the BEST system back in 2002 as an overlay to existing legacy International Maritime Satellite (Inmarsat) infrastructure in use since 1999. This infrastructure was based solely on L-band, and included the use of aging Inmarsat B satellites, which were rap-idly reaching end-of-life. MSC wanted 95 percent global coverage within +/- 65 degrees latitude (especially in littoral waters and major sea routes) for transiting ships. Further, it needed to replace terminals nearing end-of-life. MSC was limited to a strict budget, so it desired the most bandwidth for the dollar. While some of the communications supported core operations, much was used for morale, welfare and recreation (MWR).

Fortunately, MSC had some flexibility to support communications needs, and after some initial discussions with the COMSATCOM Center, it was apparent there were several options previously not considered. The COMSATCOM Center identified 16 potential managed services and leased bandwidth solutions. Those solutions were narrowed to four commercially feasible alternatives that could provide MSC with the coverage required. The subsequent cost benefit analysis showed dual-band hybrid solutions would likely be the most effective alterna-tive. Additionally, managed services offered the opportunity to trade a little more network congestion for a lot more bandwidth, providing much more bandwidth for MWR than MSC had expected to afford. For instance, typical bandwidth use during a day experiences varying usage rates. By setting a minimum committed

information rate (CIR) and maximum burst information rate (BIR), MSC is guaran-teed a certain dedicated bandwidth—CIR—for important operational communica-tions while allowing flexibility to “burst” at higher rates for less critical Internet and email applications.

Because industry offers such a variety of creative managed solutions, MSC and the COMSACTOM Center decided to release a statement of objectives (SOO) rather than a more narrowly defined statement of work or a performance work statement. As the SOO reflected both MSC needs and industry capabilities, industry offered a wide range of compelling proposals, and source selection culmi-nated with an award for a Ku/L-band hybrid managed services solution.

The system will employ dual Ku- and L-bands and provide global coverage at significantly higher rates (64 kbps CIR, bursting up to 1Mbps on the “shore to ship” link) than the BEST system (48 kbps average). The dual bands will require two terminals. However, it will provide inherent backup while offering lower-cost band-width that can be incrementally increased to meet MSC fleet needs within budget constraints. BIR bandwidth prices can be a tenth of CIR or leases of equivalent bandwidth. Additionally, the awarded solution will eliminate the need to time-share channels and offer greater overall reliability with highly redundant coverage.

Full deployment of the Next Generation Wideband (NGW) system is sched-uled to begin in spring 2012. The winning vendor has begun building the NGW support network, which will then go through testing and certification this year. Once the system is certified to connect to the network, MSC’s target goal is to deploy the system onto 50 of its fleet of 70 ships in the first 12 months.

Enhanced Mobile Satellite Services (EMSS) provides secure global SATCOM services under the Commercial Satellite Communications Center. EMSS offers a breadth of services to include voice, secure voice, Distributed Tactical Communica-tions System (DTCS), messaging and data to the Department of Defense, other federal departments, agencies, state and local governments, and approved foreign and allied government users. EMSS offers short burst data (SBD) with automatic bill-ing using the “usage based tiered” pricing structure. The pre-negotiated SBD service and SHOUT Nano device pricing are exceptionally competitive with the commercial sector and also offer two key advantages—users have the flexibility of tiered data usage, to include unlimited data, and the added assurance of secure communica-tions through the EMSS gateway.

The SHOUT Nano is a portable, handheld two-way outdoor satellite messaging and GPS device for emergency/rescue, text-messaging applications and location-based services. The SHOUT Nano’s SBD service is enabled by the Iridium satellite constellation which offers global pole to pole coverage.

The Nano has a high-resolution color LCD with menu options displayed as icons. The device is designed with ultra-low power consumption electronics drawing less than 35μA during sleep. With an internal 1.95 A-Hr rechargeable Lithium Ion battery, it can send a position report every hour for up to two months (about 1,200 reports) on one charge.

The SHOUT Nano offers a variety of other features including:

• Normal tracking—programmed to automatically wake up and send a position report at a set interval ranging from continuous to once every seven days

• Emergency alert—sends alerts using a 911 button and allows messaging to communicate emergency specifics

• Free-text messaging—sends free-text via three different sets of on-screen keyboards

• Canned text messaging—sends canned (pre-defined) messages in short codes to save bandwidth instead of the entire message body

SHOUT Nano Portable, handheld two-way outdoor satellite messaging and GPS device offers global asset tracking and tiered usage pricing.

