Title: Mr' John Osterholz
1Data and Information - You can run but you cant
hide
Mr. John Osterholz Director Architecture
Interoperability Office of the DoD CIO and
ASD(C3I)
2The Global Information Grid
Information Technology including National
Security Systems
Its part of the GIG if it ...
Transmits information to, receives information
from, routes information among or interchanges
information among other equipment, software and
services Provides retention, organization,
visualization, information assurance or
disposition of data, information and/or knowledge
received from or transmitted to other equipment,
software and services Processes data or
information for use by other equipment, software
and services
3The Importance of Information
Suppliers
Communities of Interest
Network Centric Operations
- Merged Service Providers
- Trans National Enterprises
Policy Makers
- Increasingly Joint AND Combined
- Increasingly Cross Functional
- Increasingly Data Centric
- Increasingly Just in Time
- Increasingly collaborative
- Unique dependence on imagery
- Increasingly distributed geospatially
- Cost Is An Independent Variable
- Clinger-Cohen Act (ITMRA)
- 10 USC (1999)
- Emerging Congressional Guidance
New Entrants
Technologies
Threats
- Wavelength Division Multiplexing
- Unattended Aerial Vehicles (UAV)
- Public Key Infrastructure (PKI)
- Processor and Storage technologies
- Object Oriented Software
- IT Outsource/Seat Management
- Functional Service Providers
- Insider-outsider threat
- Trans National Organizations
- State Sponsored Organizations
- WMD threats (chem/bio)
Red typeface denotes significant enterprise data
impact
4Information is Different
- Develop Once - Use Many Times - and
Simultaneously - Value is Not Created Until the End of the Last
Mile - A Vulnerability Created by One is a Vulnerability
Imposed upon Many - A Deficiency Created by One is a Deficiency for
Many
Value Enhancers Value
Detractors
Lack of Interoperability and Disconnects Delays
Disruptions and Lack of Reliability Compromise St
ovepiped Information The Chaff and Overload Poor
Quality
Sharing Timeliness Assured Availability Security
and Confidence Context and Fusion The
Wheat Accuracy and Completeness
Enterprise Solutions Can Create and Protect Value
5Joint Information Exchange Requirements
Joint Mission Area
GIG Architecture V1.0
Joint Information Requirements are tied to
operations processes
6GIG, Information The Warfighter
Situational Awareness
The right information At the right time In
the right form to the right Warfighter
CONTEXT
7Information A Simple Definition
INFORMATION IS DATA ELEVATED BY CONTEXT
8Data Architecturefor the Global Information Grid
Enabled by Technology and Paced by Sociology
9Data Management for the GIG
Community of Interest Governance
DoD CIO Governance
Dominant Maneuver Deployment/Redeployment Precisi
on Engagement Strategic Deterrence Overseas
Presence and Force Projection
Special Operations Joint Command and Control
Information Superiority Focused Logistics Full
Dimensional Protection Multinational Ops and
Interagency Coordination
COI
COI
- Enterprise Data
- Adjudication of cross COI issues
COI
COI
Joint Mission Areas1
Enterprise Data
COI
COI
COI
COI
1 Approved by Chairman/JCS 6 Sep 2000
10The Peril -Increasing Vulnerabilities
Information characteristics
Social Structure
Localized info sources Minimally
interconnected Life at a tactical level Tradition
supplements focus
Tribal
Minimal
Societal
Regionalized info sources Moderately
interconnected Moderately large bureaucracies Can
focus resources with difficulty Limited but
identifiable objectives
Importance of Information to decision making
Moderate
Global
Transnational info sources Highly
interconnected Multiple bureaucracies Able to
focus significant resources Multiple competing
objectives
Significant
We may be more vulnerable than we are threatening
11GIG Threat Baseline
Kinetic Threat to Data Center FacilitiesChemica
l/Biological Threat to Data Center
Personnel Information Threat to Networks and
Computing Systems
Covertly emplaced explosivesProjectile delivered
explosives
Aerosol delivered persistent chemical/biological
agents Insider delivered biological agent
Disclosure of operations/business
details Deception causing loss of confidence in a
system Denial of system resources to support an
operation/business Usurpation of system
resources for criminal purposes
The Global Information Grid operates in a
multi-threat environment
12Enterprise Information Threats
Enterprise Operations Threats
Disclosure Deception Denial
Usurpation
Exposure Interception Inference Intrusion
Incapacitation Corruption Obstruction
Misappropriation Misuse
Masquerade Falsification Repudiation
Service provider focus
functional process focus
Many of these threats can be mitigated by
an Enterprise approach to Information Assurance
13PKI - Necessary But Not Sufficient
14A More Comprehensive Solution Is Needed
15NetOps Is Becoming Commercial Best Practice
16Wrap Up
- Information Management is a vital aspect of the
GIG - Information is data elevated by context
- The DoD CIO is pursuing a Community of Interest
approach to data management - Assurance that critical data bases will be
available to the warfighter requires an
Enterprise approach - NetOps is the Enterprise approach