Global Information Grid
The Global Information Grid (GIG) is an all-encompassing communications project of the United States Department of Defense.
It is defined as a "globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel".
The GIG includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and National Security Systems. Non-GIG Information Technology (IT) includes stand-alone, self-contained, or embedded IT that is not, and will not be, connected to the enterprise network.[1]
This new definition removes references to the National Security Systems as defined in section 5142 of the Clinger-Cohen Act of 1996. Further, this new definition removes the references to the GIG providing capabilities from all operating locations (bases, posts, camps, stations, facilities, mobile platforms, and deployed sites). And lastly, this definition removes the part of the definition that discusses the interfaces to coalition, allied, and non-Department of Defense users and systems.[2]
The DoD's use of the term "GIG" is undergoing changes as the Department deals with new concepts such as Cyberspace Operations, GIG 2.0 (A Joint Staff J6 Initiative), and the Department of Defense Information Enterprise (DIE).[1]
The GIG is managed by a construct known as NetOps. NetOps is defined as the operational framework consisting of three essential tasks, Situational Awareness (SA), and Command & Control (C2) that the Commander (CDR) of United States Strategic Command (USSTRATCOM), in coordination with DoD and Global NetOps Community, employs to operate and defend the GIG to ensure information superiority.[3]
Contents
1 Defense Information Enterprise
2 Vision
3 See also
4 References
5 External links
Defense Information Enterprise
The Department of Defense Information Enterprise is defined as the DoD information resources, assets, and processes required to achieve an information advantage and share information across the Department of Defense and with mission partners.
It includes:[1]
- the information itself and the Department’s management over the information life cycle
- the processes, including risk management, associated with managing information to accomplish the DoD mission and functions
- activities related to designing, building, populating, acquiring, managing, operating, protecting, and defending the information enterprise
- related information resources such as personnel, funds, equipment, and IT, including national security systems
Vision
The Network-Centric Warfare (NCW) doctrine represents a fundamental shift in military culture, away from compartmentalized war machines and toward interconnected units operating cohesively. The tenets of Network Centric Warfare are:
- A robustly networked force improves information sharing;
- Information sharing enhances the quality of information and shared situational awareness;
- Shared situational awareness enables collaboration and self-synchronization and enhances sustainability and speed of command;
- Speed of command, in turn, dramatically increases mission effectiveness.[4]
At the enterprise level, forging new paths with whom components of the military communicate will ease logistics burdens, improve communication and combat effectiveness of the war fighter, decrease instances of confusion-related fratricide, accelerate the trend in minimizing collateral damage, and hasten the flow of business. For the warfighter, situational awareness would be improved tremendously by linking what he sees with what an overhead satellite sees.
The fog of war would be lifted by seamless communication between unit members, off site detection devices, and commanders operating behind the line. Improved coordination may also assist in delivering appropriate firepower or other tangible assets to first responders during domestic attacks and natural disasters worldwide.[4]
See also
- Defense Information Systems Agency
- Global Information Network Architecture
- Information Assurance Vulnerability Alert
- Joint Battlespace Infosphere
- JTF-GNO
- Skynet (Terminator)
- Software Defined Perimeter
References
^ abc "DoDD 8000.01, Management of the Department of Defense Information Enterprise, dated February 10, 2009" (PDF). Retrieved 2014-03-25..mw-parser-output cite.citation{font-style:inherit}.mw-parser-output .citation q{quotes:"""""""'""'"}.mw-parser-output .citation .cs1-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/6/65/Lock-green.svg/9px-Lock-green.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output .citation .cs1-lock-limited a,.mw-parser-output .citation .cs1-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/d/d6/Lock-gray-alt-2.svg/9px-Lock-gray-alt-2.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output .citation .cs1-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/a/aa/Lock-red-alt-2.svg/9px-Lock-red-alt-2.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output .cs1-subscription,.mw-parser-output .cs1-registration{color:#555}.mw-parser-output .cs1-subscription span,.mw-parser-output .cs1-registration span{border-bottom:1px dotted;cursor:help}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/4/4c/Wikisource-logo.svg/12px-Wikisource-logo.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output code.cs1-code{color:inherit;background:inherit;border:inherit;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;font-size:100%}.mw-parser-output .cs1-visible-error{font-size:100%}.mw-parser-output .cs1-maint{display:none;color:#33aa33;margin-left:0.3em}.mw-parser-output .cs1-subscription,.mw-parser-output .cs1-registration,.mw-parser-output .cs1-format{font-size:95%}.mw-parser-output .cs1-kern-left,.mw-parser-output .cs1-kern-wl-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right,.mw-parser-output .cs1-kern-wl-right{padding-right:0.2em}
^ Global Information Grid (GIG) Overarching Policy, dated September 19, 2002 Archived May 22, 2011, at the Wayback Machine
^ Joint Concept of Operations (CONOPS) for Global Information Grid (GIG) NetOps Version 3, dated August 4, 2006
^ ab "Network-Centric Warfare: Its Origin and Future, By Vice Admiral Arthur K. Cebrowski, U.S. Navy, and John J. Garstka, Proceedings, January 1998". Dodccrp.org. Retrieved 2014-03-25.
External links
- National Security Agency (NSA) on GIG Information Assurance
- GIG Bandwidth Expansion
- DoD IA Policy Chart - Build and Operate a Trusted GIG