Better Than BESTNew SATCOM solution will cut Military Sealift Command bandwidth costs.

COMSATCOM CenterUpdate

www.MIT-kmi.com24 | MIT 16.2

Special Report: COMSATCOM

Page 27: MIT 16-2 (March 2012)

The 2011 Department of Defense Commercial SATCOM Users’ Workshop was a co-sponsored event held by the Satellite Industry Association (SIA) and the U.S. Strategic Command (USSTRATCOM) from December 14-15, 2011, in Arlington, Va. This annual event brought together over 400 government leaders from the DoD as well as commercial satellite industry operators, service providers, integrators, ground equipment suppliers and manufacturers to join decision-makers from Africa Command, Central Command, European Command, Northern Command, Pacific Command, Special Operations Command, Southern Command, Transportation Command, DoD/chief information officer, Defense Information Systems Agency (DISA), Executive Agent for Space, Air Force, Army, Navy, Marine Corps, Coast Guard, White House Communications Agency, Space and Naval Warfare Systems Command, and more. The workshop focused on DoD’s current requirements for satellite services and connectivity and introduced the latest technology and indus-try trends to ensure effective satellite communications for the present and future requirements of the military and intelligence community.

Cindy Moran, director of network services, DISA, was one of the keynote speakers. Patricia Cooper, president of SIA, said Moran’s thoughts added “critical

insights on the continued interplay between the satellite industry and the [DoD] as budgets tighten and requirements for satellite communications continue to evolve.” She emphasized the goal is to help customers save money when purchasing satellite services. She also stated that DISA is actively looking for better ways to buy bandwidth. As of now, the Future COMSATCOM Services Acquisition (FCSA) strategy has been doing a good job in enhancing opportunities for competition. As of November of 2011, there were 22 offerors on FCSA, and DISA is hoping to obtain more. She stated, “DoD needs to make the best investments for the current and future SAzTCOM capabilities.”

Bruce Bennett, Program Executive Office for Communications, also repre-sented DISA as a keynote speaker. He spoke about the $1.5 billion cut to DoD funds and how it affects the satellite services industry. Bennett emphasized how DISA will further expand everyone’s participation in FCSA. However, he stated more efforts will need to be expended to find synergies among the industry and leverage Congress with the ongoing funding constraints.

For more information about the conference, please visit www.sia.org/dodsat-com, and for more information about SIA, visit www.sia.org.

• Waypoint tracking—sends and/or saves waypoints (interested landmarks) for later retrieval

• Check-in—allows a quick check-in message to be sent using a single soft key.

EMSS devices and services can be purchased through the DISA Direct Order Entry (DDOE) website at www.disadirect.disa.mil/. The 24/7 EMSS help desk is available to answer all customer questions about the SHOUT Nano as well as the full suite of EMSS devices, services, features and accessories.

The EMSS Program Office is seeking customers to share their experiences with how EMSS devices and services provided reliable and superior communica-tions in an austere environment. The EMSS Program Office is most interested in stories in which the EMSS global services helped save the day. If you would like to share your story, please reach out to the EMSS office.

SHOUT NANO SERVICE Cost for FY12* $81.60 one-time activation fee $133.29 per month - Unlimited $66.99 per month - up to 100 kb $26.19 per month - up to 30 kb

$10.89 per month - Inactive *Includes 2 percent DITCO feeFor pricing updates, please check DDOE at https://www.disadirect.disa.mil/

SPECIFICATIONS Dimensions: 4L x 2.2W x 0.8D inchesWeight: 6.5 ounces Hardened Anodized Aluminum Casing Rechargeable Lithium Ion Battery USB Interface

EMSS CONTACTSEMSS Program Office CML: (301) 225-2800 DSN: (312) 375-2800 Email: [email protected] Help Desk (24/7) CML: (877) 449-0600 DSN: (312) 282-1048 Email: [email protected]

The COMSATCOM Center would like to remind everyone to identify their requirements in terms of type of applications and specific data rates in Mbps; fre-quency band of operation (for example, Ku-, C-, X-, or Ka-band), coverage areas/ desired locations, and network connectivity. Requirements should be identified this way as opposed to providing a specific bandwidth unless there is a critical reason for doing so. A comprehensive design of a satellite communications link requires a suitable balance between bandwidth and power. In other words, bandwidth alone is a necessary asset but not sufficient to support the overall link performance.

Earth terminal, modem specifications and equipment limitation information is also needed. This approach allows the bidding vendors to compete using various optimized solutions (modulation schemes, coding rates, compression and adaptive techniques) that will provide the best range of options available to support specified requirement.

The COMSATCOM Center offers a dedicated staff of SATCOM engineers and acquisition specialists to assist with defining customer requirements. Please do not hesitate to contact us with any questions or concerns.

Workshop Links Users, IndustryCommercial SATCOM workshop focuses on DoD’s current requirements for satellite services and connectivity, and the latest technology and industry trends.

Quick Tips Define the requirement, not the solution.

Special Report: COMSATCOM

MIT 16.2 | 25www.MIT-kmi.com

Page 28: MIT 16-2 (March 2012)

www.MIT-kmi.com26 | MIT 16.2

Compiled by KMi Media Group staffCOTSACOPIA Commercial Off - the - Shelf Technology

The Harris Ruggedized Tablet is a secure, portable device that delivers a “smartphone-like” experience to military personnel and first responders who require secure real-time information at their fingertips to execute their missions. The new Harris RF-3590 is a 7-inch ruggedized Android tablet that provides high-performance application and computing capability at the tactical edge. The unit integrates seamlessly to the most advanced military and public safety communi-cations platforms; delivers targeted suites of mission-critical software applications to users on the battlefield and in first responder roles; and supports emerging requirements for video, monitoring position loca-tions, accessing secure databases and other crucial ISR tasks. It is rated as a ruggedized device to provide reliable operation in heat, cold and other extreme environments. Harris has received initial orders for test and evaluation purposes and is optimistic the product will be well received. For the warfighter, the RF-3590 leverages the military’s emerging wideband tactical radio networks and enables real-time sharing of mission-critical information across the battlespace. The Harris tablet is also designed to integrate with the Harris Falcon Networking System, an end-to-end system for connecting individual warfighters to the tactical cloud.

TeleCommunication Systems (TCS), a provider of mobile communication tech-nology, has announced the availability of its ultra-rugged Galatea solid-state drive, which provides high performance for a wide range of computer and vehicle applica-tions operating in the harshest environ-ments. Manufactured in America at TCS’ AS9100-certified facility, Galatea works across industrial temperature ranges and has been verified by outside laboratories to meet MIL-STD-810 requirements for shock, vibration, temperature range, temperature

shock, humidity and altitude. Galatea takes data security to new levels by combining 128-bit AES encryption with high-speed, full-drive erasure in less than 15 seconds. It provides high performance for the most demanding applications, fitting 200GB of user data into a standard 9.5 mm, 2.5-inch case while delivering sustained read/write rates of 280MB/s and random read/write rates over 40,000 input/output operations per second. In the event of an unexpected power failure, Galatea has built-in power backup to prevent data loss.

Latest Forensic Tool Offers Advanced Incident Response

Solid-State Drive Offers High Performance in Harsh Environments

Rugged Tablet Delivers Smartphone-

like Experience

The new RT10C rugged computer from GammaTech Computer Corp. features a touch-screen, 10.2-inch wide display and Windows 7 compatibility, in a compressed military-grade durable design. The GammaTech RT10C features an Intel Core i7-620UE mobile processor with integrated HD graphics providing stunning visuals and smooth high-definition video playback, and runs on either Windows embedded standard 2009, Windows 7, or Windows 7 Pro embedded operating systems. It supports both Wi-Fi and Bluetooth technologies. Other features include an AC power connector, two USB 2.0 ports, an Ethernet port, PCMCIA slot, two mini card slots, CompactFlash slot and VGA port. An optional vehicle or office docking station includes four USB 2.0 ports, an Ethernet port, Serial port, and VGA port. User-friendly features include a high-resolution (1024x600) WSVGA TFT LCD display with an LED

backlight to eliminate eyestrain. The resistive touch-screen display responds to both stylus and fingertips. Data is kept safe with security features such as TPM 1.2 fingerprint recognition, and an optional Smart Card reader. The unit meets military 810G standards for durability and IP65 standards for dust resistance.

Rugged Computer Features High-Definition Video Playback

Release of the new Forensic Toolkit (FTK) 4 from AccessData is designed to give FTK users enterprise-class capabilities at a stand-alone price. A new feature called Single-Node Enterprise gives FTK users the full analysis functionality of AD Enterprise, AccessData’s enterprise-class investigation and incident response solution. This gives organizations affordable access to more advanced incident response and remote investigative capabilities.

Using FTK, computer forensics examiners are able to securely and remotely investi-gate a running computer to analyze and collect data from disk, volatile and RAM, eliminating travel and reducing response time. Corporations and investigators in many disciplines increasingly require the ability to investigate internal matters, such as HR policy violations, regulatory compliance and employee separation. Whether motivated

by regulations or internal policy, the ability to conduct remote investigations is a requirement to address the risks of a digital workplace. FTK 4 now offers the critical components necessary to manage those risks to organizations that cannot spend tens of thousands of dollars on large-scale enterprise investigations platforms. These capabilities have never been offered in such an integrated and affordable solution.

Page 29: MIT 16-2 (March 2012)

www.MIT-kmi.com MIT 16.2 | 27

The

adve

rtise

rs in

dex

is pr

ovid

ed a

s a se

rvic

e to

our

read

ers.

KMI c

anno

t be

held

resp

onsib

le fo

r disc

repa

ncie

s due

to la

st-m

inut

e ch

ange

s or a

ltera

tions

.

aDVertisers inDex

calenDar

Access Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5www.upgradetoaccessdata.comCarahsoft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C4www.carahsoft.com/dco/upgrade/Globecomm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13www.globecomm.comGSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3www.gsa.gov/datacenterad

Harris CapRock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C2www.harriscaprock.comIntelsat General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C3www.spacedelivered.comLind Electronics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9www.lindelectronics.comUniversity of Maryland University College . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16http://military.umuc.edu/myfuture

March 12-15, 2012Satellite 2012Washington, D.C.www.satellitetoday.com

March 18-20, 2012AFCEA Belvoir Industry DaysNational Harbor, Md.www.afceabelvoir.org

March 22-23, 2012CyberFutures Conference and Technology ExpositionNational Harbor, Md.www.afa.org

March 27-29, 2012TechNet Land Forces-SouthwestTucson, Ariz.www.afcea.org

MIT CALENDAR & DIRECTORY

Major General Alan R. Lynn

April 2012Volume 16, Issue 3NEXTISSUE

Commanding General, Army Signal Center of ExcellenceChief of Signal, Army Signal Corps

Insertion Order Deadline: March 23, 2012 • Ad Materials Deadline: March 30, 2012

• Tactical Cross Domain Solutions• ID Management• Rugged Smartphones• SATELLITE 2012 Report

Cover and In-Depth Interview with:

Features

Special Report: DISA COMSATCOM Center

Page 30: MIT 16-2 (March 2012)

www.MIT-kmi.com28 | MIT 16.2

Barry Leffew is vice president of Ado-be’s Public Sector Enterprise Sales Team. Adobe’s public sector enterprise team sup-ports federal, state and local government organizations with implementing Adobe’s software solutions for e-forms, document management, e-learning and collaboration. He has over 20 years of experience in the information systems industry, an extensive background in the government market and is active with a wide variety government committees and associations.

Leffew is a graduate of George Washing-ton University’s MBA program, and has an undergraduate degree in management sci-ence from Shippensburg University.

Q: Can you provide some examples of the ways in which Adobe is meeting the needs of military and government organizations?

A: Adobe has been a long-time leader in many areas, specifically in helping the gov-ernment and military enable and accelerate the transformation to a digital environment. Our products and solutions are used to cre-ate—or make—extensive amounts of digital media, imagery, video and documents. These are products such as Acrobat, Photoshop, Premiere and our Creative Suite solutions. Also, customers need to manage that digital content, so we support them through solu-tions such as our Adobe CQ Web Content Management software, and tools for collabo-ration such as Adobe Connect. In addition, we’re helping government agencies then take that content and make it secure, so that access to it is controlled. Finally, once that content is created, managed and secured, we help them measure how it is used, who is using it and where it is going, as well as

helping them mobilize it. We’re seeing many customers needing to deploy and access con-tent via tablets and mobile devices.

Q: How do Adobe’s solutions make collaboration easier and more secure for military and government agencies?

A: Adobe has a solution called Adobe Con-nect, which allows one-to-many and many-to-many real-time meetings to occur from anywhere around the world. For the Depart-ment of Defense, we’re running and operating a program for the Defense Information Sys-tems Agency [DISA] called Defense Connect Online [DCO], which provides worldwide accessible, on-demand collaboration. There are now about 650,000 people using the solu-tion, for everything from collaboration on the battlefield to more traditional activities such as Web conferencing and training. More recently, we’ve also worked to enable DCO in mobile environments. DoD customers can now use and access DCO through iPad tablets, Android-based devices or even cell phones to participate in meetings.

Q: What are some of the most significant programs that Adobe is currently working on with the military?

A: In addition to the DCO program for DISA, which provides services to the entire DoD, we’re also working with virtually every one of the military services to help them in the process of streamlining and taking paper processes online, and automating forms and workflow processes. These include the Navy, Army Materiel Command and Marine Corps, as well as DISA. Another interesting customer using our mobile and publishing

solutions is the Defense Media Activity. They are publishing all of their publications for DoD personnel and families around the world using Adobe’s digital publishing suite to allow them to deploy media to tablets, and to move from a world of paper publishing to an online digital environment.

Q: How is Adobe working to strengthen the security of your solutions?

A: Ensuring our products are secure has been a fundamental focus of Adobe’s for many years, and we certainly recognize the unique security requirements that govern-ment and DoD have. So we’ve done things like making sure Adobe products support key standards, such as the Federal Information Processing Standards. We have also certified our products through the Joint Interoper-ability Test Command certification. One area we’ve really strived to be an industry leader in is that of digital rights management. We’ve introduced a range of solutions that enable the customer to secure digital content, put-ting a very sophisticated security wrapper around it to make sure content is only acces-sible by people who should have access to it.

Q: How are you responding to the movement by the government, including the military, to cloud computing?

A: That is a key area of focus for Adobe, as well, in terms of transforming its prod-ucts and solutions to be cloud-enabled. We see customers wanting to be able to take Adobe solutions and deploy them in a cloud environment. One example is DISA, which today provides DCO as a software-as-a-service offering. O

Barry LeffewVice President, Public Sector

Adobe

INDUSTRY INTERVIEW Military Information Technology

Page 31: MIT 16-2 (March 2012)

NEED AFFORDABLE ACCESS TO SPACE?

LOOK NO FURTHER.We’re the payload host with the most. Starting with the most satellites

in the world. With our fl eet of more than 50 satellites — and fi ve more

launches scheduled for 2012 — government agencies can and do rely on

Intelsat General for affordable access to space. In fact, we are delivering

a UHF payload to the Australian Defense Force on-time, and on-budget —

A partnership that will save the ADF over $150 million over the 15-year

contract. Our proven track record and regularly scheduled launches,

coupled with the ability to disaggregate assets for a more resilient space

architecture, make us the most trusted name in the industry. At a time

of federal spending cuts, we can provide reliable, resilient, and affordable

access to space for you, too.

We’re ready, now. Are you? Visit www.spacedelivered.com

HOSTED PAYLOAD PROGRAM

Page 32: MIT 16-2 (March 2012)

h�ps://www.dco.dod.mil/

Find out what half a million DoD users already know...Communicate and collaborate for free with Defense Connect Online

DCO IS UPGRADING!

Adobe, the Adobe logo, and Connect are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. © 2012 Adobe Systems Incorporated. All rights reserved.

Easier to use interface

Drag-&-drop sharing

PDF support

Improved video

Create your own custom pods

Improved smartphone/

tablet capabilities

Tabbed chat and much more

DCO is upgrading to Adobe Connect 8.2!

Get a sneak peak of what’s coming here:

www.carahso�.com/dco/upgrade/

….

Powered by Adobe® Connect™